[cifs-protocol] What happened to SamLogon validation level 4?

2008-08-27 Thread Andrew Bartlett
In MS-NRPC 2.2.1.4.17 NETLOGON_VALIDATION_INFO_CLASS it states: The NETLOGON_VALIDATION_INFO_CLASS enumeration selects the type of logon information block being used. typedef enum _NETLOGON_VALIDATION_INFO_CLASS { NetlogonValidationUasInfo = 1, NetlogonValidationSamInfo

RE: [Pfif] [cifs-protocol] Clarify AEAD behaviour for GSSAPI with AES

2008-08-27 Thread Andrew Bartlett
On Tue, 2008-08-26 at 08:50 -0700, Hongwei Sun wrote: > Andrew, > > In this case, you provided a diagram for us to add to the document and metze > added some comments. Thanks for your contribution to our documentation and > continued feedback. > > The product team reviewed the diagram and com

RE: [cifs-protocol] What happened to SamLogon validation level 4?

2008-08-27 Thread Sebastian Canevari
Hi Andrew, We'll review the documentation and let you know of our responses and/or questions. Thanks for your help. Regards, Sebastian Canevari From: [EMAIL PROTECTED] [EMAIL PROTECTED] On Behalf Of Andrew Bartlett [EMAIL PROTECTED] Sent: Wednesday, A

[cifs-protocol] RE: Request for fix to MS-PAC

2008-08-27 Thread Richard Guthrie
Resending as I have not heard back from Ronnie on this. Richard Guthrie Open Protocols Support Team Support Escalation Engineer, US-CSS DSC PROTOCOL TEAM Tel: +1 (469) 775-7794 E-mail: [EMAIL PROTECTED] We're hiring http://members.microsoft.com/careers/search/details.aspx?JobID=A976CE32-B0B9-41E3

[cifs-protocol] RE: How to validate the PAC in NETLOGON

2008-08-27 Thread Richard Guthrie
Andrew, Regarding your request for a tool/method to validate a users PAC, I am still researching this issue and will get back to you by Friday with an update. With respect to the documentation, we will be correcting MS-PAC section 2.8.1 in a future documentation release to read as follows: Se

[cifs-protocol] RE: How to validate the PAC in NETLOGON

2008-08-27 Thread Andrew Bartlett
On Wed, 2008-08-27 at 12:23 -0700, Richard Guthrie wrote: > Andrew, > To verify the KDC signature, the keyed hash MUST be generated over the > version of the server signature received in the > KERB_VERIFY_PAC_REQUEST structure [MS-APDS] (section 2.2.2.1) using > the algorithm specified in the Sign

[cifs-protocol] Re: Request for fix to MS-PAC

2008-08-27 Thread ronnie sahlberg
Hi, The data is encrypted so a network trace is useless unless I also provide a kerberos keytab file containing the secret key. I cant do that unfortunately. Instead I attach a decrypted packet from wireshark : The blob that starts with : Decrypted Krb5 (1094 bytes): is the decrypted data in t