Ticket enctype question
Russ Allbery
rra at stanford.edu
Thu Aug 31 12:20:02 EDT 2006
Hello all,
We're in the process of enabling additional enctypes in a K5 realm that
previously only had DES keys. Our kdc.conf file now reads (in part):
master_key_type = des-cbc-crc
supported_enctypes = des-cbc-crc:normal des3-cbc-sha1:normal aes256-cts:normal
I've rekeyed the krbtgt key of our realm (with -keepold) to add the new
enctypes, and my user principal has had its password changed to acquire
new enctypes:
Principal: krbtgt/stanford.edu at stanford.edu
Expiration date: [never]
Last password change: Thu Aug 31 06:05:13 PDT 2006
Password expiration date: [none]
Maximum ticket life: 1 day 01:00:00
Maximum renewable life: 7 days 00:00:00
Last modified: Thu Aug 31 06:05:13 PDT 2006 (rra/admin at stanford.edu)
Last successful authentication: [never]
Last failed authentication: [never]
Failed password attempts: 0
Number of keys: 4
Key: vno 2, DES cbc mode with CRC-32, no salt
Key: vno 2, Triple DES cbc mode with HMAC/sha1, no salt
Key: vno 2, AES-256 CTS mode with 96-bit SHA-1 HMAC, no salt
Key: vno 1, DES cbc mode with CRC-32, no salt
Attributes:
Policy: [none]
Principal: rra at stanford.edu
Expiration date: [never]
Last password change: Tue Mar 28 11:05:10 PST 2006
Password expiration date: [none]
Maximum ticket life: 1 day 01:00:00
Maximum renewable life: 7 days 00:00:00
Last modified: Thu Aug 10 16:27:53 PDT 2006 (rra/admin at stanford.edu)
Last successful authentication: [never]
Last failed authentication: [never]
Failed password attempts: 0
Number of keys: 3
Key: vno 10, DES cbc mode with CRC-32, no salt
Key: vno 10, Triple DES cbc mode with HMAC/sha1, no salt
Key: vno 10, AES-256 CTS mode with 96-bit SHA-1 HMAC, no salt
Attributes: REQUIRES_PRE_AUTH
Policy: standard
However, when I run klist -5e after running kinit, I see:
Ticket cache: FILE:/tmp/krb5cc_1000_TsmYeM
Default principal: rra at stanford.edu
Valid starting Expires Service principal
08/31/06 09:14:36 09/01/06 10:14:33 krbtgt/stanford.edu at stanford.edu
Etype (skey, tkt): AES-256 CTS mode with 96-bit SHA-1 HMAC, DES cbc mode with CRC-32
Why is the tkt encrypted with des-cbc-crc? Is there some other key that
also needs to be rekeyed, or some configuration error somewhere?
The client is not setting any enctype restrictions; the complete
[libdefaults] section on the client is:
default_realm = stanford.edu
krb4_config = /etc/krb.conf
krb4_realms = /etc/krb.realms
The relevant KDC log messages are:
Aug 31 09:14:20 kerberos3 krb5kdc[27556]: AS_REQ (7 etypes {18 17 16 23 1 3 2}) 171.64.19.147: NEEDED_PREAUTH: rra at stanford.edu for krbtgt/stanford.edu at stanford.edu, Additional pre-authentication required
Aug 31 09:14:24 kerberos3 krb5kdc[27556]: AS_REQ (7 etypes {18 17 16 23 1 3 2}) 171.64.19.147: ISSUE: authtime 1157040864, etypes {rep=18 tkt=1 ses=18}, rra at stanford.edu for krbtgt/stanford.edu at stanford.edu
That tkt=1 is the problem.
The master key (K/M at stanford.edu) is des-cbc-crc, of course, but my
understanding was that that was not supposed to affect the bits on the
wire. Is my understanding incorrect?
--
Russ Allbery (rra at stanford.edu) <http://www.eyrie.org/~eagle/>
More information about the Kerberos
mailing list