This FAQ entry (and the RFC itself) states that pre-authentication addresses a weakness in initial implementations of Kerberos that made it vulnerable to offline dictionary attacks.
The FAQ state:
The simplest form of preauthentication is known as PA-ENC-TIMESTAMP. This is simply the current timestamp encrypted with the user's key.
If an attacker manages to sniff a packet containing this preauthentication data, isn't this also vulnerable to a dictionary attack? I have the ciphertext, I know the original timestamp -- how is this scenario any different?