Dealing with winmail.dat files

This content is 20 years old. I don't routinely update old blog posts as they are only intended to represent a view at a particular point in time. Please be warned that the information here may be out of date.

A few days back, a business contact e-mailed me a copy of a presentation as a .PDF file. No problems there, except that when it got to me (using the Mozilla Thunderbird e-mail client), it was called winmail.dat. I tried saving the file as a .PDF but Acrobat Reader didn’t like it so I had to do some googling to find out what to do with this strange file (I remember having problems with this during a migration from Pegasus mail to Microsoft Exchange and Outlook a few years back and we had to resort to using plain text e-mails until everyone had been migrated).

I found an article on the PC Hell website that not only explained the purpose of the winmail.dat file (used by Outlook Rich Text e-mails to carry the formatting information in transport-neutral encapsulation format), but also gave links to various programs that can process the winmail.dat file. One of these is Steve Beadle’s WMDecode utility, which successfully extracted my .PDF from the winmail.dat file.

Infrastructure essentials

This content is 20 years old. I don't routinely update old blog posts as they are only intended to represent a view at a particular point in time. Please be warned that the information here may be out of date.

Anyone who reads this blog regularly will know that I keep a close eye on what the Microsoft UK IT professional technical evangelist team is up to and John Howard’s blog is one of many that I tend to watch. Since August, John has been posting a series of infrastructure essentials blogcasts to help administrators set up a well-managed infrastructure using Active Directory along with common Microsoft products like ISA Server 2004 and Exchange Server 2003. At the time of writing, John has reached 25 infrastructure essentials blog casts – watch out for more. John covers Windows (client and server), Virtual Server, Virtual PC and Identity Integration Server but it’s also worth checking out are Steve Lamb’s blog (security) and Eileen Brown’s blog (management, messaging, mobility and real time collaboration).

Securing your Windows computer with syskey

This content is 20 years old. I don't routinely update old blog posts as they are only intended to represent a view at a particular point in time. Please be warned that the information here may be out of date.

At an event a few weeks back, Steve Lamb mentioned using the syskey utility to secure a Windows system. Even though it’s a standard Windows utility, I’d never heard of it before and Steve has now written about syskey on his blog, along with a follow up post on storing the keys on a USB token (think of it as a kind of ignition key for a Windows computer).

Handy KVM solution

This content is 20 years old. I don't routinely update old blog posts as they are only intended to represent a view at a particular point in time. Please be warned that the information here may be out of date.

A few months ago I sold my KVM switch on eBay. Now I’m running out of desk-space again…

To be honest, the old one was too big, too noisy, and had 12 feet long KVM leads making it a bit over the top for a desktop solution but yesterday I picked up a Linksys integrated KVM 2-port switch at RL Supplies.

Linksys KVM2KITWith built-in cables, drawing power from the PS/2 port on one of the PCs, and no software required, this is an ideal solution for letting the port replicator for my work laptop and my desktop PC share the same keyboard, mouse and monitor (at resolutions up to 1920×1440). I just hit the Scroll Lock key twice to switch between PCs and my USB mouse even works with it (using a USB to PS/2 converter). Definitely worth considering by anyone who needs to find some extra desktop real estate.

Upgrading my wireless network

This content is 20 years old. I don't routinely update old blog posts as they are only intended to represent a view at a particular point in time. Please be warned that the information here may be out of date.

As I blogged previously, I experienced problems with my wireless network after I attempted to secure it using wired equivalent privacy (WEP). My 802.11b access point didn’t support WiFi protected access (WPA), so I turned off all the security (except MAC address filtering), thinking that there’s nothing here worth stealing anyway (except my bandwidth, and I don’t mind if my neighbours share my connection from time to time). Then, last week I attended Steve Lamb’s presentation on Wireless security and remote access and one point he made really worried me – what if someone was using my connection for something illegal? How could I prove that it wasn’t me (my ISP’s logs would show the IP address of my ADSL router and my account details)… unfortunately the answer is “with great difficulty”.

