As explained in the section "The problem with RC4-HMAC" of the following document, using the arcfour-hmac-md5 as encryption type for session keys is vulnerable to attacks based on MD5 collision: https://i.blackhat.com/EU-22/Thursday-Briefings/EU-22-Tervoort-Breaking-Kerberos-RC4-Cipher-and-Spoofing-Windows-PACs-wp.pdf This encryption type should be disallowed for session keys by default. Reproducible: Always
*** This bug has been marked as a duplicate of bug 2359672 ***
*** This bug has been marked as a duplicate of bug 2359705 ***