Matthieu,

  Did you get a chance to do it ?     If you are not in the position to do 
this, I can archive the case and we can come back to it any time.

Thanks!

Hongwei


-----Original Message-----
From: Hongwei Sun 
Sent: Monday, November 21, 2011 1:02 PM
To: 'm...@samba.org'
Cc: p...@tridgell.net; cifs-proto...@samba.org; MSSolve Case Email
Subject: RE: [REG:111110168569640] RE: double send of command joined from a 
upstream windows Server

Matthieu,

   Could you capture TTT trace on the process "ntfrs.exe"  which is the FRS1 
service ?    We cannot see how it could happen just based on the trace.

Thanks!

Hongwei



-----Original Message-----
From: Matthieu Patou [mailto:m...@samba.org]
Sent: Friday, October 28, 2011 3:32 PM
To: Hongwei Sun
Cc: p...@tridgell.net; cifs-proto...@samba.org; MSSolve Case Email
Subject: Re: [REG:111092854890403] RE: double send of command joined from a 
upstream windows Server

Hello Hongwei,

I made a screencast on a windows machine explaining how to decrypt FRS traffic, 
I'm sure that following the instruction in this demo you'll succeed.

Here is the file:
http://athena.matws.net/mat/pres/frs.avi


Regards.

Matthieu.
On 21/10/2011 23:20, Hongwei Sun wrote:
> Matthieu,
>
>    Do you get a chance to capture the screen shot with the FRS1 packets 
> displayed ?    It will be ideal if I can decrypt myself, but I cannot get a 
> version of wireshark to allow me to do that.   So the screen shot at least 
> show me all the packet sequences so I have something to work with.    I may 
> need to work with the product team, so I need some information to show them.
>
> Thanks!
>
> Hongwei
>
> -----Original Message-----
> From: Matthieu Patou [mailto:m...@samba.org]
> Sent: Wednesday, October 19, 2011 6:04 PM
> To: Hongwei Sun
> Cc: p...@tridgell.net; cifs-proto...@samba.org; MSSolve Case Email
> Subject: Re: [REG:111092854890403] RE: double send of command joined 
> from a upstream windows Server
>
> Hi hongwei I'm planning to work on it tomorrow,
>
> the best though would be to catch me tomorrow so that I can show you in a 
> live demo.
>
> Matthieu
> On 20/10/2011 00:59, Hongwei Sun wrote:
>> Matthieu,
>>
>>     Do you have a chance to send the information I request below?  I have a 
>> trouble to see the sequence of the packets without decrypting it.   If you 
>> don't have time to work on it,  I can archive it and we can work on it 
>> whenever you get time.
>>
>> Thanks!
>>
>> Hongwei
>>
>>
>> -----Original Message-----
>> From: Hongwei Sun
>> Sent: Thursday, October 13, 2011 5:49 PM
>> To: 'm...@samba.org'; 'p...@tridgell.net'; 'cifs-proto...@samba.org'
>> Cc: MSSolve Case Email
>> Subject: RE: [REG:111092854890403] RE: double send of command joined 
>> from a upstream windows Server
>>
>> Matthieu,
>>
>>      Can you send me the screenshot  you mentioned in your e-mail ?   Even I 
>> cannot make the decryption work with the correct version, looking at the 
>> screen may help me know the scenario.
>>
>> Thanks!
>>
>> HOngwei
>>
>> -----Original Message-----
>> From: Hongwei Sun
>> Sent: Tuesday, October 11, 2011 5:27 PM
>> To: 'm...@samba.org'; p...@tridgell.net; cifs-proto...@samba.org
>> Cc: MSSolve Case Email
>> Subject: [REG:111092854890403] RE: double send of command joined from 
>> a upstream windows Server
>>
>> Matthieu,
>>
>>      I downloaded the wireshark 1.6.2 ,which is the latest version I can 
>> download.  But I still don't see the option for me to provide the file name 
>> for keytab file in krb5 screen.   What is the minimum version of  Wireshark 
>> for me to use with your keytab file for decryption ?    I am running Windows 
>> 64bit version of Wireshark.
>>
>> Thanks!
>>
>> Hongwei
>>
>> -----Original Message-----
>> From: Matthieu Patou [mailto:m...@samba.org]
>> Sent: Tuesday, September 27, 2011 10:45 PM
>> To: Hongwei Sun; p...@tridgell.net; cifs-proto...@samba.org; 
>> Interoperability Documentation Help
>> Subject: double send of command joined from a upstream windows Server
>>
>> Hello hongwei,
>>
>> Following our talk concerning the double send of "command_joined"
>> packets from a W2K3R2 server when talking to a samba server.
>>
>> Here is the wireshark capture and the keytab to decrypt it.
>>
>> By getting a recent version of wireshark is needed. You can get nightly 
>> build at http://www.wireshark.org/download/automated/win32/ newer than the 
>> revision 38976 (which is ~ 2 weeks old).
>>
>> The way to use it is:
>> wireshark -K w2k_2.keytab frs_big_file_samba.pcap.
>>
>> I attached the screenshot of this packets it's packets 319 and 321.
>>
>> Thanks for explaining what's going on, and maybe update the doc.
>>
>> Matthieu.
>>
>> --
>> Matthieu Patou
>> Samba Team
>> http://samba.org
>>
>
> --
> Matthieu Patou
> Samba Team
> http://samba.org
>
>


--
Matthieu Patou
Samba Team
http://samba.org



_______________________________________________
cifs-protocol mailing list
cifs-protocol@cifs.org
https://lists.samba.org/mailman/listinfo/cifs-protocol

Reply via email to