FYI - Changes to null session pipes post 2k3 SP1
Pre Win2k3 SP1 we actually had a hardcoded list of null session pipes + the registry key to come up with the complete list of allowed NULL session pipes.
PRE SP1 hard coded list:
===========
L"netlogon",
L"lsarpc",
L"samr",
L"browser",
L"srvsvc",
L"wkssvc",
POST SP1
==========
None
Net result?
If you messed with HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\lanmanserver\parameters
NullSessionPipes value ( removed things like .. lsarpc, netlogon etc.. ) You will fail NULL session authentications where you used to succeed, even with nothing defined in the registry.
CHANGES:
=========
We remove items like trkwks, trksvr, epmapper, and locator.
We add browser
We then write the value: AdjustedNullSessionPipes == 1 under
CurrentControlSet\Services\lanmanserver\parameters
We remove the hardcoded list seen above
What does it effect?
Scenario:
DFS server goes to access a DC to get site info - it calls DsAddressToSiteNames() (
connect to netlogon ) to determine site info.
DFS Service runs as Local System
If the Kerberos authentication fails for some reason and we fall back to NTLM and it will authenticate as NULL
This call then fails since the DC will not authenticate the null connection to the
named pipe \pipe\netlgon.
Net Trace shows:
==================
DFS Server sends authn data:
SMB Command: Session Setup AndX (0x73)
Security Blob:
Domain name: NULL
User name: NULL
Host name: NNSFLS001
DC responds:
SMB Command: Session Setup AndX (0x73)
NT Status: STATUS_SUCCESS (0x00000000)
DFS Server tries to access \pipe\netlogon
SMB NT Create AndX Request, Path: \NETLOGON
DC Responds:
SMB Command: NT Create AndX (0xa2)
NT Status: STATUS_ACCESS_DENIED (0xc0000022)
Comments
Anonymous
May 16, 2006
Great post Steve, I hadn't a clue about that change.
joeAnonymous
May 16, 2006
PingBack from http://blog.joeware.net/2006/05/16/372/Anonymous
May 19, 2006
thx Joe!Anonymous
October 25, 2006
The comment has been removedAnonymous
December 13, 2006
the default is supposed to be set at none so why would anyone want someone anonymously accessing their network anyhow?Anonymous
December 20, 2006
To answer your question -see the notes in http://support.microsoft.com/kb/q289655/Anonymous
July 22, 2008
Can you use wildcards in specifying NULL pipes? The reason is that I have an application that creates dynamic WMI pipes and I have a security requirement to restrict anonymous named pipes so it must be defined in the local security policy. Thanks in advance for any feedback.Anonymous
January 30, 2011
please provide me the registry key to set the following Network access: Named Pipes that can be accessed : anonymously:none