LM/NTLMv1 Retirement Hosted by LSP Services.

Slides:



Advertisements
Similar presentations
Windows 2000 Security --Kerberos COSC513 Project Sihua Xu June 13, 2014.
Advertisements

Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
Experience with NTLM v2 on Win2K in NT 4.0 Domain Myung Bang Jefferson Lab Hepix-HepNT 2000 October 31, 2000.
Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy’s National Nuclear.
Module 10: Troubleshooting Network Access. Overview Troubleshooting Network Access Resources Troubleshooting LAN Authentication Troubleshooting Remote.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 9: Implementing and Using Group Policy.
Chapter 7 HARDENING SERVERS.
Windows 2003 SP1 Member Server in ASU Active Directory WNUG/CCC February 2, 2006 Sharon Bushart CLAS Information Technology.
15.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
70-270, MCSE/MCSA Guide to Installing and Managing Microsoft Windows XP Professional and Windows Server 2003 Chapter Twelve Implementing Terminal.
Network Shares and Accounts Sharing Printers, Drives, Folders – Setup Windows 95/98 Windows NT (2000, XP) Linux – Users – Groups.
Chapter 5 Managing a Server. Overview  Server management  Examine networking models  Learn how users are authenticated  Manage users and groups 
Microsoft Server 2008 R2 Group Policies & Network Policy and Access Services.
Using RADIUS Within the Framework of the School Environment Charles Bolen Systems Engineer December 6, 2011.
Module 11: Supporting Remote Users. Overview Establishing Remote Access Connections Connecting to Virtual Private Networks Configuring Authentication.
11 SYSTEMS ADMINISTRATION AND TERMINAL SERVICES Chapter 12.
Group Policy in Microsoft Windows Active Directory.
Using RADIUS Within the Framework of the School Environment Ed Register Consultant April 6, 2011.
Windows 2003 and 802.1x Secure Wireless Deployments.
Getting Connected to NGS while on the Road… Donna V. Shaw, NGS Convocation.
MS systems use one of the following: LanManager Hash (LM) LanManager Hash (LM) NT LanManager (NTLM) NT LanManager (NTLM) Cached passwords Cached passwords.
Slide Master Layout Useful for revisions and projector test  First-level bullet  Second levels  Third level  Fourth level  Fifth level  Drop body.
Microsoft Windows 2003 Server. Client/Server Environment Many client computers connect to a server.
GROUP POLICY An overview of Microsoft Windows Group Policy.
Guide to Operating System Security Chapter 9 Web, Remote Access, and VPN Security.
Chapter 4 Windows NT/2000 Overview. NT Concepts  Domains –A group of one or more NT machines that share an authentication database (SAM) –Single sign-on.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
70-270: MCSE Guide to Microsoft Windows XP Professional Second Edition, Enhanced Chapter 6: Windows XP Security and Access Controls.
1 Week #7 Network Access Protection Overview of Network Access Protection How NAP Works Configuring NAP Monitoring and Troubleshooting NAP.
Module 4: Add Client Computers and Devices to the Network.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
Masud Hasan Secue VS Hushmail Project 2.
Enforcing Concurrent Logon Policies with UserLock.
8.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 8: Introducing Computer Accounts.
Chapter Six Windows XP Security and Access Controls.
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
SMS 2003 Deployment and Managing Windows Security Rafal Otto Internet Services Group Department of Information Technology CERN 26 May 2016.
Module 11: Remote Access Fundamentals
DIT314 ~ Client Operating System & Administration CHAPTER 5 MANAGING USER ACCOUNTS AND GROUPS Prepared By : Suraya Alias.
8.1 © 2004 Pearson Education, Inc. Exam Designing a Microsoft ® Windows ® Server 2003 Active Directory and Network Infrastructure Lesson 8: Planning.
Module 8: Configuring Network Access Protection
Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication.
Lesson 17-Windows 2000/Windows 2003 Server Security Issues.
Breno de MedeirosFlorida State University Fall 2005 Windows servers The NT security model.
FORESEC Academy FORESEC Academy Security Essentials (V)
Kerberos Named after a mythological three-headed dog that guards the underworld of Hades, Kerberos is a network authentication protocol that was designed.
NTLM
Module 8: Designing Security for Authentication. Overview Creating a Security Plan for Authentication Creating a Design for Security of Authentication.
Module 3 Configuring File Access and Printers on Windows ® 7 Clients.
NT4 SP4 Security Jack Schmidt - Fermilab
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Module 5: Designing Security for Internal Networks.
ITS – Identity Services ONEForest Security Jake DeSantis Keith Brautigam
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Module 7: Implementing Security Using Group Policy.
Virtualization Technology and Microsoft Virtual PC 2007 YOU ARE WELCOME By : Osama Tamimi.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Module 8 Implementing Security Using Group Policy.
Automating Installations by Using the Microsoft Windows 2000 Setup Manager Create setup scripts simply and easily. Create and modify answer files and UDFs.
Implementing SSTP VPN and 802.1x with RADIUS on Windows 2012 Ing. Ondřej Ševeček | Product Manager Windows Server | GOPAS a.s. MCM: Directory | MVP: Security.
VIRTUAL SERVERS Chapter 7. 2 OVERVIEW Exchange Server 2003 virtual servers Virtual servers in a clustering environment Creating additional virtual servers.
4 Securing Secure the hardware –Lock the server room and other ways to get access to the hardware. –Password protect the BIOS-setup Secure the NOS.
Nessus Vulnerability Scan
Configuring Windows Firewall with Advanced Security
HARDENING CLIENT COMPUTERS
Unit 8 NT1330 Client-Server Networking II Date: 8/2/2016
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

LM/NTLMv1 Retirement Hosted by LSP Services

What is LM LM stands for LAN Manager Used by Windows 95, 98 ME, NT and is now considered to be a legacy protocol LM is an authentication protocol that uses a particularly weak method of hashing a user's password known as the LM hash algorithm

What is NTLMv1 Abbreviation for “Windows NT LAN Manager” NTLM uses a challenge-response mechanism for authentication Clients are able to prove their identities without sending a password to the server.

