I hate those friggin obscure links Microsoft uses all the time.... -------------------------------------------------------------- Roger D. Seielstad - MTS MCSE MS-MVP Sr. Systems Administrator Inovis Inc.
> -----Original Message----- > From: Michael B. Smith [mailto:[EMAIL PROTECTED] > Sent: Thursday, January 29, 2004 8:31 AM > To: [EMAIL PROTECTED] > Subject: RE: [ActiveDir] Change in A/D security between 2k and 2k3 > > > http://microsoft.com/mps > > -----Original Message----- > From: [EMAIL PROTECTED] > [mailto:[EMAIL PROTECTED] On Behalf Of > Roger Seielstad > Sent: Wednesday, January 28, 2004 7:58 AM > To: [EMAIL PROTECTED] > Subject: RE: [ActiveDir] Change in A/D security between 2k and 2k3 > > Have a link to the MPS? > > -------------------------------------------------------------- > Roger D. Seielstad - MTS MCSE MS-MVP > Sr. Systems Administrator > Inovis Inc. > > > > -----Original Message----- > > From: Michael B. Smith [mailto:[EMAIL PROTECTED] > > Sent: Wednesday, January 28, 2004 1:24 AM > > To: [EMAIL PROTECTED] > > Subject: RE: [ActiveDir] Change in A/D security between 2k and 2k3 > > > > > > Doing non-GUI provisioning for Exchange is a PITA, at best. > > Not to mention poorly documented. I've got way too many lines of > > vbscript for my environment, and even so, I couldn't figure > out how to > > do some of it in script (primarily address list ACEs). > > > > Microsoft's MPS for Exchange 2003 is _slick_. But I haven't had a > > chance to spend any time looking under the hood yet. > > > > While you're here -- some info/questions about a tool near/dear to > > your heart -- adfind: > > > > It appears to have an off-by-one error (or something) -- it doesn't > > seem to display the primary group for a user in the > memberOf attribute > > (does that mean it isn't there?) > > > > Prolly somewhat related to the above, it doesn't decode > primaryGroupID > > into a name. > > > > msExchMailboxSecurityDescriptor: â <-- displays a non-printable > > character here > > > > It would be nice to be able to suppress the display of blobs (like > > msExchRecordedName and mSMQSignCertificates). > > > > Thanks again, > > Michael > > > > -----Original Message----- > > From: [EMAIL PROTECTED] > > [mailto:[EMAIL PROTECTED] Behalf Of joe > > Sent: Wednesday, January 28, 2004 1:07 AM > > To: [EMAIL PROTECTED] > > Subject: RE: [ActiveDir] Change in A/D security between 2k and 2k3 > > > > > > LOL no problem... Joe's late night troubleshooting service > at your... > > Well service. > > > > Now we have found we actually have a bunch of garbage in > many of our > > proxyaddresses attributes... Trying to pull all that out... Another > > perl script of course. Going to have to chat with the > people who do > > the data provisioning in the morning.... > > > > > > joe > > > > > > -----Original Message----- > > From: [EMAIL PROTECTED] > > [mailto:[EMAIL PROTECTED] On Behalf Of Michael B. > > Smith > > Sent: Wednesday, January 28, 2004 12:52 AM > > To: [EMAIL PROTECTED] > > Subject: RE: [ActiveDir] Change in A/D security between 2k and 2k3 > > > > Word. > > > > Word. Word. Word. > > > > Note: those are all four-letter words. > > > > Those other combinations WORK on both Windows 2000 and > Windows 2003. > > To date, I'd used what the manual and the vendor support > staff said to > > use. (And no, I don't know why it failed otherwise, and I > find myself > > not horribly concerned, now that I have something that works.) > > > > Thanks for talking me through this. > > > > -----Original Message----- > > From: [EMAIL PROTECTED] > > [mailto:[EMAIL PROTECTED] Behalf Of joe > > Sent: Wednesday, January 28, 2004 12:07 AM > > To: [EMAIL PROTECTED] > > Subject: RE: [ActiveDir] Change in A/D security