Scaling NT To The Campus Integrating NT into the MIT Computing Environment Danilo Almeida, MIT.

Slides:



Advertisements
Similar presentations
Single Sign-On with GRID Certificates Ernest Artiaga (CERN – IT) GridPP 7 th Collaboration Meeting July 2003 July 2003.
Advertisements

Windows 2000 Security --Kerberos COSC513 Project Sihua Xu June 13, 2014.
Active Directory and NT Kerberos Rooster JD Glaser.
Windows 2000 Kerberos Interoperability Paul Hill Co-Leader, Kerberos Development Team MIT John Brezak Program Manager Windows 2000 Security Microsoft.
UNIX & W2K A single sign-on solution for a Kerberos V based AFS cell Enrico M.V. Fasanelli & Fulvio Ricciardi I.N.F.N. – Sezione di Lecce.
Password? CLASP Project Update C5 Meeting, 16 June 2000 Denise Heagerty, IT/IS.
How to Succeed with Active Directory Robert Williams, PhD CEO Secure Logistix Corporation.
Password?. Project CLASP: Common Login and Access rights across Services Plan
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory, Enhanced Chapter 1: Introduction to Active Directory.
3.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 3: Introducing Active Directory.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
3.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 3: Introducing Active Directory.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 1: Introduction to Windows Server 2003.
Securing Access in a Heterogeneous Network Environment Providing Interoperability between Microsoft Windows 2000 and Heterogeneous Networks Securing Authentication.
HalFILE 3.0 Active Directory Integration. halFILE 3.0 AD – What is it? Centralized organization of network objects and security – servers, computers,
31/10/2000NT Domain - AD Migration - JLab 2000 NT DOMAIN - ACTIVE DIRECTORY MIGRATION Michel Jouvin LAL Orsay
Chapter 5 Roles and features. objectives Performing management tasks using the Server Manager console Understanding the Windows Server 2008 roles Understanding.
Slide Master Layout Useful for revisions and projector test  First-level bullet  Second levels  Third level  Fourth level  Fifth level  Drop body.
Test Review. What is the main advantage to using shadow copies?
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
AFS & Kerberos Best Practices Workshop 2008 Design Goals Functions that require authentication Solution Space Kerberos, GSSAPI or SASL (Decide on your.
Chapter 4 Windows NT/2000 Overview. NT Concepts  Domains –A group of one or more NT machines that share an authentication database (SAM) –Single sign-on.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
Technology Overview. Agenda What’s New and Better in Windows Server 2003? Why Upgrade to Windows Server 2003 ?  From Windows NT 4.0  From Windows 2000.
Hands-On Microsoft Windows Server Security Enhancements in Windows Server 2008 Windows Server 2008 was created to emphasize security –Reduced attack.
Chapter 7: WORKING WITH GROUPS
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
Designing Active Directory for Security
Windows 2000 Operating System -- Active Directory Service COSC 516 Yuan YAO 08/29/2000.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 1: Introduction to Windows Server 2003.
DIT314 ~ Client Operating System & Administration CHAPTER 5 MANAGING USER ACCOUNTS AND GROUPS Prepared By : Suraya Alias.
8.1 © 2004 Pearson Education, Inc. Exam Designing a Microsoft ® Windows ® Server 2003 Active Directory and Network Infrastructure Lesson 8: Planning.
September 18, 2002 Windows 2000 Server Active Directory By Jerry Haggard.
Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication.
Module 5 Configuring Authentication. Module Overview Lesson 1: Understanding Classic SharePoint Authentication Providers Lesson 2: Understanding Federated.
Module 7 Active Directory and Account Management.
Windows NT ® Single Sign On Cross Platform Applications (Part II) John Brezak Program Manager Windows NT Security Microsoft Corporation.
Introduction to Microsoft Management Console (MMC) MMC is a common console framework for management applications. MMC provides a common environment for.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Active Directory Harikrishnan V G 18 March Presentation titlePage 2 Agenda ► Introduction – Active Directory ► Directory Service ► Benefits of Active.
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
W2K and Kerberos at FNAL Jack Mark
1 Windows 2008 Configuring Server Roles and Services.
1 Administering Shared Folders Understanding Shared Folders Planning Shared Folders Sharing Folders Combining Shared Folder Permissions and NTFS Permissions.
Planning a Microsoft Windows 2000 Administrative Structure Designing default administrative group membership Designing custom administrative groups local.
Current Deployment (NT4) n Minimal central infrastructure u DHCP/DNS service (non NT) u WINS service (but not supported) u Software image repository u.
Introduction to Microsoft Windows 2000 Integrated support for client/server and peer-to-peer networks Increased reliability, availability, and scalability.
Introduction to Microsoft Windows 2000 Welcome to Chapter 1 Windows 2000 Server.
W2K and Kerberos at FNAL Jack Schmidt Mark Kaletka.
Samba – Good Just Keeps Getting Better The new and not so new features available in Samba, and how they benefit your organization. Copyright 2002 © Dustin.
Windows Server 2003 La migrazione da Windows NT 4.0 a Windows Server 2003 Relatore: MCSE - MCT.
2.1 © 2004 Pearson Education, Inc. Exam Designing a Microsoft ® Windows ® Server 2003 Active Directory and Network Infrastructure Lesson 2: Examining.
Module 2: Introducing Windows 2000 Security. Overview Introducing Security Features in Active Directory Authenticating User Accounts Securing Access to.
Introduction to Active Directory
1 Chapter 13: RADIUS in Remote Access Designs Designs That Include RADIUS Essential RADIUS Design Concepts Data Protection in RADIUS Designs RADIUS Design.
1 Overview of Microsoft Windows 2000 Multipurpose OS Reduces total cost of ownership (TCO)
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
Automating Installations by Using the Microsoft Windows 2000 Setup Manager Create setup scripts simply and easily. Create and modify answer files and UDFs.
Active Directory and NT Kerberos. Introduction to NT Kerberos v5 What is NT Kerberos? How is it different from NTLM NT Kerberos vs MIT Kerberos Delegation.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
Configuring the User and Computer Environment Using Group Policy Lesson 8.
Secure Connected Infrastructure
Objectives Differentiate between the different editions of Windows Server 2003 Explain Windows Server 2003 network models and server roles Identify concepts.
Examining a Windows NT Infrastructure (2)
CLASP Project AAI Workshop, Nov 2000 Denise Heagerty, CERN
Unit 6 NT1330 Client-Server Networking II Date: 7/19/2016
Presentation transcript:

