Hi Jeff,

We have updated [MS-NRPC] for the next release to address this issue. We have 
added the following Behavior Note to section 3.5.4.4.10:

<197> Section 3.5.4.4.10: Windows RPC layer may return its own error code 
instead of STATUS_INVALID_LEVEL. The error code that a client gets depends on where 
the calling application is getting the error from:
1. If the client is running on Windows and calling Windows RPC APIs, they may 
get the Win32 error code RPC_S_INVALID_TAG ([MS-ERREF] section 2.2).
2. If the client is running on third-party operating systems or getting the 
error code from the wire, they may get nca_s_fault_invalid_tag (0x1C000006). 
([C706-RSCP] DCE 1.1: Remote Procedure Call - Reject Status Codes and 
Parameters).
3. The conversion between the on-the-wire nca_s_fault_invalid_tag and Win32 
error code RPC_S_INVALID_TAG is specified in [MS-RPCE] Section 3.1.1.5.5.

I hope that helps.

Yes, thanks!

In addition I think 3.1.4.1 Session-Key Negotiation could be much more verbose 
in a way that it would
describe how safe downgrade is possible and how an unsafe downgrade is detected.

metze

_______________________________________________
cifs-protocol mailing list
cifs-protocol@lists.samba.org
https://lists.samba.org/mailman/listinfo/cifs-protocol

Reply via email to