Introduction

This tutorial contains screenshots for the English version of Windows 10. Separate instructions for older versions of Windows are also available:

To be able to mount a Windows share over SSH we will need

  • Administrator access to the local computer, including the ability to elevate privileges. If you don't know what I am talking about then stop reading right here.
  • One real or virtual network adapter, bound to the Client for Microsoft Networks driver.
    Normally you should already have such an adapter, as otherwise you would not be able to mount any Windows shares.
  • One real or virtual network adapter, NOT bound to the Client for Microsoft Networks driver.

This part of the tutorial is split into the following steps:

    1. As most people do not have a spare real network adapter in their computer, we will add an extra virtual network adapter by installing the Microsoft KM-TEST Loopback Adapter.
    2. After that, the network adapter must be properly configured.
    3. Starting with Windows 10 update 1903, the Windows 10 feature "SMB 1.0" must be turned off.
    4. Furthermore, a few Windows system drivers need to be tweaked.
    5. Next, reboot Windows to verify that we've been able to grab port 445 and to see if the lanmanserver driver is up and running.
    6. Finally, we launch a special OpenSSH session and mount our Nikhef home directory.
  1. For those wishing to undo the above steps follow the instructions at the bottom of this tutorial.

Windows 10 Upgrade woes

Multiple persons have reported problems after a major Windows 10 upgrade (e.g. from 1803 to 1809). This is due mostly to the disappearance of the Microsoft KM-TEST Loopback Adapter and of the portproxy rule. In order to recover after a Windows 10 upgrade, try

  • Redo step 1 and reboot
  • If the adapter is still not present, run devmgmt.msc management console application and
    choose View->Show Hidden devices to see you can find the adapter again. If not, redo step 2.
  • Redo steps 3, 4 and 5.

1. Installing the Loopback Adapter

To install the Loopback adapter follow these steps:

  • Start the Add Hardware Wizard by either going Start->Settings->Control Panel->Add Hardware or by starting a console window with elevated (Administrator) privileges. In the console window type

      hdwwiz.exe
    

    The Hardware Wizard will come up:

  • Click Next to continue:

    Select Install the hardware that I manually select from a list and click Next.
  • Now you'll see:

    Select the entry Network adapters and click Next.
  • In the next screen

    first select Microsoft from the list of Manufacturers and then select Microsoft KM-TEST Loopback Adapter from the list of Network Adapters. Finally, click Next once more.
  • Almost finished:

    This is your last chance to abort, otherwise, click Next.
  • After a while you should see:

    Click Finish to exit the Hardware Wizard.

You are now ready to configure your newly installed Loopback adapter. Even though Windows might not ask you to, reboot anyways (heey, it's a Microsoft OS ;-)).
From reports I've seen on the Internet a reboot is sometimes required for the loopback adapter to come up properly.

2. Configuring the Loopback Adapter

Now that your newly installed loopback adapter is up and running we must configure it properly:

  • Go to the Network Connections Center:
  • Choose the loopback adapter (usually it is named something like "Local Area Connection #3") and right-click on it:
  • Choose Properties, after which a new window will appear

    Make sure that
    • the entry Client for Microsoft Networks is NOT enabled, i.e. does not have a checkmark in front of it.
    • the entry File and Printer sharing for Microsoft Networks is NOT enabled, i.e. does not have a checkmark in front of it.
    • the entry Internet Protocol (TCP/IP) is enabled.
  • Select the entry Internet Protocol (TCP/IP), then click on Properties.
  • A new window will appear:

    Select Use the following IP address and fill in the 'IP address' and 'Subnet mask' as above.
    It is not necessary to fill in the 'Default gateway' or a 'DNS server'.
  • Click on Advanced to make the following window appear:

    Deselect Automatic metric and fill in the value of 9999 as the 'Interface metric' as shown above.
  • Click on the WINS tab:

    and select Disable NetBIOS over TCP/IP.
  • Click on OK.
  • You are now back in the main 'TCP/IP Properties' screen. Click OK again.
  • You are now back in the main 'Loopback Properties' screen. Click Close.

