Hi Kristian,

Apologies for the delayed reply. I followed your advice and made sure that the SignedData digest algorithm was sha1NoSign, but the response I get from Windows is the error code KDC_ERR_GENERIC. I would appreciate any help as to why Windows is refusing my requests.

Cheers,
Jennifer (she/her)

On 9/09/25 3:49 am, Kristian Smith wrote:
Hi Jennifer,

I'm reaching out to see if you had any additional questions regarding this 
error you received. You likely saw that Julien provided some valuable 
information on August 28th. The following document section discusses the 
inclusion of PAChecksum2 along with the expected OID's discussed in my prior 
email.

--------------------------------------------------------------------------------------------
MS-PKCA 2.2.3 PA-PK-AS-REQ

PKAuthenticator in [RFC4556] is extended to add the following PAChecksum2. If 
SHA-1 is disabled as
a checksum algorithm PAChecksum2 SHOULD be present; if this field is present, 
it will always be
validated even if it is SHA-1.<11>
--------------------------------------------------------------------------------------------
<11> Section 2.2.3: The extension of PKAuthenticator in PA-PK-AS-REQ applies to 
Windows Server
2022, 23H2 operating system.and later versions. Windows Server 2022, 23H2 and 
later DCs will send
back TD-CMS-DIGEST-ALGORITHMS-DATA as described in [RFC8636] section 4, CMS 
Digest Algorithm
Agility.
On supported versions of Windows, PAChecksum2 is validated if any one of the 
following conditions is
true:
         1. The field is present
         2. If an EC algorithm is not allowed and the signedAuthPack algorithm 
is not SHA-1
         3. SHA-1 is disabled
-------------------------------------------------------------------------------------------

Please let me know if you still have any blocking issues or concerns with 
accuracy of the open specs. If I don't hear back from you by Wednesday, I'll 
assume that you were able to resolve the issue and I'll archive the case.

Regards,
Kristian Smith
Support Escalation Engineer | Microsoft® Corporation
Email: kristian.sm...@microsoft.com


-----Original Message-----
From: Kristian Smith
Sent: Sunday, August 31, 2025 7:15 AM
To: 'Jennifer Sutton' <jsut...@samba.org>
Cc: Microsoft Support <supportm...@microsoft.com>; 'cifs-protocol@lists.samba.org' 
<cifs-protocol@lists.samba.org>
Subject: RE: [EXTERNAL] [MS-KILE] PK‐INIT and 
KDC_ERR_DIGEST_IN_SIGNED_DATA_NOT_ACCEPTED - TrackingID#2508220040003919

Hi Jennifer,

I inspected the trace you sent. It appears that when Windows Server 2025 
receives the AS ticket, it's expecting one of the following algorithm 
identifiers:

sha512NoSign  2.16.840.1.101.3.4.2.3
sha384NoSign  2.16.840.1.101.3.4.2.2
sha256NoSign  2.16.840.1.101.3.4.2.1
sha1NoSign      1.3.14.3.2.26

but it received:
sha1RSA  1.2.840.113549.1.1.5

If you change the algorithm ID to 1.3.14.3.2.26, I believe it should work. 
Please let me know if you have additional questions or concerns.

Regards,
Kristian Smith
Support Escalation Engineer | Microsoft® Corporation
Email: kristian.sm...@microsoft.com

-----Original Message-----
From: Kristian Smith
Sent: Wednesday, August 27, 2025 3:45 PM
To: Jennifer Sutton <jsut...@samba.org>
Cc: Microsoft Support <supportm...@microsoft.com>; cifs-protocol@lists.samba.org
Subject: RE: [EXTERNAL] [MS-KILE] PK‐INIT and 
KDC_ERR_DIGEST_IN_SIGNED_DATA_NOT_ACCEPTED - TrackingID#2508220040003919

Hi Jennifer,

Thanks for uploading the trace. I wanted to let you know that I'll be out of 
the office until the 2nd of September, so I'll inspect it when I return. If 
this is an urgently blocking issue, or you have other questions, please reach 
out to doch...@microsoft.com during my absence.

Thanks for your patience.

