I've seen lots of customers running them, so it's not just you.  :) 

> -----Original Message-----
> From: [EMAIL PROTECTED] 
> [mailto:[EMAIL PROTECTED] On Behalf Of Dean Wells
> Sent: Friday, January 07, 2005 17:22
> To: Send - AD mailing list
> Subject: RE: [ActiveDir] Forest trusts vs trusts within forests
> 
> Does nobody but me like or even prefer stub zones? ;-)
> 
> --
> Dean Wells
> MSEtechnology
> * Email: [EMAIL PROTECTED]
> http://msetechnology.com
> 
> 
> -----Original Message-----
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] On Behalf Of 
> Grillenmeier, Guido
> Sent: Friday, January 07, 2005 5:24 PM
> To: ActiveDir@mail.activedir.org
> Subject: RE: [ActiveDir] Forest trusts vs trusts within forests
> 
> I'd say JFK jr. answered it between the lines ;-) Happy New 
> Year John and all!
> 
> A domain in a separate forest with a trust to another forest 
> will be less risky than a domain within the same forest - 
> esp. under the circumstances that Dave described (such as 
> limited physical security in the remote offices).  So without 
> going in details, with the information given I'd say two 
> forests + trusts is a valid choice.  If you require Kerberos auth.
> between the two domains (in the two forests), then both would 
> need to run 2003.  Otherwise it'll be a "NT4 style" external 
> trust using NTLM auth.  
> 
> Naturally you'll have a little more hassle with DNS, but the 
> second domain/forest could certainly use a child zone of the 
> existing forest (e.g.
> 1st-dommain = company.com, 2nd-domain = child.company.com) 
> and will need to setup your zone transfers or forwarding 
> appropriately (again something which is done more easily with 
> Win2003's conditional
> forwarding...)
> 
> /Guido
> 
> 
> -----Original Message-----
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] On Behalf Of Mulnick, Al
> Sent: Friday, January 07, 2005 11:09 PM
> To: ActiveDir@mail.activedir.org
> Subject: RE: [ActiveDir] Forest trusts vs trusts within forests
> 
> Out of curiosity, did you get your question answered?  The 
> original that I read was that you wanted to know if you had 
> two separate forests with trusts, would that create the same 
> risks as if they were in the same forest.
> I *think* I read that correctly.  I think John had a lot of 
> great information in there, but I got to the thread too late 
> which makes it harder to read and tell what was said etc.  
> 
> Just curious mostly.
> 
> Al 
> 
> -----Original Message-----
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] On Behalf Of 
> Fugleberg, David A
> Sent: Friday, January 07, 2005 3:50 PM
> To: ActiveDir@mail.activedir.org
> Subject: RE: [ActiveDir] Forest trusts vs trusts within forests
> 
> Thanks John.  To answer your questions:
> 1)  the topology is hub/spoke.  I would put a couple DCs for 
> the new forest in the hub location.
> 2) Regarding replication, most of these sites have few to no 
> Exchange users
> - those that do use OWA.  So, I'm not worried losing the 
> common GC that a single forest provides.  I'll need to work 
> with the Exchange team to see if/how any future plans impact 
> this assessment, of course.
> Bandwidth  is not the issue for wanting to compartmentalize 
> replication.
> It's more about having a r/w copy of the internal directory 
> at all of these sites that have no use for it.
> 3) The applications would by and large be at the central 
> location.  Some could live in the second forest (see #1).  
> I'm certain that the business will want some of these users 
> to access some apps in the internal forest,
> though- hence the need to trust the new forest.  I'm also 
> sure that our support people will want the new forest to 
> trust the internal forest to make it easier to support.
>  
> There's no illusion on my part that any configuration gives 
> me a 100% security guarantee - if there was, someone would 
> have found it an all of us in info security would have to 
> find real jobs!
>  
> Thanks again for the insights. I truly appreciate getting a 
> sanity check.
> Around my company I'm the one people go to for AD expertise, 
> so when I need to bounce things off of people it's often on this list.
>  
> Happy Friday!
> Dave
> 
>       -----Original Message-----
>       From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] On Behalf Of John 
> Reijnders
>       Sent: Friday, January 07, 2005 10:36 AM
>       To: 'ActiveDir@mail.activedir.org'
>       Subject: RE: [ActiveDir] Forest trusts vs trusts within forests
>       
>       
> 
>       Hi David,
> 
>        
> 
>       Take 2 ;-). See inline comments for my ideas.
> 
>        
> 
>       1) we have some remote sites with workstations that 
> authenticate to the domain so they can be managed with GPOs 
> and software distribution.  They have no real need to access 
> MS resources at the main site.  In some cases, there are 
> enough of these workstations to warrant a local DC.  We don't 
> want DCs for the one and only existing domain in some of 
> these locations, because we can't always control physical 
> access to them.  An isolated forest (no
> trusts) for these would protect the internal forest in the 
> event the new forest was compromised, compartmentalizing the damage.
> 
>        
> 
>       I'm interested in the physical structure of your 
> network. Are the 'evil' sites fully connected to all other 
> sites (centrally and the other 'evil' sites), or is the 
> network topology more like a hub-and-spoke model?