3. Disabling the "SMB 1.0" Windows feature

Starting with Windows 10 update 1903 we need to disable the Windows feature SMB 1.0:

  • Go to the Control Panel->Programs->Programs and Features and select Turn Windows features on or off
  • A list of features pops up:

    Scroll down and deselect the feature SMB 1.0/CIFS File Sharing support
  • Now close this control panel item.

(Thanks to Michael Uhlenberg for pointing this out)

4. Tweaking the 'LanmanServer' driver

Now we first need to tweak a Windows system driver to overcome the thing that Microsoft broke. The root cause of the problem is that we need to access the file share using TCP port 445. However, when Windows 10 boots this port is grabbed by the system lanmanserver driver for all interfaces. By delaying the startup of the lanmanserver driver and by installing a portproxy rule we can circumvent this. This section explains how to do this:

  • Start a console window with elevated (Administrator) privileges.
  • First, we disable the automatic starting of the lanmanserver driver:
      sc config lanmanserver start= delayed-auto
    

    NOTE the space after the start= ! Also, if start= delayed-auto does not work then try start= demand

  • Make sure the IpHlpSvc driver is running at startup, as otherwise the portproxy rules are not executed:
      sc config iphlpsvc start= auto
    

    NOTE the space after the start= !
    Thanks to Michael Uhlenberg for pointing out this important driver.

  • Next we add a portproxy rule to reroute TCP port 445 to a port of our choosing. For this tutorial, I choose 44445:
      netsh interface portproxy add v4tov4 listenaddress=10.255.255.1 listenport=445
    connectaddress=10.255.255.1 connectport=44445

    IMPORTANT NOTES:

    • The listenaddress is the address of the Loopback adapter configured in the section earlier
    • The connectaddress must be identical to the listenaddress
    • Using listenaddress=127.0.0.1 does not work. Believe me, I've tried.

If all went well you should see something like

The portproxy rule is persistent, so there should be no need to repeat this step after a reboot.

5. Reboot and verify

Of course, now that we have disabled the automatic startup of the 'LanmanServer' driver we have to reboot Windows before proceeding.

  • Verify that the portproxy was applied successfully by checking the open ports on the system. Type in the command console

      netstat -an | find ":445 "
    

    You should see something like:

    If you see only '0.0.0.0:445' instead then the 'portproxy' rule was not applied correctly. Verify that the right 'portproxy' rule was used

       netsh interface portproxy show v4tov4
    

    and verify that the IpHlpSvc driver is running at Windows startup using

      sc query iphlpsvc
    

    Another reason for the 'port grabbing' to fail could be the LanmanWorkstation driver running at Windows startup. If so, try giving it the same treatment as LanmanServer. However, on the Windows 10 installations I tested this driver was running at system startup without causing any problems.

  • After Windows comes up and you have logged in, check the status of the 'lanmanserver' driver. Open a command console (no privilege elevation is required) and type
      sc query lanmanserver
    

    The 'LanmanServer' driver should be in the state Running. If it is not, then follow these steps to create a task using the Task Schedule to start it at system startup.

On Windows 10 things are slightly different compared to Windows 7 and 8; it seems that Microsoft has read my tutorial and decided to provide a way to use local shares again ;-) !

6. Putting it all together

Now that we have configured both our loopback adapter we can put it all together by launching a special OpenSSH connection and mounting our Nikhef home directory as a Windows share:

  • Launch an OpenSSH session with some special port-forwarding rules and login on login2.nikhef.nl as normal. Open a Command console or terminal and type:

      ssh -v -N -n -L 10.255.255.1:44445:beuk.nikhef.nl:445 <Your-nikhef-userid>@login2.nikhef.nl
    

    Yes, there are lots of colons in that -L option but you need them all.

  • The first time you start the command with the special port forwarding rules, you will be (probably) be prompted by the Windows Defender Firewall that it has blocked some features:

    Allow access to at least Public networks by ticking the checkbox, then click on Allow access as otherwise the port-forwarding will not work.
  • Make sure port-forwarding is working properly by checking the (verbose) log:

    Make sure the line
      debug1: Local connections to 10.255.255.1:44445 forwarded to remote address beuk.nikhef.nl:445
    

    is present before continuing.

  • Go to Start->Run and type \\10.255.255.1\user\<Your-nikhef-userid>
  • In the Console window you should now see a line
      debug1: Connection to port 44445 forwarding to beuk.nikhef.nl:445 requested.
    

    as in the following screenshot:

    If this is present then you can decrease the debug logging of the OpenSSH session by removing the -v option from the command line:

      ssh -N -n -L 10.255.255.1:44445:beuk.nikhef.nl:445 <Your-nikhef-userid>@login2.nikhef.nl
    

    Note If you carefully inspect the above screenshot then you will notice that I am using the (built-in) OpenSSH Authentication Agent in combination with an SSH public/private keypair to avoid having to type in my Nikhef password every time.

  • You will be prompted to authenticate yourself:

    For the Username, fill in the domain NIKHEF\ followed by your Nikhef-Windows userid.
    For the Password, fill in your Nikhef-Windows password, which might be different from the password you use to log in on login2.nikhef.nl and press OK.
  • You should now see your Nikhef home directory in Windows Explorer!

Congratulations!

Mapping a network drive

To make life even easier it might be handy to map a network drive to your Nikhef home directory:

  • Start Windows Explorer and choose Tools->Map Network Drive.
  • In the next screen, fill in:
    • Choose an available drive letter.
    • Do NOT click on Browse but type in as the Folder name: \\10.255.255.1\user\<Your-nikhef-userid>
    • Enable the checkbox in front of Connect using different credentials.
    • Now click on Finish.
  • In the next screen, fill in your Nikhef-Windows userid:

    For the User name, fill in the domain NIKHEF\ followed by your Nikhef-Windows userid.
    For the Password, fill in your Nikhef-Windows password, which might be different from the password you use to log in on login.nikhef.nl and press OK.
  • In the next screen, click on Finish to complete the network drive mapping.
  • You should now see a new drive letter appear in the Folders tree-list in Windows Explorer. Click on it to verify that you are indeed viewing your Nikhef home directory.

7. Control+Z! Undo! Undo!

For those wishing to undo the CIFS-over-SSH trick follow these steps:

  1. Start a console window with elevated (Administrator) privileges.
  2. Restore the automatic startup of the lanmanserver driver by typing
      sc config lanmanserver start= auto
    

    NOTE the space after the start= !

  3. Remove the portproxy rule by typing
      netsh interface portproxy delete v4tov4 listenaddress=10.255.255.1 listenport=445
    
  4. Remove the firewall rule to allow SSH to do portforwarding from 10.255.255.1:
    • Go to the Windows Control Panel
    • Select System and Security, then Windows Defender Firewall
    • Select Allowed apps, and scroll down in the list to SSH, Telnet and Rlogin client and deselect the permissions

      Then press OK
  5. Start a Device Manager by typing
      devmgmt.msc
    

    Expand the 'Network Adapters', right-click on Loopback adapter and select Uninstall.

  6. If necessary, use the 'Task Scheduler' from the 'Administrative Tasks' menu to delete the task 'Start LanmanServer driver'

That's all, folks!reprint:https://www.nikhef.nl/~janjust/CifsOverSSH/Win10Loopback.html#Install


Comments to Jan Just Keijser | lastmod = 26/01/2021 14:42

 

校园网跨网段共享文件Samba+SSH的更多相关文章

  1. 极路由设置共享磁盘密码、跨网访问samba服务

    极路由插上移动硬盘后会自动建立samba服务器,但我们没法去配置哪些盘符需要密码,这样只要在同一个wifi下的电脑都能去访问这些东西了,比较弱智.另外我还想再公司中去读写这个移动硬盘. 设置密码 首先 ...

  2. SQL Server 跨网段(跨机房)FTP复制

    一.本文所涉及的内容(Contents) 本文所涉及的内容(Contents) 背景(Contexts) 搭建过程(Process) 注意事项(Attention) 参考文献(References) ...

  3. SQL Server 跨网段(跨机房)复制

    一.本文所涉及的内容(Contents) 本文所涉及的内容(Contents) 背景(Contexts) 解决方案(Solution) 搭建过程(Process) 注意事项(Attention) 参考 ...

  4. hadooop 配置多网卡 提供跨网段服务

    http://hortonworks.com/blog/multihoming-on-hadoop-yarn-clusters/ https://hadoop.apache.org/docs/r2.6 ...

