Guide: Implementing PAC Validation with Kerberos Armoring (FAST)

 

Part 1: Enforcing PAC Validation via Kerberos Armoring (FAST)

Kerberos Armoring (also known as FAST – Flexible Authentication Secure Tunneling) enhances the security of Kerberos authentication. It ensures that sensitive metadata like the Privilege Attribute Certificate (PAC) is encrypted and validated, effectively mitigating attacks such as Diamond Ticket or forged PAC abuse.

Requirements

  • Domain Controllers must run Windows Server 2012 or later.
  • Clients must be Windows 8 or Server 2012 or later.
  • Recommended domain functional level: Windows Server 2012 or higher.

Step 1: Configure Domain Controllers via Group Policy

Create or edit a GPO linked to the "Domain Controllers" Organizational Unit.

Navigate to:

Computer Configuration → Policies → Administrative Templates → System → KDC

Set the following:

  • KDC support for claims, compound authentication, and Kerberos armoring: Enabled 
  • Value: Always provide claims and compound authentication

  • KDC support for Kerberos armoring: Enabled 
  • Value: Supported (or Required in the final phase)

Note: Do not set this to "Required" initially unless you are certain all clients support it.

Step 2: Enable FAST Support on Clients

Create or update a GPO applied to domain-joined clients and member servers.

Navigate to:

Computer Configuration → Policies → Administrative Templates → System → Kerberos

Set:

  • Support for claims, compound authentication, and Kerberos armoring: Enabled

This allows the client to participate in FAST and consume compound authentication and claims.

Step 3: Apply GPO and Reboot

After applying both policies, either reboot the systems or use the command gpupdate /force on both domain controllers and clients to apply the settings.

Part 2: Auditing Systems for FAST and PAC Validation Compatibility

Step 1: Enable Kerberos Logging on Domain Controllers

In Group Policy, enable the following settings:

Navigate to:

Computer Configuration → Policies → Windows Settings → Security Settings → Advanced Audit Policy Configuration → Audit Policies → Logon/Logoff

Enable:

  • Audit Kerberos Authentication Service: Success, Failure
  • Audit Kerberos Service Ticket Operations: Success, Failure
  • Audit Logon: Success, Failure
  • Audit Special Logon: Success

This ensures Kerberos events are logged for analysis.

Step 2: Identify Legacy or Incompatible Systems

Analyze these Event IDs:

  • 4768: TGT requests (look for anomalies or failures)
  • 4769: Service ticket requests (look for RC4 encryption or missing fields)
  • 4771: Pre-authentication failures (may indicate incompatible clients)
  • 4624: Logon success (Logon Type 3 from legacy systems)
  • 4625: Logon failures

Legacy or broken implementations may request tickets using RC4 or trigger frequent failures.

Step 3: Query Logs for RC4 Usage

Run the following PowerShell on a domain controller:


Get-WinEvent -FilterHashtable @{LogName='Security'; ID=4769} | Where-Object { $_.Properties[8].Value -like "*RC4*" } | Format-Table TimeCreated, @{n='User';e={$_.Properties[0].Value}}, @{n='Service';e={$_.Properties[1].Value}}, @{n='Encryption';e={$_.Properties[8].Value}}

This lists all Kerberos service ticket requests using legacy RC4 encryption, which may indicate outdated systems.

Part 3: Handling Incompatible Systems

Option 1: Update Systems

Upgrade the affected services, clients, or middleware to a version that supports Kerberos Armoring and PAC validation.

Option 2: Isolate Legacy Systems

Move legacy systems into a separate OU and exclude them from the GPO that enforces FAST and claims. Monitor them more aggressively.

Option 3: Conditional Rollout

Instead of enforcing FAST globally, apply it only to sensitive services or pilot groups until all systems are verified compatible.

Part 4: Phased Rollout Plan

PhaseAction
Phase 1Enable audit policies and log Kerberos events
Phase 2Deploy FAST-support GPO to pilot OU (clients and DCs)
Phase 3Audit tickets for RC4 usage and compatibility
Phase 4Expand GPO coverage to all modern systems
Phase 5Segregate or replace non-compliant systems
Phase 6Change KDC policy to "Require FAST" for full enforcement

Enregistrer un commentaire

Plus récente Plus ancienne