This is a discussion on Re: Denial of service when using Active Directory for KDC ? - Kerberos ; On Thu, 2005-05-05 at 21:52 +0100, Markus Moeller wrote: > Tim, > in our setup we use computer accounts instead of user accounts, and don't > have experienced this issue. I think the latest ktpass can do this with > ...
On Thu, 2005-05-05 at 21:52 +0100, Markus Moeller wrote:
> in our setup we use computer accounts instead of user accounts, and don't
> have experienced this issue. I think the latest ktpass can do this with
> mapuser having a $ at the end.
I don't know about computer accounts, but this DoS is not possible if
you are using service principals. Active Directory doesn't allow login
for service principals, and keytab are only useful to decrypt tickets.
Making an ldap query to AD, you can get things like
In this case, only HOST/sist03lnx keytab works with `kinit -k`. If you
attempt to get a TGT with the other principals, you get nothing.
This e-mail message and any attached files are intended SOLELY for the addressee/s identified
herein. It may contain CONFIDENTIAL and/or LEGALLY PRIVILEGED information and may not
necessarily represent the opinion of this company. If you receive this message in ERROR,
please immediately notify the sender and DELETE it since you ARE NOT AUTHORIZED to use,
disclose, distribute, print or copy all or part of the contained information. Thank you.
Kerberos mailing list Kerberos@mit.edu