Book now with code EOY2025
_omni_ wrote: Silver Bullet wrote: w^rl0rd wrote: If I have a folder w/ it's ACL allowing Anonymous Logon and someone plugged into my network having already locally authenticated locally, they could just type in the UNC path to this folder and access it w/o being prompted for domain credentials. Right? No....I just tested on my lab. Shared a folder on my Server and attempted to access it from another computer and was denied. Folder was shared as only having the Anonymous Logon Group with Full Control Share Permissions. Perhaps a policy disables anonymous network access?
Silver Bullet wrote: w^rl0rd wrote: If I have a folder w/ it's ACL allowing Anonymous Logon and someone plugged into my network having already locally authenticated locally, they could just type in the UNC path to this folder and access it w/o being prompted for domain credentials. Right? No....I just tested on my lab. Shared a folder on my Server and attempted to access it from another computer and was denied. Folder was shared as only having the Anonymous Logon Group with Full Control Share Permissions.
w^rl0rd wrote: If I have a folder w/ it's ACL allowing Anonymous Logon and someone plugged into my network having already locally authenticated locally, they could just type in the UNC path to this folder and access it w/o being prompted for domain credentials. Right?
_omni_ wrote: Ok all ye doubters...well my experiment had some complications so i'm still working on it, but here's a question for you: 1. Does the IUSR account need to authenticate with the system in order to be used? if yes, 2a. Is it then a member of the Authenticated Users group? if no, 2b. How then can it be used, how can it have permissions applied to it, etc?
When I visit your web site, did I log in? No. Did I enter a password? No. Do you know who I am? No. Am I anonymous? Yes. The IIS service just uses the IUSR account for anonymous log ins. If you want someone to be authenticated, then by definition they must be able to prove they are who they say they are (that's from Sec+ by the way icon_smile.gif ). I never said who I was. I just typed in your website and you said "let him in".
_omni_ wrote: Ha ok no one is falling for my trick question. When I visit your web site, did I log in? No. Did I enter a password? No. Do you know who I am? No. Am I anonymous? Yes. The IIS service just uses the IUSR account for anonymous log ins. If you want someone to be authenticated, then by definition they must be able to prove they are who they say they are (that's from Sec+ by the way icon_smile.gif ). I never said who I was. I just typed in your website and you said "let him in". Yes but while you are at my website, you are IUSR. In order for you to be able to use the IUSR account, it must be authenticated. If it is authenticated, it is a member of the Authenticated Users group. And anything that is a member of Authenticated Users CANNOT be a member of Anonymous Logons. So my point is, that while they may be anonymous to you, you don't know who they are and all that nice abstract stuff, they have essentially logged in with the IUSR account and so while you and the system don't know who the person is, you DO know who they logged on as, and that is the IUSR account. Again, the fact that they log on as IUSR means that the account must authenticate. The fact that the IUSR account must authenticate means that it is a member of the Authenticated Users group, and thus by definition cannot be a member of the Anonymous Logon group. Now i will hit the sack and see if the light has dawned by tomorrow. Open your mind...quit reading that MS stuff, it's confusing you... :P
Microsoft wrote: Q: It is my understanding that the IUSR_<servername> account is a member of the Guests group by default. Consequently, how do I secure the IUSR_account, by applying NTFS permissions for Guests group? A: Securing the IUSR account is essential, so it is important to understand how the IUSR account is used and to what groups the IUSR account belongs. To help in this, you can use the W3Who.dll program provided in the Windows 2000 Resource Kit. This little jewel will report the username, rights, and the group membership of the user that calls it. To implement this utility, simply call it from a web browser. For example, create a folder in a web site, check that is has anonymous access enabled and that NTFS permissions allow the IUSR account the NTFS execute permission. In addition, mark the folder for Scripts and Executables in the IIS snap-in. Then browse the file in Internet Explorer (http://servername/foldername/w3who.dll). The resulting page will reveal a wealth of information about the IUSR account, as follows: Access Token • 'IISANSWERS\IUSR_IISANSWERS' S-1-5-21-790525478-1993962763-xxxxxxxxxxxxxxx • 'IISANSWERS\None' S-1-5-21-790525478-1993962763-xxxxxxxxxxxxxx • '\Everyone' S-1-1-0 • 'BUILTIN\Guests' S-1-5-32-546 • 'BUILTIN\Users' S-1-5-32-545 • '\LOCAL' S-1-2-0 • 'NT AUTHORITY\NETWORK' S-1-5-2 • 'NT AUTHORITY\Authenticated Users' S-1-5-11 • SeUndockPrivilege - Remove computer from docking station Here, you can clearly see that the IUSR account is a member of Guests, Users, Authenticated Users, the Network Group, and Everyone. Consequently, anonymous users may have access to any resource these groups are permitted to access.
