guerilla security
Embed Size (px)
TRANSCRIPT

SEC 318SEC 318Guerilla Security – Securing Guerilla Security – Securing Exchange 2000 and 2003 Exchange 2000 and 2003 InfrastructuresInfrastructures
Fred Baumhardt and Rab ThynneFred Baumhardt and Rab Thynne
Senior and Partner Strategy ConsultantSenior and Partner Strategy Consultant
Microsoft UKMicrosoft UK

Why do we call this Guerilla
• Guerilla as a type of warfare is exactly what we face in Internet Security
• Expect attacks from anywhere, with any device, at any time, from the inside
• Defences must be built exactly the same way, good monitoring, competent security forces, and ruthless execution of security policy on attackers

Session Overview
• Core Security Concepts applied to Exchange
• The Exchange Server Security Model
• Implementing End to End Exchange Security • Implications of Client Selection
• Securing Client/Server to Server Communications
• Network Layer Security
• Exchange Host Server Security
• Questions
..

The Big Picture
• Exchange is an Infrastructure product – ergo: it is only as secure as the infrastructure
• So design of Supporting Infra is critical :• DMZ design• DCs and their configuration• DNS infrastructure• Server Build• Management and Operations

Internet Security Roots and Mail
• Lets be honest – from a security perspective: IPv4 Sucks – not designed for Security
• Internet used to require Sec clearance to use – physical access was restricted – no need for protocol security
• Resistance to Nuclear attack was more important than protecting traffic as people on the network were trusted
• TCP/IP was thus designed without security in mind – added as a bolt-on- SMTP has almost none
• SMTP takes anonymous un-authenticated messages from the dirty world and puts them into heart of your network
• No one thought mail storage would be mission critical
..

Core Security Concepts applied to Exchange• The OS is only one component of security AND
Firewalls are not a Panacea• Getting into the bank branch doesn’t mean you get
into the vault• In the real world security relies on multiple things.
It should also do this in the IT world• People and Process• Internal and Edge Technologies • Management and Operations
• Securing your Exchange system is securing your core systems – there is no silver bullet wizard
..

Your Attack Sources for Comms
• Answer: Everyone – inside and out
• The majority of attacks originate internally• Corporate espionage
• People with Inside knowledge
• Your Users playing with stuff they don’t understand
• Externally…could be anyone• “Script kiddies” armed with widely accessible
tools
• More serious attackers– fun or profit

Exchange Comms Architecture
Front End BackendFirewallPotentialFirewall
Mail Server
Internal Clients
Internal Net
TCP80, TCP443 for Web
TCP80 TCP443 encapsulating RPC
TCP25 for inbound and outbound mail
TCP25 in/outTCP443 InTCP80 In
RPC or RPC oHT
Too many to list (see slide)
DC/GC
RP
C, G
C, K
erb,
Net
logo
n
Depends on Auth Status
..

Internal DMZ Firewall Ports
• TCP 80 for HTTP 143 for IMAP 110 for POP 25 for SMTP • 691 for Link State Algorithm routing protocol • TCP/UDP port 389 for LDAP to Directory Service • TCP port 3268 for LDAP to Global Catalog Server • TCP/UDP port 88 for Kerberos authentication • TCP/UDP port 53 - DNS• TCP port 135 - RPC endpoint mapper • TCP ports 1024+ - RPC service ports (unless DC and
Exchange Restricted)• If you use IPSec between the front-end and back-end,
open the appropriate ports. If the policy you configure only uses AH, you do not need to allow ESP, and vice versa.
• UDP port 500 – • RPC over HTTP can reduce this 600-2 and 593
..

Exchange Defence-in-DepthOrchestration • Perimeter Defences: Packet
Filtering, Stateful Inspection of Packets, Intrusion Detection
• Network Defences: VLAN Access Control Lists, Internal Firewall, Auditing, Intrusion Detection
• Host Defences: Server Hardening, Host Intrusion Detection, IPSec Filtering, Auditing
• Application Defences: AV, Content Scanning, Layer 7 (URL) Switching Source, Secure IIS, Secure Exchange
• Data and Resources: ACLs on PFs, Correct mail permissions, Data, Relay Permissions
Data & Resources
Application Defences
Host Defences
Network Defences
Perimeter Defences
Assu
me P
rior
Layers
Fail
..