Regards,
Kristian Smith
Support Escalation Engineer | Microsoft® Corporation
Email: kristian.sm...@microsoft.com

-----Original Message-----
From: Jennifer Sutton <jsut...@samba.org>
Sent: Tuesday, August 26, 2025 7:31 PM
To: Kristian Smith <kristian.sm...@microsoft.com>
Cc: Microsoft Support <supportm...@microsoft.com>; cifs-protocol@lists.samba.org
Subject: Re: [EXTERNAL] [MS-KILE] PK‐INIT and 
KDC_ERR_DIGEST_IN_SIGNED_DATA_NOT_ACCEPTED - TrackingID#2508220040003919

Hi Kristian,

I’ve captured traces and uploaded them to the secure file share.

Cheers,
Jennifer (she/her)

On 27/08/25 5:17 am, Kristian Smith wrote:
Hi Jennifer,

Thanks for giving that a try. Here are the instructions for gathering and 
uploading an Lsass trace:

Lsass Tracing
1.    Download and run the TTD.appinstaller from our website using the 
following link. Note: An End-User License Agreement (EULA) will appear in a 
command window that you will need to approve.
       a.      Link: https://aka.ms/ttd/download
2.    We need to run lsass.exe as a non-protected process and disable Shadow 
Stacks so that we can run the trace. Run the following commands in an 
administrator-elevated PowerShell instance, then restart the machine. Warning: 
This should not be done on a machine exposed to the Internet.
       a.      Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\Lsa" -Name 
"RunAsPPL" -Value 0
       b.      reg add "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Kernel" /v 
"UserShadowStacksForceDisabled" /t REG_DWORD /d 1 /f
3.    When ready to repro the issue, run the following commands to create a 
destination folder and begin the trace. Run the following commands in an 
elevated PowerShell instance.
       a.      mkdir C:\Traces_$(Get-Date -format "dd-MMM-yyyy")
       b.      TTD -Attach ([int](Get-Process -NAME lsass | Format-Wide -Property 
ID).formatEntryInfo.formatPropertyField.propertyValue) -out C:\Traces_$(Get-Date -format 
"dd-MMM-yyyy")\lsass.run
       c.      When the small window pops up, the trace has begun and you can 
now reproduce the issue. To end the trace, simply click “Tracing Off”.
4.    Once the trace operation is complete, we need to compress the .run file 
created by TTD for easy transfer. Run the following command in an elevated 
PowerShell instance.
       a.      Compress-Archive -Path C:\Traces_$(Get-Date -format "dd-MMM-yyyy")\ 
-DestinationPath C:\Traces_$(Get-Date -format "dd-MMM-yyyy").zip
       b.      Note: If this fails, you may need to restart the traced process 
to unlock the trace for compression. Using the following command, Lsass will 
restart automatically.
               1.      stop-process -name lsass -force
5.    Now we must undo the security changes made prior to taking the trace. Run 
the following commands in an elevated PowerShell instance, then restart the 
machine. After reboot, you are safe to reconnect the computer to the Internet.
       a.      Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\Lsa" -Name 
"RunAsPPL" -Value 1
       b.      reg add "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Kernel" /v 
"UserShadowStacksForceDisabled" /t REG_DWORD /d 0 /f
6.    Upload C:\Traces_dd-MMM-yyyy.zip to the secure file share link below
       a.      Link: 
https://support.microsoft.com/files?workspace=eyJhbGciOiJSUzI1NiIsImtpZCI6IjUwNjQwRTE0NEREODg5MzE5NzYzRTBFNjM5RjMzNjdFQUNDNzlBRDAiLCJ0eXAiOiJKV1QifQ.eyJ3c2lkIjoiOGQ5OTI3ZGUtNGJhYi00ZGEzLWI0NDgtNWNlNjUyZTdkMGNkIiwic3IiOiIyNTA4MjIwMDQwMDAzOTE5Iiwic3YiOiJ2MSIsInJzIjoiRXh0ZXJuYWwiLCJ3dGlkIjoiZjc0NmQyNWQtZmY3MS00MjU1LWEyMmUtY2Y4MmE4Y2RmNDJiIiwiYXBwaWQiOiI0ZTc2ODkxZC04NDUwLTRlNWUtYmUzOC1lYTNiZDZlZjIxZTUiLCJuYmYiOjE3NTYyMjgxMzUsImV4cCI6MTc2NDAwNDEzNCwiaWF0IjoxNzU2MjI4MTM1LCJpc3MiOiJodHRwczovL2FwaS5kdG1uZWJ1bGEubWljcm9zb2Z0LmNvbSIsImF1ZCI6Imh0dHA6Ly9zbWMifQ.A3gXawCQqeLZ7evd_LpSmkexJY53FfxDjTlKHYk8A7Kan-vQwCGg6UA4KWFXqFx_QNMrX3JtdLVmboAFp_dZiGJ0l0YhVPYGqqyg4Ojb1l115bmPeF0DUaUoHabHnseTMi2opBWtKMsFg4VhLRbuo0aAi0gAP8aT6Rf8XO8KY54B1j5cKuFj98o32y9YGvB9EUUxW3F7JYNWtWtDNoFD_GCg83k41lNqX_23XtmpV_nec74qPa4zZWxxkvnt0j0B9sqX4ImqAIahaN_T8m68LIjijR8i_c4Oc5hcUVf7WVpkiGrzGHy7nMxoW0ZGIPrjPrsbAiRFZvyMjan2GXUwVQ&wid=8d9927de-4bab-4da3-b448-5ce652e7d0cd

