diff options
author | Andrew Bartlett <abartlet@samba.org> | 2003-05-07 12:58:59 +0000 |
---|---|---|
committer | Andrew Bartlett <abartlet@samba.org> | 2003-05-07 12:58:59 +0000 |
commit | 2752f4a533a5546df794aa7c02f6765185ccc4cc (patch) | |
tree | 8d2c51561ad0ab7abd01c05e32189fd3a134f84d /docs/docbook/smbdotconf | |
parent | 2b9fc2840fe3a516bc912d4852bbbbc7dd30ac75 (diff) | |
download | samba-2752f4a533a5546df794aa7c02f6765185ccc4cc.tar.gz samba-2752f4a533a5546df794aa7c02f6765185ccc4cc.tar.bz2 samba-2752f4a533a5546df794aa7c02f6765185ccc4cc.zip |
SMB Signing with NTLMv2 works!
(well, under certain conditions :-)
There is no length limit on the size of the authentication response added
into the MD5 hash. (We had previously limited this to lengths like 40, 44 or
64 in attempts to make sense of what the SNIA spec tells us).
Instead, the entire authentication response is added in.
Currently, this only works on a Win2k domain members with a Samba PDC,
becouse our NTLMv2 code currently fails against an Win2k PDC.
However, this splits the problem in half - particularly as the NTLMv2 format
is known, and even has an ethereal disector! (thanks tpot).
Andrew Bartlett
(This used to be commit 7645d3d28afbb8eea502c0e063df3afb3aa812f4)
Diffstat (limited to 'docs/docbook/smbdotconf')
0 files changed, 0 insertions, 0 deletions