Coopers & Lybrand: Microsoft Proxy Server Security Evaluation

Coopers & Lybrand, L.L.P., Information Technology Security Services

April 1997

Abstract

This case study presents the results of tests designed to evaluate Microsoft® Proxy Server security. Interconnectivity security issues and the Microsoft Proxy Server features designed to address these issues are presented. The approach used to evaluate Microsoft Proxy Server security is discussed, and definitions of multiple test cases covering Microsoft Proxy Server installation, configuration, function, and penetration are provided. The configuration of the testing laboratory and its equipment used to evaluate this product is described, and a security checklist and baseline security configuration is presented.

Table of Contents

Executive Summary

Introduction

Background

Objectives

What Is Microsoft Proxy Server?

Interconnectivity Security Issues and Microsoft Proxy Server Security Features

Test Case Approach

Test Case Findings Summary

Installation Tests

Configuration Tests

Function Tests

Penetration Tests

Installation Test Case Results Summary

Configuration Test Case Results Summary

Function Test Case Results Summary

Penetration Test Case Results Summary

Appendix A—Test Specification

Appendix B—Test Lab Network Diagrams

Appendix C—Server Security Checklist

Reducing Security Risks

Appendix D—Output of ISS SafeSuite Scans (Abbreviated)

Appendix E—Suggested Baseline Security Configuration

Appendix F1—Detailed Installation Test Case Results

Appendix F2—Detailed Configuration Test Case Results

Appendix F3—Detailed Functional Test Case Results

Appendix F4—Detailed Penetration Test Case Results

Management's Assertion

Report of Independent Accountants

Disclaimer

Limitation of Testing

Bibliography

About Coopers & Lybrand

About the Authors

Executive Summary

In the fast-growing market for Internet related products and services, new offerings are made available on an increasingly frequent basis, often without extensive field use or review. This document represents an attempt to provide an additional level of evaluation of Microsoft Proxy Server and presents the results of a series of tests designed to evaluate the product’s security capabilities. The exercises conducted provide information regarding the security functionality of the product and should be used in conjunction with vendor literature, along with your own critical evaluation, to determine its effectiveness and appropriateness for your environment. This document is one of several sources that can be referenced when attempting to make decisions regarding the relative strength of security measures your organization would like to implement when establishing Internet connectivity.

It is critical to note that there is no one right answer to the question of what constitutes enough security. The answer is often a custom solution that depends on your needs for control and flexibility. Adopting a practical business approach when addressing the level of security an organization requires should be fundamental to all security decisions.

Based on our analysis, it appears that Microsoft Proxy Server can be used to satisfy the security needs of many organizations as they establish and maintain Internet-based systems and applications.

In our assessment of Microsoft Proxy Server, we completed a four-phase evaluation program:

Coopers & Lybrand’s (C&L) intent in constructing this four-phase approach was to emulate, as closely as possible, the life cycle of product deployment in commercial environments. The approach was designed to unearth security vulnerabilities that would have a major impact on the overall security of private networks. C&L employed generally recognized techniques for testing security controls in networked environments of this kind.

Throughout the evaluation, Microsoft Proxy Server withstood the testing of well known and well documented tools, such as the public domain tools Internet Security Scanner and Satan, that exploit vulnerabilities in TCP/IP networks. In addition, Microsoft Proxy Server did not reveal any easily exploitable vulnerabilities that would place private networks at significant risk when communicating via the Internet.

Obtaining an in-depth understanding of the contents of this document requires a fundamental understanding of internetworking architecture, the TCP/IP protocol, and general security vulnerabilities in Internet technology. It should be noted that without careful installation, monitoring, and observation, any computing product or system may be vulnerable to exploitation in current and future configurations. Please see the Bibliography later in this document for additional information regarding these issues.

One must note Microsoft Proxy Server relies on Microsoft Windows NT® Server version 4.0 as its operating system and for certain security features. In some scenarios and configurations, the IP forwarding feature of the Microsoft Windows NT Server version 4.0 operating system may present routing vulnerabilities. This feature is not enabled when Microsoft Windows NT Server version 4.0 is installed, but since this feature is not automatically disabled when Microsoft Proxy Server is installed, it is important to disable it. In addition, Microsoft Windows NT Server version 4.0’s TCP/IP allows initial connections to some IP ports, which can be detected via the Internet. This may entice vandals to attempt further attack scenarios and encourage organizations interested in the highest level of security to employ additional firewall components (such as a packet filtering router or other commercial firewall product) between the proxy server and the public Internet. This paper explains how proper configuration can help you avoid these risks. Finally, since a major component of security depends on good monitoring, all organizations that utilize the Microsoft Proxy Server, which does include an adequate auditing mechanism but no automatic alert mechanism, should make the commitment to allocate proper personnel resources for continuous system monitoring.

In summary, it appears that Microsoft Proxy Server, when properly installed, configured, maintained, and monitored, can provide a reasonable and practical level of security for a wide variety of computing environments.

Introduction

Background

Recent technical developments provide fast efficient communication among individuals and businesses. Currently, one of the most publicized forms of modern communication is the computer network, specifically the Internet. As this communication technology becomes increasingly a necessity, the concern for its security and control also increases. Resulting from this concern, organizations have developed additional technology to counter these control and security issues.

Microsoft Proxy Server is one such technology created to address the security and control of communications conducted through a computer network.

Objectives

The primary objectives of this white paper are to:

While this document addresses the security controls of the Microsoft Proxy Server, it does not address all of the security controls of the Microsoft Windows NT Server version 4.0 operating system or the Microsoft Internet Information Server products, both of which are prerequisites for the Microsoft Proxy Server operation. This evaluation is not intended to be a conclusive examination of Microsoft Windows NT Server version 4.0 or IIS.

What Is Microsoft Proxy Server?

Microsoft Proxy Server is a secure, high performance, cost-effective gateway to the Internet. Microsoft Proxy Server has two services: Web Proxy and WinSock Proxy.

Web Proxy

Web Proxy is fully compliant with the CERN proxy standard, and offers proxy service for FTP Read, Gopher, and WWW for computers on your private network running TCP/IP. Web Proxy supports the popular web browsers, including Microsoft Internet Explorer 3.0, Netscape Navigator 3.0, and PointCast Network. Web Proxy also supports multiple platforms including Windows NT Server, Windows NT Workstation, Windows® 95, Windows for Workgroups, Windows 3.1, UNIX, and Macintosh®. Web Proxy also supports SSL Tunneling, which provides an encrypted connection between the client and Web Server through the proxy.

WinSock Proxy

WinSock Proxy proxies virtually all Windows Sockets 1.1 compatible applications and protocols by intercepting Windows Sockets Application Programming Interface (API) network calls, with support for TCP/IP and IPX/SPX net protocols. This service is transparent to the application, therefore virtually all applications can be proxied. Examples of remote capable applications are TELNET, FTP, RealAudio, SMTP, and VDOLive.

Microsoft Proxy Server offers an extensive array of supporting features.

Feature Summary

Feature Description
Single IP Address Microsoft Proxy Server presents one IP address to computers on the Internet. This enables one point of connection between many internal computers and external computers. The internal network addresses are not presented to the external computers.
Supports Dual-Homed Adapters Microsoft Proxy Server supports two network adapter cards with different addresses that do not use IP-Forwarding. This feature separates the internal addresses topology from the external.
Local Address Table Microsoft Proxy Server enables the specification of the IP address range(s) of all internal computers when IP is used as one of the internal protocols. This enables local clients to determine whether they must connect through the Proxy Server to access an external IP address. This feature also blocks processing of external client requests to internal servers.
Internet/Intranet Applicable The single IP address, support for two network adapter cards, and Local Address Table make Microsoft Proxy Server suitable for securing internal networks from the Internet or from other internal networks.
Site Filtering Microsoft Proxy Server enables certain Internet sites to be filtered from internal clients.
Access Control Microsoft Proxy Server enables user and group permission lists to be established for each protocol.
Proxy Request Logging Microsoft Proxy Server enables logging of system usage and access. Logs can be saved to text files or to a database (such as SQL Server™) using ODBC.
Remote Administration Microsoft Proxy Server can be administered from remote intranet (within corporate network) locations using the Internet Service Manager tool.
Tight Integration with Windows NT Server Version 4.0 Microsoft Proxy Server tightly integrates with Microsoft Internet Information Server and the Windows NT Server Version 4.0 network operating system, therefore allowing central administration through the Windows NT administrative environment and single logon for Proxy Server users.
Multiple Network Compatible Microsoft Proxy Server supports both TCP/IP and IPX/SPX protocols and it can be used with existing networks, therefore allowing migration to a pure TCP/IP based network at a self-defined pace.
Ease of Use Microsoft Proxy Server runs on the Windows NT Server Version 4.0 network operating system and presents a user-friendly interface.
Demand Dial Microsoft Proxy Server contains an autodial feature, which automatically connects the Proxy Server to the Internet Service Provider whenever data is required and not stored in the cache. The autodial disconnects from the service provider when the data is retrieved or when a time out expires.
Protocol Support Microsoft Proxy Server supports all Internet protocols, including streaming audio and video, Internet Relay Chat, TELNET, HTTP, FTP, SMTP, NTP, and more.
Caching Microsoft Proxy Server offers active, intelligent caching of frequently visited sites to reduce network costs and bandwidth consumption. Caching is scaleable through Windows NT and hardware.
Integration With SNMP Microsoft Proxy Server integrates with SNMP services, which enables the status of a Proxy Server to be viewed from across the network.
Extensibility Microsoft Proxy Server supports the multi-vendor ISAPI Filter specification enabling third parties to write value-enhancing add-ons to the Proxy Server. Examples of current extensions include virus scanning and site filtering.

Interconnectivity Security Issues and Microsoft Proxy Server Security Features

Organizations or individuals that connect to the Internet assume significant security risk. Microsoft Proxy Server and Windows NT Server Version 4.0 have features designed to prevent and/or severely reduce most of the common security issues that are introduced by connecting to the Internet. The following section focuses on those features and the issues and risks eliminated, severely reduced, or generally mitigated by each of those features.

Issue

Network Penetration—The most widely discussed set of risks relating to a corporate network is outside users accessing internal resources. This includes external users accessing data on the internal network as well as potentially doing damage to the network itself. As more companies connect to external networks, a variety of tools, including proxy servers, have been developed for the purpose of masking the internal network from the Internet or other external networks in order to prevent snooping on or hacking into the internal network.

Feature

Local Address Table (LAT) and Proxy Server—In the network configuration (LAT) dialog box, each address pair in the Internal IP Addresses list identifies a range of addresses that belong to the private network. This information is used to create the Local Address Table (LAT). The LAT is stored in the msplat.txt file, located by default at C:\msp\clients. When a client computer runs the client Setup program, this table is downloaded from the Server to the client. When a WinSock Proxy or Web Proxy client attempts to access a network IP address, the LAT is used to determine whether the address is inside the private network (and can be connected to directly) or is outside on the Internet (and therefore must be connected to through Microsoft Proxy Server).

When a client request is received, it is verified that it came from an internal network interface.

Supports dual-homed environment—The Microsoft Proxy Server can easily be configured as a dual-homed (separate network interface for each side) non-routing (not arbitrarily passing IP packets between connected networks) security device. This method of connection provides the most secure form of network security isolation. This dual-homed environment can be configured to support a different network protocol on the two interfaces, thus providing another security level.

Ability to Disable IP Forwarding in Windows NT Server Version 4.0 TCP/IP—In a dual-homed server, IP forwarding is enabled or disabled under the routing tab of the TCP/IP properties menu. This is found by selecting TCP/IP under the protocol tab of the network icon. The network icon may be accessed through the Control Panel.

Support for IPX protocol—Since many corporate networks do not run the TCP/IP protocol, but support the IPX protocol, the Microsoft Proxy Server will function in that network environment. The Proxy Server will operate in a dual-homed network with the internal network running IPX and the external network running TCP/IP. Some system administrators believe this provides better security on the private network. The IPX protocol is configured in Windows NT server using the network icon’s protocols tab. Once configured, Microsoft Proxy Server will automatically utilize the protocol.

Issue

IP Spoofing—IP spoofing or masquerading is a technique used in a network or system attack in which the attacking computer assumes the identity of a computer already in the internal network. The attacking computer spoofs or imitates the IP address of the internal computer to either send data as if they were on the internal network or to receive data intended for the machine being spoofed.

