Thank you Jeff. Could you also provide the list of the object identifiers (OIDs) accepted as "algorithm" element?
-- Julien Rische On Wed, Jan 22, 2025 at 7:41 PM Jeff McCashland (He/him) <je...@microsoft.com> wrote: > > Hi Julien, > > We have created SR 2501220040012025 to track this new question. I will file a > document update request to add the definition of KERB-ALGORITHM-IDENTIFIER. > > It will look something like this: > > KERB-ALGORITHM-IDENTIFIER::= SEQUENCE { > algorithm OBJECT IDENTIFIER, > parameters NOCOPYANY OPTIONAL > } > > Let us know if you find anything else. > > Best regards, > Jeff McCashland (He/him) | Senior Escalation Engineer | Microsoft Corporation > > Phone: +1 (425) 703-8300 x38300 | Hours: 9am-5pm | Time zone: (UTC-08:00) > Pacific Time (US and Canada) > > Local country phone number found here: > http://support.microsoft.com/globalenglish | Extension 1138300 > > > > ________________________________ > From: Julien Rische <jris...@redhat.com> > Sent: Wednesday, January 22, 2025 3:01 AM > To: Jeff McCashland (He/him) <je...@microsoft.com> > Cc: Alexander Bokovoy <a...@samba.org>; cifs-protocol@lists.samba.org > <cifs-protocol@lists.samba.org>; Microsoft Support <supportm...@microsoft.com> > Subject: Re: [EXTERNAL] Re: Server 2025 PKINIT regression: ECDH works for > SHA2 w/p paChecksum2 - TrackingID#2501140040014216 > > Hi Jeff, > > Thank you for confirming this. > > Just a last question on this topic: You mentioned section 2.2.3 from > MS-PKCA[1] where PAChecksum2 is defined. However, this definition > references the KERB-ALGORITHM-IDENTIFIER type which is not defined > anywhere in Open Specifications. Is this type actually referring to > AlgorithmIdentifier from X.509-88 (or RFC5280[2])? > > AlgorithmIdentifier ::= SEQUENCE { > algorithm OBJECT IDENTIFIER, > parameters ANY DEFINED BY algorithm OPTIONAL > } > > If so, could you list the OIDs currently accepted by Windows Server > 2025 for the "algorithm" element? Are they the OIDs from RFC5754[3]? > > -- > Julien Rische > > [1] > https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Flearn.microsoft.com%2Fen-us%2Fopenspecs%2Fwindows_protocols%2Fms-pkca%2F8270b791-0201-4231-9d89-e5074459be2f&data=05%7C02%7Cjeffm%40microsoft.com%7C81dab240e051473988be08dd3ad438b9%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638731405417808125%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=6ilICf%2BH8gXcsgiC9qjOCpCt9xDH3NG%2F%2FzD4iWLzn5g%3D&reserved=0 > [2] > https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fhtml%2Frfc5280%23section-4.1.1.2&data=05%7C02%7Cjeffm%40microsoft.com%7C81dab240e051473988be08dd3ad438b9%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638731405417821813%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=OvBXWFVhg5Kzc6nsjqT%2BBIxYeza0fUfbv5YfYpAlW78%3D&reserved=0 > [3] > https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fhtml%2Frfc5754%23section-2&data=05%7C02%7Cjeffm%40microsoft.com%7C81dab240e051473988be08dd3ad438b9%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638731405417830071%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=%2BPrQDPuqLOE%2BSMWFwzR3%2F1w7zOpzSizZUl%2Fb3e3Qui4%3D&reserved=0 > > On Tue, Jan 21, 2025 at 8:25 PM Jeff McCashland (He/him) > <je...@microsoft.com> wrote: > > > > Hi Julien, > > > > I was able to confirm in our source code that ECDH is a singular exception. > > If you're using ECDH, Windows will not check for paChecksum2, only > > paChecksum. As for what will be required in the future, I wouldn't be able > > to say. > > > > I will file a request to update the documentation and follow up. Let us > > know if you have any other questions. > > > > Best regards, > > Jeff McCashland (He/him) | Senior Escalation Engineer | Microsoft > > Corporation > > > > Phone: +1 (425) 703-8300 x38300 | Hours: 9am-5pm | Time zone: (UTC-08:00) > > Pacific Time (US and Canada) > > > > Local country phone number found here: > > https://nam06.safelinks.protection.outlook.com/?url=http%3A%2F%2Fsupport.microsoft.com%2Fglobalenglish&data=05%7C02%7Cjeffm%40microsoft.com%7C81dab240e051473988be08dd3ad438b9%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638731405417845033%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=Jxh7OPWldGRSkRdW9CEvjTrx%2FIqRwrGoOIIqXsnUnxE%3D&reserved=0 > > | Extension 1138300 > > > > > > > > ________________________________ > > From: Julien Rische <jris...@redhat.com> > > Sent: Friday, January 17, 2025 3:27 AM > > To: Jeff McCashland (He/him) <je...@microsoft.com> > > Cc: Alexander Bokovoy <a...@samba.org>; cifs-protocol@lists.samba.org > > <cifs-protocol@lists.samba.org>; Microsoft Support > > <supportm...@microsoft.com> > > Subject: [EXTERNAL] Re: Server 2025 PKINIT regression: ECDH works for SHA2 > > w/p paChecksum2 - TrackingID#2501140040014216 > > > > Hi Jeff, > > > > I just re-uploaded these files from #2412190040009154, as they already > > demonstrate this behavior: > > > > [02_lsass_pkinit_ecdh_p256.zip] Compressed LSASS trace of a successful > > pre-authentication process for ECDH with curve P-256 and RSA/SHA-256 > > signature. > > [02_pkinit_ecdh_p256.pcap] Network trace of a successful > > pre-authentication process for ECDH with curve P-256 and RSA/SHA-256 > > signature. > > [02_ad2025.keytab] All Kerberos keys in the AD domain. > > > > -- > > Julien Rische > > On Thu, Jan 16, 2025 at 8:43 PM Jeff McCashland (He/him) > > <je...