Whilst I live on a pleasant housing estate on the edge of a rural market town and I like my neighbours, I don’t know what their Internet interests are, and I didn’t want to run that risk. That meant only one thing – the wireless security must come back on – and ideally using WPA or WPA2.

Stage 1 was to buy a new access point (for not too much money). My budget of £40 (+VAT) meant that choices were somewhat limited. I had considered the Linksys WRT54G and WRT54GC until the friendly people at broadbandstuff highlighted that these devices don’t include a modem – I hadn’t realised that there is a difference between a broadband router (which is for cable) and an ADSL wireless gateway (which includes an ADSL modem). After that, I considered the Linksys WAG54G and it’s replacement, the WAG354G, but both were slightly over my budget and some articles I read suggested that the firewall wouldn’t let me configure my own rules. Thinking about it, I realised that I don’t need a new router – my Solwise SAR 110 has been working well since I stealthed it (I’ve since opened up a few ports and occasionally have to reboot, which I suspect is due to a denial of service attack, but thankfully not too often). After deciding that I only need an access point, I considered models from Linksys, NetGear and D-Link. The Linksys WAP54G looked good, until I read an (admittedly quite old) Toms Networking review that suggested it’s not too great on a mixed 802.11b and 802.11g network. I don’t like the styling on the consumer-focused NetGear equipment, but the business-focused WG102 looked good, had a great specification, but was too expensive for me this time around, so I decided to go for the D-Link DWL-2000AP+ instead, because:

  • It’s cheap (£35.99+VAT).
  • They had stock at RL Supplies (so I could pick one up on my way home).
  • I can’t follow the guideline of going for a one-brand WiFi infrastructure but I already have a D-Link DWL-520+ wireless PCI adapter in my server and using D-Link equipment (supporting AirPlus) would enable 22Mbps running (whilst my mixture of Compaq and HP-branded 802.11b kit would still run at 11Mbps and the Intel card in my Fujitsu-Siemens notebook would run at the full 54Mbps).
  • It supports WPA (although not WPA2).

D-Link DWL-2000AP+AirPlus G+

Stage 2 was to migrate from the old to the new access point. This was remarkably painless (D-Link DWL-2000AP+ firmware version 2.11 6 April 2005):

  1. Note the details of the old access point configuration before switching it off.
  2. Set the IP address on a client PC (wired connection) to use the 192.168.0.0/24 subnet.
  3. Browse to http://192.168.0.50/ and log on with the username admin and a blank password.
  4. Run the setup wizard from the access point Home/Wizard page to set the admin password, SSID and channel (I left this at 6 as I already know that my neighbours are using 1 and 11) and encryption level (none at this stage). Restart the access point when prompted.
  5. From the Home/LAN settings page, change the IP address of the access point to something suitable on the correct subnet (this will automatically change the settings for the DHCP server on the access point, but this is disabled by default in any case) and restart the access point when prompted. At this point you can reset the client PC to use the original IP settings (DHCP in my case).
  6. From the Advanced/Filters page, enter the MAC addresses for any devices which need to connect to the access point and select the option to only allow the defined addresses to connect. Annoyingly, the access point needs to restart after each address is added, but it does have a handy clone feature to read the MAC address of each connected device and add it to the list of allowed addresses. If the MAC addresses are unfamiliar, use the client PC to ping known devices and then read the ARP cache (arp -a) to match MAC address to IP address.
  7. From the Home/Wireless page, change the access point name (from the default of DWL-2000AP+ to something which matches your naming standards). I used the name I had assigned to the existing access point, and which was already in my DNS. Restart the access point when prompted.
  8. Finally, from the Tools/System page, save all settings to the local hard drive (default filename is config.bin).

Stage 3 is to configure WPA; however I want to leave the network running unsecured for a while longer, just to check that the mix of 11, 22 and 54Mbps 802.11b and 802.11g clients is working well. Once I’m happy with that, I’ll lock down the network. In the meantime, check out Steve Lamb’s post (and blogcast) on the subject.

