Print

Print


Hopefully you have already seen the email IT Services sent out about the
group policy vulnerability and patch/mitigation with this month's patches.
This is a big one, and anyone running AD needs to take the time to deploy
the new mitigation group policy.

A link to the bulletin is here:
https://technet.microsoft.com/en-us/library/security/ms15-011.aspx

Computers enrolled in AD automatically parse the SYSVOL and NETLOGON shares
on their domain controllers for policies and scripts which are then executed
with administrative/root rights. Its possible to hijack that session and
have arbitrary code executed on your systems from a malicious user on your
network. There are a number of ways to be hit by this:

1) Workstations and laptops connecting over a wifi network could be easily
hijacked by a user on the same network. Requests to a domain controller
could be intercepted, allowing complete rooting of the system.

2) Wired networks are vulnerable from a malicious actor conducting an arp
poisoning attack against the network switches, intercepting connections to
the domain controllers and proving those systems with malicious group
policies/scripts.

3) If you do not practice proper network segmentation and leave your servers
and/or domain controllers in the same broadcast domain as workstations and
network ports are in unsecured locations, all your servers could also be
compromised the same as your workstations.


This patch backports functionality in Server 2012R2/Win8.1 to Vista/2008 and
above allowing specific servers or SMB share names to use additional server
validation and message signing to prevent this type of hijack attack. SMB
validation, signing, and encryption are all supported on XP/2003, but have
to be enable globally to all SMB connections which may cause compatibility
issues. This patch and its hardening features allows you to enable the
additional features on a per-server or share basis to prevent compatibility
issues.

Details on configuring the SMB Hardening feature are here:
https://support.microsoft.com/kb/3000483

If you are running a 2008 or newer domain controllers and most of your
systems are Vista/2008 or above, I would advise proceeding with pushing MS's
recommended configuration of the following:

\\*\NETLOGON	RequireMutualAuthentication=1, RequireIntegrity=1
\\*\SYSVOL	RequireMutualAuthentication=1, RequireIntegrity=1


For folks still on 2003 domain controllers, I recommend not setting the
RequireIntegrity option. Your domain controllers will not be able to handle
dynamically negotiating the integrity signing and all your client systems
will likely need a second reboot after the settings apply.

As with anything like this, please test things out before you apply it to
the whole domain. These are client-side security settings, so you can test
things out on a few systems in a test OU before you do the full deployment.
Good luck!