On 12/16/21 4:38 AM, Dario García Díaz-Miguel wrote:
> Currently we have two supported and default enctypes for tkt and tgs. 
> However, now we have an application that does not support our current 
> supported enctypes so we have to add a new enctype.
> 
> Which is the correct procedure to add this enctype and to generate an 
> additional key for this enctype for each principal involved?
> 
> I suppose that the enctype used will be the strongest one of the supported 
> enctype keys existing for that principal.

You need to ensure the following:

* If the KDC has a permitted_enctypes setting, it needs to include the
new enctype.

* Server principals for the application must have a long-term key of
only that enctype (use "-e enctype" when provisioning the keytab).

* Clients must include that enctype in TGS requests they make.  This is
controlled by default_tgs_enctypes, or (in 1.18 and later) by
permitted_enctypes if default_tgs_enctypes isn't set.

It should not be necessary to change supported_enctypes.

The krb5 libraries do not have a concept of relative enctype strength.
Instead, they go by preference order when multiple enctypes are listed.
 So make sure to list the better ones first.

For more information, see:

https://web.mit.edu/kerberos/krb5-latest/doc/admin/enctypes.html
________________________________________________
Kerberos mailing list           Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos

Reply via email to