Feature

Local Address Table (LAT) and Web Proxy—The Microsoft Proxy Server is designed to prevent any IP packets with destination addresses not found in the LAT from entering through the public Internet-connected interface and attempting to access computers on the internal network. This feature plays a major role in preventing spoofing (IP address masquerading) attacks from the Internet.

Issue

External Publication of Internal Data—Prevention of internal data, used on an internal network or an Intranet, from being visible on any external network.

Feature

Enable/Disable Internet Web Publishing—The Internet Information Server (IIS) may be installed when Windows NT Server Version 4.0 is installed. All three IIS publishing services (WWW, Gopher, and FTP) are started by default when the Windows NT Server is started. These services, when configured, are then advertised both on the internal and on the external network. When the Microsoft Proxy Server is installed, WWW publishing (http protocol, port 80) on the external network is disabled, effectively hiding the internal http data from the outside. This feature may be manually enabled by selecting the check box to allow outside access to the inside data.

Issue

Access to Unauthorized or Undesirable Internet Sites—Internet browser software will allow access to any site on the Internet. Many corporate entities find that certain sites are unacceptable in their content or will want to limit access to only business-related sites. These organizations prefer to restrict access not only by written policy, but also by enforcing an actual restriction to those sites that they deem unacceptable. Lack of site access restrictions and a policy regarding site access may be interpreted to mean that access to all sites is acceptable. Appropriate use and legal liability are risks associated with internal users accessing outside resources. This risk can be mitigated through controls such as filtering for certain sites identified as inappropriate, issuance of a policy regarding site access, and monitoring site access.

Feature

Site/Domain Filtering—The Microsoft Proxy Server gives an administrator the capability to limit which Internet sites can be accessed by the internal client user population. This feature can be configured to grant or deny access to all sites except those listed in the proxy filtering database. Filtering can be assigned by providing specific, individual network addresses, network address ranges and subnet masks, or Internet domain names. This feature may be used to limit a corporation’s exposure to non-authorized Internet access.

This feature is disabled by default and must be enabled to use. Access may be controlled on a granted or denied list. All access is granted except to sites listed or all access is denied except to sites listed. The system administrator may override filtering by using the Unlimited protocol of the WinSock Proxy.

Issue

Auditablility—The ability to gather information about the use of the Microsoft Proxy Server is important to overall system security—the administrator’s knowledge of what users are accessing and what information is being moved over the network helps avoid problems. Without such information, the network administrator knows nothing about the activity on the proxy server, neither the types of access nor the locations visited.

Weak or nonexistent monitoring controls increases the risk associated with not interrupting or noticing any attacks on your network or servers.

Feature

Logging—The Microsoft Proxy Server enables administrators to activate one of two levels of activity/security logging functionality (regular or verbose). With each level of logging a trade-off takes place between amount of detail available versus performance and storage requirements. The regular level of logging provides sufficient information to gain a comfortable level of security monitoring for most network applications, while the verbose level provides all of the information regarding a connection or event.

Logging provides the system administrator the ability to track system usage and access. Without logging the ability to prevent unauthorized activity is severely limited. Operating the Microsoft Proxy Server without logging enabled should be considered insecure.

The logging feature records the following information and stores it in the listed directories:

Web proxy: %SYSTEMROOT%\w3plogs

Winsock proxy: %SYSTEMROOT%\wsplogs

Regular logging

Verbose logging

Issue

Unauthorized Users—Most corporations desire to control access to the Internet. Authentication of users connecting to this medium will provide some comfort level that the appropriate persons are using the access facility. Poor or no authentication may lead to a loss of accountability in the use of the private and public network.

Feature

User-Level Authentication—This feature is implemented and operates differently within the Web Proxy Server and the WinSock Proxy Servers.

Use of an anonymous logon, between client and proxy server, is the most common access method to the Internet. Use of this method assumes that the connection is coming through the internal network and is essentially trusted. There is no security involved with this connection, other than assuring that the client is on the internal network. Microsoft Proxy Server offers two kinds of user-level authentication.

Using either of the authenticated connection processes enhances security by forcing the proxy server to authenticate each connection before allowing the request to pass through the proxy. The user has to be revalidated for each connection through the proxy server. This requires some level of account management either on the proxy server itself or on the domain controller for the domain that contains the proxy server machine or on a domain controller in a trusted domain, as each user must have a valid account on the proxy server.

Authentication between a private network client and the Web Proxy Server is configured in the WWW Service tab of the Internet Information Server (IIS) and in the Web Proxy Permissions tab of the Proxy Server. In addition to anonymous authentication, the Proxy Server allows two other authentication methods—Basic Authentication with Clear Text and Windows NT Challenge/Response Authentication.

The Web Proxy Server allows access control to be enabled or disabled. If disabled, all users get access to the Web Proxy and the settings in the WWW Service tab are not used. If enabled, then user-level authentication takes place based on the settings in the WWW Service. When access control is enabled, using the anonymous login feature will not work, unless the IUSR_machinename account is given protocol permission on the Web Proxy’s Permissions tab. If anonymous login is the only authentication choice selected in the WWW service of IIS, then no access control at the Web Proxy is active. If any other authentication method is chosen in the WWW service of IIS, then access control is available in the Web Proxy.

Basic authentication

With Basic authentication enabled, a username and password are passed to the Microsoft Proxy Server in the uuencoded format. Uuencoding means that the text is scrambled, but normal ASCII characters are visible, so the username Murray might come out as Nvttbz. To the casual viewer this may seem unusable, but encoded text is easily unscrambled by certain programs.

Windows NT Challenge/Response authentication

Windows NT Challenge/Response (NTCR) authentication is Windows NT’s highest level of security. NTCR is typically run in a networked environment that includes Windows NT servers and Windows NT workstations. Windows 95 workstations can also use NTCR to provide secure client authentication. Windows for Workgroups and Windows 3.1 cannot utilize this method by default, but may be upgraded to do so.

Using NTCR authentication is one of many requirements to be met if you want your network to be C2 compliant. NTCR requires that you run an NTCR-compatible application such as Internet Explorer 3.0 with the Web Proxy.

The WinSock Proxy provides access control similar to that of the Web Proxy. When access control is enabled, the WinSock Proxy authenticates all users with the Windows NT Challenge/Response method. When access control is disabled, the WinSock Proxy allows anonymous access.

In the WinSock Proxy, if access control is disabled, then all users have access. This is the equivalent of disabling access control in the Web Proxy. If access control is enabled, then only those granted permission to the specific protocols may access the Proxy Server.

Issue

Unauthorized Access to Services—Administrators and managers may wish to limit user access to specific Internet protocols and specific network ports. These limitations may vary based on individual user profiles or group membership.

Feature

The Microsoft Proxy Server has the capability of securing both out-bound and in-bound Internet access down to specific individuals or groups of individuals for the specific protocols. This can be enforced using the Proxy Server’s Properties and Permissions function for either WinSock Proxy or Web Proxy. This makes it possible to limit particular proxy services to as fine a degree as an organization feels is appropriate.

User Level: Access Control—This feature is controlled in the Permissions Property Sheet for both the Web Proxy and the WinSock Proxy. Individual users or groups of users may be granted permissions to use any individual protocol within the Proxy Server. Users who are not explicitly given access to a protocol are not permitted to access that protocol.

Global Level: Disable Port/Protocol—The WinSock Proxy permits an entire protocol to be disabled from access. Protocols not listed in the Protocol Description Property Sheet are automatically disabled from any access. Protocols listed in the property sheet are available unless the individual ports listed within the protocol are disabled. Protocols may disabled by denying user access to them or by removing their definition from the WinSock Proxy’s protocols tab.

The WinSock Proxy provides an additional protocol known as Unlimited. This protocol provides those granted access with unlimited access to all protocols defined for the WinSock Proxy. Unlimited access also provides an override to any filters that may be in place.

Issue

Visibility of Internal Network Addresses to the Internet—Providing transparent access from an internal or private network to the public or external network while masking or protecting the internal network.

Feature

Proxy Architecture—The Proxy Server provides IP address aggregation. This means that for every client request it receives, the Proxy Server issues that request to the external network using its external IP address, thus concealing the internal network addresses from the outside. When services are proxied by the Microsoft Proxy Server, the source IP address of each service request is re-mapped to that of the Proxy Server external network adapter. This ensures that the external services and/or any unauthorized party cannot determine the internal network addresses of client stations and later attempt to penetrate those stations through some other open access point (for example, a non-authenticating terminal server or a passive routing device that may be open).

Issue

Unauthorized Access to Cached Data—Data from the World Wide Web, such as sites visited and information viewed, is sometimes stored for faster access by other users. These data could contain sensitive information and need to be protected from inadvertent or unauthorized viewing.

Feature

The Microsoft Proxy Server provides caching for http resources accessed on the Internet from internal network computers. The Proxy Server cache is checked prior to all Internet data requests to see if the requested data resides in the cache.

SSL Not Cached—A security feature of this caching is that no http pages are ever cached. This prevents one user from inadvertently viewing data that was issued to another user while in a secure mode.

NTFS Support—The Windows NT File System (NTFS) provides security and access control for your data files. By using NTFS, you can limit access to portions of your file system for specific users and services. This will help block access to cached data, as individual users need no access to the cache directory.

User Authentication Resources Not Cached—Any authenticated resources are not stored in cache at any time. This prevents any access to user account and password information. This feature is enabled by default.

Issue

System Detection and Probing—Certain TCP/IP network protocol ports, if active, may be used by hackers to gather information about a network or as a possible penetration point to a network. Information is gathered about listening network ports through the use of the freely available network scanning tools.

Feature

Disabling of Specific Network Ports—The Windows NT Server that hosts the Microsoft Proxy Server implementation listens for network connections on various ports depending on which services are active in the Web Proxy and the WinSock Proxy. Certain other ports such as 47, 135, 137, 138, and 139, are active and may be disabled through the Windows NT Server’s registry and by changing the bindings on the network interface card. Bindings are modified under the Bindings tab of the network icon. This icon is available through the control panel. More information on how to disable these ports is found in the Appendices of this document.

Issue

Denial of Service Attacks—The “Denial of Service Attack” uses automated tools to flood the port(s) of the system providing access to the network with requests for connection, which will be denied. Flooding the entry ports exploits the fact that a single point of control can also be a single point of failure. These attacks cause a server to become so occupied with the attack that it either crashes or only responds to the attack scenario preventing any legitimate uses of the server.

Feature

Many features of the UNIX operating system that could be used in denial of service attacks are functions that are not available in a standard Windows NT Server installation. These features include server services for finger, rexec, rlogin, and so on. In addition, telnet attempts to an open port produced a successful packet acknowledgment preventing the “SYN” attack.

Issue

Data Privacy—Ensuring that data transmitted between the Proxy Server and the clients is secure and unreadable.

Feature

SSL Tunneling—The tunneling of the Secure Sockets Layer (SSL) protocol is enabled by default within the Proxy Server when a user is granted access to the Web Proxy. This feature provides for an SSL session between the server and the client computer. This is supported in a browser like Internet Explorer 3.0.

For information on securing Microsoft Proxy Server, refer to Appendix C—Microsoft Proxy Server Security Checklist and Appendix E—Suggested Baseline Security Configuration.

Test Case Approach

C&L evaluated Microsoft Proxy Server by creating a test environment, developing an objective test case approach, executing the test cases, and interpreting test case results.

The most significant component of the approach is the test cases, which focus on four test areas: Installation, Configuration, Function, and Penetration. Each test area contains tests designed to satisfy test area objectives. This section describes the test areas and objectives.

Test Case Findings Summary

A total of 15 test cases were run, in the four areas described below, during the testing of the Microsoft Proxy Server. These test cases show that Microsoft Proxy Server can be easily configured to a maximum level of security; however, creating the most secure Microsoft Proxy Server configuration requires thought and planning, as with any product installation. In addition, the penetration test cases using standard tools showed no vulnerabilities, but some unexpected TCP/IP ports were visible and would need to be disabled.

In summary, the results of the following test cases show that the Microsoft Proxy Server can provide a reasonable and practical level of security for a wide variety of installations.

Installation Tests

The objective of the installation test is to identify any security-related installation options, and evaluate the security implications of the installation options and overall installation procedure.