between 2k and 2k3 > > > > > > Actually with AD you can specify the bind principal as > > > > NetBIOS name: domain\username > > UPN : [EMAIL PROTECTED] (Assuming that > > is the UPN) > > DN : cn=user,ou=blah,dc=blah,dc=com > > > > Should be able to do the same with your program as well > unless they do > > a sanity check on the input and defines sane as DN format only... > > > > You can use the same DN for adfind if you would like as > well to test > > it. I just usually tell people the netbios form because > they are more > > familiar with it. > > > > On the PS... We are working it out and yes it does seem to not like > > it... > > > > > > joe > > > > > > > > -----Original Message----- > > From: [EMAIL PROTECTED] > > [mailto:[EMAIL PROTECTED] On Behalf Of Michael B. > > Smith > > Sent: Tuesday, January 27, 2004 11:43 PM > > To: [EMAIL PROTECTED] > > Subject: RE: [ActiveDir] Change in A/D security between 2k and 2k3 > > > > Adfind works just dandy on w2k3. I tested it too, with -simple. > > > > Another question on ldap_simple_bind_s().... > > > > What is the format of the DN parameter? > > > > This application has me specify the user as > > CN=username,CN=Users,DC=domain,DC=com along with a base DN for the > > search (DC=domain,DC=com) whereas adfind needs the base in the same > > format, but requires the username parameter in the > > netbiosdomainname\username format. > > > > Does adfind rewrite the username or could this be where the > change is? > > > > Thanks! > > > > Michael > > > > PS: Exchange hates duplicate proxyAddresses. Whose code let > THAT slip > > by? :-) > > > > -----Original Message----- > > From: [EMAIL PROTECTED] > > [mailto:[EMAIL PROTECTED] Behalf Of joe > > Sent: Tuesday, January 27, 2004 11:07 PM > > To: [EMAIL PROTECTED] > > Subject: RE: [ActiveDir] Change in A/D security between 2k and 2k3 > > > > > > Heh, I was done with work faster than I expected. You have > got to love > > perl... :op We seem to have a small issue with multiple > user/contact > > objects having the same proxy addresses and it is throwing > errors on > > the E2K servers and I had to go find all the dupes out of some 220k > > objects with the proxyaddresses attribute... There were 64... > > > > > > Ok back to the problem at hand; I tested this against one > of my W2K3 > > Test DCs running in a VPC session... As expected it worked fine. > > > > You might want to get a network trace of the traffic between the DC > > and the server trying to talk to the DC, I am curious. > > If they are indeed using just simple LDAP calls ala > ldap_simple_bind_s > > you will totally see that traffic nearly in clear text in NetMon > > including the password being sent. > > You will see right where it is failing. > > > > Actually let me get on the podium for a minute on the benefits of > > network tracing and your friendly neighborhood LDAP apps... > It is good > > to do to understand what calls the LDAP is making to see how bad or > > how good it is. You will find a lot of LDAP apps make a lot of > > unnecessary calls (<cough>e2k<cough>)and do a lot of unnecessary > > authentications. I would say one of my favorite "screwups" > is an app > > that authenticates people and the way it does it is it > binds with an > > app ID to do a search of the user's dn and then unbinds and rebinds > > with the user's dn... This is great, 2 authentications for > every one > > needed. Anyway, if you can find the time, it is always good > to look at > > the apps and profile the traffic they generate and the queries they > > use so you can catch those stupid objectclass=something queries > > (<cough>e2k<cough>) and other inefficient things > (<cough>e2k<cough>). > > You can also do this by cranking up various debugging