@microsoft.com> wrote: > > > > > > Hi Julien, > > > > > > Please collect an LSASS TTT trace as before showing the ECDH succeeding > > > and upload it to this new link (below). Let me know if you need the tools > > > or collection instructions again. > > > > > > Upload link: > > > https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsupport.microsoft.com%2Ffiles%3Fworkspace%3DeyJhbGciOiJSUzI1NiIsImtpZCI6IjgxMTA4NjE5MTQzMTQ1NTc0QUYxMjI3NjhGMEIzNDkyRkYyNTczNEYiLCJ0eXAiOiJKV1QifQ.eyJ3c2lkIjoiMGY0NjFjYmQtMDllYi00ZDRlLWIyYTgtZmU1YzhjMGEzNDExIiwic3IiOiIyNTAxMTQwMDQwMDE0MjE2Iiwic3YiOiJ2MSIsInJzIjoiRXh0ZXJuYWwiLCJ3dGlkIjoiMjk4MGY4N2ItMTc3NC00MDRkLTk4NGQtMzRhZjQ3Y2I0NWNjIiwiYXBwaWQiOiI0ZTc2ODkxZC04NDUwLTRlNWUtYmUzOC1lYTNiZDZlZjIxZTUiLCJuYmYiOjE3MzcwNTY1MzgsImV4cCI6MTc0NDgzMjUzOCwiaWF0IjoxNzM3MDU2NTM4LCJpc3MiOiJodHRwczovL2FwaS5kdG1uZWJ1bGEubWljcm9zb2Z0LmNvbSIsImF1ZCI6Imh0dHA6Ly9zbWMifQ.erfTbhyGZ3w3mCMMOeOLnziYzAbaQZgodpaGpq56E1GKFb3MDlFpOs9nFTVDeSGtGAIGT-DyCvCDs9uudYHxqjE5zT1pCiVo9LGpPm9J7y0Thdm41F78tFnqtupKNRjHx7xfid8e4Vflwfw-hXuOVk_E91GbN15YTck4lDnV0W1u8jMTqdEuJ0VeDvotz4gz9yvDQHXkgHnlBZuRKXK8xhjc9YRO4-uKgvYCoO-n-yHXvyULc0Ngd-7pMX1dubWGheqRHTCSwFe-qEDB4Gy5VuVNQ5nnvxew0joDz_ZMRphMOXgubnUqaqWnU535Al-TSnBQZJLmmnMZgz8dm_EBSw%26wid%3D0f461cbd-09eb-4d4e-b2a8-fe5c8c0a3411&data=05%7C02%7Cjeffm%40microsoft.com%7C81dab240e051473988be08dd3ad438b9%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638731405417853250%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=dIfxvxOGvP%2FW7QQ7l3Fc%2FRGaBne6syAzvaVL2valL6s%3D&reserved=0 > > > > > > Best regards, > > > Jeff McCashland (He/him) | Senior Escalation Engineer | Microsoft > > > Corporation > > > > > > Phone: +1 (425) 703-8300 x38300 | Hours: 9am-5pm | Time zone: (UTC-08:00) > > > Pacific Time (US and Canada) > > > > > > Local country phone number found here: > > > https://nam06.safelinks.protection.outlook.com/?url=http%3A%2F%2Fsupport.microsoft.com%2Fglobalenglish&data=05%7C02%7Cjeffm%40microsoft.com%7C81dab240e051473988be08dd3ad438b9%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638731405417861715%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=h2uTrIArE6OVBClY5vAY9F5mo7V3JBoJGU4u8UJI0QU%3D&reserved=0 > > > | Extension 1138300 > > > > > > > > > > > > > > > ________________________________ > > > From: Jeff McCashland (He/him) <je...@microsoft.com> > > > Sent: Tuesday, January 14, 2025 3:06 PM > > > To: Julien Rische <jris...@redhat.com> > > > Cc: Alexander Bokovoy <a...@samba.org>; cifs-protocol@lists.samba.org > > > <cifs-protocol@lists.samba.org>; Microsoft Support > > > <supportm...@microsoft.com> > > > Subject: Server 2025 PKINIT regression: ECDH works for SHA2 w/p > > > paChecksum2 - TrackingID#2501140040014216 > > > > > > Hi Julien, > > > > > > Thank you for reminding me of that outstanding question. We have created > > > SR 2501140040014216 to track the question of why ECDH with SHA2 works > > > without paChecksum2. I will dig into this and let you know what I find. > > > > > > Best regards, > > > Jeff McCashland (He/him) | Senior Escalation Engineer | Microsoft > > > Corporation > > > > > > Phone: +1 (425) 703-8300 x38300 | Hours: 9am-5pm | Time zone: (UTC-08:00) > > > Pacific Time (US and Canada) > > > > > > Local country phone number found here: > > > https://nam06.safelinks.protection.outlook.com/?url=http%3A%2F%2Fsupport.microsoft.com%2Fglobalenglish&data=05%7C02%7Cjeffm%40microsoft.com%7C81dab240e051473988be08dd3ad438b9%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638731405417869689%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=OdsVxuHW27L95Nv2S55Kb4lOr7r9d32fZIhEl6WkT6M%3D&reserved=0 > > > | Extension 1138300 > > > > > > > > > > > > ________________________________ > > > From: Julien Rische <jris...@redhat.com> > > > Sent: Tuesday, January 14, 2025 2:26 AM > > > To: Jeff McCashland (He/him) <je...@microsoft.com> > > > Cc: Alexander Bokovoy <a...@samba.org>; cifs-protocol@lists.samba.org > > > <cifs-protocol@lists.samba.org>; Microsoft Support > > > <supportm...@microsoft.com> > > > Subject: Re: [cifs-protocol] [EXTERNAL] Windows Server 2025 PKINIT > > > regression - TrackingID#2412190040009154 > > > > > > Hello Jeff, > > > > > > Thank you for your answers. > > > > > > As demonstrated in one of the traces, it seems that AD accepts PKINIT > > > AS-REQ without paChecksum2 when SHA-256 is used with ECDH (contrary to > > > FFDH). Is this behavior here to stay, or will paChecksum2 be required > > > for ECDH+RSA/SHA-2 too in Windows Server 2025 eventually? > > > > > > -- > > > Julien Rische > > > > > > On Mon, Jan 13, 2025 at 8:39 PM Jeff McCashland (He/him) > > > <je...@microsoft.com> wrote: > > > > > > > > Hi Alexander, > > > > > > > > Excellent observation. The paChecksum2 value follows the freshness > > > > token. > > > > > > > > typedef struct PKAuthenticator { > > > > union { > > > > ASN1uint16_t bit_mask; > > > > ASN1octet_t o[1]; > > > > }; > > > > ASN1uint32_t cusec; > > > > KERB_TIME client_time; > > > > ASN1uint32_t nonce; > > > > # define paChecksum_present 0x80 > > > > ASN1octetstring_t paChecksum; > > > > # define freshnessToken_present 0x40 > > > > ASN1octetstring_t freshnessToken; > > > > # define paChecksum2_present 0x20 > > > > PAChecksum2 paChecksum2; > > > > } PKAuthenticator; > > > > > > > > I will follow up and request any needed documentation updates. > > > > > > > > Best regards, > > > > Jeff McCashland (He/him) | Senior Escalation Engineer | Microsoft > > > > Corporation > > > > > > > > Phone: +1 (425) 703-8300 x38300 | Hours: 9am-5pm | Time zone: > > > > (UTC-08:00) Pacific Time (US and Canada) > > > > > > > > Local country phone number found here: > > > > https://nam06.safelinks.protection.outlook.com/?url=http%3A%2F%2Fsupport.microsoft.com%2Fglobalenglish&data=05%7C02%7Cjeffm%40microsoft.com%7C81dab240e051473988be08dd3ad438b9%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638731405417877549%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=zkGnWWsU%2BimK7NcEMeIPgmzEG6Nv%2Bs2SCMuIm9J0Aok%3D&reserved=0 > > > > | Extension 1138300 > > > > > > > > > > > > > > > > ________________________________ > > > > From: Alexander Bokovoy <a...