We are not able to find API ServerAuthenticate3 in our API set. We think you 
were referring to the process described in section 1.5.2 of the [MS-SNTP] 
document, is that correct?

Richard Guthrie
Open Protocols Support Team
Support Escalation Engineer, US-CSS DSC PROTOCOL TEAM 7100 N Hwy 161, Irving, 
TX - 75039 "Las Colinas - LC2"
Tel: +1 469 775 7794
E-mail: [EMAIL PROTECTED]
We're hiring

-----Original Message-----
From: Andrew Bartlett [mailto:[EMAIL PROTECTED]
Sent: Friday, May 30, 2008 8:38 PM
To: Richard Guthrie
Cc: [EMAIL PROTECTED]
Subject: RE: How are disabled accounts handled in SNTP

On Fri, 2008-05-30 at 15:33 -0700, Richard Guthrie wrote:
> Andrew,
>
> I will be working with you on request.  I wanted to summarize your questions 
> so I can accurately respond to them.  I see # issues/clarifications in this 
> email.
>
> 1. What is the correct response from a server responding to SNTP request when 
> the request contains a RID that is disabled?
> 2. What if the account does not have rights to the server it is making an NTP 
> request to?

In particular, what is the behaviour when an account is expired etc.

> 3. When responding to an SNTP request from a client

with a disabled account

> , should the service respond with an MD5 checksum that includes a checksum 
> with the password?
> 4. What object classes are eligible to make a NTP request using this protocol?
> 5. Do windows clients only use the RID returned from the ServerAuthenticate3 
> NETLOGON call?
>
> Have I captured your request correctly.  Please acknowledge and I will start 
> to work on these issues.

With that amendment, this is a start.  A discussion of the risks of offline 
password guessing should be included in the security section, mitigated by the 
answers to my other question.  If you don't understand why this protocol is 
subject to offline password guessing attacks, then perhaps that needs to be 
clarified first.

> Richard Guthrie
> Open Protocols Support Team
> Support Escalation Engineer, US-CSS DSC PROTOCOL TEAM 7100 N Hwy 161, Irving, 
> TX - 75039 "Las Colinas - LC2"
> Tel: +1 469 775 7794
> E-mail: [EMAIL PROTECTED]
>
> -----Original Message-----
> From: Andrew Bartlett [mailto:[EMAIL PROTECTED]
> Sent: Tuesday, May 27, 2008 1:18 AM
> To: Interoperability Documentation Help
> Cc: [EMAIL PROTECTED]
> Subject: How are disabled accounts handled in SNTP
>
> In MS-SNTP, the RID is used as a key ID.  No indication is given as to what 
> should happen if the account indicated by this RID is disabled, expired or 
> otherwise not permitted to log in.
>
> Should this account password be confirmed by returning an MD5 checksum 
> including this password?  This should be dealt with in the security section, 
> as well as the protocol implementation description.
>
> Also, are all accounts eligible as NTP clients, or only certain objectClasses 
> (such as 'computer')?  (Because of the use of raw keys, and the possibility 
> of an offline attack, this should be restricted as much as possible).
>
> Finally, do windows clients only use the RID returned from the
> ServerAuthenticate3 NETLOGON call?  Could a more secure implementation be 
> derived such that the ID returned by this call is not the RID?  (This would 
> allow offline attacks on the password only after the NetLogon exchange).
>

Thanks,

Andrew Bartlett

--
Andrew Bartlett
http://samba.org/~abartlet/
Authentication Developer, Samba Team           http://samba.org
Samba Developer, Red Hat Inc.
_______________________________________________
cifs-protocol mailing list
[email protected]
https://lists.samba.org/mailman/listinfo/cifs-protocol

Reply via email to