Configuration Tests

The objective of the configuration test area is to identify any security-related configuration options, and to evaluate security when Microsoft Proxy Server is configured with default, minimum, or maximum security settings.

Function Tests

The objective of the function test area is to evaluate Microsoft Proxy Server’s ability to provide proxy services and disallow traffic when certain security features are activated, and evaluate the logging functionality.

Penetration Tests

The objective of the penetration test area is to evaluate Microsoft Proxy Server’s external vulnerabilities. The penetration tests were designed to use a combination of standard Internet tools that determine vulnerabilities of common Internet-connected servers, in addition to special C&L methods and tools designed to exploit specific Internet vulnerabilities and Microsoft Proxy Server specific vulnerabilities (based on our understanding of how it was designed).

Appendix D—Output of ISS Safesuite Scans contains the actual output from one of the automated tools used during these tests.

The Interconnectivity Security Issues and Microsoft Proxy Server Security Features section of this document provides additional information along with the implications of the issues addressed in the Test Case Results sections.

Installation Test Case Results Summary

Test Case PROX-I-1

Objective

Assess security implications of Microsoft Proxy Server installation procedure and installation options.

Observations

The Microsoft Proxy Server installation procedure did not appear to reveal any serious security issues.

Issue

Careful configuration of the LAT is necessary for maximum security.

Description

The LAT is configured in the Local Address Table (“LAT”) Configuration window. This option requires basic knowledge of the internal network’s addresses. It is important to configure the LAT correctly because an address range greater than the internal network’s is unnecessary for Microsoft Proxy Server functionality and could produce security openings in the Proxy Server. Refer to the Interconnectivity Security Issues and Microsoft Proxy Server Security Features section of this document for additional information and the implications of this feature.

How Microsoft Proxy Server addresses this issue

The LAT can be constructed automatically using the addresses of the Proxy Server’s routing table or the standard private address ranges. This is accessible through the Construct Local Address Table window. Refer to Appendix E—Baseline Security Configuration for the recommended baseline implementation of this feature.

Issue

Accessibility of cached data to users on the internal network.

Description

Microsoft Proxy Server provides caching for HTTP resources accessed on the Internet from internal client stations. The Proxy Server cache is checked prior to all Internet data requests. Cached data is stored on disk. Certain users have access to the disk where the cache resides.

How Microsoft Proxy Server addresses this issue

A security feature of this caching is that HTTP-S pages and user-authenticated objects are not cached. This prevents one user from inadvertently viewing data that was issued to another user while in a secure mode. In addition, the cached data should be stored on a Windows NT NTFS partition, which will utilize Windows NT file security.

Configuration Test Case Results Summary

Test Case PROX-C-1

Objective

Identify and assess Microsoft Proxy Server default security configuration and assess security implications.

Observations

Issue

Internet Information Server Services may be running.

Description

One should also note that Internet Information Server (IIS) is installed when Windows NT Server Version 4.0 is installed. All IIS services (WWW, Gopher, and FTP) are started by default.

How Microsoft Proxy Server addresses this issue

The WWW IIS services are configured to prevent publishing to the Internet. For maximum security, the FTP and Gopher IIS services should be stopped. The Microsoft-provided Appendix C—Server Security Checklist discusses services.

Test Case PROX-C-2

Objective

Assess Microsoft Proxy Server configuration options security when set to a minimal (as close to none as possible) level of security.

Observations

Microsoft Proxy Server can be configured to a minimal level of security. Although not recommended, this level of security may be adequate for certain environments.

Issue

Microsoft Proxy Server can easily be configured to a minimal level of security.

Description

A minimal level of configurable security may include user-level access control disabled, logging disabled, and Internet Web publishing enabled. As noted in Test Case PROX-C-1, Microsoft Proxy Server does not configure to this minimal level of security by default. The administrator must configure Microsoft Proxy Server to these settings.

How Microsoft Proxy Server addresses this issue

The minimally secure configuration can easily be avoided through proper planning and completely understanding the features. The Microsoft provided Appendix C—Server Security Checklist and Appendix E—Baseline Security Configuration along with hard copy documentation and on-line help descriptions of the security features, are tools that can be used to plan and understand the features. The converse to this scenario is presented in Test Case PROX-C-3.

Test Case PROX-C-3

Objective

Assess Microsoft Proxy Server configuration options security when set to a maximum level of security.

Observations

Issue

Microsoft Proxy Server can be easily configured to a maximum level of security; however creating the most secure Microsoft Proxy Server configuration requires thought and planning.

Description

A maximum level of configurable security may include access control, verbose logging to files that are automatically created and saved on a daily basis, and Internet Web publishing disabled. As noted in Test Case PROX-C-1, Microsoft Proxy Server does not configure to this maximum level of security by default. The administrator must configure access control and logging.

How Microsoft Proxy Server addresses this issue

The Administrator must select the correct level of access without denying needed services. The maximum secure configuration can be accomplished through proper planning and completely understanding the features. The Microsoft-provided Appendix C—Server Security Checklist and Appendix E—Baseline Security Configuration along with hard copy documentation and on-line help descriptions of the security features, are tools that can be used to plan and understand the features. The converse to this scenario is presented in Test Case PROX-C-2.

Test Case PROX-C-4

Objective

Observational requirements

Observations

Issue

It is possible to configure Microsoft Proxy Server to forward IP traffic between its two network interface cards.

Description

The IP Forwarding function becomes active when the IP Forwarding checkbox is selected before or after the Microsoft Proxy Server installation. When Microsoft Proxy Server is installed, there is no warning indicating IP Forwarding is active. Risk is incurred for administrators who may select IP Forwarding with Microsoft Proxy Server installed without understanding the consequences.

How Microsoft Proxy Server addresses this issue

This issue can be addressed procedurally. The administrator must be attentive to the status of the IP Forwarding checkbox.

Function Test Case Results Summary

Test Case PROX-F-1

Objective

Determine the security impact of configuring the internal (private) network for addresses that are being used on the external (public) network. This is the basis for a spoofing attack if Microsoft Proxy Server does not respond properly in such a configuration.

Observations

Test Case PROX-F-2

Objective

Test the level of access between internal and external networks when the internal client does not have Microsoft Proxy Server client software installed or if both the external and internal machines run a non-Microsoft Proxy Server–supported operating system.

Observations

Microsoft Proxy Server successfully prevented non-proxy clients from using services beyond the Proxy Server.

Test Case PROX-F-3

Objective

Test the functionality of Microsoft Proxy Server’s logging mechanism.

Observations

Issue

Configuration of the logging feature.

Description

The logging processes gather a significant amount of information about any connected process. This makes the logging facility a valuable tool for tracking system usage and monitoring individual user activity. Without logging, the ability of the system administrator to track the system usage and to prevent unauthorized activity is severely limited. Operating the Microsoft Proxy Server without logging should be considered insecure.

How Microsoft Proxy Server addresses this issue

As indicated in Test Case PROX-C-1, regular logging to a new file on a daily basis is selected by default. This configuration may be adequate for certain environments. Test Case PROX-C-3 and Appendix E—Baseline Security Configuration provide information on the recommended settings for the logging feature.

Penetration Test Case Results Summary

Test Case PROX-P-1

Objective

To determine which IP addresses respond to an ICMP echo (ping) request on the various sub-nets where the Microsoft Proxy Server is attached. The primary objective is to determine which IP addresses answer to untrusted systems connected to the external network.

Observations

Issue

The internal adapter of machine PROXY-1 (the dual-homed Proxy Server) unexpectedly answered the echo request from an external system.

Description

When an echo request is sent to a Microsoft Proxy Server with a destination address of the internal network adapter, the internal adapter will respond. If the response of the internal adapter address is detected by an outside entity, it could aid in designing a more focused attack on the internal network. Although designing a more focused attack may not be directly possible through the Microsoft Proxy Server, the information could be used if another entry point was also identified (i.e., a non-secured dial-in SLIP or PPP line), and later used to penetrate the network.

How Microsoft Proxy Server addresses this issue

Microsoft Proxy Server does not currently address this issue. However, Microsoft Proxy Server prevents visibility and access to the other systems connected to that adapter’s internal network.

Test Case PROX-P-2

Objective

To determine which TCP/IP ports a Windows NT Server will answer to when running the Microsoft Proxy Server using the default configuration options.

Observations

Issue

The strobe utility detected seven TCP ports answering to external network connections. Three of these were expected: FTP, HTTP, and Gopher. Four of these were unexpected: NI FTP (port 47), Location Server (port 135), NetBIOS (port 139), and Port 1028.

Description

Each of the TCP/IP service ports identified by “Strobe” represents a possible avenue of external attack by other TCP/IP service-specific penetration tools and techniques. In the penetration test cases that follow this test, each of the significant responding ports are further tested for security vulnerabilities.

How Microsoft Proxy Server addresses this issue

This issue can be addressed procedurally. Many of the identified ports can be disabled. The Microsoft-provided Appendix C—Server Security Checklist provides guidance on disabling ports 47, 139, and 1028 on the external adapter of a Windows NT Server running Microsoft Proxy Server. FTP port 21 and gopher port 70 can be disabled using the Internet Information Server management tool. Port 135 cannot currently be disabled. The RPC service will unconditionally listen on port 135 on all interfaces, and relies on Windows NT RPC authentication for security; however, our testing did not show any vulnerability related specifically to this issue.

Test Case PROX-P-3

Objective

To determine if the Microsoft Proxy Server is susceptible to any of the common Internet weaknesses identified by the Internet Security Scanner (ISS) public domain security analyzer/tool.

The ISS utility will analyze all target systems for the following Internet risks and/or vulnerabilities:

Observations

Test Case PROX-P-4

Objective

To determine if the Microsoft Proxy Server is susceptible to any of the common Internet weaknesses identified by the Satan public domain security analyzer/tool.

The Satan utility will analyze all target systems for the following additional (over ISS) Internet risks and/or vulnerabilities:

Observations

Issue

The only issue reported by the Satan utility was its ability to identify that the Proxy Server was offering an Anonymous FTP service.

Description

The Anonymous FTP service is an optional part of the Windows NT Server that was configured by default prior to the installation of the Proxy Server. The FTP service is installed as part of the Internet Information Server. The presence of Anonymous FTP service represents a possible avenue of external attack if misconfigured. Test Case PROX-P-5 tests this for security vulnerabilities within the FTP service.

How Microsoft Proxy Server addresses this issue

This issue can be addressed procedurally. FTP port 21 can be disabled using the Internet Information Server management tool.

Test Case PROX-P-5

Objective

To attempt manual anonymous FTP penetration attempts.

Observations

Issue

The FTP Server allowed the external system to gain a successful anonymous login.

Description

The Anonymous FTP service is an optional part of the Windows NT Server that was configured by default prior to the installation of the Proxy Server. The FTP service is installed as part of the Internet Information Server. The presence of Anonymous FTP service represents a possible avenue of external attack.

How Microsoft Proxy Server addresses this issue

The coexistence of a properly configured (which is the default) FTP server in the same system with the Microsoft Proxy Server does not appear to present any additional vulnerabilities to the proxy service, Windows NT operating system, or the internal network behind the server. The FTP server allowed the external system to gain a successful anonymous login. The default-configured FTP server could not be compromised through standard manual penetration techniques as listed in this test case. In addition, if not required, FTP port 21 can be disabled.

Test Case PROX-P-6

Objective

To attempt to exploit the fact that the Microsoft Proxy Server allows connections to the unused TCP/IP port 47 (as a previous run of strobe detected). C&L focused on this port because it is the only additional port that started accepting TCP/IP connection requests after the Proxy Server was installed and is identified by Microsoft as a port that can be used to administrate the Proxy Server.

Observations

Issue

Microsoft Proxy Server allows connections to port 47.

Description

The ability to connect to port 47 represents a possible avenue of external attack by more service-specific penetration tools and techniques.

How Microsoft Proxy Server addresses this issue

This issue can be addressed procedurally. Port 47 can be disabled. The Microsoft-provided Appendix C—Server Security Checklist provides guidance on disabling port 47 on the external adapter of a Windows NT server running Microsoft Proxy Server. In addition, there seem to be no security implications in Microsoft Proxy Server’s allowing connections to port 47. A denial of service attack does not appear to be effective against this open port.

