PKI

Note-to-self: New Guidance for Securing Public Key Infrastructure

Source: TechNet Blogs » Microsoft Security Blog » New Guidance for Securing Public Key Infrastructure

http://blogs.technet.com/b/security/archive/2014/06/11/new-guidance-for-securing-public-key-infrastructure.aspx

“Public Key Infrastructure (PKI) is used as a building block to provide key security controls, such as data protection and authentication for organizations. Many organizations operate their own PKI to support things like remote access, network authentication and securing communications.

The threat of compromise to IT infrastructures from attacks is evolving. The motivations behind these attacks are varied, and compromising an organization’s PKI can significantly help an attacker gain access to the sensitive data and systems they are after.

 To help enterprises design PKI and protect it from emerging threats, Microsoft IT has released a detailed technical reference document – “Securing Public Key Infrastructure.”

Note-to-self: the Short URL collection bookmarks

Category Short Url Description
Book http://aka.ms/packtpub_da_troubleshooting Book: Direct Access troubleshooting
Exchange http://aka.ms/mostpopularexch2010wiki Most poplar Exchange 2010 articles on TN Wiki
FIM http://aka.ms/ecmaresourcewiki ECMA Resource Wiki
FIM http://aka.ms/fim_codeplex FIM projects on Codeplex
FIM http://aka.ms/fim_portsrightspermissions FIM Ports, rights and permissions
FIM http://aka.ms/fim2010 https://identityunderground.wordpress.com/
FIM http://aka.ms/msidentitypublicreleases Microsoft’s Identity Software: Public Release Build Versions
FIM http://aka.ms/msidmpublicbuilds Microsoft’s Identity Software: Public Release Build Versions
FIM http://aka.ms/msidmpublicreleases Microsoft’s Identity Software: Public Release Build Versions
FIM http://aka.ms/powershellma PowerShell Management Agent > The IDM explorer
FIM http://aka.ms/understandingfimdeprovisioning Understanding Deprovisioning
FIM http://bit.ly/FIM2010R2-RC FIM 2012 R2 RC
FIM http://bit.ly/FIM2010R2BetaDocs FIM R2 Beta docs
FIM http://bit.ly/pGW4gS FIM Exam
FIM http://bit.ly/FIM2010BetaExam FIM Exam
FIM http://bit.ly/TNEdgeCustomizingFIMPortal FIM Portal customisation
FIM http://bit.ly/CreatingCustomRCDC FIM Creating Custom RCDC
FIM http://bit.ly/FIM2010HotfixRSS FIM Hotfix RSS
FIM http://bit.ly/FIMTags FIM tags
FIM http://bit.ly/FIM2010_slowlink Improve FIM performance over slow link
FIM http://bit.ly/FIM2010Solutions FIM 2010 Solutions from partners
FIM http://bit.ly/FIM2010CustomActivity_WF FIM Custom Activity WF
FIM http://bit.ly/FIM2010SDK FIM 2010 SDK
FIM http://bit.ly/FIM2010Resources FIM 2010 Resources
FIM http://aka.ms/fim2010bpa FIM 2010 Best Practice Analyser
FIM http://aka.ms/fim2010functionsref FIM 2010 Functions Reference
FIM http://aka.ms/fim2010partnermas FIM 2010: Management Agents from Partners
FIM http://aka.ms/fim2010r2bpa FIM 2010 Best Practice Analyser
FIM http://aka.ms/fimblogs FIM 2010 Community, feeds & blogs
FIM http://aka.ms/fimbuild_overview FIM Build Overveiw
FIM http://aka.ms/fimbuilds FIM Build Overveiw
FIM http://aka.ms/fimcmpermissions FIM CM Permisssion
FIM http://aka.ms/fimcommunity FIM Community overview
FIM http://aka.ms/fimcommunity_feeds_blogs FIM Community overview
FIM http://aka.ms/fimfilema FIM File MA
FIM http://aka.ms/fimlpdownload FIM Language Pack download
FIM http://aka.ms/fimma_ln8 FIM Lotus Notes MA
FIM http://aka.ms/fimmaportspermissions FIM Rights, Ports & Permissions
FIM http://aka.ms/fimmas FIM Management Agents
