Hi Joe,

AFIAK the passwords of the computer accounts are not set to expire, but they are 
automatically changed.

The password change is done from the netlogon service. The default time in NT was 15 
days, changed to 30 days in W2k and later. The client might decide to change after the 
half of the period is over, but has to change when it's over. So technically your NT4 
client might change it's password after 7,5 days, the WXP client after 15 days. It 
like in DHCP - half time of the period is over and it's up to client and server to 
decide when it's convenient to change.

But there's also a registry key underneath Netlogon/Parameters, which sets on the 
client not to change the password, or vice versa on the DCs to refuse password change 
requests.

So if you have a client who never exchanged his password, it will still work. However, 
if you have a client which was imaged, backed up, or running in a virtual machine 
using some roll back to snapshot feature, the following might occur:
1. The state of the client is backuped / snapshotted
2. The client runs in the domain, whenever it decides it'll change his computer 
password (NT4 earliest 7,5 days after joining the domain/resetting the password, WXP 
15 days)
3. After the client changed his password, you roll back the machine.

So if there was just one change, the AD remembers the last computer account password. 
A NT4 Domain does not, so the client in the NT4 Domain is not able to connect to the 
domain.
If there was more than one change of the computer account password between the client 
and the domain, you can not log on to the domain. You'll need to reset the computer 
account password first.

So especially for your Virtual Machines to test stuff there might be a reason to 
disable the password change on the client side. If the client does not change, the DC 
never will. Same as your user account password - if the user never decides to change 
the password the DC will not send him a mail with his new password ;-). And as I 
mentioned earlier, I'm quite sure that the password is not set to expire in the domain.
Look at KB 154501 (old KB, but AFAIK still valid) on how to disable the password 
change of the computer account either on the client or the server side.

Thinking of it - it would be a great security enhancement to set the computer account 
passwords to expire after a certain time. Because with the current behavior a client 
which was out of the domain for ages will always be able to log back onto it - since 
the client didn't had a contact to the domain it didn't change the password. So the 
old one is still valid. I believe the computer would not be able to handle the expired 
passwords, but WTH - if you set the period long enough this will never happens since 
he's used to change it's password frequently anyways. But since we are not able to do 
this as of today ...

OK - enough for now - just my 0.02â

Ulf

-----UrsprÃngliche Nachricht-----
Von: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Im Auftrag von joe
Gesendet: Donnerstag, 6. Mai 2004 14:31
An: [EMAIL PROTECTED]
Betreff: RE: [ActiveDir] Cached Domain Credential logon expiry for Win2k/X P

I am actually starting to wonder on this and how it actually works and now have some 
new theories.

I recently had to troubleshoot an issue and there were machines with passwords that 
were greater than 600 days old. The password had never been changed from the first day 
the machines were added to the domain and the machines WERE working fine with the 
domain. 

The issue ended up being that NETLOGON service had been disabled on the workstation. 
This made it so you couldn't use any local principals but you could still logon with a 
domain ID. The NETLOGON service is what keeps the passwords getting updated as well as 
the SP level and probably some other things in AD. I am sure there were probably some 
other things that weren't working quite exactly as expected either but the users 
seemed to have no issues. As soon as the service was restarted, the password changes 
started occurring again.

I didn't have a chance to really dig into why the accounts kept working whether it was 
some special flag or not, we just wanted it cleaned up. 

Since the passwords were that old though and the people could still use the domain, it 
makes me wonder if the passwords truly "break" for workstations, if it isn't on the 
workstation side versus the domain side.... I.E. The workstation is completely 
responsible for whole process and you actually have no control from the domain side. I 
always wondered how the regedit on the workstation could change the functionality, 
this would explain that. 

  joe




-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Roger Seielstad
Sent: Thursday, May 06, 2004 7:43 AM
To: [EMAIL PROTECTED]
Subject: RE: [ActiveDir] Cached Domain Credential logon expiry for Win2k/X P

Default password aging for machine accounts is 30 days in AD and 7 days in
NT4 domains..

Now - it will support current and previous, I believe, so techically you can get 60 
days out of it, IIRC.

--------------------------------------------------------------
Roger D. Seielstad - MTS MCSE MS-MVP
Sr. Systems Administrator
Inovis Inc.
 

> -----Original Message-----
> From: Depp, Dennis M. [mailto:[EMAIL PROTECTED]
> Sent: Thursday, May 06, 2004 6:54 AM
> To: [EMAIL PROTECTED]
> Subject: RE: [ActiveDir] Cached Domain Credential logon expiry for 
> Win2k/XP
> 
> There is not a time limit for cached credentials, but if the machine 
> does not change its password it will not be able to talk to the domain 
> when it returns.  The default time for this is 90 days.
>  
> Denny
> 
> 
> ________________________________
> 
>       From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] On Behalf Of joe
>       Sent: Wednesday, May 05, 2004 12:01 PM
>       To: [EMAIL PROTECTED]
>       Subject: RE: [ActiveDir] Cached Domain Credential logon expiry for 
> Win2k/XP
>       
>       
>       Our cached logon expert is Rick, he should be along shortly with 
> info... :o)
>        
>       I do not believe that there is an expiration. However a simple test 
> would be to take a test domain and set the password policy to 1 or
> 2 days and then join a laptop and see what happens if you don't log on 
> to the domain for 3 or  5 days or whatever.
>        
>          joe
> 
> ________________________________
> 
>       From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] On Behalf Of 
> [EMAIL PROTECTED]
>       Sent: Wednesday, May 05, 2004 11:47 AM
>       To: [EMAIL PROTECTED]
>       Subject: [ActiveDir] Cached Domain Credential logon expiry for 
> Win2k/XP
>       
>       
> 
>       Does anyone know how long cached credentials for domain logons are 
> valid on Win2K/XP machines?  Is there even an expiry date?  A concern 
> was raised by our desktop OS group that cached credentials for domain 
> logons may expire for laptop users who spend considerable time away 
> from the office, leaving them unable to access the workstation.  In My 
> life as a road warrior, I never had this happen to me, but I was never 
> way from a network connection (VPN or otherwise) for more than 2 
> weeks.
> 
>       I have been searching for a definitive answer in terms of a KB 
> article or some other "authoritative source" ( I guess my trust me 
> response was not authoritative enough), but have been unable to find 
> one.
> 
> 
> 
>       David Frost 
>       Directory Engineering, 
>       Messaging, Directories and PKI Engineering Services 
>       Industry Canada
> 
> 
> List info   : http://www.activedir.org/mail_list.htm
> List FAQ    : http://www.activedir.org/list_faq.htm
> List archive: 
> http://www.mail-archive.com/activedir%40mail.activedir.org/
> 
List info   : http://www.activedir.org/mail_list.htm
List FAQ    : http://www.activedir.org/list_faq.htm
List archive: http://www.mail-archive.com/activedir%40mail.activedir.org/

List info   : http://www.activedir.org/mail_list.htm
List FAQ    : http://www.activedir.org/list_faq.htm
List archive: http://www.mail-archive.com/activedir%40mail.activedir.org/

List info   : http://www.activedir.org/mail_list.htm
List FAQ    : http://www.activedir.org/list_faq.htm
List archive: http://www.mail-archive.com/activedir%40mail.activedir.org/

Reply via email to