RE: [cifs-protocol] RE: 600169 - RE: DCE/RPC PFC_SUPPORT_HEADER_SIGN not optional

2008-10-07 Thread Richard Guthrie
Stefan,

Thanks for working with us in the lab on this to find the root cause.  The root 
cause was determined to be a bug in the Samba test code related to header 
signing when SpNegotiate was used.  Please let us know if there are any further 
questions regarding this issue.

Richard Guthrie
Open Protocols Support Team
Support Escalation Engineer, US-CSS DSC PROTOCOL TEAM
Tel: +1 (469) 775-7794
E-mail: [EMAIL PROTECTED]
We're hiring 
http://members.microsoft.com/careers/search/details.aspx?JobID=A976CE32-B0B9-41E3-AF57-05A82B88383Estart=1interval=10SortCol=DatePosted


-Original Message-
From: Stefan (metze) Metzmacher [mailto:[EMAIL PROTECTED]
Sent: Tuesday, September 09, 2008 4:22 AM
To: Richard Guthrie
Cc: Andrew Bartlett; [EMAIL PROTECTED]; [EMAIL PROTECTED]
Subject: Re: [cifs-protocol] RE: 600169 - RE: DCE/RPC PFC_SUPPORT_HEADER_SIGN 
not optional

Richard Guthrie schrieb:
 Stefan,

 The traces you sent seems to show a correct security context negotiation but 
 something is failing when we go to use that context which is why we see 
 RPC_NT_SEC_PKG_ERROR.  I would like to start with getting some more detailed 
 error info from the windows machine by doing the following:

 Enabling Extended Error Information.  You can do this by following the steps 
 in this msdn article 
 http://msdn.microsoft.com/en-us/library/aa373803(VS.85).aspx  and taking a 
 network capture again.  This is going to add some additional information in 
 the response that will lead us to a more precise error message.  If you can 
 send me that trace with the associated keytab file, I can get further into 
 what the problem is.

See the attached capture...

The error is this (windows 2003 generates the same, but with status = 
WERROR_ACCESS_DENIED (0x0005))

decode_ExtendedErrorInfo: struct decode_ExtendedErrorInfo
 in: struct decode_ExtendedErrorInfo
  ptr: struct ExtendedErrorInfoPtr
   info: *
info: struct ExtendedErrorInfo
 next: NULL
 computer_name: struct ExtendedErrorComputerName
  present: EXTENDED_ERROR_COMPUTER_NAME_PRESENT (1)
   n: union ExtendedErrorComputerNameU(case 1)
 name: struct ExtendedErrorUString
  __size: 0x0009 (9)
  string: *
   string: 'w2k8-211'
 pid  : 0x023c (572)
 time : Tue Sep  9 11:43:22 2008 CEST
 generating_component : 0x0003 (3)
 status   : DOS code 0x0721
 detection_location   : 0x0082 (130)
 flags: 0x (0)
 num_params   : 0x0003 (3)
 params: ARRAY(3)
  params: struct ExtendedErrorParam
   type   : EXTENDED_ERROR_PARAM_TYPE_UINT32 (3)
   p  : union ExtendedErrorParamU(case 3)
uint32: 0x8009030f (2148074255)
  params: struct ExtendedErrorParam
   type   : EXTENDED_ERROR_PARAM_TYPE_UINT32 (3)
   p  : union ExtendedErrorParamU(case 3)
uint32: 0x0009 (9)
  params: struct ExtendedErrorParam
   type   : EXTENDED_ERROR_PARAM_TYPE_UINT32 (3)
   p  : union ExtendedErrorParamU(case 3)
uint32: 0x0005 (5)

metze
___
cifs-protocol mailing list
cifs-protocol@cifs.org
https://lists.samba.org/mailman/listinfo/cifs-protocol


RE: [cifs-protocol] RE: 600169 - RE: DCE/RPC PFC_SUPPORT_HEADER_SIGN not optional

2008-08-13 Thread Richard Guthrie
Andrew,

As per your last mail, we agree this looks like a good scenario to target for 
the upcoming IO lab.  As we have discussed, in order to not waste time on 
debugging setup while you are in the lab, we would need to work together prior 
to establish the correct repro environment.  Establishment of this repro would 
require your expertise to ensure the environment accurately reproduces this 
issue.

Let us know if this sounds like an acceptable action plan and we can work out 
the details on our next call together.

Richard Guthrie
Open Protocols Support Team
Support Escalation Engineer, US-CSS DSC PROTOCOL TEAM 7100 N Hwy 161, Irving, 
TX - 75039 Las Colinas - LC2
Tel: +1 469 775 7794
E-mail: [EMAIL PROTECTED]
We're hiring 
http://members.microsoft.com/careers/search/details.aspx?JobID=A976CE32-B0B9-41E3-AF57-05A82B88383Estart=1interval=10SortCol=DatePosted


-Original Message-
From: Andrew Bartlett [mailto:[EMAIL PROTECTED]
Sent: Tuesday, August 12, 2008 8:48 PM
To: Richard Guthrie
Cc: [EMAIL PROTECTED]; [EMAIL PROTECTED]
Subject: Re: [cifs-protocol] RE: 600169 - RE: DCE/RPC PFC_SUPPORT_HEADER_SIGN 
not optional

On Mon, 2008-08-11 at 08:41 -0700, Richard Guthrie wrote:
 Andrew,

 Can you send a capture that exhibits the behavior you describe with
 NTLMv2 as well as clarify your comments about behavior you have seen
 in the past?  Basically I need as much information as you can provide
 on the behavior you have experienced to help understand the problem.
 This would help to isolate the behavior you are seeing and complete
 additional analysis as required.

