[cifs-protocol] RE: Status: SRX080803600053: [MS-NLMP] raw NTLMSSP tokens in GSS-API/SPNEGO

2008-09-18 Thread Bill Wesse
Good morning once again Adam. I am sending this, as I have not received your response to my email of Sept 10 (shown below). Please note the information provided below lists remaining issues, which our document developers are still working on. I will update you as information develops.

[cifs-protocol] Re: Status: SRX080803600053: [MS-NLMP] raw NTLMSSP tokens in GSS-API/SPNEGO

2008-09-18 Thread Adam Simpkins
On Thu, Sep 18, 2008 at 06:29:00AM -0700, Bill Wesse wrote: Good afternoon Mr. Simpkins. We have completed our investigations concerning your request for correction assistance regarding NTLM authentication using SPNEGO (in [MS-NLMP]), and have provided the document changes shown below. These

RE: [cifs-protocol] Session keys are not always 16 bytes long

2008-09-18 Thread Hongwei Sun
Metze, The product team confirmed that Windows servers always truncate session keys to 16 bytes for signing. As per previous e-mail, your SMB signing has to use entire 32 bytes of AES session key for signing. Do your newly found bugs affect this statement ? Thanks ! Hongwei