Joe-
You're forgetting to include Plonk's (sic) Constant into your equation, as so:

 I=9S/((M^c)*(r^2))P

Where P = Plonk's constant--a factor that accounts for the (significant) 
percentage of admins that drink heavily on the job.

-----Original Message-----
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of joe
Sent: Tuesday, March 22, 2005 8:23 AM
To: [email protected]
Subject: RE: [ActiveDir] Have fun at DEC

> There is an inverse relationship between the number of admins and the 
> security of your network - the higher the number of admins, the lower 
> the security.

How long have I been saying this? At least as long as you have known me!!!
Is it that you didn't listen because I never said inverse? My simple mechanism 
of saying this applies to everything with systems, just not security - the 
fewer the admins the better, if you exceed 3 you are asking for issues... 

For security it is probably more of an inverse square law function than just 
inversely proportional with number of admins being r and security being 
stretched and diluted across the surface area (A) growing by the square rule. 
Say your security constant for a given system at a given point in time is S and 
your true security is I then you are looking at an equation of something like  
I=9S/(r^2) (that is normalized to where any system with 3 admins is at its 
constant security level S which actually may be a little high, maybe it should 
be 4 instead of 9). 

You can add another piece to that equation if the admins don't all report to 
the same direct supervisor/manager or whatever other title you give to the 
direct person your analysts report to. That number of managers is M and the 
overall chains of command is c so you get I=9S/((M^c)*(r^2)). As an example of 
the last, say you have a system that has admins from the US and admins from 
Europe. At the very least, it is unlikely they will both report to the same 
direct manager. It is most likely from what I have seen, they will report to 2 
managers in a different chains of command that eventually tie back together, 
but up several management levels. Those multiple managers and multiple chains 
of command without regard to the sheer number of admins makes your overall 
situation 1/4 as secure due to disagreements and infighting and different goals 
of different managers and management chains.
Now add in some software that installs a service that runs as local system 
(i.e. more power than an admin account) and is managed by someone other than 
the "normal" admins and your M and c have increased again, this is especially 
evident with things like MOM or Tivoli or OVVM or anything else that monitors 
and has the ability to arbitrarily run code (scripts, etc) on a given machine. 

Assuming a realistically secure value of S, you would start with one admin and 
an I of 9S. Add 2 more on the same team and you are down to S. Add 6 more on 
the same team and you are down to S/9. Add a team of 5 more who manage 
monitoring agents running as localsystem who report through a different chain 
of command and you are now at S/((14^2)*(2^2)) or S/784. The thing is that 
management group, even without admin rights directly, who manages localsystem 
agent monitoring across all of the enterprise and all systems reduces overall 
security by at least (5^2 * 2^2) without consideration for the other admins 
already managing[1]. 


Anyway, the more admins you have for a given system, the less overall control 
you have of that system. You can have 1000 admins on a network, they just 
better not all be managing and have control over the same systems. The more 
admins on a system you have the more people modifying things and coming up with 
"cool" ideas or the more chance someone will leave a machines unlocked or get 
infected or the more likely you are to have generic admin type IDs and less 
chance you can figure out who did something if something bad happened. 

You will recall this was the number one debate I had with management when we 
worked together previously and you know how strongly I argued that point.
They wanted more people to have rights, I wanted less. It had something to do 
with the quality of the admins, but it had a lot to do with the sheer number 
because once you exceed 3 or so I have found that the responsibility people 
feel tends to drop significantly and your overall danger grows considerably. I 
think it has something to do with the feeling of ownership.
If you have 20 people who own something versus 3 people who own something, the 
3 people will have a stronger sense of ownership and caring, IMO. 

If you have 3 crappy admins, you are still screwed. You will note the equation 
above says nothing about admin quality, just numbers and management chains. 
There are a lot of people running around who have admin IDs who aren't 
administrators. However, they tend to stick out more when there aren't a bunch 
of other people covering for them and can hopefully be removed.


> And, Rick, thanks a bunch for your late-night assistance. I owe you one.

And I don't even want to know what this is about...


  joe


[1] That formula is completely made up (and having been written out like this 
automatically copyrighted) by me and represents how I personally view the 
impact of adding more admins and more management chains. While I think 
centralized monitoring is nice and all, I think it is generally configured in a 
way that is extremely destructive to overall environment security. When I ran 
ops for a forest, I would not allow monitoring to be added to the Domain 
Controllers I managed that was run by anyone other than our direct group. I 
fought that battle with multiple groups over the space of 5 years. 

 

-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of [EMAIL PROTECTED]
Sent: Monday, March 21, 2005 9:36 PM
To: [email protected]
Subject: RE: [ActiveDir] Have fun at DEC

I not only had fun at DEC, I learnt so many things. Aside from being around the 
usual suspects (Hi, Dean! Hi, Joe! Hi, Rick!), I got to meet Jorge, Hunter, 
Alain and a host of other people.
 
