Hello Andrew,
   I will be looking into this for you. How did you arrive at this conclusion? 
Do you have a network trace that shows this behavior?

Thanks
John Dunning
Escalation Engineer Microsoft Corporation
US-CSS DSC PROTOCOL TEAM
Email: [EMAIL PROTECTED]
Tele: (469)775-7008

-----Original Message-----
From: Andrew Bartlett [mailto:[EMAIL PROTECTED]
Sent: Sunday, August 24, 2008 11:28 PM
To: Interoperability Documentation Help
Cc: [EMAIL PROTECTED]; [EMAIL PROTECTED]
Subject: LSA LookupSids 3

In MS-LSAT 3.1.4.9 it states that:

The RPC server MUST ensure that the RPC_C_AUTHN_NETLOGON security provider (as 
specified in [MS-RPCE] section 2.2.1.1.7) and at least 
RPC_C_AUTHN_LEVEL_INTEGRITY authentication level (as specified in [MS-RPCE] 
section 2.2.1.1.8) are used in this RPC message. Otherwise, the RPC server MUST 
return STATUS_ACCESS_DENIED.

However the behaviour against Windows 2008 is to give an RPC-level fault 
(access denied), and to prevent any further communication on the named pipe 
(futher requests get NT_STATUS_PIPE_DISCONNECTED at the trans2 level).

Please update the docs,

Thanks,

Andrew Bartlett
--
Andrew Bartlett
http://samba.org/~abartlet/
Authentication Developer, Samba Team           http://samba.org
Samba Developer, Red Hat Inc.
_______________________________________________
cifs-protocol mailing list
[email protected]
https://lists.samba.org/mailman/listinfo/cifs-protocol

Reply via email to