I don't think that to be the solution, as a lot of NAS and other embedded devices (routers, printers, POS, toasters...) uses SMB1.
As far as I know, samba is not susceptible to the MS-Win SMB1 weakness, as thus the virus can't get into those devices and, as its CPU is arm and not x86, the virus code can't be executed. I.e., arm-based samba devices can't be the entry point or source of the virus infection.
But of course, if a PC is already infected and connected to the network with NAS mapped drives, files in the NAS can be virus encrypted.
I'm not sure what MS patches do, if they correct the SMB1 weakness of just disable SMB1. I guess that they fix the weakness, as that is what makes sense and avoids services disruption on large installations that rely on SMB1.
Quote: The security update addresses the vulnerabilities
by correcting how SMBv1 handles specially crafted requests.
I have one old Vista PC, no tweaking at all, and I let Windows Update apply all MS-supplied patches on it and it still accepts SMB1.
jcard@silver:~> smbclient --max-protocol=NT1 //mono/Public
OS=[Windows Vista (TM) Business 6002 Service Pack 2] Server=[Windows Vista (TM) Business 6.0]
smb: \>
Notice that MS even extraordinarily distributed a patch for Vista and XP, which are not supported anymore:
Quote: Patches are now available for the 16-year-old Windows XP, Windows XP Embedded (which is still used in things like ATMs and point-of-sale systems), and Windows Server 2003.
It's an extraordinary move by Microsoft, but one that was clearly justified.
PatchesSo I think that as long as all MS-Win patches are applied, there is no need to disable SMB1.
That said, if you are in RC5, you can't have SMB2, only SMB1 (NT1). You have to upgrade to the RC6 snapshot and enable SMB2.