thanks for you reply that fast
today ,it's work good now when i update the code(git pull) ,but there is 
another trouble ,that is keyboard not work good

it's also 16bit(server is winxp)

./xfreerdp -u test -p test -a 24  192.168.1.56
connected to 192.168.1.56:3389
connected to 192.168.1.56:3389
connected to 192.168.1.56:3389
Failed to check xfreerdp file descriptor

 
 
------------------ Original ------------------
From:  "Marc-Andr  Moreau"<marcandre.mor...@gmail.com>;
Date:  Mon, Dec 5, 2011 01:30 AM
To:  "sense"<738281...@qq.com>; 
Cc:  "freerdp-devel"<freerdp-devel@lists.sourceforge.net>; "Max 
Nemo"<max2...@list.ru>; 
Subject:  Re: [Freerdp-devel] NTLM/CredSSP woes

 
Hi,

The problem the previous user had was that the hostname was not the last
parameter. If the hostname is not the last parameter, other parameters like
username and password won't be used properly. If this is not your case,
then you must be experiencing a different issue.

On Sat, Dec 3, 2011 at 10:09 PM, sense <738281...@qq.com> wrote:

> hello,all
> **
>  i get the same problem,how can i make it work good
>
> my xfreerdp version is (git log):
> commit a50ef84c21d6ae15f6b91f6203dc3b2c29dcd73e
> Author: Marc-Andr  Moreau <marcandre.mor...@gmail.com>
> Date:   Sat Dec 3 17:24:18 2011 -0500
>
>     wfreerdp: fix compilation and warnings
>
>
>  ./xfreerdp -u pater -p 654321qwe 192.168.1.103
> connected to 192.168.1.103:3389
> negotiateFlags "0x60088235"{
>     NTLMSSP_NEGOTIATE_KEY_EXCH (1),
>     NTLMSSP_NEGOTIATE_128 (2),
>     NTLMSSP_NEGOTIATE_EXTENDED_SESSION_SECURITY (12),
>     NTLMSSP_NEGOTIATE_ALWAYS_SIGN (16),
>     NTLMSSP_NEGOTIATE_NTLM (22),
>     NTLMSSP_NEGOTIATE_SEAL (26),
>     NTLMSSP_NEGOTIATE_SIGN (27),
>     NTLMSSP_REQUEST_TARGET (29),
>     NTLMSSP_NEGOTIATE_UNICODE (31),
> }
> NEGOTIATE_MESSAGE (length = 32)
> 0000 4e 54 4c 4d 53 53 50 00 01 00 00 00 35 82 08 60 NTLMSSP.....5..`
> 0010 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
>
> negotiateFlags "0x628A8235"{
>     NTLMSSP_NEGOTIATE_KEY_EXCH (1),
>     NTLMSSP_NEGOTIATE_128 (2),
>     NTLMSSP_NEGOTIATE_VERSION (6),
>     NTLMSSP_NEGOTIATE_TARGET_INFO (8),
>     NTLMSSP_NEGOTIATE_EXTENDED_SESSION_SECURITY (12),
>     NTLMSSP_TARGET_TYPE_SERVER (14),
>     NTLMSSP_NEGOTIATE_ALWAYS_SIGN (16),
>     NTLMSSP_NEGOTIATE_NTLM (22),
>     NTLMSSP_NEGOTIATE_SEAL (26),
>     NTLMSSP_NEGOTIATE_SIGN (27),
>     NTLMSSP_REQUEST_TARGET (29),
>     NTLMSSP_NEGOTIATE_UNICODE (31),
> }
> targetName (length = 8, offset = 56)
> 0000 53 00 4b 00 59 00 49 00                         S.K.Y.I.
>
> targetInfo (length = 64, offset = 64)
> 0000 02 00 08 00 53 00 4b 00 59 00 49 00 01 00 08 00 ....S.K.Y.I.....
