Why is Kerberos Using RC4 Instead of AES for Ticket Encryption?

0
6
Asked By TechieTurtle42 On

I'm looking into an issue with Kerberos Event ID 4769 where the service ticket is still being encrypted with RC4 (0x17), even though AES is enabled and should be available. Here are some details:

- The service account (SQLCLS$) is requesting a ticket.
- The client advertises AES128 and AES256.
- The Domain Controller supports AES.
- Yet, the ticket issued is still using RC4.

Could this happen due to old passwords or legacy keys? Or could it be because of missing msDS-SupportedEncryptionTypes on the user? What's the best way to fix this?

2 Answers

Answered By AdminWizard58 On

Have you checked if the DefaultDomainSupportedEncTypes is set? If it's not configured on your DCs, that could definitely lead to issues. You mentioned using Group Policy for setting Kerberos encryption types, just make sure all the required types are allowed and that the service account has the proper SPNs registered.

Answered By SystemGuru99 On

It sounds like you might not have updated the passwords when switching ciphers or you could be missing the Service Principal Name (SPN) for SQL. It's pretty common to run into these issues if the service account isn't properly configured for the newer encryption methods.

Related Questions

LEAVE A REPLY

Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.