[OpenAFS] Windows auth against Kerb5
David Botsch
dwb7@ccmr.cornell.edu
Fri, 18 Jun 2004 13:21:11 -0400
We decided to get the des-cbc-md5:normal a run to see if that worked
with Windows.
It almost works. There seems to be some weirdness in the
support_enctypes in kdc.conf...
kdc_supported_enctypes = des3-cbc-sha1:normal des3-hmac-sha1:normal
des-cbc-crc:afs3 des-cbc-crc:normal des-cbc-md5:normal
supported_enctypes = des3-cbc-sha1:normal des3-hmac-sha1:normal
des-cbc-crc:afs3 des-cbc-crc:normal des-cbc-md5:normal
However, if after restart krb5kdc and kadmind, I change the password of
a user, I get the following:
Number of keys: 3
Key: vno 19, Triple DES cbc mode with HMAC/sha1, no salt
Key: vno 19, DES cbc mode with CRC-32, AFS version 3
Key: vno 19, DES cbc mode with CRC-32, no salt
Now, if I rearrange the order of those some (in kdc.conf), I do get the
des-cbc-md5 key but am then missing one or more of the other key:salt
combos.
On 2004.06.18 12:07 Jeffrey Altman wrote:
> I recommend you add support either for RC4-HMAC keys to your
> principals.
> RC4-HMAC keys will be the first enctype in the list from Windows
> clients.
> The second enctype in the list will be DES-CBC-MD5; followed by
> DES-CBC-CRC.
>
> Jeffrey Altman
>
>
> David Botsch wrote:
>
>> So, we've migrated our kaserver to kerb5 (yay!).
>>
>> Now, what we'd like to do is to get Windows systems to be able to
>> authenticate
>> against kerberos 5. To maintain compatibility with clients out
>> there, we still
>> have users with AFS salted keys. So, a user's entry might look like:
>>
>> kadmin: getprinc bozo
>> Principal: bozo@MSC.CORNELL.EDU
>> Expiration date: [never]
>> Last password change: Thu Jun 17 18:20:45 EDT 2004
>> Password expiration date: [none]
>> Maximum ticket life: 30 days 00:00:00
>> Maximum renewable life: 30 days 00:00:00
>> Last modified: Thu Jun 17 18:20:45 EDT 2004 Last successful
>> authentication: [never]
>> Last failed authentication: [never]
>> Failed password attempts: 0
>> Number of keys: 3
>> Key: vno 12, Triple DES cbc mode with HMAC/sha1, no salt
>> Key: vno 12, DES cbc mode with CRC-32, AFS version 3
>> Key: vno 12, DES cbc mode with CRC-32, no salt
>> Attributes:
>> Policy: [none]
>>
>>
>> Now, I've been told that this is just an unordered collection of
>> keys. Yet,
>> somehow, it seems that in the case of windows, whatever happens to
>> be the first
>> one is the only one that's tried (Windows doesn't specify which one
>> it wants
>> and so the server just returns the first one in its list and auth
>> fails?).
>>
>> So, other than my hacking up create user and change password scripts
>> to do
>> something like "-e des-cbc-crc:normal des-cbc-crc:v4
>> des3-cbc-sha1:normal" so
>> that this unordered collection is in an order that Windows works, is
>> the only
>> solution to sacrifice all other keys so that the one Windows likes
>> is the only
>> one there?
>>
>> Thanks!
>>
>>
--
********************************
David William Botsch
Consultant/Advisor II
CCMR Computing Facility
dwb7@ccmr.cornell.edu
********************************