DESKTOP

Windows Server 2003 : Hardening IPSecurity Policies

10/11/2012 3:12:42 AM
Once you have become familiar with the process of setting up IPSec policies, you should review the choices you can make to further increase their security. You can, for example, change the frequency with which the master and session keys are created. Changing keys more frequently increases security. Other possibilities are to use stronger authentication and to harden security methods by ensuring that the most secure security protocols are used.

1.1. Hardening Authentication

As you know, a shared secret is best used only for testing. It does make the test easier, and is also quite useful in troubleshooting. By using a shared secret, you eliminate the possibility that Kerberos or certificate authentication is the problem. When both computers are joined in the same domain, or if a trust relationship exists between the domains they are members of, Kerberos is a good choice as well. However, when computers are not joined in a domain, certificates may be used. Using certificates is more complex. Each computer will require its own certificate and, if the certificates are not issued by the same Certification Authority (CA), then a copy of the root certificate for the issuing CA will need to be available in the computer certificate store of the other computer. 

2. Hardening Security Methods

As implemented in Windows, IPSec provides several possible choices of integrity, encryption, and Diffie-Hellman settings. If the default settings are used, it is possible that the actual security settings used may not be the most secure. When multiple choices exist, the settings are negotiated at connection, and the first option that can be used will be selected.

To ensure that the most secure settings are selected, you should limit choices and make sure the list of choices is in the order of most to least secure. You should be aware of the computers on your network that will need to make a connection using IPSec and may have to adjust your choices accordingly. For example, Windows Server 2003 is the only Windows operating system that can use the Diffie-Hellman group 3 setting. If you can (or need to) ensure that only Windows Server 2003 computers are allowed to make the connection, then you can ensure that it is selected. However, don't block Windows 2000 and/or Windows XP machines from making a connection, if you require and permit them to do so.

You should modify the defaults to provide the best security for your situation. To change the defaults, make selections during the creation of the IPSec policy or use the following procedure. This procedure modifies the settings to ensure that only 3DES, SHA1, and Diffie-Hellman high(3) security methods are used.

On ComputerA, open the IPSecurityPolicy1 console and double-click on the Block TS policy to open it. Select the General tab and then click the Settings button, as shown on Figure 1.

Figure 16. Use the Setting button to expose the key settings and Security Methods

On the Key Exchange Settings page, click the Methods button, as shown in Figure 2.

Figure 2. Click the Methods button to modify Security Methods

Select the 3DES, SHA1, Medium (2) security method and click Edit. Use the drop-down box for the Diffie-Hellman group and select High (2048), as shown in Figure 3. Then click OK.

Figure 3. Modify the Diffie-Hellman group

Select the 3DES, MD5 security method and click Remove. Select each of the two DES security methods and remove them. Ensure that the page looks like Figure 4 and then click OK.

Figure 4. Verify your Security Methods settings

Click OK twice more to close the policy. On ComputerB, repeat the process, only this time, edit the Secure TS policy. Test the policy by opening a Remote Desktop connection from ComputerB to ComputerA. Verify the security method settings by double-clicking on the Security Associations node and double-click to open the SA. (The SA settings will not indicate the Diffie-Hellman group used.)

If IPSec policies are not working as you expected after you have made changes, it may be because the policy has not refreshed. You can force a policy refresh by stopping and restarting the IPSec Services. This action will quickly clear any policy information.

Other  
  •  Windows Server 2003 : Extending IPSec Operations, Designing IPSec Policies to Meet Secure Communications Needs
  •  Windows Server 2003 : Configuring a Windows IPSec Policy (part 4) - Using Group Policy to Implement IPSec, Monitoring and Troubleshooting IPSec
  •  Windows Server 2003 : Configuring a Windows IPSec Policy (part 3) - Setting Up the IPSec Monitor and Testing the Policy, Writing Policies Using netsh
  •  Windows Server 2003 : Configuring a Windows IPSec Policy (part 2) - Assigning the Policy, Creating Additional Rules
  •  Windows Server 2003 : Configuring a Windows IPSec Policy (part 1) - Using the IPSec Policy Wizard to Create a Policy
  •  Windows Server 2003 : Specifics of the Windows Implementation
  •  Delete & Recover Data (Part 4) - Securely Deleting Data Using Eraser 6.0
  •  Delete & Recover Data (Part 3) - Dealing With Corrupted Files
  •  Delete & Recover Data (Part 2) - Recovering Files Using Disk Digger
  •  Delete & Recover Data (Part 1)
  •  
    Most View
    Booting on HP 9000 Servers (part 1) - Boot Process Overview, The BCH Commands Including PathFlags on PA-RISC
    Protecting Me
    Memory Management : Prevent Memory from Being Moved, Allocate Unmanaged Memory
    Bluetooth Illuminated Keyboard K810 - Switchers Welcome
    SVI ISE 2013 Preview - The Whole Dam Thing! (Part 1)
    ASP.NET 3.5 Social Networking : Messaging (part 1)
    Ultimate Security Suites Showdown (Part 4)
    Macro Marvels (Part 2)
    Kogan Agora - A Big Screen Android Mobile
    SharePoint 2010 : Searching Through the API - The Search API
    Top 10
    Microsoft Exchange Server 2010 : Configuring Anti-Spam and Message Filtering Options (part 4) - Preventing Internal Servers from Being Filtered
    Microsoft Exchange Server 2010 : Configuring Anti-Spam and Message Filtering Options (part 3) - Defining Block List Exceptions and Global Allow/Block Lists
    Microsoft Exchange Server 2010 : Configuring Anti-Spam and Message Filtering Options (part 2) - Filtering Connections with IP Block Lists
    Microsoft Exchange Server 2010 : Configuring Anti-Spam and Message Filtering Options (part 1) - Filtering Spam and Other Unwanted E-Mail by Sender, Filtering Spam and Other Unwanted E-Mail by Recipien
    Microsoft Exchange Server 2010 : Creating and Managing Remote Domains (part 3) - Configuring Messaging Options for Remote Domains , Removing Remote Domains
    Microsoft Exchange Server 2010 : Creating and Managing Remote Domains (part 2) - Creating Remote Domains
    Microsoft Exchange Server 2010 : Creating and Managing Remote Domains (part 1) - Viewing Remote Domains
    Microsoft Exchange Server 2010 : Creating and Managing E-Mail Address Policies (part 3) - Editing and Applying E-Mail Address Policies , Removing E-Mail Address Policies
    Microsoft Exchange Server 2010 : Creating and Managing E-Mail Address Policies (part 2) - Creating E-Mail Address Policies
    Microsoft Exchange Server 2010 : Creating and Managing E-Mail Address Policies (part 1) - Viewing E-Mail Address Policies