Then I came away with 2 of the most eye-opening lessons to-date in my 
professional life:
 
You can't cram a "security" discussion into a 75-minute presentation :) There 
is an inverse relationship between the number of admins and the security of 
your network - the higher the number of admins, the lower the security.
 
Gil and the rest of the DEC crews are some of the most gracious hosts I have 
ever had the pleasure of being associated with - and I am grateful for the 
opportunity.
 
And, Rick, thanks a bunch for your late-night assistance. I owe you one.
 
Sincerely,

D�j� Ak�m�l�f�, MCSE+M MCSA+M MCP+I
Microsoft MVP - Directory Services
www.readymaids.com - we know IT
www.akomolafe.com
Do you now realize that Today is the Tomorrow you were worried about Yesterday? 
 -anon

________________________________

From: [EMAIL PROTECTED] on behalf of joe
Sent: Mon 3/21/2005 5:42 PM
To: [email protected]
Subject: RE: [ActiveDir] Have fun at DEC



Hey now, Dean and I actually weren't on the admin teams. We were wandering 
consultants. We initially had been under the understanding that it was a 
hacking session and we are under constraints about showing off tricks like that 
so we excused ourselves from the competition. Gil asked us just to walk around 
and check out what was going on.

Once we realized it was a break-fix with users trying to take advantage of a 
poorly configured system Dean jumped in a little more but still didn't get to 
do what he wanted.

Had we been on the admin team, the first thing we would have done is make it so 
no one could connect remotely to the DCs and secured them, then opened them up. 
That would have made the whole experiment go about 6 or so minutes with reboots 
as I saw no fancy hacking going on. You probably heard us up there saying, cut 
the users off at the knees, drop the services so you can secure. Secure 
environment #1, users getting access to resources #2. It was funny because as 
soon as Stuart (Kwan of the Ottawa Kwan Clan) walked up the first thing he was 
saying was screw the users, lock down as well.

Dean spent most of his time pointing out how to fix broken things like DNS and 
replication and such as well as saying disable all of the users. I spent the 
time getting beers, explaining what tools were on the CD (did poorly at that as 
I didn't recognize many of them), correcting command line commands, and saying 
drop the network!!! 

The lab environment was set up pretty poorly as the VMs that were hosting the 
DCs were configured to auto-rollback changes so every time the systems 
rebooted, everything the admin team had done was rolled back. Also the person 
who set up the hosts neglected to set a password on the host so people could 
attack the host directly which I understand was outside the scope of the test.

Dean had the perfect solution right up front... Dump users, groups, OU 
structures to LDIF files, demote the forest, repromote the forest, reimport the 
users/groups/structures. That would have cleared up nearly all of the screwups 
and wouldn't have left any openings for the users errr hackers unless they 
could get on the physical box which they couldn't do.

It was extremely interesting though to see the various viewpoints. There was a 
rather stark line between many of the people where it was get the services 
running versus lock the environment down. I have no problem telling a user to 
go screw off if there is a security issue. Between fixing security and making 
users run I will almost always go to the side of security because if you don't 
have security, you can't guarantee the quality of the information in your 
system which is a poor place to be for an authentication system.
Plus if it is insecure, you can't even guarantee the services very well. ;oP

I wouldn't say anyone actually won the competition.

That last part about the schema being messed up was Dean having fun. He pulled 
one of his tricks but didn't really let anyone see how he did it. It was just 
to show that yes, there are ways you can really hurt yourself bad or be hurt 
bad. Nothing in that test was anywhere near that level of danger.


   joe




-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Jorge de Almeida Pinto
Sent: Monday, March 21, 2005 7:45 PM
To: [email protected]
Subject: RE: [ActiveDir] Have fun at DEC

Fun at DEC?

