Kerberos hardening

Posted by cgklowd@reddit | sysadmin | View on Reddit | 15 comments

I've been following along with the Kerberos hardening publications from Microsoft for some time.

A while back I kicked on some rc4 auditing and early on addressed my accounts with SPNs and very old service accounts. That reduced the noise quite a bit. I haven't seen rc4 activity in some time.

Fast forward to last few months and the latest guidance was to turn on auditing from the new reg key that gets enabled after patching dcs in 2026, most dcs are very current, all current enough to support the audit/disable key settings.

The RC4DefaultDisablementPhase value has been set to 1 on all dcs for over a month and no events have been logged. Here I'm thinking I'm in good shape.

On a given dc I am running get-kerbencryptionusage.ps1 -encryption RC4

And get unexpected results.

A Linux appliance of mine is the only thing generating events this script detects.

Fields are as follows:

MachineName (my dc)

Time (timestamp)

Requestor (IP address of appliance)

Source (appliancename$@domain)

Target (krbtgt)

Type (TGS)

Ticket (AES256-SHA96)

SessionKey (RC4)

Interesting I thought... Ok well I'll upgrade the reg key to 2 (disable) but I still see these events and the appliance still seems fine.

I expected the appliance to break and see some audit entries (201-209) if I needed to worry but the appliance is working and there are no audit events (201-209)...

I opened a ticket with he vendor when I first saw this and expected after enforcing rc4 disablement things to break and show them but here we are...