| Bug ID | 
          10777
           | 
        
        
          | Summary | 
          Description for `smb.encryption_key` is probably inaccurate.
           | 
        
        
          | Product | 
          Wireshark
           | 
        
        
          | Version | 
          1.12.2
           | 
        
        
          | Hardware | 
          x86-64
           | 
        
        
          | OS | 
          Windows 8.1
           | 
        
        
          | Status | 
          UNCONFIRMED
           | 
        
        
          | Severity | 
          Normal
           | 
        
        
          | Priority | 
          Low
           | 
        
        
          | Component | 
          Dissection engine (libwireshark)
           | 
        
        
          | Assignee | 
          [email protected]
           | 
        
        
          | Reporter | 
          [email protected]
           | 
        
      
        
        Created attachment 13324 [details]
an SMB session
Build Information:
Version 1.12.2 (v1.12.2-0-g898fa22 from master-1.12)
--
Protocol: SMB
Packet: Negotiate Protocol Response
In the response packet, SMB Server will return a **nonce** if
Challenge/Response Authentication is enabled. The **nonce** corresponds to the
field named **Encryption Key** in Wireshark.
**Encryption Key** will mislead users to regard this as **a key for cipher
algorithms**. However, this nonce is been used as the **plain text** input of
DES or HMAC-MD5 than the **key** input in NTLMv1/2. [1]
So I suggest changing the field name from **Encryption Key** to **Challenge
Nonce** or other appropriate words.
Thanks for reading.
Reference:
[1]:http://en.wikipedia.org/wiki/NT_LAN_Manager#NTLMv1
         
      
      
      You are receiving this mail because:
      
      
          - You are watching all bug changes.