@samba.org> > > > > Sent: Monday, January 13, 2025 11:33 AM > > > > To: Jeff McCashland (He/him) <je...@microsoft.com> > > > > Cc: Julien Rische <jris...@redhat.com>; cifs-protocol@lists.samba.org > > > > <cifs-protocol@lists.samba.org>; Microsoft Support > > > > <supportm...@microsoft.com> > > > > Subject: Re: [cifs-protocol] [EXTERNAL] Windows Server 2025 PKINIT > > > > regression - TrackingID#2412190040009154 > > > > > > > > Hi Jeff, > > > > > > > > On Пан, 13 сту 2025, Jeff McCashland (He/him) wrote: > > > > > Hi Julien and Alexander, > > > > > > > > > > What I found in the trace is that the server is finding a paChecksum, > > > > > but no paChecksum2, which is required when using anything other than > > > > > SHA-1: > > > > > > > > > > [MS-PKCA] 2.2.3 PA-PK-AS-REQ > > > > > The PA-PK-AS-REQ message format is specified in [RFC4556] section > > > > > 3.2.1.<10> PKAuthenticator in [RFC4556] is extended to add the > > > > > following PAChecksum2<11>. If a checksum algorithm other than SHA-1 is > > > > > used, this message MUST be present. If this field is present, it will > > > > > always be validated even if it is SHA-1. > > > > > PAChecksum2 ::= SEQUENCE { > > > > > checksum [0] OCTET STRING, > > > > > algorithmIdentifier [1] KERB-ALGORITHM-IDENTIFIER > > > > > } > > > > > <11> Section 2.2.3: The extension of PKAuthenticator in PA-PK-AS-REQ > > > > > is only applicable to Windows Server 2022, 23H2 operating system. > > > > > Windows Server 2022, 23H2 DCs will send back > > > > > TD-CMS-DIGEST-ALGORITHMS-DATA as described in [RFC8636] section 4. CMS > > > > > Digest Algorithm Agility. > > > > > > > > > > I believe the solution is to add a paChecksum2 to the PA-PK-AS-REQ. > > > > > Let me know if you have any questions. > > > > > > > > Thank you for pointing this out. > > > > > > > > There is one problem, though. RFC 8070 extends PKAuthenticator as well, > > > > by adding freshnessToken right after paChecksum: > > > > https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fhtml%2Frfc8070%23section-4&data=05%7C02%7Cjeffm%40microsoft.com%7C81dab240e051473988be08dd3ad438b9%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638731405417885432%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=aOE6%2FInPJTDuRT7awYrvWKrJI%2BO0q3Kdf04aetOAjvg%3D&reserved=0 > > > > > > > > PKAuthenticator ::= SEQUENCE { > > > > cusec [0] INTEGER (0..999999), > > > > ctime [1] KerberosTime, > > > > -- cusec and ctime are used as in [RFC4120], for > > > > -- replay prevention. > > > > nonce [2] INTEGER (0..4294967295), > > > > -- Chosen randomly; this nonce does not need to > > > > -- match with the nonce in the KDC-REQ-BODY. > > > > paChecksum [3] OCTET STRING OPTIONAL, > > > > -- MUST be present. > > > > -- Contains the SHA1 checksum, performed over > > > > -- KDC-REQ-BODY. > > > > ..., > > > > freshnessToken [4] OCTET STRING OPTIONAL, > > > > -- PA_AS_FRESHNESS padata value as received from the > > > > -- KDC. MUST be present if sent by KDC > > > > ... > > > > } > > > > > > > > Can you please expand on whether paChecksum2 is added after or before > > > > the freshnessToken? e.g. does paChecksum2 has index [5] or [4]? > > > > > > > > If it is indeed paChecksum2 [5], then a reference to RFC 8070 is missing > > > > in the MS-PKCA 2.2.3. > > > > > > > > I think MS-PKCA would need an update about this detail as MS-PKCA 3.1.5 > > > > explicitly states: > > > > > > > > PKCA SHOULD<14> support the PKINIT Freshness Extension [RFC8070]. > > > > > > > > so MS-PKCA 2.2.3 would need to refer to RFC8070, not just to RFC4556. > > > > > > > > > > > > > > > > > > > > > > > Best regards, > > > > > Jeff McCashland (He/him) | Senior Escalation Engineer | Microsoft > > > > > Corporation > > > > > > > > > > Phone: +1 (425) 703-8300 x38300 | Hours: 9am-5pm | Time zone: > > > > > (UTC-08:00) Pacific Time (US and Canada) > > > > > > > > > > Local country phone number found here: > > > > > https://nam06.safelinks.protection.outlook.com/?url=http%3A%2F%2Fsupport.microsoft.com%2Fglobalenglish&data=05%7C02%7Cjeffm%40microsoft.com%7C81dab240e051473988be08dd3ad438b9%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638731405417893356%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=uXWwn4gk6QNK1qEhGYc%2F6DHjBf9Gqs0M1RxyLiKDg5w%3D&reserved=0 > > > > > | Extension 1138300 > > > > > > > > > > > > > > > > > > > > ________________________________ > > > > > From: Jeff McCashland (He/him) <je...@microsoft.com> > > > > > Sent: Tuesday, January 7, 2025 1:16 PM > > > > > To: Julien Rische <jris...@redhat.com> > > > > > Cc: Alexander Bokovoy <a...@samba.org>; cifs-protocol@lists.samba.org > > > > > <cifs-protocol@lists.samba.org>; Microsoft Support > > > > > <supportm...