On Mon, 2009-09-28 at 13:22 +0000, Bill Wesse wrote: 
> Good morning Andrew - yes, NetrLogonGetDomainInfo bypasses the 
> servicePrincipalName constraints (as Hongwei noted). This applies to Windows 
> 2003/2003 R2, and was fixed in Windows 2008 and beyond.
> 
> This is currently a bug against Windows 2003, but no hotfix has yet been 
> produced. I will be glad to alert you to when this occurs.
> 
> Here is the response Hongwei provided Thursday, September 10, 2009 8:40 AM:
> 
> We confirmed that Windows server 2008 and later systems addressed the problem 
> by implementing validation of the DNSHostName and SPN in 
> NetrLogonGetDomainInfo to enforce the same constraints as specified in 
> section 3.1.1.5.3.1.1.2(dNSHostName) and 
> 3.1.1.5.3.1.1.4(servicePrincipalName) in MS-ADTS.

I'm sorry, I must not have been clear in my point:

> Did we determine earlier that these updates occur regardless of the access 
> control on the object (confirmed with AD Dev team, but I don't think it's in 
> the docs).

I refer here to the access control that would normally be imposed by the
nTSecurityDescriptor and enforced over LDAP.  It is my understanding
(discussion with Nathan Muggli) that these are done as 'SYSTEM' (not the
actual workstation account), but I don't recall that being in the doc.

(This isn't a security hole, because you can only update your own
record, but it's important to note for those doing an ACL
implementation).

Andrew Bartlett

-- 
Andrew Bartlett                                http://samba.org/~abartlet/
Authentication Developer, Samba Team           http://samba.org
Samba Developer, Cisco Inc.

Attachment: signature.asc
Description: This is a digitally signed message part

_______________________________________________
cifs-protocol mailing list
cifs-protocol@cifs.org
https://lists.samba.org/mailman/listinfo/cifs-protocol

Reply via email to