IMHO it would be hard to ship an appliance for an application which requires designing the hardware around the scenario...
Thanks, Brian Desmond [EMAIL PROTECTED] c - 312.731.3132 > -----Original Message----- > From: [EMAIL PROTECTED] [mailto:ActiveDir- > [EMAIL PROTECTED] On Behalf Of Susan Bradley, CPA aka Ebitz - > SBS Rocks [MVP] > Sent: Saturday, July 29, 2006 2:50 PM > To: ActiveDir@mail.activedir.org > Subject: Re: [ActiveDir] Read-Only Domain Controller and Server Core > > Ah see but I don't like mushrooms. > > Stupid question alert? > > What's the specs on this? We've always joked that in SBSland with our > everything including the kitchen sink on our DCs if there was a way to > make the DC services like on a linksys sized box that attached to the > file/printer/email/kitchen sink box that would remove a lot of > "OHMYGOSHYOUDOWHATTOYOURDC!" that we get from the enterprise crowd. > > Are there any embedded OS like plans for this server core RODC? > > Crawford, Scott wrote: > > Well, since you offered....I'll take a large pan pepperoni and > mushroom. > > > > --------------------------------------------------------------------- > - > > -- > > *From:* [EMAIL PROTECTED] on behalf of Eric > > Fleischman > > *Sent:* Sat 7/29/2006 11:22 AM > > *To:* ActiveDir@mail.activedir.org > > *Subject:* RE: [ActiveDir] Read-Only Domain Controller and Server > Core > > > > I want to make one other thing clear....the other reason to ship the > > product in this state is secure by default. > > > > Out of the box, we have no idea what secrets you will want on the > > RODC. We don't know your enterprise or your threat model. As such, > > there's really no good choice....we too would be implicitly turning the > > knob for "better out of the box admin experience" vs "more secure out > > of the box." No good choices. > > > > So, even if you assume that this state is good for no one (a > > contention I'll disagree with, there are some enterprises that will > do > > this, but that's not the point), it is still the right state in which > > to ship the product. > > > > This is like ordering pizza for every admin in every forest on the > planet. > > > > ~Eric > > > > --------------------------------------------------------------------- > - > > -- > > > > *From:* [EMAIL PROTECTED] > > [mailto:[EMAIL PROTECTED] *On Behalf Of *Al Mulnick > > *Sent:* Friday, July 28, 2006 3:28 PM > > *To:* ActiveDir@mail.activedir.org > > *Subject:* Re: [ActiveDir] Read-Only Domain Controller and Server > Core > > > > That's the ~Eric we've come to know :) > > > > Thanks for that view. I'll take your advice and check for the traffic > > and rethink the view on the RODC concept. Like you said, it may prove > > uninteresting, but after that amount of information from you, Dmitri > > and Guido, I'd hate to leave that stone unturned. > > > > I'll ping back if I get lost watching the traces. I appreciate the > > offer and you guys taking the time to discuss this. > > > > Al > > > > On 7/28/06, *Eric Fleischman* <[EMAIL PROTECTED] > > <mailto:[EMAIL PROTECTED]>> wrote: > > > > Hi Al, > > > > Take your workstation and take a sniff of a logon. All traffic you > > throw at the DC will work against the RODC. The only WAN traffic in > > that scenario would be the auth itself, a tiny amt of work. (assuming > > GC and all that is satisfied locally) > > > > So, the statement that authentication is your biggest use is true, > > kinda...you need to more carefully define the operation. I suspect you > > don't mean auth in the Kerberos sense, you mean "user logon" really. > > Unless your branch has a bunch of apps that do Kerb work and no > > clients....then you can correct me and we have a totally different > > conversation on our hands. :) > > > > Answering some questions of yours, from this and other forks of the > > thread..... > > > > > What conditions would make it so that the password policy would be > > configured such that the password replication > > > > > was not allowed? > > > > There is a policy (not group policy, administrative one defined in AD > > itself) which defines what can be cached there and what can not. The > > statement made (I think first by Dmitri, but I then commented on it > > further) was that by default, this policy allows almost nothing to be > > cached. You could tweak this in your enterprise and change what is > > cached, anything from the near-nothing default to almost every secret > > in the domain. You can choose. > > > > > Would that just be that the RODC is no longer trusted (i.e. it was > > abducted or otherwise compromised?) > > > > Well, we never know if an RODC was compromised. Rather, RODC was > built > > such that you the admin can assume they are compromised, and fully > > understand the scope of compromise in your enterprise should it > happen > > one day, and respond to said event. > > > > So, I say you should look at this problem the other way.... Treat your > > RODCs /as if /they were about to get compromised, then make real > > decisions around how much work the recovery from said compromise > would > > be vs. actually having an environment that is useful, reliable, easy > > to manage, etc. That's what I was talking about re: the knobs....you > can > > turn said knobs and make decisions that work for you. And we'll have > > documentation that