Denial of service when using Active Directory for KDC ?

jpbermejo jpbermejo at prisacom.com
Fri May 6 05:59:51 EDT 2005


On Fri, 2005-05-06 at 11:28 +0200, Tim Alsop wrote:
> Javier,
> 
> Thankyou. I have a related question for your :
> 
> In order to use a user account which is then used to run ktpass
> against I need to first create the user account (e.g. 

I did use that method many months ago, with a 2000 domain. Now, with a
2003 domain I've actually never tried ktpass seriously, and I use either
samba or css_adkadmin. The first one forces node.domain.com into node$
as principal name, where the second allows HOST/node.domain.com. Both
are standar computer accounts as any other windows machine.
You can get a TGT (or any other tickets) for these principals using the
proper keytab.

> If I understand it correctly the principal name given when ktpass is
> run is used as an alias, but the account in AD can still be accessed
> using the firstname.lastname at domain format ?

As I don't use ktpass anymore, no alias or mapping to user accounts is
performed. With both samba and adkadmin you can create service
principals, and those are again pure windows service principals (as, for
example LDAP/your.domain.controller). Those principals, at least on the
unix side, are not allowed to acquire tickets (neither tgt nor service
ones), so they cannot be 'denialed' anyway as the keytab is only used to
decrypt tickets from other requesting principals.

Javier Palacios


<DIV><FONT size="1">
============================================================================
This e-mail message and any attached files are intended SOLELY for the addressee/s identified 
herein. It may contain CONFIDENTIAL and/or LEGALLY PRIVILEGED information and may not
 necessarily represent the opinion of this company. If you receive this message in ERROR, 
please immediately notify the sender and DELETE it since you ARE NOT AUTHORIZED to use,
 disclose, distribute, print or copy all or part of the contained information. Thank you. 
============================================================================
</FONT></DIV>



More information about the Kerberos mailing list