Test Case PROX-P-7

Objective

Observations

Note   The above two tests do not apply to any of the services offered by or answered to by Microsoft Proxy Server. Therefore, their exclusion should have no impact on the overall test results.

Issue

The only issue raised by the ISS tool was that the Proxy Server allowed trace routing packets to be passed between its two network interfaces.

Description

Trace routing is when a router allows packet routing information to be echoed through to both attached networks. This information can be helpful to attackers in determining internal network addressing schemes when looking to exploit weaknesses on other systems connected to the internal network. This issue was also identified in Test Case PROX-P-1 when the Proxy Server allowed its internal network adapter to respond to a general echo (ping) request. This issue was noted because the Proxy Server’s internal network adapter answered.

How Microsoft Proxy Server addresses this issue

Microsoft Proxy Server does not currently address this issue. However, as noted in Test Case PROX-P-1, Microsoft Proxy Server prevents visibility and access to the other systems connected to the internal adapter’s network. This seems to have no apparent security implication.

Appendix A—Test Specification

The following table presents the test lab equipment specification and configuration(s):

Test Lab SPEC-1

Computer Name Workgroup
Network Protocol


Operating System and Hardware Configuration
PROXY-1

PROXY-0

TCP/IP Windows NT Server version 4.0

Microsoft Proxy Server

Intel® Pentium class CPU (133 -> 166 MHz)

32 megabytes of RAM

One 1.2 gigabyte hard drive

Two Ethernet adapters (Windows NT compatible)

Internal 0x300, IRQ 10, 10 base T

External 0x270, IRQ 7, 10 base T

Dual/quad speed CD-ROM Drive

3.5" floppy drive

15" SVGA color monitor

IR-1

WG-1

NetBEUI

TCP/IP

Windows NT Workstation 4.0

Windows95

SCO UNIX

Microsoft Proxy Server client

Intel Pentium class CPU (133 -> 166 MHz)

32 megabytes of RAM

Two 1.2 gigabyte hard drive

One Ethernet adapter (Windows NT and Win3.1/Windows 95 compatible)

28.8 Kbps modem

Dual/quad speed CD-ROM drive

3.5" floppy drive

15" SVGA color monitor

PPTP-1

ROUTE-0

NetBEUI

TCP/IP

Windows NT Server version 4.0

Microsoft Proxy Server client

Intel Pentium class CPU (133 -> 166 MHz)

32 megabytes of RAM

One 1.2 gigabyte hard drive

Two Ethernet adapters (Windows NT Compatible)

28.8 Kbps modem

Dual/quad speed CD-ROM drive

3.5" floppy drive

15" SVGA color monitor

ER-1

WG-2

NetBEUI

TCP/IP

Windows NT Server version 4.0

Intel Pentium class CPU (133 -> 166 MHz)

32 megabytes of RAM

One 1.2 gigabyte hard drive partitioned

One Ethernet adapters (Windows NT and SCO UNIX compatible)

Dual/quad speed CD-ROM drive

3.5" floppy drive

15" SVGA color monitor

NT3.51-BOX

TEST

TCP/IP Windows NT Server 3.51

Microsoft Proxy Server client

Intel 486 class CPU (66 MHz)

32 megabytes of RAM

One 1.2 gigabyte hard drive

One Ethernet adapters (Windows NT Compatible)

Dual/quad speed CD-ROM drive

3.5" floppy drive

15" SVGA color monitor

AIX-BOX TCP/IP IBM RS/6000 model 530

32 megabytes of RAM

One 1.2 gigabyte hard drive

One Ethernet adapter

CD-ROM drive

3.5" floppy drive

19" SVGA color monitor

AIX v3.2.5


Miscellaneous hardware

Appendix B—Test Lab Network Diagrams

The following diagrams present the multiple test lab configurations used for testing. These diagrams detail computer names, IP addresses, default gateways, subnet masks, peripheral equipment, and network connections:

Test Lab DIAG-1

Test Lab DIAG-2

Test Lab DIAG-3

Test Lab DIAG-4

Appendix C—Server Security Checklist

Connecting computers to the Internet provides for some very powerful and useful scenarios. It becomes possible to communicate with millions of people and computers worldwide using the TCP/IP protocols. This broad flexibility imposes a degree of risk: Not only can you communicate with people and systems using the protocols that you choose, but it is also possible for users to attempt to initiate communication with your systems.

Reducing Security Risks

The following list should be reviewed to learn how to reduce security risks.

If your private network runs TCP/IP, the Server’s Enable IP Forwarding check box in the Network application should not be selected.

Clearing the Enable IP Forwarding check box prevents unauthorized IP packets from infiltrating your network. The Enable IP Forwarding check box is located in the Microsoft TCP/IP Properties dialog box. Access this through the Network application in Control Panel.

To disable IP forwarding on Windows NT Server version 4.0:

  1. From the Start menu, select Settings, and then click Control Panel.

  2. In Control Panel, double-click the Network icon.

  3. In the Network dialog box, click the Protocols tab, select TCP/IP Protocol, and then click Properties.

  4. In the Microsoft TCP/IP Properties dialog box, click Routing.

  5. Make sure the check box for Enable IP Forwarding is cleared.

  6. Click OK, then click OK again.

Warning   If the Windows NT Remote Access Service (RAS) is installed on your gateway after Microsoft Proxy Server is installed, IP forwarding will be enabled. You must disable IP forwarding after installing RAS.

Use NTFS volumes

The Windows NT File System (NTFS) provides security and access control for your data files. By using NTFS, you can limit access to portions of your file system for specific users and services.

Run only the services that you need

The fewer services you are running on your system, the less likely it is that a mistake will be made in administration that could be exploited. Use the Services application in Control Panel to disable any services not absolutely necessary on your system.

Unbind unnecessary services from your Internet adapter cards

Use the Bindings feature in the Network application in Control Panel to unbind any unnecessary services from any network adapter cards connected to the Internet.

For example, you might use the Server service to upload new images and documents from computers in your internal network, but you might not want users to have direct access to the Server service from the Internet. If you need to use the Server service on your private network, the Server service binding to any network adapter cards connected to the Internet should be disabled.

You can use the Windows NT Server service over the Internet; however, you should fully understand the security implications and comply with Windows NT Server licensing requirements. (When you are using the Windows NT Server service you are using Microsoft networking—that is, the Server Message Block [SMB] protocol—and all Windows NT Server licensing requirements still apply.)

The FTP Server service included with Windows NT should also be disabled or configured to ensure adequate security.

Check permissions set on network shares

If you are running the Server service on your Internet adapter cards, be sure to double-check the permissions set on the shares you have created on the system. It is also wise to double-check the permissions set on the files contained in the shares’ directories to ensure that you have set them appropriately.

Enable auditing

You can enable auditing of NTFS files and directories on Windows NT Server. This is done using Windows Explorer and is a useful mechanism to ensure that you have set the appropriate permissions on your shares.

Limit the membership of the Administrator group

By limiting the members of the Administrator group, you limit the number of users who might choose bad passwords.

Enforce strict account policies

User Manager for Domains provides configuration options called security policies, such as one that allows a system administrator to specify how quickly account passwords expire (forcing users to regularly change passwords), and another that determines how many bad logon attempts will be tolerated before a user is locked out. Use the User Manager for Domains security policies to configure the Server against exhaustive or random password attacks.

Choose good password

Although this may seem obvious, a stolen or easily guessed password is the best opportunity for someone to gain access to your system. Make sure that all users on the system, especially those with administrative rights, have difficult-to-guess passwords. In particular make sure to select a good administrator password (long, mixed-case, alphanumeric password) and set the appropriate account policies. Passwords can be set using Windows NT User Manager for Domains.

Disable certain external TCP/IP ports

Certain listening ports such as 47, 137, 138, 139, and 1028 can be disabled. The following procedures can be used to disable these ports.

Disabling port 47

This port is used by the Proxy Server administrator’s tool (over TCP/IP with RPC calls).

Procedure:

  1. As the Administrator, run the regedt32.exe tool.

  2. Select the HKEY_LOCAL_MACHINE window.

  3. Expand the System key, then the Current Control Set key, then the Services key, then the W3Proxy key, and finally the Parameters key.

  4. Select the RpcBindings value and edit its value from 7 to 6.

  5. Close the local registry using the FILE drop-down menu.

  6. Shut down and restart the server.

Implications:

None

Disabling ports 137 through 139

This procedure is used to disable Windows NT TCP/IP from listening on ports 137, 138, 139:

Procedure:

  1. Open Control Panel, Network, Bindings

  2. Select to show bindings for all adapters

  3. Disable entire WINS client* (TCP/IP) for the external network interface card.

Implications:

NetBIOS will not be accessible on the external (Internet) network interface.

Disabling port 102x

Ports 1024 through 1029 are allocated by Windows NT for RPC listen TCP/IP services. This procedure allows it to be configured to listen only on the internal IP interface, and as a result, these ports will no longer be visible to the Internet.

Procedure:

  1. As the Administrator, run the regedt32 tool.

  2. Select the HKEY_LOCAL_MACHINE window.

  3. Expand the System key, then the Current Control Set key, then the Services key.

  4. Look for the entry for your internal network adapter and record the key name used (for example, Elnk1)

  5. Create a new key of RPC, then expand that key.

  6. Create a new key of Linkage, then expand that key.

  7. Create a new key of Bind (as type REG_MULTI_SZ), then expand that key.

  8. You will now be in HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Rpc\Linkage\Bind

  9. Create a new value equal to the name of your internal adapter identified in Step 4 (no actual value needs to be assigned to it)

Implications:

RPC will only bind to the adapters listed in the HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Rpc\Linkage\Bind.

Install all service packs

All service packs for Windows NT Server version 4.0 and Microsoft Proxy Server should be installed. This will assure that security-related enhancements are incorporated in Microsoft Proxy Server.

Appendix D—Output of ISS SafeSuite Scans (Abbreviated)

Internet Security Scanner ©1994–1996

ISS SafeSuite V4.0.3

By Internet Security Systems, Inc.

Analysis Report

Summary Report of Vulnerabilities

Summary Information

    Hosts Scanned:  1

    Hosts Active:  1

    Hosts Inactive:  0

    Start Time:  Thu Oct. 3 12:27:53 1996

    End Time:  Thu Oct. 3 12:33:10 1996

    Total Time:  5 minutes 17 seconds

Scan Completed Normally

Total Number of Vulnerability Risks:  1

Average Number of Vulnerability Risks per Active Hosts:  1.00

Maximum License Number Reached:  0

Out of Range:  0

Open Ports via Socks Service [High Risk]:  0

Open Defaults found through Telnet [High Risk]:  0

Open Defaults found through Rexec [High Risk]:  0

Open Defaults found through FTP [High Risk]:  0

Open Defaults found through POP3 [High Risk]:  0

Accounts accessible through Rsh [High Risk]:  NA

X Check [High Risk]:  NA

Uudecode Alias in Sendmail [High Risk]: 0

Remote Execution Hole in Sendmail [High Risk]:  0

Wizard Backdoor in Sendmail [High Risk]:  0

Remote Execution Hole through Identd [High Risk]:  0

FTP Site Exec Vulnerable [High Risk]:  0

Rlogin-froot Vulnerability [High Risk]:  0

Rsh Vulnerable in hosts.equiv [High Risk]:  0

Rexd [High Risk]:  0

HTTP (WWW server) port active [High Risk]:  0

Rsh Vulnerable through TCP Seq Prediction Spoofing [High Risk]:  NA

Rsh Null Vulnerable [High Risk]:  0

Rlogin Vulnerable through TCP Seq Prediction Spoofing:  0

Admind [High Risk]:  0

Mountable [High Risk]:  0

Mountable via Portmapper [High Risk]:  0

NFS Mountable via Ultrix Remount Bug [High Risk]:  0

NFS Writable [High Risk]:  0

NFS UID Vulnerability [High Risk]:  0

NFS CD Vulnerability [High Risk]:  0

NFS MKNOD Vulnerability [High Risk]:  0

NFS Guess Vulnerability [High Risk]:  0

NFS Access Files [Medium Risk]:  0

Dynamic Linker Telnet Vulnerability [High Risk]:  0

Netbios SMB Easy Password [High Risk]:  0

Open Defaults found on Cisco device [High Risk]:  0

Open Administrative Account found on Cisco device [High Risk]:  0

Remote Execution Hole through Syslog Buffer Overflow [High Risk]:  0

RPC Statd file creation and removal vulnerability [High Risk]:  0

HTTP Proxy Penetrated [High Risk]:  0

FTP Proxy Penetrated [High Risk]:  NA

HTTP (WWW server) port active [High Risk]:  0

Exploit of phf program in /cgi-bin executed an arbitrary command [High Risk]:  0

Server indicated presence of potentially exploitable program in /cgi-bin [High Risk]:  0

