From: Engert, Douglas E.
Sent: Tuesday, July 27, 2004 3:46 PM
To: Thommes, Michael M.
Subject: Re: FW: [ActiveDir] Kerberos interoperability question
The client is asking for a ticket with specific enctypes types. The KDC says it does not have a key for the user with any of these encrytion types.Mike can you forward on my reply below?We are trying to have our users authenticate to an MIT5 Kerberos realm. I've followed the process for setting up an XP client to allow a user to get a ticket from the realm, but I keep getting event id 529 and 537 errors, which are pretty cryptic. On the Unix side, the error is as below:
-----Original Message-----
From: Chris Flesher [mailto:[EMAIL PROTECTED]]
Sent: Tuesday, July 27, 2004 2:34 PM
To: [EMAIL PROTECTED]
Subject: [ActiveDir] Kerberos interoperability questionJul 27 13:11:07 kerberos-beta00 krb5kdc[1347]: [ID 702911 local3.info] AS_REQ (7 etypes {23 -133 -128 3 1 24 -135}) 128.xxx.xxx.xxx: BAD_ENCRYPTION_TYPE: [EMAIL PROTECTED] for krbtgt/[EMAIL PROTECTED], KDC has no support for encryption type
The KDC may only have a 3des key type of 16 or 7 registered. Ask you Kerberos admin. What version of the KDC code are you running?
You may have to add another key for the user.
The only common ones between MIT and Microsoft currently are 1, 3, 23. 17, and 18 are in the works.
The "standard" enctypes from the soon to be released
draft-ietf-krb-wg-crypto-07.txt
The -133, -128 and -135
are Microsoft specific.
encryption
type
etype section or comment
-----------------------------------------------------------------
des-cbc-crc
1
6.2.3
des-cbc-md4
2
6.2.2
des-cbc-md5
3
6.2.1
[reserved]
4
des3-cbc-md5
5
[reserved]
6
des3-cbc-sha1
7
dsaWithSHA1-CmsOID
9 (pkinit)
md5WithRSAEncryption-CmsOID
10 (pkinit)
sha1WithRSAEncryption-CmsOID
11 (pkinit)
rc2CBC-EnvOID
12 (pkinit)
rsaEncryption-EnvOID
13 (pkinit from PKCS#1 v1.5)
rsaES-OAEP-ENV-OID
14 (pkinit from PKCS#1 v2.0)
des-ede3-cbc-Env-OID
15 (pkinit)
des3-cbc-sha1-kd
16
6.3
aes128-cts-hmac-sha1-96
17 [KRB5-AES]
aes256-cts-hmac-sha1-96
18 [KRB5-AES]
rc4-hmac
23 (Microsoft)
rc4-hmac-exp
24 (Microsoft)
subkey-keymaterial
65 (opaque; PacketCable)
--
Has anyone ever come across this type of scenario, and if so, how did you fix it?
Chris FlesherThe University of ChicagoNSIT/DCS1-773-834-8477
Douglas E. Engert <[EMAIL PROTECTED]>
Argonne
National Laboratory
9700 South Cass Avenue
Argonne,
Illinois 60439
(630) 252-5444
