I am using keytab files for Linux systems to authenticate services with kerberos. I am wondering how this password is actually stored in this keytab file. As we know in / etc / passwd, passwords are saved after applying the one-way hashing method - therefore, it is impossible to calculate the plaintext password from it.
But how is this done in the keytab file? Does the process using keytab somehow need to know the password for user authentication ?! Is it encrypted with a master password, so can it be decrypted?
I use this to create a keytab file:
$ ktutil
ktutil: addent -password -p my_user@MYREALM -k 1 -e rc4-hmac
Password for my_user@MYREALM:
ktutil: wkt my_user.keytab
ktutil: quit
With this keytab, I can get krbtgt without entering a password. When creating keytab, there is no connection with AD / KDC (therefore, there is no common secret that could be added for signing or something else).
So how is the password encrypted in keytab? If this is not a hashing algorithm, is it possible to decrypt it?
source
share