ZeroTier + Active Directory Authentication
-
Okay, so I took a pot shot at @adam-ierymenko and told him Bridging should be easier... It turns out it is, lol. I blame Microsoft!
Hyper-V has some security features that prevent the system from communicating on the network using a Mac Address that wasn't assigned to it via Hyper-V... There's a fix for that!
In PowerShell, on the Hyper-V host, run the following (it should be typed all on one line... I broke it up for readability)...
*note: This enables the Mac spoofing on ALL NICS attached to the VM.get-vmnetworkadapter -VMName MYVMNAME|where {$_.SwitchName -eq "MY_HYPERV_SWITCH"}| set-vmnetworkadapter -MacAddressSpoofing on
Edit: In VMware, you will need to enable Forged Transmits and Promiscuous Mode on the VM that you run things like this on. I don't have access to a VMware system to chek this.
-
@adam.ierymenko I have a Pi (the newest one) to test on if you need more testers
-
Back on the topic of this thread...
I setup ZeroTier on FSLDC02. I put ZeroTier on LT-JARED-01
ZeroTier is IPv6 only at the moment.
I put the IPv6 address of the DC in the laptops's IPv6 config
I rebooted the laptop and then logged in with a domain user that has never been logged onto the device before. Everything worked fine.
AD Authenticaiton works great.
It also works great with IPv4 if you put the ZeroTier IPv4 address in the DNS of the IPv4 adapter.
So AD over ZeroTier is easy to do.
-
The problem I want to resolve now is how to not get DNS for everything.
With ZeroTier connected, if I try and connect to my ownCloud instance, I get the internal DNS back. This is not desired behavior. If I shut of ZeroTier, I properly get the external IP address.
This is my problem. I need/want DNS to only work for AD Auth. I want ownCloud to use the public IP. That is why Pertino and ZeroTier are causing problems for me.
-
@dafyre came up with a solution for this, a manually configured DNS server on ZT. you put in the AD resources you need so you can authenticate, and forward the rest out to an internet based DNS server.
Though, if you have a split horizon DNS, you'll have to specify the IP for ownCloud to the external IP.
-
Did you check your AD DNS, did it have copies of the ZT addresses in it?
-
@Dashrender said:
@dafyre came up with a solution for this, a manually configured DNS server on ZT. you put in the AD resources you need so you can authenticate, and forward the rest out to an internet based DNS server.
Though, if you have a split horizon DNS, you'll have to specify the IP for ownCloud to the external IP.
No, @dafyre came up with a mess based on a work around. Every single thing in his process was extra work to setup, which is not bad. But it was all extra maintenance also, which is horrible.
If you are trying to sell me SDN, then you need to sell me SDN that fulfills the task I need. yes, Pertino and ZeroTier may not be right for this scenario, but then I know of no other solution for this either. That is the point of working on this.
-
@Dashrender said:
Did you check your AD DNS, did it have copies of the ZT addresses in it?
At what point have I stated anyplace that I have ZeroTier on more than 2 devices? I do not. It exists solely on the DC and the test laptop.
-
I'll agree with that, currently I know of no solution to provide what you want in a single shrink wrap solution, but as Dafyre mentioned, he did find a solution.
-
@Dashrender said:
I'll agree with that, currently I know of no solution to provide what you want in a single shrink wrap solution, but as Dafyre mentioned, he did find a solution.
I'd qualify that as a workaround. And Sadly, i also have to agree with @JaredBusch that it is more work and maintenance.
I realize that he's trying to avoid building a full-on mesh network, but assuming he's got a few spare IPs to rob from his DHCP Server, a ZT Bridge could work (http://www.mangolassi.it/topic/8566/zerotier-bridging-configuration) without quite as much ongoing maintenance afterwards.
-
@dafyre said:
@Dashrender said:
I'll agree with that, currently I know of no solution to provide what you want in a single shrink wrap solution, but as Dafyre mentioned, he did find a solution.
I'd qualify that as a workaround. And Sadly, i also have to agree with @JaredBusch that it is more work and maintenance.
I realize that he's trying to avoid building a full-on mesh network, but assuming he's got a few spare IPs to rob from his DHCP Server, a ZT Bridge could work (http://www.mangolassi.it/topic/8566/zerotier-bridging-configuration) without quite as much ongoing maintenance afterwards.
AD relies on DNS.
Not getting the wrong answer for a URL lookup also relies on getting an answer from the right DNS server at the right time.So now that we know it all works as expected, the question is can I configure DNS to act how I want in windows easily.
Easiest example: use the IPv4 DNS server always unless something is not found (such as domain.local).
When something is not found query the IPv6 DNS backup only.This has nothing to do with ZeroTier at this point other than ZeroTier is where the IPv6 connectivity is coming from.
