Curl fails to connect to proxy server with NTLM auth when called from a protected process

pkk077 1 Reputation point
2022-03-01T14:04:41.18+00:00

Hi folks,

We have a protected service which needs to connect to our backend servers through a proxy server which supports only one method of authentication - NTLM. We use CURL to make the connection but inside CURL, the API acquirecredentialshandle--ntlm fails with an error SEC_E_UNSUPPORTED_FUNCTION. When I make the same call from the same service NOT running as protected process, the call succeeds.

The error is being returned from within the process i.e., LSASS is not being called in the failure case. My only guess so far is that probably protected processes are not allowed to use NTLM but I can't find it stated anywhere.

Please help.
Thanks.

Windows for business Windows Client for IT Pros Directory services Active Directory
Windows for business Windows Server User experience Other
0 comments No comments
{count} votes

2 answers

Sort by: Most helpful
  1. PMT 86 Reputation points
    2022-03-03T13:59:02.083+00:00

    Hi,

    Which method or tool you have used to protect your processes

    did you used this : https://learn.microsoft.com/en-us/windows/win32/services/protecting-anti-malware-services-

    any screenshot


  2. Limitless Technology 44,751 Reputation points
    2022-03-08T13:03:40.807+00:00

    Hi @pkk077

    SEC_E_UNSUPPORTED_FUNCTION indicates a potential mismatch between security policy settings on the client and server computers. I am not sure that protected processes are not allowed to use NTLM.

    But for the stated error message ensure that the "Network security: Minimum session security for NTLM SSP based (including secure RPC) clients" policy settings on the computers from which users log on are the same as "Network security: Minimum session security for NTLM SSP based (including secure RPC) servers" policy settings on the server.

    On your Group Policy Editor, expand Local Policies under Computer Configuration and select Security Options. Scroll Down and find the following policies:

    -Network security: Minimum session security for NTLM SSP based (including secure RPC) clients
    -Network security: Minimum session security for NTLM SSP based (including secure RPC) servers

    Change both policies to have "Require 128-bit encryption" checked

    Hope this resolves your Query!!

    --
    --If the reply is helpful, please Upvote and Accept it as an answer–


Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.