Security Blob: 605506062B0601050502A04B3049A00E300C060A2B060104...
GSS-API Generic Security Service Application Program Interface
OID: 1.3.6.1.5.5.2 (SPNEGO - Simple Protected Negotiation)
SPNEGO
negTokenInit
mechTypes: 1 item
Item: 1.3.6.1.4.1.311.2.2.10 (NTLMSSP -
Microsoft NTLM Security Support Provider)
mechToken:
4E544C4D535350000100000097B208E2060006002F000000...
NTLMSSP
NTLMSSP identifier: NTLMSSP
NTLM Message Type: NTLMSSP_NEGOTIATE
(0x00000001)
Flags: 0xe208b297
Calling workstation domain: NLW2K8
Calling workstation name: PHANTOM
In CIFS, Windows clients typically send raw NTLMSSP messages in non AD
environment while domain clients send NTLMSSP w/ SPNEGO. I don't really
know whether my observation apply here when NTLM is used as a SASL mech.
Natalie
Max (Weijun) Wang wrote:
How are these 2 forms used (by MS and others)? I've never seen an NTLM token
embedded inside the SPNEGO initial context token.
Thanks
Max
On Feb 4, 2010, at 1:14 AM, Nicolas Williams wrote:
On Wed, Feb 03, 2010 at 08:54:03AM -0800, Natalie Li wrote:
Nicolas Williams wrote:
On Wed, Feb 03, 2010 at 08:34:13AM -0800, Natalie Li wrote:
Max (Weijun) Wang wrote:
Hi Nico
Is there a separate OID for NTLM as a GSS-API mech?
Yes, OID for NTLM is "1.3.6.1.4.1.331.2.2.10"
And the encoded OID octet string is:
102 #define GSS_MECH_NTLMSSP_OID
"\053\006\001\004\001\202\067\002\002\012"
But it doesn't go on the wire in the initial context token, right?
No, if you're interested in implementing raw NTLMSSP (i.e. without the
SPENGO wrapper).
Yes, if the NTLM mech token is embedded in the SPNEGO initial context token.
What a wrinkle! :) Thanks for the info.