Connection StrategiesMethod Experience Complexity Security
POP3/IMAP4 via SSL with SMTP
Basic Medium/ High
Medium
OWA via SSL with ISA
Moderate Low Full
VPN – PPTPv2 Full High Full
Secure RPC with ISA
Full Medium Full
RPC over HTTP Full Medium/Low Full in
None Out

POP3/IMAP4 with SMTP
• Uses SSL to secure POP or IMAP connection
• Does not authenticate at front end
• Requires SMTP at front-end to send mail OR separate SMTP relay (watch for relay spam)
• Removes much of the rich functionality
• Public Folder access can be tricky
• Don’t enable unless you absolutely have to
..

OWA via SSL with ISA
• OWA is lightweight and available anywhere• Not totally functional but close• No Offline facility – but great usability
• SSL is an easy and proven security tool• Can be terminated at ISA with Feature Pack• Only used to Front-end server – not FE-BE in 2000 –
2003 can use Kerberos for delegation• Pre-authentication with ISA is very strong
..

Protecting HTTPS for OWA
Traditional Traditional firewallfirewall
Traditional Traditional firewallfirewall
OWA OWA OWA OWA clientclientclientclient
Web server prompts for Web server prompts for authentication — any authentication — any
Internet user can access Internet user can access this promptthis prompt
SSLSSLSSLSSL
SSL tunnels through SSL tunnels through traditional firewalls traditional firewalls
because it is encrypted…because it is encrypted…
……which allows viruses which allows viruses and worms to pass and worms to pass
through undetected…through undetected…
……and infect internal servers!and infect internal servers!
ISA Server with ISA Server with Feature Pack 1Feature Pack 1ISA Server with ISA Server with Feature Pack 1Feature Pack 1
Basic authentication delegationBasic authentication delegation
ISA Server pre-authenticates ISA Server pre-authenticates users, eliminating multiple users, eliminating multiple
dialog boxes and only allowing dialog boxes and only allowing valid traffic throughvalid traffic through
URLScan for ISA ServerURLScan for ISA Server
SSL or SSL or HTTPHTTP
SSL or SSL or HTTPHTTP
SSLSSLSSLSSL
ISA Server can ISA Server can decrypt and inspect decrypt and inspect
SSL trafficSSL traffic
inspected traffic can be sent to the internal inspected traffic can be sent to the internal server re-encrypted or in the clear.server re-encrypted or in the clear.
URLScan for URLScan for ISA ServerISA Server
URLScan for ISA Server can stop URLScan for ISA Server can stop Web attacks at the network edge, Web attacks at the network edge,
even over encrypted SSLeven over encrypted SSL
InternetInternet
..

VPN Inbound
• Dedicated HW/SW VPN infrastructure• Requires opening of ports for VPN and
authentication• Provides Full and Rich Network Access• Can be costly for enterprises to
implement
• RPC over HTTP can reduce need – also secure RPC publishing with ALF
..

Using ISA for RPC Publishing
• ISA Can Securely Publish RPC• Opens 135 and listens (can block by source)
• Only Allows Specific UUID for Outlook (configurable)
• Dynamically Port Filters subsequent connections
• Can require Encrypted RPC only
• Outlook can have full functionality without VPN
..

RPC server RPC server (Exchange)(Exchange)RPC server RPC server (Exchange)(Exchange)
RPC client RPC client (Outlook)(Outlook)
RPC client RPC client (Outlook)(Outlook)
Service UUID Port
Exchange {12341234-1111… 4402
AD replication {01020304-4444… 3544
MMC {19283746-7777… 9233
RPC services grab random RPC services grab random high ports when they start, high ports when they start,
server maintains tableserver maintains table
RPC – Outlook to ExchangeRPC 101
135/tcp135/tcp
Client connects to Client connects to portmapper on server portmapper on server
(port 135/tcp)(port 135/tcp)Client knows UUID Client knows UUID of service it wantsof service it wants
{12341234-1111…}{12341234-1111…}
Client accesses Client accesses application over application over
learned portlearned port
Client asks, “What Client asks, “What port is associated port is associated with my UUID?”with my UUID?”
Server matches UUID to Server matches UUID to the current port…the current port…
4402/tcp4402/tcp
Portmapper responds Portmapper responds with the port and closes with the port and closes
the connectionthe connection
4402/tcp4402/tcp
• Due to the random nature of RPC, this is not feasible over the Internet• All 64,512 high ports & port 135 must be opened on
traditional firewalls..

Securing the Front Side• Exchange 2000 SP2+ doesn’t require RPC for DSAccess from
Front-end to Backend; However….• RPC is still required for IIS authentication (OWA), POP-IMAP
• Exchange DMZ Tradeoff: is it better to• Allow RPC packets from the DMZ inward, or• IPSec Tunnel through Firewall (Bypass it), (no NAT Firewalls)• Allow anonymous requests from the FE to the BE?
Swiss Cheesed orSwiss Cheesed orBypassed FirewallBypassed Firewall
TCP 443: HTTPSTCP 443: HTTPS
Stateful PacketStateful PacketFiltering FirewallFiltering Firewall
Front End Front End ServerServer
InternetInternet
TCP 443: HTTPS (OWA)TCP 443: HTTPS (OWA)RPC: OutlookRPC: OutlookSMTP, POP3, IMAP4SMTP, POP3, IMAP4
Back End Back End ServerServer
RPC and/or Defined PortRPC and/or Defined PortHTTP (TCP80)HTTP (TCP80)
..

Best Practice for the Front Side
• A Flat DMZ Design
• ISA layer 7 switching (OWA) or RPC filtration (Outlook)
• No Firewalls between front-end and backend servers
• Front-end and backend servers authenticate clients
• IPSec if required between front-end and backend
Exchange ServerExchange Server
TCP 443: HTTPSTCP 443: HTTPS
Stateful PacketStateful PacketFilteringFilteringFirewallFirewall
Application Application Filtering Filtering Firewall (ISA Firewall (ISA Server)Server)
TCP 80: HTTPTCP 80: HTTPInternetInternet
TCP 443: HTTPS OrTCP 443: HTTPS Or
..

Is This Less Secure ?
• Same numbers of firewalls to defeat
• RPC or tunnelling can negate firewalls anyway
• Attacks come at Data Layer
• This is a shift in thinking as Firewalls move up the stack and switches start port filtering
..

Secure Networking
Internet
Redundant Routers
ISA Firewalls
VLAN
VLAN
DC + Infrastructure
NIC teams/2 switches
VLAN
Front-end
VLAN
Backend
Intrusion Detection Intrusion Detection Intrusion Detection
First Tier Firewalls
URL Filtering for OWARPC Termination for Outlook
Switches Implement VLANs and Control Inter-VLAN Traffic like Firewalls do
..

Client Security from Internet
• Every time you connect into a network you extend the security perimeter
• RPC Publishing and VPN both require great care at the client
• Harden your clients on the Internet or hackers will attack clients and ride the VPN
• Require RPC encryption for Outlook• Client Based IDS systems

General Member Server Hardening
• Role-based Hardening• OU Structure to hold
FE-BE servers by role
• Security Templates from Exchange Security Operations Guide
• AD is a great Security Tool
Domain
DomainControllers
Servers
DomainPolicy
BaselineDC Policy
BaselineServer Policy
OWA Front-end
IncrementalPolicy
Admins
ExchangeServers
OWAServers
BackendServers
ExchangeBack-end
IncrementalPolicy
ExchangeDC
Incremental

IIS Lockdown Changes
• File ACLs-denies relevant permissions on home directory
• Also sets ACL on (ExchDirectory)\ExchWeb
• Denies execute access to all system utilities, such as cmd.exe, in the c:\winnt\system32 folder.
• Changes by IISLockdown can be overwritten by Group Policy

Front-end OWA Server Hardening
• Run IISLockdown w/ Template for Exchange; see Q309508 • Removes all unnecessary script mappings Vdirs, and applications
• Disables password change (HTR) – so hide in UI to avoid confusion (Q297121)
• Configure URLScan• Blocks special characters, extensions and canonicalisation .. ./ \ % &
• DSAccess uses RPC to contact Netlogon for authentication• Limit RPC ports on all DC’s & allow this through the internal firewall• Use ISA to securely publish RPC from FE in the DMZ to BE if
applicable
• Use MetaEdit to change the SMTP banner• Run EDSLock to lockdown folder and mailbox store group access• Dismount the Mailbox Store and delete the Public Folder Store
..

