summaryrefslogtreecommitdiff
path: root/source3/libsmb
diff options
context:
space:
mode:
authorAndrew Bartlett <abartlet@samba.org>2010-08-06 19:01:34 +1000
committerGünther Deschner <gd@samba.org>2010-08-10 12:13:00 +0200
commit3c0a17a1274df1b38b3acd9335192cd78730b01c (patch)
tree1ea7e8fc50edd90ad92c6fcae8845770f081d373 /source3/libsmb
parentf744e42bd08cd724da09b5b04bafb68de07888cc (diff)
downloadsamba-3c0a17a1274df1b38b3acd9335192cd78730b01c.tar.gz
samba-3c0a17a1274df1b38b3acd9335192cd78730b01c.tar.bz2
samba-3c0a17a1274df1b38b3acd9335192cd78730b01c.zip
s3:ntlmssp Don't use the lm key if the user didn't supply one.
This may help to avoid a number of possible MITM attacks where LM_KEY is spoofed into the session. If the login wasn't with lanman (and so the user chose to disclose their lanman response), don't disclose back anything based on their lanman password. Andrew Bartlett Signed-off-by: Günther Deschner <gd@samba.org>
Diffstat (limited to 'source3/libsmb')
-rw-r--r--source3/libsmb/ntlmssp.c6
1 files changed, 3 insertions, 3 deletions
diff --git a/source3/libsmb/ntlmssp.c b/source3/libsmb/ntlmssp.c
index 2ad8d8783a..4398ecf4a3 100644
--- a/source3/libsmb/ntlmssp.c
+++ b/source3/libsmb/ntlmssp.c
@@ -635,9 +635,9 @@ static NTSTATUS ntlmssp_server_auth(struct ntlmssp_state *ntlmssp_state,
if (session_key.data == NULL) {
return NT_STATUS_NO_MEMORY;
}
- SMBsesskeygen_lm_sess_key(
- lm_session_key.data, zeros,
- session_key.data);
+ SMBsesskeygen_lm_sess_key(zeros, zeros,
+ session_key.data);
+ DEBUG(10,("ntlmssp_server_auth: Created NTLM session key.\n"));
}
dump_data_pw("LM session key:\n", session_key.data,
session_key.length);