Download presentation
Presentation is loading. Please wait.
1
Introduction To Windows NT ® Server And Internet Information Server
2
Agenda Basic security principles Basic security principles Basics of Windows NT ® security Basics of Windows NT ® security Basics of Internet Information Server security Basics of Internet Information Server security How the two relate How the two relate Top tips Top tips
3
Provided by Windows NT Added by Internet Information Server Basic Security Principles Security covers: Security covers: Authentication Access control Privacy Data integrity Monitoring Non-repudiation
4
Basics Of Windows NT Security
5
To understand Internet Information Server Security you must understand Windows NT Security! A Simple Fact
6
Authentication Windows NT requires “authenticated” users Windows NT requires “authenticated” users A user must present his/her “credentials” User name/password No notion of an anonymous user Insecure Each user has a unique security ID (SID) Each user has a unique security ID (SID)
7
How Applications Work Windows NT applications must run in the “context” of a user Windows NT applications must run in the “context” of a user When an application runs, the user’s security information is tagged onto the application Called a “token” A token identifies the user by their SID and group membership Group SIDs
8
How Applications Work When an application attempts to use a resource the token is used to determine if that user has access When an application attempts to use a resource the token is used to determine if that user has access All secure resources have “access control lists” (ACLs) ACLs are a list of SIDs and associated access rights Windows NT is very pessimistic Windows NT is very pessimistic Access denies are performed first Do not set everyone (no access)!
9
Windows NT Windows NT Domain User ID on this domain A Side Bar What does a SID look like? S-1-5-21-2127521184-1604012920-1887927527-1001
10
Services Are Applications Windows NT has special applications called “services” Windows NT has special applications called “services” Start when Windows NT starts Run in the background No UI Similar to UNIX daemons Examples: Internet Information Server SQL Server ™ Event log
11
Services Are Applications Because they are applications, they must run in a user context Because they are applications, they must run in a user context But they run before anyone logs on! But they run before anyone logs on! You can configure a service to run as an account You can configure a service to run as an account Usually localsystem No password Limited access beyond the current server
12
Principle Of Least Privilege A process always runs in the context of user account A process always runs in the context of user account If the account is privileged then the application has those privileges too If the account is privileged then the application has those privileges too Always run a process in the lowest- possible user context Remember the famous unix sendmail bug?
13
Impersonation Most services run as localsystem, hence they access resources as localsystem Most services run as localsystem, hence they access resources as localsystem Not as the user account Impersonation lets the service impersonate the user before accessing the resource In fact is swaps out the localsystem token for the user’s token On a thread-by-thread basis
14
Impersonation All servers must impersonate before accessing a resource All servers must impersonate before accessing a resource Also, impersonation reduces the number of times a user needs to enter their credentials Also, impersonation reduces the number of times a user needs to enter their credentials
15
Basics Of Internet Information Server Security
16
Internet Information Server Authentication Internet Information Server is a Windows NT service Internet Information Server is a Windows NT service Hence it must run as a user account By default LocalSystem Don’t change! Every user request must be authenticated and then impersonated Every user request must be authenticated and then impersonated
17
WWW Service Security Authentication Authentication Anonymous Basic Password authenticated Windows NT user access SSL 3.0 Client Certificates Custom
18
Authentication Models Anonymous Anonymous Map onto IUSR_machinename account Guest account Basic Basic Base64 encoded password/username NTLM NTLM Uses Windows NT network authentication No password
19
WWW Service Security Privacy/data integrity Privacy/data integrity Channel encryption Message authentication codes
20
WWW Service Security Access control restricted by: Access control restricted by: Client TCP/IP address (or range) Client domain name Mapping Client Authentication Certificates Publishing point access permissions Designated site operators NTFS access control Custom ISAPI/CGI/ASP/component
21
WWW Service Security
22
System integrity System integrity Process isolation Bandwidth limiting Application mapping CGI/script time-outs Connection time-out
23
Custom Security Custom: Custom: Authentication Access control Implement via: Implement via: ISAPI and CGI ASP and Perl Scripts Server-side components Requires understanding of: Requires understanding of: HTTP Protocol Authentication methods
24
Using Certificates On The Web Authenticated access Authenticated access Servers Clients Secure access using SSL/TLS Secure access using SSL/TLS Examples Examples Departmental access control Interenterprise access via Internet Certificate authority operation E.g., software publishing
25
Credential ties a name or identity to a public key Credential expiration Subject Name: “Internet, Organization, Jane Doe” Expires: 6/18/98 Signed: CA’s signature Serial #: 29483756 Public key: Public Other data: 10236283025273 Usage-specific attributes Private What Is A Certificate? Signed document Signed document Signed by a “trusted” certifying authority Binds subject to a public key
26
Using Certificates On The Web Why do it? Why do it? Better security than passwords Better scalability than passwords No need to distribute password databases Use emerging technologies Smart Cards Crypto accelerators
27
Top Tips And Rules Of Thumb
28
Top Tips 10.NTFS is the last bastion 9.If you must use basic authentication then use SSL! 8.Seriously consider certificates 7.Create a company security policy 6.Use the Windows NT Option Pack Resource Kit (shameless plug!)
29
Top Tips 5.Lock down your server 4.Lock away your server! 3.Restrict components at the server 2.Do not allow Execute permission! 1. Use the Windows NT Audit Log!
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.