Udostępnij za pośrednictwem


Post Webcast’s Notes: Securing SQL Server 2005 for Developers

This morning was a jammed filled session covering off a lot of changes made to Microsoft SQL Server 2005.  Over the last few weeks we talk exclusively about Front End security issues such as Input trust and the creation of a Development and Design environment to better emulate your production environment.  However, today we switched gears by examining the security enhancements made to SQL Server 2005.

 

A good place to start the talk on was with the Surface Configuration Tool.  By default many features including xp_cmdshell, clr and even remote connections have been turned off in SQL Server 2005.  Therefore, if you were to immediately start developing in SQL Server 2005 you might start experiences security errors when invoking some of these features.  Thus, the Surface Configuration Tool is an excellent way to examine which features are disabled and also provides the ability to enable the particular features required.  The SQL Server Surface Area Configuration tool is located under All Programs, Microsoft SQL Server 2005, Configuration Tools.

 

Authentication has changed in SQL Server 2005 with the support of Windows Password Policies enforcements when creating SQL Server login accounts.  This is an excellent way to enforce strong passwords and an expiration policy on passwords depending upon your security needs.  This can be configured on a per-login basis as demonstrated with the script below:

 

create login foo with password='@#Hkjsdf#$#VDSVSQ@!',

 CHECK_EXPIRATION=ON,CHECK_POLICY=ON

go

select * from sys.sql_logins

GO

declare @name nchar(100)

SET @name ='foo'

SELECT LOGINPROPERTY( @name, 'PasswordLastSetTime' ) AS PasswordLastSetTime,

LOGINPROPERTY( @name, 'IsExpired' ) AS IsExpiried,

LOGINPROPERTY( @name, 'IsLocked' ) AS IsLocked,

LOGINPROPERTY( @name, 'IsMustChange' ) AS IsMustChange,

LOGINPROPERTY( @name, 'LockoutTime' ) AS LockoutTime,

LOGINPROPERTY( @name, 'BadPasswordCount' ) AS BadPasswordCount,

LOGINPROPERTY( @name, 'BadPasswordTime' ) AS BadPasswordTime,

LOGINPROPERTY( @name, 'HistoryLength' ) AS HistoryLength,

LOGINPROPERTY( @name, 'PasswordHash' ) AS PasswordHash

GO

--cleanup

drop login foo

 

Schemas have been added as an abstract between the database and the owner of the objects.  Therfore, by assigning objects to schema it is possible to drop users without rewriting your applications as the name resolution is no longer depend upon the user or principals names.  We can continue to use the default schema of dbo similar to what we are used to in SQL Server 2000.  However, if your application creates objects in the database and you want those objects to be created under the dbo schema then you must grant your application dbo privileges when connecting to the database.  This will increase the attack surface of your application as well increasing the severity if your application is vulnerably to SQL Injection attacks.  Schemas are also a nice mechanism to scope your permissions.  For example, you can grant select permission on a schema.  This will grant select permission to all the tables in that schema alone but not the other tables in other schemas. 

 

Execute Content provides an excellent mechanism to have your modules such as functions, proc and triggers to run under a different user context then the caller of the module.  The permissions that one can assign in SQL Server 2005 is very granular especially compared with SQL Server 2000, however, if you are unable to provide a single permission attribute to some database users then you can use execute content.  Therefore, the proc can run under a privilege account that has certain permission such as truncate table, and the caller only has to be granted execute permission on the proc itself and not truncate table.  Highlighted in the demo script below:

 

--This example will create 3 users

--

-- User1 will have a table MyTable

-- User2 will have a stored proc that select's the table

-- User3 will have execute permissions on User 2's stored proc

--

--This demo show the use of EXECUTE AS functionality

--Create our users

create login Login1 with password='(*&sdf87786sdf'

go

create login Login2 with password='(*&sdf87786sdf'

go

create login Login3 with password='(*&sdf87786sdf'

go

create database ExampleDB

go

use ExampleDB

go

--User 1 will have a table

create user User1 for login Login1 with default_schema=User1

go

create schema User1 authorization User1

go

--User 2 will have SELECT access and write a proc to access

create user User2 for login Login2 with default_schema=User2

go

create schema User2 authorization User2

go

--User 3 will have the right to exec the proc

create user User3 for login Login3 with default_schema=User3

go

create schema User3 authorization User3

go

grant create table to User1

go

grant create proc to User2

go

execute as login='Login1'

go

create table User1.MyTable

(ANumber int)

go

insert into MyTable values (1)

insert into MyTable values (2)

insert into MyTable values (3)

go

grant select on MyTable to User2

go

revert

go

execute as login='Login2'

