[cifs-protocol] [Pfif] [REG: 116022513755175] Modifying msDS-SupportedEncryptionTypes attribute after domain join
srenaden at microsoft.com
Fri Feb 26 16:17:17 UTC 2016
Hello Andreas, I will be assisting you with your question. I will provide an update as soon as I complete my investigation and if I have any questions during my review in the mean time I may ask for clarification and/or share my findings with you.
Microsoft Windows Open Specifications
From: Kamil Sykora
Sent: Thursday, February 25, 2016 10:16 AM
To: Andreas Schneider
Cc: cifs-protocol at cifs.org; pfif at tridgell.net; MSSolve Case Email
Subject: RE: [REG: 116022513755175] Modifying msDS-SupportedEncryptionTypes attribute after domain join
[BCC: dochelp, CC: casemail]
Thank you for your question regarding the [MS-KILE] documentation. I have created incident 116022513755175 to track your issue. One of our engineers will contact you shortly to start working with you on this issue.
tel. (980) 776-7508
working hours 8:00 a.m.- 5:00 p.m. EST, Mon-Fri manager name: Nam Su Kang nkang at microsoft.com kamils at microsoft.com
From: Andreas Schneider [mailto:asn at samba.org]
Sent: Thursday, February 25, 2016 5:56 AM
To: Interoperability Documentation Help <dochelp at exchange.microsoft.com>
Cc: cifs-protocol at cifs.org; pfif at tridgell.net
Subject: Modifying msDS-SupportedEncryptionTypes attribute after domain join
Günther Deschner and I looked into updating the msDS-SupportedEncryptionTypes attribute after a domain join.
We would like to ask for some clarifications for:
--- snip ---
[MS-KILE] 184.108.40.206 msDS-SupportedEncryptionTypes attribute:
"If the realm is a KILE implementation that uses an Active Directory for the account database, the server SHOULD ensure that the msDS- SupportedEncryptionTypes attribute ([MS-ADA2] section 2.458) of its account object is set to the value of SupportedEncryptionTypes (section 220.127.116.11).
When an application server is running under the machine account and NRPC is supported on the machine, the server SHOULD call NetrLogonGetDomainInfo ([MS- NRPC] section 18.104.22.168.9) with the Level parameter set to 1 and WkstaBuffer.WorkstationInfo.KerberosSupportedEncryptionTypes set to zero.<72>If the WkstaBuffer.WorkstationInfo.KerberosSupportedEncryptionTypes
returned is not equal to SupportedEncryptionTypes (section 22.214.171.124), then LDAP is used to update the setting:<73>
2. Establish an LDAP connection with server information set to NULL
([MS-ADTS] section 7.1).
1. Perform an LDAP modify operation to set the
msDS-SupportedEncryptionTypes attribute ([MS-ADA2] section 2.458) of the
computer account object to the value of SupportedEncryptionTypes
--- snip-end ---
Do we interpret that correctly, that after the machine account has been added to Active directory, a netlogon connection is established using the machine account credentials from the machine account we just created.
NetrLogonGetDomainInfo() is called to retrieve the information if the supported encryption types need to be changed or not. If it needs to be
1. An LDAP connection with the credentials of the newly created machine
account is established
2. We perform an LDAP modify operation to set the
Is that correct?
Andreas Schneider GPG-ID: CC014E3D
Samba Team asn at samba.org
Pfif mailing list
Pfif at mail.tridgell.net
More information about the cifs-protocol