summaryrefslogtreecommitdiff
path: root/docs/docbook/smbdotconf/wins/dnsproxy.xml
diff options
context:
space:
mode:
authorAndrew Bartlett <abartlet@samba.org>2003-05-07 12:58:59 +0000
committerAndrew Bartlett <abartlet@samba.org>2003-05-07 12:58:59 +0000
commit2752f4a533a5546df794aa7c02f6765185ccc4cc (patch)
tree8d2c51561ad0ab7abd01c05e32189fd3a134f84d /docs/docbook/smbdotconf/wins/dnsproxy.xml
parent2b9fc2840fe3a516bc912d4852bbbbc7dd30ac75 (diff)
downloadsamba-2752f4a533a5546df794aa7c02f6765185ccc4cc.tar.gz
samba-2752f4a533a5546df794aa7c02f6765185ccc4cc.tar.bz2
samba-2752f4a533a5546df794aa7c02f6765185ccc4cc.zip
SMB Signing with NTLMv2 works!
(well, under certain conditions :-) There is no length limit on the size of the authentication response added into the MD5 hash. (We had previously limited this to lengths like 40, 44 or 64 in attempts to make sense of what the SNIA spec tells us). Instead, the entire authentication response is added in. Currently, this only works on a Win2k domain members with a Samba PDC, becouse our NTLMv2 code currently fails against an Win2k PDC. However, this splits the problem in half - particularly as the NTLMv2 format is known, and even has an ethereal disector! (thanks tpot). Andrew Bartlett (This used to be commit 7645d3d28afbb8eea502c0e063df3afb3aa812f4)
Diffstat (limited to 'docs/docbook/smbdotconf/wins/dnsproxy.xml')
0 files changed, 0 insertions, 0 deletions