> Implementing a separate domain or forest for the 'evil' sites 
> would require some sort of connectivity between them or the 
> implementation of DC for this domain/forest in your centrally 
> and trustworthy site. But you're right that an isolated 
> forest would take care of this.
> 
>        
> 
>       2) there's no need to replicate the thousands of 
> internal user and computer accounts to the locations 
> mentioned above - a new domain, whether it's in a new forest 
> or not, would eliminate this unwanted replication.
> 
>        
> 
>       There's no need to replicate the usr and cptr accounts, 
> but there might be a need to replicate things like GC info 
> for an Exchange address book? Replication has become very 
> efficient in W2003 and I wouldn't be surprised if replication 
> traffic wouldn't pose a problem. It really depends on the 
> bandwith you have, but I havn't seen many implementations in 
> which replication traffic forced me to implements multiple 
> forest/domains.
> 
>        
> 
>       3) some applications require access by vendors, suppliers, etc.
> There is some desire to keep such accounts physically 
> seperate from the internal directory.  Part of this was 
> because many intranet resources are granted to 'authenticated 
> users', and people have a hard time realizing that some clerk 
> at one of our suppliers is just as much an 'authenticated user'
> as an internal employee[1].  If such accounts were in a 
> completely isolated forest (no trusts), they would not be 
> authenticated users in our internal domain.
> 
>        
> 
>       Yep! This calls for a federated forest construction. 
> But are these applications located at the 'evil' sites or is 
> this a totally different geographical spreading that might 
> require an additional forest in the centrally managed site?
> 
>        
> 
>       What I'm trying to figure out is whether a seperate 
> forest with trusts in both directions (with SA and SID 
> Filtering) gets me closer to the objective than a new domain 
> in the existing forest.  It seems to me that a new domain in 
> the existing forest would take care of #2, but not the other 
> issues, which brings up the new forest idea.  I just don't 
> want to introduce a new forest only to find that the required 
> trusts put me right back in the same situation as if I had 
> just added a child domain to the existing forest.
> Comments ?
> 
>        
> 
>       The most obvious way to ensure 1 and 3 (I don't 
> consider 2 to be a 'real' issue, but just one of those 
> arguments that comes in handy to add another one to the list 
> of pro's to achieve your goal ;-), is a separate Forest. This 
> does not put you right back in the same situation, because 
> several extra steps are introduced that makes it tougher to 
> do whatever you're not allowed to do on the other side. From 
> a technical point of view, the FedFor construction with SA 
> and Sidfiltering (be aware that this breaks
> SIDHistory!) is a very solid solution. This does not give you 
> a  100% safety garanty. You will need to monitor your 
> environment (non techical/social hacking can be far more 
> dangerous!) for strange events.
> 
>        
> 
>       [1]Yeah, I know that I could put them in another OU, 
> and the resources should really be ACLed so only intended 
> groups have access instead of relying on 'authenticated 
> users'.  Maybe that's the path I should push for regarding #3 
> - your comments are welcome!
> 
>        
> 
>       Duh ... No further comments your honour! I rest my case ...
> 
>        
> 
>       Cheers!
> 
>       John Reijnders
> 
>        
> 
>        
> 
>        
> 
>        
> 
>        
> 
>               -----Original Message-----
>               From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] On Behalf Of John 
> Reijnders
>               Sent: Friday, January 07, 2005 1:42 AM
>               To: 'ActiveDir@mail.activedir.org'
>               Subject: RE: [ActiveDir] Forest trusts vs 
> trusts within forests
> 
>               Happy New Year to you as well!
> 
>                
> 
>               In order to make a good decision for yourself 
> whether or not you can and need to protect yourself against 
> clever DomaAdmins, Service Admins and/or people with physical 
> access to your DC's some extra info:
> 
>                
> 
>               Ways to bypass standard security:
> 
>               -        Add the Enterprise Admin SID to your token (ex
> in
> you SidHistory). This can be done by using a 'improved' 
> version of kerberos.dll, which will add the enterpr adm sid 
> to every service ticket.
> 
>               -        You can modify the system software or Directory
> db
> to bypass sec checks by:
> 
>               o        Changing the default sec.descriptor for an
> objclass
> 
>               o        Add a user to the enterprise adm Univ.Group on
> a GC
> 
>               o        Execute a logon script in a site GPO
> 
>               -        Or schedule an AT job which runs under local
> system
> credentials.
> 
>                
> 
>               (Partial) solutions to these problems are:
> 
>               *         Delegation of control
> 
>               *         Physical protection of ALL DCs
> 
>               *         SID filtering (enabled by default)
> 
>               *         Pro active Monitoring (!)
> 
>               *         Multiple Forests (!!)
> 
>                
> 
>               Some benefits of W2K3 trusts:
> 
>               *         Transitive (not really a sexy feature in you 2
> single dom forest design)
> 
>               *         You can use kerberos logon in stead of NTLM.
