You can also use klist -e to check the tickets in the credentials cache and the type of encryption that the credentials use:
node_name: >klist -e
The output is similar to:
Ticket cache: FILE:/tmp/krb5cc_0
Default principal: tester2@KERBEROS_REALM
Valid starting Expires Service principal
10/15/10 16:05:09 10/16/10 02:05:10 krbtgt/
ESROOTDOM.ESDEV.TDAT@ESROOTDOM.ESDEV.TDAT
renew until 10/16/10 16:05:09, Etype (skey, tkt): ArcFour with
HMAC/md5, ArcFour with HMAC/md5