Blog updates now available via e-mail

This content is 20 years old. I don't routinely update old blog posts as they are only intended to represent a view at a particular point in time. Please be warned that the information here may be out of date.

Readers of the HTML version of this blog may have noticed the FeedBlitz details which appeared yesterday under the syndication header on the left side of the screen. FeedBlitz is a service which I’m trying out to provide a daily digest of blog updates via e-mail. Hardline bloggers may not see a need for this (after all, isn’t RSS the transport of choice for bloggers?) but e-mail is one of the Internet’s killer applications and I quite like the idea of getting a single daily e-mail which details the updates to the blogs that I read – and it’s a great idea for people who might be interested in hearing when a site is updated, but who don’t have a feed reader, don’t understand what RSS is, or are just generally confused by anything other than basic e-mail and web browsing services.

If you would like to receive updates in this way, enter your e-mail address below and click the subscribe button for a daily digest of new posts to this blog:

Will Windows Vista bring clarity to your world?

This content is 20 years old. I don't routinely update old blog posts as they are only intended to represent a view at a particular point in time. Please be warned that the information here may be out of date.

Several months ago I installed Windows Vista Beta 1 (build 5112) on a spare laptop (slowly… as Vista installations tend to be…) but then didn’t get much time to use it (I’m still using XP on my everyday PCs). There are many good information sources on Vista out there (like Paul Thurrott’s Windows Vista Activity Center) – that’s hardly surprising with with 10,000 users testing Beta 1, but I thought I’d write a quick post about how Microsoft is positioning Windows Vista.

From an initial glimpse, I couldn’t see much (apart from the Microsoft support lifecycle) to compel corporations to upgrade from XP. Many of the new features seem to be aimed at consumers and I recently heard that a Gartner briefing note entitled “ten reasons you should and shouldn’t care about Microsoft’s Windows Vista client” recommended that there is little reason to move (and that even the security improvements can be plugged with third party products, or will be back-ported to XP); however on reflection, there may be some advantages for corporate users.

At a recent event, Microsoft were stressing that Beta 1 might look dull (from a visual perspective), but the focus was to establish robustness, reliability and security and then finish off the look and feel later (sounds very unlike Microsoft to me!). Also, there are no ROI/TCO/business value metrics yet as these will be produced after the product is feature complete (otherwise they could become redundant before release to manufacturing, e.g. if components are added or removed between builds).

According to the Microsoft marketing machine, the main benefits of Windows Vista are clustered around three areas, which I’ll expand upon in the following paragraphs:

  • Confident.
  • Clear.
  • Connected.

Confidence is about four areas:

  • Security and privacy:
    • User account protection (not using administrative rights and prompting users when an extra level of access is required).
    • Data protection (trusted platform module v1.2).
    • Secure browsing (anti-phishing filter in Internet Explorer 7 scans URLs for unusual patterns and compares them against a database of known phishing sites).
  • Performance and reliability:
    • Fewer reboots and crashes (50% less than Windows XP; Vista and Office 12 patches save state before restarting).
    • Greater responsiveness (fast start combining the benefits of hibernation and standby).
  • Deployment and servicing:
    • Single image format (XML-based WIM imaging with single instance storage and support for direct patching).
    • Improved application compatibility.
  • Management:
    • Built-in diagnostics.
    • Power saving via group policy (allowing power savings of up to $40 per PC).
    • Unified event log (XML-based, which can be fed to a database for proactive monitoring).

Clarity is concerned with:

  • Instant search:
    • Enterprise-ready integrated desktop search (in a form which is easier to manage in a corporate environment than the current offerings from MSN, Google and others).
  • Smart organisation:
    • New virtual folders and views.
    • Filter-based column controls.
    • Robust metadata support.
  • Visualisation:
    • Live icons and enhanced document previews.
    • Efficient window management (taskbar thumbnails, flip and flip 3D task switching, on which I’ll expand more below).
  • User experience:
    • Scales with hardware (performance scaling to enable operating system features according to the installed hardware).
    • Stable desktop experience.
    • Familiar, but updated, streamlined experience (Microsoft claims to be aiming for users to be up and running with the new interface in less than 20 minutes).

Being connected is about:

  • Networking:
    • Discover and join networks more easily.
    • Secure and reliable wireless networking.
    • Access to corporate applications without requirement for a VPN.
  • Mobility:
    • Windows mobility centre.
    • Seamless wireless connection to external displays and projectors.
    • Hybrid hard drive support (“super-fetch” capabilities to pre-load common applications).
    • Tablet PC enhancements.
  • Collaboration:
    • Face-to-face collaboration on shared networks.
    • Broadcast presentation and text files (e.g. across secure private encrypted networks).
    • Easy sharing of files and folders.
  • Synchronisation:
    • Integrated synchronisation centre (allowing multiple vendors to synchronise devices through a common API).
    • Platform for mobile development.
    • More efficient data synchronisation.

From my own first experiences, and the product demonstration that I saw (using capable hardware), the much-hyped “glass” effect within the Aero interface is uninspiring but Microsoft are keen to emphasis that it will allow third parties to create software which can take advantage of this for a richer user experience; however business users may also benefit from the flip (Alt-Tab replacement) which shows a preview of each running application as it switches between them instead of just an icon and some text details (something similar is available for Windows XP as a PowerToy). This feature also works by presenting taskbar thumbnails within Vista as the user hovers over minimised applications. There is also the Flip 3D task switching, with overlapping windows in a 3-dimensional form. Many of these user interface items are reliant on the Windows graphics foundation (formerly codenamed Avalon) and a graphics card with around 64-128Mb RAM.

Overall, the Aero interface seems to be a mix of the Windows XP Luna interface with hints of Apple OS X and KDE. It’s a fine line to tread between plagiarism and a familiar user interface but personally I don’t like any of those big icons. The new control panel is an improvement over the Luna version but I still prefer the classic control panel.

Other interface changes include adding blue (XML query-based) virtual folders alongside the the traditional yellow folders. Document preview is enhanced, clearly exposing metadata and displaying the first page of a document in a similar manner to the current treatment of graphics files within Windows XP’s document preview features. Although these are all positive improvements, my general feeling was that the new interface was going to take some time to get used to.

Microsoft claim that search is also greatly enhanced, with desktop search across the file system, e-mail and offline server files and the ability to share filters (i.e. views on document searches). Maybe it is this desktop search capability that means there are some major changes to the file system layout – with some familiar folders and others less so (my machine still had a Documents and Settings folder structure with common application data, but also featured a new Users folder structure), meanwhile some of the old favourites are still there (namely autoexec.bat and config.sys). My brief experience with build 5112 searching was actually quite disappointing as the search only seemed to include user folders whereas shelling out to a command prompt and using an old-fashioned dir filename /s produced a different set of results.

When I installed build 5112, I thought it felt fast (even on a 1.4GHz Pentium 4 Mobile with 256GB of RAM) but that could have been down to a fresh Windows installation (rather than more efficient code). Other observations (made after a just a few minutes looking at Windows Vista) were that:

  • As widely predicted, there is no more My prefix on documents, pictures, etc (good).
  • Fast user switching is available in domain mode (very good).
  • Desktop icons are huge (bad).
  • There is a new Control-Alt-Delete dialog, without a domain selection field – possibly encouraging a move to UPNs, but entering the username as domainname\username also worked for me (okay).
  • Checkboxes have a naff Windows 9x feel about them (bad).

So, when can we (finally) expect to see Windows Vista released? Microsoft is sticking to its 2006 release prediction, but is now saying that release to manufacturing (RTM) will be around Christmas 2006 (so that pushes general customer availability out into 2007). We’ve already seen pre-beta releases for the professional developers conference (PDC) in September 2003 and the Windows hardware engineering conference (WinHEC) in April 2004, before Beta 1 was finally released in July 2005.

