Ok. 
So like many I also have to run some old, vuln kit. 

What I would do is have a Pi with an OS that allows me to configure it to run 
smb v1, attach enough storage for the audio library then stick the whole lot on 
a separate net behind deny ip any any and move on. 

The point is that we all have so many footguns, some that we have to use and 
some that we purposefully choose to use* and we all have the right to operate 
in whatever way we want to within our own domain. 

However bringing the protocol spec into line with the reality of the current 
operational landscape to increase resilience of the internetworks seems like an 
obvious way forward for the IETF even if it means that a teeny tiny amount of 
vendors or users will have to rethink some edge case solution which really 
shouldn’t be exposed to or actually traversing the inet at this point. 

I’m sure people using AH currently will be able to adapt over the next decade 
or so meanwhile many other folk get to drop stuff on line cards with no control 
plane involvement and OS folk get to rip out code. 

What’s not to like?

* I used to build OpenBSD -current from source after any sec updates on a 
production bastion host. Mostly it was fine, sometimes it wasn’t. Snap then 
sysupgrade reduced the pain. 

> On 3 Jan 2026, at 13:10, Alan DeKok <[email protected]> wrote:
> 
> On Jan 3, 2026, at 5:31 AM, Mike Simpson <[email protected]> wrote:
>> “My stuff needs smbv1 and I’ve known about it being deprecated for over a 
>> decade with the person i/c it at MSFT was begging folk not to use it in 2016 
>> and I haven’t worked out a technical solution for my limited domain and 
>> because of my limited experience  with a 50 year old file protocol I want to 
>> keep all the obvious footguns still enabled by default for all to use.”
> 
>  People still use NTLM, which is not much newer than SMBv1.
> 
>  Why?  Because MSFT, in their infinite wisdom has deemed it to be the only 
> way to get certain information from Active Directory.
> 
>  i.e. it's deemed to be more secure to (essentially) send clear-text 
> equivalent passwords over the wire, instead of wrapping them in TLS, and 
> restricting access to authenticated accounts with the correct authorization.
> 
>  There are hundreds of millions of people whose network access depends on 
> NTLM.  The admins would be deliriously happy to move to something better.  
> But decades of complaints have gone nowhere.
> 
>  So yes, we've known that things have been deprecated for decades.  I don't 
> want to keep using a 40 year-old footgun around.  But until I have a 
> replacement, it's the only tool which works.
> 
>  Alan DeKok.
> 
> <signature.asc>

_______________________________________________
Int-area mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to