Microsoft has since discontinued use of the CIFS moniker but continues developing SMB protocol and making subsequent specifications publicly available.
| FactSnippet No. 1,664,432 |
Microsoft has since discontinued use of the CIFS moniker but continues developing SMB protocol and making subsequent specifications publicly available.
| FactSnippet No. 1,664,432 |
SMB protocol serves as the basis for Microsoft's Distributed File System implementation.
| FactSnippet No. 1,664,433 |
Use of the SMB protocol has often correlated with a significant increase in broadcast traffic on a network.
| FactSnippet No. 1,664,434 |
SMB protocol1 has a compounding mechanism—known as AndX—to compound multiple actions, but Microsoft clients rarely use AndX.
| FactSnippet No. 1,664,436 |
The SMB1 protocol uses 16-bit data sizes, which amongst other things, limits the maximum block size to 64K.
| FactSnippet No. 1,664,437 |
SMB protocol2 uses 32- or 64-bit wide storage fields, and 128 bits in the case of file-handles, thereby removing previous constraints on block sizes, which improves performance with large file transfers over fast networks.
| FactSnippet No. 1,664,438 |
SMB protocol1 continues in use for connections with older versions of Windows, as well various vendors' NAS solutions.
| FactSnippet No. 1,664,439 |
Specifications for the SMB are proprietary and were initially closed, thereby forcing other vendors and projects to reverse-engineer the protocol to interoperate with it.
| FactSnippet No. 1,664,440 |
NSMB protocol is a family of in-kernel SMB protocol client and server implementations in BSD operating systems.
| FactSnippet No. 1,664,441 |
MacOS version of NSMB protocol is notable for its now-common scheme of representing symlinks.
| FactSnippet No. 1,664,442 |
MoSMB protocol is a proprietary SMB protocol implementation for Linux and other Unix-like systems, developed by Ryussi Technologies.
| FactSnippet No. 1,664,443 |
Real-time attack tracking shows that SMB protocol is one of the primary attack vectors for intrusion attempts, for example the 2014 Sony Pictures attack, and the WannaCry ransomware attack of 2017.
| FactSnippet No. 1,664,444 |