Please let me know if you have any questions or issues with the process 
outlined above. Thanks for your time.

Regards,
Kristian Smith
Support Escalation Engineer | Microsoft® Corporation
Email: kristian.sm...@microsoft.com

-----Original Message-----
From: Jennifer Sutton <jsut...@samba.org>
Sent: Sunday, August 24, 2025 4:34 PM
To: Kristian Smith <kristian.sm...@microsoft.com>
Cc: Microsoft Support <supportm...@microsoft.com>;
cifs-protocol@lists.samba.org
Subject: Re: [EXTERNAL] [MS-KILE] PK‐INIT and
KDC_ERR_DIGEST_IN_SIGNED_DATA_NOT_ACCEPTED -
TrackingID#2508220040003919

Hi Kristian,

I enabled the two group policies and set all of the algorithms to ‘supported’, 
but I still get the same KDC_ERR_DIGEST_IN_SIGNED_DATA_NOT_ACCEPTED error code.

Cheers,
Jennifer (she/her)

On 23/08/25 4:44 am, Kristian Smith wrote:
[Jeff to Bcc]

Hi Jennifer,

   From the code, the most likely reason you’re seeing this error is
because Server 2025 is rejecting the chosen hashing algorithm. Please
visit the following link to see the security baseline updates for
Server
2025:

Windows Server 2025, security baseline | Microsoft Community Hub
<https://te/
c%2F&data=05%7C02%7Ckristian.smith%40microsoft.com%7C8c5bb4bbfce04779
6e7a08dde511cb6a%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C6389185
86803864335%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwL
jAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C
%7C&sdata=XOwQuM8Ii8dKdKAbmB2OH%2BUogzTPXd9a1Ay2R57WZHI%3D&reserved=0
hcommunity.microsoft.com%2Fblog%2Fmicrosoft-security-baselines%2F&dat
a
=05%7C02%7Ckristian.smith%40microsoft.com%7Cdffe00b00b7d45ba347d08dde
3
66c665%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C63891675276512365
1
%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIs
I
lAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=Jt
7
TY3EL6hF%2FAiChKPpfLu27s1HQBLSCoFxay8of5HE%3D&reserved=0
windows-server-2025-security-baseline/4358733>

If you scroll down to “Configure hash algorithms for certificate
logon”, you’ll see what I think is applicable to this scenario. There
are 2 group policies that may help in testing:

Computer Configuration->Administrative
Templates->System->KDC->Configure hash algorithms for certificate
logon

Computer Configuration->Administrative Templates->System->Kerberos-
Configure hash algorithms for certificate logon

These should allow you to explicitly allow certain hashing algorithms.
If this does not work, let me know and I’ll send the instructions to
gather an LSASS trace to look a bit deeper into your scenario.

