[37075] in Kerberos

home help back first fref pref prev next nref lref last post

Re: ktadd default enctype

daemon@ATHENA.MIT.EDU (Greg Hudson)
Fri Jun 5 11:12:25 2015

Message-ID: <5571BC10.4080507@mit.edu>
Date: Fri, 05 Jun 2015 11:11:12 -0400
From: Greg Hudson <ghudson@mit.edu>
MIME-Version: 1.0
To: John Devitofranceschi <jdvf@optonline.net>, kerberos@mit.edu
In-Reply-To: <6DBA609A-440B-4C5D-A62E-EE0CEFD471B3@optonline.net>
Content-Type: text/plain; charset="windows-1252"
Errors-To: kerberos-bounces@mit.edu
Content-Transfer-Encoding: 8bit

On 06/05/2015 07:24 AM, John Devitofranceschi wrote:
> How is ktadd *supposed* to figure out which enctype(s) to use?

In the absence of the optional keysaltlist parameter, it's supposed to
be determined by supported_enctypes on the KDC.

> But when we run ktadd the resulting keytab’s key has des-cbc-md5
> 
> The  client is an Oracle Linux with 1.6.1 krb5 client software.
> 
> Also, the KDC is using Sun Solaris 10 Kerberos software (not MIT).

The short answer: Solaris implements transitional logic which isn't
really compatible with the MIT kadmin client for this operation.  We
have a workaround in MIT krb5 release 1.13.

kadmin's ktadd invokes a chrand RPC in order to get the new keys for the
keytab.  There are two versions of this RPC, chrand_principal and
chrand_principal3.  The former accepts a principal name and optionally
returns a list of keys; the latter also accepts an optional keysalt list.

Prior to release 1.13, the MIT krb5 behavior is to invoke
chrand_principal3 if a keysalt list is specified, and chrand_principal
otherwise, so that typical randomize-key requests work against old
kadmind servers without an extra round trip.

In Solaris Kerberos, however, the client behavior is to always invoke
chrand_principal3 and then fall back to chrand_principal if that fails.
 Furthermore, the kadmind server assumes that a chrand_principal request
must come from an old client, and picks a different keysalt list (which
I guess is just des-cbc-md5:normal).

MIT krb5 1.13 matches the Solaris Kerberos client behavior and should
not display the odd behavior you're seeing.
________________________________________________
Kerberos mailing list           Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos


home help back first fref pref prev next nref lref last post