Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fixed forest/domain name configuration in CredSpec #711

Merged
merged 1 commit into from
Feb 7, 2018

Conversation

rpsqrd
Copy link
Contributor

@rpsqrd rpsqrd commented Jan 24, 2018

The existing behavior for setting the DnsName and DnsTreeName values would only work in a single-domain forest because the values were swapped. This fix corrects the values so that credential specs can be generated in multi-domain forests.

The existing behavior for setting the DnsName and DnsTreeName values would only work in a single-domain forest because the values were swapped. This fix corrects the values so that credential specs can be generated in multi-domain forests.
@tfenster
Copy link
Contributor

That one actually breaks it for me, as processes running inside a container no check the wrong domain if I do e.g. Get-ADUser. But that might well be caused by some kind of misconfiguration in our AD structure

@rpsqrd
Copy link
Contributor Author

rpsqrd commented Jan 24, 2018

@tfenster Well that isn't good! Do you have a single or multi-domain forest?

@tfenster
Copy link
Contributor

tfenster commented Jan 24, 2018

@rpsqrd multi-domain. But it seems like something else went wrong, because gMSAs now don't work anymore for me even if I switch back to the old .psm1. Do you happen to know more in this area? I thought I had solved the problem described in issue #618 by allowing anonymous SID/Name translation, but now the same error happens again

@stevenfollis
Copy link

Thanks @rpsqrd for this very timely fix! Was able to successfully troubleshoot an issue this evening with a customer who runs a multi-domain forest.

@rpsqrd
Copy link
Contributor Author

rpsqrd commented Jan 25, 2018

@tfenster Can you run Test-ADServiceAccount on the host to ensure it still has access to the gMSA? If it does, please send me an email (ryan dot puffer at microsoft dot com) with your docker run command, credential spec file, quick summary of your AD topology, and the result of running nltest /sc_verify:<domain.com> in your (broken) container.

In general we would not advise allowing anonymous name/SID translation in production environments. It could allow an attacker to more easily resolve resources in your domain. However, we're aware of issues with name/SID translation in containers that I hope to document soon -- stay tuned!

@stevenfollis That's great to hear! So the updated script worked well for you?

@tfenster
Copy link
Contributor

@rpsqrd I was able to get it back to work after restoring activation (the machine claimed that for whatever reason it had lost the connection to the activation server) and rebooting the machine. I then used your fixed script and now it works without allowing anonymous name/SID translation. Thanks a lot!

It seems like the activation problem coincidentally happened at around the same time as I downloaded your fix and because of the timing thought your fix was causing the problem

@rpsqrd
Copy link
Contributor Author

rpsqrd commented Jan 26, 2018

@scooley Could you help complete this pull request?

@scooley scooley merged commit a8c9d7a into MicrosoftDocs:live Feb 7, 2018
@rpsqrd rpsqrd deleted the patch-1 branch February 21, 2018 23:52
BenjaminArmstrong pushed a commit that referenced this pull request Apr 26, 2022
Validation: Alt Text Added, Absolute Links Removed, Metadata Added
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

4 participants