--create a stored proc that will return the rows in our table

create proc ViewMyNumbers

AS

BEGIN

select * from User1.MyTable

END

grant execute on ViewMyNumbers to User3

go

revert

go

execute as login='Login3'

--Can't access table directly

select * from User1.MyTable

--I can't execute the proc since I don't have permissions on the unlying table

exec User2.ViewMyNumbers

--What I can do is alter the proc and set it to "execute as owner"

revert

go

execute as login='Login2'

go

ALTER PROCEDURE ViewMyNumbers

WITH EXECUTE AS OWNER

AS

BEGIN

select * from User1.MyTable

END

revert

go

execute as login='Login3'

--Still can't access table directly

select * from User1.MyTable

--Now I can access it and I didn't have to give User1

--any permissions on MyTable

exec User2.ViewMyNumbers

go

revert

go

 

SQL Server now provides build DDL statements and functions for encrypting and decrypting data inside the database and not necessary in manage code anymore.  Encryption has never really been difficult but rather the management of the keys becomes the overwhelming issue.  Therefore, SQL Server 2005 supports key management solution including the ability to manage the protection of the keys through a password that must be supplied by an application or an user.  Or the protection of all keys in a database can be rooted under the Database Master key which is protected by default of the Service Master Key using the DPAPI for the instance of the SQL Server.  I would highly recommend that you visit this excellent blog on certificates and Keys in SQL Server 2005. Demo script is provided below:

 

--Encrypt content demo

USE Master

GO

--Create Database, Users, Schemas, Table Object--

Create Database AccountsDB

GO

Use AccountsDB

GO

--create two logins that will be used

--logins for two consultants in a investors office

Create login Sheila with password='Capucci4!'

Create login Jon with password='Capucci4!'

--create users with Default schema

Create user Sheila with DEFAULT_SCHEMA=Fin

Create User Jon with DEFAULT_SCHEMA=Fin

GO

Create SCHEMA Fin Authorization Sheila

--Create Table to client table

Create table Fin.Clients (Id int, clientname nvarchar(30),

investor varchar(20),

SIN varbinary(100), Portfolio varbinary(100))

--Assign permission to table

grant select, insert on Fin.Clients to Sheila

grant select, insert on Fin.Clients to Jon

--Now create a certificate for each consultant

Create certificate SheilaCert

authorization Sheila with subject='SheilaCert'

--Notice error, we need to create a database master key first

CREATE MASTER KEY ENCRYPTION BY PASSWORD ='Capucci4!'

--Now lets create the certificates

Create certificate SheilaCert

Authorization Sheila with subject = 'SheilaCert'

Create Certificate JonCert

Authorization Jon with subject = 'JonCert'

--create symmetric keys for each of the consultants

CREATE SYMMETRIC KEY SheilaKey AUTHORIZATION Sheila

WITH ALGORITHM = TRIPLE_DES

ENCRYPTION BY CERTIFICATE SheilaCert;

CREATE SYMMETRIC KEY JonKey AUTHORIZATION JON

WITH ALGORITHM = TRIPLE_DES

ENCRYPTION BY CERTIFICATE JonCert;

--View the list of the keys in the database

Select * from sys.symmetric_keys

--SIMULATE CONNECTING AS SHEILA--

--Login and Insert Client Data--

Execute As login='Sheila'

SELECT SUSER_NAME() as LoginName, USER_NAME() as DBUserName;

--open your symmetric key for usage

OPEN SYMMETRIC KEY SheilaKey

DECRYPTION BY CERTIFICATE SheilaCert;

--use the key to insert investor's client records

--including encrypted values into the table

insert into Fin.Clients values (1,'Neo','Sheila',

encryptByKey(Key_GUID('SheilaKey'),'111-111-111'),

encryptByKey(Key_GUID('SheilaKey'),'$150,000,000'))

insert into Fin.Clients values (2,'Smith','Sheila',

encryptByKey(Key_GUID('SheilaKey'),'222-222-222'),

encryptByKey(Key_GUID('SheilaKey'),'$200,000'))

--close all open keys

close all symmetric keys

--logging out of sheila's context

REVERT

--SIMULATE CONNECTING AS JON--

execute as login ='Jon'

--open your symmetric key for usage

OPEN SYMMETRIC KEY JonKey

DECRYPTION BY CERTIFICATE JonCert;

insert into Fin.Clients values (3,'WhiteRabbit','Jon',

encryptByKey(Key_GUID('JonKey'),'333-333-333'),

encryptByKey(Key_GUID('JonKey'),'$50,000'))

insert into Fin.Clients values (4,'Trinity','Jon',

encryptByKey(Key_GUID('JonKey'),'444-444-444'),

encryptByKey(Key_GUID('JonKey'),'$300'))

