Windows Server 2003 Security Enhancements

Download Report

Transcript Windows Server 2003 Security Enhancements

SEC302
Windows Server 2003 Security
Enhancements
Ben Smith
Senior Security Strategist
Microsoft Corporation
Agenda
What We Did Differently
Security Enhancements in Windows Server
2003
IIS 6.0 Re-architecture
Changes with Permissions
System Services
Enhancements to IPSec
All new: Network Access Quarantine
Software Restriction Policies
Windows Server 2003 Security Guidance
What’s coming…
The Security Framework: SD3+C
Secure by Design





Mandatory training
Built threat models
Conducted code reviews and
penetration testing
Used automated code tools
Redesigned IIS 6.0 architecture
Secure by Deployment




New patch management tools
7 Microsoft Official Curriculum
courses available at launch
Official security configuration
guides
Integrated security tools
Secure by Default



60% less attack surface area by
default compared to Windows
NT 4.0 SP3
20+ services changed to be off
by default
Service install in a secure state
(IIS 6.0 Lockdown)
Communications

Writing Secure Code 2.0

Architecture webcasts
Security in Active Directory
Cross-Forest Trusts
Enables Administrators to create external forest-to-forest
trusts
Cross-Forest Authentication
Enables secure access to resources when the user
account is in one forest and the computer account is in
another forest.
Cross-Forest Authorization
Enables administrators to select users and groups from
trusted forests for inclusion in local groups or ACLs.
IAS and Cross-Forest Authentication
If Active Directory forests are in cross-forest mode with
two-way trusts, then IAS/RADIUS can authenticate the user
account in the other forest
PKI Enhancements
Cross–Certification Support
Role separation
Custom Certificate Templates (Version 2)
Delta CRLs
Key Archival/Recovery
Auto-enrollment
Auditing of admin operations
See: Windows Server 2003 PKI Operations Guide
http://www.microsoft.com/technet/prodtechnol/windows
server2003/maintain/operate/ws03pkog.asp
Miscellaneous Enhancements
DLL search order priority changed from
working directory to \windows\system32
AES-256-bit encryption default in EFS
Everyone group no longer includes
anonymous users (Users and Guests)
Accounts with blank passwords are
console-bound
Protected EAP (PEAP)
Detailed security auditing
RRAS Basic Firewall
Miscellaneous Enhancements
IIS 6.0 Lockdown mode
IIS Re-architecture
Authorization Manager (AuthMan)
Credential Manager (CredMan)
Constrained Delegation
.Net Framework 1.1 Code Access
Security
Administrator password complexity
Screen saver timeout
Miscellaneous Enhancements
Account Logon auditing enabled by default
Anonymous access restricted to:
SAM
Named Pipes
Shares
Remote registry decoupled from Server
service
NTLM Compatibility blocks LM from the wire
IE Lockdown
Terminal Server rights control
DPAPI Integration
Greatly improved Help file for security
IIS 5 Request Processing
INETINFO.exe
FTP
NNTP
X
Metabase
SMTP
User mode
Kernel mode
X
DLLHOST.exe
WinSock
AFD
TCP/IP
Request
DLLHOST.exe
Response
IIS 6.0 Request Processing
Inetinfo
WWW Service
FTP
NNTP
XML
Metabase
Application Pools
Administration
&
Monitoring
X
SMTP
…
User mode
Kernel mode
Queue
IIS 6.0
Cache
HTTP
TCP/IP
Request
Response
example
Detailed Security
Auditing
video
The Security
Framework
at Microsoft
The Security
Framework
STOP
There same
is no time for
this! video
(Yesat
– the
old
Microsoft
This is a level 300 session
you have seen before)
Permissions
Default NFTS permissions locked down
Was: Everyone Full Control
Now:
Everyone, Read and Execute (Root only)
Users Read and Execute, Create Folder, Create File
SYSTEM, Creator, Administrators Full Control
Default share permissions
Was: Everyone Full Control
Now: Everyone Read
New Features:
Effective Permissions Tool
Replace Owner through GUI
quick demo
Permissions
Seeing is believing!
What do all of these services
have in common?
Alerter
Clipbook
Distributed Link Tracking (Server)
Imapi CDROM Burning Service
Human Interface Devices
ICS/ICF
Intersite Messaging
KDC
License Logging Manager
Terminal Server Discovery Service
Windows Image Acquisition
Messenger
NetMeeting
NetDDE
NetDDE DSDM
RRAS
Telnet
Themes
WebClient
Windows Audio
Startup = Disabled
System Service Accounts
Local System


