Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Kerberos for mscertsrv_ca_handler.py #153

Closed
3engel opened this issue Apr 9, 2024 · 3 comments
Closed

Kerberos for mscertsrv_ca_handler.py #153

3engel opened this issue Apr 9, 2024 · 3 comments
Labels
completed enhancement New feature or request

Comments

@3engel
Copy link

3engel commented Apr 9, 2024

The mscertsrv_ca_handler.py handler doesn't support Kerberos authentications like mswcce_ca_handler.py.
However, using NTLM is a security issue and therefore Kerberos is recommended. Therefore it would be great to support kerberos also for mscertsrv_ca_handler.py.

@grindsa grindsa added the enhancement New feature or request label Apr 9, 2024
@grindsa
Copy link
Owner

grindsa commented Apr 11, 2024

You proposal makes sense however the implementation is not that straight forward as it also requires modifications on the certsrv module. I am planning to look into it as part of next release.

As I am not an MS expert. Do you know how to enable Kerberos for on the MS Web Enrollment Service?

@3engel
Copy link
Author

3engel commented Apr 12, 2024

Sure. Since the MS Web Enrollment Service is using IIS (Internet Information Services / MS Web Server) the authentication configured there. In IIS under the CertSrv node there is an "Authentication" Option. "Windows Authentication" should be enabled.
In the providers list "Negotiate:Kerberos" should be configured as the only option.
image

It is also discribed here: https://support.microsoft.com/en-gb/topic/kb5005413-mitigating-ntlm-relay-attacks-on-active-directory-certificate-services-ad-cs-3612b773-4043-4aa9-b23d-b87910cd3429#:~:text=Disable%20NTLM%20Authentication%20on%20your,Restrict%20NTLM%3A%20Incoming%20NTLM%20traffic.

Many thanks for considering it.

@grindsa
Copy link
Owner

grindsa commented Jul 5, 2024

Feature made it into v0.35. Thus, closing this issue. In case you have comments feel free to reopen...

@grindsa grindsa closed this as completed Jul 5, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
completed enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

2 participants