Retire Support for LM/NTLMv1 UITS will retire support for both LAN Manager (LM) and NT LAN Manager Version 1 (NTLMv1) authentication protocols by May 22, 2006. After these protocols are disabled, the only authentication protocols accepted by the ADS Domain Controllers will be NTLMv2 and Kerberos. The protocols will not be blocked on the network

Why Retire LM and NTLMv1 Recent improvements in computer hardware and software algorithms have made both LM and NTLMv1 protocols vulnerable to widely published attacks for obtaining user passwords RainbowCrack John the Ripper Proactive Password Explorer SAMInside

How will the Change be Implemented Two Policies will need to set the LM compatibility level to “NTLMv2 response only\refuse LM and NTLM” (Level 5). The first policy to change will be the Default Domain policy. On May 15th, 2006, the project team will set the LM compatibility level to “NTLMv2 response only\refuse LM and NTLM” (Level 5). This will change the default security setting on all Windows workstations and servers in the ADS domain that receive the Default Domain policy. One week later, on May 22, 2006, the Default Domain Controller Policy will be set to "NTLMv2 response only\refuse LM and NTLM” (Level 5). This means that only NTLMv2 authentication will be allowed in our domain. This will effectively disable LM/NTLMv1 use by Windows systems connected to the ADS domain.

LM Compatibility Level Group Policy Name Sends Accepts Prohibits Sending Send LM and NTLM LM, NTLM LM,NTLM, NTLMv2 NTLMv2 1 Send LM and NTLM use NTLMv2 session security if negotiated 2 Send NTLM response only NTLM LM, NTLMv2 3 Send NTLMv2 response only LM, NTLMv1 4 Send NTLMv2 response only/refuse LM NTLM, NTLMv2 LM 5 Send NTLMv2 response only/refuse LM and NTLM LM NTLMv1

When do you use NTLM Creating a new Outlook Profile Accessing a resource on an Active Directory domain member using an IP address rather than a host name Accessing a resource on a windows computer that is not a member of an Active Directory domain Accessing any resource on a Windows-based computer from a computer running Windows 9x or Windows NT 4.0 Accessing any resource on a Windows-based computer from third-party operating system or application that does not support Kerberos

Other Common Authentication Methods Basic Authentication Webpage Authentication (over SSL) Entourage Kerberos Authentication CAS Webmail Windows Domain Logon (IU.EDU) File Shares (SMB) using DNS Host Name Outlook 2003 to Exchange 2003

Known Issues Local machine account access could fail after May 15th Understanding how Outlook works with NTLMv2 Unattended Setup of XP will fail to join the domain if SP2 is not slipstreamed A user is not successfully authenticated when NTLMv2 authentication is used on a Windows Server 2003-based IAS server Windows machines that do not receive the default domain policy may not be able to access resources that require NTLMv2 authentication OS X version 10.3 does not support NTLMv2 Windows 9x/Me computers will be unable to authenticate to the ADS domain Outlook 2001 does not support NTLMv2 and will no longer be usable Clustered computers running versions of Windows prior to Windows Server 2003 Service Pack 1 will break Windows NT 4.0 and support status Versions of Samba prior to 3.0.21 will not support NTLMv2

Understanding How Outlook Works with NTLMv2 How Will Outlook 2001 be Affected by This Change? Outlook 2001 will no longer be useable Use Entourage as a replacement Basic Authentication over SSL Use Outlook Web Access

Understanding How Outlook Works with NTLMv2 How will Outlook XP/2002 and 2003 be Affected by this Change? Create a new Profile Log into a Profile Outlook 2003 No Yes Outlook XP/2002

OS X version 10.3 does not support NTLMv2 Used to access SMB Shares and more Can force OS X to use Kerberos when authenticating to an SMB share see document: http://kb.iu.edu/data/atse.html Microsoft User Authentication Module (UAM) 10.1 will support NTLMv2

Local Machine Account Local machine account access could fail after May 15th Change the LM Compatibility level on the client machine How can I use the local security settings to force NTLMv2? Change the LM Compatibility level on the client server How can I use a GPO to force NTLMv2? How do I override settings in the Default Domain Policy for my OU?

IUB and IUPUI VPN Access Client Machines us MSCHAPv2 to communicate to the VPN server The VPN Server communicates using NTLMv2 to a ADS Domain Controller Note MSCHAP does break in a NTLMv2 only Environment

Who Could be Affected by this Change Machines that are not part of the ADS domain will not receive the Default Domain Policy and will not have their LM Compatibility Level set to 5. This includes home and laptop computers. Machines located in an OU that is blocking the Default Domain Policy will not have their LM Compatibility Level set to 5. Third-party operating system or application

IU Windows Authentication Update The IU Windows Authentication Update will configure your Windows 2000 (or higher) computer to disable insecure LM (LanManager) and NTLMv1 authentication protocols IUWare does use CAS for Authentication

Request a Testing OU UITS Messaging has set up a test domain (mssgtest.iu.edu) with both LM and NTLMv1 protocols disabled We strongly encourage you to leverage this domain to test how your applications and services will behave in an NTLMv2 only environment

Thank You! Questions? Conatact Info: lsps@iu.edu More Information: https://lsps.iu.edu