Hi Aviv,
Thanks again for your question. After further investigation of [MS-KILE], I've discovered that the specified scenario does not align with the prescribed protocol. For the given scenario, refer to the following statement in [MS-KILE] section 3.2.5.8 AP Exchange:
"When the client receives a KRB_AP_ERR_SKEW error ([RFC4120] section 3.2.3) with a KERB-ERROR DATA structure (section 2.2.2) in the e-data field of the KRB-ERROR message ([RFC4120] section 5.9.1), the client retries the AP-REQ using the time in the KRB-ERROR message to create the authenticator."
As described, a fallback scenario after KRB_AP_ERR_SKEW to NTLM should not occur without disconnecting and renegotiating for NTLM. The server will exhibit unknown behavior after the client reattempts the session setup with NTLM.
Please let me know if you have additional questions.
Regards,
Kristian S
Microsoft Open Specs