@microsoft.com> > > > > > Subject: Re: [cifs-protocol] [EXTERNAL] Windows Server 2025 PKINIT > > > > > regression - TrackingID#2412190040009154 > > > > > > > > > > Thank you for the rapid response and for uploading the additional > > > > > traces. I will dig into these and let you know what I find. > > > > > > > > > > > > > > > Best regards, > > > > > Jeff McCashland (He/him) | Senior Escalation Engineer | Microsoft > > > > > Corporation > > > > > > > > > > Phone: +1 (425) 703-8300 x38300 | Hours: 9am-5pm | Time zone: > > > > > (UTC-08:00) Pacific Time (US and Canada) > > > > > > > > > > Local country phone number found here: > > > > > https://nam06.safelinks.protection.outlook.com/?url=http%3A%2F%2Fsupport.microsoft.com%2Fglobalenglish&data=05%7C02%7Cjeffm%40microsoft.com%7C81dab240e051473988be08dd3ad438b9%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638731405417901120%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=YAdpfq9DAxBANXgMx4ly5DIXYh3hplZ804EmS%2B%2Bbsxo%3D&reserved=0 > > > > > | Extension 1138300 > > > > > > > > > > > > > > > > > > > > ________________________________ > > > > > From: Julien Rische <jris...@redhat.com> > > > > > Sent: Tuesday, January 7, 2025 11:33 AM > > > > > To: Jeff McCashland (He/him) <je...@microsoft.com> > > > > > Cc: Alexander Bokovoy <a...@samba.org>; cifs-protocol@lists.samba.org > > > > > <cifs-protocol@lists.samba.org>; Microsoft Support > > > > > <supportm...@microsoft.com> > > > > > Subject: Re: [cifs-protocol] [EXTERNAL] Windows Server 2025 PKINIT > > > > > regression - TrackingID#2412190040009154 > > > > > > > > > > Hello Jeff, > > > > > > > > > > I uploaded 5 additional files, including the LSASS traces obtained > > > > > following the procedure described in your previous message: > > > > > > > > > > [02_lsass_pkinit_ffdh_modp14.zip] Compressed LSASS trace of a failing > > > > > pre-authentication process for FFDH with MODP group 14 (2046-bit) and > > > > > RSA/SHA-256 signature. > > > > > [02_pkinit_ffdh_modp14.pcap] Network trace of a failing > > > > > pre-authentication process for FFDH with MODP group 14 (2046-bit) and > > > > > RSA/SHA-256 signature. > > > > > [02_lsass_pkinit_ecdh_p256.zip] Compressed LSASS trace of a successful > > > > > pre-authentication process for ECDH with curve P-256 and RSA/SHA-256 > > > > > signature. > > > > > [02_pkinit_ecdh_p256.pcap] Network trace of a successful > > > > > pre-authentication process for ECDH with curve P-256 and RSA/SHA-256 > > > > > signature. > > > > > [02_ad2025.keytab] All Kerberos keys in the AD domain. > > > > > > > > > > -- > > > > > Julien Rische > > > > > > > > > > On Mon, Jan 6, 2025 at 9:03 PM Jeff McCashland (He/him) > > > > > <je...@microsoft.com> wrote: > > > > > > > > > > > > Hi Julien, > > > > > > > > > > > > Thank you for uploading the net traces and information. Please > > > > > > follow the instructions below to collect an LSASS trace of the > > > > > > scenario where you get the KDC_ERR_PA_CHECKSUM_MUST_BE_INCLUDED > > > > > > error ('unknown' error code 79 from Alexander's original > > > > > > description). > > > > > > > > > > > > The LSASS traces can be quite large, but are highly compressible, > > > > > > so please add them to a .zip archive before uploading (file > > > > > > transfer workspace link is below). Please log into the workspace > > > > > > and find PartnerTTDRecorder_x86_x64.zip available for download. The > > > > > > x64 tool can be staged onto the Windows server in any location > > > > > > (instructions below assume C:\TTD). > > > > > > > > > > > > To collect the needed traces: > > > > > > 1. From a PowerShell prompt, execute: > > > > > > C:\TTD\tttracer.exe -Attach ([int](Get-Process -NAME lsass | > > > > > > Format-Wide -Property > > > > > > ID).formatEntryInfo.formatPropertyField.propertyValue) > > > > > > 2. Wait for a little window to pop up in top left corner of your > > > > > > screen, titled “lsass01.run” > > > > > > 3. start a network trace using netsh or WireShark, etc. > > > > > > 4. Repro the attempted operation > > > > > > 5. Stop the network trace and save it > > > > > > 6. CAREFULLY: uncheck the checkbox next to “Tracing” in the small > > > > > > “lsass01.run” window. Do not close or exit the small window or you > > > > > > will need to reboot. > > > > > > 7. The TTTracer.exe process will generate a trace file, then print > > > > > > out the name and location of the file. > > > > > > Compress the *.run file into a .zip archive before uploading with > > > > > > the matching network trace. It is a good idea to reboot the machine > > > > > > at the next opportunity to restart the lsass process. > > > > > > > > > > > > Best regards, > > > > > > Jeff McCashland (He/him) | Senior Escalation Engineer | Microsoft > > > > > > Corporation > > > > > > > > > > > > Phone: +1 (425) 703-8300 x38300 | Hours: 9am-5pm | Time zone: > > > > > > (UTC-08:00) Pacific Time (US and Canada) > > > > > > > > > > > > Local country phone number found here: > > > > > > https://nam06.safelinks.protection.outlook.com/?url=http%3A%2F%2Fsupport.microsoft.com%2Fglobalenglish&data=05%7C02%7Cjeffm%40microsoft.com%7C81dab240e051473988be08dd3ad438b9%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638731405417908866%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=Kk6DrmTGkzgTRSPt4sD%2F3jjA2xvI1bbrXg6bjbltkZY%3D&reserved=0<https://nam06.safelinks.protection.outlook.com/?url=http%3A%2F%2Fsupport.microsoft.com%2Fglobalenglish&data=05%7C02%7Cjeffm%40microsoft.com%7C81dab240e051473988be08dd3ad438b9%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638731405417916628%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=cv8GKyZlJg%2FihNSbK8z03Cir1H5mJY5CkhMusR56%2Bc0%3D&reserved=0> > > > > > > | Extension 1138300 > > > > > > > > > > > > > > > > > > > > > > > > ________________________________ > > > > > > From: Julien Rische <jris...