> 
>               *         You can use both implicit and explicit UPN
> logon
> over the trust Selective Authentication (which is disabled by 
> default and applies to external, realm and forest trusts): 
> This option provides a method that you can use to achieve 
> better granularity for authentication requests that come 
> across a trust. When you enable it, all authentication is 
> examined on the service DC. The service DC verifies that the 
> user is explicitly allowed to authenticate to the resource 
> before allowing the authentication request through. Because 
> of this, you need to specify which users who come across the 
> trust can authenticate to which resources in the domain when 
> you enable the SA option across a trust. You can do this if 
> you set up the "Allowed to Authenticate" control access right 
> on an object for that particular user or group from the other 
> forest or domain. When a user authenticates across a trust 
> with the SA option enabled, a special "Other Organization" 
> SID is added to the user's authorization data. The presence 
> of this SID triggers a verification on the service domain to 
> ensure that the user is allowed to authenticate to the 
> particular service. After the user is authenticated, the 
> server to which the user authenticates adds another SID, the 
> "This Organization" SID.
> 
>               *         You can disable the corresponding DomainInfo
> record for the domain or the TopLevelName record for the tree 
> in the UI.
> This method is useful when only a small part (read domain) of 
> the other forest is not trusted. Note that only 
> authentication requests from users in that domain are 
> disabled when you disable a DomainInfo record. When you 
> disable a DomainInfo record, authentication requests are not 
> disabled if those authentication requests are received from 
> users who are in the local forest if those users want to gain 
> access to resources that are in the disabled domain. This is 
> not really applicable in your scenario.
> 
>                
> 
>               If you're going for the multiple forest 
> scenario, consider the security benefits this will give you 
> and compare them to the additional costs (extra hardware, no 
> super GC is available by default unless you start using stuff 
> like MIIS :-), extra management, etc.).
> 
>                
> 
>               Let us know what you end up with and ... why ;-)
> 
>               Cheers,
> 
>               John Reijnders
> 
>                
> 
>               -----Original Message-----
>               From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] On Behalf Of 
> Fugleberg, David A
>               Sent: donderdag 6 januari 2005 21:32
>               To: activedir@mail.activedir.org
>               Subject: [ActiveDir] Forest trusts vs trusts 
> within forests
> 
>                
> 
>               Happy New Year !
> 
>               I'm having a design discussion with myself 
> about adding a forest vs
> 
>               adding a domain to an existing forest.  I 
> understand about the automatic
> 
>               transitive trust between domains in a forest, 
> and how it's possible for
> 
>               a clever domain admin in a subdomain to 
> compromise the entire forest.
> 
>               What I'm shaky on is this:  If you had two 
> single-domain forests, and
> 
>               established trusts in both directions between 
> them, do you have the same
> 
>               issues ?  I would think not, because the 
> configuration and schema NCs
> 
>               are not shared between them, but I'm looking 
> for some confirmation on
> 
>               that.  Also, since we're talking about two 
> single-domain forests, I'm
> 
>               guessing that the 'forest trusts' available in 
> W2K3 FFL don't really
> 
>               come into play here, correct ?  In other words, 
> getting the first domain
> 
>               to W2K3 FFL doesn't buy anything with respect 
> to this trust ?
> 
>                
> 
>               Thanks,
> 
>               Dave
> 
>                
> 
>               List info   : http://www.activedir.org/mail_list.htm
> 
>               List FAQ    : http://www.activedir.org/list_faq.htm
> 
>               List archive:
> http://www.mail-archive.com/activedir%40mail.activedir.org/
> 
>               
>               This e-mail and any attachment is for 
> authorised use by the intended recipient(s) only. It may 
> contain proprietary material, confidential information and/or 
> be subject to legal privilege. It should not be copied, 
> disclosed to, retained or used by, any other party. If you 
> are not an intended recipient then please promptly delete 
> this e-mail and any attachment and all copies and inform the 
> sender. Thank you.
> 
> 
>       This e-mail and any attachment is for authorised use by 
> the intended
> recipient(s) only. It may contain proprietary material, 
> confidential information and/or be subject to legal 
> privilege. It should not be copied, disclosed to, retained or 
> used by, any other party. If you are not an intended 
> recipient then please promptly delete this e-mail and any 
> attachment and all copies and inform the sender. Thank you.
>       
> 
> List info   : http://www.activedir.org/mail_list.htm
> List FAQ    : http://www.activedir.org/list_faq.htm
> List archive:
> http://www.mail-archive.com/activedir%40mail.activedir.org/
> List info   : http://www.activedir.org/mail_list.htm
> List FAQ    : http://www.activedir.org/list_faq.htm
> List archive: 
> http://www.mail-archive.com/activedir%40mail.activedir.org/
> 
> 
> List info   : http://www.activedir.org/mail_list.htm
> List FAQ    : http://www.activedir.org/list_faq.htm
> List archive: 
> http://www.mail-archive.com/activedir%40mail.activedir.org/

List info   : http://www.activedir.org/mail_list.htm
List FAQ    : http://www.activedir.org/list_faq.htm
List archive: http://www.mail-archive.com/activedir%40mail.activedir.org/

Reply via email to