Scaling NT To The Campus Integrating NT into the MIT Computing Environment Danilo Almeida, MIT

What do we mean by scaling? There are several possible metrics that can be used. We are concerned with the basic academic computing environment which is used by most students at MIT. Our present environment is Athena.

What is Athena? Athena is a heterogeneous distributed computing environment. Objects managed via a database –30,000 users –60,000-80,000 computers Security –Kerberos v4 and v5 environment

Athena Distributed file system (AFS) –user files –some software run out of AFS Single-user workstations running one of many OSes (Solaris, IRIX, others) –single-user –serial reusability –software can be remotely updated

Driving scaling metrics Ability to manage a “large” number of user accounts –Where “large” is >30,000 Ability to manage a “large” number of workstations –Where the goal of “large” is >10,000 Do this with a small support staff (low cost) –less than linear growth

Driving scaling metrics - cost Sustainability –Ability to sustain the system - includes the recurring costs, or vendor imposed upgrade costs. This must be part of the business model. TCO - Total Cost of Ownership –stop making the users constantly reinstall or reconfigure the software –don’t ignore the costs of your central staff

Ignored scaling metrics Transactions per second Concurrent user connections Analyzing massive data sets

Objects Users –must be global Resources –servers –printers –other information

Global Users - Problem UNIX –standard applications use the passwd file and don’t care (UID is UID…) NT –standard applications look up the user and can tell whether user is local or global (domain) (SIDs are machine/domain-relative)

Global Users - Solution UNIX –At logon, populate local machine’s passwd file with that user’s information from database NT –puts users in domain

Resources Servers & Printers –already using distributed file system –have our own printing infrastructure –departments may have their own, but not necessary globally Other information –Windows 2000 applications may store site-wide configuration information

Some NT 4.0 scaling limits Limits imposed by Domain Controller –40MB of objects or about 25,000 users –MIT has 30,000 users and 60,000 to 80,000 computers Trust relationship overcome the limitation –In larger installations, Windows NT Server customers create multiple domains within their organizations and establish trust relationships between them.

