AW: Crypto with the Kerberos Login Handler

Ristow Rodrigo rodrigo.ristow at fhnw.ch
Tue Jan 3 15:36:47 GMT 2012


Hi Frederic,

We have the kerberos Idp working in our organization with:
- Win Server 2003 - AD and win7 - clients

- The "use DES encryption type" is not enabled for the user.
- java version "1.6.0_20"  OpenJDK Runtime Environment (IcedTea6 1.9.10) (rhel-1.23.1.9.10.el5_7-i386)

The principal/keytab were created with:

ktpass -princ HTTP/aai-logon.dev.fhnw.ch at DOMAIN.DS.FHNW.CH<mailto:HTTP/aai-logon.dev.fhnw.ch at DOMAIN.DS.FHNW.CH>

          -mapuser DOMAIN\serviceadmin.aaidevsso

          -crypto rc4-hmac-nt

          -ptype KRB5_NT_SRV_HST

          -pass HIDDEN

          -out c:\aaidevsso.edu.keytab




I suggest you the following steps to verify the problem:

1 - Check once more the ticket in the client-side:  you can use the klist  from MSDK (http://msdn.microsoft.com/de-de/windowsserver/bb980924).
The "HTTP/idp at DOMAIN" ticket must to be present (try to login again if not). Check again the encryption type, in my case:

C:\Program Files\Microsoft SDKs\Windows\v7.0>klist
Aktuelle Anmelde-ID ist 0:0xxxx
Zwischengespeicherte Tickets: (xx)
(...)
#x>     Client: myname @ DOMAIN.DS.FHNW.CH
        Server: HTTP/aai-logon.fhnw.ch @ ADM.DS.FHNW.CH
        KerbTicket (Verschlüsselungstyp): RSADSI RC4-HMAC(NT)
        Ticketkennzeichen 0xxxxxxxx -> forwardable renewable pre_authent
        Sitzungsschlüsseltyp: RSADSI RC4-HMAC(NT)
...

2 - Check the Ticket in the Idp. Maybe is better do not use the keytab file now. e.g.

[root@]# kinit HTTP/aai-logon.fhnw.ch at ADM.DS.FHNW.CH
Password: xxxx
[root@]# klist -e -5
Ticket cache: FILE:/tmp/xxxx_0
Default principal: HTTP/aai-logon.fhnw.ch at ADM.DS.FHNW.CH
Valid starting     Expires            Service principal
01/03/xxxx:08:04  01/04/xx 01:08:05  krbtgt/ADM.DS.FHNW.CH at ADM.DS.FHNW.CH
        renew until 01/04/xxxx:xx:04, Etype (skey, tkt): ArcFour with HMAC/md5, ArcFour with HMAC/md5

3 - Check the Key Version Number (KVNO). I saw that you are informing "kvno 0" with ktpass, if the ticket has a kvno it must match with the keytab file.

[root at aai-logon shibboleth-idp]# kvno HTTP/aai-logon.fhnw.ch at ADM.DS.FHNW.CH
HTTP/aai-logon.fhnw.ch at ADM.DS.FHNW.CH: kvno = x

4 - Try to configure the Kerberos Idp with the options: kerberosCfg  and password  (without keytab). e.g.

    <ph:LoginHandler xsi:type="krb:KERBEROS"
...
                  kerberosCfg="/etc/krb5.conf">
        <krb:Realm domain=" DOMAIN.FHNW.CH">
            <krb:principal>HTTP/aai-logon.test.fhnw.ch at ADM.DS.FHNW.CH</krb:principal>
            <krb:password>xxx</krb:password>
        </krb:Realm>

5 - Inform the allowed  enctypes (http://docs.oracle.com/javase/6/docs/technotes/guides/security/jgss/jgss-features.html) in the krb.ini, e.g.
[libdefaults]

default_tgt_enctypes = rc4-hmac

 default_tgs_enctypes= rc4-hmac

permitted_enctypes = rc4-hmac

...


I hope that helps,

Rodrigo

Von: users-bounces at shibboleth.net [mailto:users-bounces at shibboleth.net] Im Auftrag von MOTTE Frederic
Gesendet: Dienstag, 20. Dezember 2011 08:09
An: users at shibboleth.net
Betreff: Crypto with the Kerberos Login Handler

Hi,

I have a AD on a windows 2008R2 and the idp is on a debian (jdk 1.6.0_29-b11)

I have some problem using the kerberos login handler.
My first test was to create a keytab using the RC4-HMAC crypto.
C:\Users\Administrateur>ktpass -princ HTTP/idp.cersso.com at CERSSO.COM<mailto:HTTP/idp.cersso.com at CERSSO.COM> -pass Master2008 -mapuser idp -out c:\temp\idp.http.keytab  -ptype KRB5_NT_PRINCIPAL -crypto RC4-HMAC-NT  kvno 0

When I use it on the debian platform to realise the kinit, it's OK but when I use is into the loginHandler configuration, I have a checksum exception. In the wiki, the possible solutions are to activate the DES into the user profil or update the JKD version (if under 1.5.xxx)

consequently, I try to realise a keytab with the DES-CBC-MD5 crypto option, and  when I realise the kinit in order to validate the keytab, I have the following error :

kinit (v5), KDC has no support for encrytpion type while getting initial credentials.

Can you help me in order to solve the crypto problem?

Thanks for any help.

Frederic

[@@THALES GROUP RESTRICTED@@]

-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://shibboleth.net/pipermail/users/attachments/20120103/c4f15ac3/attachment-0001.html 


More information about the users mailing list