on > your DC but > > you usually don't want to do that with a prod box. NetMON is much > > lighter... > > > > Just so I don't go away without insulting at least one > person.... If > > you call yourself an admin and DO NOT know how to use some sort of > > network analysis/sniffer tool, you really need to do your > job and go > > learn one. This is invaluable for solving problems around AD and > > computers in general. > > Otherwise when you get that weird issue where some network > switch or > > router is throwing away UDP packets from the Kerberos > authentication > > process you will have to have someone who knows how to do > the job come > > in and do it. It is also very handy for DNS issues. > > > > > > > > [Tue 01/27/2004 22:54:00.81] > > F:\DEV\cpp\OldCmp>Adfind -h vw2k3a -default -f name=administrator > > -simple -u vtest\testuser -up Password1 > > > > AdFind V01.12.00cpp Joe Richards ([EMAIL PROTECTED]) May 2003 > > > > Using server: VW2K3a.vtest.local > > Base DN: DC=vtest,DC=local > > > > dn:CN=Administrator,CN=Users,DC=vtest,DC=local > > >objectClass: top > > >objectClass: person > > >objectClass: organizationalPerson > > >objectClass: user > > >cn: Administrator > > >description: Built-in account for administering the computer/domain > > >distinguishedName: CN=Administrator,CN=Users,DC=vtest,DC=local > > >instanceType: 4 > > >whenCreated: 20031026153618.0Z > > >whenChanged: 20031230164947.0Z > > >uSNCreated: 8194 > > >memberOf: CN=TestUni,CN=Users,DC=vtest,DC=local > > >memberOf: CN=Group Policy Creator Owners,CN=Users,DC=vtest,DC=local > > >memberOf: CN=Domain Admins,CN=Users,DC=vtest,DC=local > > >memberOf: CN=Enterprise Admins,CN=Users,DC=vtest,DC=local > > >memberOf: CN=Schema Admins,CN=Users,DC=vtest,DC=local > > >memberOf: CN=Administrators,CN=Builtin,DC=vtest,DC=local > > >uSNChanged: 28711 > > >name: Administrator > > >objectGUID: {AE5284F2-257D-479D-8776-F46BDAE17028} > > >userAccountControl: 66048 > > >badPwdCount: 0 > > >codePage: 0 > > >countryCode: 0 > > >badPasswordTime: 127122886467739888 > > >lastLogoff: 0 > > >lastLogon: 127172765879264320 > > >pwdLastSet: 127115734585121920 > > >primaryGroupID: 513 > > >objectSid: S-1-5-21-1851711904-3339057820-1962739558-500 > > >adminCount: 1 > > >accountExpires: 9223372036854775807 > > >logonCount: 32 > > >sAMAccountName: Administrator > > >sAMAccountType: 805306368 > > >objectCategory: > > CN=Person,CN=Schema,CN=Configuration,DC=vtest,DC=local > > >isCriticalSystemObject: TRUE > > >lastLogonTimestamp: 127172765879264320 > > > > > > 1 Objects returned > > > > [Tue 01/27/2004 22:55:04.82] > > F:\DEV\cpp\OldCmp> > > > > > > > > > > > > -----Original Message----- > > From: [EMAIL PROTECTED] > > [mailto:[EMAIL PROTECTED] On Behalf Of joe > > Sent: Tuesday, January 27, 2004 10:44 PM > > To: [EMAIL PROTECTED] > > Subject: RE: [ActiveDir] Change in A/D security between 2k and 2k3 > > > > I would have to say no, ldap_bind_s is still fine and dandy. > > Taking that away would break nearly every UNIX LDAP app written it > > would appear as they all like it because it is simple. It > would also > > break many Windows Apps that were ported from UNIX because > they didn't > > know better. > > > > If you want to do a simple test, grab adfind and do this > > > > Adfind -h domaincontroller -default -f name=someobjectname > -simple -u > > domain\user -up userpassword > > > > Ex: > > > > [Tue 01/27/2004 22:41:29.41] > > F:\DEV\cpp\OldCmp>Adfind -h w2kasdc1 -default -f name=joe > -simple -u > > joehome\joebob -up test > > > > AdFind V01.12.00cpp Joe Richards ([EMAIL PROTECTED]) May 2003 > > > > Using server: w2kasdc1.joehome.com > > Base DN: DC=joehome,DC=com > > > > dn:CN=joe,CN=Users,DC=joehome,DC=com > > >directReports: CN=$$jricha34,CN=Users,DC=joehome,DC=com > > >managedObjects: CN=_DIST_TestGroup,OU=Test,DC=joehome,DC=com > > >accountExpires: 127193976000000000 > > >badPasswordTime: 127182179962809320 > > >badPwdCount: 0 > > >codePage: 0 > > >cn: joe > > >countryCode: 0 > > >instanceType: 4 > > >lastLogoff: 0 > > >lastLogon: 127193024241243522 > > >lockoutTime: 0 > > >logonCount: 91 > > >logonHours: FFFF FFFF FFFF FFFF FFFF FFFF FFFF FFFF FFFF FFFF FF > > >msNPAllowDialin: TRUE > > >distinguishedName: CN=joe,CN=Users,DC=joehome,DC=com > > >objectCategory: > > CN=Person,CN=Schema,CN=Configuration,DC=joehome,DC=com > > >objectClass: top > > >objectClass: person > > >objectClass: organizationalPerson > > >objectClass: user > > >objectGUID: {DF6AC5DC-3EBA-41FD-8893-E1ED7FAA5929} > > >objectSid: S-1-5-21-1275210071-789336058-1957994488-218285 > > >primaryGroupID: 513 > > >pwdLastSet: 127189408129723189 > > >name: joe > > >sAMAccountName: joe > > >sAMAccountType: 805306368 > > >telephoneNumber: 555 > > >userAccountControl: 512 > > >userParameters: m: d > > >uSNChanged: 1257854 > > >uSNCreated: 1163453 > > >whenChanged: 20040123043244.0Z > > >whenCreated: 20021022040334.0Z > > > > > > 1 Objects returned > > > > [Tue 01/27/2004 22:42:19.51] > > F:\DEV\cpp\OldCmp> > > > > > > > > I am looking at a work issue right now, if I get done soon > I will spin > > up my W2K3 test environment and test it, but again I would > be shocked > > to death if it didn't work. > > > > joe > > > > > > > > -----Original Message----- > > From: [EMAIL PROTECTED] > > [mailto:[EMAIL PROTECTED] On Behalf Of Michael B. > > Smith > > Sent: Tuesday, January 27, 2004 10:36 PM > > To: [EMAIL PROTECTED] > > Subject: RE: [ActiveDir] Change in A/D security between 2k and 2k3 > > > > The application does indeed use LDAP. > > > > It _appears_ that the issue is the API ldap_simple_bind_s. > > > > MSDN documentation says that nothing Microsoft supplies > uses that API > > in Windows XP. One may reasonably extrapolate that to > include Windows > > 2003. But I can't find anything that states that the API was > > deprecated between Windows 2000 and Windows 2003. Or > between windows > > 2000 sp3 to sp4 (although there are minor hints). > > > > I've turned on auditing (hours ago) and almost nothing shows > > -- either success or failure. I don't know what it takes to > trigger an > > audit event, but a simple ldap query doesn't seem to do it, or a > > failed ldap_simple_bind_s. > > > > I've suggested (requested) a change to ldap_bind_s but is there > > documentation somewhere that I am missing that says > ldap_simple_bind_s > > will no longer work properly? > > > > Thanks for your hint, it got me headed down the proper path. > > > > Michael > > > > -----Original Message----- > > From: [EMAIL PROTECTED] > > [mailto:[EMAIL PROTECTED] On Behalf Of > > GRILLENMEIER,GUIDO (HP-Germany,ex1) > > Sent: Tuesday, January 27, 2004 2:48 PM > > To: [EMAIL PROTECTED] > > Subject: RE: [ActiveDir] Change in A/D security between 2k and 2k3 > > > > yes, there are various security changes in Win2k3, incl. > > different default ACLs on various objects. > > > > But as you've created a special account for the app, you shouldn't > > need to enable anonymous LDAP operations on your > > Win2k3 DCs => however, the app needs to leverage the credentials > > correctly to bind to the LDAP server (the DC). > > > > The real question is: what does the app really do? Do they even > > perform LDAP queries or do they use some NT4 APIs to read > data from AD > > (I've seen this too many times, although the vendor swore they were > > not). > > You need to understand what the App does, before you can apply the > > correct security - as you've mentioned, often you