And the funny thing it is one of the very first tools I published for public
use....

 

-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Al Mulnick
Sent: Thursday, December 08, 2005 12:39 PM
To: [email protected]
Subject: RE: [ActiveDir] DMZ domains and IPSec - looking for explanation re
resource access and authentication

Cool.  Another awesome tool from joeware.net !  :)


>From: "joe" <[EMAIL PROTECTED]>
>Reply-To: [email protected]
>To: <[email protected]>
>Subject: RE: [ActiveDir] DMZ domains and IPSec - looking for 
>explanation re resource access and authentication
>Date: Thu, 8 Dec 2005 11:16:02 -0500
>
>Exactly, you would run lg from the member and use -r dmzDC and it tells 
>LG to query the dmzDC for the SID and dumps that into the group. Again 
>I haven't tested it in that scenerio it should work. Certainly it works 
>when there is NO trust channel at all as it has been used on tens if 
>not hundreds of thousands of machines that way.
>
>   joe
>
>
>-----Original Message-----
>From: [EMAIL PROTECTED]
>[mailto:[EMAIL PROTECTED] On Behalf Of Al Mulnick
>Sent: Thursday, December 08, 2005 9:52 AM
>To: [email protected]
>Subject: RE: [ActiveDir] DMZ domains and IPSec - looking for 
>explanation re resource access and authentication
>
>"I have never tested that specific scenario but you should be able to 
>add an internal domain secprin to the DMZ member server without working 
>from the DC. It would require a tool that knows how to specify the 
>server to use for the name to sid resolution. Let me think if such a 
>tool exists.... oh yeah, look at lg on my website - 
>http://www.joeware.net/win/free/tools/lg.htm.";
>
>That would surprise me since it's likely that the network path would 
>not allow the member server to talk directly to the internal domain and 
>would have a hard time getting resolution.  Unless your tool would 
>allow the mapping to occur from the dc the machine authenticated 
>against and it knew what to do with it from there.
>
>Be interesting to know for sure though.
>
>
> >From: "joe" <[EMAIL PROTECTED]>
> >Reply-To: [email protected]
> >To: <[email protected]>
> >Subject: RE: [ActiveDir] DMZ domains and IPSec - looking for 
> >explanation re resource access and authentication
> >Date: Thu, 8 Dec 2005 09:08:41 -0500
> >
> >I haven't perused the OS source code for this but from my experience 
> >this is how it works...
> >
> >In order for the member server to resolve a name to a SID, it needs 
> >to be able to connect to a domain controller of the domain specified. 
> >If it can't reach the domain controller, it can't convert the name to a
SID.
> >
> >The SID to name conversion on the other hand is handled differently.
> >The machine tries to handle it locally and if it isn't a local SID it 
> >passes it up to the DC that authenticated the computer (i.e. the DMZ
> >DC) and lets it try to resolve it, that machine will look at its 
> >local SIDS
> >(objectsid/sidhistory) and then if it doesn't find it there will 
> >start chasing through the trusts.
> >
> >I have never tested that specific scenario but you should be able to 
> >add an internal domain secprin to the DMZ member server without 
> >working from the DC. It would require a tool that knows how to 
> >specify the server to use for the name to sid resolution. Let me 
> >think if such a tool exists.... oh yeah, look at lg on my website -
>http://www.joeware.net/win/free/tools/lg.htm.
> >
> >There is a -r option to specify the machine you want to use for the 
> >name to sid resolution. I added that option so you could add secprins 
> >from a domain the machine wasn't a member of yet to the admins group 
> >so when you added it to the domain, the membership was already set 
> >(great for migration scenarios where you aren't a domain admin in the 
> >next domain).
> >
> >Now that being said, I am not a fan of internal networks being 
> >accessible from the extranet or from the DMZ unless doing very 
> >specific individual server:port based reverse proxy with that single 
> >port being heavily defended on the internal host. Anything that 
> >compromises one of the DMZ domain machines can at the least most 
> >likely enumerate info from the internal domains. If someone wants to 
> >be cute, they could easily D.O.S. attack you from there as well.
> >
> >    joe
> >
> >
> >
> >
> >   _____
> >
> >From: [EMAIL PROTECTED]
> >[mailto:[EMAIL PROTECTED] On Behalf Of Chakravarty, 
> >Sakti
> >Sent: Wednesday, December 07, 2005 10:12 PM
> >To: [email protected]
> >Subject: [ActiveDir] DMZ domains and IPSec - looking for explanation 
> >re resource access and authentication
> >
> >
> >
> >Hi all,
> >
> >I'm looking for an explanation . this is a bit of a complicated 
> >scenario but I'll try to be succinct.  Whilst I have a fair bit of AD 
> >experience, I'm not the AD administrator at my current place of work.
> >The AD administrators are not forthcoming with information, hence my 
> >post here.
> >
> >We have a corporate network with a Windows 2003 forest (mixed-mode) 
> >with multiple domains.  We also have a DMZ, in which there is a 
> >separate Windows
> >2003 forest with a single domain.
> >
> >There is an IPSec policy set up between domain controllers in the DMZ 
> >domain and domain controllers in one of the domains in the corporate 
> >forest (I'll call it the "internal domain").
> >
> >There is a one-way trust, the DMZ domain trusts the internal domain.
> >
> >Our aim is to provide access to resources in the DMZ domain, by using 
> >accounts in the internal domain.
> >
> >My role includes managing Member Servers.  We built a server in the 
> >internal domain, added some groups from that domain into the 
> >Administrators group, then physically moved it to the DMZ.  Then, the 
> >names in the Administrators group would no longer resolve (since it 
> >is still a member of the internal domain, but physically disconnected 
> >from it).  Next, we made the server a member of the DMZ domain, and 
> >the names now resolve.  So, it seems the Member Server is talking to 
> >the DMZ DC which is querying the internal DC to resolve the name.
> >
> >What we cannot do, is log onto the Member Server in the DMZ and add 
> >an account from the internal domain.  The reasoning we are given is 
> >that the IPSec policy and trust is between DCs only, and not the 
> >Member Server.  If the DMZ Domain Admin logs onto the DMZ DC, then 
> >makes a Computer Management connection to the Member Server, then 
> >groups from the internal domain can be added to the Member Server.
> >
> >Can anyone explain to me why this is so?  I don't understand why 
> >resolving names is different to adding a user, it seems to me the 
> >same authentication path is followed.
> >
> >Thanks in advance
> >Sakti
> >
> >*********************************************************************
> >* This message is intended for the addressee named and may contain 
> >privileged information or confidential information or both. If you 
> >are not the intended recipient please delete it and notify the sender.
> >*********************************************************************
> >*
>
>
>List info   : http://www.activedir.org/List.aspx
>List FAQ    : http://www.activedir.org/ListFAQ.aspx
>List archive: 
>http://www.mail-archive.com/activedir%40mail.activedir.org/
>
>List info   : http://www.activedir.org/List.aspx
>List FAQ    : http://www.activedir.org/ListFAQ.aspx
>List archive: 
>http://www.mail-archive.com/activedir%40mail.activedir.org/


List info   : http://www.activedir.org/List.aspx
List FAQ    : http://www.activedir.org/ListFAQ.aspx
List archive: http://www.mail-archive.com/activedir%40mail.activedir.org/

List info   : http://www.activedir.org/List.aspx
List FAQ    : http://www.activedir.org/ListFAQ.aspx
List archive: http://www.mail-archive.com/activedir%40mail.activedir.org/

Reply via email to