Thanks to everyone that responded.

It's nice to know that my security concerns weren't completely out to lunch, 
but at the same time I have heard a few things that I have never heard of 
(SecureIIS), or really considered in this case (insurance).

With regards to SecureIIS, I'll be doing some research over the next few days 
to see how it applies in this case.  Thanks for the tip.

With regards to insurance, I'm not 100% convinced it would be needed here.  
The only reason I say this is because my customer and I  have an informal 
arrangement, and it is understood that they are only paying for my time.  
However, with the type of money at issue with this server, I think we should 
probably formalize our arrangement, and state in a contract exactly what I am 
responsible for (and/or not responsible for).  Don't get me wrong, we 
discussed a formal contract early on, and felt a simple handshake deal was 
sufficient for the time being - with the understanding that this could change 
in the future.  I think the future has arrived... <grins>

As for who will access the application, at this time I am only aware of a need 
for employees to have access.  There may be a need in the (near) future for 
clients to have access to some of the reports, but these can be dumped to PDF 
and emailed to them, or setup in a shared folder on a different server.

Cade, with regards to the types of attacks, my thinking was something like 
this...  Based on my own server logs, I can see a lot of common attempts to 
get at an IIS server.  It would be simple enough to write some redirection 
rules (or similar - I'd have to look up the specific commands again) to 
handle these requests and feed them a 404.  You raise a good point about the 
"unknown" types of attacks and how to handle them.  I was hoping that by 
feeding the requests through Apache, there would be a simple way to filter 
out IIS specific requests (like the "../../../../winnt/system32/cmd.exe" type 
of hack).  As far as the app is concerned, it will never use a URL like that, 
but rather a plain jane type of URL (http://my.server.com/some/path), and all 
form data (via GET or POST) is validated, and handles SQL injection.  But, I 
suppose it'd be easy enough to create an attack using a plain jane type of 
URL as well.  So, off I go to research SecureIIS... :)  (BTW, can you tell I 
no longer trust IIS??  LOL)

In addition to the mission critical application, they are looking to host a 
web mail interface internally - also on an IIS server.  My thoughts were that 
we could protect that server as well with a simple virtual host on the apache 
server.  They only have one static IP, and may need port 80 directed to 
multiple web servers - so virtual hosts.  And because I don't trust IIS 
anymore, I would use Apache for them (if they agree of course).

Kin, it's been a bit, but I believe PPTP is an older method used for VPN's, 
and most VPN solutions have moved away from it for security reasons (can 
someone correct me if needed??).  I think the older Microsoft VPN servers use 
a flavor of PPTP, while newer servers (MS and OSS) use something else... (I 
REALLY need to investigate/do VPNs again).  Also, I'll be in touch regarding 
that insurance contact - it can't hurt to get the details. :)

Thanks again for all the input, and my appollogies for the lengthy reply.

Shawn


On Wednesday 16 February 2005 17:47, Kevin Anderson wrote:
> I'd pay a disproportionate amount of attention to Cade on this.  Security
> truly is his area of expertise.  He is top notch at it.
>
> Just my thoughts, in case you were curious about his answer being different
> from everyone else's.
>
> Kev.
>

_______________________________________________
clug-talk mailing list
[email protected]
http://clug.ca/mailman/listinfo/clug-talk_clug.ca
Mailing List Guidelines (http://clug.ca/ml_guidelines.php)
**Please remove these lines when replying

Reply via email to