[24211] in Kerberos

home help back first fref pref prev next nref lref last post

Re: Updating encryption types

daemon@ATHENA.MIT.EDU (Phil Dibowitz)
Tue Jul 5 16:49:50 2005

Date: Tue, 5 Jul 2005 13:48:54 -0700
From: Phil Dibowitz <phil@usc.edu>
To: kerberos@mit.edu
Message-ID: <20050705204853.GE27759@usc.edu>
Mail-Followup-To: kerberos@mit.edu
Mime-Version: 1.0
In-Reply-To: <20050704202911.GA14872@sun.com>
Content-Type: multipart/mixed; boundary="===============29678941224227007=="
Errors-To: kerberos-bounces@mit.edu


--===============29678941224227007==
Content-Type: multipart/signed; micalg=pgp-sha1;
	protocol="application/pgp-signature"; boundary="BWpbUxt7sU2t3mXs"
Content-Disposition: inline


--BWpbUxt7sU2t3mXs
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

On Mon, Jul 04, 2005 at 03:29:11PM -0500, Will Fiveash wrote:
> > 1. Changing the enctypes (the previous admin had it hard coded) will ca=
use
> > session keys to use the new enctypes, but other keys will not immediate=
ly see
> > effect.
>=20
> If you mean creating a new set of enctype keys for service princs will
> have an immediate effect on the enctype of sessions keys issued after
> the new keys are created then yes (make sure the service systems
> krb5.keytab is updated also).  I am not sure what you mean by "other
> keys".

What i meant was "changing enctypes in kdc.conf and krb5.conf and doing
nothing else should at best up the encryption of the session keys. Nothing
else will change until password are changed."

> > Is there a way to tell what encryption type is being used for the sessi=
on
> > key? I'm assuming the "3 etypes {511 511 1}" means there are three encr=
yption
> > types defined (which seems right)...  but then there's "etypes {rep=3D1=
 tkt=3D1
> > ses=3D1}"  which I interpret to say the session key is type "1" (DES?).
>=20
> klist -e should show something like:
> $ klist -e
> Ticket cache: FILE:/tmp/krb5cc_10224
> Default principal: jimmy@SUN.COM
>=20
> Valid starting                Expires                Service principal
> 07/04/05 15:12:13  07/04/05 23:12:13  krbtgt/SUN.COM@SUN.COM
>         renew until 07/11/05 15:12:13, Etype(skey, tkt): AES-128 CTS mode=
 with 96-bit SHA-1 HMAC, AES-128 CTS mode with 96-bit SHA-1 HMAC

Ah, very cool. So in my test environment I have a KDC with a bunch of DES
encrypted principals. I changed the "enctypes" on both krb5.conf and kdc.co=
nf
=66rom des to rc4, des3, and des, and changed the password on my principal.=
 I
now  see:

Number of keys: 3
Key: vno 10, ArcFour with HMAC/md5, no salt
Key: vno 10, Triple DES cbc mode with HMAC/sha1, no salt
Key: vno 10, DES cbc mode with CRC-32, no salt
Attributes:

=66rom kadmin, great (though is that "no salt" supposed to be there?)!

However, klist -e shows:

[phil@frantic unstale]$ klist -e
Ticket cache: FILE:/tmp/krb5cc_36070
Default principal: phil@ISD.USC.EDU

Valid starting     Expires            Service principal
07/05/05 13:36:31  07/05/05 23:36:31  krbtgt/ISD.USC.EDU@ISD.USC.EDU
        Etype (skey, tkt): DES cbc mode with CRC-32, DES cbc mode with CRC-=
32=20
[phil@frantic unstale]$=20

and the logs show:

Jul 05 13:36:31 frantic.usc.edu krb5kdc[26284](info): AS_REQ (3 etypes {23 =
16
1}) 128.125.10.120: ISSUE: authtime 1120595791, etypes {rep=3D23 tkt=3D1 se=
s=3D1},
phil@ISD.USC.EDU for krbtgt/ISD.USC.EDU@ISD.USC.EDU

Neither the session key, nor my principal key seem to have been using the n=
ew
encryption... it's not clear to me why...

--=20
Phil Dibowitz
Systems Architect and Administrator
Enterprise Infrastructure / ISD / USC
UCC 180 - 213-821-5427


--BWpbUxt7sU2t3mXs
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.3 (GNU/Linux)

iD8DBQFCyvI17lkZ1Iyv898RAi1bAJ9CtR3xGmUMm9xIQ2BKKKOANfK9mACeNVRt
NODoCiQmda6utI3T6Ug4+ks=
=mVqA
-----END PGP SIGNATURE-----

--BWpbUxt7sU2t3mXs--

--===============29678941224227007==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit

________________________________________________
Kerberos mailing list           Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos

--===============29678941224227007==--

home help back first fref pref prev next nref lref last post