Resource domains and trust

Windows 2000 scaling? No practical limits? –Microsoft believes there are no practical limits to the amount of objects that could be loaded into the Active Directory. Limiting Factors –the overhead of replication traffic over the network –the speed at which object data can be backed up and restored for disaster recovery purposes

Security Security at MIT Kerberos v4 Kerberos v5 GSS API (for Kerberos v5) X.509 Certificates (new)

Kerberos issues facing MIT Windows 2000 will use Kerberos v5 as the default authentication mechanism No support for v4 No support for GSS API Microsoft KDC required for domains –MS domain controller = KDC + ADS Limited interoperability with MIT’s Kerberos v5 reference implementation

On the positive side Stronger than today’s NTLM Forwarding tickets allows impersonation Optional use of public key technology to obtain Kerberos tickets

Microsoft Kerberized Services Using Kerberos to distribute keys for proprietary version of –IPSec –Secure DNS and DHCP Any service that uses the SSPI, e.g. Exchange Server

Other Interoperability issues No DCE interoperability NT KDC can be used to support existing v5 clients and hosts as long as DES-CBC-MD5 or DES-CBC-CRC encryption types are used for authentication. UNIX client applications using the GSS- API can obtain session tickets Interoperability requires a North American version of Windows 2000

Domain vs. local account NT workstations can be configured to use an MIT Kerberos server with single sign on to the MIT KDC but only with a local account.

What’s the Problem? Microsoft added a “PAC” to the Kerberos 5 ticket Contains group membership information for the user Not compatible with the DCE PAC Microsoft PAC format is not currently public

Some Beta 2 issues Only DES-CBC-MD5 and DES-CBC-CRC are implemented. User-to-user authentication is not implemented. Hierarchical realm support for cross- platform trust is not implemented. But, transitive trust between NT domains in a tree is supported.

Solving the problem Two possible solutions –Add support for MS PAC’s in the MIT KDC –The Cross-realm hack Microsoft developers prefer the second solution.

Add PAC Support to MIT KDC Requires Microsoft disclosure of the PAC format –Promised by Microsoft –post beta 2 changed to post beta 3 This solution still requires that the KDC obtain the group information from the ADS somehow (probably using LDAP)

The Cross-Realm Hack Preferred by the MS developers Put the servers and users in different realms; users in the original Kerberos realm, and servers in another realm. Users get initial tickets in the client (original realm) NT Servers and Workstations have identities in the server (NT Domain) realm

Comparing the Solutions Both will work Cross-realm hack’s advantages –Does not require as much custom development MIT KDC solution’s advantages –Don’t have to put the KDC on an NT server –Support for Kerberos V4 and DCE –Site has more control over its destiny

Open Questions How committed is Microsoft to Kerberos interoperability? –Beta 2 is incompatible out of the box –Requires registry changes to make it work How difficult will it be to configure the proposed cross-realm hack? We are continuing to work with Microsoft - -- stay tuned.

Distributed File System AFS is currently available on NT 3.51 and 4.0 and will be available for Windows 2000

Workstation Remote installation and upgrades –operating system and patches –application software Serial Reusability –A previous user’s actions or changes should not affect the next user who logs in. Low TCO –stop making the users constantly reinstall or reconfigure the software.

Microsoft on lowering TCO Lockdown - restrict the user to a subset of the system’s functionality Problem: An academic environment encourages experimentation and openness. This diametrically opposed to Microsoft’s approach.

Security’s impact on lockdown Threat analysis –“We have met the enemy and they are us.” –Physical access to the network and end user’s machines by hostile users is a reality Implications –Lockdown will be subverted Athena’s solution: –Remove the challenge

Challenges Minimize impact on current Athena infrastructure –feed Active Directory from Athena database –use Athena KDC Windows 2000 Workstation –OS installation and upgrades –Software installation –Automated cleanup for serial reuse

Questions?