Cross realm breaks in one direction
Douglas E. Engert
deengert at anl.gov
Thu Jan 13 14:19:58 EST 2011
On 1/13/2011 12:14 PM, Booker Bense wrote:
> Any experience with
> USGCB (US Gov Computer Baseline) settings for windows systems?
>
> Our windows admins recently applied these settings for windows systems and the
> cross realm trust with our unix based KDC has broken in the direction of getting
> unix KDC service tickets with windows credentials. The other way still works just fine.
>
> The error a client gets is "KDC does not support enctype". Looking at the logs, it does not appear
> that the unix KDC ever gets contacted.
>
> A list of possible suspect changes are
>
> Microsoft network client: Digitally sign communications (if server agrees): Enabled
>
> Microsoft network server: Digitally sign communications (always): Enabled
> Microsoft network server: Digitally sign communications (if client agrees): Enabled
>
> Network security: LAN Manager authentication level: Send NTLMv2 response only. Refuse LM& NTLM
> Network security: LDAP client signing requirements: Negotiate signing
> Network security: Minimum session security for NTLM SSP based (including secure RPC) clients
> Require NTLMv2 session security: Enabled
> Require 128-bit encryption: Enabled
> Network security: Minimum session security for NTLM SSP based (including secure RPC) servers
> Require NTLMv2 session security: Enabled
> Require 128-bit encryption: Enabled
> Network security: Configure encryption types allowed for Kerberos
> DES_CBC_CRC: Disabled
> DES_CBC_MD5: Disabled
> RC4_HMAC_MD5: Enabled
> AES128_HMAC_SHA1: Enabled
> AES256_HMAC_SHA1: Enabled
> Future encryption types: Enabled
>
> Everything in the software stack should support AES256_HMAC_SHA1 and that's the enctype used for
> everything in the get WIN service tickets with unix tgt's case.
>
> Doing the obvious thing of enabling DES didn't fix anything. Any suggestions?
The [MS-KILE]
http://download.microsoft.com/download/a/e/6/ae6e4142-aa58-45c6-8dcf-a657e5900cd3/%5BMS-KILE%5D.pdf
implies trustedDomain objectClass can now have the attribute msDS-SupportedEncryptionTypes
So it could be AD still thinks you KDC can only do DES.
http://technet.microsoft.com/en-us/library/ff646918(WS.10).aspx
has some commands to add RC4 or AES to cross realm and remove DES.
>
> thanks,
>
> - Booker C. Bense
>
>
>
> ________________________________________________
> Kerberos mailing list Kerberos at mit.edu
> https://mailman.mit.edu/mailman/listinfo/kerberos
>
>
--
Douglas E. Engert <DEEngert at anl.gov>
Argonne National Laboratory
9700 South Cass Avenue
Argonne, Illinois 60439
(630) 252-5444
More information about the Kerberos
mailing list