37
REMOTE ACCESS TECHNOLOGIES Ondřej Ševeček | GOPAS a.s. | MCM: Directory Services | MVP: Enterprise Security | [email protected] | www.sevecek.com |

Remote Access Technologies

  • Upload
    lemuel

  • View
    72

  • Download
    1

Embed Size (px)

DESCRIPTION

Ondřej Ševeček | GOPAS a.s. | MCM: Directory Services | MVP: Enterprise Security | [email protected] | www.sevecek.com |. Remote Access Technologies. Network Access Technologies. VPN SMB/SQL/LDAP/DCOM sensitive to RTT Remote Desktop no clipboard, no file proliferation - PowerPoint PPT Presentation

Citation preview

Page 1: Remote Access Technologies

REMOTE ACCESS TECHNOLOGIES

Ondřej Ševeček | GOPAS a.s. | MCM: Directory Services | MVP: Enterprise Security |[email protected] | www.sevecek.com |

Page 2: Remote Access Technologies

Network Access Technologies VPN

SMB/SQL/LDAP/DCOM sensitive to RTT Remote Desktop

no clipboard, no file proliferation limited malware surface

802.1x WiFi or Ethernet no encryption, authorization only

DirectAccess GPO managed IPSec tunnel over IPv6

Page 3: Remote Access Technologies

RDP

VPN ScenarioVPN

Client

VPN Gatewa

y

DC FSSQL

RADIUS

NATSharePoint

Page 4: Remote Access Technologies

RDP

DA ScenarioDA

Client

DA Server

DC FSSQL

RADIUS

NATSharePoint

Page 5: Remote Access Technologies

WksWks

RDP

RDP ScenarioRDP

Client

RDP Gatewa

y

DC FSSQL

RADIUS

NATSharePoint

Wks

Page 6: Remote Access Technologies

RDP

802.1x WiFi Scenario

WiFiClient

DC FSSQL

RADIUS

WiFi AP

SharePoint

Page 7: Remote Access Technologies

RDP

802.1x Ethernet Scenario

Wks

DC FSSQL

RADIUS

Switch

SharePoint Wks

Printer

Page 8: Remote Access Technologies

VPN ComparedProtocol Transport Client RRAS Server

Server Requirements

PPTP TCP 1723IP GRE

MS-DOS and newer NT 4.0 and newer -

-

L2TPUDP 500, 4500IP ESP

NT 4.0, 98and newer 2000 and

newer

IPSec certificatepublic namePublic IPIPSec machine

certificate

SSTP TCP 443TLS

Vista/2008 and newer 2008 and

newerTLS certificatepublic name-

IKEv2UDP 500, 4500IP ESP

7/2008 R2 and newer 2008 R2 and

newer

IPSec certificatepublic namePublic IP

IPSec machine certificate

Page 9: Remote Access Technologies

VPN ComparedProtocol Transport Client RRAS Server

Server Requirements

RD Gateway

TCP 443TLS

RDP Client 6.0and newer 2008 and

newerTLS certificatepublic name

-

DirectAccess

IPSec insideIPv6 insideTCP 443 TLSor Teredo/6-to-4

7/2008 R2 EntepriseIPv6 enabled, GPO 2012 and

newer

IPSec certificateTLS certificatepublic nameIPSec machine

certificate

Page 10: Remote Access Technologies

Network Access Protection (NAP)

Client health validation before connecting Firewall on? Windows up-to-date? Antimalware up-to-date? SCCM compliance items in order?

Client validates itself no security, only an added layer of

obstruction

Page 11: Remote Access Technologies

Microsoft RADIUS Server

Standard authentication server IAS - Internet Authentication Service

(2003-) NPS - Network Policy Service (2008+)

Authentication options login/password certificate Active Directory authentication only

Clear-text transport with signatures message authenticator (MD5)

Page 12: Remote Access Technologies

RADIUS General

Access Client

RADIUS

Active Director

y

VPN

WiFi

Ethernet

RDP GW RADIUS

Access Server

AD Passthrough Authentication

RRAS VPN

WiFi AP

Ethernet Switch

RDP GW

DHCP

DHCP Server

Page 13: Remote Access Technologies

RADIUS Terminology

Access Client

RADIUS

Active Director

y

VPN

WiFi

Ethernet

RDP GW RADIUS

RADIUS Client

AD Passthrough Authentication

RRAS VPN

WiFi AP

Ethernet Switch

RDP GW

DHCP

DHCP Server

Page 14: Remote Access Technologies

Authentication Methods

PAP, SPAP clear, hash resp.

