Hi DocHelp,
is it correct that the LeaseKey on a file is shared between different
user contexts?
From 3.2.4.3 Application Requests Opening a File:
[...]
If the client implements the SMB 2.1 or SMB 3.0 dialect and
Connection.SupportsFileLeasing is
TRUE, the client MUST search the
Hi Edgar,
The case number 112091915263549 has been created to track this inquiry. I
will assist you in resolving this issue.
In the SMB2_CREATE_APP_INSTANCE_ID Create Context:
DataOffset: 36 (0x24) should be DataOffset: 32 (0x20) and no padding is
required. You have 4 extra bytes of
Hi Edgar,
Regarding “when should the server decrement OutstandingPreRequestCount or
OutstandingRequestCount”, the following logic will be reflected in a future
release of the MS-SMB2 document. This occurs during post processing check of
the ChannelSequence.
3.3.4.1 Sending Any
Hi,
I just found out that windows2012 RC sends multiple compound requests
within just one encrypted SMB2_TRANSFORM message.
From reading [MS-SMB2] version 37.0 I had the impression that each
request would be encrypted on its own, similar to how signing works.
Can the other receiver side rely on
Hi DocHelp,
I have some questions regarding the channel sequence verification
of SMB 3.00.
- When is Open.OutstandingPreRequestCount supposed to be decremented or
reset?
- What happens on an 16-bit overflow?
From the documentation it looks like, the server would
always reject
Hi,
with SMB 2.1 (and higher) it's possible to do a session
re-authentication without
getting a STATUS_NETWORK_SESSION_EXPIRED. With SMB 2.0
STATUS_REQUEST_NOT_ACCEPTED
is returned.
In what situations do clients do a (pro active) reauthentication without
getting
STATUS_NETWORK_SESSION_EXPIRED
Hi,
with SMB 2.1 (and higher) it's possible to do a session
re-authentication without
getting a STATUS_NETWORK_SESSION_EXPIRED. With SMB 2.0
STATUS_REQUEST_NOT_ACCEPTED
is returned.
In what situations do clients do a (pro active) reauthentication without
getting
STATUS_NETWORK_SESSION_EXPIRED
Hi dochelp,
I wondering if there are any size limitations based on MaxTransactSize,
MaxReadSize
and/or MaxWriteSize in SMB2 IOCTL?
I can't find anything related in the docs, but I guess there is a size
limitation
too.
metze
signature.asc
Description: OpenPGP digital signature
Hi Obaid,
Please let me know if my reply resolved your problem.
Yes, sorry for the late response.
metze
signature.asc
Description: OpenPGP digital signature
___
cifs-protocol mailing list
cifs-protocol@cifs.org
Hi,
I found that objects with ss and ß in the DN conflict with each other.
e.g.:
If I create CN=User_ß,OU=test,DC=example,DC=com on DC1
and CN=User_ss,OU=test,DC=example,DC=com on DC2,
CN=User_ss,OU=test,DC=example,DC=com gets renamed to
Hi,
According to MS-NRPC pg 111, bit 17 (indicated as bit R) of negotiable
flag is actually referring to supports the NetrServerPasswordSet2
functionality.
In the packet trace that attached earlier, I had successfully negotiated the
session key (from pkt 519-523) with the DC using
Am 23.05.2011 05:50, schrieb Andrew Bartlett:
On Mon, 2010-06-21 at 22:54 +, Hongwei Sun wrote:
Andrew,
Sorry about the delay to give you a confirmation. We have been spending
time to review the usage of UserParameters in other Windows components based
on the information you
Hi Matthieu,
Issue verbatim
--
So page 31 of MS-BKRP.pdf state that the message format for exchange is :
NET_API_STATUS BackuprKey(
[in] handle_t h,
[in] GUID* pguidActionAgent,
[in, size_is(cbDataIn)] byte* pDataIn,
[in] DWORD cbDataIn,
[out, size_is(,*pcbDataOut)]
partners.
I'll try to produce it next week.
metze
-Original Message-
From: Edgar Olougouna
Sent: Friday, February 12, 2010 12:09 PM
To: Stefan (metze) Metzmacher
Cc: Bill Wesse; p...@tridgell.net; cifs-proto...@samba.org
Subject: RE: Bug in MS-WINSRA section 2.2.10.1 Name Record
Server 2008 Standard
6.0.6001 Service Pack 1 Build 6001
It's the 32-Bit Version.
metze
Best regards,
Edgar
-Original Message-
From: Edgar Olougouna
Sent: Monday, February 01, 2010 9:39 AM
To: Stefan (metze) Metzmacher; Bill Wesse
Cc: p...@tridgell.net; cifs-proto...@samba.org
Hi Edgar,
I am looking into this and will update you on my progress.
Any updates?
metze
signature.asc
Description: OpenPGP digital signature
___
cifs-protocol mailing list
cifs-protocol@cifs.org
Hi Hongwei,
I think that Nick already informed you that AES 128 with 8 bit CFB mode
has to be used. I filed a request to add the information into 3.1.4.4 of
MS-NRPC. I also noticed that in mxnrpc.c you attached , you used
AES_cfb128_encrypt() (128 bit CFB mode) for computing server
. Meanwhile, I
will work on the AES encryption details for Schannel.
