cancel
Showing results for 
Search instead for 
Did you mean: 

Security Level of Kerberos / SPNego Algorithms?

LutzR
Active Contributor
0 Kudos

Dear all,

some algorithms got a bad reputation over lasts months and years. I am no algorithm expert but do some research on recommendations, standards and regulations to give some guidance to our organization.

So I learnt from TLS discussions that DES, MD5 and RC4 are to be considered broken.

What about Kerberos/SPNego? Do we have to consider RC4 and DES as broken for Kerberos too? I am not able to google a decent statement on this.

When I create a keytab in transaction SPNego I generate keys for the following algorithms:


Does anybody know how Kerberos negotiates which algorithm to use?

SAP systems seem to prefer RC4 over AES during handshake. Commandline tool klist on my pc shows that all my Kerberos token are AES with the exception of those for SAP systems which are RC4.


Shall I remove all DES and RC4 entries for security reasons?

This would only leave AES128-CTS-HMAC-SHA1-96 and AES256-CTS-HMAC-SHA1-96.

Are there any known compatibility issues when limiting Kerberos to AES?

Luckily we don't have to support any Windows XP clients anymore.

I am asking for both Kerberos based SNC for GUI and RFC-Clients as well as for SPNego in browsers for both ABAP and JAVA stack (if this makes any difference).

Thanks a lot!

Lutz

Message was edited by: Lutz Rottmann

Hi, I moved this to SAP Single Sign On while hoping to get some feedback here. Regards, Lutz

Accepted Solutions (1)

Accepted Solutions (1)

Former Member
0 Kudos

Hello,

See:

AES is the only good choice if your clients are Windows Vista or above and your servers are Windows 2008 R2 or above.

If you have a mix of Windows + Linux you'll have to investigate further.

Regards,

Stephane.

Answers (0)