<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>http://en.zaoniao.it/index.php?action=history&amp;feed=atom&amp;title=LAN_Manager</id>
	<title>LAN Manager - Revision history</title>
	<link rel="self" type="application/atom+xml" href="http://en.zaoniao.it/index.php?action=history&amp;feed=atom&amp;title=LAN_Manager"/>
	<link rel="alternate" type="text/html" href="http://en.zaoniao.it/index.php?title=LAN_Manager&amp;action=history"/>
	<updated>2026-05-15T09:29:36Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.32.0</generator>
	<entry>
		<id>http://en.zaoniao.it/index.php?title=LAN_Manager&amp;diff=5609&amp;oldid=prev</id>
		<title>Admin: Created page with &quot;'''LAN Manager''' was a Network Operating System (NOS) available from multiple vendors and developed by Microsoft in cooperation with 3Com C...&quot;</title>
		<link rel="alternate" type="text/html" href="http://en.zaoniao.it/index.php?title=LAN_Manager&amp;diff=5609&amp;oldid=prev"/>
		<updated>2019-06-07T05:30:46Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;&amp;#039;&amp;#039;&amp;#039;LAN Manager&amp;#039;&amp;#039;&amp;#039; was a &lt;a href=&quot;/index.php?title=Network_operating_system&amp;amp;action=edit&amp;amp;redlink=1&quot; class=&quot;new&quot; title=&quot;Network operating system (page does not exist)&quot;&gt;Network Operating System&lt;/a&gt; (NOS) available from multiple vendors and developed by &lt;a href=&quot;/index.php?title=Microsoft&amp;amp;action=edit&amp;amp;redlink=1&quot; class=&quot;new&quot; title=&quot;Microsoft (page does not exist)&quot;&gt;Microsoft&lt;/a&gt; in cooperation with 3Com C...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;'''LAN Manager''' was a [[Network operating system|Network Operating System]] (NOS) available from multiple vendors and developed by [[Microsoft]] in cooperation with [[3Com Corporation]]. It was designed to succeed 3Com's [[3+Share]] network server software which ran atop a heavily modified version of [[MS-DOS]].&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
LAN Manager was based on the [[OS/2]] operating system co-developed by [[IBM]] and [[Microsoft]]. It originally used the [[Server Message Block]] protocol atop either the [[NetBIOS Frames protocol]] (NBF) or a specialized version of the [[Xerox Network Systems]] (XNS) protocol. These legacy protocols had been inherited from previous products such as [[MS-Net]] for [[MS-DOS]], Xenix-NET for [[Xenix|MS-Xenix]], and the afore-mentioned 3+Share. A version of LAN Manager for Unix-based systems called '''LAN Manager/X''' was also available.&lt;br /&gt;
&lt;br /&gt;
In 1990, Microsoft announced LAN Manager 2.0 with a host of improvements, including support for TCP/IP as a transport protocol. The last version LAN Manager, 2.2, which included an MS-OS/2 1.31 base operating system, remained Microsoft's strategic server system until the release of [[Windows NT 3.1|Windows NT Advanced Server]] in 1993.&lt;br /&gt;
&lt;br /&gt;
Many vendors shipped licensed versions, including:&lt;br /&gt;
*3Com Corporation 3+Open&lt;br /&gt;
*HP LAN Manager/X&lt;br /&gt;
*IBM LAN Server&lt;br /&gt;
*Tapestry Torus&lt;br /&gt;
&lt;br /&gt;
==Cryptanalysis==&lt;br /&gt;
LAN Manager authentication uses a particularly weak method of [[Cryptographic hash function|hashing]] a user's [[password]] known as the LM hash algorithm, stemming from the mid 1980s when floppy viruses were the major concern as opposed to potentially high-frequency attacks with feedback over a (high-bandwidth) network. [[Kerberos (protocol)|Kerberos]] is used in Active Directory Environments.&lt;br /&gt;
&lt;br /&gt;
The major weaknesses of LAN Manager authentication protocol are:&lt;br /&gt;
#Passwords are not case sensitive. All passwords are converted into uppercase before generating the hash value. Hence it takes password, PassWord, PaSsWoRd, PASSword and other similar combinations same as PASSWORD converting all characters to uppercase. Password characters are also limited to a subset of the ASCII character set.&lt;br /&gt;
#Password length is limited to maximum of 14 characters&lt;br /&gt;
#A 14-character password is broken into 7+7 characters and the hash is calculated for the two halves separately. This way of calculating the hash makes it exponentially easier to crack, as the attacker need to brute force 7 characters twice instead of 14 characters. This makes the effective strength of a 14-characters password equal to twice that of a 7-character password, which is significantly less complex than the strength of a 14-character password.&lt;br /&gt;
#If the password is 7 characters or less, then the second half of hash will always produce same constant value (0xAAD3B435B51404EE). Therefore, if the length of password is less than or equal to 7 characters, then a password length of 7 characters or less can be identified visibly without using tools.&lt;br /&gt;
#The hash value is sent to the server on network without [[Salt (cryptography)|salting]], making it susceptible to [[man-in-the-middle attack]]s such as [[pass the hash|replay the hash]].&lt;br /&gt;
&lt;br /&gt;
==LM hash details==&lt;br /&gt;
&amp;lt;!--copied from [[LM hash]] to achieve merge--&amp;gt;&lt;br /&gt;
LM hash (also known as LanMan hash or LAN Manager hash) is a compromised password [[Cryptographic hash function|hashing function]] that was the primary hash that Microsoft LAN Manager and [[Microsoft Windows]] versions prior to [[Windows NT]] used to store user [[password]]s. Support for the legacy LAN Manager protocol continued in later versions of Windows for [[backward compatibility]], but was recommended by Microsoft to be turned off by administrators; as of Windows Vista, the protocol is disabled by default, but continues to be used by some non-Microsoft [[Server Message Block|SMB]] implementations.&lt;br /&gt;
&lt;br /&gt;
== Algorithm ==&lt;br /&gt;
The LM hash is computed as follows:&lt;br /&gt;
# The user's password is restricted to a maximum of fourteen characters.&lt;br /&gt;
# The user’s password is converted to [[uppercase]].&lt;br /&gt;
# The user's password is encoded in the System OEM [[code page]].&lt;br /&gt;
# This password is null-padded to 14 bytes.&lt;br /&gt;
# The “fixed-length” password is split into two 7-byte halves.&lt;br /&gt;
# These values are used to create two [[Data Encryption Standard|DES]] keys, one from each 7-byte half, by converting the seven bytes into a bit stream with the most significant bit first, and inserting a null bit after every seven bits (so &amp;lt;code&amp;gt;1010100&amp;lt;/code&amp;gt; becomes &amp;lt;code&amp;gt;10101000&amp;lt;/code&amp;gt;). This generates the 64 bits needed for a DES key. (A DES key ostensibly consists of 64 bits; however, only 56 of these are actually used by the algorithm. The null bits added in this step are later discarded.)&lt;br /&gt;
# Each of the two keys is used to DES-encrypt the constant [[ASCII]] string “&amp;lt;code&amp;gt;KGS!@#$%&amp;lt;/code&amp;gt;”, resulting in two 8-byte ciphertext values. The DES CipherMode should be set to ECB, and PaddingMode should be set to &amp;lt;code&amp;gt;NONE&amp;lt;/code&amp;gt;.&lt;br /&gt;
# These two ciphertext values are concatenated to form a 16-byte value, which is the LM hash.&lt;br /&gt;
&lt;br /&gt;
== Security weaknesses ==&lt;br /&gt;
Although it is based on [[Data Encryption Standard|DES]], a well-studied and formerly secure [[block cipher]], the LM hash is not a true [[one-way function]] as the password can be determined from the hash because of several weaknesses in its design: Firstly, passwords are limited to a maximum of only 14 characters, giving a theoretical maximum keyspace of &amp;lt;math&amp;gt;95^{14} \approx 2^{92}&amp;lt;/math&amp;gt; with the [[ASCII#ASCII printable characters|95 ASCII printable characters]].&lt;br /&gt;
&lt;br /&gt;
Secondly, passwords longer than 7 characters are divided into two pieces and each piece is hashed separately; this weakness allows each half of the password to be attacked separately at [[Exponential growth|exponentially lower]] cost than the whole, as only &amp;lt;math&amp;gt;95^{7} \approx 2^{46}&amp;lt;/math&amp;gt; different 7-character password pieces are possible with the same character set. By mounting a [[brute-force attack]] on each half separately, modern desktop machines can crack [[alphanumeric]] LM hashes in a few hours. In addition, all lower case letters in the password are changed to upper case before the password is hashed, which further reduces the [[key space (cryptography)|key space]] for each half to &amp;lt;math&amp;gt;69^{7} \approx 2^{43}&amp;lt;/math&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
The LM hash also does not use [[salt (cryptography)|cryptographic salt]], a standard technique to prevent [[pre-computed dictionary attack]]s. A [[time–memory tradeoff]] [[cryptanalysis]] attack, such as a [[rainbow table]], is therefore feasible. In addition, any password that is shorter than 8 characters will result in the hashing of 7 null bytes, yielding the constant value of &amp;lt;code&amp;gt;0xAAD3B435B51404EE&amp;lt;/code&amp;gt;, hence making it easy to identify short passwords on sight. In 2003, [[Ophcrack]], an implementation of the rainbow table technique, was published. It specifically targets the weaknesses of LM encryption, and includes pre-computed data sufficient to crack virtually all alphanumeric LM hashes in a few seconds. Many cracking tools, e.g. [[RainbowCrack]], [[L0phtCrack]] and [[Cain (software)|Cain]], now incorporate similar attacks and make cracking of LM hashes fast and trivial.&lt;br /&gt;
