Software 44207 Published by

The Samba team has released version 4.24 as the first stable update for this series, bringing essential security hardening to Linux-based Active Directory controllers. Defaulting to AES encryption types and enforcing stricter certificate bindings helps plug vulnerabilities that previously allowed attackers to exploit weaker authentication protocols. Administrators will find the new samba-tool commands for managing Windows Hello keys particularly useful alongside improved compatibility with cloud password reset systems like Entra ID. It remains a solid upgrade for any server acting as a domain controller, provided administrators review their smb.conf settings to ensure legacy clients do not get locked out by the stricter Kerberos policies.



Samba 4.24 Update Solves Active Directory Security Issues and Adds Encryption Support

The latest stable release of the file sharing suite arrives with significant security patches for domain controllers. Administrators running Windows Active Directory on Linux servers need to pay attention to the new encryption defaults and authentication auditing tools in Samba 4.24. This update fixes known vulnerabilities while introducing stricter Kerberos policies by default.

Screenshot_from_2026_02_08_08_53_50

Security Defaults and Audit Logging Changes

The most critical change for anyone managing an active directory domain involves the shift toward AES encryption types as the standard behavior. Older configurations might still attempt to negotiate weaker protocols, but Samba 4.24 now defaults to aes128-cts-hmac-sha1-96 and aes256-cts-hmac-sha1-96 if the domain functional level supports it. This addresses a specific vulnerability where older ciphers could be exploited during authentication handshakes. Administrators should also note that the KDC now includes PAC data by default unless explicitly told otherwise, which prevents certain classes of replay attacks involving forged tickets. There is also new audit logging capability for sensitive attributes like altSecurityIdentities and servicePrincipalName when changes occur. This allows security teams to spot surreptitious activity without needing external monitoring tools since the debug classes log these actions directly. The default enforcement mode for certificate binding now requires strong mappings, though a compatibility setting exists if older clients fail to connect.

New Commands For Windows Hello And Key Management

Managing certificates and keys for services like Windows Hello for Business used to require complex manual setups or third-party patches. The new keytrust sub-command within the samba-tool utility allows administrators to set and view public key details directly on computer or user accounts. This change enables PKINIT authentication mechanisms to work with self-signed keys when using the embedded Heimdal KDC. There is also better support for remote password management systems like Entra ID SSPR which previously failed because Samba did not understand policy hints controls. Now local password policies are enforced during cloud-based resets so users do not bypass on-premises rules. The tool also includes a generate-csr sub-command that creates certificate signing requests containing the Object SID extension required for strong mapping validation. These updates make it much safer to integrate Linux based infrastructure with modern Windows authentication standards without sacrificing security controls.

Upgrade when ready and check your smb.conf file for any custom overrides before rolling this out to production systems.