Displaying 3 results from an estimated 3 matches for "srv_netlogon_nt".
Did you mean:
srv_netlog_nt
2020 Sep 18
2
Samba impact of "ZeroLogin" CVE-2020-1472
...n are dead, i know, but... i seek some feedback.
>
On real NT4 domains?
The particular crypto here was a Windows 2000 thing.
NT4 used 2DES and RC4, which was actually secure for the purpose it was
used for.
On Samba NT4-like domains, see the advisory and read
source3/rpc_server/netlogon/srv_netlogon_nt.c for context.
If you don't have any trusted domains then the big thing is an attacker
being able to remove a member server from the domain, or get session
keys (assisting a takeover 'MITM attack' of an existing session).
Just set 'server schannel = yes' and you will be fine...
2020 Sep 16
2
Samba impact of "ZeroLogin" CVE-2020-1472
The following applies to Samba used as domain controller only.
(Both as classic/NT4-style and active direcory DC.)
Samba users have reported that the exploit for "ZeroLogin" passes
against Samba.
Samba has some protection for this issue because since Samba 4.8 we have
set a default of 'server schannel = yes'.
Users who have changed this default are hereby warned that
2020 Sep 16
2
Samba impact of "ZeroLogin" CVE-2020-1472
The following applies to Samba used as domain controller only.
(Both as classic/NT4-style and active direcory DC.)
Samba users have reported that the exploit for "ZeroLogin" passes
against Samba.
Samba has some protection for this issue because since Samba 4.8 we have
set a default of 'server schannel = yes'.
Users who have changed this default are hereby warned that