Is this TGS-REP legal now?

Weijun Wang Weijun.Wang at sun.com
Thu Mar 18 03:43:20 EDT 2010


Hi All

A customer sends me a pcap file containing this TGS-REQ/TGS-REP pair. You can see that the sname in the returned ticket is different from the one requested. IIRC, in the case of cross-realm authentication, it's the client's responsibility to request for the inter-realm TGT. I've also checked draft-ietf-krb-wg-kerberos-referrals-11, and it says this KDC side friendly "recommendation" should only be done when the client requests for the "canonicalize" KDC option.

Is this still true today? Or, does MS Active Directory really act this way?

Kerberos TGS-REQ
    padata: PA-TGS-REQ
        Type: PA-TGS-REQ (1)
            Value: 6E8204B3308204AFA003020105A10302010EA20703050000... AP-REQ
                Ticket
                    Realm: NAEDEV.ADDEV.CUSTOMER.DOMAIN
                    Server Name (Service and Instance): krbtgt/NAEDEV.ADDEV.CUSTOMER.DOMAIN
    KDC_REQ_BODY
        KDCOptions: 00000000
        Realm: NAEDEV.ADDEV.CUSTOMER.DOMAIN
        Server Name (Unknown): HTTP/www.exchaddev.customer.domain

Kerberos TGS-REP
    Ticket
        Realm: NAEDEV.ADDEV.CUSTOMER.DOMAIN
        Server Name (Service and Instance): krbtgt/ADDEV.CUSTOMER.DOMAIN

All parties Windows.

Thanks
Max




More information about the krbdev mailing list