Despite industry predictions to the contrary, the Microsoft representative that I spoke to insisted that there will be a second, more widely-available, Beta in January 2006, but there will also be community technical previews (CTPs) in December 2005, February 2006 and April 2006, as well as release candidates. Personally, I think this sounds like a lot of releases to manage and from which to solicit feedback – I’ll be surprised if some aren’t dropped from the schedule in order to hit that 2006 RTM date.

Probably the most embarrassing device that I’ve ever been told to fit to a car

This content is 20 years old. I don't routinely update old blog posts as they are only intended to represent a view at a particular point in time. Please be warned that the information here may be out of date.

Last night, as is normal on a Sunday evening in my house, I had a relaxing evening watching BBC Top Gear. During the news section, Jeremy Clarkson smashed up an extremely annoying device with a light-sensor to detect when a car’s fuel filler cap is opened and warn you to use only diesel fuel.

I thought it was funny and that no-one would actually buy one, until this morning I received one in the post from the lease company that owns my company car along with a letter mandating that I fit it to the car and warning that I will be personally liable for any damage caused by any future misfuelling (I have, of course, told them that I will install the thing but have refused to comply with the liability part).

I understand why they are doing this – the AA motoring trust has produced a report which details the problem along with some interesting statistics about misfuelling call-outs. I also admit that I did previously (many years ago) accidentally put half a tank of petrol into a diesel car as well as nearly filling the tank of this car with petrol when it was new (on both occasions, I had been using a petrol car for the previous few weeks), but the lease company waited 6 weeks to send this to me and I definitely know to use diesel now!

Misfuelling may be expensive and embarrassing, but this thing is a) loud b) American c) tacky d) noise-polluting e) extremely embarrassing! If you don’t believe me, then listen to how it sounds yourself.

Add to that, I’ve had to fit this horrible thing to a car about which Clarkson wrote:

    “You’ve deliberately gone your own way, deliberately bought something that isn’t a BMW or a Merc or an Audi. And in the process you’ve ended up with something that’s not only a little bit different, but also rather good.”

[Jeremy Clarkson, Sunday Times, 13 November 2005]

I’m dreading my next visit to a filling station forecourt. As my wife said, at least it will be a talking point – let’s see if she still thinks that as she cowers down in the passenger seat pretending she’s not there.

The application of technology to road safety

This content is 20 years old. I don't routinely update old blog posts as they are only intended to represent a view at a particular point in time. Please be warned that the information here may be out of date.

Earlier this afternoon, as I drove home in the dark across Buckinghamshire, Oxfordshire and Northamptonshire, it struck me just how many satellite navigation systems people are fitted in cars today (at least, I assume they were sat-nav devices, and that people were not just watching TV!). I don’t have sat-nav for two (three) reasons – I have a map book, I have a very good memory for remembering routes (and I was too tight to specify another £1200 options last time I ordered a car); however I do acknowledge that not everyone is a comfortable with their route planning capabilities and everyone I know with a Tom Tom raves about it.

My car tells me when I, or one of my passengers, isn’t wearing a seatbelt. It also turns on the wipers when the windscreen is wet. So, in general, I would say that applying technology to increase driver comfort and safety is a good thing.

It’s sad though, that technology hasn’t been used to detect when a driver needs to use their lights, or when there is a fault with a vehicle and it is unsafe to drive. On the same journey, the first hour of it was spent driving in fog (although visibility was still about 400 metres) – that meant that there was a mixture of people driving without lights (!) and people who thought they needed to use their rear fog lights even though I was right behind them and perfectly aware of their presence.

A few months back I had a rant about the replacement of real police by cameras in the name of road safety – my point being that a traffic policeman can exercise judgement over an issue that’s much broader than simply speeding, whereas a camera can’t. At the same time, I’ve seen a rise in unchecked vehicle defects. A few weeks back I followed a car for several miles which was belching out black noxious fumes. Today, I followed a car with only one working brake light which was directly above the rear fog light that was dazzling me. Later, a 7.5 tonne truck pulled out in front of me to overtake someone, and I saw the indicators on the side of the cab, but narrowly avoided a collision as his rear indicators didn’t work and it was all a bit too late.

Instead of all these gadgets, please can someone apply technology (or even people) to road safety – and I don’t just mean the politically correct issue of excess speed.

Wireless security and secure remote access

This content is 20 years old. I don't routinely update old blog posts as they are only intended to represent a view at a particular point in time. Please be warned that the information here may be out of date.

Last night, I attended Steve Lamb‘s Microsoft TechNet UK briefing on wireless security and secure remote access. I won’t repeat the entire content here, because Steve has an article in the November/December issue of Microsoft TechNet magazine, entitled improve your web security with encryption and firewall technologies, which, when combined with Kathryn Tewson and Steve Riley’s security watch: a guide to wireless security article, just about covers the content of the event. Having said that, there were a few more snippets that came out during the presentation, which I’ve plagiarised (and extended) in the rest of this post…

Wireless Security

Anyone who needs to secure a Wireless network at home should check out Steve Lamb’s blogcast on securing a wireless router and Windows XP and, although I’ve already linked it above, I’ll repeat that Kathryn Tewson and Steve Riley’s security watch: a guide to wireless security article is also worth a read. Further information is also available on the Microsoft website.

Some additional notes that I took during Steve’s presentation were that:

  • Wireless network keys can be stored on a USB token.
  • Wired equivalent privacy (WEP) is often considered insecure but consider the name – the equivalency part indicates that it offers the same level of security as a wired network. Yes, it can be broken into, but so can a wired network with public access to the building). Wi-Fi Protected Access (WPA) (or preferably WPA2) is better and dynamic WEP is a half-way house, but whatever security is employed, the wireless network still needs to be easy to use.
  • There are sites on the ‘net that will show you how to break a wireless (or other) connection (if you think it’s irresponsible of me to link that site, you could also find it using a search engine, so I figure that it’s better that the methods are well known, than only being known by the bad guys).
  • Contrary to popular belief, there is no point in securing the SSID for a network as it is transmitted unencrypted (even on a network secured with WPA or WPA2). Ditto for media access control (MAC) addresses, which are easily spoofed.
  • Even WPA doesn’t do anything to prevent a denial of service (DoS) attack and WPA2 (802.11i) doesn’t stop all DoS attacks.
  • 802.1x is port-based authentication and applies equally to both wired and wireless networks. It does have weaknesses, including that it will only authenticate the initial connection. In a wireless configuration, man-in-the-middle (MitM) attacks can be guarded against by requiring the WAP to identify itself using certificates (using a group policy object).
  • WEP requires Windows XP. WPA requires Windows XP SP1, WPA2 requires Windows XP SP2 and a hotfix (see Microsoft knowledge base article 893357).
  • The Windows 2000 Internet authentication service (IAS) can be used as the RADIUS server component in a secure wireless deployment; however Windows Server 2003 supports auto-enrolment (which when used for computer and user certificates will make life much easier).
  • Windows XP will (by default) allow access to its nearest access point, even if it is not secure.

Very importantly – if (like I did), you think that your wireless network (e.g. at home) doesn’t need to be secured because there’s no data of value to be had and anyway, you have bandwidth to spare which you don’t mind your neighbours using, consider the implications of someone using your wireless network to access the Internet and perform illegal activities, which your ISP can trace back to you via your IP address. Having thought about that, I’ll be buying a new wireless access point very soon.

Secure Remote Access

Microsoft are positioning virtual private networking (VPN) technology as no longer the best solution for providing corporate remote access and I tend to agree. The idea of giving an untrusted computer an IP address from the internal network fills me with fear (unless some quarantining is in place). VPNs “blur” the network edge and anyway, do remote users need full network access? I’ve often accidentally printed a document in the office whilst working at home and then had to ask a colleague to retrieve and dispose of it for me (wasting paper, printer resources and somebody else’s time). Some solutions will use VLAN technology to limit the network access for VPN users – there are other methods too, especially when considering that 90% of VPN users only really want to read their e-mail. For example, Outlook Web Access, whilst having improved it’s interface capabilities dramatically with each new release, is still not really a great solution for access from outside the corporate firewall (it’s good for allowing users to access mail without setting up a MAPI profile, but is heavily reliant on ActiveX controls, which may not be allowed in an Internet cafe, and is also a risk if the remote client has a keylogger installed) – full client Outlook using HTTPS over RPC on a notebook/tablet PC is a far better option – totally transparent from an end user perspective (although still a problem if access is required if an e-mail links back to internal resources to retrieve a document).

Steve Lamb’s TechNet magazine article (and my previous post on securing the network using Microsoft ISA Server 2004) elaborate on the need for application layer firewalling rather than blindly allowing HTTP and HTTPS traffic through the firewalls. Other measures employed include pre-authentication and URL scanning.

SSL VPNs are another method of providing remote access (even though they are not really VPNs, but are actually just remote desktops in a browser). Windows Terminal Services can provide basic SSL VPN functionality, which can also be extended with products from Citrix.

Operating over the remote desktop protocol (RDP), which is based on the International Telecommunications Union (ITU) T.120 protocol family and is therefore independent of network and transport protocols, these solutions use compression and caching to reduce bandwidth requirements and support network load balancing. Windows Server 2003 brings a number of terminal services enhancements (over Windows 2000) including:

  • Connection to the console session (in remote administration mode).
  • Control of RDP options via group policy.
  • WMI provider for scripted terminal services configuration.
  • ADSI provider for access to per-user terminal services profiles.
  • Improvements to the terminal server manager MMC snap-in (reduced automatic server enumeration).
  • Ability to limit users to a single session.
  • Improved security:
    • Remote Desktop Users security group (which can be used in place of the Everyone group to fine tune access control.
    • 128-bit RC4 encryption.

Securing terminal services comes back to the well-known principle of defence in depth:

  • A physically secure terminal services server.
  • A secure operating system configuration.
  • A secure terminal services configuration.
  • Network path security.
  • Using the registry to fine-tune control over terminal server sessions (probably overkill, but using group policy to control access is a similar principle).

Using the remote desktop web connection ActiveX control, terminal services can be provided across the web (and optionally secured using HTTPS). The initial client contact is to http(s)://servername/tsweb/ and the ActiveX control is downloaded over HTTP (TCP port 80) or HTTPS (TCP port 443). Once the browser has the ActiveX control installed, the user can connect to the terminal server over TCP port 3389.

If full VPN access is still required (and hopefully the methods above will avoid the requirement for this), then VPN server placement must be carefully considered. Running an encrypted PPTP or L2TP+IPSec VPN connection through a standard packet filtering firewall effectively bypasses the firewall as the VPN port will be open on internal and external firewalls and the traffic inside the connection will not be inspected.

Most network administrators will be alarmed if you propose the installation of ISA Server as the corporate firewall even though ISA Server 2004 has now achieved common criteria evaluation assurance level 4+. ISA Server 2004 is a perfectly good firewall (assuming that the underlying Windows platform is also well-managed), but it will probably be easier to justify to network administrators by using ISA as an additional server in the DMZ, or as the inner firewall (between the DMZ and the internal network). This way, the encrypted connection can be terminated at the ISA server and the firewall can inspect the inbound traffic.

Finally, if a VPN connection must be used to extend the corporate network to remote clients, then network quarantine controls should also be put in place. Full network access protection (NAP) is expected with the next version of Windows Server (codenamed Longhorn) but even now, Windows Server 2003 SP1 routing and remote access service (RRAS) allows for the provision of network access quarantine control for remote clients. The current Microsoft implementation involves using the connection manager administration kit (CMAK) to construct a custom RRAS client which includes a number of post-connection actions. Until these are passed, then vendor-specific options remain in place which prevent the remote VPN client from accessing the network. Unfortunately it is also possible for a technically able user to spoof the message which allows the vendor-specific attributes to be removed, but in reality this is a small risk. Microsoft’s NAP and Cisco’s network access control (NAC) will make this far more effective, extending the scope of control to include wired and wireless clients (as well as VPN clients).