NTLM LDAP synchronization
Matthew Carpenter
matt
Fri Feb 25 12:21:26 PST 2005
Aaron Grewell wrote:
>If you can get away with it, port the users off the NT4 server using
>Samba's RPC vampire capability. If the NT4 server can be a member
>server of a Samba domain rather than being the DC then it'll get its
>users from Samba, which can be backended to LDAP. It'd be a bit of work
>to set it up, but would remove the need for synchronization altogether.
>
This would be my suggestion.
NT and Unix store passwords in different ways. 9 months of precomputing
and 118GB drive space and you too can have Rainbow crack tables to crack
NT passwords in 3 minutes, but that still does not provide a decent
near-term solution.
DirXML is a *great* product for this, but I understand the budgetary
concerns.
DirXML can do AD password synching, but they load a DLL on the AD domain
controller, which triggers an event each time the AD password is
changed, which intercepts the unencrypted password and pumps it into
NetWare/OES. Likewise, prior to applying eDirectory changes, the
unencrypted password is used to create the NTLM/LANMAN hash which is
pushed into AD by that DLL on the domain controller. We have been using
DirXML for some time to sync several directories, and were going to use
it to keep AD and eDir in sync, but the AD MCSE dudes are too freaked
about loading any 3rd-party DLLs on their DCs. I do believe they are
rather nervous about so much importance being placed on something made
of Glass.
Short of coding something of your own to snag passwords from the NT
server before they are encrypted, creating a SAMBA domain using an LDAP
backend makes a lot of sense.
--
Matthew Carpenter
matt at eisgr.com http://www.eisgr.com/
Enterprise Information Systems
* Network Server Appliances
* Security Consulting, Incident Handling & Forensics
* Network Consulting, Integration & Support
* Web Integration and E-Business
More information about the Linux-users
mailing list