A CGI program executed an arbitrary command [High Risk]:  0

Server allowed exploit of .bat and .cmd bug [High Risk]:  0

A password-protected WWW resource was accessed by brute force [High Risk]:  0

Server returned a file listing for a directory that had no index [High Risk]:  0

Open Defaults found through Telnet on TIS firewall [High Risk]:  0

Open Defaults found through Telnet on Checkpoint Firewall [High Risk]:  0

Open Defaults found through FTP on Catapult [High Risk]:  0

Open Defaults found through Telnet on Raptor firewall [High Risk]:  0

Files Obtained [Medium Risk]:  0

Routed service active [Medium Risk]:  0

UUCP available [Medium Risk]:  0

Host susceptible to UDP bomb packet [Medium Risk]:  0

Finger Bomb [Medium Risk]:  0

TCP Sequence Predictable [Medium Risk]:  0

Anonymous FTP with writable directories [Medium Risk]:  0

Wall Daemon [Medium Risk]:  0

Selection_Svc Vulnerable [Medium Risk]:  0

TFTP [Medium Risk]:  0

TFTP Output [Medium Risk]:  0

NIS passwd via TCP [Medium Risk]:  0

NIS passwd via UDP [Medium Risk]:  0

Domain names and NIS Server [Medium Risk]:  0

NIS Maps [Low Risk]:  0

Anonymous FTP [Low Risk]:  0

Netbios SMB Root Share [Medium Risk]:  0

Netbios SMB Dot Dot Bug [Medium Risk]:  0

Netbios SMB NT Dot Dot Bug [Medium Risk]:  0

Chargen Service [Medium Risk]: 0

Echo Service [Medium Risk]:  0

Windows 95 Password Cache Files [Medium Risk]:  0

RIP tables modified [Medium Risk]:  0

Sync Storm [Medium Risk]:  0

Syslog Flood [Medium Risk]:  0

Data Flood [Medium Risk]:  0

Exploit of test-cgi script returned listing of /cgi-bin [Medium Risk]:  0

WWW server returned a listing of the directory above ServerRoot [Medium Risk]:  0

Netstat [Low Risk]:  0

Sysstat [Low Risk]:  0

Bootparam [Low Risk]:  0

BootparamDom [Low Risk]:  0

Finger [Low Risk]:  0

Rusers Output [Low Risk]:  0

Finger Output [Low Risk]:  0

SNMP Public Information [Low Risk]:  0

Verify Account Information about Users with Sendmail [Low Risk]:  0

Expand Account Information about Users with Sendmail [Low Risk]:  0

NNTP Daemon [Low Risk]:  0

Trace Routing of Packets:  1

Open/Close Connection Flood [Low Risk]:  0

DNS Open Connection Flood [Low Risk]:  0

RWHO Daemon Overflow [Low Risk]:  0

========== End of Report ==========

Internet Security Scanner ©1994-1996

ISS SafeSuite V4.0.3

By Internet Security Systems, Inc.

Analysis Report

Report by Hosts

Summary Information

    Hosts Scanned:  1

    Hosts Active:   1

    Hosts Inactive: 0

    Start Time: Thu Oct. 3 12:27:53 1996

    End Time  : Thu Oct. 3 12:33:10 1996

    Total Time: 5 minutes 17 seconds

    Scan Completed Normally

IP Address:  204.142.190.161

Hostname:  proxy1e

    Host is Active

    Host Types:

    Services:

        Open Port

        Port 19 not accessible

        Port 139  ("netbios-ssn" service) opened.

        Port 70  ("gopher" service) opened.

        Port 21  ("ftp" service) opened.

        Port 80  ("httpd" service) opened.

        Netbios Name Table

        Dump of netbios names that were found during scanning

        PROXY1    (type=0x0) <ACTIVE> B

        INet~Services   (type=0x1c) <ACTIVE> <GROUP> B

        IS~PROXY1 (type=0x0) <ACTIVE> B

        WORKGROUP     (type=0x0) <ACTIVE> <GROUP> B

        PROXY1     (type=0x20) <ACTIVE> B

        PROXY1     (type=0x3) <ACTIVE> B

        WORKGROUP     (type=0x1e) <ACTIVE> <GROUP> B

        WORKGROUP     (type=0x1d) <ACTIVE> B

        ____MSBROWSE___ (type=0x1) <ACTIVE> <GROUP> B

        PROXY1żżżżżżżżż (type=0xbf) <ACTIVE> B

        Master Browser Name: WORKGROUP

        Station Name: PROXY1

        SMB Service Name: PROXY1

    Vulnerabilities:

        Trace Routing of Packets

        Traceroute allows you to determine the path a packet takes

        between two hosts. This information allows someone to

        determine network topology  and routers on the network.

        204.142.190.161

Hosts Trusted by scanned Hosts

No trusted hosts found.

Appendix E—Suggested Baseline Security Configuration

The following tables present a suggested baseline security configuration for WinSock and Web Proxy Services.

WinSock Proxy Service Suggested Baseline Security Configuration

Window/Configuration Option Baseline Security Configuration
Service Tab Limit the configure of the LAT to the range of addresses in the internal network.
Permissions Tab Enable access control.

Grant access to protocols necessary for operating your business.

Logging Tab Logging enabled.

Regular logging selected.

Log to File selected.

Automatically open new log (Daily) selected.

Filtering Tab If your company has a filtering policy, it can be applied through the Properties/Filtering feature.

Web Proxy Service Suggested Baseline Security Configuration

Window/Configuration Option Baseline Security Configuration
Service Tab Limit the configure of the LAT to the range of addresses in the internal network.

Internet publishing not enabled unless necessary.

Permissions Tab Access control enabled for all protocols.

Access granted to selected users for all protocols.

Logging Tab Logging enabled.

Regular logging selected.

Log to File selected.

Automatically open new log (Daily) selected.

Filtering Tab If your company has a filtering policy, it can be applied through the Properties/Filtering feature

Note   Microsoft Proxy Server and all files should be installed on a secured NTFS partition separate from the Windows NT Server Version 4.0 operating system.

Appendix F1—Detailed Installation Test Case Results

Test Case PROX-I-1

Objective

Assess security implications of Microsoft Proxy Server installation procedure and installation options.

Configuration

Procedure

  1. Install Microsoft Proxy Server using the standard product installation steps.

  2. Select all product defaults or recommended settings during installation.

  3. Identify installation steps and options.

  4. Record observations.

  5. Assess security implications of installation procedure installation options.

  6. Document the results.

Observational requirements

Observations

The Microsoft Proxy Server installation procedure did not appear to reveal any serious security issues.

Issue

Careful configuration of the LAT is necessary for maximum security.

Description

The LAT is configured in the Local Address Table (“LAT”) Configuration window. This option requires basic knowledge of the internal network’s addresses. It is important to configure the LAT correctly because an address range greater than the internal network’s is unnecessary for Microsoft Proxy Server functionality and could cause security openings in the Proxy Server. Refer to the Interconnectivity Security Issues and Microsoft Proxy Server Security Features section of this document for additional information and the implications of this feature.

How Microsoft Proxy Server addresses this issue

The LAT can be constructed automatically using the addresses of the Proxy Server’s routing table or the standard private address ranges. This is accessible through the Construct Local Address Table window. Refer to Appendix E—Baseline Security Configuration for the recommended baseline implementation of this feature.

Issue

Accessibility of cached data to users on the internal network.

Description

Microsoft Proxy Server provides caching for HTTP resources accessed on the Internet from internal client stations. The Proxy Server cache is checked prior to all Internet data requests. Cached data is stored on disk. Certain users have access to the disk where the cache resides.

How Microsoft Proxy Server addresses this issue

A security feature of this caching is that HTTP-S pages and user-authenticated objects are not cached. This prevents one user from inadvertently viewing data that was issued to another user while in a secure mode. In addition, the cached data should be stored on a Windows NT NTFS partition that will utilize Windows NT file security.

Appendix F2—Detailed Configuration Test Case Results

Test Case PROX-C-1

Objective

Identify and assess Microsoft Proxy Server default security configuration and assess security implications.

Configuration

Procedure

  1. Identify Microsoft Proxy Server default configuration.

  2. Record default configuration settings and any observations.

  3. Assess security implications of the default configuration settings.

  4. Document the results.

Observational requirements

All security related settings.

Observations

Issue

Microsoft Proxy Server can easily be configured to a minimal level of security.

Description

One should also note that Internet Information Server (IIS) is installed when Windows NT Server version 4.0 is installed. All IIS services (WWW, Gopher, and FTP) are started by default.

How Microsoft Proxy Server addresses this issue

The WWW IIS services are configured to prevent publishing to the Internet. For maximum security, the FTP and Gopher IIS services should be stopped.

The Microsoft-provided Appendix C—Server Security Checklist and Appendix E—Baseline Security Configuration, along with hard copy documentation and on-line help descriptions of the security features, are tools which can be used to plan and understand the features. The converse to this scenario is presented in Test Case PROX-C-3.

Test PROX-C-1 WinSock Proxy Observation Table

Window/Configuration Option Security Related Observations
Microsoft Internet Service Manager The WinSock Proxy Service was in the running state by default after installation.
WinSock Proxy Services Properties/ Service The LAT can be accessed and subsequently edited by selecting the “Edit Local Address Table (LAT)” button, by administrators only.
WinSock Proxy Service Properties/Permissions Access control can be enabled through a check box.

Access control was enabled for all protocols by default.

Access was not granted to anyone for all protocols by default.

WinSock Proxy Service Properties/Logging Logging can be selected via a checkbox.

Logging was enabled by default.

Regular logging or verbose logging can be selected through a toggle.

Regular logging was selected by default.

Logging can be to a file or a SQL/ODBC Database.

Log to File was selected.

The frequency for opening a new log can be set through a toggle to Daily, Weekly, Monthly, or when the file size reaches a specific size.

Automatically open new log (Daily) was selected by default.

The default log file directory was C:\WINNT\System32\wsplogs.


Test PROX-C-1 Web Proxy Observation Table

Window/Configuration Option Security Related Observations
Microsoft Internet Service Manager The Web Proxy Service was in the running state by default after installation.
Web Proxy Services Properties/ Service Internet publishing can be enabled through this window.

Internet publishing is not enabled by default.

The LAT can be accessed and subsequently edited by selecting the “Edit Local Address Table (LAT)” button.

Web Proxy Service Properties/Permissions Access control can be enabled through a checkbox.

Access control was enabled for all protocols by default.

Access was not granted to anyone for all protocols by default.

Caching Caching can be enabled through a checkbox.

Caching was enabled by default.

Cache options are presented.

Web Proxy Service Properties/Logging Logging can be selected via a checkbox.

Logging was enabled by default.

Regular logging or verbose logging can be selected through a toggle.

Regular logging was selected by default.

Logging can be to a file or a SQL/ODBC Database.

Log to File was selected.

The frequency for opening a new log can be set through a toggle to Daily, Weekly, Monthly, or when the file size reaches a specific size.

Automatically open new log (Daily) was selected by default.

The default log file directory was C:\WINNT\System32\w3plogs.


Test Case PROX-C-2

Objective

Assess Microsoft Proxy Server configuration options security when set to a minimal (as close to none as possible) level of security.

Configuration

Procedure

  1. Perform test case PROX-C-1.

  2. Change default configuration settings to a minimal (as close to none as possible) level of security.

  3. Record configuration settings and any observations.

  4. Assess security implications of the selected configuration settings.

  5. Document the results.

Observational requirements

Observations

Microsoft Proxy Server can be configured to a minimal level of security. Although not recommended, this level of security may be adequate for certain environments.

Issue

Microsoft Proxy Server can easily be configured to a minimal level of security.

