[jcifs] NTLM session security

Mohan Radhakrishnan mohanr at fss.co.in
Mon Oct 10 21:43:26 MDT 2011


     I might have understand this wrongly. Does this mean all data
passing through the socket using JCIFS is signed and verified at the
other end ?


-----Original Message-----
From: jcifs-bounces at lists.samba.org
[mailto:jcifs-bounces at lists.samba.org] On Behalf Of Michael B Allen
Sent: Friday, October 07, 2011 10:21 AM
To: Suhas Sutar
Cc: jcifs at lists.samba.org
Subject: Re: [jcifs] NTLM session security

On Wed, Oct 5, 2011 at 10:48 AM, Suhas Sutar <suhassutar at gmail.com>
> Hello
> I wanted to confirm if JCIFS supports NTLM v2 session security
feature. None of
> the documentation specifically mentions it.

Hi Suhas,

No. JCIFS implements message signatures which are derived from the
session key negotiated during NTLM auth so there is some apparatus to
compute a key internally. But you cannot use JCIFS to sign and seal
streams of data. That would require crypto that is not required by
CIFS and so it's been left out.


Michael B Allen
Java Active Directory Integration

==========================================================================================================================================================The information contained in this e-mail message may be privileged and/or confidential and protected from disclosure under applicable law. It is intended only for the individual to whom or entity to which it is addressed as shown at the beginning of the message. If the reader of this message is not the intended recipient, or if the employee or agent responsible for delivering the message is not an employee or agent of the intended recipient, you are hereby notified that any review, dissemination,distribution, use, or copying of this message is strictly prohibited. If you have received this message in error, please notify us immediately by return e-mail and permanently delete this message and your reply to the extent it includes this message. Any views or opinions presented in this message or attachments are those of the author and do not necessarily represent those of the Company. All e-mails and attachments sent and received are subject to monitoring, reading, and archival by the Company.==========================================================================================================================================================

More information about the jCIFS mailing list