Hello Andrew,
    I received feedback from our Product team and they have some questions to 
help in clarification.

Your original question:

"In MS-ADTS 7.1.6.8.1.2, it states:

This flag indicates that the information stored in the attribute is a Unicode 
plaintext password. If this auth type is present, Kerberos can then use this 
password to derive additional key types needed to encrypt and decrypt cross 
realm TGTs:

    DES-CBC [RFC4120] section 8.1
    DES-CRC [RFC4120]
    RC4HMAC [RFC4757]

Other derivations of the plaintext password are possible using string to key 
functionality defined in [RFC3961].

However, it is not stated here or in MS-KILE how to translate between the 
'Unicode' strings used in windows trusts (for example, see the 
trustAuthIncoming, decrypted and decoded, between two of my domains) and the 
expected input encoding for AES and other non-MD4 keys.

Converting these from UTF16 to UTF8 (I'm assuming this is the intended 
translation) fails as the randomly created string cannot be translated into 
UTF8."

Questions from the Product team:

1.       Does the Unicode strings in the request only refer to the plaintext 
password as the section referred to indicated?
2.       What does the "translation" refer to? Does it mean how the password is 
used in the hash function?
3.       What section does the example refer to and how is it related?
4.       What makes AES and non-MD4 keys stand out on the expected input 
encoding in this request?


Thanks
John Dunning
Escalation Engineer Microsoft Corporation
US-CSS DSC PROTOCOL TEAM
Email: [EMAIL PROTECTED]<mailto:[EMAIL PROTECTED]>
Tele: (469)775-7008

We're 
hiring<http://members.microsoft.com/careers/search/details.aspx?JobID=A976CE32-B0B9-41E3-AF57-05A82B88383E&start=1&interval=10&SortCol=DatePosted>

_______________________________________________
cifs-protocol mailing list
[email protected]
https://lists.samba.org/mailman/listinfo/cifs-protocol

Reply via email to