Hello, I have been able to set-up a Windows 2019 Domain, so I did some testing with simple and disgest-MD5. As expected both will be rejected when the integritylevel=2 is set.
For Digest-md5 it is enough to request Auth-int with AD to get over this check (funny enough it seems to not sign requests only the login). Here is some sample code and sample output: https://gist.github.com/ecki/cdd7a14575b7dca10da8d362974731a0 (The password used was not the one shown). BTW: in order to use DIGEST-MD5 with a AD user the user's password "encryption" must be configured to be reversible (and a new password must be set). Next will be testing with TLS (and channel binding) once I get the LDAP certificate set up for this. -- http://bernd.eckenfels.net ________________________________ Von: Michael Osipov <1983-01...@gmx.net> Gesendet: Mittwoch, Dezember 18, 2019 6:37 PM An: Bernd Eckenfels; security-dev@openjdk.java.net Betreff: Re: Microsoft LDAP Channel Binding Am 2019-12-18 um 04:29 schrieb Bernd Eckenfels: > Hello, > > Microsoft just released an Security Advisory, announcing that upcoming > Windows Server Versions will turn on mandatory TLS Channel Binding (and turn > off simple binds with mandatory SASL signing) on LDAP Servers. Another question here, typically Microsoft: What makes you think that this is TLS channel binding? All I see is LDAP channel binding for which I fail to find any technical documentation. Michael