41352members
184431posts

Active Directory changes in March 2020

Highlighted
Lieutenant JG

Active Directory changes in March 2020

Hi ClearSCADA Administrators!

 

See https://support.microsoft.com/en-us/help/4520412/2020-ldap-channel-binding-and-ldap-signing-requirem...

 

Microsoft is fixing a bug in LDAP functionality in Active Directory to block insecure LDAP in March 2020. If you have your ClearSCADA set up to externally authenticate users using just "LDAP" against a domain controller, and not using "LDAP SSL", you may find after this update if applied your ClearSCADA users may not be able to log in. I have a ticket raised with support so someone can hopefully take a closer technical look at the possible impact to ClearSCADA.

 

I strongly recommend you review the Microsoft advisory on how to resolve the issue and refer to websites such as https://evotec.xyz/four-commands-to-help-you-track-down-insecure-ldap-bindings-before-march-2020/ to help identify which systems may have an issue (which I am yet to personally test those scripts, use at own risk).

 

 

4 REPLIES 4
Highlighted

Re: Active Directory changes in March 2020

Hi Adam,

 

Thanks for your post!

 

Was curious what we should actually be checking with our customer ClearSCADA systems?

 

Are servers using LogonUser for external authentication going to be affected?

 

Cheers!

Highlighted
Commander

Re: Active Directory changes in March 2020

Hey Dave,

 

LogonUser and LDAPS/LDAP SSL won't be affected by this.

It will primarily affect systems which are authenticating against a 'remote' domain, one which the ClearSCADA / Geo SCADA Expert server may actually not be a member of.

 

However.... there have been a few clients that had issues in the early days with LogonUser around domain authentication timeouts.

I think maybe one in the west....  They may still be configured to use LDAP instead of LogonUser.

For almost all customers, it should be possible to just use LogonUser.

 

LDAPS/LDAP SSL is annoying, not just a tick box on Windows AD servers.

 

SI plan would be, for each customer server, check in Server Configuration if it's set to LDAP, if it is, then prepare a testing window to convert it across to LogonUser. Change Standby Server  LDAP->LogonUser, restart, and test a Windows Authentication logon to the Standby server (i.e. Client Connection settings set to prefer Standby).  If it all works, then perform the same on the current Main server.

 

If the system is configured to use LDAP against a remote domain.  Then the hoop jumping to get LDAPS will be required.

Here's a pretty good guide

https://gist.github.com/magnetikonline/0ccdabfec58eb1929c997d22e7341e45


Lead Control Systems Engineer for Alliance Automation (VIC).
All opinions are my own and do not represent the opinions or policies of my employer, or of my cat..
Highlighted

Re: Active Directory changes in March 2020

Thanks Bevan; appreciate the speedy response!

Highlighted
Lieutenant JG

Re: Active Directory changes in March 2020

Yeah, what Bevan said 🙂

 

Regarding validating ClearSCADA (and anything else on the system you may manage) I don't think you should be checking the product as such, you should be checking your domain logs to see what is triggering any entry. That last link has info on what logging you need to set (not enabled by default) and then what to parse in your domain logs to identify sources.

 

For example some network devices, PLCs and RTUs support LDAP authentication and may be affected if not using SSL/TLS.

 

The logging only appears every 24 hours so its a case of set it going and wait a day or two.