&lt;br /&gt;
A final weakness of LM hashes lies in their implementation — since they change only when a user changes their password, they can be used to carry out a [[pass the hash]] attack.&lt;br /&gt;
&lt;br /&gt;
== Workarounds ==&lt;br /&gt;
To address the security weaknesses inherent in LM encryption and authentication schemes, Microsoft introduced the [[NTLMv1]] protocol in 1993 with [[Windows NT 3.1]]. For hashing, NTLM uses [[Unicode]] support, replacing &amp;lt;code&amp;gt;LMhash=DESeach(DOSCHARSET(UPPERCASE(password)), &amp;quot;KGS!@#$%&amp;quot;)&amp;lt;/code&amp;gt; by &amp;lt;code&amp;gt;NThash=[[MD4]]([[UTF-16]]-LE(password))&amp;lt;/code&amp;gt;, which does not require any padding or truncating that would simplify the key. On the negative side, the same DES algorithm was used with only [[56-bit encryption]] for the subsequent authentication steps, and there is still no salting. Furthermore, Windows machines were for many years configured by default to send and accept responses derived from both the LM hash and the NTLM hash, so the use of the NTLM hash provided no additional security while the weaker hash was still present. It also took time for artificial restrictions on password length in management tools such as User Manager to be lifted.&lt;br /&gt;
&lt;br /&gt;
While LAN Manager is considered obsolete and current Windows operating systems use the stronger NTLMv2 or [[Kerberos (protocol)|Kerberos]] authentication methods, Windows systems before [[Windows Vista]]/[[Windows Server 2008]] enabled the LAN Manager hash by default for [[backward compatibility]] with legacy LAN Manager and [[Windows ME]] or earlier clients, or legacy [[NetBIOS]]-enabled applications. It has for many years been considered good security practice to disable the compromised LM and NTLMv1 authentication protocols where they aren't needed.&lt;br /&gt;
Starting with Windows Vista and Windows Server 2008, Microsoft disabled the LM hash by default; the feature can be enabled for local accounts via a security policy setting, and for [[Active Directory]] accounts by applying the same setting via domain [[Group Policy]]. The same method can be used to turn the feature off in Windows 2000, Windows XP and NT. (25 October 1998)&lt;br /&gt;
|-&lt;br /&gt;
| [[Windows 95]]&lt;br /&gt;
| Not supported&lt;br /&gt;
| Directory services client (released with [[Windows 2000]] Server, 17 February 2000)&lt;br /&gt;
|-&lt;br /&gt;
| [[Windows 98]]&lt;br /&gt;
| RTM&lt;br /&gt;
| Directory services client (released with [[Windows 2000]] Server, 17 February 2000)&lt;br /&gt;
|-&lt;br /&gt;
| [[Windows 2000]]&lt;br /&gt;
| RTM (17 February 2000)&lt;br /&gt;
| RTM (17 February 2000)&lt;br /&gt;
|-&lt;br /&gt;
| [[Windows ME]]&lt;br /&gt;
| RTM (14 September 2000)&lt;br /&gt;
| Directory services client (released with [[Windows 2000]] Server, 17 February 2000)&lt;br /&gt;
|-&lt;br /&gt;
| [[Samba (software)|Samba]]&lt;br /&gt;
| ?&lt;br /&gt;
| Version 3.0 (24 September 2003)&lt;br /&gt;
|-&lt;br /&gt;
| JCIFS&lt;br /&gt;
| Not supported&lt;br /&gt;
| Version 1.3.0 (25 October 2008)&lt;br /&gt;
|-&lt;br /&gt;
| [[IBM AIX]] (SMBFS)&lt;br /&gt;
| 5.3 (2004)&lt;br /&gt;
| Not supported as of v7.1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Poor patching regimes subsequent to software releases supporting the feature becoming available have contributed to some organisations continuing to use LM Hashing in their environments, even though the protocol is easily disabled in [[Active Directory]] itself.&lt;br /&gt;
&lt;br /&gt;
Lastly, prior to the release of Windows Vista, many unattended build processes still used a [[DOS]] boot disk (instead of [[Windows PE]]) to start the installation of Windows using WINNT.EXE, something that requires LM hashing to be enabled for the legacy LAN Manager networking stack to work.&lt;br /&gt;
&lt;br /&gt;
==Source==&lt;br /&gt;
&lt;br /&gt;
[http://wikipedia.org/ http://wikipedia.org/]&lt;br /&gt;
==See Also on BitcoinWiki==&lt;br /&gt;
* [[CrowdPrecision]]&lt;br /&gt;
* [[AllSpark]]&lt;br /&gt;
* [[Energy Premier]]&lt;br /&gt;
* [[ZeroBank]]&lt;br /&gt;
* [[Elysian]]&lt;/div&gt;</summary>
		<author><name>Admin</name></author>
		
	</entry>
</feed>