No password to manage
Bypasses security checks
User Accounts
 Run
with less privilege than Local System
 Stores password as an LSA secret
 Can be complex to configure
Local Service and Network Service
 No
password to manage
 Runs with only slightly more permissions than Authenticated
User
 Local Service cannot authenticate across the network,
Network Service authenticates as the computer account
quick demo
Enumerating
Services with WMIC
What’s New with IPSec?
Management
IP Security Monitor
 Command-line management with Netsh
 Logical addresses for local IP configuration

Security
Stronger cryptographic master key (Diffie-Hellman)
 Computer startup security
 Persistent policy for enhanced security
 Ability to exclude the name of the CA from certificate requests
 Better default exemption handling

Interoperability
IPSec functionality over network address translation (NAT)
 Improved IPSec integration with Network Load Balancing

Default Exempt Rules in IPSec
Stored in the registry value:
HKLM\SYSTEM\CurrentControlSet\Services\IPSEC\NoDefaultExempt
NoDefaultExempt
values
0
1
2
RSVP
IKE
Kerberos
Multicast
Broadcast
IKE
Multicast
Broadcast
RSVP
IKE
Kerberos
RSVP
IKE
Kerberos
Multicast
Broadcast
IKE
Multicast
Broadcast
X
3
IKE
X
demo
Managing IPSec with Netsh
Options not available through the UI:
Configure default exemptions
Enable CRL checking
Enable IKE logging
Enable IPsec driver dynamic logging
Enable persistent policy
Configure startup exemptions
announcing…
Network Access
Quarantine for RRAS
What is Network Access Quarantine?
Remote access
client authenticates
1. RAS client fails
policy check
2. Quarantine timeout
Reached
RAS client
disconnected
RAS client placed in
Quarantine
RAS client meets
Quarantine policies
RAS client
gets full
access to
network
What are policy rules?
Quarantine policy rules are
configurable, common rules may
include:
Service packs or the latest hotfixes installed
Antivirus software installed
Antivirus signature files updated
Routing disabled on RAS client
Internet Connection Firewall enabled
A password-protected screensaver enabled
Quarantine Architecture
Quarantine
Internet
RAS Client
CM Profile
• Runs customizable
post connect script
• Script runs RQC
notifier
with “results
string”
RRAS Server
Listener
• RQS receives Notifier
“results string”
• Compares results to
possible results
• Removes time-out if
response received but
client out of date
• Removes quarantine filter
if client up to date
RQC.exe and RQS.exe are in the Windows
Server 2003 Resource Kit
IAS
Server
Quarantine VSAs
• Timer limits time
window to receive
notify before auto
disconnect
• Q-filter sets
temporary route
filter to quarantine
access
Detailed Quarantine Process
Quarantine
RAS Client
Internet
RRAS Server
IAS Server
Connect
Authenticate
Authorize
Quarantine VSA
+ Normal Filters
Quarantine
Access
Policy Check
Result
Full Access
Remove Quarantine
Software Restriction Policies
Two modes: Disallowed, Unrestricted
Control executable code:
.ADE
.ADP
.BAS
.BAT
.CHM
.CMD
.CPL
.CRT
.EXE
.HLP
.HTA
.INF
.INS
.ISP
.JS
.JSE
.LNK
.MDB
.MDE
.MSC
.MSI
.MSP
.MST
.PCD
.PIF
.REG
.SCR
.SCT
.SHS
.URL
.VB
.VBE
.VBS
.WSC
.WSF
.WSH
What SRP do not protect
against
Drivers or other kernel mode software
Cannot protect against SYSTEM
Any program run by the SYSTEM account.
Cannot protect against SYSTEM
Macros inside of Microsoft Office 2000 or Office
XP documents
Use Macro security settings
Programs written for the common language
runtime.
These programs use the Code Access Security
Types of SRP Rules
Hash Rule