CHAP MD5 challenge response Store passwords using reversible encryption

MS-CHAP NTLM equivalent DES(MD4)

MS-CHAPv2 NTLMv2 equivalent plus improvements (time constraints) HMAC-MD5 (MD4)

EAP-TLS, PEAP client authentication certificate in user profile or in smart/card

No authentication sometimes the authentication occurs on the Access Server itself (RD

Gateway)

Page 15: Remote Access Technologies

PPTP issues

MPPE encryption proprietary, RC4

Encrypted by authentication products "by" password or "by" certificate

PAP/SPAP/EAP travels in clear

Page 16: Remote Access Technologies

EAP-TLS vs. PEAP

EAP-TLS is designed for protected transport does not protect itself

Protected EAP EAP wrapped in standard TLS

Page 17: Remote Access Technologies

EAP/PEAP Generic

Access Client

RADIUS

Active Director

y

EAP/PEAP Server

Certificate

Access Server

EAP/PEAP Client

Certificate

VPN Tunnel Server

Certificate

VPN Tunnel Client

Certificate

Page 18: Remote Access Technologies

MS-CHAPv2 with SSTP

Access Client

RADIUS

Active Director

y

Access Server

VPN Tunnel Server

Certificate

Page 19: Remote Access Technologies

EAP with SSTP

Access Client

RADIUS

Active Director

y

EAPServer

Certificate

Access Server

EAP/PEAP Client

Certificate

VPN Tunnel Server

Certificate

Page 20: Remote Access Technologies

PEAP with SSTP

Access Client

RADIUS

Active Director

y

PEAP Server

Certificate

Access Server

EAP/PEAP Client

Certificate

VPN Tunnel Server

Certificate

EAP Server

Certificate

Page 21: Remote Access Technologies

RADIUS Clients configuration IP address of the device

can translate from DNS, but must match IP address of the device (no reverse DNS)

Shared secrets MD5(random message authenticator +

shared secret) NETSH NPS DUMP ExportPSK=YES

Page 22: Remote Access Technologies

Implementing NPS Policy

Page 23: Remote Access Technologies

Implementing NPS Policy

Page 24: Remote Access Technologies

Implementing NPS Policy

Page 25: Remote Access Technologies

Implementing NPS Policy

Page 26: Remote Access Technologies

NPS Auditing

Page 27: Remote Access Technologies

PEAP on NPS

Page 28: Remote Access Technologies

PEAP on NPS

Page 29: Remote Access Technologies

VPN Client Notes

Validates CRL SSTP

does not use CRL cache HKLM\System\CCS\Services\SSTPSvc\Parameters NoCertRevocationCheck = DWORD = 1

IPSec set global ipsec strongcrlcheck 0 HKLM\System\CCS\Services\PolicyAgent StrongCrlCheck = 0 = disabled StrongCrlCheck = 1 = fail only if revoked StrongCrlCheck = 2 = fail even if CRL not available HKLM\System\CCS\Services\IPSec AssumeUDPEncapsulationContextOnSendRule = 2

Page 30: Remote Access Technologies

PEAP Client Settings

Page 31: Remote Access Technologies

VPN Client Configuration

Group Policy Preferences limited options

Connection Manager Administration Kit (CMAK) create VPN installation packages

Page 32: Remote Access Technologies

802.1x Notes

Required services WLAN Autoconfig (WlanSvc) Wired Autoconfig (Doc3Svc)

Group Policy Settings Windows XP SP3 and newer full configuration options

Page 33: Remote Access Technologies

802.1x Authentication

User authentication login/password client certificate in user profile or in

smart card Computer authentication

MACHINE$ login/password client certificate in the local computer

store Computer authentication with user

re-authentication since Windows 7 works like charm

Page 34: Remote Access Technologies

MS-CHAPv2 with 802.1x

Access Client

RADIUS

Active Director

y

APswitchsingle

Ethernetcable

WiFi

Page 35: Remote Access Technologies

EAP/PEAP with 802.1x

Access Client

RADIUS

Active Director

y

APswitchsingle

Ethernetcable

WiFi

EAP/PEAP Client

Certificate

User Machine

EAP-TLS Server

Certificate

EAP/PEAP Server

Certificate

Page 36: Remote Access Technologies

RD Proxy Troubleshooting

RPCPING-t ncacn_http-e 3388-s localhost (local TSGateway COM service)-v 3 (verbose output 1/2/3)-a connect (conntect/call/pkt/integrity/privacy)-u ntlm (nego/ntlm/schannel/kerberos/kernel)-I "kamil,gps,*"

-o RpcProxy=gps-wfe.gopas.virtual:443-F ssl-B msstd:gps-wfe.gopas.virtual-H ntlm (RPCoverHTTP proxy authentication ntlm/basic)-P "proxykamil,gps,*"

-U NTLM (HTTP proxy authentication ntlm/basic) rpcping -t ncacn_http -e 3388 -s localhost -v 3 -a connect -u ntlm -I "kamil,gps,Pa$$w0rd" -o

RpcProxy=rdp.gopas.cz:443 -F ssl -B msstd:rdp.gopas.cz -H ntlm -P "kamil,gps,Pa$$w0rd"

Page 37: Remote Access Technologies

RPC Proxy Troubleshooting

https://rpcserver/Rpc/RpcProxy.dll https://rpcserver/RpcWithCert/

RpcProxy.dll