> 0010 53 00 4b 00 59 00 49 00 04 00 08 00 73 00 6b 00 S.K.Y.I.....s.k.
> 0020 79 00 69 00 03 00 08 00 73 00 6b 00 79 00 69 00 y.i.....s.k.y.i.
> 0030 07 00 08 00 d2 24 85 b0 31 b2 cc 01 00 00 00 00 .....$..1.......
>
> CHALLENGE_MESSAGE (length = 128)
> 0000 4e 54 4c 4d 53 53 50 00 02 00 00 00 08 00 08 00 NTLMSSP.........
> 0010 38 00 00 00 35 82 8a 62 2f 50 8a ba 20 51 0d 94 8...5..b/P.. Q..
> 0020 00 00 00 00 00 00 00 00 40 00 40 00 40 00 00 00 ........@.@.@...
> 0030 06 01 b0 1d 00 00 00 0f 53 00 4b 00 59 00 49 00 ........S.K.Y.I.
> 0040 02 00 08 00 53 00 4b 00 59 00 49 00 01 00 08 00 ....S.K.Y.I.....
> 0050 53 00 4b 00 59 00 49 00 04 00 08 00 73 00 6b 00 S.K.Y.I.....s.k.
> 0060 79 00 69 00 03 00 08 00 73 00 6b 00 79 00 69 00 y.i.....s.k.y.i.
> 0070 07 00 08 00 d2 24 85 b0 31 b2 cc 01 00 00 00 00 .....$..1.......
>
> Password (length = 18)
> 0000 36 00 35 00 34 00 33 00 32 00 31 00 71 00 77 00 6.5.4.3.2.1.q.w.
> 0010 65 00                                           e.
>
> Username (length = 10)
> 0000 70 00 61 00 74 00 65 00 72 00                   p.a.t.e.r.
>
> Domain (length = 0)
>
> NTOWFv2, NTLMv2 Hash
> 0000 71 f7 bc 0a 7e f7 22 28 45 0c 6a 4d bf 4a 2d 4d q...~."(E.jM.J-M
>
> NTLMv2 Response Temp Blob
> 0000 01 01 00 00 00 00 00 00 80 5a 6d b0 31 b2 cc 01 .........Zm.1...
> 0010 44 85 82 62 ff aa 3d eb 00 00 00 00 02 00 08 00 D..b..=.........
> 0020 53 00 4b 00 59 00 49 00 01 00 08 00 53 00 4b 00 S.K.Y.I.....S.K.
> 0030 59 00 49 00 04 00 08 00 73 00 6b 00 79 00 69 00 Y.I.....s.k.y.i.
> 0040 03 00 08 00 73 00 6b 00 79 00 69 00 07 00 08 00 ....s.k.y.i.....
> 0050 d2 24 85 b0 31 b2 cc 01 00 00 00 00             .$..1.......
>
> ClientChallenge
> 0000 44 85 82 62 ff aa 3d eb                         D..b..=.
>
> ServerChallenge
> 0000 2f 50 8a ba 20 51 0d 94                         /P.. Q..
>
> SessionBaseKey
> 0000 36 9b 78 bc 47 70 e0 62 4a 1e c1 54 86 4c 47 27 6.x.Gp.bJ..T.LG'
>
> KeyExchangeKey
> 0000 36 9b 78 bc 47 70 e0 62 4a 1e c1 54 86 4c 47 27 6.x.Gp.bJ..T.LG'
>
> ExportedSessionKey
> 0000 44 ae 69 2e d1 6c db 89 42 5b 4b 32 cd 6f 9b f8 D.i..l..B[K2.o..
>
> RandomSessionKey
> 0000 44 ae 69 2e d1 6c db 89 42 5b 4b 32 cd 6f 9b f8 D.i..l..B[K2.o..
>
> ClientSignKey
> 0000 c2 fc 6f 65 61 31 56 6c 2b 00 47 4c 36 a8 f3 17 ..oea1Vl+.GL6...
>
> ClientSealingKey
> 0000 fb b6 6d b2 5e 18 e0 61 17 a5 60 cf 83 9a c1 6c ..m.^..a..`....l
>
> Timestamp
> 0000 80 5a 6d b0 31 b2 cc 01                         .Zm.1...
>
> negotiateFlags "0x60088235"{
>     NTLMSSP_NEGOTIATE_KEY_EXCH (1),
>     NTLMSSP_NEGOTIATE_128 (2),
>     NTLMSSP_NEGOTIATE_EXTENDED_SESSION_SECURITY (12),
>     NTLMSSP_NEGOTIATE_ALWAYS_SIGN (16),
