Security Basics mailing list archives
Re: AD in the DMZ . . . OK?
From: "Ivan Coric" <ivan.coric () workcoverqld com au>
Date: Thu, 29 Jul 2004 14:13:12 +1000
Karl, IMHO it's a big no no. Have yr servers as standalone with limited user accounts and info. If that server is compromised it may be possible to elevate privileges and gain account info by interrogating AD. cheers Ivan Ivan Coric, CISSP IT Technical Security Officer Information Technology WorkCover Queensland Ph: (07) 30066414 Fax: (07) 30066424 Email: ivan.coric () workcoverqld com au
karl <opium () runningriver co uk> 07/28/04 08:49pm >>>
Hello One of the developers I work with has come up with a wild and crazy notion to write a .NET app that sits on a DMZ Web server but gets user information from the Active Directory on the other side of the firewall.. I'm inexperienced with this, so did some research and found that this kind of thing is possible (plenty of articles on putting Exchange servers in the DMZ), but found myself wondering if this ever happens, i.e. do people actually have their networks set up this way? Do folk expose/replicate AD to the DMZ in practice? It's all very well that this stuff is possible, but if it's perceived as insecure and not implementable in the real world . . . . . . . Thanks for any advice . . . . . Karl --------------------------------------------------------------------------- Ethical Hacking at the InfoSec Institute. Mention this ad and get $545 off any course! All of our class sizes are guaranteed to be 10 students or less to facilitate one-on-one interaction with one of our expert instructors. Attend a course taught by an expert instructor with years of in-the-field pen testing experience in our state of the art hacking lab. Master the skills of an Ethical Hacker to better assess the security of your organization. Visit us at: http://www.infosecinstitute.com/courses/ethical_hacking_training.html ---------------------------------------------------------------------------- *************************************************************************** Messages included in this e-mail and any of its attachments are those of the author unless specifically stated to represent WorkCover Queensland. The contents of this message are to be used for the intended purpose only and are to be kept confidential at all times. This message may contain privileged information directed only to the intended addressee/s. Accidental receipt of this information should be deleted promptly and the sender notified. This e-mail has been scanned by Sophos for known viruses. However, no warranty nor liability is implied in this respect. ********************************************************************** --------------------------------------------------------------------------- Ethical Hacking at the InfoSec Institute. Mention this ad and get $545 off any course! All of our class sizes are guaranteed to be 10 students or less to facilitate one-on-one interaction with one of our expert instructors. Attend a course taught by an expert instructor with years of in-the-field pen testing experience in our state of the art hacking lab. Master the skills of an Ethical Hacker to better assess the security of your organization. Visit us at: http://www.infosecinstitute.com/courses/ethical_hacking_training.html ----------------------------------------------------------------------------
Current thread:
- AD in the DMZ . . . OK? karl (Jul 28)
- Re: AD in the DMZ . . . OK? Pierre A. Cadieux (Jul 29)
- Re: AD in the DMZ . . . OK? Oleg K . Artemjev (Jul 29)
- Re: AD in the DMZ . . . OK? Tomasz Onyszko (Jul 29)
- <Possible follow-ups>
- RE: AD in the DMZ . . . OK? Roger A. Grimes (Jul 29)
- Re: AD in the DMZ . . . OK? Ivan Coric (Jul 30)
- RE: AD in the DMZ . . . OK? Dieter Sarrazyn (Jul 30)
- Re: AD in the DMZ . . . OK? Ansgar -59cobalt- Wiechers (Jul 31)
- Re: AD in the DMZ . . . OK? Peter Van Eeckhoutte (Jul 31)
- RE: AD in the DMZ . . . OK? Handy, Mark (IT) (Jul 30)
- RE: AD in the DMZ . . . OK? Ferino Mardo (Jul 30)