[cifs-protocol] [REG:111080564702668] [Pfif] explaination of format desired = 0x0 in drs_crackname operation
obaidf at microsoft.com
Wed Aug 10 10:36:32 MDT 2011
I'll help you with this issue.
I understand that Neil is communicating with you and he has partially answered your question.
Escalation Engineer | Microsoft
Exceeding your expectations is my highest priority. If you would like to provide feedback on your case you may contact my manager at allisong at microsoft.com
From: Steve French [mailto:smfrench at gmail.com]
Sent: Friday, August 05, 2011 11:17 AM
To: Interoperability Documentation Help
Cc: cifs-protocol at samba.org; pfif at tridgell.net
Subject: Re: [Pfif] explaination of format desired = 0x0 in drs_crackname operation
I have not been able to determine from MS-CIFS and MS-SMB how the client can determine whether the server supports "raw ntlmssp"
(ntlmssp, not encoded in spnego).
MS-CIFS section 184.108.40.206 does indicate some of the processing during authentication, and does indicate differences between ntlm and ntlmv2, but does not indicate when "raw ntlmssp" can be used. Similarly section 220.127.116.11 of MS-SMB mentions authentication, and note 86 mentions spnego, but does not indicate how the client determines whether it can or should send the ntlm/ntlmv2 hash encapsulated in "raw ntlmssp" - especially for the case when extended security is not requested.
Microsoft is committed to protecting your privacy. Please read the Microsoft Privacy Statement for more information.The above is an email for a support case from Microsoft Corp.REPLY ALL TO THIS MESSAGE or INCLUDE casemail at microsoft.com IN YOUR REPLY if you want your response added to the case automatically. For technical assistance, please include the Support Engineer on the TO: line. Thank you.
More information about the cifs-protocol