[krbdev.mit.edu #8519] AS-REQ session key negotiation can fail with restricted etype list

Greg Hudson via RT rt-comment at krbdev.mit.edu
Mon Nov 21 12:03:23 EST 2016


This problem typically occurs when both of the following are true:

* A client makes an AS-REQ with an overly restrictive (for the session 
key) set of etypes.

* The krbtgt/REALM principal has a small set of keys (perhaps just one 
key), and no session_enctypes string attribute to override it.

Given that session_enctypes can be used to work around the problem, I am 
now leaning towards documentation rather than a code change.  The 
proposed workaround assumes that the krbtgt service implicitly supports 
all enctypes permitted by this KDC, rather than the set of enctypes 
present in the key data (although the enctypes present in the key data 
take priority).  That assumption could make some problems more difficult 
to diagnose in realms with mixed KDC versions.  For example, if a realm 
has a mix of 1.15 and 1.14 KDCs, and a client makes an AS-REQ with only 
aes-sha2 enctypes in the etypes field, the 1.15 KDC might issue a ticket 
that works with the 1.15 KDCs and not with the 1.14 KDCs.  That would be 
a lot more confusing than an ETYPE_NOSUPP error.

At a minimum, if we do add a workaround to the KDC, it should strictly 
respect any session_enctypes attribute on the krbtgt/REALM entry.


More information about the krb5-bugs mailing list