MS wrote: The Authenticated Users group is similar to the "Everyone" group, except for one important difference: anonymous logon users (or NULL session connections) are never members of the Authenticated Users group.
IUSR_[servername] is a validated login that is used in order to allow internet users connecting via IIS access to webpages you have decided should be open to the public. Its not the same as an anonymous connection at all.
_omni_ wrote: NEVER! I shall fight to the death! READ: Microsoft wrote: Q: It is my understanding that the IUSR_<servername> account is a member of the Guests group by default. Consequently, how do I secure the IUSR_account, by applying NTFS permissions for Guests group? A: Securing the IUSR account is essential, so it is important to understand how the IUSR account is used and to what groups the IUSR account belongs. To help in this, you can use the W3Who.dll program provided in the Windows 2000 Resource Kit. This little jewel will report the username, rights, and the group membership of the user that calls it. To implement this utility, simply call it from a web browser. For example, create a folder in a web site, check that is has anonymous access enabled and that NTFS permissions allow the IUSR account the NTFS execute permission. In addition, mark the folder for Scripts and Executables in the IIS snap-in. Then browse the file in Internet Explorer (http://servername/foldername/w3who.dll). The resulting page will reveal a wealth of information about the IUSR account, as follows: Access Token • 'IISANSWERS\IUSR_IISANSWERS' S-1-5-21-790525478-1993962763-xxxxxxxxxxxxxxx • 'IISANSWERS\None' S-1-5-21-790525478-1993962763-xxxxxxxxxxxxxx • '\Everyone' S-1-1-0 • 'BUILTIN\Guests' S-1-5-32-546 • 'BUILTIN\Users' S-1-5-32-545 • '\LOCAL' S-1-2-0 • 'NT AUTHORITY\NETWORK' S-1-5-2 • 'NT AUTHORITY\Authenticated Users' S-1-5-11 • SeUndockPrivilege - Remove computer from docking station Here, you can clearly see that the IUSR account is a member of Guests, Users, Authenticated Users, the Network Group, and Everyone. Consequently, anonymous users may have access to any resource these groups are permitted to access. As you may or may not see, while it refers to them as anonymous users (lowercase), they are NOT a member of the Anonymous Logon group. As you can very well see from the above, the IUSR account IS a member of the Authenticated Users group. NOW READ THIS: MS wrote: The Authenticated Users group is similar to the "Everyone" group, except for one important difference: anonymous logon users (or NULL session connections) are never members of the Authenticated Users group. GOT IT?? From the first quote, we see that IUSR is a member of the Authenticated Users group, and in the second quote we see that Anonymous Logon users are NEVER members of the Authenticated Users group. It can only be one or the other, Authenticated or Anonymous. And as we can see, it IS a member of the Authenticated Users group (and did you notice that of the groups listed, Anonymous Logon isn't there?) and therefore CANNOT POSSIBLE be a member of the Anonymous Logon group! READ: link IUSR_[servername] is a validated login that is used in order to allow internet users connecting via IIS access to webpages you have decided should be open to the public. Its not the same as an anonymous connection at all.
The IUSR account is a member of the Everyone & Authenticated Users groups. The IUSR account has the Access this computer from the network and Log on locally User Rights. So, specifically deny access for the IUSR account on everything, then grant the IUSR account access only where needed.http://searchwindowssecurity.techtarget.com/tip/1,289483,sid45_gci997908,00.html
Authenticated Users includes the IUSR anonymous Web user account but omits null connections and users who are members of the Guests group only.http://www.windowsitpro.com/Web/Article/ArticleID/25934/25934.html
Just like any user, the IUSR account has some group memberships. Giving permissions to any of these groups gives the IUSR account access to the content. The default memberships are: Everyone, Users, Guests, Authenticated Users, Network, Domain Users (if IIS is on a domain controller), and Web Anonymous Users (if the IIS portion of the Security Configuration Wizard has been run).http://www.microsoft.com/technet/technetmag/issues/2006/05/ServingTheWeb/default.aspx
The Authenticated Users group is similar to the "Everyone" group, except for one important difference: anonymous logon users (or NULL session connections) are never members of the Authenticated Users group.http://support.microsoft.com/?kbid=143474
_omni_ wrote: I await the humblest and most sincere apologies, as well as recognition as the one true saviour (of the thread, anyhow icon_biggrin.gif
w^rl0rd wrote: Thanks everyone. When someone can figure out how to access an NTFS folder (not a web page ) with an "Anonymous Logon," I'd love to hear it. Thanks.
Use code EOY2025 to receive $250 off your 2025 certification boot camp!