FIM http://aka.ms/fimmasfrompartners FIM Management Agents from partners
FIM http://aka.ms/fimrampup Learning FIM
FIM http://aka.ms/fimresources FIM Resources
FIM http://aka.ms/fimscriptbox FIM Script box
FIM http://aka.ms/fimsecurity FIM Security Setup
FIM http://aka.ms/fimtechoverview FIM Technical Overview
FIM Book http://aka.ms/fim2010r2bestpracticesbook FIM Book
FIM Book http://aka.ms/fim2010r2handbook FIM Book
FIM Book http://aka.ms/fim2010r2handbookshortcuts FIM Book
FIM Book http://aka.ms/fim_r2_best_practices_vol1 FIM Book
FIM Community http://aka.ms/fimteamug FIM Team User Group
FIM Forum http://aka.ms/fimforum FIM Forum on Technet
FIM Forum http://aka.ms/fimforumtn FIM Forum on Technet
FIM Learning http://aka.ms/fim2010rampup Learning FIM
FIM News http://aka.ms/2013fimannouncement 2013 FIM Announcement
FIM Technet http://aka.ms/tnwikiforum FIM 2010 Forum
FIM Wiki http://aka.ms/fim2010resources FIM 2010 Resources
FIM Wiki http://aka.ms/fim2010wiki FIM 2010 Wiki
Forefront http://aka.ms/forefrontroadmap Forefront Roadmap announcement
Forefront http://aka.ms/forefronttechcenter Forefront Tech Center
ILM http://aka.ms/ilm2007gettingstarted ILM Getting Started
Learning http://bit.ly/MS_MVA Microsoft Virtual Academy
PFE http://aka.ms/pfe_wiki Premier Field Engineering at TN Wiki
PFE http://aka.ms/stayoutoftrouble Premier Field Engineering
PKI http://bit.ly/MSPKIBook MS PKI Book
PKI http://bit.ly/CurrentCLMresources Current CLM Resources
Security http://bit.ly/MS_BRS Business Ready Security
Security http://bit.ly/NEAT_Spruce Neat And Spruce at Microsoft
Security http://bit.ly/FBLeak20110510 FB leak
Security http://bit.ly/DownloadBRSTrial Microsoft Business Ready Security Trial Environment
Sharepoint http://aka.ms/sp2010kernelmodeauthn Sharepoint Kernel Mode Authentication
Technet http://aka.ms/fim2010forum FIM Forum on Technet
Visual Studio http://aka.ms/debugextension Extension debugging
Wiki http://aka.ms/fimwiki FIM at Wiki
Wiki http://aka.ms/fixrgb Fix RGB codes to names in HTML
Wiki http://aka.ms/happybirthday_ed Wiki surprise
Wiki http://aka.ms/ninja Wiki Ninja
Wiki http://aka.ms/ninjas Wiki Ninja
Wiki http://aka.ms/notappropriatefortnwiki Wiki guidelines
Wiki http://aka.ms/tnwikibookmarks Wiki Bookmarks
Wiki http://aka.ms/wikitagcloud TechNet Wiki: easy bookmarks to important TNWiki resources
Wiki http://aka.ms/wikitoolbox TN Wiki toolbox
Wiki http://bit.ly/AddTocToYourTNWikiDoc Add TOC to your Wiki article
Wiki Blog http://aka.ms/tnwikiblog TN Wiki Blog
Wiki Blog http://aka.ms/wikiblog TN Wiki blog
Wiki blog http://aka.ms/wikininjablog TN Wiki blog
Wiki Governance http://aka.ms/technetwikicommunitycouncil Wiki Governance
Wiki Governance http://aka.ms/tnwikicouncil Wiki Council
Wiki Governance http://aka.ms/tnwikifeedback Wiki Feedback
Wiki Governance http://aka.ms/wikidevelopment Wiki Governance
Wiki Governance http://aka.ms/wikiguide Wiki Governance
Wiki Governance http://aka.ms/wikininjas Wiki Ninja
Wiki Governance http://aka.ms/wikireputation Wiki Governance
Wiki Governance http://aka.ms/wikuserguidelines_personalisation Wiki Governance

Note-to-self: Security Advisory 2868725: Recommendation to disable RC4

Source: http://blogs.technet.com/b/srd/archive/2013/11/12/security-advisory-2868725-recommendation-to-disable-rc4.aspx

Resumé:

In light of recent research into practical attacks on biases in the RC4 stream cipher, Microsoft is recommending that customers enable TLS1.2 in their services and take steps to retire and deprecate RC4 as used in their TLS implementations.

Microsoft recommends TLS1.2 with AES-GCM as a more secure alternative which will provide similar performance.

See also:

TechNet Blogs » Security Research & Defense : http://blogs.technet.com/b/srd/

And other interesting reading material referenced in the blog:

http://blog.cryptographyengineering.com/

 

 

Reviewed for you: Microsoft DirectAccess Best Practices and Troubleshooting (Packt Publishing)

Packt has recently published a new book "Microsoft DirectAccess Best Practices and Troubleshooting". (http://aka.ms/PacktPub_DA_Troubleshooting)

A few weeks ago I was asked to review the book.

Written by Jordan Krause a Microsoft MVP in Enterprise Security, and specializes in DirectAccess.

Packt Publishes advertises this book is an ideal guide for any existing or future DirectAccess administrator and system administrators who are working on Windows Server 2012.

This book will also be beneficial for someone with a basic knowledge of networking and deployment of Microsoft operating systems and software who wants to learn the intricacies of DirectAccess and its interfaces.

It’s a pretty condensed book of 116 pages in total, of which 98 technical content.

Structured in 5 chapters:

Chapter 1: DirectAccess Server Best Practices
Chapter 2: DirectAccess Environmental Best Practices
Chapter 3: Configuring Manage Out to DirectAccess Clients
Chapter 4: General DirectAccess Troubleshooting
Chapter 5: Unique DirectAccess Troubleshooting Scenarios

From a technical standpoint of view, it’s an interesting read, with lot of interesting advice.

It is quite confusing that the author discusses topics which are explained in a later chapter.
ISATAP for example. Chapter 2 discusses IPv6 vs ISATAP, while chapter 3 explains the ISATAP definition ( Intra-Site Automatic Tunnel Addressing Protocol).

To build the story in the book, it would make more sense to explain the basics first as it’s key information to the topics discussed and explained. It’s a good practice to set a common ground and vocabulary first, to start off on the right foot.

But when I say condensed, it really is condensed and not only on content level. Regarding readability, some of the pages are large blocks of heavy text, long sentences, barely using white space or paragraphs. Sentences reaching 4 lines require you to read the sentence again.

Shorter sentences and using more paragraphs is a simple fix.

Although the book is packed with valuable information, I’m a bit disappointed in the fact that the book does not get it’s full potential.

It would greatly improve by putting all hints & tips in a quick list (eg in an additional chapter or quick reference card), and/or gathering the do’s and don’ts in an action list like:

Please remember:

  • There are 3 platforms providing Direct Access: Windows 2008 R2, UAG and Windows 2012. Majority of DA deployments are covered by UAG and Windows 2012 as Windows 2008 R2 is quite difficult to handle.
  • Clients must be Windows 7 Enterprise, Windows 7 ultimate or Windows 8 Enterprise
  • Windows 7 pro and Windows 8 Pro do not support Direct Access (See: http://support.microsoft.com/kb/2756536)

Practical Hints & tips

  • The default gateway setting must only be defined on the external NIC
  • Name your NICs intuitively (chapter 1)
  • Set NIC binding correctly (chapter 1)
  • disable NICs not in use (ch.1)
  • Check Receive Side Scaling (RSS) (ch.1)
  • Enable spoofing of MAC addresses on VMs (ch.1)
  • Add static routes
  • Choose proper hostname
  • Join domain
  • Prestage the computer account
  • IP-HTTPS
  • DA must be a remote access platform and nothing else
  • Don’t use the Getting started wizard … + reasons (see chapter 1 of book)
  • Run the full Remote Access Setup Wizard
  • Create your own GPOs (ch.2)
  • Do not host the NLS website on the DA server
  • Set Teredo to Enterprise client
  • Use DNS Round Rbin for DA CLuster (ch.3)
  • Set client side firewall rules for each protocol needed (ch.3)
  • … (and so on)…

Furthermore, in the technical section in the book you won’t find any links to useful references, although there are plenty of opportunities to put in added value, again.

PacktPub has extremely good books that support this book:

  1. Windows Server 2012 Unified Remote Access Planning and Deployment
  2. Microsoft Forefront UAG 2010 Administrator’s Handbook
  3. Mastering Microsoft Forefront UAG 2010 Customization

Sorry, correction, the commercial part at the end refers to one of them.
But that’s not the author’s credit.

