it all comes down to: 
- what are you trying to protect yourself from? 
- what are your procedures or tools for restoring the objects?
- what are the risks involved and potential costs for recovery?

protecting from accidental deletion of a single object is different from
trying to protect yourself from accidental mass deletions (such as a
whole OU containing many hundred or thousand objects). Planning recovery
in a single-domain forest is different from planning recovery in
multi-domain forests. Planning to use online recovery tools (tombstone
reanimation) is different from planning to recover objects using the
native recovery options (systemstate restore + NTDSUTIL authoritative
restore).

A combination of both approaches (online recovery + native tools) could
be the right answer => no matter what tools you use, you'll always want
to perform system state backups of at least 2 DCs in every domain
anyways to be on the safe side and be prepared for a true forest
recovery. 

But you couldn't care less to reboot a DC just to recover a single or
very few objects (depends on size of your environment and if you have
deliberately planned a "recovery" DC that's not used by users or apps).
Online recovery tools do a perfect job of recovering these objects - and
if it's only a few, then you're fine with setting the PW at recovery
time. Logistics is the main pain here: you'll have to tell the recovered
user the new PW so that he can logon again - and as Ulf mentioned,
you'll have to rejoin computer accounts to the domain if you plan to
recover them online as well, but for a few objects, this could be
acceptable (yet painful).

When planning recovery of accidental mass deletions, you could argue to
do this via the "native" way, restoring a DC from a sys-state backup and
performing an auth. restore. And since the PW is obviously stored in the
sys-state backup you'll get (almost) everything back (ofcourse, you'll
have the same trouble with passwords that just expired or that a user
had just changed after doing your backup...). But in general, users'
passwords will be recovered just fine and computers actually leverage
the last two passwords during authentication so in general there's no
issue with expired computer passwords either. You're main challenge with
using the native tools now lies in correct recovery of the links between
the various objects you've just restored - this is particularly painful
for multi-domain environemnts.  On the other side, if you plan to use
the online recovery tools for mass recovery, you'd certainly wish to
have the password in the tombstone since otherwise this would be a
logistical nightmare - yet the tools to handle link recovery in
multi-domain environments just fine, which is a big painpoint when
recovering natively.

So it's up to you to weight the risk of storing passwords in tombstones
to allow easier recovery - or to choose native recovery when recovering
from mass deletion. I don't consider storing the PW in a tombstone a
particularily high risk - especially if you weight it against the cost
you have to recover things correctly the native way. Realize, that you
don't need to store all the PW related attributes, only Unicode-Pwd is
required to successfully restore the PW (and using most online recovery
tools you could still choose to have the user reset his PW at next
logon).

Some of this is discussed in more detail in the following guide:
http://www.netpro.com/media/pdf/NetPro_ADDR_Guide.pdf


/Guido

-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Tomasz Onyszko
Sent: Mittwoch, 19. April 2006 00:43
To: [email protected]
Subject: Re: [ActiveDir] Tombstone attributes

Ulf B. Simon-Weidner wrote:
> Unfortunately the passwords is the same attribute for users and
computers. I
> thought recently to put the password in the tombstone to ease computer
> account reanimation - after the account is deleted the computer is not
able
> to change it's password, and if it was deleted accidentally it's easy
to
> reanimate the account and the computer will still be happy.
> 
> I know that it'll be easy to put the computers in the domain again,
however
> I've had a customer with hundreds of sites which lost a couple hundred
> computer accounts across those sites, and bandwidth didn't allow to
remotly
> script the addition of the computer accounts to the domain via netdom.
We
> were able to perform an authoritative restore, and were lucky that we
lost
> almost no computer accounts due to changed password, however this was
a
> unlikely event with the computers recently joined the newly created
domain.
> In running domains we'd have to calculate an average of 1/15th of
computers
> per day of the age of the backup to join manually.
> 
> I agree on user objects - and if I'd decide to keep the password for
> computer account in the tombstone I'd would prefer to put a procedure
in
> place to change a users password before deleting it.
> 

Jup, I can agree with it - but still I don't like idea of restoring the 
user with old password. What about password age and complying with 
security policy - I can imagine situation in which user's password was 
89 day's old (wit 90 days maximum password age), then was deleted an 
restored - password will be valid for another 90 days. What about 
complexity requirements ?



-- 
Tomasz Onyszko
http://www.w2k.pl/blog/ - (PL)
http://blogs.dirteam.com/blogs/tomek/ - (EN)
List info   : http://www.activedir.org/List.aspx
List FAQ    : http://www.activedir.org/ListFAQ.aspx
List archive:
http://www.mail-archive.com/activedir%40mail.activedir.org/
List info   : http://www.activedir.org/List.aspx
List FAQ    : http://www.activedir.org/ListFAQ.aspx
List archive: http://www.mail-archive.com/activedir%40mail.activedir.org/

Reply via email to