From 29c0c37691da10bf061ba90a5b31482bda2fa486 Mon Sep 17 00:00:00 2001 From: Christian Ambach Date: Thu, 7 Apr 2011 14:05:04 +0200 Subject: s4/libcli: do not use netbios name in NTLMv2 blobs w/o spnego I have seen domain controllers rejecting NTLMv2 blobs presented to NetrLogonSamLogonEx with LOGON_FAILURE when the MsvAvNbComputerName was a FQDN or an IP address I have not seen this field in NTLMv2 blobs send by Windows clients when extended security was not available, so omitting the field makes Samba similar to Windows. This prevents errors with some smbtorture testcases that disable spnego and when a target name is specified that is not a valid netbios name. Signed-off-by: Andrew Bartlett Autobuild-User: Andrew Bartlett Autobuild-Date: Thu Apr 14 02:19:08 CEST 2011 on sn-devel-104 --- source4/libcli/smb_composite/sesssetup.c | 26 ++++++++++++++++++++++---- 1 file changed, 22 insertions(+), 4 deletions(-) (limited to 'source4') diff --git a/source4/libcli/smb_composite/sesssetup.c b/source4/libcli/smb_composite/sesssetup.c index e1159a4cd2..ebc35983d2 100644 --- a/source4/libcli/smb_composite/sesssetup.c +++ b/source4/libcli/smb_composite/sesssetup.c @@ -280,8 +280,17 @@ static NTSTATUS session_setup_nt1(struct composite_context *c, struct smbcli_request **req) { NTSTATUS nt_status = NT_STATUS_INTERNAL_ERROR; - struct sesssetup_state *state = talloc_get_type(c->private_data, struct sesssetup_state); - DATA_BLOB names_blob = NTLMv2_generate_names_blob(state, session->transport->socket->hostname, cli_credentials_get_domain(io->in.credentials)); + struct sesssetup_state *state = talloc_get_type(c->private_data, + struct sesssetup_state); + const char *domain = cli_credentials_get_domain(io->in.credentials); + + /* + * domain controllers tend to reject the NTLM v2 blob + * if the netbiosname is not valid (e.g. IP address or FQDN) + * so just leave it away (as Windows client do) + */ + DATA_BLOB names_blob = NTLMv2_generate_names_blob(state, NULL, domain); + DATA_BLOB session_key = data_blob(NULL, 0); int flags = CLI_CRED_NTLM_AUTH; @@ -353,9 +362,18 @@ static NTSTATUS session_setup_old(struct composite_context *c, struct smbcli_request **req) { NTSTATUS nt_status; - struct sesssetup_state *state = talloc_get_type(c->private_data, struct sesssetup_state); + struct sesssetup_state *state = talloc_get_type(c->private_data, + struct sesssetup_state); const char *password = cli_credentials_get_password(io->in.credentials); - DATA_BLOB names_blob = NTLMv2_generate_names_blob(state, session->transport->socket->hostname, cli_credentials_get_domain(io->in.credentials)); + const char *domain = cli_credentials_get_domain(io->in.credentials); + + /* + * domain controllers tend to reject the NTLM v2 blob + * if the netbiosname is not valid (e.g. IP address or FQDN) + * so just leave it away (as Windows client do) + */ + DATA_BLOB names_blob = NTLMv2_generate_names_blob(state, NULL, domain); + DATA_BLOB session_key; int flags = 0; if (session->options.lanman_auth) { -- cgit