will help you do this. > > > > > Or is that something that some admin can configure and hurt > > themselves? Better yet, if that were true, is there any value left in > > the > > > > > RODC that can't get a password hash? > > > > I think I answered this but please holler if it is still unclear. > > > > > Outside of "GP work" what else comes to mind that is off-loaded to > > the local site that you can think of? > > > > Take a network sniff of your clients talking to your DCs for a day. > > Almost all of that stuff. J You could have apps, you have logon > > itself, etc. > > > > > Perhaps I'm looking at this sideways? > > > > Every environment is different. It is entirely possible that a > > secret-less RODC is totally uninteresting in your enterprise. That > > said, I would argue that you probably haven't done enough > > investigation yet to really know if that's true or not...it's not > > personal, why would you? This has likely never been relevant. Almost > > no one does this sort of analysis unless they absolutely have to. > > > > Take some data, please report back to us. I'd love to look at said > > data with you if you're unclear as to what would fall in what bucket. > > > > Hope this helps. Please holler back with questions. > > > > ~Eric > > > > --------------------------------------------------------------------- > - > > -- > > > > *From:* [EMAIL PROTECTED] > > <mailto:[EMAIL PROTECTED]> > > [mailto:[EMAIL PROTECTED] > > <mailto:[EMAIL PROTECTED]>] *On Behalf Of *Al > Mulnick > > *Sent:* Friday, July 28, 2006 10:34 AM > > > > > > *To:* ActiveDir@mail.activedir.org > > <mailto:ActiveDir@mail.activedir.org> > > > > *Subject:* Re: [ActiveDir] Read-Only Domain Controller and Server > Core > > > > More clarity is always welcome. > > > > I suspect I'm trying to get my mind around the GPO providing that > much > > value that I would want to put a DC in the local brach as part of the > > design vs. trying really hard to use as little of the GPO as possible > > and making sure that the changes are as infrequent as possible. > > > > Authentication and name resolution are my biggest uses for a local DC > > in a branch. Outside of Exchange of course. Everything else I try to > > keep as compartmentalized as I can because if my WAN is a concern > such > > that I can't use authentication across the wire (or can't trust it) > > then I have some big concerns about the branch environment and how > > autonomous it is. > > > > Outside of "GP work" what else comes to mind that is off-loaded to > the > > local site that you can think of? > > > > Perhaps I'm looking at this sideways? > > > > On 7/28/06, *Eric Fleischman* < [EMAIL PROTECTED] > > <mailto:[EMAIL PROTECTED]>> wrote: > > > > To add a bit more... > > > > > The part that makes me wonder about the "story" is if it stores no > > secrets is the server doing anything for me? > > > > The short answer is yes. > > > > The bulk of the work that a DC does, even in the auth code path, may > > not involve the secret. So even if the secret checking work is > > "outsourced" to a hub DC, there is a lot more work that the local DC > > can perform for the user. For example, if it is an interactive logon, > > consider all of the GP work alone that is done that is now local. > > > > At the end of the day, you have a knob....you can make real security > > trade-offs based upon what attack surface you can accept & mitigate, > > what administrative story you want, etc. You get to choose what > > secrets end up on the RODC. The product is built such that you can > > turn these knobs as you see fit but the default knob setting is "more > > secure". > > > > I hope between my response and Dmitri's you are clear that the belief > > that it stores "nothing locally" is incorrect. If more clarity is > > required please just holler. > > > > ~Eric > > > > --------------------------------------------------------------------- > - > > -- > > > > *From:* [EMAIL PROTECTED] > > <mailto:[EMAIL PROTECTED]> > > [mailto:[EMAIL PROTECTED] > > <mailto:[EMAIL PROTECTED]>] *On Behalf Of *Dmitri > > Gavrilov > > *Sent:* Friday, July 28, 2006 9:48 AM > > > > > > *To:* ActiveDir@mail.activedir.org > > <mailto:ActiveDir@mail.activedir.org> > > *Subject:* RE: [ActiveDir] Read-Only Domain Controller and Server > Core > > > > The set of passwords that **can** be sent down to the RODC is > > controlled by password replication policy. The passwords are sent > down > > by RODC's request, but the hub also checks whether the user (whose > pwd > > is being requested) actually attempted to authenticate at RODC (the > > hub can induce this info from the traffic is sees). The pwd hash is > > sent down only if both are satisfied: pwd policy allows it and the > > user actually attempted to logon there. > > > > Pwd policy is "empty" by default, i.e. nobody is in "allowed to > > reveal" list. It is admin's responsibility to populate this list. We > > might have some UI that helps with this process. > > > > Once the hash is sent down, there's no way to remove it from RODC, > > basically because we do not trust that RODC will remove it, even if > > instructed to do so. Therefore, the only way to "expire" the hash is > > to change the password. We store the list of passwords that were sent > > down to RODC in an attribute on the RODC computer object (the