What Are You Doing Right Now
-
-
Party day around here. Been partying for hours already.
-
Just finished the first week's training session for the DevOps course at cloudskills.io.
It was fantastic!
-
Catching up on some E-mail / comments from YouTube videos.
-
Just got home from Rachel's 30th birthday party.
-
Wondering if I can get into work tomorrow. More flooding and more rain to come ️
-
@EddieJennings said in What Are You Doing Right Now:
Catching up on some E-mail / comments from YouTube videos.
Oh what a horrible thing to do. The Internet is full of haters.
-
@scottalanmiller said in What Are You Doing Right Now:
Party day around here. Been partying for hours already.
You at work?
-
@hobbit666 said in What Are You Doing Right Now:
Wondering if I can get into work tomorrow. More flooding and more rain to come ️
Yep, gee you guys have been copping some rain.
-
@scottalanmiller said in What Are You Doing Right Now:
@Obsolesce said in What Are You Doing Right Now:
@scottalanmiller said in What Are You Doing Right Now:
@popester said in What Are You Doing Right Now:
@scottalanmiller said in What Are You Doing Right Now:
@popester said in What Are You Doing Right Now:
Trying to wrap my brain around adding a CA to our domain so we can encrypt traffic between servers. OMG... Where do I start....
For AD, I assume?
Yes sir. What brought it about was we run Citrix xenapp and nothing is encrypted this side of the ADC
Well, the passwords are. That's the only important bit in a typical domain communications chain. Not to belittle "encrypt everything", because that's a good idea in general. Just saying that AD is decently secure even when at its least secure.
AD (and everything using it) is only as secure as the DC.
DCs are pretty secure unless you screw something up. However, the DC does not hold passwords, so even a compromised DC does not divulge passwords. So technically, it can be more secure than the DC
Hey Scott, can you enlighten me here? I'm no expert on this topic, but I expect the passwords to be stored someplace and somehow in the AD database?????????
-
@siringo said in What Are You Doing Right Now:
@EddieJennings said in What Are You Doing Right Now:
Catching up on some E-mail / comments from YouTube videos.
Oh what a horrible thing to do. The Internet is full of haters.
Ha! The couple of things I'm responding to are folks asking questions about stuff.
-
@siringo said in What Are You Doing Right Now:
@scottalanmiller said in What Are You Doing Right Now:
@Obsolesce said in What Are You Doing Right Now:
@scottalanmiller said in What Are You Doing Right Now:
@popester said in What Are You Doing Right Now:
@scottalanmiller said in What Are You Doing Right Now:
@popester said in What Are You Doing Right Now:
Trying to wrap my brain around adding a CA to our domain so we can encrypt traffic between servers. OMG... Where do I start....
For AD, I assume?
Yes sir. What brought it about was we run Citrix xenapp and nothing is encrypted this side of the ADC
Well, the passwords are. That's the only important bit in a typical domain communications chain. Not to belittle "encrypt everything", because that's a good idea in general. Just saying that AD is decently secure even when at its least secure.
AD (and everything using it) is only as secure as the DC.
DCs are pretty secure unless you screw something up. However, the DC does not hold passwords, so even a compromised DC does not divulge passwords. So technically, it can be more secure than the DC
Hey Scott, can you enlighten me here? I'm no expert on this topic, but I expect the passwords to be stored someplace and somehow in the AD database?????????
AD never stores passwords. AD only stores a password hash, ever. It has no way to recreate the original password or retrieve it. The only time to get the original password is to grab it at the time that it is typed in.
This is a fundamental part of the security system - AD never knows, stores, or has your passwords at any step of the process. They aren't told to the server ever, they are never sent over the network, etc.
Now, if you can completely compromise an end point to the point that you are on the network and sending your own direct hash to AD, you can still authenticate even without a password. But if you can do that, you've completely compromised the system anyway and didn't need to do so.
-
@RojoLoco I haven't looked at monoprice in a long time so will have to check it out. i do have a Phase Technology speaker system at home though with 15" sub and i do love it.
-
@Obsolesce I haven't seen that site, I'm going to check it out. Could always use more learning resources.
-
@scottalanmiller said in What Are You Doing Right Now:
@siringo said in What Are You Doing Right Now:
@scottalanmiller said in What Are You Doing Right Now:
@Obsolesce said in What Are You Doing Right Now:
@scottalanmiller said in What Are You Doing Right Now:
@popester said in What Are You Doing Right Now:
@scottalanmiller said in What Are You Doing Right Now:
@popester said in What Are You Doing Right Now:
Trying to wrap my brain around adding a CA to our domain so we can encrypt traffic between servers. OMG... Where do I start....
For AD, I assume?
Yes sir. What brought it about was we run Citrix xenapp and nothing is encrypted this side of the ADC
Well, the passwords are. That's the only important bit in a typical domain communications chain. Not to belittle "encrypt everything", because that's a good idea in general. Just saying that AD is decently secure even when at its least secure.
AD (and everything using it) is only as secure as the DC.
DCs are pretty secure unless you screw something up. However, the DC does not hold passwords, so even a compromised DC does not divulge passwords. So technically, it can be more secure than the DC
Hey Scott, can you enlighten me here? I'm no expert on this topic, but I expect the passwords to be stored someplace and somehow in the AD database?????????
AD never stores passwords. AD only stores a password hash, ever. It has no way to recreate the original password or retrieve it. The only time to get the original password is to grab it at the time that it is typed in.
This is a fundamental part of the security system - AD never knows, stores, or has your passwords at any step of the process. They aren't told to the server ever, they are never sent over the network, etc.
Now, if you can completely compromise an end point to the point that you are on the network and sending your own direct hash to AD, you can still authenticate even without a password. But if you can do that, you've completely compromised the system anyway and didn't need to do so.
I thought there was a "store password with reversable hash" option in AD? Granted, you should never user it.
-
-
@Dashrender said in What Are You Doing Right Now:
Yep, here it is
https://docs.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/store-passwords-using-reversible-encryptionAKA the original backdoor to encryption that the US wants to enforce on everyone.
-
@DustinB3403 said in What Are You Doing Right Now:
@Dashrender said in What Are You Doing Right Now:
Yep, here it is
https://docs.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/store-passwords-using-reversible-encryptionAKA the original backdoor to encryption that the US wants to enforce on everyone.
Hell of a lot more than just the US - US, UK, Australia, China, N. Korea... I'm sure most of the middle east, likely Russia (though I've never heard it mentioned in any news or podcasts, likely because it's assumed since they are totalitarian regimes)
-
@Dashrender said in What Are You Doing Right Now:
I thought there was a "store password with reversable hash" option in AD? Granted, you should never user it.
The password is never stored. Simply the hash is easily reversible into the password.
-
Very short on staff today.