680 likes | 1.43k Views
Ondřej Ševeček | GOPAS a.s. | MCM: Directory Services | MVP: Enterprise Security | ondrej@sevecek.com | www.sevecek.com |. Remote Access Technologies. Network Access Technologies. VPN SMB/SQL/LDAP/DCOM sensitive to RTT Remote Desktop no clipboard, no file proliferation
E N D
Ondřej Ševeček | GOPAS a.s. | MCM: Directory Services | MVP: Enterprise Security | ondrej@sevecek.com | www.sevecek.com | Remote Access Technologies
Network Access Technologies • VPN • SMB/SQL/LDAP/DCOM sensitive to RTT • Remote Desktop • no clipboard, no file proliferation • limited malware surface • 802.1x • WiFi or Ethernet • no encryption, authorization only • DirectAccess • GPO managed IPSec tunnel over IPv6
VPN Scenario VPN Client SQL DC FS NAT SharePoint RDP VPN Gateway RADIUS
DA Scenario DAClient SQL DC FS NAT SharePoint RDP DA Server RADIUS
RDP Scenario RDPClient SQL DC FS Wks NAT Wks SharePoint Wks RDP RDP Gateway RADIUS
802.1x WiFi Scenario SQL DC FS SharePoint WiFi AP RDP WiFiClient RADIUS
802.1x Ethernet Scenario SQL DC FS SharePoint Wks Switch RDP Wks RADIUS Printer
Network Access Protection (NAP) • Client health validation before connecting • Firewall on? • Windows up-to-date? • Antimalware up-to-date? • SCCM compliance items in order? • Client validates itself • no security, only an added layer of obstruction
Microsoft RADIUS Server • Standard authentication server • IAS - Internet Authentication Service (2003-) • NPS - Network Policy Service (2008+) • Authentication options • login/password • certificate • Active Directory authentication only • Clear-text transport with signatures • message authenticator (MD5)
RADIUS General RRAS VPN WiFi AP Access Client Ethernet Switch RDP GW Access Server DHCP Server VPN WiFi Ethernet RADIUS RDP GW RADIUS DHCP AD Passthrough Authentication Active Directory
RADIUS Terminology RRAS VPN WiFi AP Access Client Ethernet Switch RDP GW RADIUS Client DHCP Server VPN WiFi Ethernet RADIUS RDP GW RADIUS DHCP AD Passthrough Authentication Active Directory
Authentication Methods • PAP, SPAP • clear, hash resp. • CHAP • MD5 challenge response • Store passwords using reversible encryption • MS-CHAP • NTLM equivalent • DES(MD4) • MS-CHAPv2 • NTLMv2 equivalent plus improvements (time constraints) • HMAC-MD5 (MD4) • EAP-TLS, PEAP • client authentication certificate • in user profile or in smart/card • No authentication • sometimes the authentication occurs on the Access Server itself (RD Gateway)
PPTP issues • MPPE encryption • proprietary, RC4 • Encrypted by authentication products • "by" password or "by" certificate • PAP/SPAP/EAP travels in clear
EAP-TLS vs. PEAP • EAP-TLS is designed for protected transport • does not protect itself • Protected EAP • EAP wrapped in standard TLS
EAP/PEAP Generic Access Client VPN Tunnel Server Certificate Access Server EAP/PEAP Client Certificate EAP/PEAP Server Certificate VPN Tunnel Client Certificate RADIUS Active Directory
MS-CHAPv2 with SSTP Access Client VPN Tunnel Server Certificate Access Server RADIUS Active Directory
EAP with SSTP Access Client VPN Tunnel Server Certificate Access Server EAP/PEAP Client Certificate EAP Server Certificate RADIUS Active Directory
PEAP with SSTP Access Client VPN Tunnel Server Certificate Access Server EAP/PEAP Client Certificate PEAP Server Certificate EAP Server Certificate RADIUS Active Directory
RADIUS Clients configuration • IP address of the device • can translate from DNS, but must match IP address of the device (no reverse DNS) • Shared secrets • MD5(random message authenticator + shared secret) • NETSH NPS DUMP ExportPSK=YES
VPN Client Notes • Validates CRL • SSTP • does not use CRL cache • HKLM\System\CCS\Services\SSTPSvc\Parameters • NoCertRevocationCheck = DWORD = 1 • IPSec • set global ipsecstrongcrlcheck0 • HKLM\System\CCS\Services\PolicyAgent • StrongCrlCheck = 0 = disabled • StrongCrlCheck = 1 = fail only if revoked • StrongCrlCheck = 2 = fail even if CRL not available • HKLM\System\CCS\Services\IPSec • AssumeUDPEncapsulationContextOnSendRule = 2
VPN Client Configuration • Group Policy Preferences • limited options • Connection Manager Administration Kit (CMAK) • create VPN installation packages
802.1x Notes • Required services • WLAN Autoconfig (WlanSvc) • Wired Autoconfig (Doc3Svc) • Group Policy Settings • Windows XP SP3 and newer • full configuration options
802.1x Authentication • User authentication • login/password • client certificate in user profile or in smart card • Computer authentication • MACHINE$ login/password • client certificate in the local computer store • Computer authentication with user re-authentication • since Windows 7 works like charm
MS-CHAPv2 with 802.1x Access Client APswitch single Ethernetcable WiFi RADIUS Active Directory
EAP/PEAP with 802.1x Access Client APswitch EAP/PEAP Client Certificate single Ethernetcable EAP/PEAP Server Certificate EAP-TLS Server Certificate Machine User WiFi RADIUS Active Directory
RD Proxy Troubleshooting • RPCPING-t ncacn_http-e 3388-s localhost(local TSGateway COM service)-v 3 (verbose output 1/2/3)-a connect (conntect/call/pkt/integrity/privacy)-u ntlm(nego/ntlm/schannel/kerberos/kernel)-I "kamil,gps,*"-o RpcProxy=gps-wfe.gopas.virtual:443-F ssl-B msstd:gps-wfe.gopas.virtual-H ntlm(RPCoverHTTP proxy authentication ntlm/basic)-P "proxykamil,gps,*"-U NTLM (HTTP proxy authentication ntlm/basic) • rpcping -t ncacn_http -e 3388 -s localhost -v 3 -a connect -u ntlm -I "kamil,gps,Pa$$w0rd" -o RpcProxy=rdp.gopas.cz:443 -F ssl -B msstd:rdp.gopas.cz-H ntlm -P "kamil,gps,Pa$$w0rd"
RPC Proxy Troubleshooting • https://rpcserver/Rpc/RpcProxy.dll • https://rpcserver/RpcWithCert/RpcProxy.dll