@redhat.com> > > > > > > Sent: Monday, January 6, 2025 2:27 AM > > > > > > To: Jeff McCashland (He/him) <je...@microsoft.com> > > > > > > Cc: Alexander Bokovoy <a...@samba.org>; > > > > > > cifs-protocol@lists.samba.org <cifs-protocol@lists.samba.org>; > > > > > > Microsoft Support <supportm...@microsoft.com> > > > > > > Subject: Re: [cifs-protocol] [EXTERNAL] Windows Server 2025 PKINIT > > > > > > regression - TrackingID#2412190040009154 > > > > > > > > > > > > Hello Jeff, > > > > > > > > > > > > I uploaded the network traces to the file transfer link you > > > > > > provided: > > > > > > > > > > > > [00_ad2025.pcap] Network trace of a failing pre-authentication > > > > > > process > > > > > > with RSA/SHA-256 and RSA/SHA-512 as supportedCMSTypes. > > > > > > [00_ad2025_sha1.pcap] Network trace of a failing pre-authentication > > > > > > process with RSA/SHA-256, RSA/SHA-512, and RSA/SHA-1 as > > > > > > supportedCMSTypes. > > > > > > [00_ad2025.keytab] All Kerberos keys in the AD domain. > > > > > > > > > > > > [01_gp_pkinit_digest.png] Screenshot of the "Computer > > > > > > Configuration\Policies\Administrative Templates\System\KDC\Configure > > > > > > hash algorithms for certificate logon" global policy settings. > > > > > > [01_pkinit_ffdh_modp14.pcap] Network trace of a failing > > > > > > pre-authentication process for FFDH with MODP group 14 (2046-bit) > > > > > > and > > > > > > RSA/SHA-256 signature. > > > > > > [01_pkinit_ecdh_p256.pcap] Network trace for a successful > > > > > > pre-authentication process for ECDH with curve P-256 and RSA/SHA-256 > > > > > > signature. > > > > > > [01_ad2025.keytab] All Kerberos keys in the AD domain. > > > > > > > > > > > > My Microsoft account uses the present email address: > > > > > > jris...@redhat.com > > > > > > > > > > > > -- > > > > > > Julien Rische > > > > > > > > > > > > On Fri, Jan 3, 2025 at 9:12 PM Jeff McCashland (He/him) > > > > > > <je...@microsoft.com> wrote: > > > > > > > > > > > > > > Hello Julien and Alexander, > > > > > > > > > > > > > > Actually, what we need to troubleshoot this issue is to collect a > > > > > > > TTD trace of the LSASS process. In order to download the tool > > > > > > > needed to collect the trace, you will need a Microsoft account. > > > > > > > These can be created free at live.com. > > > > > > > > > > > > > > Please send me the Microsoft account email address you will use > > > > > > > to download the tools, and I will send the link. > > > > > > > > > > > > > > Best regards, > > > > > > > Jeff McCashland (He/him) | Senior Escalation Engineer | Microsoft > > > > > > > Corporation > > > > > > > > > > > > > > Phone: +1 (425) 703-8300 x38300 | Hours: 9am-5pm | Time zone: > > > > > > > (UTC-08:00) Pacific Time (US and Canada) > > > > > > > > > > > > > > Local country phone number found here: > > > > > > > https://nam06.safelinks.protection.outlook.com/?url=http%3A%2F%2Fsupport.microsoft.com%2Fglobalenglish&data=05%7C02%7Cjeffm%40microsoft.com%7C81dab240e051473988be08dd3ad438b9%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638731405417925951%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=ah1To%2Bwt2HyUqwd14EG0zqaHPvVrHCAJji8VVini6HY%3D&reserved=0<https://nam06.safelinks.protection.outlook.com/?url=http%3A%2F%2Fsupport.microsoft.com%2Fglobalenglish&data=05%7C02%7Cjeffm%40microsoft.com%7C81dab240e051473988be08dd3ad438b9%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638731405417934015%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=ffee0ZYwasN3jEGtrWN5ATgR%2Fz37VwzEPuEdwZQ%2F2bc%3D&reserved=0> > > > > > > > | Extension 1138300 > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > ________________________________ > > > > > > > From: Jeff McCashland (He/him) <je...@microsoft.com> > > > > > > > Sent: Friday, December 27, 2024 11:30 AM > > > > > > > To: Julien Rische <jris...@redhat.com>; Alexander Bokovoy > > > > > > > <a...@samba.org> > > > > > > > Cc: cifs-protocol@lists.samba.org > > > > > > > <cifs-protocol@lists.samba.org>; Microsoft Support > > > > > > > <supportm...@microsoft.com> > > > > > > > Subject: Re: [cifs-protocol] [EXTERNAL] Windows Server 2025 > > > > > > > PKINIT regression - TrackingID#2412190040009154 > > > > > > > > > > > > > > Hi Julien and Alexander, > > > > > > > > > > > > > > Alexander mentioned ad2025.pcap and ad2025_sha1.pcap, and Julien > > > > > > > mentioned 2 additional unnamed captures. > > > > > > > > > > > > > > Please upload any relevant traces to the link below, as we are > > > > > > > not allowed to accept files by email. Also, it would help if you > > > > > > > could specify which traces and frames relate to which aspects of > > > > > > > your question, that would save time. > > > > > > > > > > > > > > Also, it's not clear to me (yet), if the additional information > > > > > > > from Julien modifies or answers any part of Alexander's original > > > > > > > question. > > > > > > > > > > > > > > Secure file link: > > > > > > > https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsupport.microsoft.com%2Ffiles%3Fworkspace%3DeyJhbGciOiJSUzI1NiIsImtpZCI6IjgxMTA4NjE5MTQzMTQ1NTc0QUYxMjI3NjhGMEIzNDkyRkYyNTczNEYiLCJ0eXAiOiJKV1QifQ.eyJ3c2lkIjoiNjgzMzc2YjUtNjczZC00ZGVkLTlmYzUtYjRiOTUzMmJmNzE4Iiwic3IiOiIyNDEyMTkwMDQwMDA5MTU0Iiwic3YiOiJ2MSIsInJzIjoiRXh0ZXJuYWwiLCJ3dGlkIjoiYjA0NWU2MDgtMWY3MC00OTE3LTk4MTAtZjA0OGJlNGVlODI2IiwiYXBwaWQiOiI0ZTc2ODkxZC04NDUwLTRlNWUtYmUzOC1lYTNiZDZlZjIxZTUiLCJuYmYiOjE3MzUzMjc3NzAsImV4cCI6MTc0MzEwMzc3MCwiaWF0IjoxNzM1MzI3NzcwLCJpc3MiOiJodHRwczovL2FwaS5kdG1uZWJ1bGEubWljcm9zb2Z0LmNvbSIsImF1ZCI6Imh0dHA6Ly9zbWMifQ.d23KDsdUj68vCL0fEY2hpp2wjG65vYVtGh2E9Bu1mqT8YM-Q6bkewOhrHJbML0Fcr_ijDp89UMkAb0h70iCJCQojecjI8NPzgrkCm11GzScvTRcvJqyChhZ-9T731ZGSRV8wnxrrETLsuTjCo88_gAqRF3oBQdUuriBtI5z_xh-qUqrqcl-9q2nqxqhMzd3rA7Chkk5EMSRv5U1hnWhH5etJ-kUj8-HJB4eihMGPQ7NVPjCrVy04opSBf-XgkHjSsx_j_-q7EsbOR7ic3aWdEwZS5eppFpc4C4JMNpCauM4is23XWNoYwDZ9vP9CnyKPZfSMlF-5fC4k_4Q3KzcsNw%26wid%3D683376b5-673d-4ded-9fc5-b4b9532bf718&data=05%7C02%7Cjeffm%40microsoft.com%7C81dab240e051473988be08dd3ad438b9%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638731405417942030%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=UuNZjI6pFKJBVghO8HbragmdtrFTO6YicvOf06DrQnQ%3D&reserved=0<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsupport.microsoft.com%2Ffiles%3Fworkspace%3DeyJhbGciOiJSUzI1NiIsImtpZCI6IjgxMTA4NjE5MTQzMTQ1NTc0QUYxMjI3NjhGMEIzNDkyRkYyNTczNEYiLCJ0eXAiOiJKV1QifQ.eyJ3c2lkIjoiNjgzMzc2YjUtNjczZC00ZGVkLTlmYzUtYjRiOTUzMmJmNzE4Iiwic3IiOiIyNDEyMTkwMDQwMDA5MTU0Iiwic3YiOiJ2MSIsInJzIjoiRXh0ZXJuYWwiLCJ3dGlkIjoiYjA0NWU2MDgtMWY3MC00OTE3LTk4MTAtZjA0OGJlNGVlODI2IiwiYXBwaWQiOiI0ZTc2ODkxZC04NDUwLTRlNWUtYmUzOC1lYTNiZDZlZjIxZTUiLCJuYmYiOjE3MzUzMjc3NzAsImV4cCI6MTc0MzEwMzc3MCwiaWF0IjoxNzM1MzI3NzcwLCJpc3MiOiJodHRwczovL2FwaS5kdG1uZWJ1bGEubWljcm9zb2Z0LmNvbSIsImF1ZCI6Imh0dHA6Ly9zbWMifQ.d23KDsdUj68vCL0fEY2hpp2wjG65vYVtGh2E9Bu1mqT8YM-Q6bkewOhrHJbML0Fcr_ijDp89UMkAb0h70iCJCQojecjI8NPzgrkCm11GzScvTRcvJqyChhZ-9T731ZGSRV8wnxrrETLsuTjCo88_gAqRF3oBQdUuriBtI5z_xh-qUqrqcl-9q2nqxqhMzd3rA7Chkk5EMSRv5U1hnWhH5etJ-kUj8-HJB4eihMGPQ7NVPjCrVy04opSBf-XgkHjSsx_j_-q7EsbOR7ic3aWdEwZS5eppFpc4C4JMNpCauM4is23XWNoYwDZ9vP9CnyKPZfSMlF-5fC4k_4Q3KzcsNw%26wid%3D683376b5-673d-4ded-9fc5-b4b9532bf718&data=05%7C02%7Cjeffm%40microsoft.com%7C81dab240e051473988be08dd3ad438b9%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638731405417950232%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=AHHNDLxRDjwjDpKAbjK5TC%2F90fBxhIh6YUvk6q4xs30%3D&reserved=0> > > > > > > > > > > > > > > Best regards, > > > > > > > Jeff McCashland (He/him) | Senior Escalation Engineer | Microsoft > > > > > > > Corporation > > > > > > > > > > > > > > Phone: +1 (425) 703-8300 x38300 | Hours: 9am-5pm | Time zone: > > > > > > > (UTC-08:00) Pacific Time (US and Canada) > > > > > > > > > > > > > > Local country phone number found here: > > > > > > > https://nam06.safelinks.protection.outlook.com/?url=http%3A%2F%2Fsupport.microsoft.com%2Fglobalenglish&data=05%7C02%7Cjeffm%40microsoft.com%7C81dab240e051473988be08dd3ad438b9%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638731405417958422%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=gwE2pa3yGgx7PdLtmxzgQFG%2BMZ5RBs%2BDyYU7dmx6A7U%3D&reserved=0<https://nam06.safelinks.protection.outlook.com/?url=http%3A%2F%2Fsupport.microsoft.com%2Fglobalenglish&data=05%7C02%7Cjeffm%40microsoft.com%7C81dab240e051473988be08dd3ad438b9%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638731405417965965%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=L5BLENcf9kSL9PTNR4QA%2BMnRnlfjTlNAt4a4X8kNBqg%3D&reserved=0> > > > > > > > | Extension 1138300 > > > > > > > > > > > > > > > > > > > > > > > > > > > > ________________________________ > > > > > > > From: Jeff McCashland (He/him) <je...@microsoft.com> > > > > > > > Sent: Monday, December 23, 2024 8:29 PM > > > > > > > To: Julien Rische <jris...@redhat.com> > > > > > > > Cc: cifs-protocol@lists.samba.org > > > > > > > <cifs-protocol@lists.samba.org>; Alexander Bokovoy > > > > > > > <a...@samba.org>; Microsoft Support <supportm...@microsoft.com> > > > > > > > Subject: Re: [cifs-protocol] [EXTERNAL] Windows Server 2025 > > > > > > > PKINIT regression - TrackingID#2412190040009154 > > > > > > > > > > > > > > [Kristian to BCC] > > > > > > > > > > > > > > Hi Julien, > > > > > > > > > > > > > > I will investigate your question, and get back to you. I am out > > > > > > > the next 2 days for holiday, back on Thursday. > > > > > > > > > > > > > > > > > > > > > Best regards, > > > > > > > Jeff McCashland (He/him) | Senior Escalation Engineer | Microsoft > > > > > > > Corporation > > > > > > > > > > > > > > Phone: +1 (425) 703-8300 x38300 | Hours: 9am-5pm | Time zone: > > > > > > > (UTC-08:00) Pacific Time (US and Canada) > > > > > > > > > > > > > > Local country phone number found here: > > > > > > > https://nam06.safelinks.protection.outlook.com/?url=http%3A%2F%2Fsupport.microsoft.com%2Fglobalenglish&data=05%7C02%7Cjeffm%40microsoft.com%7C81dab240e051473988be08dd3ad438b9%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638731405417973677%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=sbyWkNwsQ5jtwB9WAAwb%2BaCSHpmPoXVXF2evCfKaDa8%3D&reserved=0<https://nam06.safelinks.protection.outlook.com/?url=http%3A%2F%2Fsupport.microsoft.com%2Fglobalenglish&data=05%7C02%7Cjeffm%40microsoft.com%7C81dab240e051473988be08dd3ad438b9%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638731405417981273%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=4HA1MqaXZ6ao%2Fx2K9TuKuhSm3iPAuPYhUVJk%2FA%2Bn8Ts%3D&reserved=0> > > > > > > > | Extension 1138300 > > > > > > > > > > > > > > > > > > > > > > > > > > > > ________________________________ > > > > > > > From: Kristian Smith <kristian.sm...