Solaris 9, stock sshd, pam_krb5, MIT 1.4.3 KDC

Jeff Blaine jblaine at kickflop.net
Tue May 16 17:32:45 EDT 2006


Nicolas Williams wrote:
> On Tue, May 16, 2006 at 04:01:11PM -0400, Jeff Blaine wrote:
>> I'm confused, then, Nicolas.
>>
>> As I read the output, there are 2 keys stored
>> for these principals:
>>
>>    1 using Triple DES cbc mode with HMAC/sha1
>>
>>    1 using DES cbc mode with CRC-32
>>
>> And the first matching enctype is supposed to be used,
>> which would be des-cbc-crc (and des3-hmac-sha1 would
>> not, as it is not common to the client and server.
> 
> What does kadmin -q "getprinc host/noodle.foo.com at JBTEST" say?
> 
> I bet the des3-hmac-sha1 key comes before the des-cbc-crc key.

Yes, it does.

> That means that when the stock pam_krb5/mech_krb5 do a TGS-REQ to get a
> service ticket [for the PAM_USER with host/noodle.foo.com at JBTEST as the
> service principal name] with which to validate the user's TGT the ticket
> will come back encrypted in host/noodle.foo.com at JBTEST's 3DES key
> (because the KDC will select that long-term key because it's first in
> the KDB entry), which, sadly, the Solaris 9 mech_krb5 doesn't support.

I guess this is what I want:

http://www.ietf.org/internet-drafts/draft-zhu-kerb-enctype-nego-04.txt

This helped just now though.  What a mess.

     http://learningsolaris.com/docs/krb_enctypes_so10.pdf

Looks like I'll redo my existing stuff to only ever allow
1DES enctype (boggles my mind) via 'supported_enctypes' in
kdc.conf.

That seems a real shame -- "Use 1DES in any homogenous
environment or you may really hurt yourself."

Sadly, it also doesn't appear one can remove just *one* enctype
instance of a key (the 3DES one in my case).

I'm glad I am finding all of this out now on a testbed
machine :O

> You could upgrade to Solaris 10 and get support for AES (in addition to
> 3DES and HMAC-RC4)...

Not an option.

Thanks for your help, Nico and Doug.



More information about the Kerberos mailing list