You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
With NTLM authentication, it is technically not necessary to possess the cleartext password. Since the challenge-response scheme is solved with the NT hash of the password instead of its cleartext value, it is sufficient to know the NT hash.
It would be awesome if ldap3 would support connection establishment with a known NT hash instead of a password.
Use cases:
Someone might be hesitant to store a cleartext password somewhere and would like to do it with the hash instead.
NTLM handling in the library is very experimental, and may not even end up in the released code, depending on how extensive the support for other things (like channel bindings) is going to be. NT hashes are hence a very low priority. I'll keep the issue open until I decide what's going to happen to NTLM support as a whole.
Okay, thanks for the fast response. I think it would also be fine to have basic NTLM auth support first and then gradually improve over time. Maybe people will conduct PRs if they require a missing feature like LDAP signing, channel binding or NT hash support.
But in general, I would consider NTLM auth support an important feature. In many cases the LDAP implementation will be Active Directory and NTLM is often required there.
With NTLM authentication, it is technically not necessary to possess the cleartext password. Since the challenge-response scheme is solved with the NT hash of the password instead of its cleartext value, it is sufficient to know the NT hash.
It would be awesome if ldap3 would support connection establishment with a known NT hash instead of a password.
Use cases:
The text was updated successfully, but these errors were encountered: