MSG308 Secure Access to Exchange from the Internet Steve Riley Microsoft Corporation.

Slides:



Advertisements
Similar presentations
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Advertisements

IUT– Network Security Course 1 Network Security Firewalls.
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
Defining Network Infrastructure and Security
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
Module 5: Configuring Access for Remote Clients and Networks.
Firewall Configuration Strategies
Principles of Information Security, 2nd Edition1 Firewalls and VPNs.
Firewalls and Intrusion Detection Systems
Chapter 12 Network Security.
Chapter 7 HARDENING SERVERS.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Securing the Perimeter – Exchange and VPN Access with ISA Server 2004 Jamie Sharp CISSP Security Advisor Amit Pawar National Technology Specialist Microsoft.
1 of 3 Open Outlook On the Tools menu, click Account Settings. 1 Enable Outlook Anywhere 2 Click your Microsoft Exchange account, and then click.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
1 Integrating ISA Server and Exchange Server. 2 How works.
1 Advanced Application and Web Filtering. 2 Common security attacks Finding a way into the network Exploiting software bugs, buffer overflows Denial of.
Chapter 6 Configuring, Monitoring & Troubleshooting IPsec
Securing Exchange Server Session Goals: Introduce you to the concepts and mechanisms for securing Exchange Examine the techniques and tools.
Network Services Lesson 6. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Setting up common networking services Understanding.
Managing Client Access
Module 4 Managing Client Access. Module Overview Configuring the Client Access Server Role Configuring Client Access Services for Outlook Clients Configuring.
Course 201 – Administration, Content Inspection and SSL VPN
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Intranet, Extranet, Firewall. Intranet and Extranet.
Module 8: Managing Client Configuration and Connectivity.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
Securing Microsoft® Exchange Server 2010
Threat Management Gateway 2010 Questo sconosciuto? …ancora per poco! Manuela Polcaro Security Advisor.
Chapter 6: Packet Filtering
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
Chapter 13 – Network Security
DEV290 Building Office Solutions with Visual Studio Eric Carter Lead Developer Developer Platform & Evangelism Microsoft Corporation.
0Gold 11 0Gold 11 LapLink Gold 11 Firewall Service How Connections are Created A Detailed Overview for the IT Manager.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
SEC303 Assessing and Managing Privacy in the Enterprise JC Cannon Privacy Strategist.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
Module 4: Configuring ISA Server as a Firewall. Overview Using ISA Server as a Firewall Examining Perimeter Networks and Templates Configuring System.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
OFC290 Information Rights Management in Microsoft Office 2003 Lauren Antonoff Group Program Manager.
Project Server 2003: DC340: Security (Part 1 of 2): How to securely deploy Project Server in an enterprise environment Pradeep GanapathyRaj (PM), Karthik.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Overview of Microsoft ISA Server. Introducing ISA Server New Product—Proxy Server In 1996, Netscape had begun to sell a web proxy product, which optimized.
TCP/IP Protocols Contains Five Layers
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
WebServices, GridServices and Firewalls Matthew J. Dovey Technical Manager Oxford e-Science Centre
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
1 Implementing Monitoring and Reporting. 2 Why Should Implement Monitoring? One of the biggest complaints we hear about firewall products from almost.
Module 6: Managing Client Access. Overview Implementing Client Access Servers Implementing Client Access Features Implementing Outlook Web Access Introduction.
Integrating and Troubleshooting Citrix Access Gateway.
MBL206 A First Look at the Microsoft Location Server (MLS) Steve Lombardi Technical Product Manager MapPoint Business Unit Microsoft Corporation.
ISA Server 2004 Introduction Владимир Александров MCT, MCSE, MCSD, MCDBA Корус, Управител
Security fundamentals Topic 10 Securing the network perimeter.
Lesson 2a © 2005 Cisco Systems, Inc. All rights reserved. SNPA v4.0—2-1 Firewall Technologies and the Cisco Security Appliance.
SEC304 Enhancing Exchange, OWA and IIS Security with ISA Server Feature Pack 1 Steve Riley Microsoft Corporation
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
Role Of Network IDS in Network Perimeter Defense.
Securing the Network Perimeter with ISA Server 2004 Ravi Sankar IT Professional Evangelist Microsoft.
VIRTUAL SERVERS Chapter 7. 2 OVERVIEW Exchange Server 2003 virtual servers Virtual servers in a clustering environment Creating additional virtual servers.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
Defining Network Infrastructure and Network Security Lesson 8.
Security fundamentals
Securing the Network Perimeter with ISA 2004
6.6 Firewalls Packet Filter (=filtering router)
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

MSG308 Secure Access to Exchange from the Internet Steve Riley Microsoft Corporation

FAQs Exchange? On the Internet?? Are you out of your mind???

It’s topical Design alternatives VPNs OWA RPC—native and over HTTP Recommended design To DMZ or not to DMZ…that is the question

This session… Is about— Securing Internet access to an Exchange installation Isn’t about— General Exchange security

VPNs

The usual choice VPN clients in all versions of Windows Yes, PPTP can be made secure L2TP+IPsec is the future Technology is well-understood Needs an IT staff, though More work than most small and medium organizations want to deal with

Technical problems Won’t work in some public locations VPN protocols blocked IPSec vs. NAT But see SEC406, 3:15 Thurs, Ballroom A 3-4! Packet fragmentation IKE IPSec NAT-T

Technical problems Default gateway modifications All traffic goes to VPN tunnel No access to local network Split-tunneling often disallowed This is a good thing! VPNs are useful to connect remote clients to corporate networks Less useful when connecting from corporate network to some ASP

Outlook Web Access

Universal availability Browsers are everywhere Familiar interface OWA 2003 is almost just like Outlook

Security issues HTTPS is the transport Intrusion detection? Conformance to policy? OWA 2000 has no session timeout Fixed in OWA 2003 Forms authentication—cookie for session

Typical design Good Separates protocol from message store Network protection Bad Tunnel through outside firewall: no inspection Many holes in inside firewall for authentication Anonymous initial connections to OWA ExBE AD OWA

Improving OWA security Security goals Inspect SSL traffic Maintain wire privacy Enforce conformance to HTML/HTTP Allow only known URL construction Block URL-borne attacks Optionally Pre-authenticate incoming connections

Protect OWA with ISA Server ISA Server becomes the “bastion host” Web proxy terminates all connections Decrypts HTTPS Inspects content Inspects URL (with URLScan) Re-encrypts for delivery to OWA OWA ISAServer Exchange AD x36dj23s2oipn49v <a href…

Protect OWA with ISA Server Easy authentication to Active Directory Pre-authenticate communications ISA Server queries user for credentials Verifies against AD Embeds in HTTP headers to OWA Avoids second prompt! Requires FP1 OWA ISAServer Exchange AD 404

Results Known good content Known good URL Known good user Dare I say it… trusted access?

Exchange RPC on the Internet

RPC on the Internet?

Business case Many users require full Outlook Third-party plugins Mailbox synchronization Client-side rules Complete address book VPNs are too costly if this is the only requirement

Design choices Run it naked Assign the RPC ports Use RPC over HTTP Publish with ISA Server

RPC server (Exchange) RPC client (Outlook) ServiceUUIDPort Exchange{ …4402 AD replication{ …3544 MMC{ …9233 RPC services grab random high ports when they start, server maintains table RPC connection setup135/tcp Client connects to portmapper on server (port 135/tcp) Client knows UUID of service it wants { …} Client accesses application over learned port Client asks, “What port is associated with my UUID?” Server matches UUID to the current port… 4402/tcp Portmapper responds with the port and closes the connection 4402/tcp

Design choices Run it naked Assign the RPC ports Use RPC over HTTP Publish with ISA Server

RPC naked on the net Good Easy to build! Bad Easy to compromise! Firewall must permit all traffic on all high ports Firewall can’t tell what’s Exchange and what isn’t No protection against RPCDump, for instance Exchange

Potential RPC attacks Reconnaissance NETSTAT RPCDump DoS against portmapper Privilege escalation or other specific service attacks

Design choices Run it naked Assign the RPC ports Use RPC over HTTP Publish with ISA Server

Registry keys Need to set fixed port numbers for Information Service Directory Service System Attendant See KB Best to use ports just above 5000

Fixed RPC ports Good Still easy to build Limited open ports on firewall 135/tcp + 3 high ports Bad Still easy to compromise Doesn’t stop any of the previous attacks Firewall still can’t tell what’s Exchange and what isn’t Scaleable? Exchange

Design choices Run it naked Assign the RPC ports Use RPC over HTTP Publish with ISA Server

New in Exchange 2003 Result of high customer demand Useful All firewalls allow 80/tcp and 443/tcp Enables access from any location No special firewall setup required

But is it secure? Look back at the last slide… Not necessarily positive attributes Simply running RPC over HTTP doesn’t solve all the problems No protocol awareness in firewall No pre-authenticated connections No inspection if HTTPS Is secure from RPC-borne attacks Until attack tools have HTTP wrappers…