Description

A minimal level of configurable security may include user-level access control disabled, logging disabled, and Internet Web publishing enabled. As noted in Test Case PROX-C-1, Microsoft Proxy Server does not configure to this minimal level of security by default. The administrator must configure Microsoft Proxy Server to these settings.

How Microsoft Proxy Server addresses this issue

The minimally secure configuration can easily be avoided through proper planning and completely understanding the features. The Microsoft-provided Appendix C—Server Security Checklist and Appendix E—Baseline Security Configuration, along with hard copy documentation and on-line help descriptions of the security features, are tools that can be used to plan and understand the features. The converse to this scenario is presented in Test Case PROX-C-3.

Test PROX-C-2 WinSock Proxy Observation Table

Window/Configuration Option Security-Related Observations
WinSock Proxy Service Properties/Permissions Default Setting:

Access control enabled for all protocols, no permissions granted.

Minimally Secure Setting:

Access control not selected.

WinSock Proxy Service Properties/Logging Default Setting:

Logging enabled.

Regular logging selected.

Log to File selected.

Automatically open new log (Daily) selected.

Minimally Secure Setting:

Logging not enabled.


Test PROX-C-2 Web Proxy Observation Table

Window/Configuration Option Security-Related Observations
Web Proxy Services Properties/ Service Default Setting:

Internet publishing not enabled.

Minimally Secure Setting:

Internet publishing enabled.

Web Proxy Service Properties/Permissions Default Setting:

Access control enabled for all protocols.

Access not granted to anyone for all protocols.

Minimally Secure Setting:

Access control not selected.

Web Proxy Service Properties/Logging Default Setting:

Logging enabled.

Regular logging selected.

Log to File selected.

Automatically open new log (Daily) selected.

Minimally Secure Setting:

Logging not enabled.


Test Case PROX-C-3

Objective

Assess Microsoft Proxy Server configuration options security when set to a maximum level of security.

Configuration

Procedure

  1. Perform test case PROX-C-1.

  2. Change default configuration settings to maximum level of security.

  3. Record configuration settings and any observations.

  4. Assess security implications of the selected configuration settings.

  5. Document the results.

Observational requirements

Observations

Issue

Microsoft Proxy Server can be easily configured to a maximum level of security; however, creating the most secure Microsoft Proxy Server configuration requires thought and planning.

Description

A maximum level of configurable security may include access control, verbose logging to files which are automatically created and saved on a daily basis, and Internet Web publishing disabled. As noted in Test Case PROX-C-1, Microsoft Proxy Server does not configure to this maximum level of security by default. The administrator must configure access control and logging.

How Microsoft Proxy Server addresses this issue

The Administrator must select the correct level of access without denying needed services. The maximum secure configuration can be accomplished through proper planning and completely understanding the features. The Microsoft-provided Appendix C—Server Security Checklist and Appendix E—Baseline Security Configuration, along with hard copy documentation and on-line help descriptions of the security features, are tools that can be used to plan and understand the features. The converse to this scenario is presented in Test Case PROX-C-2.

Test PROX-C-3 WinSock Proxy Observation Table

Window/Configuration Option Security-Related Observations
WinSock Proxy Service Properties/Permissions Default Setting:

Access control enabled for all protocols.

Maximally Secure Setting:

Access control selected.

Grant access to selective users for each protocol.

WinSock Proxy Service Properties/Logging Default Setting:

Logging enabled.

Regular logging selected.

Log to File selected.

Automatically open new log (Daily) selected.

Maximally Secure Setting:

Logging enabled.

Verbose logging selected.

Log to File selected.

Automatically open new log (Daily) selected.


Test PROX-C-3 Web Proxy Observation Table

Window/Configuration Option Security-Related Observations
Web Proxy Services Properties/ Service Default Setting:

Internet publishing not enabled.

Maximally Secure Setting:

Internet publishing not enabled.

Web Proxy Service Properties/Permissions Default Setting:

Access control enabled for all protocols.

Access not granted to anyone for all protocols.

Maximally Secure Setting:

Access control enabled for all protocols.

Access granted to selected users for all protocols.

Web Proxy Service Properties/Logging Default Setting:

Logging enabled.

Regular logging selected.

Log to File selected.

Automatically open new log (Daily) selected.

Maximally Secure Setting:

Logging enabled.

Verbose logging selected.

Log to File selected.

Automatically open new log (Daily) selected.


Test Case PROX-C-4

Objective

Configuration

Procedure

  1. Install Windows NT 4.x Operating System selecting all defaults relating the TCP/IP networking services and security. Select IP addresses per Test Lab DIAG-3.

  2. Document the state of the IP Forwarding checkbox.

  3. Ping PROXY-1 internal IP card 204.142.190.130 from IR-1.

  4. Ping PROXY-1 external IP card 204.142.190.161 from IR-1.

  5. Ping PPTP-1 internal card 204.142.190.162 from IR-1.

  6. Ping PROXY-1 external IP card 204.142.190.161 from PPTP-1.

  7. Ping PROXY-1 internal IP card 204.142.190.130 from PPTP-1.

  8. Ping IR-1 IP card 204.142.190.129 from PPTP-1.

  9. Install Microsoft Proxy Server using the standard product installation steps with all default or recommended settings.

  10. Ping PROXY-1 internal IP card 204.142.190.130 from IR-1.

  11. Ping PROXY-1 external IP card 204.142.190.161 from IR-1.

  12. Ping PPTP-1 internal card 204.142.190.162 from IR-1.

  13. Ping PROXY-1 external IP card 204.142.190.161 from PPTP-1.

  14. Ping PROXY-1 internal IP card 204.142.190.130 from PPTP-1.

  15. Ping IR-1 IP card 204.142.190.129 from PPTP-1.

  16. Select IP Forwarding.

  17. De-install Microsoft Proxy Server.

  18. Re-install Microsoft Proxy Server using the standard product installation steps with all default or recommended settings.

  19. Ping PROXY-1 internal IP card 204.142.190.130 from IR-1.

  20. Ping PROXY-1 external IP card 204.142.190.161 from IR-1.

  21. Ping PPTP-1 internal card 204.142.190.162 from IR-1.

  22. Ping PROXY-1 external IP card 204.142.190.161 from PPTP-1.

  23. Ping PROXY-1 internal IP card 204.142.190.130 from PPTP-1.

  24. Ping IR-1 IP card 204.142.190.129 from PPTP-1.

  25. Document the results.

Observational Requirements

Observations

Issue

It is possible to configure Microsoft Proxy Server to forward IP traffic between its two network interface cards.

Description

The IP Forwarding function becomes active when the IP Forwarding checkbox is selected pre-or post the Microsoft Proxy Server installation. When Microsoft Proxy Server is installed, there is no warning indicating IP Forwarding is active. Risk is incurred for administrators who may select IP Forwarding with Microsoft Proxy Server installed without understanding the consequences.

How Microsoft Proxy Server addresses this issue

This issue can be addressed procedurally. The administrator must be attentive to the status of the IP Forwarding checkbox.

Test PROX-C-4 Observation Table

PROXY-1 IP Forwarding
From

To
Attempt To
Result
Disabled IR-1 PROXY-1 204.142.190.130 Ping Reply
Disabled IR-1 PROXY-1 204.142.190.161 Ping Reply
Disabled IR-1 PPTP-1 204.142.190.162 Ping Reply
Disabled PPTP-1 PROXY-1 204.142.190.161 Ping Reply
Disabled PPTP-1 PROXY-1 204.142.130 Ping Reply
Disabled PPTP-1 IR-1 204.142.190.129 Ping Timed Out
Enabled IR-1 PROXY-1 204.142.190.130 Ping Reply
Enabled IR-1 PROXY-1 204.142.190.161 Ping Reply
Enabled IR-1 PPTP-1 204.142.190.162 Ping Reply
Enabled PPTP-1 PROXY-1 204.142.190.161 Ping Reply
Enabled PPTP-1 PROXY-1 204.142.130 Ping Reply
Enabled PPTP-1 IR-1 204.142.190.129 Ping Reply

The table above details the results of Ping (ICMP echo protocol) tests between the internal and external networks under different conditions of the IP Forwarding checkbox.

When an echo request is sent to a Microsoft Proxy Server with a destination address of the internal network adapter, the internal adapter will respond. If the response of the internal adapter address is detected by an outside entity, it could aid in designing a more focused attack on the internal network. Although designing a more focused attack may not be directly possible through the Microsoft Proxy Server, the information could be used if another entry point was also identified (for example, a dial-in SLIP or PPP line), and later used to penetrate the network.

Appendix F3—Detailed Functional Test Case Results

Test Case PROX-F-1

Objective

Determine the security impact of configuring the internal (private) network for addresses that are being used on the external (public) network. This is the basis for a spoofing attack if Microsoft Proxy Server does not respond properly in such a configuration.

Configuration

Procedure

  1. Verify AIX-BOX can access services on IR-1 if connected to the same subnet by connecting it directly to the same hub as IR-1.

  2. Verify that AIX-BOX and PROXY-1 have connectivity to each other using an ftp from each server to the opposite server.

  3. Access services on IR-1 from AIX-BOX.

  4. Add a static route to AIX-BOX that directs access to IR-1 through the router and PROXY-1 as the gateway (this may also require adding a static route to router).

  5. Assure “Access Control” is enabled on the Proxy Server for all connections.

  6. Configure the PROXY-1 LAT to include complete access to address range 204.142.190.128 through 204.142.190.159.

  7. Access systems, services, or other resources on internal network from AIX-BOX. This should include at least an ftp and a telnet application request.

  8. Disable “Access Control” on PROXY-1 for all connections.

  9. Repeat step 8.

  10. Document the results.

Observational requirements

Observations

Test Case PROX-F-2

Objective

Test the level of access between internal and external networks when the internal client does not have Microsoft Proxy Server client software installed or if both the external and internal machines run a non-Microsoft Proxy Server–supported operating system.

Configuration

Procedure

  1. Ping AIX-BOX 204.142.190.195 from IR-1.

  2. Finger AIX-BOX 204.142.190.195 from IR-1.

  3. FTP AIX-BOX 204.142.190.195 from IR-1.

  4. Telnet AIX-BOX 204.142.190.195 from IR-1.

  5. Ping IR-1 204.142.190.129 from AIX-BOX.

  6. Finger IR-1 204.142.190.129 from AIX-BOX.

  7. FTP IR-1 204.142.190.129 from AIX-BOX.

  8. Telnet IR-1 204.142.190.129 from AIX-BOX.

  9. Enable IP Forwarding on PROXY-1

  10. Ping AIX-BOX 204.142.190.195 from IR-1.

  11. Finger AIX-BOX 204.142.190.195 from IR-1.

  12. FTP AIX-BOX 204.142.190.195 from IR-1.

  13. Telnet AIX-BOX 204.142.190.195 from IR-1.

  14. Ping IR-1 204.142.190.129 from AIX-BOX.

  15. Finger IR-1 204.142.190.129 from AIX-BOX.

  16. FTP IR-1 204.142.190.129 from AIX-BOX.

  17. Telnet IR-1 204.142.190.129 from AIX-BOX.

  18. Disable IP Forwarding on PROXY-1

  19. Ping AIX-BOX 204.142.190.195 from IR-1.

  20. Finger AIX-BOX 204.142.190.195 from IR-1.

  21. FTP AIX-BOX 204.142.190.195 from IR-1.

  22. Telnet AIX-BOX 204.142.190.195 from IR-1.

  23. Ping IR-1 204.142.190.129 from AIX-BOX.

  24. Finger IR-1 204.142.190.129 from AIX-BOX.

  25. FTP IR-1 204.142.190.129 from AIX-BOX.

  26. Telnet IR-1 204.142.190.129 from AIX-BOX.

  27. Document the results.

Observational requirements

Observations

Microsoft Proxy Server successfully prevented non-proxy clients from using services beyond the Proxy Server.