Compares the MD5 or SHA1
hash of a file to the one
attempted to be run
Use when you want to
allow/prohibit a certain version
of a file from being run
Path Rule



Compares path of file being
run to an allowed path list
Use when you have a folder
with many files for the same
application
Essential in when SRPs are
strict
Certificate Rule


Checks for digital signature on
application (i.e. Authenticode)
Use when you want to restrict
both win32 applications and
ActiveX content
Internet Zone Rule


Controls how Internet Zones
can be accessed
Use when in high security
environments to control
access to web applications
Rule Precedence
What happens when multiple rules match a
program?
Trying to run Windows Calculator
c:\winnt
Unrestricted
A6A44A0E8A76C7B2174DE68C5B0F724D:114688:32771
Disallowed
c:\winnt\system32\calc.exe
Disallowed
Most specific matching rule wins:
1.
2.
3.
4.
Hash rule
Certificate rule
Path rule
Zone rule
How to Develop Policies?
List allowed applications
Start them up
Consult system info (msinfo32.exe)
Software Environment → Running Tasks
Software Environment → Loaded Modules
Software Environment → Startup Programs
Create Rules
Refine Rules
Generalize rules
C:\winnt → %WINDIR%
C:\app\dir1, c:\app\dir2 → c:\app
Policy Gotchas
Make sure you include the following:
Some programs consist of many EXE’s
Powerpnt.exe (clip art launches mstore.exe)
Login Scripts
Startup folders and registry keys
Anti-virus
Program Add-ins
Have you allowed too much?
Check ACL’s
demo
Software Restriction Policies
Windows Server 2003 Security
Configuration Guide
Windows Server 2003 Security Guide
http://go.microsoft.com/fwlink/?LinkId=14846
Threats and Countermeasures: Security Settings
in Windows Server 2003 and Windows XP
http://go.microsoft.com/fwlink/?LinkId=15160
comments
“We commend Microsoft for
providing enhanced security
guidance to its customers as well
as for soliciting user input as part of
the process of producing that
guidance“
Clint Kreitner
President/CEO
“NIST reviewed and provided
technical comments & advice, that
was incorporated in this guidance”
Timothy Grance
Manager
Systems and Network
Security Group
Keep an eye out for…
Security Configuration Wizard (SCW)
The SCW will help administrators maximize the
security of servers with common roles without
sacrificing required functionality. Administrators
can use the Security Configuration Wizard in SCE
to construct security policies for their different
types of servers, and perform Lockdown Testing to
verify that systems function as expected.
Microsoft Audit Collection Services (MACS)
MACS is a tool to monitor and audit systems in a
centralized manner. MACS collects security events
in a compressed, signed, encrypted manner and
loads the events into a SQL database for analysis.
Suggested Reading And Resources
The tools you need to put technology to work!
TITLE
Available
Microsoft® Windows® Security
Resource Kit
Today
Writing Secure Code 2
Today
Microsoft Press books are 20% off at the TechEd Bookstore
Also buy any TWO Microsoft Press books and get a FREE T-Shirt
appendix. . .
Quarantine Whitepaper:
Network Access Quarantine Whitepaper:
http://www.microsoft.com/windowsserver2003/techinfo/overview/qu
arantine.mspx
Software Restriction Policy
http://www.microsoft.com/windows2000/technologies/security/redirwnetsafer.asp
Windows Server 2003 Resource Kit Tools Download:
http://go.microsoft.com/fwlink/?LinkId=4544
Community Resources
Community Resources
http://www.microsoft.com/communities/default.mspx
Most Valuable Professional (MVP)
http://www.mvp.support.microsoft.com/
Newsgroups
Converse online with Microsoft Newsgroups, including Worldwide
http://www.microsoft.com/communities/newsgroups/default.mspx
User Groups
Meet and learn with your peers
http://www.microsoft.com/communities/usergroups/default.mspx
evaluations
© 2003 Microsoft Corporation. All rights reserved.
This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY.