nt-part2_43
Analysis of the Security of Windows NT
1 March 1999
43
Set number, which enables a user to set the number at which s/he will be called back
at login. Clearly, this method is less secure then the first one, but at least it offers
tracing of calls.
5.7.3 Default Deny
After RAS has been installed on a server, it must be configured. The first thing to do is
to start RAS. By default every user is denied access to the system through this service.
An administrator must grant dial-in permission for a user to be able to remotely utilize
the server, which is done on a peer user basis. This can be done either with the Remote
Access Admin utility or with the User Manager utility.
5.7.4 Access Restrictions
In the installation procedure, several access restrictions can be enforced. First, dial-in
and dial-out restrictions must be specified. Three options exists:
Dial-out only
Receive calls only
Dial-out and Receive calls
A RAS server must at least be able to receive calls, while a RAS client must be able to
Dial-out. Second, select which protocol(s) (NetBEUI, TCP/IP and/or IPX) can be used
for a connection. Third, select and configure one or more protocol(s) (NetBEUI, TCP/
IP and/or IPX) that are to be allowed on the server. Fourth, decide whether the remote
users shall have access to the entire network or to the computer running the RAS server
only. Fifth, select which authentication method shall be used. There are three options:
Allow any authentication including clear text (PAP, SPAP or CHAP are allowed)
Require encrypted authentication (SPAP or CHAP are allowed)
Require Microsoft encrypted authentication (only CHAP is allowed)
One of the above must be selected. Another setting, which can be specified, is whether
or not data encryption is required.
5.7.5 PPTP Filtering
If PPTP filtering is enabled on a RAS server, the only way for clients to connect to the
server is through PPTP. The server will refuse other types of connections.
5.8 Auditing
The auditing in NT is handled by SRM and LSA together with the Event Logger. Dif-
ferent types of events are grouped into event categories and auditing is then done based
on these groups. There are seven types of event groups. These are: System, Logon/
Logoff, Object Access, Privilege Use, Detailed Tracking, Policy Change and Account
Management. For details on event groups see [43] and Table 4. If auditing applies and
what is to be audited is determined by the Audit Policy which is handled by the LSA
and given to the SRM by LSA.