@microsoft.com> > > > > > > > Sent: Monday, December 23, 2024 1:31 PM > > > > > > > To: Julien Rische <jris...@redhat.com>; Jeff McCashland (He/him) > > > > > > > <je...@microsoft.com> > > > > > > > Cc: cifs-protocol@lists.samba.org > > > > > > > <cifs-protocol@lists.samba.org>; Alexander Bokovoy > > > > > > > <a...@samba.org>; Microsoft Support <supportm...@microsoft.com> > > > > > > > Subject: RE: [cifs-protocol] [EXTERNAL] Windows Server 2025 > > > > > > > PKINIT regression - TrackingID#2412190040009154 > > > > > > > > > > > > > > [Mike to Bcc, adding Jeff]] > > > > > > > Hi Julien, > > > > > > > > > > > > > > Thanks for the information. Also, after some workload > > > > > > > adjustments, @Jeff McCashland will be working on your case moving > > > > > > > forward. > > > > > > > > > > > > > > Apologies for the confusion. > > > > > > > > > > > > > > Regards, > > > > > > > Kristian Smith > > > > > > > Support Escalation Engineer | Microsoft® Corporation > > > > > > > Email: kristian.sm...@microsoft.com > > > > > > > > > > > > > > -----Original Message----- > > > > > > > From: Michael Bowen <mike.bo...@microsoft.com> > > > > > > > Sent: Monday, December 23, 2024 10:05 AM > > > > > > > To: Julien Rische <jris...@redhat.com>; Kristian Smith > > > > > > > <kristian.sm...@microsoft.com> > > > > > > > Cc: Alexander Bokovoy <a...@samba.org>; > > > > > > > cifs-protocol@lists.samba.org; Microsoft Support > > > > > > > <supportm...@microsoft.com> > > > > > > > Subject: RE: [cifs-protocol] [EXTERNAL] Windows Server 2025 > > > > > > > PKINIT regression - TrackingID#2412190040009154 > > > > > > > > > > > > > > Hi Julien, > > > > > > > > > > > > > > Thanks for the update. @Kristian Smith is handling your case, so > > > > > > > I'm forwarding this to him to help him with your issue. Happy > > > > > > > Holidays! > > > > > > > > > > > > > > - Michael > > > > > > > > > > > > > > -----Original Message----- > > > > > > > From: Julien Rische <jris...@redhat.com> > > > > > > > Sent: Monday, December 23, 2024 5:32 AM > > > > > > > To: Michael Bowen <mike.bo...@microsoft.com> > > > > > > > Cc: Alexander Bokovoy <a...@samba.org>; > > > > > > > cifs-protocol@lists.samba.org; Microsoft Support > > > > > > > <supportm...@microsoft.com> > > > > > > > Subject: Re: [cifs-protocol] [EXTERNAL] Windows Server 2025 > > > > > > > PKINIT regression - TrackingID#2412190040009154 > > > > > > > > > > > > > > [You don't often get email from jris...@redhat.com. Learn why > > > > > > > this is important at > > > > > > > https://aka.ms/LearnAboutSenderIdentification ] > > > > > > > > > > > > > > Hello Michael, > > > > > > > > > > > > > > It has come to our attention that Windows Server 2025 now has > > > > > > > support for allowing and disallowing digest algorithms in PKINIT. > > > > > > > We made some tests by modifying the "Computer > > > > > > > Configuration\Policies\Administrative > > > > > > > Templates\System\KDC\Configure hash algorithms for certificate > > > > > > > logon". > > > > > > > > > > > > > > This configuration seems to take effect, because disallowing > > > > > > > SHA-256 causes elliptic curve Diffie-Hellman to fail. However, > > > > > > > allowing all SHA versions does not fix the problem when using > > > > > > > finite field Diffie-Hellman. > > > > > > > > > > > > > > In attachment, you will find 2 network traces showing a > > > > > > > successful pre-authentication process for ECDH with curve P-256 > > > > > > > and RSA/SHA-256 signature, and a failing one for FFDH with MODP > > > > > > > group 14 (2046-bit) and RSA/SHA-256 signature. In both cases all > > > > > > > SHA versions are allowed in the above group policy. > > > > > > > > > > > > > > -- > > > > > > > Julien Rische > > > > > > > > > > > > > > > > > > > > > On Thu, Dec 19, 2024 at 5:33 PM Michael Bowen via cifs-protocol > > > > > > > <cifs-protocol@lists.samba.org> wrote: > > > > > > > > > > > > > > > > [DocHelp to bcc] > > > > > > > > > > > > > > > > Hi Alexander, > > > > > > > > > > > > > > > > Thanks for your question about Windows Server 2025 and > > > > > > > > Kerberos. I've created case number 2412190040009154 to track > > > > > > > > this issue, please leave the number in the subject line when > > > > > > > > communicating with our team. One of our engineers will contact > > > > > > > > you soon. > > > > > > > > > > > > > > > > Best regards, > > > > > > > > Michael Bowen > > > > > > > > Sr. Escalation Engineer - Microsoft® Corporation > > > > > > > > > > > > > > > > -----Original Message----- > > > > > > > > From: Alexander Bokovoy <a...@samba.org> > > > > > > > > Sent: Thursday, December 19, 2024 4:26 AM > > > > > > > > To: Interoperability Documentation Help <doch...@microsoft.com> > > > > > > > > Cc: cifs-protocol@lists.samba.org > > > > > > > > Subject: [EXTERNAL] Windows Server 2025 PKINIT regression > > > > > > > > > > > > > > > > [Some people who received this message don't often get email > > > > > > > > from > > > > > > > > a...