I will do, when I get a chance.  We should also work to get Samba4 set up in 
the interop lab, so you can just run tests against it and see the behaviour 
live.

Andrew Bartlett

--
Andrew Bartlett
http://samba.org/~abartlet/
Authentication Developer, Samba Team   http://samba.org
Samba Developer, Red Hat Inc.
___
cifs-protocol mailing list
cifs-protocol@cifs.org
https://lists.samba.org/mailman/listinfo/cifs-protocol


Re: [cifs-protocol] RE: 600169 - RE: DCE/RPC PFC_SUPPORT_HEADER_SIGN not optional

2008-08-12 Thread Andrew Bartlett
On Mon, 2008-08-11 at 08:41 -0700, Richard Guthrie wrote:
 Andrew,

 Can you send a capture that exhibits the behavior you describe with
 NTLMv2 as well as clarify your comments about behavior you have seen
 in the past?  Basically I need as much information as you can provide
 on the behavior you have experienced to help understand the problem.
 This would help to isolate the behavior you are seeing and complete
 additional analysis as required.

I will do, when I get a chance.  We should also work to get Samba4 set
up in the interop lab, so you can just run tests against it and see the
behaviour live.

Andrew Bartlett

-- 
Andrew Bartlett
http://samba.org/~abartlet/
Authentication Developer, Samba Team   http://samba.org
Samba Developer, Red Hat Inc.


signature.asc
Description: This is a digitally signed message part
___
cifs-protocol mailing list
cifs-protocol@cifs.org
https://lists.samba.org/mailman/listinfo/cifs-protocol


[cifs-protocol] RE: 600169 - RE: DCE/RPC PFC_SUPPORT_HEADER_SIGN not optional

2008-08-11 Thread Richard Guthrie
Andrew,

The trace you sent previously lines up with expected behavior the documentation 
defines (This was also verified with a review of the code also).  You can see 
starting with packet 530 that the client tells the server that it does support 
signing but the server responds in packet 534 that it does not.  From there in 
frames 535-538 show the client and server not using header signing for the 
remainder of the conversation which is in line with the documentation.  We do 
see the client and server encrypting the body of the request as per the 
authentication level being set to Privacy.

Can you send a capture that exhibits the behavior you describe with NTLMv2 as 
well as clarify your comments about behavior you have seen in the past?  
Basically I need as much information as you can provide on the behavior you 
have experienced to help understand the problem.  This would help to isolate 
the behavior you are seeing and complete additional analysis as required.

Richard Guthrie
Open Protocols Support Team
Support Escalation Engineer, US-CSS DSC PROTOCOL TEAM 7100 N Hwy 161, Irving, 
TX - 75039 Las Colinas - LC2
Tel: +1 469 775 7794
E-mail: [EMAIL PROTECTED]
We're hiring 
http://members.microsoft.com/careers/search/details.aspx?JobID=A976CE32-B0B9-41E3-AF57-05A82B88383Estart=1interval=10SortCol=DatePosted

-Original Message-
From: Andrew Bartlett [mailto:[EMAIL PROTECTED]
Sent: Wednesday, July 30, 2008 5:26 PM
To: Richard Guthrie
Cc: [EMAIL PROTECTED]; [EMAIL PROTECTED]
Subject: RE: 600169 - RE: DCE/RPC PFC_SUPPORT_HEADER_SIGN not optional

On Wed, 2008-07-30 at 08:45 -0700, Richard Guthrie wrote:
 Andrew,
 We have completed our review of your request to update the
 documentation and would like to point out the following text from
 MS-RPCE section 3.3.1.5.2.2.

 Using this mechanism, the client and server agree if header signing
 should be done for this connection. Once agreed, the client and server
 apply protection to request and response PDUs in the same way.

 Based on this verbiage as well as the trace you sent previously
 (Packet 537) the documentation is correct that this is flag is used to
 negotiate whether header signing or integrity checking will be used in
 conjunction with the set authentication level.  The client will set
 this bit to 1 on the initial BIND and the server will then set it to 1
 or 0 to negotiate whether header signing will be utilized on all
 subsequent request/response in the conversation according to the
 guidelines for authentication level in section 3.3.1.5.2.2.  Please
 let us know if you have any further questions on this issue.

No, this does not resolve the request.  I agree that this is what reading the 
docs would tell you, but please consider this more deeply, and make enquires 
with the actual code (not the spec...) - please read Metze's and my additional 
observations and inquire into the code.

We know that AEAD (Authenticated Encryption with Additional Data, aka header 
signing) which is what this feature is meant to negotiate is still used, 
because we have had to implement it for NTLM2, without setting either of these 
flags.

Andrew Bartlett

--
Andrew Bartlett
http://samba.org/~abartlet/
Authentication Developer, Samba Team   http://samba.org
Samba Developer, Red Hat Inc.
___
cifs-protocol mailing list
cifs-protocol@cifs.org
https://lists.samba.org/mailman/listinfo/cifs-protocol