You can also use klist -e to check the tickets in the credentials cache and the type of encryption that the credentials use:
node_name: >klist -e
The output is similar to:
Ticket cache: FILE:/tmp/krb5cc_0 Default principal: tester2@KERBEROS_REALM Valid starting Expires Service principal 10/15/10 16:05:09 10/16/10 02:05:10 krbtgt/ ESROOTDOM.ESDEV.TDAT@ESROOTDOM.ESDEV.TDAT renew until 10/16/10 16:05:09, Etype (skey, tkt): ArcFour with HMAC/md5, ArcFour with HMAC/md5