@samba.org. Learn why this is important at > > > > > > > > https://aka.ms/LearnAboutSenderIdentification ] > > > > > > > > > > > > > > > > Hi Dochelp, > > > > > > > > > > > > > > > > I believe we are seeing a regression in how Windows Server 2025 > > > > > > > > handles Kerberos PKINIT, probably due to algorithm agility > > > > > > > > rewrite. > > > > > > > > > > > > > > > > Sometime ago we have updated MIT Kerberos implementation of > > > > > > > > PKINIT to use sha256WithRSAEncryption in supported CMS types > > > > > > > > and removed sha1WithRSAEncryption to be able compliant with > > > > > > > > FIPS 140-3. > > > > > > > > > > > > > > > > The commit > > > > > > > > https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgith%2F&data=05%7C02%7Cjeffm%40microsoft.com%7C81dab240e051473988be08dd3ad438b9%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638731405417989178%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=0sY9jzipM1vdPT8FP6sozAIWAmfJesoPYMM4nI3CACw%3D&reserved=0<https://gith/> > > > > > > > > %2F&data=05%7C02%7CKristian.Smith%40microsoft.com%7Ccc530a51018e45fbf1 > > > > > > > > b108dd237c4865%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C6387057388 > > > > > > > > 76787487%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuM > > > > > > > > DAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&s > > > > > > > > data=vvBUg7U6QcAQSKEUYyCOQ1A78VoSp5eDylGA9lRz0zI%3D&reserved=0 > > > > > > > > ub.com%2Fkrb5%2Fkrb5%2Fcommit%2Fcbfe46ce20f3e9265baa9c648390148c739ab8 > > > > > > > > 30&data=05%7C02%7Cmike.bowen%40microsoft.com%7C6c48431e145e4de8500c08d > > > > > > > > d23562d38%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638705575372721 > > > > > > > > 071%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMC > > > > > > > > IsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata= > > > > > > > > BKt0Ke6K6mn1ONoQTBrHhhybs8HASTsXpFQC4qPKjKo%3D&reserved=0 > > > > > > > > is part of MIT Kerberos 1.20 or later releases. > > > > > > > > > > > > > > > > This change worked well for Windows Server versions prior to > > > > > > > > Windows Server 2025 release. With Windows Server 2025, the > > > > > > > > request is rejected (packet 8 from ad2025.pcap in attached > > > > > > > > archive): > > > > > > > > > > > > > > > > Kerberos > > > > > > > > Record Mark: 106 bytes > > > > > > > > 0... .... .... .... .... .... .... .... = Reserved: Not > > > > > > > > set > > > > > > > > .000 0000 0000 0000 0000 0000 0110 1010 = Record > > > > > > > > Length: 106 > > > > > > > > krb-error > > > > > > > > pvno: 5 > > > > > > > > msg-type: krb-error (30) > > > > > > > > stime: Dec 18, 2024 15:22:36.000000000 CET > > > > > > > > susec: 926640 > > > > > > > > error-code: Unknown (79) > > > > > > > > realm: WIN2025-UO83.TEST > > > > > > > > sname > > > > > > > > name-type: kRB5-NT-SRV-INST (2) > > > > > > > > sname-string: 2 items > > > > > > > > SNameString: krbtgt > > > > > > > > SNameString: WIN2025-UO83.TEST > > > > > > > > > > > > > > > > > > > > > > > > We built a custom version of MIT Kerberos which adds both > > > > > > > > sha256WithRSAEncryption and sha1WithRSAEncryption to the list > > > > > > > > of supported CMS types and still signed with > > > > > > > > sha256WithRSAEncryption, it failed again. The corresponding > > > > > > > > packet exchange can be seen in ad2025_sha1.pcap in the attached > > > > > > > > archive. > > > > > > > > > > > > > > > > Both variants work against Windows Server 2019, so to us this > > > > > > > > looks like a regression in Windows Server 2025 implementation. > > > > > > > > > > > > > > > > If this is not a regression and instead it is an intentional > > > > > > > > change, could you please make sure MS-PKCA and other > > > > > > > > corresponding documents get updated with a proper logic of the > > > > > > > > changes. > > > > > > > > > > > > > > > > -- > > > > > > > > / Alexander Bokovoy > > > > > > > > > > > > > > > > _______________________________________________ > > > > > > > > cifs-protocol mailing list > > > > > > > > cifs-protocol@lists.samba.org > > > > > > > > https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Flist%2F&data=05%7C02%7Cjeffm%40microsoft.com%7C81dab240e051473988be08dd3ad438b9%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638731405417996787%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=V80bx8i5NxoaazGbtp0ewcMA3WcUVkoVX%2B1OGCM0pIk%3D&reserved=0<https://list/> > > > > > > > > %2F&data=05%7C02%7CKristian.Smith%40microsoft.com%7Ccc530a51018e45fbf1 > > > > > > > > b108dd237c4865%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C6387057388 > > > > > > > > 76806372%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuM > > > > > > > > DAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&s > > > > > > > > data=0Qe6AszCxK%2BkbB47AYraNMeMmtEj88GZtfXvR5jNs1I%3D&reserved=0 > > > > > > > > s.samba.org%2Fmailman%2Flistinfo%2Fcifs-protocol&data=05%7C02%7Cmike.b > > > > > > > > owen%40microsoft.com%7C6c48431e145e4de8500c08dd23562d38%7C72f988bf86f1 > > > > > > > > 41af91ab2d7cd011db47%7C1%7C0%7C638705575372737510%7CUnknown%7CTWFpbGZs > > > > > > > > b3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIj > > > > > > > > oiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=JoGoaTxJzMm7ljVciNww4Tdd > > > > > > > > UpV9bcqS3whR%2F8JTLVA%3D&reserved=0 > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > -- > > > > / Alexander Bokovoy > > > > > > _______________________________________________ cifs-protocol mailing list cifs-protocol@lists.samba.org https://lists.samba.org/mailman/listinfo/cifs-protocol