Fwd: [PATCH 1/7] cifs: Bypass windows extended security for ntlmv2 negotiate
simo at samba.org
Fri Aug 22 06:30:08 MDT 2014
On Fri, 2014-08-22 at 09:12 +0200, Stefan (metze) Metzmacher wrote:
> Am 22.08.2014 um 06:17 schrieb Simo:
> > On Fri, 2014-08-22 at 14:32 +1200, Andrew Bartlett wrote:
> >> On Wed, 2014-08-20 at 23:51 -0500, Steve French wrote:
> >>> This is an unusual sounding issue. Any comments on this from the auth experts?
> >>> Seems better to investigate this more if we end up enforcing a "must
> >>> be within 5 minutes" threshold instead of this patch. Have we done a
> >>> dochelp on this before?
> >> I am certainly nervous about this patch, as I've not ever seen this
> >> before. The thing that makes me feel particularly odd about this is
> >> that: In general, NTLMSSP clients don't have the server's time,
> > This is simply false.
> > Modern servers send the server timestamp in the TargetInfo Av_Pair
> > structure in the challenge message [see MS-NLMP 184.108.40.206].
> > In [MS-NLMP 220.127.116.11.2] it is explicitly mentioned that the client must
> > use the provided (from the server) timestamp if present or current time
> > if it is not.
> I talks about the MsvAvTimestamp from CHALLENGE_MESSAGE.TargetInfo.Value
> not the timestamp from smb negprot.
Sure, the point is that the server *does* send a timestamp that the
client is supposed to use.
> I think it would make sense to skip the timestamp if the client doesn't
> find the server time in CHALLENGE_MESSAGE.TargetInfo.Value
> and notices that the local time isn't correct. E.g. the date is
> before the year 2000.
IT probably shouldn't use the timestamp at all if the challenge message
does not have it because it means the server doesn't know what to do
about it anyway.
However using the timestamp found in the smb packet is as good as
anything else, it won't hurt anything, unless the server has its time
completely off and relay the authentication to a DC while the client had
the clock right.
More information about the samba-technical