Yeahh it was fun. It was also great to meat Gil, Guido, Dean, Joe, Rick and 
Deji in person.
No chicken as I hoped for, but a t-shirt (that not even said "I went to DEC to 
get a rubber chicken but all I got was this lousy
t-shirt") and we also got a  bag. Gil was walking around with his bag that had 
a rope attached to it and the rubber chicken was hanging at the end of the rope.
We all heart the rubber chicken "cry" (hee.. I would cry if I had a rope around 
my neck! ;-)) ) on monday during the "AD all night" session. By the way.. that 
session was also fun. It all started with 4 environments and each environment 
contained 1 forest and 1 domain with 2 DCs some wireless network stuff, an 
ADMINS team and a USERS team. In each environment security (whatever you could 
think of!!!) was really screwed! The admins (a complete team of people incl. 
Dean, Joe, Rick and Deji) had about 15 min. to correct all security screw-ups 
they could. After that the users came in and started working on the network 
using laptops with all kinds of hacking tools. We were supposed to wait 15 min. 
but we (I) didn't (hey a hacker doesn't wait until your network is safe and all 
security vulnerabilities are solved by you! So we didn't either). While the 
admins were searching and solving al vulnerabilities I already created two user 
accounts anonymously and added those to the adminstrators and domain admins 
groups. After we created the accounts we thought we should wait a bit so the 
admins had the chance to to some work. We also hoped they didn't find the 
accounts.... Crap that didn't work as we afterwards wan't to delete all kinds 
of things in AD to screw it up as bad as possible. The caveat was that if some 
admin found us screweing around and he could prove we did the damage the user 
got fired. If a user screwed up something and an admin did not prevent it the 
admin got fired.
I still don't who did it, but after a while both DCs started rebooting and 
rebooting. The admins shut down the wireless network appliances so they 
couldn't be attacked. We as users started complaining about that we could do 
our work and that the SLA sucked..... ;-)) The DCs were not physically secured 
(hey that's also important!) and one of the users pulled the power plug of the 
DCs and those went down... The user was caught on the act and got fired. The 
admin that was responsible got demoted.... From admin to user! Hahaha. That 
wasn't also bad because that admin also knew all the passwords. As soon as we 
knew the password of the administrator account we tried again to screw it up. 
After a while everything was closed down to maximum security (at least I think 
it was as we were not able to do anything). Better yet the admins could do much 
either because the DC was so screwed it didn't even know it had a schema (or 
something like that). ;-))

Again: great session!

Hope to attend again next year

Cheers
Jorge

-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of joe
Sent: Friday, March 18, 2005 09:15
To: [email protected]
Subject: RE: [ActiveDir] Have fun at DEC

At least I heard the chicken this year, I never had heard it. I was pretty well 
toasted at the time and thought a goose was running around the conference room.

  joe

-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Daniel Gilbert
Sent: Saturday, March 12, 2005 11:20 AM
To: [email protected]
Subject: RE: [ActiveDir] Have fun at DEC

I believe I am the proud owner of the last DEC chicken.  Gil gave it to me at 
DEC in Ontario.

Sure wish I could have made it to DEC this year.

Dan

> -------- Original Message --------
> Subject: RE: [ActiveDir] Have fun at DEC
> From: "joe" <[EMAIL PROTECTED]>
> Date: Fri, March 11, 2005 5:16 pm
> To: [email protected]
>
> Unfortunately Gil doesn't do that anymore. He did the last chicken I 
> think 2 years back I think. I know for sure he didn't do one last year.
>
> He needs T-Shirts that say...
>
> I went to DEC to get a rubber chicken but all I got was this lousy
t-shirt.
>
>
>   joe
>
> 
>
> -----Original Message-----
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] On Behalf Of Phil Renouf
> Sent: Friday, March 11, 2005 6:51 PM
> To: [email protected]
> Subject: [ActiveDir] Have fun at DEC
>
> For all you folks who are going to DEC, have a great time and good 
> luck getting the rubber chicken.
>
> Phil (re-subscribed with new address)
>
> List info   : http://www.activedir.org/List.aspx
> List FAQ    : http://www.activedir.org/ListFAQ.aspx
> List archive:
> http://www.mail-archive.com/activedir%40mail.activedir.org/

List info   : http://www.activedir.org/List.aspx
List FAQ    : http://www.activedir.org/ListFAQ.aspx
List archive: http://www.mail-archive.com/activedir%40mail.activedir.org/

List info   : http://www.activedir.org/List.aspx
List FAQ    : http://www.activedir.org/ListFAQ.aspx
List archive: http://www.mail-archive.com/activedir%40mail.activedir.org/

This e-mail and any attachment is for authorised use by the intended
recipient(s) only. It may contain proprietary material, confidential 
information and/or be subject to legal privilege. It should not be copied, 
disclosed to, retained or used by, any other party. If you are not an intended 
recipient then please promptly delete this e-mail and any attachment and all 
copies and inform the sender. Thank you.
List info   : http://www.activedir.org/List.aspx
List FAQ    : http://www.activedir.org/ListFAQ.aspx
List archive: http://www.mail-archive.com/activedir%40mail.activedir.org/

List info   : http://www.activedir.org/List.aspx
List FAQ    : http://www.activedir.org/ListFAQ.aspx
List archive: http://www.mail-archive.com/activedir%40mail.activedir.org/


List info   : http://www.activedir.org/List.aspx
List FAQ    : http://www.activedir.org/ListFAQ.aspx
List archive: http://www.mail-archive.com/activedir%40mail.activedir.org/

List info   : http://www.activedir.org/List.aspx
List FAQ    : http://www.activedir.org/ListFAQ.aspx
List archive: http://www.mail-archive.com/activedir%40mail.activedir.org/


List info   : http://www.activedir.org/List.aspx
List FAQ    : http://www.activedir.org/ListFAQ.aspx
List archive: http://www.mail-archive.com/activedir%40mail.activedir.org/

Reply via email to