*Regards,*

*Kristian Smith*

Support Escalation Engineer | Microsoft® Corporation

*Email*: kristian.sm...@microsoft.com
<mailto:kristian.sm...@microsoft.com>

*From:*Jeff McCashland (He/him) <je...@microsoft.com>
*Sent:* Friday, August 22, 2025 6:43 AM
*To:* Jennifer Sutton <jsut...@samba.org>;
cifs-protocol@lists.samba.org
*Cc:* Microsoft Support <supportm...@microsoft.com>
*Subject:* Re: [EXTERNAL] [MS-KILE] PK‐INIT and
KDC_ERR_DIGEST_IN_SIGNED_DATA_NOT_ACCEPTED -
TrackingID#2508220040003919

Hi Jennifer,

Thank you for your question. We have created SR 2508220040003919 to
track this issue. One of our engineers will respond soon to assist.

Best regards,*
/Jeff M/**/^c /**/Cashland (He/him) /**| Senior Escalation Engineer |
Microsoft Corporation*

Phone: +1 (425) 703-8300 x38300 | Hours: 9am-5pm | Time zone:
(UTC-08:00) Pacific Time (US and Canada)

Local country phone number found here:
_http://sup/
p%2F&data=05%7C02%7Ckristian.smith%40microsoft.com%7C8c5bb4bbfce04779
6e7a08dde511cb6a%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C6389185
86803871849%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwL
jAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C
%7C&sdata=czHvPWTX%2BNPTRPbUWUhJafF%2FipmfgZH3BkIQj1U0CAU%3D&reserved
=0
ort.microsoft.com%2F&data=05%7C02%7Ckristian.smith%40microsoft.com%7C
d
ffe00b00b7d45ba347d08dde366c665%7C72f988bf86f141af91ab2d7cd011db47%7C
1
%7C0%7C638916752765137051%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnR
y
dWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D
%
3D%7C0%7C%7C%7C&sdata=FK7r2TWrlUzjdeiPQ4rDZDAh4CPDSOCJtsl6Z28Hvrk%3D&
r
eserved=0 globalenglish
<http://sup/
p%2F&data=05%7C02%7Ckristian.smith%40microsoft.com%7C8c5bb4bbfce04779
6e7a08dde511cb6a%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C6389185
86803879285%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwL
jAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C
%7C&sdata=NYTsg5I7H%2BjZlAS6cXLBLrAwRSFQVcj3osz6Loc1yY4%3D&reserved=0
ort.microsoft.com%2Fglobalenglish&data=05%7C02%7Ckristian.smith%40mic
r
osoft.com%7Cdffe00b00b7d45ba347d08dde366c665%7C72f988bf86f141af91ab2d
7
cd011db47%7C1%7C0%7C638916752765146291%7CUnknown%7CTWFpbGZsb3d8eyJFbX
B
0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIs
I
ldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=Y2BYZ16uGk6ZzUpN4oiZnIEx9n4vgrMZml
6
B26IALaM%3D&reserved=0>_ | Extension
1138300

---------------------------------------------------------------------
-
--

*From:* Jennifer Sutton <jsut...@samba.org
<mailto:jsut...@samba.org>>
*Sent:* Thursday, August 21, 2025 10:10 PM
*To:* cifs-protocol@lists.samba.org <mailto:cifs-
proto...@lists.samba.org> <cifs-protocol@lists.samba.org
<mailto:cifs- proto...@lists.samba.org>>; Interoperability
Documentation Help <doch...@microsoft.com
<mailto:doch...@microsoft.com>>
*Subject:* [EXTERNAL] [MS-KILE] PK‐INIT and
KDC_ERR_DIGEST_IN_SIGNED_DATA_NOT_ACCEPTED

Hi dochelp,

I’m performing tests against Windows Server 2025 and finding that
PK‐INIT requests always receive the response
KDC_ERR_DIGEST_IN_SIGNED_DATA_NOT_ACCEPTED. The same requests made to
Windows Server 2019 succeed. Could you help me find out why I’m
getting this error?

Cheers,
Jennifer (she/her)





_______________________________________________
cifs-protocol mailing list
cifs-protocol@lists.samba.org
https://lists.samba.org/mailman/listinfo/cifs-protocol

Reply via email to