Test PROX-F-2 Observation Table

PROXY-1 IP Forwarding
From

To
Attempt To
Result
Enabled IR-1 AIX-BOX 204.142.190.195 Finger Reply
Enabled IR-1 AIX-BOX 204.142.190.195 FTP Login Connection
Enabled IR-1 AIX-BOX 204.142.190.195 Telnet Login Connection
Enabled AIX-BOX IR-1 204.142.190.129 Finger Reply
Enabled AIX-BOX IR-1 204.142.190.129 FTP Login Connection
Enabled AIX-BOX IR-1 204.142.190.129 Telnet Login Connection
Disabled IR-1 AIX-BOX 204.142.190.195 Finger Timed Out
Disabled IR-1 AIX-BOX 204.142.190.195 FTP Timed Out
Disabled IR-1 AIX-BOX 204.142.190.195 Telnet Timed Out
Disabled AIX-BOX IR-1 204.142.190.129 Finger Timed Out
Disabled AIX-BOX IR-1 204.142.190.129 FTP Timed Out
Disabled AIX-BOX IR-1 204.142.190.129 Telnet Timed Out

Test Case PROX-F-3

Objective

Test the functionality of Microsoft Proxy Server’s logging mechanism.

Configuration

Procedure

  1. Configure logging to regular logging.

  2. Access HTTP and ftp services through Web Proxy Server from IR-1.

  3. Access telnet and ftp services through the WinSock Proxy Server from IR-1.

  4. Configure logging to verbose logging.

  5. Repeat steps 2 and 3.

  6. Document the results.

Observational requirements

Observations

Issue

Configuration of the logging feature.

Description

The logging processes gather a significant amount of information about any connected process. This makes the logging facility a valuable tool for tracking system usage and monitoring individual user activity. Without logging, the ability of the system administrator to track the system usage and to prevent unauthorized activity is severely limited. Operating the Microsoft Proxy Server without logging should be considered insecure. Refer to the Interconnectivity Security Issues and Microsoft Proxy Server Security Features section of this document for additional information and the implications of this feature.

How Microsoft Proxy Server addresses this issue

As indicated in Test Case PROX-C-1, regular logging to a new file on a daily basis is selected by default. This configuration may be adequate for certain environments. Test Case PROX-C-3 and Appendix E—Baseline Security Configuration provide information on the recommended settings for the logging feature.

Test Case PROX-F-3: Regular and Verbose Logging Observation Table

Regular logging records the following: Verbose logging records the following
client machine IP address client machine IP address
client user name client user name
Log date client agent
Log time client platform
Service name Authentication Status
Destination name IP address Log date
Destination port Log time
Protocol name (TCP, UDP) Service name
Object name Proxy name
Object Source Referring Server name
Result code Destination name
Destination address
Destination port
Processing time
Bytes received
Bytes sent
Protocol name
Transport
Operation
Object name
Object MIME
Object source
Result code

Appendix F4—Detailed Penetration Test Case Results

Test Case PROX-P-1

Objective

To determine which IP addresses respond to an ICMP echo (ping) request on the various sub-nets where the Microsoft Proxy Server is attached. The primary objective is to determine which IP addresses answer to untrusted systems connected to the external network.

Configuration

Procedure

  1. Run the fping utility from IR-1 against the external subnet.

  2. Run the fping utility from IR-1 against the internal subnet.

  3. Run the fping utility from AIX-BOX against the internal subnet.

  4. Run the fping utility from AIX-BOX against the external subnet.

  5. Document the results.

Observational requirements

The file /tmp/fping.out will contain the list of IP addresses which answered or did not answer the ICMP echo request (ping).

Observations

Issue

The internal adapter of machine PROXY-1 (the dual-homed Proxy Server) unexpectedly answered the echo request from an external system.

Description

When an echo request is sent to a Microsoft Proxy Server with a destination address of the internal network adapter, the internal adapter will respond. If the response of the internal adapter address is detected by an outside entity, it could aid in designing a more focused attacked on the internal network. Although designing a more focused attack may not be directly possible through the Microsoft Proxy Server, the information could be used if another entry point was also identified (for example, a non-secured dial-in SLIP or PPP line), and later used to penetrate the network.

How Microsoft Proxy Server addresses this issue

Microsoft Proxy Server does not currently address this issue. However, Microsoft Proxy Server prevents visibility and access to the other systems connected to that adapter’s internal network.

Test PROX-P-1 Observation Table

From To Result
Internal Network External Subnet Fping not answered
Internal Network Internal Subnet 1.2.3.0

1.2.3.1

1.2.3.2

1.2.3.3

1.2.3.4

External Network Internal Subnet 1.2.3.2
External Network External Subnet 10.11.12.1

10.11.12.2

10.11.12.3


Test Case PROX-P-2

Objective

To determine which TCP/IP ports a Windows NT Server will answer to when running the Microsoft Proxy Server using the default configuration options.

Configuration

Procedure

  1. Run the strobe utility from AIX-BOX Server against PROXY-1 as follows:
    # ./strobe proxy1   2> /tmp/strobe.out
  2. Document the results.

Observational requirements

The file /tmp/strobe.out will contain a complete listing of all of the TCP/IP ports that allowed connections. This file can then be used for further analysis and customization of additional attack scenarios and penetration test cases.

Observations

Issue

The strobe utility detected seven TCP ports answering to external network connections. Three of these were expected: FTP, HTTP, and Gopher. Four of these were unexpected: NI FTP (port 47), Location Server (port 135), NetBIOS (port 139), and Port 1028.

Description

Each of the TCP/IP service ports identified by “Strobe” represents a possible avenue of external attack by another TCP/IP service specific penetration tools and techniques. In the penetration test cases that follow this test, each of the significant responding ports are further tested for security vulnerabilities.

How Microsoft Proxy Server addresses this issue

This issue can be addressed procedurally. Many of the identified ports can be disabled. The Microsoft-provided Appendix C—Server Security Checklist provides guidance on disabling ports 47, 139, and 1028 on the external adapter of a Windows NT Server running Microsoft Proxy Server. FTP port 21 and gopher port 70 can be disabled using the Internet Information Server management tool. Port 135 cannot currently be disabled. The RPC service will unconditionally listen on port 135 on all interfaces, and relies on Windows NT RPC authentication for security; however, our testing did not show any vulnerability related specifically to this issue.

Test Case PROX-P-2 Observation Table

From To Result
External AIX-BOX PROXY-1 204.142.190.161 proxy1eftp21/tcp File Transfer [Control] [96,JBP]

proxy1eni-ftp47/tcp NI FTP [134,SK8]

proxy1egopher70/tcp Gopher [MXC1]

proxy1ewww80/tcp World Wide Web HTTP [TXL]

proxy1eloc-srv135/tcp NT RPCSS

proxy1enetbios-ssn139/tcp NETBIOS Session Service [JBP]

proxy1eunknown1028/tcp unassigned

AIX-BOX PROXY-1 204.142.190.130 proxy1iftp21/tcp File Transfer [Control] [96,JBP]

proxy1ini-ftp47/tcp NI FTP [134,SK8]

proxy1igopher70/tcp Gopher [MXC1]

proxy1iwww80/tcp World Wide Web HTTP [TXL]

proxy1iloc-srv135/tcp Location Service [JXP]

proxy1inetbios-ssn139/tcp NETBIOS Session Service [JBP]

proxy1iunknown1028/tcp unassigned


Test Case PROX-P-3

Objective

To determine if the Microsoft Proxy Server is susceptible to any of the common Internet weaknesses identified by the Internet Security Scanner public domain security analyzer/tool.

The ISS utility will analyze all target systems for the following Internet risks and/or vulnerabilities:

Configuration

Procedure

  1. Run the ISS utility from the AIX-BOX against PROXY-1 Server as follows:
    # ./strobe  204.142.190.193  204.142.190.193
  2. Run the ISS utility against the internal addresses on the inside of PROXY-1 as follows:
    # ./strobe  204.142.190.129  204.142.190.130
  3. Document the results.

Observational requirements

The file ../ISS.log (directory in which ISS was run) will contain a complete listing of all of the ISS utility findings. This file can then be used for further analysis and customization of additional attack scenarios and penetration test cases.

Observations

ISS: Run against the external adapter from the external network (without options specified on the command line)

-->    Inet Sec Scanner Log by Christopher Klaus ©1993    <--

E-mail: cklaus@hotsun.nersc.gov coup@gnu.ai.mit.edu

ISS: Run against the external adapter from the external network (with the -p command line option specified)

-->    Inet Sec Scanner Log by Christopher Klaus ©1993    <--

E-mail: cklaus@hotsun.nersc.gov coup@gnu.ai.mit.edu

==============================================================

Host 10.11.12.2, Port 21 ("ftp" service) opened.

Host 10.11.12.2, Port 47 opened.

Host 10.11.12.2, Port 70 opened.

Host 10.11.12.2, Port 80 opened.

Host 10.11.12.2, Port 135 opened.

Host 10.11.12.2, Port 139 opened.

Host 10.11.12.2, Port 1029 opened.

The ISS utility, in its FreeWare and unmodified release form, did not attempt to perform any of its tests beyond the initial port scan (and this required using the -p command line option).

Test Case PROX-P-4

Objective

To determine if the Microsoft Proxy Server is susceptible to any of the common Internet weaknesses identified by the Satan public domain security analyzer/tool.

The Satan utility will analyze all target systems for the following additional (over ISS) Internet risks and/or vulnerabilities:

Configuration

Procedure

  1. Run the Satan utility with the following options (either using command line options or modifications to the ./config/satan.cf configuration file):

    An attack level of 2 (command line of -a 2)

    A proximity descent level of 2 (command line of -A 2 -l 2)

  2. Run the Satan utility from the UNIX Server against the Windows NT Proxy Server as follows:
    # ./Satan  -a  2  -A  2  -l  2   proxy1
  3. Document the results.

Observational Requirements

The file ../results/Satan-data/facts (directory where Satan was run) will contain a complete listing of all of the Satan utility findings. This file can then be used for further analysis and customization of additional attack scenarios and penetration test cases.

Observations

Issue

The only issue reported by the Satan utility was its ability to identify the Proxy Server was offering an Anonymous FTP service.

Description

The Anonymous FTP service is an optional part of the Windows NT Server that was configured by default prior to the installation of the Proxy Server. The FTP service is installed as part of the Internet Information Server. The presence of Anonymous FTP service represents a possible avenue of external attack if misconfigured. Test Case PROX-P-5 tests this for security vulnerabilities within the FTP service.

How Microsoft Proxy Server addresses this issue

This issue can be addressed procedurally. FTP port 21 can be disabled using the Internet Information Server management tool.

Test case PROX-P-4 Satan results

Satan: Run against the external adapter from the internal network

proxy1i|135:TCP|a|x||||offers 135:TCP

proxy1i|http|a|x|||HTTP/1.0 400 Bad Request\r\nContent-Type: text/html\r\n\r\n<body><h1>HTTP/1.0 400 Bad Request\r\n</h1></body>|offers http

proxy1i|ftp|a|x|||220 proxy1 Microsoft FTP Service (Version 2.0).\r\n221 \r\n|offers ftp

proxy1i|47:TCP|a|x||||offers 47:TCP

proxy1i|ftp|a|x|||ANONYMOUS|offers anon ftp

proxy1i|gopher|a|x|||3 --6 Bad Request. \r\n.\r\n|offers gopher

proxy1i|tcpscan.satan 1-9999|u|||||program timed out

proxy1i||a|||||rpcinfo error #256

proxy1i|udpscan.satan 1-2050,32767-33500|u|||||program timed out

Satan: Run against the external adapter from the external network

proxy1e|ftp|a|x|||220 proxy1 Microsoft FTP Service (Version 2.0).\r\n221 \r\n|offers ftp

proxy1e||a|||||rpcinfo error #256

proxy1e|udpscan.satan 1-2050,32767-33500|u|||||program timed out

proxy1e|47:TCP|a|x||||offers 47:TCP

proxy1e|ftp|a|x|||ANONYMOUS|offers anon ftp

proxy1e|gopher|a|x|||3 --6 Bad Request. \r\n.\r\n|offers gopher

proxy1e|135:TCP|a|x||||offers 135:TCP

proxy1e|tcpscan.satan 1-9999|u|||||program timed out

proxy1e|http|a|x|||HTTP/1.0 400 Bad Request\r\nContent-Type: text/html\r\n\r\n<body><h1>HTTP/1.0 400 Bad Request\r\n</h1></body>|offers http

Test Case PROX-P-5

Objective

To attempt manual anonymous FTP penetration attempts.

