diff options
author | Andrew Bartlett <abartlet@samba.org> | 2010-08-06 19:01:34 +1000 |
---|---|---|
committer | Günther Deschner <gd@samba.org> | 2010-08-10 12:13:00 +0200 |
commit | 3c0a17a1274df1b38b3acd9335192cd78730b01c (patch) | |
tree | 1ea7e8fc50edd90ad92c6fcae8845770f081d373 | |
parent | f744e42bd08cd724da09b5b04bafb68de07888cc (diff) | |
download | samba-3c0a17a1274df1b38b3acd9335192cd78730b01c.tar.gz samba-3c0a17a1274df1b38b3acd9335192cd78730b01c.tar.bz2 samba-3c0a17a1274df1b38b3acd9335192cd78730b01c.zip |
s3:ntlmssp Don't use the lm key if the user didn't supply one.
This may help to avoid a number of possible MITM attacks where LM_KEY is
spoofed into the session. If the login wasn't with lanman
(and so the user chose to disclose their lanman response),
don't disclose back anything based on their lanman password.
Andrew Bartlett
Signed-off-by: Günther Deschner <gd@samba.org>
-rw-r--r-- | source3/libsmb/ntlmssp.c | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/source3/libsmb/ntlmssp.c b/source3/libsmb/ntlmssp.c index 2ad8d8783a..4398ecf4a3 100644 --- a/source3/libsmb/ntlmssp.c +++ b/source3/libsmb/ntlmssp.c @@ -635,9 +635,9 @@ static NTSTATUS ntlmssp_server_auth(struct ntlmssp_state *ntlmssp_state, if (session_key.data == NULL) { return NT_STATUS_NO_MEMORY; } - SMBsesskeygen_lm_sess_key( - lm_session_key.data, zeros, - session_key.data); + SMBsesskeygen_lm_sess_key(zeros, zeros, + session_key.data); + DEBUG(10,("ntlmssp_server_auth: Created NTLM session key.\n")); } dump_data_pw("LM session key:\n", session_key.data, session_key.length); |