[cifs-protocol] Status: raw NTLMSSP tokens in GSS-API/SPNEGO? SRX080803600053

2008-08-04 Thread Bill Wesse
Good morning Mr. Simpkins. Bill Wesse here from the Protocols Documentation team. I have taken ownership of the new case (SRX080803600053) I created for your question. I will begin my investigation this morning and update you on my progress before the end of the day. Regards, Bill Wesse MCSE /

[cifs-protocol] RE: Status: raw NTLMSSP tokens in GSS-API/SPNEGO? SRX080803600053

2008-08-04 Thread Bill Wesse
Good morning once again. You noted in your question that you can provide a network trace of the NTLM behavior you reported. I would deeply appreciate it if you would send one to me. Could you also note the OS versions of the client and server (just in case, even though the NtlmsspAuthenticaeMess

[cifs-protocol] Re: Status: raw NTLMSSP tokens in GSS-API/SPNEGO? SRX080803600053

2008-08-04 Thread Adam Simpkins
On Mon, Aug 04, 2008 at 04:17:29AM -0700, Bill Wesse wrote: > Good morning once again. You noted in your question that you can > provide a network trace of the NTLM behavior you reported. I would > deeply appreciate it if you would send one to me. Could you also > note the OS versions of the client

[cifs-protocol] Re: Status: raw NTLMSSP tokens in GSS-API/SPNEGO? SRX080803600053

2008-08-04 Thread Adam Simpkins
On Mon, Aug 04, 2008 at 01:48:37PM -0700, Adam Simpkins wrote: > On Mon, Aug 04, 2008 at 04:17:29AM -0700, Bill Wesse wrote: > > Good morning once again. You noted in your question that you can > > provide a network trace of the NTLM behavior you reported. I would > > deeply appreciate it if you wo

[cifs-protocol] RE: trustAuthIncoming format

2008-08-04 Thread Andrew Bartlett
On Thu, 2008-07-31 at 14:28 -0700, Richard Guthrie wrote: > I will be working with your issue. I need to review some material so that I > understand your request. I will get back to you shortly with an > update/questions. While I think this structure could do with better documentation, I don't

[cifs-protocol] salt used for various principal types

2008-08-04 Thread Andrew Bartlett
I can't find any reference in either MS-ADTS or MS-KILE regarding the salt used for for the different types of principals in the kerberos protocol. (A salt is used as a confounded in string2key operations in kerberos) I know there are different salt calculations for users and computers, and presu