[isapros] Re: ISA and SAN Certs

  • From: Steve Moffat <steve@xxxxxxxxxx>
  • To: "isapros@xxxxxxxxxxxxx" <isapros@xxxxxxxxxxxxx>
  • Date: Sun, 7 Oct 2007 11:57:36 -0300

Indeed...that would be pretty cool..It works BTW...:)

S

-----Original Message-----
From: isapros-bounce@xxxxxxxxxxxxx [mailto:isapros-bounce@xxxxxxxxxxxxx] On 
Behalf Of Tom Shinder
Sent: Sunday, October 07, 2007 11:40 AM
To: isapros@xxxxxxxxxxxxx
Subject: [isapros] Re: ISA and SAN Certs

Hey Steve,

Want me to convert this into something to put up on ISAserver.org?

Tom

Thomas W Shinder, M.D.
Site: www.isaserver.org
Blog: http://blogs.isaserver.org/shinder/
Book: http://tinyurl.com/3xqb7
MVP -- Microsoft Firewalls (ISA)



> -----Original Message-----
> From: isapros-bounce@xxxxxxxxxxxxx
> [mailto:isapros-bounce@xxxxxxxxxxxxx] On Behalf Of Steve Moffat
> Sent: Saturday, October 06, 2007 2:51 PM
> To: isapros@xxxxxxxxxxxxx
> Subject: [isapros] Re: ISA and SAN Certs
>
> Just to muddy the waters...:)
>
> I pass this information on, that it may be of help to others
> (including myself in remembering what i did!)
>
> Preamble: This is my setup, so i cannot guarantee that this
> will work for you, I have for this setup, 1 server running
> Windows 2003 x64. If you want to install Exchange 2007 you
> will need it on either Windows 2003 x64 or 2007 x64 bit
> versions, the 32bit (x86) will not work. I also have one
> static public (external) IP. Most of the configurations i
> came across for Exchange will talk about multiple web sites
> (with different internal IPs) the thing they rarely mention
> is that you will need multiple external IPs to map to these
> internal IPs. If you have multiple external IPs then it is
> probably better that you assign 1 for autodiscover.domain.com
> so that you have more choices down the road instead of
> locking it to the same IP as your main CAS IP. If however you
> are restricted to 1 external IP this may help you.
> A little note about SSL certificates, Exchange 2007 is a bit
> of a nightmare for SSL certificates, by default you have a
> self-signed certificate made by exchange, which is ok if you
> have no one accessing any external services like OWA,
> activesync, RPC over HTTP (OutlookAnywhere). However this
> scenario is probably unlikely. If you do have these services
> then you either can install this self-signed certificate on
> every computer that needs to access these services not to
> mention telling people to click through the IE7 stupid "There
> is a problem with this website's security certificate",
> needless to say this is really not a viable option for most
> people. So pretty much the only real option is a commercial
> SSL certificate. Trying to find the most economical way to do
> things, i tried StartCom's free (yes really free, not trial)
> SSL certificate, problem is that it is trusted by almost
> everyone INCEPT Internet Explorer, needless to say it becomes
> a pain to teach people the same thing about untrusted
> certificates. OK - other choices - for Exchange 2007 you are
> talking about 2 SSL (I'll show you the bypass to get it to 1
> later), one for mail.domain.com and another for
> autodiscover.domain.com, that means if you've done any
> research on the subject that you need an SSL cert that
> supports SAN (Subject Alternative Name). At present the
> cheapest one is $200/year, others are considerably more
> expensive. Better but even $200/year i find a little steep if
> all you need is just a CAS certificate (exchange 2003
> front-end certs are easily <$100). On top of this you may
> already have a mail.domain.com cert that would now be
> useless. I have a mail.domain.com cert from GoDaddy which
> cost $20/year (or less) and that is the one that i will be using.
> Getting Started:
> To start off I did a clean install of windows 2003 x64, setup
> DNS, WINS (if necessary), DHCP, IIS in that order, a fairly
> typical PDC. Then a standard install of Exchange 2007, there
> a few extra programs and hotfixes to install but the install
> program is good about telling you what you need. A little
> note, you can install the Exchange tools on a 32 bit machine
> to do most of the administration from a client machine. Ok so
> you have a clean Exchange install, let's configure it.
