https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6895
Summary: Add support for AES in Microsoft Network Logon
Negotiation options
Product: Wireshark
Version: 1.6.5
Platform: x86
OS/Version: All
Status: NEW
Severity: Normal
Priority: Low
Component: Wireshark
AssignedTo: bugzilla-admin@xxxxxxxxxxxxx
ReportedBy: jsafrane@xxxxxxxxxx
Build Information:
TShark 1.6.5 (SVN Rev Unknown from unknown)
Copyright 1998-2012 Gerald Combs <gerald@xxxxxxxxxxxxx> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
Compiled (64-bit) with GLib 2.30.2, with libpcap (version unknown), with libz
1.2.5, with POSIX capabilities (Linux), without libpcre, with SMI 0.4.8, with
c-ares 1.7.4, with Lua 5.1, with Python, with GnuTLS 2.12.14, with Gcrypt
1.5.0,
with MIT Kerberos, with GeoIP.
Running on Linux 3.2.6-3.fc16.x86_64, with libpcap version 1.1.1, with libz
1.2.5.
Built using gcc 4.6.2 20111027 (Red Hat 4.6.2-1).
--
Attached patch adds new flag to Negotiation options of Microsoft Network Logon
NetrServerAuthenticate3 message.
tshark -VVV output difference:
Microsoft Network Logon, NetrServerAuthenticate3
Operation: NetrServerAuthenticate3 (26)
[Request in frame: 24]
Server Credential: 5b9841dac81a4114
Negotiation options: 0x600fffff
.1.. .... .... .... .... .... .... .... = Authenticated RPC supported:
Set
..1. .... .... .... .... .... .... .... = Authenticated RPC via lsass
supported: Set
+ .... ...0 .... .... .... .... .... .... = AES supported: Not set
...
Patch by Andreas Schneider, anschnei [at] redhat [dot] com
--
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching all bug changes.