Windows Vista introduced support for AES-encrypted Kerberos tickets, 128-bit and 256-bit
AES encryption cannot be used for Kerberos negotiation with cluster names; only up to RC4-HMAC is supported.
When requesting a Kerberos ticket for a Service Principal Name (SPN), the Key Distribution Center (KDC) service on the domain controller checks two settings to determine the encryption used for the ticket to give to the client:
· msDS-SupportedEncryptionTypes attribute on the computer object with which the SPN is associated.
· KdcUseRequestedEtypesForTickets registry value exists and is non-zero.
msDS-SupportedEncryptionTypes is only created on computer objects in AD representing physical computers than are running Windows Vista or Windows Server 2008, where it is set to a value of 31 which indicates a maximum supported encryption level of 256-bit AES.
Computer objects representing cluster names do not have this attribute set by default, so they are treated as legacy Windows versions, supporting up to RC4-HMAC encryption (an effective msDS-SupportedEncryptionTypes value of 7).
If the attribute is set a computer object representing a cluster name, such that the 4th or 5th least significant bits are set, then the problem described above will occur as the KDC will encrypt the Kerberos ticket using AES.
KdcUseRequestedEtypesForTickets was introduced in Windows Server 2003 by the hotfix in KB article 833708 to allow the clients to determine the encryption level for the tickets they request - this was to allow applications using Kerberos that do only support encryption lower than RC4-HMAC to function.
The value is located in the reigstry under the following key:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Kdc
It is not present normally and defaults to an effetive setting of 0, but if it exists on the domain controller contacted with the Kerberos request and is non-zero then the KDC will use the highest encryption that the client supports for the ticket.
If the value is set to a non-zero value and the client requesting the ticket is Windows Vista or later, then the Kerberos ticket will be AES-encrypted and the problem described above will occur.
The problem may also occur with Microsoft Cluster Services (MSCS) cluster configurations.
For more information please see the following Microsoft Knowledgebase article:
833708 KDC does not allow clients to specify an etype in Windows Server 2003
http://support.microsoft.com/default.aspx?scid=kb;EN-US;833708