>     NTLMSSP_NEGOTIATE_NTLM (22),
>     NTLMSSP_NEGOTIATE_SEAL (26),
>     NTLMSSP_NEGOTIATE_SIGN (27),
>     NTLMSSP_REQUEST_TARGET (29),
>     NTLMSSP_NEGOTIATE_UNICODE (31),
> }
> UserName (length = 10, offset = 64)
> 0000 70 00 61 00 74 00 65 00 72 00                   p.a.t.e.r.
>
> LmChallengeResponse (length = 24, offset = 74)
> 0000 91 21 90 a7 20 3b 4d 34 97 85 de 0f 7b 3b 51 58 .!.. ;M4....{;QX
> 0010 44 85 82 62 ff aa 3d eb                         D..b..=.
>
> NtChallengeResponse (length = 108, offset = 98)
> 0000 1c 2c a6 14 71 6a 80 47 60 53 80 82 91 0c 5d 7c .,..qj.G`S....]|
> 0010 01 01 00 00 00 00 00 00 80 5a 6d b0 31 b2 cc 01 .........Zm.1...
> 0020 44 85 82 62 ff aa 3d eb 00 00 00 00 02 00 08 00 D..b..=.........
> 0030 53 00 4b 00 59 00 49 00 01 00 08 00 53 00 4b 00 S.K.Y.I.....S.K.
> 0040 59 00 49 00 04 00 08 00 73 00 6b 00 79 00 69 00 Y.I.....s.k.y.i.
> 0050 03 00 08 00 73 00 6b 00 79 00 69 00 07 00 08 00 ....s.k.y.i.....
> 0060 d2 24 85 b0 31 b2 cc 01 00 00 00 00             .$..1.......
>
> EncryptedRandomSessionKey (length = 16, offset = 206)
> 0000 39 c7 48 46 cd 2f 03 75 ac 45 b7 c4 a0 fb c7 24 9.HF./.u.E.....$
>
> AUTHENTICATE_MESSAGE (length = 222)
> 0000 4e 54 4c 4d 53 53 50 00 03 00 00 00 18 00 18 00 NTLMSSP.........
> 0010 4a 00 00 00 6c 00 6c 00 62 00 00 00 00 00 00 00 J...l.l.b.......
> 0020 40 00 00 00 0a 00 0a 00 40 00 00 00 00 00 00 00 @.......@.......
> 0030 4a 00 00 00 10 00 10 00 ce 00 00 00 35 82 08 60 J...........5..`
> 0040 70 00 61 00 74 00 65 00 72 00 91 21 90 a7 20 3b p.a.t.e.r..!.. ;
> 0050 4d 34 97 85 de 0f 7b 3b 51 58 44 85 82 62 ff aa M4....{;QXD..b..
> 0060 3d eb 1c 2c a6 14 71 6a 80 47 60 53 80 82 91 0c =..,..qj.G`S....
> 0070 5d 7c 01 01 00 00 00 00 00 00 80 5a 6d b0 31 b2 ]|.........Zm.1.
> 0080 cc 01 44 85 82 62 ff aa 3d eb 00 00 00 00 02 00 ..D..b..=.......
> 0090 08 00 53 00 4b 00 59 00 49 00 01 00 08 00 53 00 ..S.K.Y.I.....S.
> 00a0 4b 00 59 00 49 00 04 00 08 00 73 00 6b 00 79 00 K.Y.I.....s.k.y.
> 00b0 69 00 03 00 08 00 73 00 6b 00 79 00 69 00 07 00 i.....s.k.y.i...
> 00c0 08 00 d2 24 85 b0 31 b2 cc 01 00 00 00 00 39 c7 ...$..1.......9.
> 00d0 48 46 cd 2f 03 75 ac 45 b7 c4 a0 fb c7 24       HF./.u.E.....$
>
> Public Key (length = 270)
> 0000 30 82 01 0a 02 82 01 01 00 c1 9b 92 0c 62 07 29 0............b.)
> 0010 53 8f 3c ed e6 94 bb cd a3 b1 90 11 29 0a 72 50 S.<.........).rP
> 0020 99 15 5d 19 16 f7 0c 09 1e a2 89 11 24 3a f8 cb ..].........$:..
> 0030 7f 3c ce 5b 42 56 6b 95 e1 92 5e a9 a1 fd 70 ac .<.[BVk...^...p.
> 0040 e1 c5 32 83 61 a5 11 35 be 9c d3 7c 9e b5 16 a4 ..2.a..5...|....
> 0050 e1 89 db 44 3b 1a c1 da 32 1c ad 27 db 54 4e 03 ...D;...2..'.TN.
