260 likes | 384 Vues
This detailed guide covers essential steps in securing the SCOoffice Server, including changing the admin password, configuring SMTP security, and setting up firewalls for both internal and external access. It highlights important services, port configurations, and anti-relay measures to protect your email server from unauthorized use. Learn how to implement SASL authentication, secure TLS settings, and set client restrictions effectively, ensuring your network remains safe from potential attacks. Complete with command examples and configuration snippets.
E N D
Module 5 • Securing SCOoffice Server
CHANGE THE ADMIN PASSWORD! Securing SCOoffice Server
SMTPServer 25 SCOofficeServer Firewall Internet 80/443 WebClient 21*2580/443*110/995143/993389/636 Outlook * Not used by Outlook Express External Firewall Configuration
SCOofficeServer Firewall ActiveDirectoryServer 3268 Internal Firewall Configuration
SCOoffice(master) SCOoffice(slave) SCOoffice(slave) Firewall 25389/636143/9932003 Internal Firewall Configuration
SCOoffice(master) SCOoffice(slave) SCOoffice(slave) SCOoffice(slave) SCOoffice(slave) SCOoffice(slave) Firewall Internet 25389/636143/9932003 Remote Office Firewall Configuration
SCO OpenServer’s HTTP Servers • SCO OpenServer runs HTTP servers on ports: • 80 – SCOoffice Server’s HTTP server • 443 – SCOoffice Server’s HTTPS server • 615 – Internet Configuration Manager • 8457 – DocView: Access to SCO OpenServer documentation
Other SCOoffice Server Related Ports • SCOoffice Server runs daemons on ports: • 21 – ProFTP • 25 – SMTP • 110 – POP3 • 143 – IMAP • 389 – OpenLDAP • 993 – IMAP4 over TLS/SSL • 995 – POP3 over TLS/SSL • 2000 –Cyrusmaster (sieve) • 2003 –Cyrusmaster (LMTP) • 2583 – MON • 4840 – SASLAUTHD • 4844 – SASLAUTHD • 10024 – AMaViS
Disallowing Open Relay • Don’t let server be used as an open relay • Numerous ways to prevent open relay • We will configure SASLAUTHD + TLS • # telnet rose.example.net smtp • 220 rose.example.net ESMTP Postfix (2.0.20) • HELO nuisance.spammer.net • 250 rose.example.net • MAIL FROM: nice_guy@example.net • 250 Ok • RCPT TO: victim@example.com • 250 Ok • ...
Stored in LDAP Disallowing Open Relay • Useful for blocking unwanted SMTP sessions: • smtpd_client_restrictions • smtpd_sender_restrictions • smtpd_recipient_restrictions
Disallowing Open Relay Simple Authentication and Security Layer (SASL) PLAIN authentication mechanismBase64 encoded:user+NULL+user+NULL+passwordbob\0\bob\0bpasswd LOGIN authentication mechanismBase64 encoded username bobBase64 encoded password bpasswd
…/etc/imapd.conf sasl_pwcheck_method: saslauthd imapd/pop3d …/etc/cyrus.conf imap cmd=“imapd –p 2 …pop3 cmd=“pop3d” …… cyrusmaster Disallowing Open Relay SASL AUTHENTICATION …/etc/saslauthd.conf ldap_servers: ldap://127.0.0.1/ldap_filter: login=%u slapd saslauthd …/lib/sasl2/smtpd.conf pwcheck_method: saslauthdmech_list: plain login smtpd
Disallowing Open Relay • SASL Configuration on the Server • smtpd_sasl_auth_enable = yes • smtpd_sender_restrictions = check_sender_access ldap:ldapSenderAccess, permit_sasl_authenticated • smtpd_recipient_restrictions =check_recipient_access ldap:ldapRecipientAccess, permit_sasl_authenticated, permit_mynetworks, reject_unauth_destination • broken_sasl_auth_clients = yes • smtpd_sasl_security_options = noanonymous • smtpd_delay_reject = yes
Disallowing Open Relay • SASL Configuration on the Client • smtp_sasl_auth_enable = yes • smtp_sasl_password_maps = hash:/opt/insight/etc/postfix/sasl_passwd • smtp_sasl_security_options = noanonymous
Disallowing Open Relay • Create /opt/insight/etc/postfix/sasl_passwd: • Run postmap(1) after creating (or modifying) file example.net alice:apasswdexample.org bob:bpasswd
Disallowing Open Relay • TLS v1 is based on SSL v3 • Encrypt SMTP traffic using TLS • X.509 certificates
Disallowing Open Relay • TLS Configuration on the Server • smtpd_tls_cert_file = /opt/insight/etc/ssl/server.pem • smtpd_tls_key_file = /opt/insight/etc/ssl/server.pem • smtpd_tls_CAfile = /opt/insight/etc/ssl/server.pem • smtpd_use_tls = yes
Disallowing Open Relay • TLS Configuration on the Client • smtp_tls_cert_file = /opt/insight/etc/ssl/server.pem • smtp_tls_key_file = /opt/insight/etc/ssl/server.pem • smtp_tls_CAfile = /opt/insight/etc/ssl/server.pem • smtp_use_tls = yes
Disallowing Open Relay • Using a Certificate Authority’s Certificate • smtp_tls_CApath = /opt/insight/etc/ssl/ca_cert.pem • smtpd_tls_CApath = /opt/insight/etc/ssl/ca_cert.pem
Disallowing Open Relay • To test to see if a mail server is an open relay: • Log into the mail server • telnet rt.njabl.org 2500
Exercise: Tracing TLS and SASL SASL Authentication Only: TLS + SASL Authentication:
Other Restrictions • Other useful restrictions: • smtpd_client_restrictions • smtpd_helo_restrictions • smtpd_sender_restrictions • See www.postfix.org/uce.html
Using smtpd_client_restrictions • In main.cf: • In /opt/insight/etc/postfix/smtp_clients: smtpd_client_restrictions = check_client_access hash:/opt/insight/etc/postfix/smtp_clients, permit • 192.168.1.1 OK • 192.168.1.2 PERMIT • 192.168.1.3 REJECT • 192.168.1.123 REJECT • 192.168.1.0/24 OK • example.net OK • paper.example.org DUNNO • example.org REJECT
Using smtpd_helo_restrictions • check_helo_access • reject_invalid_hostname • reject_non_fqdn_hostname • reject_unknown hostname • In main.cf: • In /opt/insight/etc/postfix/helo: smtpd_helo_restrictions = reject_invalid_hostname,check_helo_access hash:/opt/insight/etc/postfix/helo • example.org OK • example.net REJECT
Using smtpd_sender_restrictions • check_sender_access • reject_unknown_sender_domain
Creating a Chroot Jail • A chroot jail adds a layer of protection • Limits daemon(s) to /opt/insight/var/spool/postfix • Set the fifth field in master.cf to ‘y’