Thanks!
metze
-Original Message-
From: Stefan (metze) Metzmacher [mailto:me...@samba.org]
Sent: Friday, August 28, 2009 12:00 PM
To: Hongwei Sun
Cc: p...@tridgell.net; cifs-proto...@samba.org
Subject: Re: [Pfif] MS-NRPC
Stefan (metze) Metzmacher schrieb:
Hongwei,
The SharedSecret used for AES session key computation, as described in
3.1.4.3 MS-NRPC , should be the NTOWF (MD4(UNICODE(Passwd))) of the
plaintext password. The section 3.1.1 of MS-NRPC explains what a
SharedSecret is used for session
Hi,
I got a draft for preview of the MS-RAIW document last december.
I'm wondering when this will appear in the WSPP docs.
metze
signature.asc
Description: OpenPGP digital signature
___
cifs-protocol mailing list
cifs-protocol@cifs.org
A. Olougouna
Sr. SEE, Microsoft DSC Protocol Team
-Original Message-
From: Stefan (metze) Metzmacher [mailto:me...@samba.org]
Sent: Wednesday, July 08, 2009 3:22 AM
To: Edgar Olougouna
Cc: p...@tridgell.net; cifs-proto...@samba.org
Subject: Re: CAR - SMB2 Write and Read in Windows 7
-
From: cifs-protocol-bounces+neilm=thetestplace.co...@cifs.org
[mailto:cifs-protocol-bounces+neilm=thetestplace.co...@cifs.org] On Behalf
Of Stefan (metze) Metzmacher
Sent: Wednesday, July 08, 2009 9:22 AM
To: Edgar Olougouna
Cc: p...@tridgell.net; cifs-proto...@samba.org
Subject: [cifs-protocol
Hi Tom,
the cifs-protocol mailing list is for technical discussions about
protocol details, please use [EMAIL PROTECTED] for samba related
user questions.
metze
I would like to use Samba to share the /home directory from one machine
to another. So, I need the following to work:
1. In the
Hi Hongwei,
We finished adding an example for GSS_WrapEx with
AES128-CTS-HMAC-SHA1-96 in [MS-KILE]. The attached PDF document is the
newly added section(4.3) of the [MS-KILE] document.
We really appreciate your suggestion. Please let us know if you have
further questions regarding
that all 32 bytes of the session key are needed.
metze
Thanks !
Hongwei
-Original Message-
From: Stefan (metze) Metzmacher [mailto:[EMAIL PROTECTED]
Sent: Wednesday, September 17, 2008 10:57 AM
To: Hongwei Sun
Cc: Andrew Bartlett; [EMAIL PROTECTED]; [EMAIL PROTECTED]
Subject: Re
when the
correct session key is avaliable.
metze
-Original Message-
From: Stefan (metze) Metzmacher [mailto:[EMAIL PROTECTED]
Sent: Friday, September 05, 2008 3:25 PM
To: Hongwei Sun
Cc: Andrew Bartlett; [EMAIL PROTECTED]; [EMAIL PROTECTED]
Subject: Re: [cifs-protocol] Session keys
Hi Darryl,
As we discussed, you recommended that Stefan review the RPC issue below
identified during initial test results from a few test scenarios.As noted
by the test suite developer below, this required the test suite to bind w/o
the UUID.
could you please send me that network
Hongwei Sun schrieb:
Andrew,
We ran Smbtortue RPC-PAC testing on windows 2008 DC and got the following
output.
[EMAIL PROTECTED] source]# bin/smbtorture -k yes //VM-W2K8.nick.com/public
RPC-PAC Using seed 1220896649 Running PAC Password for [NICKDOM\root]:
Domain join
Richard Guthrie schrieb:
Andrew,
If you have a windows 2008 server acting as a member server in a downlevel
domain (for this discussion we will assume 2003 functional level), this
attribute will only exist if you extend the schema to a level that is
compatible with 2008 functional level.
Hongwei Sun schrieb:
Metze/Andrew,
The subkey in the EncAPRepPart of the AP-REP should be used as the session
key when the mutual authentication is enabled(as described in RFC 4121).
When DES and RC4 are used in Kerberos, the implementation is based on RFC1964
(instead of RFC4121).
Andrew Bartlett schrieb:
On Fri, 2008-09-05 at 22:25 +0200, Stefan (metze) Metzmacher wrote:
Hongwei Sun schrieb:
Metze/Andrew,
The subkey in the EncAPRepPart of the AP-REP should be used as the
session key when the mutual authentication is enabled(as described in RFC
4121).When DES
-AF57-05A82B88383Estart=1interval=10SortCol=DatePosted
-Original Message-
From: Stefan (metze) Metzmacher [mailto:[EMAIL PROTECTED]
Sent: Thursday, August 14, 2008 4:50 AM
To: Bill Wesse
Cc: [EMAIL PROTECTED]
Subject: Re: Answer: SRX080626600802 : WINS administrative RPC interface
Andrew Bartlett schrieb:
The documentation in MS-KILE 3.4.5.1 on DCE_STYLE is very terse, and
fails to clarify a few points, one of which is preventing
interoperability with Windows Vista.
The client MUST generate an additional AP reply message exactly as the
server would ([RFC4120]
Hongwei,
The encryption function in Kerberos is described in details in 5.3
[RFC3961] (http://www.ietf.org/rfc/rfc3961.txt), which is referenced by
[MS-KILE].
I can summarize as follows
* conf is actually a random confounder prefix of length c ,such as
16.
*
34 matches
Mail list logo