> 0060 d7 e2 c8 8f de 4e de c0 c9 d4 1e 2f 0c 48 c5 2f .....N...../.H./
> 0070 2c 84 ee 3b c6 f9 42 cf b9 fe d3 1d bb 5c 90 bb ,..;..B......\..
> 0080 00 98 e3 ef e9 a3 28 69 f9 6a 32 64 29 db 87 ca ......(i.j2d)...
> 0090 ff 40 9d c8 55 96 b2 2b 9b 59 dd e7 2e b4 07 15 .@..U..+.Y......
> 00a0 97 d1 4e 2c de 54 ef 42 dd 1a ba eb 1b ac 97 19 ..N,.T.B........
> 00b0 13 e0 b2 64 9d a0 52 71 99 0e 6c 84 1c b8 49 ed ...d..Rq..l...I.
> 00c0 75 5f af b6 a4 6c 57 70 15 f5 e5 14 80 f1 40 5e u_...lWp......@^
> 00d0 4b 47 95 9b 74 e2 31 c3 62 a7 ab 2e 94 14 fe c3 KG..t.1.b.......
> 00e0 80 ed db c4 e0 09 80 d1 bb 84 cf 96 c0 d4 f9 e7 ................
> 00f0 ec 2c eb 9b d7 bf 88 15 c3 6c 5f ac f8 d6 45 65 .,.......l_...Ee
> 0100 47 00 9c aa 4c 67 3a f0 fd 02 03 01 00 01       G...Lg:.......
>
> Encrypted Public Key (length = 270)
> 0000 5f 1a 1b 20 17 d1 0d 02 ee 35 25 38 f5 a5 c5 89 _.. .....5%8....
> 0010 80 be b3 e3 3b cb fd 20 ad cc 7b c0 09 37 89 4b ....;.. ..{..7.K
> 0020 68 43 c9 c6 67 b2 b5 3b 75 f8 b1 a7 73 66 63 d3 hC..g..;u...sfc.
> 0030 d5 e2 f4 a0 61 7e 14 e9 7e 54 5b 84 c6 27 81 99 ....a~..~T[..'..
> 0040 3f 5d 96 4a 32 31 53 2b 3d 6b b5 5a 2c 2a 62 98 ?].J21S+=k.Z,*b.
> 0050 62 75 33 65 0c 2b b2 fb 29 d7 cc 32 3a e9 62 1e bu3e.+..)..2:.b.
> 0060 74 2a f0 f0 2e 18 0a a5 24 78 f9 ac eb b9 1a 55 t*......$x.....U
> 0070 2a 6c d7 49 7d 78 53 e4 fd 25 7a ff 22 7b 24 98 *l.I}xS..%z."{$.
> 0080 87 54 e7 eb eb f7 6d 10 1b 8b 48 c8 c5 6d 9b f4 .T....m...H..m..
> 0090 aa 86 2d bc c9 ee c8 f2 67 9f b8 1d bf 2e f6 c4 ..-.....g.......
> 00a0 12 95 f7 ce 5b 1c 81 99 e0 fa 6c 28 e6 3d 2d 72 ....[.....l(.=-r
> 00b0 da 67 ef 6a a6 83 fc b4 f7 c4 21 61 6c cc 0e 82 .g.j......!al...
> 00c0 06 2b 55 63 d3 7d 0a 42 b8 73 ba 9c 7e 7d ed 27 .+Uc.}.B.s..~}.'
> 00d0 68 65 d1 24 1b d5 01 26 3a 0f b9 f1 79 80 b4 01 he.$...&:...y...
> 00e0 40 fe 71 26 85 68 4a 16 61 7b 8a ef ff ca 83 4f @.q&.hJ.a{.....O
> 00f0 43 c1 78 e4 92 a4 3c 80 3e 74 be 13 91 d2 7e 01 C.x...<.>t....~.
> 0100 84 c2 68 4b fa 75 2a c6 38 00 70 97 e6 6d       ..hK.u*.8.p..m
>
> Signature
> 0000 01 00 00 00 7b d4 da 38 58 f1 fd 39 00 00 00 00 ....{..8X..9....
>
> SSL_read: Failure in SSL library (protocol error?)
> Authentication failure, check credentials.
> If credentials are valid, the NTLMSSP implementation may be to blame.
>
> ------------------ Original ------------------
> *From: * "Marc-Andr Moreau"<marcandre.mor...@gmail.com>;
> *Date: * Mon, Nov 21, 2011 05:26 AM
> *To: * "Max Nemo"<max2...@list.ru>; **
> *Cc: * "freerdp-devel"<freerdp-devel@lists.sourceforge.net>; **
> *Subject: * Re: [Freerdp-devel] NTLM/CredSSP woes
>
> If the lengths were correct, did you pass the username, domain name and
