184.108.40.206 Negotiation-Based Approach
Upon receipt of the RDP Negotiation Request, the server examines the client request and selects the protocol to use. The server indicates its response to the client by appending an RDP Negotiation Response (section 220.127.116.11.1) structure to the X.224 Connection Confirm PDU (section 18.104.22.168). If the server does not support any of the protocols requested by the client, or if there was an error setting up the External Cryptographic Protocol Provider, then the server appends an RDP Negotiation Failure (section 22.214.171.124.2) structure to the X.224 Connection Confirm PDU.
If the server selects an External Security Protocol via the RDP Negotiation Response and the client accepts the server's choice, then the security protocol is instantiated by the client by calling into an External Cryptographic Protocol Provider. Once the External Security Protocol (section 5.4.5) handshake has successfully run to completion, the RDP messages resume, continuing with (a) the MCS Connect Initial PDU (section 126.96.36.199); or (b) the Early User Authorization Result PDU (section 188.8.131.52) followed by the MCS Connect Initial PDU. From this point all RDP traffic is encrypted using the External Security Protocol.
Figure 12: Negotiation-based security-enhanced connection sequence
Because both the RDP Negotiation Request and RDP Negotiation Response are initially exchanged in the clear, they are re-exchanged in the reverse direction after the External Security Protocol handshake as part of the Basic Settings Exchange phase of the RDP Connection Sequence (section 184.108.40.206). This step ensures that no tampering has taken place. The client replays the server's protocol choice in the Client Core Data (section 220.127.116.11.2), while the server replays the client's requested protocols in the Server Core Data (section 18.104.22.168.2).