Hi @Son
Is what we are seeing normal and expected behaviour?
Yes this is normal but it also depends on a number of factors, i.e. how resources in the domains are shared, how access permissions are assigned, Exchange etc.
Would it be safe to deny LDAP and Kerberos from clients/servers to DCs in the other child domain? (DC to DC traffic has its own FW rule on the required ports and would not be amended)
As with the previous question it depends, if the clients are talking to both the root and other domains, then it likely blocking this traffic will cause issues with authentication and resource access.
Can we manipulate the destination LDAP servers on a per child domain basis?
Site and service is best option for this, as you can define which DCs the clients talk to, but it does mean that you may need to move a child domain controllers into the same subnet. Here is an article on sites and services design
How are SRV records used in this process?
Yes the SRV records are key to this, here is an article on how DC are located, and this article explains how to prevent a DC from registering specific SRV records
Here is an article on the ports that will be used by DC to DC, and an article covering the common ports used by AD based services. The RPC ports can also cause issues as it normally requires a large number of ports to be opened, however it is possible to change which RPC ports are used, so the port range and number of ports can be controlled, more details in this article.
I hope this helps.
Gary,