    There is a massive amount of additional reading and in depth material out-there, which the author could refer to. I’ll come to that in a second (cfr NRPT)
    I would love to get some insight in the list of hyperlinks the author frequently uses regarding this topic. Show me your favorites, man!
      The author explicitly targets existing DA administrators and “anyone interested in learning more about the technology before diving in for themselves”.

    But the index at the end of the book is missing essential acronym definitions.

    It would be nice to give the explanation with the acronym, like

    DIP, see Dedicated IP, 62,85
    UAG, see Unified Access Gateway, 36
    NRPT,see Name Resolution Policy Table, 50
    NAT, see Network Address Translation, 35-37
    GSW, see Getting Started Wizard

    One stunning example is NRPT, which is frequently touched in the book, but never explained.

    Even in the simplest case a reference to some useful resources would have helped, like:

      So, I’m hoping that Packt Pub will fix the gap.

    Despite, I still consider the Microsoft DirectAccess Best Practices and Troubleshooting book as a quick reference and a companion guide for Direct Access Administrators.

    An additional (online) reference list will make this book on DirectAccess rock, like Jordan kicks off with on page 1.

    And why not building that online reference on Technet Wiki?

    Note to the layout team: a small detail to make it complete: when you use justified layout (left and right aligned), that would make the book more polished.

    Note-to-self: useful links when you need to add 3rd party certs to the NTAuth store

    For Win2003:

    How to import third-party certification authority (CA) certificates into the Enterprise NTAuth store
    http://support.microsoft.com/kb/295663/en

    For Win 2008, Windows Server 2012:

    Add Published Certificates to Active Directory Containers
    http://technet.microsoft.com/en-us/library/cc731612.aspx

    “If a CA certificate is not added automatically when the new CA is created, such as a stand-alone CA created by a user who is not a member of the Enterprise Admins group, the CA certificate can still be added manually to the NTAuthCertificates container.

    This process can also be used to add the CA certificate of a non-Microsoft CA that has been used to issue smart card logon or domain controller certificates. By publishing these CA certificates to the Enterprise NTAuth store, the administrator indicates that the CA is trusted to issue certificates of these types.

    Using Enterprise PKI: http://technet.microsoft.com/en-us/library/cc754963.aspx

    Install the Enterprise PKI Console: http://technet.microsoft.com/en-us/library/cc771085.aspx

    Microsoft Forefront Identity Manager 2010 R2 Handbook – shortcuts

    As you know (or not) I’ve been involved in reviewing Kent Nordstrom’s book… (http://konab.com/fim-2010-r2-book/)

    You can order print and/or E-book at: http://aka.ms/FIMR2Book.

