[33098] in Kerberos
Re: Cross realm breaks in one direction
daemon@ATHENA.MIT.EDU (Douglas E. Engert)
Thu Jan 13 14:20:04 2011
Message-ID: <4D2F505E.6030905@anl.gov>
Date: Thu, 13 Jan 2011 13:19:58 -0600
From: "Douglas E. Engert" <deengert@anl.gov>
MIME-Version: 1.0
To: kerberos@mit.edu
In-Reply-To: <124B2867-2679-4086-B7D4-96BD97CCA2CD@stanford.edu>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: kerberos-bounces@mit.edu
On 1/13/2011 12:14 PM, Booker Bense wrote:
> Any experience with
> USGCB (US Gov Computer Baseline) settings for windows systems?
>
> Our windows admins recently applied these settings for windows systems and the
> cross realm trust with our unix based KDC has broken in the direction of getting
> unix KDC service tickets with windows credentials. The other way still works just fine.
>
> The error a client gets is "KDC does not support enctype". Looking at the logs, it does not appear
> that the unix KDC ever gets contacted.
>
> A list of possible suspect changes are
>
> Microsoft network client: Digitally sign communications (if server agrees): Enabled
>
> Microsoft network server: Digitally sign communications (always): Enabled
> Microsoft network server: Digitally sign communications (if client agrees): Enabled
>
> Network security: LAN Manager authentication level: Send NTLMv2 response only. Refuse LM& NTLM
> Network security: LDAP client signing requirements: Negotiate signing
> Network security: Minimum session security for NTLM SSP based (including secure RPC) clients
> Require NTLMv2 session security: Enabled
> Require 128-bit encryption: Enabled
> Network security: Minimum session security for NTLM SSP based (including secure RPC) servers
> Require NTLMv2 session security: Enabled
> Require 128-bit encryption: Enabled
> Network security: Configure encryption types allowed for Kerberos
> DES_CBC_CRC: Disabled
> DES_CBC_MD5: Disabled
> RC4_HMAC_MD5: Enabled
> AES128_HMAC_SHA1: Enabled
> AES256_HMAC_SHA1: Enabled
> Future encryption types: Enabled
>
> Everything in the software stack should support AES256_HMAC_SHA1 and that's the enctype used for
> everything in the get WIN service tickets with unix tgt's case.
>
> Doing the obvious thing of enabling DES didn't fix anything. Any suggestions?
The [MS-KILE]
http://download.microsoft.com/download/a/e/6/ae6e4142-aa58-45c6-8dcf-a657e5900cd3/%5BMS-KILE%5D.pdf
implies trustedDomain objectClass can now have the attribute msDS-SupportedEncryptionTypes
So it could be AD still thinks you KDC can only do DES.
http://technet.microsoft.com/en-us/library/ff646918(WS.10).aspx
has some commands to add RC4 or AES to cross realm and remove DES.
>
> thanks,
>
> - Booker C. Bense
>
>
>
> ________________________________________________
> Kerberos mailing list Kerberos@mit.edu
> https://mailman.mit.edu/mailman/listinfo/kerberos
>
>
--
Douglas E. Engert <DEEngert@anl.gov>
Argonne National Laboratory
9700 South Cass Avenue
Argonne, Illinois 60439
(630) 252-5444
________________________________________________
Kerberos mailing list Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos