summaryrefslogtreecommitdiffstats
path: root/python/wscript_build
diff options
context:
space:
mode:
authorArvid Requate <requate@univention.de>2014-07-07 17:39:51 +0200
committerAndrew Bartlett <abartlet@samba.org>2015-02-25 01:08:10 +0100
commit9b2ff26c893e5748d12d7a37a93eef7b1f4b1a1b (patch)
tree569607822f1ff025ee3c9a49a9ac4199d0035cc8 /python/wscript_build
parenta00d72bf5db4215fd70e6d396ad3d22e612d5ebc (diff)
downloadsamba-9b2ff26c893e5748d12d7a37a93eef7b1f4b1a1b.tar.gz
samba-9b2ff26c893e5748d12d7a37a93eef7b1f4b1a1b.tar.xz
samba-9b2ff26c893e5748d12d7a37a93eef7b1f4b1a1b.zip
s4-backupkey: Ensure RSA modulus is 2048 bits
RSA_generate_key_ex doesn't always generate a modulus of requested bit length. Tests with Windows 7 clients showed that they decline x509 certificates (MS-BKRP 2.2.1) in cases where the modulus length is smaller than the specified 2048 bits. For the user this resulted in DPAPI failing to retrieve stored credentials after the user password has been changed at least two times. On the server side log.samba showed that the client also called the as yet unlimplemented ServerWrap sub- protocol function BACKUPKEY_BACKUP_KEY_GUID after it had called the ClientWarp function BACKUPKEY_RETRIEVE_BACKUP_KEY_GUID. After enabling DPAPI auditing on the Windows Clients the Event Viewer showed Event-ID 4692 failing with a FailureReason value of 0x7a in these cases. Signed-off-by: Arvid Requate <requate@univention.de> Reviewed-by: Andrew Bartlett <abartlet@samba.org> Reviewed-by: Garming Sam <garming@catalyst.net.nz> BUG: https://bugzilla.samba.org/show_bug.cgi?id=10980
Diffstat (limited to 'python/wscript_build')
0 files changed, 0 insertions, 0 deletions