-
@JaredBusch said:
@dafyre said:
@Dashrender said:
I'll agree with that, currently I know of no solution to provide what you want in a single shrink wrap solution, but as Dafyre mentioned, he did find a solution.
I'd qualify that as a workaround. And Sadly, i also have to agree with @JaredBusch that it is more work and maintenance.
I realize that he's trying to avoid building a full-on mesh network, but assuming he's got a few spare IPs to rob from his DHCP Server, a ZT Bridge could work (http://www.mangolassi.it/topic/8566/zerotier-bridging-configuration) without quite as much ongoing maintenance afterwards.
AD relies on DNS.
Not getting the wrong answer for a URL lookup also relies on getting an answer from the right DNS server at the right time.So now that we know it all works as expected, the question is can I configure DNS to act how I want in windows easily.
Easiest example: use the IPv4 DNS server always unless something is not found (such as domain.local).
When something is not found query the IPv6 DNS backup only.This has nothing to do with ZeroTier at this point other than ZeroTier is where the IPv6 connectivity is coming from.
What would happen if you added Google's Public DNS to the IPv4 stuff on the ZT Adapter?
Oh wait... you only have IPv6 enabled on ZT... Hmm...
-
@dafyre said:
@JaredBusch said:
@dafyre said:
@Dashrender said:
I'll agree with that, currently I know of no solution to provide what you want in a single shrink wrap solution, but as Dafyre mentioned, he did find a solution.
I'd qualify that as a workaround. And Sadly, i also have to agree with @JaredBusch that it is more work and maintenance.
I realize that he's trying to avoid building a full-on mesh network, but assuming he's got a few spare IPs to rob from his DHCP Server, a ZT Bridge could work (http://www.mangolassi.it/topic/8566/zerotier-bridging-configuration) without quite as much ongoing maintenance afterwards.
AD relies on DNS.
Not getting the wrong answer for a URL lookup also relies on getting an answer from the right DNS server at the right time.So now that we know it all works as expected, the question is can I configure DNS to act how I want in windows easily.
Easiest example: use the IPv4 DNS server always unless something is not found (such as domain.local).
When something is not found query the IPv6 DNS backup only.This has nothing to do with ZeroTier at this point other than ZeroTier is where the IPv6 connectivity is coming from.
What would happen if you added Google's Public DNS to the IPv4 stuff on the ZT Adapter?
Oh wait... you only have IPv6 enabled on ZT... Hmm...
The computer is working properly and getting the ownCloud IP from the DC because it knows where the DC is. The question is can I force DNS to behave like I want.
-
@JaredBusch Just checking in on this. So the final issue is: you folks want to consult the AD DNS server(s) only for names within AD, but want to consult the host's default regular DNS servers for the Internet. Is that correct?
-
@JaredBusch What's wrong with using the AD servers for all DNS? Other than reliability?
Note that ZT does not depend on DNS, so ZT will work if DNS is not up.
-
@JaredBusch I used teh Google a little and found this open source project:
https://github.com/stackia/DNSAgent
Never used it but it looks promising. This could be installed on a client machine and then you could configure it to route DNS queries to different servers by regex of the DNS name.
Looks source only so you'd need to build. Has a .sln file.
-
@adam.ierymenko said:
@JaredBusch Just checking in on this. So the final issue is: you folks want to consult the AD DNS server(s) only for names within AD, but want to consult the host's default regular DNS servers for the Internet. Is that correct?
No, I want DNS only so far as AD authentication. I want all DNS to use the dhcp assigned DNS that the primary network adapter gets.
I am not having any problems with ZeroTier as stated above.
ZT works perfectly as designed. I am not trying to limit DNS in windows.
-
@adam.ierymenko said:
@JaredBusch What's wrong with using the AD servers for all DNS? Other than reliability?
Note that ZT does not depend on DNS, so ZT will work if DNS is not up.
Because DNS from AD through ZT is returning an address I cannot use.
oc.domain.com should resolve to the external IP but because I set DNS on the ZT adapter I am getting the internal name.
Again, this is not a "problem" with ZT.
-
@JaredBusch I see. At some point it might be worth looking into that DNSAgent program, since that might do what is needed. Or maybe we could develop/fork something like that to provide the kind of split brain DNS that Pertino apparently does/did.
-
@adam.ierymenko said:
@JaredBusch I see. At some point it might be worth looking into that DNSAgent program, since that might do what is needed. Or maybe we could develop/fork something like that to provide the kind of split brain DNS that Pertino apparently does/did.
Pertino has the same issues as ZeroTier. Well unless you have a subscription level large enough to use their AD add on.