[krbdev.mit.edu #9089] git commit

Greg Hudson via RT rt-comment at krbdev.mit.edu
Mon Mar 27 14:27:16 EDT 2023


Mon Mar 27 14:27:16 2023: Request 9089 was acted upon.
 Transaction: Ticket created by ghudson at mit.edu
       Queue: krb5
     Subject: git commit
       Owner: ghudson at mit.edu
  Requestors: 
      Status: new
 Ticket <URL: https://krbdev.mit.edu/rt/Ticket/Display.html?id=9089 >



Add pac_privsvr_enctype string attribute

The KDC uses the first local TGT key for the privsvr and full PAC
checksums.  If this key is of an aes-sha2 enctype in a cross-realm
TGT, a Microsoft KDC in the target realm may reject the ticket because
it has an unexpectedly large privsvr checksum buffer.  This behavior
is unnecessarily picky as the target realm KDC cannot and does not
need to very the privsvr checksum, but [MS-PAC] 2.8.2 does limit the
checksum key to three specific enctypes.

As a workaround, add a string attribute which can force the privsvr
key to use a specified enctype using key derivation when issuing
tickets to that principal.  This attribute can be set on cross-realm
TGT entries when the target realm uses Active Directory and the local
TGT uses an aes-sha2 primary key.

https://github.com/krb5/krb5/commit/5af907156f8f502bbe268f0c62274f88a61261e4
Author: Greg Hudson <ghudson at mit.edu>
Commit: 5af907156f8f502bbe268f0c62274f88a61261e4
Branch: master
 doc/admin/admin_commands/kadmin_local.rst |  9 ++++
 src/include/kdb.h                         |  1 +
 src/kdc/do_tgs_req.c                      |  6 +--
 src/kdc/kdc_authdata.c                    |  7 ++-
 src/kdc/kdc_util.c                        | 72 +++++++++++++++++++++++++++----
 src/kdc/kdc_util.h                        |  6 ++-
 src/tests/t_authdata.py                   | 19 +++++++-
 7 files changed, 105 insertions(+), 15 deletions(-)



More information about the krb5-bugs mailing list