What’s the big deal? Knowing a port number or a UUID doesn’t mean you know the intent What do the following tell you: 80/tcp 49494/tcp { } They are application identifiers That’s all! well-known port for HTTP random (fixed?) port for Exchange well-known UUID for Exchange

So what’s it good for? RPC over HTTP is no more, and no less, secure than fixed-port RPC So use it: If your business case requires it You are comfortable with the risk It’s another option for customers who are satisfied with its operation

Design choices Run it naked Assign the RPC ports Use RPC over HTTP Publish with ISA Server

ISA Server More than just a proxy True application-aware content-filtering firewall Exchange RPC SMTP H.323 FTP DNS POP3/IMAP4

Exchange RPC filter Intimately aware of— How Exchange RPC connections establish What the proper protocol format is Allows only Exchange RPC UUIDs Enforces client authentication Can optionally enforce encryption Requires Feature Pack 1 Supports new mail notification

Published RPC interfaces {99E64010-B032-11D0-97A4-00C04FD6551D}: "Store admin (1)" {89742ACE-A9ED-11CF-9C0C-08002BE7AE86}: "Store admin (2)" {A4F1DB00-CA B31E-00DD010662DA}: "Store admin (3)" {A4F1DB00-CA B31F-00DD010662DA}: "Store EMSMDB" {9E8EE CE-979B-00AA005FFEBE}: "MTA" {1A BB9C-11CD-90F8-00AA }: "Database" {F5CC5A A-8C B2F8426}: "Directory NSP" {F5CC5A7C A-8C B2F8426}: "Directory XDS" {F5CC59B A-8C B2F8426}: "Directory DRS" {38A94E72-A9BC-11D2-8FAF-00C04fA378FF}: "MTA 'QAdmin'" {0E4A0156-DD5D-11D2-8C2F-00C04FB6BCDE}: "Information Store (1)" {1453C42C-0FA6-11D2-A910-00C04F990F3B}: "Information Store (2)" {10F24E8E-0FA6-11D2-A910-00C04F990F3B}: "Information Store (3)" {1544F5E0-613C-11D1-93DF-00C04FD7BD09}: "Directory RFR" {F930C D3-99A5-00A0C9B61B04}: "System Attendant Cluster" {83D72BF0-0D89-11CE-B13F-00AA003BAC6C}: "System Attendant Private" {469D6EC0-0D87-11CE-B13F-00AA003BAC6C}: "System Attendant Public Interface"

Filter operation Client connects to filter’s “portmapper” Runs as part of filter Responds only to requests for Exchange RPC ISA Server returns filter’s Exchange RPC port numbers Client makes new connection ISAServer Exchange AD

Filter operation ISA Server connects to Exchange’s portmapper Exchange returns port numbers ISA Server makes new connection ISAServer Exchange AD

Filter operation Client logs on to Exchange Exchange proxies logon to Active Directory Need “No RFR Service” key to make this happen: KB Filter watches for approval Filter checks whether encryption is on, if required Client mailbox opens ISAServer Exchange AD

Protects from RPC attacks Reconnaissance? NETSTAT shows only 135/tcp RPCDump simply fails DoS against portmapper? Known attacks fail Successful attack leaves Exchange protected Service attacks? No reconnaissance info available ISA Server-to-Exchange connections fail unless prior client-to-ISA Server connection is correctly formatted Yes!

Results Known good connection Known good encryption (optional) Known good user Dare I say it… trusted access?

Recommended design

Recall the typical design ExFESMTP ExBEAD

New requirements, new designs Move critical servers inside for better protection Add ISA Server to your existing DMZ Increase security by publishing: Exchange RPC OWA over HTTPS SMTP (content filter) ExFESMTP ExBEAD ISA Server

Next Steps Consider your risk— What do you have? What are you comfortable with? Consider the way attacks are evolving Ports mean nothing Attacks look like legitimate traffic Evaluate and deploy ISA Server for all current and future Exchange installations

Community Resources Most Valuable Professional (MVP) Newsgroups Converse online with Microsoft Newsgroups, including Worldwide User Groups Meet and learn with your peers

Suggested Reading And Resources The tools you need to put technology to work! TITLE Available Microsoft® Exchange Server 2003 Administrator's Companion: /24/03 Active Directory® for Microsoft® Windows® Server 2003 Technical Reference: Today Microsoft Press books are 20% off at the TechEd Bookstore Also buy any TWO Microsoft Press books and get a FREE T-Shirt

evaluations evaluations

© 2003 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY.