[cifs-protocol] 118120419417044 [MS-NNS]: Active Directory Web Services violating documented payload size limit

Sreekanth Nadendla srenaden at microsoft.com
Tue Dec 4 23:44:40 UTC 2018

Dochelp in Bcc

Hello Garming Sam, 
Thank you for your inquiry about Microsoft Open Specifications. We have created an incident # 118120419417044 for investigating this issue. One of the Open specifications team member will contact you shortly.

Sreekanth Nadendla
Microsoft Windows Open Specifications

-----Original Message-----
From: Garming Sam <garming at catalyst.net.nz> 
Sent: Tuesday, December 4, 2018 5:28 PM
To: Interoperability Documentation Help <dochelp at microsoft.com>
Cc: cifs-protocol at lists.samba.org
Subject: [MS-NNS]: Active Directory Web Services violating documented payload size limit


When observing traffic sent from the ADWS server, data messages returned via the NegotiateStream protocol has observable payload max sizes of
0x0000FC30 consistently (triggering this is possible by asking for a large search result which must be broken down into multiple data messages).


'[MS-NNS]: 2.2.2 Data Message' indicates that the maximum value for this field is 0x0000FC00 (64,512). However, ADWS clearly returns answers which are greater. Noticeably, when this payload is decrypted via GSSAPI, the payload size nearly always goes from 0xFC30 to 0xFC00 (indicating a 0x30 length header). Sometimes the decrypted data is slightly less, but the total payload size always caps at 0xFC30.

>From what I understand, the documentation does not seem to be correct.
The documented payload size seems to be a reference to the unencrypted payload length.

Can this behaviour in regards to encrypted payload lengths be clarified (and documented)?



More information about the cifs-protocol mailing list