    Overview

    Page Chapter Title URL Description
    About the Author http://konab.com
    About the Reviewers http://be.linkedin.com/in/pgeelen Peter Geelen
    About the Reviewers http://aka.ms/FIM_R2_Best_Practices_Vol1 FIM R2 Best Practices Volume by David Lundell
    Support files, eBooks, http://PacktLib.PacktPub.com
    4 Preface http://aka.ms/PowerShellMA Granfeldt PowerShell MA 2.0 used to demonstrate ECMA
    5 Downloading the example code http://www.packtpub.com. extensible connectivity
    10 The Story in the book http://aka.ms/ADFSOverview Implement federation
    10 The Story in the book http://office365.microsoft.com Read more about Office 365
    19 Management agents http://aka.ms/FIMPartnerMA
    20 Management agents http://aka.ms/FIMMA
    28 FIM Licensing http://aka.ms/FIMLicense
    30 3 Installation http://aka.ms/FIMCapacityPlanning Capacity Planning
    32 3 http://aka.ms/SCSM2010Deployment SCSM for reporting
    32 3 http://aka.ms/FIMPlanning
    32 3 http://aka.ms/VirtualizationBestPractices
    35 3 http://aka.ms/FIMLanguagePacks
    35 3 http://aka.ms/SQLCollations
    35 3 http://aka.ms/SCSMCollations
    35 3 http://technet.microsoft.com/en-us/library/hh332707 Technet Site
    37 3 http://technet.microsoft.com/en-us/library/ff461010
    40 3 http://aka.ms/SCSM2010Deployment
    40 3 http://support.microsoft.com/kb/975332 AuthZ Man Hotfix
    49 3 http://blogs.msdn.com/b/chunliu/archive/2010/03/24/why-SharePoint-2010-not-use-kernel-mode-authentication-in-iis7.aspx turn off Kernel Mode authentication
    72 3 http://aka.ms/SCSM2010Ports complete list of ports required by SCSM 2010
    87 3 http://blog.konab.com/fim-2010-r2-book/reporting FIM post-install scripts for Data Warehouse
    93 4 Basic configuration http://support.microsoft.com/kb/303972 Replicating Directory Changes
    98 4 http://blogs.technet.com/b/doittoit/archive/2009/05/20/introducing-hierarchal-provisioning.aspx Hierarchical Provisioning
    101 4 http://aka.ms/FIMPreImportFilter
    104 4 http://aka.ms/FIMDeprovisioning
    116 4 http://aka.ms/FIMRunProfile
    118 4 http://aka.ms/UnderstandingFIMDeprovisioning
    118 4 http://aka.ms/FIMServiceSchema
    130 4 http://blog.konab.com/2011/09/performance-improvements-in-fim-2010-r2
    134 4 http://blog.konab.com/fim-2010-r2-book/basic-configuration/
    161 5 User management http://aka.ms/FIMDRE
    163 5 http://aka.ms/FIMMVExtension
    170 5 http://support.microsoft.com/kb/305144 UAC attribute
    172 5 http://aka.ms/FIMFunctions
    173 5 http://social.technet.microsoft.com/wiki/contents/articles/how-toenable-or-disable-accounts-in-active-directory-domain-service-usingfim.aspx
    200 6 Group management http://msdn.microsoft.com/en-us/library/cc223142 Group Type bitmask
    206 6 http://aka.ms/FIMAddIn Add-ins & extensions
    251 7 Self-service Password Reset http://aka.ms/FIMR2Upgrade
    254 7 http://aka.ms/SSPRconfigureSMSOT
    262 7 http://aka.ms/FIMR2QuickStart
    276 8 FIM & Office 365 http://fimattributestore.codeplex.com ADFS 2.0 Attribute Store for Forefront Identity Manager
    277 8 http://fim.codeplex.com .
    279 8 http://www.pointsharp.com
    285 9 Reporting http://technet.microsoft.com/en-us/library/jj133843 Default Report
    289 9 http://technet.microsoft.com/en-us/library/jj133844 ETL Script
    294 9 http://aka.ms/FIMReporting Modifying FIM Reports
    295 9 http://technet.microsoft.com/en-us/library/jj133861 Extending FIM reporting
    297 10 FIM Portal Customization http://aka.ms/CustomizeFIMPortal
    300 10 http://fim2010client.codeplex.com
    314 10 http://aka.ms/FIMxPath
    319 10 http://aka.ms/RCDCRef
    321 10 http://idmcrisis.com/post/2009/11/14/Working-with-RCDCe28099s-in-Visual-Studio.aspx Working with RCDCS in Visual Studio
    325 11 Customizing Data transformations http://aka.ms/FIMFunctions
    328 11 http://aka.ms/FIMWALExample
    328 11 http://aka.ms/ECMA2
    329 11 http://aka.ms/FIMPartnerMA
    329 11 http://aka.ms/PowerShellMA
    331 11 http://aka.ms/FIMFunctions
    337 11 http://aka.ms/DebugExtension
    348 12 Issuing Smart Cards http://aka.ms/CorePKI
    348 12 http://aka.ms/FIMCMandLunaSA
    353 12 https://identityunderground.wordpress.com/2010/05/17/clm-vs-key-recovery-agent-certificatetemplate
    374 12 http://aka.ms/FIMCMPermissions
    387 12 http://fimcmextensions.codeplex.com
    390 13 Troubleshooting http://aka.ms/FIMTroubleshooting
    405 13 http://aka.ms/FIMCMTroubleshooting
    408 13 http://aka.ms/FIMBackup
    408 13 http://aka.ms/FIMCMBackup
    409 13 http://aka.ms/SPFoundationBackup
    410 13 http://aka.ms/CABackup
    411 13 Summary http://blog.konab.com/fim-2010-r2-book
    413 Afterword http://aka.ms/FIMForumTN
    Afterword http://aka.ms/FIM2010Resources
    Afterword http://aka.ms/FIM2010Wiki

    References