Hi Steve:
I'll help you with this issue.
I understand that Neil is communicating with you and he has partially answered 
your question. 

Regards,
Obaid Farooqi
Escalation Engineer | Microsoft

Exceeding your expectations is my highest priority.  If you would like to 
provide feedback on your case you may contact my manager at 
allis...@microsoft.com


-----Original Message-----
From: Steve French [mailto:smfre...@gmail.com]
Sent: Friday, August 05, 2011 11:17 AM
To: Interoperability Documentation Help
Cc: cifs-proto...@samba.org; p...@tridgell.net
Subject: Re: [Pfif] explaination of format desired = 0x0 in drs_crackname 
operation

I have not been able to determine from MS-CIFS and MS-SMB how the client can 
determine whether the server supports "raw ntlmssp"
(ntlmssp, not encoded in spnego).

MS-CIFS section 3.2.4.2 does indicate some of the processing during 
authentication, and does indicate differences between ntlm and ntlmv2, but does 
not indicate when "raw ntlmssp" can be used.  Similarly section 3.2.4.2 of 
MS-SMB mentions authentication, and note 86 mentions spnego, but does not 
indicate how the client determines whether it can or should send the 
ntlm/ntlmv2 hash encapsulated in "raw ntlmssp" - especially for the case when 
extended security is not requested.

--
Thanks,

Steve

Microsoft is committed to protecting your privacy.  Please read the Microsoft 
Privacy Statement for more information.The above is an email for a support case 
from Microsoft Corp.REPLY ALL TO THIS MESSAGE or INCLUDE casem...@microsoft.com 
IN YOUR REPLY if you want your response added to the case automatically. For 
technical assistance, please include the Support Engineer on the TO: line. 
Thank you.
_______________________________________________
cifs-protocol mailing list
cifs-protocol@cifs.org
https://lists.samba.org/mailman/listinfo/cifs-protocol

Reply via email to