Windows 95 RPC Ignores Shutdown Packets (145652)



The information in this article applies to:

  • Microsoft Windows 95

This article was previously published under Q145652

SYMPTOMS

When you are running a program using RPC in Windows 95, the program may report a packet integrity error or security interface error when the program receives a "Shutdown" packet from the RPC server.

This error is most likely to occur with a program that uses the Microsoft Security Support Provider interface, and to be reported as a security validation error.

CAUSE

The RPC run-time library in Windows 95 ignores Shutdown packets, instead of destroying the session and incrementing the received packet count as expected.

RESOLUTION

STATUS

This problem no longer occurs in Windows 98. To resolve this problem, install the current version of Windows. For information about the current version of Windows, visit http://www.microsoft.com/windows.

MORE INFORMATION

Shutdown packets are specified in the Open Software Foundation (OSF) Distribution Computing Environment (DCE) specification, which defines the industry standard for implementing remote procedure calls (RPC). A DCE- compliant RPC client is expected to terminate the RPC session when it receives a Shutdown packet. In Windows 95, the RPC run-time library does not terminate the session when a Shutdown packet is received.

Also, the received packet count is not properly incremented when a Shut- down packet is received. The received packet count (MessageSequenceNumber counter) is used to calculate and validate checksums for programs that use the Microsoft Security Support Provider interface. The RPC run-time library does not calculate checksums correctly because of this error, and checksum validation can fail when called later.

Microsoft RPC run-time libraries do not generate Shutdown packets. Only non-Microsoft DCE servers (such as Unix servers) generate Shutdown packets.

Modification Type:MajorLast Reviewed:3/25/2002
Keywords:kbnetwork kbpolicy kbprb kbRPC KB145652