  5. elasticsearch 跨网段组集群

    elasticsearch 是非常流行的全文搜索引擎,但网上的教程多是初次使用,并没有一些高级用法demo.这次遇到需要跨网段组网问题,自己摸索了文档很久,发现确实可行,于是着手做了个实验,最终实验成 ...

  6. 如何使用UDP进行跨网段广播

    广播域首先我们来了解一下广播域的概念.广播域是网络中能接收任一台主机发出的广播帧的所有主机集合.也就是说,如果广播域内的其中一台主机发出一个广播帧,同一广播域内所有的其它主机都可以收到该广播帧.广播域 ...

  7. SQL Server跨网段(跨机房)FTP复制

    SQL Server跨网段(跨机房)FTP复制 2013-09-24 17:53 by 听风吹雨, 273 阅读, 0 评论, 收藏, 编辑 一. 背景 搭建SQL Server复制的时候,如果网络环 ...

  8. 如何使用UDP进行跨网段广播(转)

    源:http://blog.chinaunix.net/uid-22670933-id-3716646.html 广播域首先我们来了解一下广播域的概念.广播域是网络中能接收任一台主机发出的广播帧的所有 ...

  9. 如何使用UDP进行跨网段广播(转)

    源:如何使用UDP进行跨网段广播 广播域首先我们来了解一下广播域的概念.广播域是网络中能接收任一台主机发出的广播帧的所有主机集合.也就是说,如果广播域内的其中一台主机发出一个广播帧,同一广播域内所有的 ...

随机推荐

  1. re学习笔记

    re学习笔记 学习链接: https://regexlearn.com/zh-cn/learn \w: 数字字母下划线 \W: 非\w \d \D: !\d \s: space cha \S: !\s ...

  2. Git镜像

    http://npm.taobao.org/mirrors/git-for-windows/v2.34.1.windows.1/ Git 阿里镜像,高速 下载

  3. 《ECMAScript 6 入门》【三、字符串的扩展】(持续更新中……)

    前言: 本篇介绍 ES6 对字符串的改造和增强.一.字符的 Unicode 表示法 字符的 Unicode 码点必须在\u0000~\uFFFF之间,\uxxxx形式表示一个字符,其中xxxx表示字符 ...

  4. SAP 隐式增强 Enhancement point

    1.进入编辑器:SE38/SE37/SE24 Edit-->Enhancement Operations-->Create Option 2.填写相关信息,点击对号. 3.点击Enhanc ...

  5. 简单实现python接口自动化(一)

    目的:excel中维护接口用例数据,通过python中requests库进行读取用例,并把运行结果与excel中的预期结果对比,最后把执行情况写入到excel中去. excel维护数据: 具体的接口名 ...

  6. 手把手教你用 Python 下载手机小视频

    今天为大家介绍使用 mitmproxy 这个抓包工具如何监控手机上网,并且通过抓包,把我们想要的数据下载下来. 启动 mitmproxy 首先我们通过执行命令 mitmweb 启动mitmproxy, ...

  7. Solution -「Luogu 3959」 宝藏

    果真是宝藏题目. 0x01 前置芝士 这道题我是真没往状压dp上去想.题目来源. 大概看了一下结构.盲猜直接模拟退火!\xyx 所需知识点:模拟退火,贪心. 0x02 分析 题目大意:给你一个图,可能 ...

  8. [spring]spring的bean自动装配机制

    7.bean的自动装配 是spring满足bean依赖的一种方式 spring会在上下文中自动寻找,并自动给bean装配属性 spring的装配方式: (1)手动装配 在people类中依赖了cat和 ...

  9. 《Python编程:从入门到实践》第19章笔记:用户/用户注册/身份验证

    接上篇django最基本的一些日常用法,这是第19章笔记,希望在做"动手试一试"的时候可以让自己方便参考. 这一章实现了两个功能: 1.让用户能够添加主题Topic和条目Entry ...

  10. 【AcWing】第 62 场周赛 【2022.07.30】

    AcWing 4500. 三个元素 题目描述 给定一个长度为 \(n\) 的数组 \(r\_1,r\_2,-,r\_n\). 请你找到其中的三个元素 \(r\_a,r\_b,r\_c\),使得 \(r ...