> password as arguments to xfreerdp? NTLMv2 will for sure fail if those are
> absent
>
> On Sun, Nov 20, 2011 at 4:23 PM, Max Nemo <max2...@list.ru> wrote:
>
> > Hello Marc-Andr ,
> >
> > I tried both domain and non-domain accounts - the result is absolutely
> the
> > same:
> >
> > Domain account: VDCSP\SmartLogon, password Qal1029384756
> > Non-Domain account: WIN2008R2X64\Test, password Qal1029384756
> >
> > Both of these accounts can log in successfully if RDP Security is used.
> >
> > What you saw as account and domain name lengths (zeroes) is what exactly
> > was dumped by FreeRDP.
> >
> > > > Username (length = 0)
> > > >
> > > > Domain (length = 0)
> >
> > It seems that my setup is not special by any means - the test domain is
> > comprised of Server 2008 SP2 (DC) + Server 2008R2 SP1 - both of them can
> > act as TS.
> >
> > The servers in a production domain I tried to connect to (obviously,
> using
> > difference domain and account information) reported the same error.
> >
> > Best regards,
> > Maxim
> >
>
> ------------------------------------------------------------------------------
> All the data continuously generated in your IT infrastructure
> contains a definitive record of customers, application performance,
> security threats, fraudulent activity, and more. Splunk takes this
> data and makes sense of it. IT sense. And common sense.
> http://p.sf.net/sfu/splunk-novd2d
> _______________________________________________
> Freerdp-devel mailing list
> Freerdp-devel@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/freerdp-devel
> **
>
------------------------------------------------------------------------------
All the data continuously generated in your IT infrastructure 
contains a definitive record of customers, application performance, 
security threats, fraudulent activity, and more. Splunk takes this 
data and makes sense of it. IT sense. And common sense.
http://p.sf.net/sfu/splunk-novd2d
_______________________________________________
Freerdp-devel mailing list
Freerdp-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/freerdp-devel
------------------------------------------------------------------------------
All the data continuously generated in your IT infrastructure 
contains a definitive record of customers, application performance, 
security threats, fraudulent activity, and more. Splunk takes this 
data and makes sense of it. IT sense. And common sense.
http://p.sf.net/sfu/splunk-novd2d
_______________________________________________
Freerdp-devel mailing list
Freerdp-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/freerdp-devel

Reply via email to