Front-end OWA Server Hardening
• Disable the following Exchange Services• Exchange IMAP4, POP3
• Exchange Information Store
• Microsoft Search
• Exchange Event, Site Replication Service
• Exchange Management, Exchange MTA
• Disable all other unnecessary services – Messenger, Alerter, etc. Network Bindings

Front End OWA Server Hardening
• Ensure the following are enabled• Exchange Routing Engine
• IPSEC Policy Agent
• RPC Locator
• IIS Admin Service
• World Wide Web Publishing Service

Backend Server Hardening
• Enabled Exchange Services• Information Store• Exchange Management• Exchange Management Instrumentation • Exchange System Attendant • Exchange Routing Engine
• Disabled Exchange Services• IMAP4• POP• Exchange Event Service (If E2K only)• Exchange Site Replication Service (If E2K only)• Exchange MTA Stacks (If E2K only and no X.400)

Backend Server Hardening• Exchange Required O/S Services
• WWW Service (OWA comms)• IIS Admin Service (Exchange Routing)• SMTP• RPC Locator (DC comms)• IPSEC Policy Agent
• System Attendant Depends on• Event Log• NTLM Security Support Provider• RPC• RPC Locator• Server• Workstation

Generic Exchange Server Hardening
• Filesystem ACLs
Directory Old ACL New ACLApplied toSubdirectories?
%systremdrive%\Inetpub\Mailroot
Everyone: Full Domain Admins: Full Local System: Full
Yes
%systremdrive%\Inetpub\nntpfile\
Everyone: Full Domain Admins: Full Local System: Full
Yes
%systremdrive%\Inetpub\nntpfile\root
Everyone:Full Everyone: Full Yes
..

Business Continuity
• Security planning also needs to cover breaches
• Think through disaster recovery strategy
• Backup and Recovery Strategy critical
• Critical Incident Management Procedure

Physical Server Access
• Physical Infrastructure access must be strictly controlled
• Access to Domain Controllers can cripple networks in seconds
• We often find mission critical machines under desks

Additional Security Protection
• Antivirus applications are critical to exchange
• SMTP Screening software is becoming increasingly important
• Content Blocking – Appropriate E-mails

Maintaining Security
• Microsoft Baseline Security Analyzer• V1.2 Scans Exchange and Windows
• Software Update Services – simplified patch management and control – free tool
• Not enterprise focused tools – SMS 2003 is better option
• Use Group Policy to enforce configuration
..

Top 10 Ways to Get Secure
1. Implement the Security Operations Guides for Windows and Exchangehttp://msdn.microsoft.com/practices
2. Use MBSA to identify missing patches
3. Implement IISLockdown based on role
4. Secure Infrastructure Assets
5. Use the EDSLock script to restrict groups
..

Top 10 Ways To Get Secure
6. Get adequate antivirus protection for servers and desktops
7. Use perimeter SMTP scanning
8. Automate Patch Management
9. Use SSL, IPsec, and MAPI encryption where appropriate
10.Plan your response to an intrusion before it happens

Exchange Security Resources
• Exchange Security Operations Guide
• Windows Security Operations Guide
• NSA Security Guides
• Microsoft Systems Architecture – EDC-IDC
• Microsoft Operations Framework
..

Other Links
• Exchange 2000 – EDS Lockdown http://support.microsoft.com/default.aspx?scid=http://support.microsoft.com:80/support/kb/articles/Q313/8/07.asp&NoWebContent=1
• Exchange Library http://www.microsoft.com/exchange/library
• Exchange Security http://www.microsoft.com/downloads/details.aspx?displaylang=en&FamilyID=D286E9A7-FE36-4A02-A0F8-75D4F9EB8D2D

In Closing…
• Thanks for coming!• Feel free to send comments or feedback
• [email protected]• [email protected]
• PLEASE fill out your evaluations!
..

evaluationsevaluations

© 2003 Microsoft Corporation. All rights reserved.This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY.