▲ | holowoodman 6 days ago | |||||||||||||||||||||||||
An actually useful mitigation would be to use service keytabs instead of service passwords. Because with a keytab, the keytab is a file that just contains an AES128/256/RC4 key instead of a password, which makes it sufficiently hard to guess. The service just uses this file to decrypt its service tickets then. However, keytab usage is rare in the Windows AD world because people don't seem to comprehend what a keytab is and does, and why it is far better than using passwords for services. | ||||||||||||||||||||||||||
▲ | p_ing 6 days ago | parent | next [-] | |||||||||||||||||||||||||
Keytab usage is rare because the service you intend to run under that service account does not support keytabs. There's also the knock-on effect of Kerberos being mostly hidden in Active Directory and creating keytabs requiring CLI tooling -- from way back when AD was a GUI only (mostly) affair for AD admins. | ||||||||||||||||||||||||||
| ||||||||||||||||||||||||||
▲ | LikesPwsh 5 days ago | parent | prev [-] | |||||||||||||||||||||||||
Group Managed Service Account is a better option than keytab if you're assuming Windows Server/Active Directory. |