[33098] in Kerberos

home help back first fref pref prev next nref lref last post

Re: Cross realm breaks in one direction

daemon@ATHENA.MIT.EDU (Douglas E. Engert)
Thu Jan 13 14:20:04 2011

Message-ID: <4D2F505E.6030905@anl.gov>
Date: Thu, 13 Jan 2011 13:19:58 -0600
From: "Douglas E. Engert" <deengert@anl.gov>
MIME-Version: 1.0
To: kerberos@mit.edu
In-Reply-To: <124B2867-2679-4086-B7D4-96BD97CCA2CD@stanford.edu>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: kerberos-bounces@mit.edu



On 1/13/2011 12:14 PM, Booker Bense wrote:
> Any experience with
> USGCB (US Gov Computer Baseline) settings for windows systems?
>
> Our windows admins recently applied these settings for windows systems and the
> cross realm trust with our unix based KDC has broken in the direction of getting
> unix KDC service tickets with windows credentials. The other way still works just fine.
>
> The error a client gets is "KDC does not support enctype".  Looking at the logs, it does not appear
> that the unix KDC ever gets contacted.
>
> A list of possible suspect changes are
>
> Microsoft network client: Digitally sign communications (if server agrees): Enabled
>
> Microsoft network server: Digitally sign communications (always): Enabled
> Microsoft network server: Digitally sign communications (if client agrees): Enabled
>
> Network security: LAN Manager authentication level: Send NTLMv2 response only. Refuse LM&  NTLM
> Network security: LDAP client signing requirements: Negotiate signing
> Network security: Minimum session security for NTLM SSP based (including secure RPC) clients
>          Require NTLMv2 session security: Enabled
>          Require 128-bit encryption: Enabled
> Network security: Minimum session security for NTLM SSP based (including secure RPC) servers
>          Require NTLMv2 session security: Enabled
>          Require 128-bit encryption: Enabled
> Network security: Configure encryption types allowed for Kerberos
>          DES_CBC_CRC: Disabled
>          DES_CBC_MD5: Disabled
>          RC4_HMAC_MD5: Enabled
>          AES128_HMAC_SHA1: Enabled
>          AES256_HMAC_SHA1: Enabled
>          Future encryption types: Enabled
>
> Everything in the software stack should support  AES256_HMAC_SHA1 and that's the enctype used for
> everything in the get WIN service tickets with unix tgt's case.
>
> Doing the obvious thing of enabling DES didn't fix anything. Any suggestions?

The [MS-KILE]
http://download.microsoft.com/download/a/e/6/ae6e4142-aa58-45c6-8dcf-a657e5900cd3/%5BMS-KILE%5D.pdf

implies trustedDomain objectClass can now have the attribute msDS-SupportedEncryptionTypes

So it could be AD still thinks you KDC can only do DES.

http://technet.microsoft.com/en-us/library/ff646918(WS.10).aspx

has some commands to add RC4 or AES to cross realm and remove DES.


>
> thanks,
>
> - Booker C. Bense
>
>
>
> ________________________________________________
> Kerberos mailing list           Kerberos@mit.edu
> https://mailman.mit.edu/mailman/listinfo/kerberos
>
>

-- 

  Douglas E. Engert  <DEEngert@anl.gov>
  Argonne National Laboratory
  9700 South Cass Avenue
  Argonne, Illinois  60439
  (630) 252-5444
________________________________________________
Kerberos mailing list           Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos

home help back first fref pref prev next nref lref last post