Closed davejohnston closed 6 years ago
The issue appears to be resolved by adding the negotiateFlagNTLMSSPNEGOTIATEEXTENDEDSESSIONSECURITY flag to the list of defaults: https://github.com/Azure/go-ntlmssp/blob/master/negotiate_message.go#L25
I raised this PR https://github.com/Azure/go-ntlmssp/pull/18
This has been addressed by https://github.com/Azure/go-ntlmssp/commit/4a21cbd618b459155f8b8ee7f4491cd54f5efa77
Negotiate fails when servers have strict checking enabled using the registry key NtlmMinServerSec. The key can be found under HKLM\SYSTEM\CurrentControlSet\Control\Lsa\MSV1_0 If it is set to 0x00080000 or greater, the request will fail.
The issue appears to be that the negotiate header is not setting the relevant flag to indicate that this is supported.
https://www.ultimatewindowssecurity.com/wiki/page.aspx?spid=NSrpcservers Require NTLMv2 session security. If the value of either this entry or the NtlmMinClientSec entry is 0x80000, then the connection will fail unless NTLMv2 session security is negotiated
According to the spec (https://msdn.microsoft.com/en-us/library/cc236621.aspx) in 2.2.2.5 NEGOTIATE