Fwd: [PATCH 1/7] cifs: Bypass windows extended security for ntlmv2 negotiate
Stefan (metze) Metzmacher
metze at samba.org
Fri Aug 22 01:12:43 MDT 2014
Am 22.08.2014 um 06:17 schrieb Simo:
> On Fri, 2014-08-22 at 14:32 +1200, Andrew Bartlett wrote:
>> On Wed, 2014-08-20 at 23:51 -0500, Steve French wrote:
>>> This is an unusual sounding issue. Any comments on this from the auth experts?
>>> Seems better to investigate this more if we end up enforcing a "must
>>> be within 5 minutes" threshold instead of this patch. Have we done a
>>> dochelp on this before?
>> I am certainly nervous about this patch, as I've not ever seen this
>> before. The thing that makes me feel particularly odd about this is
>> that: In general, NTLMSSP clients don't have the server's time,
> This is simply false.
> Modern servers send the server timestamp in the TargetInfo Av_Pair
> structure in the challenge message [see MS-NLMP 184.108.40.206].
> In [MS-NLMP 220.127.116.11.2] it is explicitly mentioned that the client must
> use the provided (from the server) timestamp if present or current time
> if it is not.
I talks about the MsvAvTimestamp from CHALLENGE_MESSAGE.TargetInfo.Value
not the timestamp from smb negprot.
I think it would make sense to skip the timestamp if the client doesn't
find the server time in CHALLENGE_MESSAGE.TargetInfo.Value
and notices that the local time isn't correct. E.g. the date is
before the year 2000.
-------------- next part --------------
A non-text attachment was scrubbed...
Size: 181 bytes
Desc: OpenPGP digital signature
More information about the samba-technical