Configuration

Procedure

  1. Initiate a remote FTP session from the external Server to the Proxy

    # ftp 201.142.190.161

  2. Attempt to login an anonymous user.

    Name (201.142.190.161:root) anonymous

    Password: test@unix.com

  3. Attempt to identify the current working directory

    ftp> pwd

  4. Attempt to gain a listing of the current directory:

    ftp> ls –l and ftp> dir

  5. Attempt to change directory in the Proxy Server

  6. Attempt to read one of the Proxy Server critical configuration files.

  7. Attempt to add a file to one of the Proxy Server critical directories.

  8. Attempt to overwrite a critical Proxy Server file.

  9. Document the results.

Observational requirements

The tester should take note of all messages displayed by the FTP utility during the course of this test.

Observations

Issue

The FTP Server allowed the external system to gain a successful anonymous login.

Description

The Anonymous FTP service is an optional part of the Windows NT Server that was configured by default prior to the installation of the Proxy Server. The FTP service is installed as part of the Internet Information Server. The presence of Anonymous FTP service represents a possible avenue of external attack.

How Microsoft Proxy Server addresses this issue

The coexistence of a properly configured (which is the default) FTP Server in the same system with the Microsoft Proxy Server does not appear to present any additional vulnerabilities to the proxy service, Windows NT operating system, or the internal network behind the Server. The FTP Server allowed the external system to gain a successful anonymous login. The default configured FTP Server could not be compromised through standard manual penetration techniques as listed in this test case. In addition, if not required, FTP port 21 can be disabled.

Test Case PROX-P-6

Objective

To attempt to exploit the fact that the Microsoft Proxy Server allows connections to the unused TCP/IP port 47 (as a previous run of strobe detected). C&L focused on this port because it is the only additional port that started accepting TCP/IP connection requests after the Proxy Server was installed and is identified by Microsoft as a port that can be used to administrate the Proxy Server.

Configuration

Procedure

  1. Initiate a manual telnet session from the external system to port 47 on the Proxy.

  2. Attempt to perform common telnet and ftp commands such as cd, pwd, <cr>, get, put, and so on.

  3. Use a UNIX shell script to initiate 50 to 100 telnet sessions from the external UNIX box to port 47 on the Proxy Server.

  4. Use the netstat -a command on the Proxy Server to analyze the connection state of any and all incoming port 47 connections.

  5. Document the results.

Observational requirements

Observations

Issue

Microsoft Proxy Server allows connections to port 47.

Description

The ability to connect to port 47 represents a possible avenue of external attack by more service-specific penetration tools and techniques.

How Microsoft Proxy Server addresses this issue

This issue can be addressed procedurally. Port 47 can be disabled. The Microsoft-provided Appendix C—Server Security Checklist provides guidance on disabling port 47 on the external adapter of a Windows NT Server running Microsoft Proxy Server. In addition, Microsoft Proxy Server’s allowing connections to port 47 seems to have no apparent security implication. A denial of service attack does not appear to be effective against this open port.

Test Case PROX-P-7

Objective

Configuration

Note   It will be necessary to obtain and install a key file from ISS which will allow testing of the specific IP address that is being used by the external adapter of the Microsoft Proxy Server.

Procedure

  1. Run the X-Windows version of the ISS utility from AIX-BOX against PROXY-1 as follows:
    # ./xiss
  2. Configure the ISS utility using the “Configure Scanner...” menu to attempt every possible penetration technique and to produce a verbose form of its raw output file.

  3. Set the IP Address of the Microsoft Proxy Server using the “Additional Hosts” and “<<ADD” entry fields.

  4. Start the ISS scanner attack on the Microsoft Proxy Server.

  5. Select the “Analyze” button to produce a complete set of text reports with all medium and above conditions included.

Observational requirements

Observations

Note   The above two tests do not apply to any of the services offered by or answered to by Microsoft Proxy Server. Therefore, their exclusion should have no impact on the overall test results.

Issue

The only issue raised by the ISS tool was that the Proxy Server allowed Trace Routing packets to be passed between its two network interfaces.

Description

Trace Routing is when a router allows packet routing information to be echoed through to both attached networks. This information can be helpful to attackers in determining internal network addressing schemes when looking to exploit weaknesses on other systems connected to the internal network. This issue was also identified in Test Case PROX-P-1 when the Proxy Server allowed its internal network adapter to respond to a general echo (ping) request. This issue was noted because the Proxy Server’s internal network adapter answered.

How Microsoft Proxy Server addresses this issue

Microsoft Proxy Server does not currently address this issue. However, as noted in Test Case PROX-P-1, Microsoft Proxy Server prevents visibility and access to the other systems connected to the internal adapter’s network. This seems to have no apparent security implication.

Management's Assertion

Microsoft Proxy Server is a software product that provides a gateway to the Internet. Microsoft management represents that the product achieves the following objective:

Report of Independent Accountants

We have examined management's assertion that the Microsoft Proxy Server, when implemented properly in accordance with Microsoft recommendations, is suitably designed to provide a reasonable and practical level of protection for Internet connections. This assertion was prepared by and is the responsibility of Microsoft management.

Our examination was made in accordance with standards established by the American Institute of Certified Public Accountants and, accordingly, included obtaining an understanding of the internal control structure of the product and such other procedures as we considered necessary in the circumstances. We believe that our examination provides a reasonable basis for our opinion.

Because of limitations inherent in the internal controls incorporated in software products and the impracticability of using all types of penetration tools and techniques, security controls may be breached and not be detected. Also, projections of any evaluation of controls to future periods are subject to the risk that controls may become inadequate because of changes in conditions, such as the introduction of more powerful tools or techniques to compromise information security.

In our opinion, management's assertion that the Microsoft Proxy Server, when implemented properly in accordance with Microsoft recommendations, is suitably designed to provide a reasonable and practical level of security for Internet connections as of December 15, 1996 is fairly stated, in all material respects, based upon the criteria included in the assertion.

Disclaimer

This document (the “Evaluation”) presents certain discussions and recommendations concerning Microsoft Proxy Server security. The Evaluation is based on Microsoft Proxy Server (Build 167) running on Windows NT Server version 4.0 RTM (Build 1381), and to a large extent upon technical documentation and other information developed and supplied by Microsoft. Coopers & Lybrand L.L.P. (“C&L”) did not review source code for dormant flaws, and cannot ensure that every potential weakness that might arise in the future has been identified. The Evaluation is based upon a collection of methodologies and tests interacting at a single point in time with an Internet environment that is continually changing and becoming ever more complex. Internet security is continuously being assaulted by increasingly sophisticated and resourceful hackers and other criminals. Just as software virus protection programs are hard put to remain more than a small step ahead of the virus perpetrators, security analyses and recommendations may unexpectedly become outdated. C&L and the individual authors of this report (collectively, the “Authors”) have used methodologies and software they believe to be reliable in evaluating the security issues presented, but the Authors make no representations or warranties concerning either those methodologies and software or the results obtained from their use. While the Authors believe that the material in this Evaluation presents a fair and reasonable picture of Microsoft Proxy Server security controls, nothing herein can substitute for each reader’s own professional and business judgment, independent investigations, and research into the subjects covered. All information presented herein is of a general nature and may not be applicable to any particular situation. Nothing herein constitutes an endorsement of any product by the Authors.

Limitation of Testing

It is important to note that not all types of penetration tools and techniques were utilized or attempted for the Evaluation. The tests executed in the Evaluation utilized penetration testing tools and techniques common to the security industry. Many penetration attempts rely on long periods of time to analyze and understand targets, utilize intermediary nodes and networks, and employ automated techniques that may run unattended for extended periods of time. Such long term testing was beyond the scope of the Evaluation. In addition, penetration tests provide information regarding only very specific security vulnerabilities and should not be viewed as conclusive of Microsoft Proxy Server’s overall security posture.

The results of the Evaluation cannot disclose any weakness that may exist in prior or future versions.

The Evaluation focused on technical controls. There are additional non-technical techniques, such as social engineering, dumpster diving, and others, that have proven to be very effective in circumventing security controls but were not addressed for the Evaluation. Please see the Bibliography for additional information regarding these issues.

Bibliography

Firewalls and Internet Security: Repelling the Wily Hacker, Cheswick and Bellovin (Addison-Wesley Publishing Company, 1994)

Network Security: How to Plan for it and Achieve it, Baker (McGraw-Hill, Inc., 1995)

Computer Communications Security: Principles, Standard Protocols and Techniques, Ford (Prentice-Hall, Inc., 1994)

Complete LAN Security and Control, Davis, (McGraw-Hill, Inc., "Windcrest", 1994)

About Coopers & Lybrand

Coopers & Lybrand L.L.P. is one of the world's leading professional services firms providing audit, tax, management consulting, financial advisory, and human resource advisory services to clients in a broad range of industries on a globally integrated basis in 140 countries. In the United States, the firm has been serving clients since 1898 and today has 17,000 partners and staff working in over 100 offices. Organized along industry lines, the firm seeks to create value for its clients and to bring a competitive advantage to their activities. Its clients include a variety of large and small, publicly and privately held companies, many numbered among the Fortune 500.

Coopers & Lybrand L.L.P. has recognized the risks and threats to information since the early stages of information technology development. Their original approach to auditing computer-based systems included the study and evaluation of controls over the security of information. The firm has since established the Information Technology Security Services (ITSS) national practice dedicated to serving their clients’ needs in addressing security over one of their most important resources—technology generated and resident information. The ITSS professionals are recognized leaders in the fields of information technology, telecommunications, logical and physical security, and auditing. They are knowledgeable in the latest security tools and methods, and in evaluating, analyzing, developing, and implementing security and control solutions.

Services offered by the ITSS practice include Information Security Assessment, Information Security Risk Analysis, Security Plan Development, Internet Connectivity Pre-Implementation Review, Firewall Review, Operating System Security Review, Penetration Testing, Policy and Procedure Development, Business Continuity Planning Review, and Training.

About the Authors

David Rivera is a Senior Technical Manager of C&L's IT Security Services (ITSS) practice and has over 19 years experience in data processing. David leads C&L's technical team for Internet and UNIX Security Services. David's technical capabilities include internal knowledge of UNIX, TCP/IP, and all Internet protocols and services. David also leads focused Internet penetration exercises from C&L’s Internet testing lab in New York. David earned an M.S. degree in Computer Science and a B.S. in Computer Technology from the New York Institute of Technology.

James Jumes is a Manager of C&L’s Business Systems Advisory Services (BSAS) and Security practices and has over ten years of information technology strategy, business system selection and implementation, and security experience. James is one of the principal authors of the book Windows NT 3.5 Guidelines for Security, Audit, and Control and has developed a Windows NT 3.5x security review program and recommendations tool. James earned an M.B.A. from Lehigh University and an M.Ed. and B.A. in Psychology from Boston College.

Neil Cooper is a Technical Manager of C&L’s Information Technology Security Services (ITSS) practice, and has over 16 years experience in data processing. Neil has primary responsibility for leading the Windows NT security service line for C&L and is part of C&L's technical team for UNIX, Windows NT, Netware, and Internet Security Services. Neil's technical capabilities include knowledge of Windows NT, UNIX, TCP/IP, and X-Windows, as well as mid-range systems. Neil earned both a B.S. and M.S. degree in Geology from Penn State University and the University of Delaware.

Christopher O'Hara is a Senior Technical Specialist in C&L’s Information Technology Security Services (ITSS) practice. Chris' technical focus is on a variety of UNIX variants (SunOS, Solaris, IBM AIX, Linux, HP-UX), Internet security (firewalls, topologies, protection strategies), TCP/IP networking, remote access connectivity, and DEC VAX/VMS data security assessments. In this capacity he has reviewed system configurations, network topologies, and network access points, and assessed the appropriateness of the related security controls. Chris earned a B.S. in Computer Information Systems from the University of Scranton.

Bruce Murphy is the National Partner of Coopers & Lybrand's ITSS practice based out of the New York region. He has over eleven years of experience implementing access control mechanisms, from a management, technical, and procedural perspective, across PC, LAN, mid-range, and mainframe computing platforms. Bruce lectures frequently on many areas of information security, including Electronic Commerce, Multi-Platform Network Architectures, Local Area Networks, Toll Fraud, and Advanced Authentication Techniques. Bruce earned a B.A. in English from Muhlenberg College, is President of the New Jersey ISSA chapter, and is designated a Certified Information Systems Security Professional.