This is a capture from a test app I had on my local IIS instance, but notice what is circled in red. By looking at the response headers, you now know exactly what version of IIS the site is running, the exact version of the .NET Framework and the exact version of MVC.
Just so you don't think this is just an artifact of hitting the localhost address or something I conjured up, go to http://msdn.microsoft.com/ and use your developer tools to inspect the response headers. This is what I get.
By default, for any ASP.NET site, all of this information is made available. So what is the problem with that? Well, a lot actually. Now a potential attacker knows exactly what version of software you are running. And they can use this information to understand what vulnerabilities have been reported against that version of software and use this information to refine their attack vectors.
How do you do this? You can use a CVE (Common Vulnerabilities and Exposures) database, of which are freely available on the web. For example, there is one at https://cve.mitre.org/cve/index.html, and a Google search will review numerous others. These databases are used by security professionals to share information about vulnerabilities and measure risk exposure. Unfortunately, they can also be used by the bad guys to understand what vulnerabilities exist in a product and plan an attack against that product.
So for an example, an attacker learns from your response headers that you are running IIS version 7.0. Now they can go look up all the vulnerabilities in version 7.0 and craft an attack around each one. If you have been negligent about patching, you will more than likely be exploited in such an attack.
But wait, it gets worse. Mr. Hunt points out in his course that there are search engines out there that don't index documents and web pages, but rather devices connected to the Internet. Once such example is http://www.shodanhq.com/. Using such a search engine, someone can easily easily find a list of sites that are running a particular version of software.
So lets say that there is a known exploit in a particular version of ASP.NET. What an attacker can do is get a list of all of the websites running that vulnerable version and then script an attack against all of those sites. Sure, some of those sites may have been patched or otherwise mitigated the threat so the attack does not work. But some of those sites will be vulnerable. The more recent the exploit, the more sites that will be vulnerable because there will have been less time for patches to be applied or the threat to be mitigated otherwise.
All of this goes back to these headers, which making publicly available information that there is no legitimate use for. What version of IIS, ASP.NET or MVC you are running makes zero difference to the browser. These headers are purely informational. The problem is that this information can be used against you. So the best course of action is to turn these headers off. Just like in the TV shows, if you are given the right to remain silent, then remain silent.
Turning Off Unnecessary Response Headers
I will first of all say that I really, really wish Microsoft would turn these headers off by default in future versions of IIS and ASP.NET. That is what secure by default means. Out of the box, we don't do things that could compromise security. But that may never happen, so in the meantime, we have to resort to other means.
There are two blog posts I want to point out tat also contain information on this, and they are worth a read as well.
- Troy Hunt -- Shhh… don’t let your response headers talk too loudly
- Scott Mitchell -- Removing Unnecessary HTTP Headers in IIS and ASP.NET
The reason why I am going to remove all three headers in a module is because I think it is useful to build a module that can applied at the machine level in IIS rather than individually to applications. My reason for this is that it is too easy for someone to forget to turn some of these headers off when creating a new application, and then we are right back to the unnecessary information disclosure problem. I want something I can set up when I build an IIS machine, and then I know it is being applied to all applications on the server. This is just a different approach I am taking. Ultimately, you have to decide what works best for you and your environment.
So how do we develop an IIS Module to do this? It is actually crazy simple.
1: public class RemoveServerHeadersModule : IHttpModule
2: {
3:
4: public void Dispose()
5: {
6:
7: }
8:
9: public void Init(HttpApplication context)
10: {
11: context.PreSendRequestHeaders += context_PreSendRequestHeaders;
12: }
13:
14:
15: void context_PreSendRequestHeaders(object sender, EventArgs e)
16: {
17: var headers = HttpContext.Current.Response.Headers;
18:
19: headers.Remove("Server");
20: headers.Remove("X-AspNet-Version");
21: headers.Remove("X-AspNetMvc-Version");
22: }
23: }
You just write a class that implements the IHttpModule interface. And then, the event you want to act upon is the PreSendRequestHeaders event. Then, it is just a matter of removing the unnecessary headers as you see.
One thing that you will notice is that this code does not remove the "X-Powered-By" header. That is because this response header is set in IIS after ASP.NET processing is completed. If you want to remove this header, you have to do so in IIS Manager. How to do so is covered in both of the blog posts mentioned above, so I won't repeat how to do it here.
So now we have to add this module to an application. You do so with the following config element (this assumes an assembly name of WebSecurity -- adjust for whatever you call your assembly or locate the module).
1: <system.webServer>
2: <modules runAllManagedModulesForAllRequests="true">
3: <add name="RemoveServerHeaders" type="WebSecurity.RemoveServerHeadersModule, WebSecurity" />
4: </modules>
5: </system.webServer>
All of this works just fine. We could include the class above in one of our applications, include the config element in our Web.config file and we are off and running.
As I alluded to earlier, I wanted to be able to apply this site wide. So how do we do that?
- You need to be using an App Pool with the IIS Integrated Pipeline. This is so that we can use an HttpModule.
- Create a class library project in Visual Studio that will contain the HttpModule written above. Note that I had to create this as a .NET 3.5 module, because for my version of IIS (IIS 7.5), it only seems to see .NET 2.0/3.0/3.5 modules in the IIS configuration. When I created the assembly as a 4.0 assembly, IIS would not pick it up. Again, I've only tried this on IIS 7.5, so later versions may be different.
- Code the class above in the class library project you just created
- Configure the class library to be strongly named (right click on the project --> Properties --> Look in the Signing tab). We need to do this because we will have to put the assembly in the GAC, which requires the assembly to be strongly named.
- Compile the project.
- Get the release version of the DLL and add it to the GAC using the "gacutil -u YourAssemblyName.dll"
- Configure IIS to run the HttpModule for the entire site. To do this, go into IIS Manager, click on the name of the server (item #1 in the diagram) and then double click on the Modules icon (item #2). This will bring up all of the Http modules that are configured server wide, and you can add your module as a managed module from here.
If you are wondering, the configuration file that IIS uses for machine wide configuration is the ApplicationHost.config file, which is located in %WINDIR%\system32\inetsrv\config directory. If you want to, you can also edit this file directly to add in the module.
What I found is that I needed to then stop and restart IIS for the module to take effect. Of course, it is always good to test things out and make sure things are working as you expect them to.
Am I Safe Now
You have probably already thought of this, but there are other ways someone can figure out if you are running ASP.NET, the most obvious being the aspx extension applied to pages in Web Forms. And that is true. And if they know you are running ASP.NET, its a pretty safe guess that you are running on top of IIS.But at least now someone does not have detailed information about exactly what version of software you are running. And this is the point. We don't want to give away any more information than we have to. We want to make things a little harder for a potential attacker and not hand them information about our site on a silver platter.
Of course, I would always advocate that you make these changes in DEV first, then QA and finally move them to your production environment. But take a little time in your next sprint to either build this module into your site or otherwise turn off these headers. It takes just a few minutes, and it helps keeps private information that should have never been available anyway.
Such an ideal piece of blog.Thanks for sharing
ReplyDeleteDot Net Online Training Bangalore
ASP.NET Response Headers and Unnecessary Information Disclosure
ReplyDeleteGreat post for the students & developers to explore this....!
Well, read our blog Top Reasons to Know Before you Hire a Dot Net Developers
hire .net developers
This comment has been removed by the author.
ReplyDelete