--close all open keys

close all symmetric keys

--simulate logging out of Jon's context

REVERT

--TEST THE RESULTS--

SELECT SUSER_NAME() as LoginName, USER_NAME() as DBUserName;

Select * from Fin.Clients

Execute As login='Sheila'

--open the relevant keys for usage

OPEN SYMMETRIC KEY SheilaKey

DECRYPTION BY CERTIFICATE SheilaCert;

--Select from the table including decrypting

select id, clientname, investor,

convert(varchar,decryptbykey(SIN)) as SIN,

convert(varchar,decryptbykey(Portfolio)) as Portfolio

from Fin.Clients

--simulate logging out

Close all symmetric keys

REVERT

Execute As login='Jon'

SELECT SUSER_NAME() as LoginName, USER_NAME() as DBUserName;

--open the relevant keys for usage

OPEN SYMMETRIC KEY JonKey

DECRYPTION BY CERTIFICATE JonCert;

--Select from the table including decrypting

select id, clientname, investor,

convert(varchar,decryptbykey(SIN)) as SIN,

convert(varchar,decryptbykey(Portfolio)) as Portfolio

from Fin.Clients

--simulate logging out

Close all symmetric keys

REVERT

 

Note: It is also possible to achieve row level security without encryption as depicted in this article. I also recommend you check out this blog entry as well for a tool to assist with row level security.

 

With impersonate capabilities, you can now flow a single SQL context to the middle tier in the connection object, however, as part of the Command object you can now pass the end user –ASP.NET Principal Object which is derived from the HttpContext.User—to the database and have your middle account impersonate the end user.  This provides the ability to flow just a single context in the connection object to ensure connection pooling for performance and by impersonating the end user and having the middle tier account context switch to the end use in the database auditing now be achieved at the database level.  As shown in the illustration below:

 

--*****IMPERSONALIZATION DEMO*******

--*****WHO AM I******

SELECT SUSER_NAME() as LoginName, USER_NAME() as DBUserName;

--******Create Login Account SQLUser and Dan******

USE Master

Go

Create login SQLUser with password='Capucci4!' --Middle Tier Account

Create login Dan with password='Capucci4!' --User to Impersonate

--*****Create Both Users in Database******

Use AdventureWorks

Go

Create user SQLUser with DEFAULT_SCHEMA=HumanResources

Create user Dan with DEFAULT_SCHEMA=HumanResources

--*****Grant Permission to Middle Tier Account*****

Grant Select on HumanResources.Employee to SQLUser

Grant Select on HumanResources.Employee to Dan

--*****Allow SQLUser to Impersonate Dan******

GRANT IMPERSONATE ON USER:: Dan TO SQLUser

--*****Login as MiddleTier Account*****

--*****Connect to AdventureWorks Database*****

--*****Through the SQLConnection Object*******

Use AdventureWorks

Go

Execute As Login='SQLUser'

SELECT SUSER_NAME() as LoginName, USER_NAME() as DBUserName;

--****Auditing Under SQLUser****************

Select EmployeeID, LoginID, SickLeaveHours

FROM HumanResources.Employee

Where SickLeaveHours > 75

--****Pass End User account ie.Dan--HttpContext.User—in

--****the command object***********

SELECT SUSER_NAME() as LoginName, USER_NAME() as DBUserName;

Declare @username varchar(25)

Set @username='Dan'

Execute as User=@username;

SELECT SUSER_NAME() as LoginName, USER_NAME() as DBUserName;

--****Auditing Under Dan****************

Select EmployeeID, LoginID, SickLeaveHours

FROM HumanResources.Employee

Where SickLeaveHours > 75

--*****Now reverted back to MiddleTier Account for

--*****connection pooling benefits******

REVERT

--****Now we are back as Middle Tier Acount********

SELECT SUSER_NAME() as LoginName, USER_NAME() as DBUserName;

On a final note, SQL Server 2005 releases a Community Technical Preview (CTP) of Service Pack 1 which can be downloaded here.

Comments

  • Anonymous
    March 22, 2006
    This morning was a jammed filled session covering off a lot of changes made to Microsoft SQL Server 2005....
  • Anonymous
    March 23, 2006
    The on-demand version of SQL Server 2005 for Developers, conducted on March 22, 2006, by Rob Walters--Program...
  • Anonymous
    March 23, 2006
    The on-demand Webcast of SQL Server 2005 for Developers, conducted on March 22, 2006, by Rob...
  • Anonymous
    June 02, 2009
    PingBack from http://patiochairsite.info/story.php?id=27456