hub DC > > updates the list when it sends a pwd). So, if the RODC is stolen, you > > can enumerate whose passwords were down there, and make these users > > reset their passwords. There's a constructed attribute that returns > > only the users whose * *current** passwords appear to be on the RODC. > > > > WRT what data is sent down - currently, we send everything, sans a > > handful of "secret" attributes, which are controlled by pwd > > replication policy. There's a DCR to be able to configure the list of > > attributes that can go down to RODC (aka RODC PAS), but it is not yet > > clear if we will get it done or not. Note that the client data access > > story on RODC becomes quite convoluted because you don't know if you > > are seeing the whole object or only a subset of it. We do not > normally > > issue referrals due to "partial reads". > > > > *From:* [EMAIL PROTECTED] > > <mailto:[EMAIL PROTECTED]> > > [mailto:[EMAIL PROTECTED] > > <mailto:[EMAIL PROTECTED]>] *On Behalf Of > > [EMAIL PROTECTED] <mailto:[EMAIL PROTECTED]> > > *Sent:* Friday, July 28, 2006 8:22 AM > > *To:* ActiveDir@mail.activedir.org > > <mailto:ActiveDir@mail.activedir.org> > > *Subject:* RE: [ActiveDir] Read-Only Domain Controller and Server > Core > > > > RODC stores password hashes only for a pre defined list of users and > > they are not stored on a permanent basis. [I'm unclear how the latter > > is achieved.] > > > > The goal is such that if the RODC were removed from the office then > no > > password secrets could be extracted from that machine. > > > > neil > > > > --------------------------------------------------------------------- > - > > -- > > > > *From:* [EMAIL PROTECTED] > > <mailto:[EMAIL PROTECTED]> [mailto: > > [EMAIL PROTECTED] > > <mailto:[EMAIL PROTECTED]>] *On Behalf Of *Al > Mulnick > > *Sent:* 28 July 2006 16:08 > > *To:* ActiveDir@mail.activedir.org > > <mailto:ActiveDir@mail.activedir.org> > > *Subject:* Re: [ActiveDir] Read-Only Domain Controller and Server > Core > > > > The part that makes me wonder about the "story" is if it stores no > > secrets is the server doing anything for me? Is there a point to > > deploying the server in a remote office other than just being able to > > point to it in the closet and say, "see, I do to earn my paycheck!" > > > > I'm sure there's more, but I don't yet know which parts are public > > information and which are NDA. > > > > Can you tell I'm concerned about the story being created? I like > > stories; don't get me wrong. But I'm concerned that the story being > > spun up might be missing the mark and lead a few people astray. > > > > Safe to note that there are some features that differentiate the RODC > > from a NT4 BDC and that make it appealing in some cases. > > > > But if it actually does not store anything locally, ever, then I'm > not > > sure it's worth the time to deploy one now is it? > > > > Al > > > > > > > > On 7/27/06, *Susan Bradley, CPA aka Ebitz - SBS Rocks [MVP]* < > > [EMAIL PROTECTED] <mailto:[EMAIL PROTECTED]>> wrote: > > > > FYI: > > > > http://blogs.msdn.com/jolson/archive/2006/07/27/679801.aspx > > <http://blogs.msdn.com/jolson/archive/2006/07/27/679801.aspx> > > > > > > Read-Only Domain Controller and Server Core > > > > > > > > > > List info : http://www.activedir.org/List.aspx > > List FAQ : http://www.activedir.org/ListFAQ.aspx > > List archive: http://www.activedir.org/ml/threads.aspx > > > > PLEASE READ: The information contained in this email is confidential > > and > > > > intended for the named recipient(s) only. If you are not an intended > > > > recipient of this email please notify the sender immediately and > > delete your > > > > copy from your system. You must not copy, distribute or take any > > further > > > > action in reliance on it. Email is not a secure method of > > communication and > > > > Nomura International plc ('NIplc') will not, to the extent permitted > > by law, > > > > accept responsibility or liability for (a) the accuracy or > > completeness of, > > > > or (b) the presence of any virus, worm or similar malicious or > > disabling > > > > code in, this message or any attachment(s) to it. If verification of > > this > > > > email is sought then please request a hard copy. Unless otherwise > > stated > > > > this email: (1) is not, and should not be treated or relied upon as, > > > > investment research; (2) contains views or opinions that are solely > > those of > > > > the author and do not necessarily represent those of NIplc; (3) is > > intended > > > > for informational purposes only and is not a recommendation, > > solicitation or > > > > offer to buy or sell securities or related financial instruments. > > NIplc > > > > does not provide investment services to private customers. Authorised > > and > > > > regulated by the Financial Services Authority. Registered in England > > > > no. 1550505 VAT No. 447 2492 35. Registered Office: 1 St > > Martin's-le-Grand, > > > > London, EC1A 4NP . A member of the Nomura group of companies. > > > List info : http://www.activedir.org/List.aspx > List FAQ : http://www.activedir.org/ListFAQ.aspx > List archive: http://www.activedir.org/ml/threads.aspx List info : http://www.activedir.org/List.aspx List FAQ : http://www.activedir.org/ListFAQ.aspx List archive: http://www.activedir.org/ml/threads.aspx