Kerberos 4769 still using RC4 (0x17) even though AES is enabled – why?

Posted by maxcoder88@reddit | sysadmin | View on Reddit | 12 comments

Hi,

I’m investigating Kerberos Event ID 4769 where the service ticket is still being encrypted with RC4 (0x17), even though AES is enabled and advertised by all sides.

SQLCLS$ (Cluster computer account)

Here is the event:

A Kerberos service ticket was requested.

Account Information:

Account Name: ADMIN@CONTOSO.DOMAIN

Account Domain: CONTOSO.DOMAIN

Logon GUID: {8d7a3861-1771-7308-2117-75941ece4a7b}

Service Information:

Service Name: SQLCLS$

Service ID: CONTOSO\SQLCLS$

MSDS-SupportedEncryptionTypes: 0x27 (DES, RC4, AES-Sk)

Available Keys: AES-SHA1, RC4

Domain Controller Information:

MSDS-SupportedEncryptionTypes: 0x1F (DES, RC4, AES128-SHA96, AES256-SHA96)

Available Keys: AES-SHA1, RC4

Network Information:

Advertized Etypes:

AES256-CTS-HMAC-SHA1-96

AES128-CTS-HMAC-SHA1-96

Additional Information:

Ticket Encryption Type: 0x17

Session Encryption Type: 0x12

Failure Code: 0x0

So:

The client advertises AES128/AES256

The DC supports AES

The service account supports AES

But the ticket is still issued using RC4 (0x17)

Why would Kerberos choose RC4 in this case?

Is this typically caused by:

Old passwords / legacy keys on the service or user account?

Missing msDS-SupportedEncryptionTypes on the user?

What is the correct remediation path?