don't require to > > change anything if all the app requires is to list user accounts or > > groups etc. > > > > A good place to start to help figure out this issue is > > AUDITING: go to your Default DC policy and enable "Audit directory > > service access" for success and failure (preferrably in a lab, > > ofcourse). Then start up your mis-behaving Application, > wait for it to > > fail and take some time to wade through the security Eventlogs => > > often you can find a particular AD object (incl. the DN) > which an app > > tries to access when it fails. This gives you new options to check > > out the permissions really required by the app (or to tell > the vendor > > how to correct a problem in their application). > > > > /Guido > > > > > > -----Original Message----- > > From: [EMAIL PROTECTED] > > [mailto:[EMAIL PROTECTED] On Behalf Of Michael B. > > Smith > > Sent: Dienstag, 27. Januar 2004 16:51 > > To: [EMAIL PROTECTED] > > Subject: [ActiveDir] Change in A/D security between 2k and 2k3 > > > > I run an application (ModusGate by Vircom, if anyone cares) that > > requires "read access" (their phrasing) to A/D for LDAP queries. > > > > In Windows 2000, this was easily done in ADU&C -- create a user, > > View->Advanced, properties on the domain, Security tab, add > > the user and > > grant "READ". > > > > I can do exactly the same thing in Windows 2003, but it > doesn't work > > anymore (and, in fact, the way I read the permissions I > shouldn't even > > need to do it with the change in the default permissions). The ONLY > > account that works is the Administrator account. I can create an > > account, add it to domain admins, enterprise admins, blah > blah blah -- > > so it looks just like Administrator and it still fails. So, > I presumed > > it was User Rights -- so I add this account and give it the same > > everything there too (in Domain Controller Policy and > Domain Policy). > > Still no joy. > > > > Applied change suggested in KB 326690. Still no joy. > > > > Vircom is baffled as well, they say. > > > > Any hints or suggestions for me? > > > > Thanks. > > > > .+-wÈi0g-í+YbémPiæ0æ-í+bíÚf.+-j!ç> > 0j!åoræyØIíV+v* > > List info : http://www.activedir.org/mail_list.htm > > List FAQ : http://www.activedir.org/list_faq.htm > > List archive: > > http://www.mail-archive.com/activedir%> 40mail.activedir.org/ > > > > > > . .+-j! > > 0j! or yïíIãV+v* > > > > List > > info : http://www.activedir.org/mail_list.htm > > List FAQ : http://www.activedir.org/list_faq.htm > > List archive: > > http://www.mail-archive.com/activedir%> 40mail.activedir.org/ > > > > > > List info : > > http://www.activedir.org/mail_list.htm > > List FAQ : http://www.activedir.org/list_faq.htm > > List archive: > > http://www.mail-archive.com/activedir%> > 40mail.activedir.org/ . .+-j! > > 0j! or yïíIãV+v* > > > > List info > > : http://www.activedir.org/mail_list.htm > > List FAQ : http://www.activedir.org/list_faq.htm > > List archive: > > http://www.mail-archive.com/activedir%> 40mail.activedir.org/ > > > > .+w ííY P íí .+-j! > > 0j! or > > yïíIãV+v* > > > > List info : http://www.activedir.org/mail_list.htm > > List FAQ : http://www.activedir.org/list_faq.htm > > List archive: > > http://www.mail-archive.com/activedir%> 40mail.activedir.org/ > > > > .+-wi0-+YbmPi0-+bÚf.+-j!> > 0j!orØyØIV+v* > > > List info : http://www.activedir.org/mail_list.htm > List FAQ : http://www.activedir.org/list_faq.htm > List archive: > http://www.mail-archive.com/activedir%40mail.activedir.org/ > > > .+-wi0-+YbmPi0-+bÚf.+-j!> 0j!orØyØIV+v* > List info : http://www.activedir.org/mail_list.htm List FAQ : http://www.activedir.org/list_faq.htm List archive: http://www.mail-archive.com/activedir%40mail.activedir.org/
