Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

support adding AES keytab entries for Active Directory #484

Open
wants to merge 3 commits into
base: master
Choose a base branch
from

Conversation

rilott
Copy link

@rilott rilott commented Aug 25, 2022

Microsoft active directory uses it's own AES salt for keytab entries. This PR adds a new function AddActiveDirectoryComputerAccountEntry which handles this, and doesn't modify the normal AddEntry function.

I tried to add this with minimal code changes/duplication.

Partially fixes #416 (computer accounts only)
All tests pass

Thanks!
Ross

@gaxelac0
Copy link

The methods worked for me as the salt for the tickets emitted by Active Directory comes with the format
DOMAINsamAccountName

And gokrb5 tries to generate a salt with cname.GetSalt method, concatenating all the Names of the SPN which is wrong, ending with something like this:
DOMAINHTTPservicePrincipalName.DOMAIN

With the salt like that, the decryption will fail.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Keytab created for etype AES256/AES128 does not work with Active Directory
2 participants