Presentation is loading. Please wait.

Presentation is loading. Please wait.

Proven Scalability Proven Security Proven Trust A solid foundation to build on.

Similar presentations


Presentation on theme: "Proven Scalability Proven Security Proven Trust A solid foundation to build on."— Presentation transcript:

1

2

3 Proven Scalability Proven Security Proven Trust A solid foundation to build on.

4 Notes MS02-011 & 012 not included: updates SMTP service only ASP.NET adds: 1 – v 2.0 2 - v 1.1 3 - v 1.0 Two security patches for IIS 6 since RTM (>3 yrs) = Critical = Rollup with X updates X IIS 6 IIS 5 2002 2003 2004 2005 IIS 4 4/15 Server2003 RTM 4/10 02-018 6/11 02-028 10/30 02-062 5/28 03-018 10/12 04-021 (WebDAV DoS) 7/13 04-021 8 8 4 4 4 4 < Critical 2006 06/11 06-034 (ASP)

5

6 Modular Design: – Reduced exposure at installation and runtime.Net Integration: – Forms Auth for any content – Use of.NET Role and Membership Providers Built in anonymous account – Easier to administer, restore, and configure Application Pool Isolation – Improved Sandboxing between applications URLAuthorization and Request Filtering – New choices for improving security Kernel mode SSL and authentication – Faster negotiation of security exchanges, fewer problems

7 Features implemented as discrete modules Modularity improves security Reduced module set by default at install Remove modules that you do not need Extensibility allows security customization Add authentication, logging, or blocking mechanisms

8 Integrated pipeline enables Forms authentication with any content Leverage existing user database with.NET Role/Membership providers Examples: Store user names in: Active directory or local SAM SQL 2005 Express for static site users ADAM for users and groups in a PHP application DB2 mainframe users and groups in ASP.net

9

10 Control access to sites, folders, or files without using NTFS Inspired by ASP.net URL authorization, but designed for administrators Rules are stored in.config files Delegate control to store in web.config Authorization rules are then portable Xcopy and maintain security Use Windows principles or.NET provider Native to IIS 7

11

12 IIS 7 integrates URLScan style rules Very strong security feature Prevent URLs that contain “any string” Block URLs over “X” in length Prevent delivery of “.config” or “/bin” Easy to read rules stored in.config Delegate control to store in web.config Filtering rules are then portable Cannot be edited in UI New error codes track rejections

13

14

15 IUSR instead of IUSR_ IUSR is “built in”, not a local account – Cannot logon to system with this account – No password to worry about – Same SID on all Vista/LH servers – File ACLS are valid between servers Allow anonymous access & turn off IUSR: – Use process identity for anon access when enabled – Disabled by default

16 IIS_WPG local group in IIS 6 All app pool identities must be in IIS_WPG Creates administrative overhead Adds complexity to hardening/pool isolation IIS_IUSR replaces IIS_WPG Built in group, not local Well known SID means ACLS respected Pool identities are automatically added

17

18 New IIS 7 feature significantly improves application pools isolation Prevents attacker from reading secrets in another pools config Works automatically, and is transparent to configuration and operation Process identity is unchanged Network Service by default Note that application pools cannot read Applicationhost.config by default.

19 Each site is assigned to a unique pool Occurs automatically with new site in UI At runtime: Unique SID for pool is “injected” into the process’ list of SIDs Does not change process identity A “temp” config file is created that contains only config settings for the pool The temp config file is ACLd with unique SID SID will be the same on other servers

20

21 Additional steps for increasing security Disable anon user appcmd set config -section:anonymousAuthentication -userName:"" --password All anon access will occur as process identity Set content for access by App Pool unique SID (with icacls) Local content only, won’t work for UNC content Create secure location for ASP template cache Compressed content Create ASP.net temp file location for pool appcmd set config "Default Web Site" -section:compilation - tempDirectory:%systemdrive%\inetpub\temp\aspnettemp\site%1 /commit:webroot

22 Advanced Hardening

23 Kernel Mode SSL Improves performance Reduces context switch to user mode Kernel Mode Authentication Improves performance Kerberos functions when using custom application pool identity! No need to use SETSPN as access to DC occurs as machine account

24 Passwords may be present in.config No secrets by default Passwords are needed for: UNC paths Shared Configuration Custom Anon or App Pool identity Passwords are encrypted when added AES provider is the default Encryption provider can be customized

25 IIS 7 provides improvements and new capabilities that increase security and simplify administration FeatureBeneft Modular DesignReduce Footprint, less exposure Built in anonymous userCan’t expire or lockout, no password to manage Disable anon userSimplify ACLs on content Integrated pipelineUser Forms authentication and.NET role/membership providers Request FilteringPrevent malicious content from reaching applications URLAuthorizationUse file based rules instead of ACLs to control access Kernel Mode Authentication and SSLNo SETSPN with custom pool identities. Faster SSL and auth. Application Pool SandboxImproved isolation between pools

26

27 © 2007 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

28 IIS 6 used different rules for local vs unc IIS 7 rules are simplified to be consistent Rule: If username and password is supplied for a site or directory, they are used to all content regardless of location.

29 Q: Where do I configure Read/Write properties that were in IIS 6? A: Handler properties Q: How do I install a Certificate A: Install a Self Signed Cert in the UI or use wizard A: What happened to Web Service Extensions? Q: Implemented as ISAPI and CGI restrctions In the UI Q: Do I need URLScan A: No.

30 Difference ASP.NET Url Authorization Behavior IIS7 Url Authorization Behavior Rule evaluation Order: a) Lower level first going up to the parent b) Order of appearance in rule collection Order: a) Deny rules get evaluated first starting at the parent b) Allow rules starting at the parent. c) Order of appearance in rule collection IIS7 User InterfaceNo IIS7 User Interface "Authorization Rules" User Interface Configuration sectionsystem.web/authorization system.webServer/security/a uthorization Module System.Web.Security.UrlAut horization %windir%\system32\inetsrv\ urlauthz.dll Content Applies only to content that is mapped to a managed handler (can be turned off via managedHandler precondition) Applies to all content


Download ppt "Proven Scalability Proven Security Proven Trust A solid foundation to build on."

Similar presentations


Ads by Google