> To allow Exchange to accept connections from other mail
> server, open Exchange Management Shell (EMS)
> Run the following command;
> Set-RecieveConnector -Identity "Default <ServerName>"
> -PermissionGroups "AnonymousUsers"
> Replace <ServerName> with your CAS name. Close the EMS
> To allow Exchange to send mail to other mail servers, open
> Exchange Management Console (EMC), open Organization
> Configuration->Hub Transport, click on 'Send Connectors',
> Right click (RC) in the 'Send Connectors' box and select 'New
> Send Connector', choose a name, for example 'All Outgoing
> Connector', leave the 'Select the intended...' as Custom, for
> the Address Space click the 'Add' button and enter * in the
> Add Address Space window marked Domain, to accept SMTP
> connections from all domains, leave the 'Include all
> subdomains' unchecked. In Network settings leave all values
> at their default settings, in 'Source Server' again leave the
> default values, and finally in 'New Connector' click on 'New'
> to create the connector.
> At this point Exchange should be able to send & receive mail.
> At this point if you are going to support Outlook with RPC
> over HTTP you will need to install that service, go to
> Control Panel->Add/Remove Programs->Add/Remove Windows
> Components, Select Networking Services, click on details,
> click the 'RPC over HTTP Proxy', click 'ok', Click 'next',
> make sure Windows has access to the install source, after the
> proxy is installed, click 'Next'.
> Now you need to remove the Exchange self-signed cert, Open up
> IIS manager (Administrative Tools->Internet Information
> Services (IIS) Manager), Open the Server subfolder, open the
> 'Web Sites' folder, and open the 'Default Web Site', there
> will be several virtual directories (VD) below the DWS
> including owa, and Autodiscover. RC the DWS and select
> Properties, then click the 'Directory Security' tab, then
> click 'Server Certificate' and then click 'Next' at the SSL
> welcome wizard. The next step depends if you already have an
> SSL certificate for mail.domain.com or not. If you do then
> click 'Replace the current certificate' and follow the
> instructions. If you do not have an SSL certificate then
> select the 'Remove the current certificate'. The latter will
> only remove the certificate from the DWS, it will stay in the
> windows certificate store so if you ever need it in the
> future you can always get it back. After you remove the
> certificate, re-run the wizard and it should ask you to go
> through the process of asking for an SSL certificate, follow
> the wizard which will create an certreq.txt file which you
> will need to make the application at a Certification
> Authority (CA) company, such as GoDaddy or others. I will
> leave this to you to follow since the process varies a bit
> from CA to CA (ie for GoDaddy you need to install an
> intermediate certificate, which may not be necessary for more
> expensive CAs. I am using a turbo ssl cert which is
> registered for mail.domain.com and costs $20/year.
> At this point you should have your mail.domain.com cert on
> the DWS, and any other intermediate certs installed.
> Next lets change owa so you need to just enter your username
> and not domain\username; In EMC go to Server
> Configuration->Client Access, RC the owa (DWS) click
> Properties, click the authentication tab, select the 'use
> forms-based authentication:' and then select the 'User name
> only', then click on Browse and choose your logon domain.
> Click 'Ok' to exit.
> To install Outlook Anywhere in EMC go to Server
> Configuration->Client Access, RC the server and select
> 'Enable Outlook Anywhere', for the External host name use:
> mail.domain.com , External authentication methods: choose
> NTLM authentication, do not select 'Allow secure channel
> (SSL) offloading', click Finish to exit.
> Next we need to change the URLs used autodiscover so that all
> services point to mail.domain.com.
> In EMC go to Server Configuration->Client Access choose the
> Offline Address Book (OAB) Distribution tab, RC the OAB (DWS)
> and select properties, Click on the URLs tab and put in:
> https://mail.domain.com/oab for both both internal and
> external URLs. Click 'Ok' to accept and exit.
> Do the same for owa by going to Server Configuration->Client
> Access (Outlook Web Access tab) andRC the owa (DWS) and
> choose properties, on the General tab change the Internal and
> External URLs to: https://mail.domain.com/owa , click
> 'Apply', an extra feature you may want to give is access to
> network shares through owa, this is available on the
> Documents box in owa, if you do then go to the 'Remote File
> Servers' tab and click the 'Configure' button on the bottom,
> enter the domain you are using, ie for mail.domain.com you
> would put domain.com, click 'add' then click 'ok' to exit.
> Then click on the 'Allow' button and enter the FQDN of your
> CAS, ie if the CAS computer name is mx1.domain.com, then
> enter mx1.domain.com and click 'add' then 'ok'. This will
> give owa users access to any network shares that exist on
> mx1. Click 'ok' to save and exit. If you do not want this
> then disregard that previous procedure and click 'ok' to exit.
> Next we'll change the URLs for the Unified Messaging, while
> this step is probably not necessary for most people, it will
> look better at the end. However to change the URLs we need to
> go to the EMS.
> Open the EMS and enter the following command;
> Set-UMVirtualDirectory "UnifiedMessaging (Default Web Site)"
> -InternalURL
> https://mail.domain.com/Unifiedmessaging/Service.asmx
> -ExternalURL https://mail.domain.com/Unifiedmessaging/Service.asmx
> Next we change the URLs of the Availability service which
> will also be the same for OOF, in EMS enter the following command;
> Set-WebServicesVirtualDirectory -Identity "EWS*" -InternalURL
> https://mail.domain.com/EWS/Exchange.asmx -ExternalURL
> https://mail.domain.com/EWS/Exchange.asmx
> Finally we set the autodiscover URL, now this is a little
> special since it is not possible to set the external URL of
> autodiscover. Outlook 2007 is set to look for
> autodiscover.domain.com or domain.com/autodiscover, and this
> is in my opinion where all the security alert mess comes
> from. Anyways in the EMS enter the following command;
> Set-ClientAccessServer -Identity "your CAS server name (ie
> mx1)" -AutoDiscoverServiceInternalUri
> https://mail.domain.com/autodiscover/autodiscover.xml
> Ok all done with EMS, you can close it and go to your DNS
> management, Administrative tools->DNS. First in the Foward
> Lookup Zone (FLZ) for domain.com, RC the domain.com and
> select 'New Host (A)', enter: mail ,for the name and input
> the Internal IP of your CAS. Next RC the FLZ under your
> server and select 'New Zone', click 'Next' at the wizard
> introduction, leave the zone type as Primary and
> ActiveDirectory integrated, click 'Next', leave the zone
> replication on the default, which is to all domain dns
> servers, click 'Next', For the name enter:
> autodiscover.domain.com , click 'Next', for the dynamic
> updates change the setting to 'Allow both unsecure and secure
> dynamic updates, click 'next then click 'Finish'. Now RC the
> new autodiscover.domain.com and select 'New Alias (CNAME)',
> leave the name field blank and just click on the Browse
> button, In the new browse window, double-click (DC) the
> server name, DC the FLZ folder, DC domain.com and then select
> the mail entry, click 'ok' to complete. You can now close DNS.
> I would recommend restarting the server to insure that the
> new settings are accepted. One thing you will want to check
> after the restart is to go to EMC->Server
> Configuration->Mailbox, RC the mailbox database, select
> properties, click on the 'Client Settings' tab and verify
> that you have the 'Default Offline Address Book' listed in
> the Offline address Book window, if not click on the Browse
> button and select it. If it was not there then restart the
> server again after you have selected it.
> Ok almost done! You should be able to start up a Outlook 2007
> client and when adding an exchange mail account it should use
> the autodiscover feature to get all the URLs. Hopefully
> everything should work, if you do get a Security Alert
> windows then try restarting the client and server, also
> verify that the SSL cert is accepted on the client. If
> everything did go well then Outlook can connect and
> send/receive from exchange. Now you can check that all the
> URLs are pointing to mail.domain.com, while holding down the
> left 'Ctrl' button RC the Outlook icon in the system tray,
> this should give you a menu which has 'Test e-mail
> Autoconfiguration' in the test window, enter your email (ie
> user@xxxxxxxxxx), unselect the "use guesssmart" and "secure
> guesssmart authentication" then click 'Test'
> If everything goes well then you should have 2 sections after
> the results come in, one for Exchange RPC and the other
> Exchange HTTP. The RPC is for LAN connections and HTTP is for
> HTTP connections. In both sections all the URLs should start
> https://mail.domain.com
> If this is not the case then go back and find the problem.
> Another test to do is to verify that your OWA is working
> internally. If you open Internet Explorer (IE) and enter
> https://mail.domain.com/owa , don't forget to change domain
> to whatever your domain is. This should give you the OWA
> login webpage, if not then go back and find the problem. You
> should not have any Security Alerts with the OWA.
>  If this is ok then your 200x Outlook clients should be
> working ok internally and your 2003 clients should be ok
> externally. However if you try your Outlook 2007 clients from
> the internet you will probably find that they give a Security
> Alert, and that is because they are looking for either an SSL
> with a name of autodiscover.domain.com or domain.com. Since
> yours is for mail.domain.com it will give a name mismatch
> error. To resolve this you must access your external dns
> entries which are usually handled by your hosting provider.
> For your external DNS you will have a MX record for where
> your mail is sent and probably entries for www, ftp, etc.
> These are the way that computers on the internet find
> domain.com resources. Usually it takes 4 to 24 hours for
> adding or changing the external DNS entries to actually start
> redirecting clients, so don't expect just because you changed
> the MX record that your email will be redirected right away.
> The setup is very similar to the DNS entries for the internal
> network, for the external DNS entries you will have the MX
> record to point to mail.domain.com (MX cannot point to an
> IP), you will need a Host record (A) that is for
> mail.domain.com which points to your external IP and finally
> an Alias (CNAME) entry for autodiscover.domain.com which will
> point to mail.domain.com.
> This way when Outlook 2007 is on the internet and asks
> joeblow_nameserver for autodiscover.domain.com it will be
> sent to your external DNS entries where it will find
> autodiscover.domain.com which is an alias for
> mail.domain.com, the exact details of why outlook accepts it
> i am not sure, but it doesn't give me any complaints. So this
> way you don't need multiple external IPs (expensive), nor SAN
> SSL certificates (unnecessary and expensive), nor create
> multiple internal websites (unnecessary).
> I have been using this for a few weeks now and everything
> appears normal and stable, i have been using Outlook 2007, i
> have not tested this on Outlook 2003 however i do not think
> there should be any problems. The OWA and Outlook clients
> have no problems connecting, the only thing which i find a
> bit un-normal is that it seems to take about 2 minutes for
> Outlook to connect and synchronize, with Exchange 2003 and
> Outlook 2003 it seems to be quite a bit faster, if anyone can
> comment on this I'd appreciate any insight.
> I have tested this also with Windows Mobile 2003SE and the
> activesync works well, if you have the GoDaddy cert you will
> need to add the CA cert to the WM2003 trusted root store,
> then after that it connects fine.
> Most of this information is around the internet but I thought
> this would be useful to write down in one place since i
> didn't find much information about external DNS settings. I
> did leave out some extra information about redirecting the
> OWA URL, which allows users to log into the port 80 http owa
> url and then get redirected to the 443 https url, however i
> am not really satisfied with the current method of the
> redirect html page. If i find something i'll post back.
> Anyways i hope this give some insight for some and will help
> with the installation.
>
> Heh heh...Steve
>
>
> -----Original Message-----
> From: isapros-bounce@xxxxxxxxxxxxx
> [mailto:isapros-bounce@xxxxxxxxxxxxx] On Behalf Of Jason Jones
> Sent: Thursday, September 20, 2007 11:16 AM
> To: isapros@xxxxxxxxxxxxx
> Subject: [isapros] Re: ISA and SAN Certs
>
> The fact is you just can't be sure, in my book, that makes is
> useless if you want to provide a robust solution and not have
> to worry about use location/infrastucture...anyhow, just
> testing my logic before I decide what to tell customers...
>
> -----Original Message-----
> From: isapros-bounce@xxxxxxxxxxxxx
> [mailto:isapros-bounce@xxxxxxxxxxxxx] On Behalf Of Jim Harrison
> Sent: 20 September 2007 15:05
> To: isapros@xxxxxxxxxxxxx
> Subject: [isapros] Re: ISA and SAN Certs
>
> That's kinda myopic...
> Your statement suggests that you think all OL clients will be
> found behind CERN or SOCKS proxies.  That just ain't true.
> Most folks at home use some CompIsUs $25 toy that barely
> qualifies as a NAT device; much less a firewall or proxy.  In
> this case, the SRV record lookup will (may?) work.
>
>
> -----Original Message-----
> From: isapros-bounce@xxxxxxxxxxxxx
> [mailto:isapros-bounce@xxxxxxxxxxxxx] On Behalf Of Jason Jones
> Sent: Thursday, September 20, 2007 7:00 AM
> To: isapros@xxxxxxxxxxxxx
> Subject: [isapros] Re: ISA and SAN Certs
>
> How about we look at it like this; the SRV solution, in
> reality, is useless! :-P
>
> -----Original Message-----
> From: isapros-bounce@xxxxxxxxxxxxx
> [mailto:isapros-bounce@xxxxxxxxxxxxx] On Behalf Of Jim Harrison
> Sent: 20 September 2007 14:48
> To: isapros@xxxxxxxxxxxxx
> Subject: [isapros] Re: ISA and SAN Certs
>
> I see what you mean.
> Look at it this way - the benefit for a SRV record in this
> case is to specify a non-standard port if one is required.
>
> -----Original Message-----
> From: isapros-bounce@xxxxxxxxxxxxx
> [mailto:isapros-bounce@xxxxxxxxxxxxx] On Behalf Of Jason Jones
> Sent: Thursday, September 20, 2007 3:29 AM
> To: isapros@xxxxxxxxxxxxx
> Subject: [isapros] Re: ISA and SAN Certs
>
> From what I can tell, OA looks for the A record first, this
> is the bit that seems silly...especially when combined with
> the issues of SRV and CERN proxies.
>
> Quote from KB:
>
> In this example, the Autodiscover service does the following
> when the client tries to contact the Autodiscover service:
>
> 1. Autodiscover posts to
> https://contoso.com/Autodiscover/Autodiscover.xml. This fails.
> 2. Autodiscover posts to
> https://autodiscover.contoso.com/Autodiscover/Autodiscover.xml
> . This fails.
> 3. Autodiscover performs the following redirect check:
> GET http://autodiscover.contoso.com/Autodiscover/Autodiscover.xml
> This fails.
> 4. Autodiscover uses DNS SRV lookup for
> _autodiscover._tcp.contoso.com, and then "mail.contoso.com"
> is returned.
> 5. Outlook asks permission from the user to continue with
> Autodiscover to post to
> https://mail.contoso.com/autodiscover/autodiscover.xml.
> 6. Autodiscover's POST request is successfully posted to
> https://mail.contoso.com/autodiscover/autodiscover.xml.
>
> The Outlook 2007 "Test E-Mail Auto Configuration" utility
> also follows the same sequence of doing A records first.
>
> JJ
>
> -----Original Message-----
> From: isapros-bounce@xxxxxxxxxxxxx
> [mailto:isapros-bounce@xxxxxxxxxxxxx] On Behalf Of Jim Harrison
> Sent: 20 September 2007 01:03
> To: isapros@xxxxxxxxxxxxx
> Subject: [isapros] Re: ISA and SAN Certs
>
> Actually, what I'm saying is that if OL 2003/7 is operating
> as a CERN proxy client, it performs absolutely no name
> queries at all; regardless of whether the name is listed as
> an A, SRV, TXT, CNAME, etc. record.  This is the basic nature
> of a CERN proxy client; it sends a "gimme this, wouldya?"
> request without regard for how the endpoint might be
> resolved.  Thus, OL will never communicate with a DNS server
> in this scenario.
>
> The egress proxy will seek an A record, since there is no way
> for the CERN proxy client to specify how the proxy should
> resolve the destination (it's just not part of the protocol).
>
> You're correct that you have to maintain A as well as SRV
> records if you intend to support CERN proxy as well as
> direct-connected clients.  I'm not sure how "silly" this is,
> since CERN proxy mechanisms existed long before OL started
> using autodiscover.  AFAIK, OL will seek the SRV record
> first, since this is much more informative than the A record.
>
> Jim
>
> -----Original Message-----
> From: isapros-bounce@xxxxxxxxxxxxx
> [mailto:isapros-bounce@xxxxxxxxxxxxx] On Behalf Of Jason Jones
> Sent: Tuesday, September 18, 2007 3:42 PM
> To: isapros@xxxxxxxxxxxxx
> Subject: [isapros] Re: ISA and SAN Certs
>
> Hi Jim,
>
>
>
> So, in reality, we are saying that you can never be sure
> Outlook 2007 will work correctly with SRV records if you are
> unsure if the client will ever be working from behind a CERN proxy??
>
>
>
> This seems a little silly as the SRV check is the last in the
> list, so therefore you will always need an A record for
> autodiscover.domain.com to cater to clients that *may* be
> behind a proxy. If this A record exists, surely Outlook will
> never actually use the SRV record (as it is only used if the
> A record cannot be found) and you still need ISA publishing
> and certs for autodiscover.domain.com to allow for "behind
> proxy" outlook clients...
>
>
>
> As we provide solution for customers, I cannot really afford
> to deploy a solution that may or may not work depending on
> whether the Outlook client is behind a proxy or not. So I
> feel forced to have to go with the A record method
> (reluctantly) to avoid potentially embarrassing questions
> when a CEO cannot get OA to work when at an internet café
> that uses a CERN proxy...
>
>
>
> Am I way off base here or does the logic seem wrong to you???
>
>
>
> Cheers
>
>
>
> JJ
>
>
>
> From: isapros-bounce@xxxxxxxxxxxxx
> [mailto:isapros-bounce@xxxxxxxxxxxxx] On Behalf Of Jim Harrison
> Sent: 31 August 2007 15:00
> To: isapros@xxxxxxxxxxxxx
> Subject: [isapros] Re: ISA and SAN Certs
>
>
>
> The problem is that many applications operating behind CERN,
> SOCKS or Socket proxies can't use SRV records.
>
> 1.      CERN proxy clients *never* perform name resolution
> for themselves other than to determine if a host is local or
> remote.  When it comes time to make the connection, OL (for
> instance), will simple send a "GET
> http://autodiscover.domain.tld/autodiscover.xml"; via its
> local CERN proxy.  The proxy assumes that it should resolve
> "autodiscover.domain.tld" using an A record query and
> continues on that basis  If all you build is a SRV record,
> this connection will fail.
>
> 2.      SOCKS proxy clients *may* self-resolve names; it
> depends on the SOCKS version in use by the application and
> SOCKS proxy.  For the record, ISA operates as SOCKS 4.3A,
> meaning that it is capable of performing name resolution on
> behalf of the client.  If the application knows that it is
> speaking to a SOCKS4.3a proxy, it will make the connection
> request using the hostname.  In this case, the proxy handles
> name resolution in the same way that a CERN proxy does.  If
> the SOCKS proxy is operating as SOCKS4 or earlier and the
> application knows this, the application is required to
> perform its own name resolution.
>
> 3.      Socket proxy (think FWC) clients will perform name
> resolution as if they had access to the 'Net.  How this
> process is handled depends on how the client makes the name
> lookup request.  If it (as OL does) makes a Winsock
> GetHostByname or GetAddrInfo call, they don't specify the
> type of record they want, and Winsock (and the Winsock
> LSP/BSP) will send it to the proxy as received.
>
>
>
> IOW, it's a rare case where a proxy-served client will even
> seek; much less receive the SRV record.
>
>
>
> Jim
>
>
>
> From: isapros-bounce@xxxxxxxxxxxxx
> [mailto:isapros-bounce@xxxxxxxxxxxxx] On Behalf Of Thomas W Shinder
> Sent: Friday, August 31, 2007 6:42 AM
> To: isapros@xxxxxxxxxxxxx
> Subject: [isapros] Re: ISA and SAN Certs
>
>
>
> Hi Jason,
>
>
>
> OK, that makes perfect sense and it's the scenario I'm
> testing today. One listener, one rule for Outlook Anywhere
> and one rule for Autodiscovery, correct?
>
>
>
> So I was right that you can't use the /AutoDiscover path that
> is included in the Outlook Anywhere rule since the Outlook
> Anywhere rule doesn't respond to the public name
> autodiscover.domain.com. The Outlook Autodiscover rule would
> respond to autodiscover.domain.com and forward to the
> /AutoDiscover path.
>
>
>
> The SRV record solution will solve ALL of this complexity
> because it will bypass the need for a second URL and second
> IP address and second certificate. However, its a hotfix that
> you have to call PSS to download and will be included with
> Office 2007 SP1.
>
>
>
>
>
>
>
>
>
>
> Thanks!
>
> Tom
>
>
>
> Thomas W Shinder, M.D.
> Site: www.isaserver.org <http://www.isaserver.org/>
> Blog: http://blogs.isaserver.org/shinder/
> Book: http://tinyurl.com/3xqb7
> MVP -- Microsoft Firewalls (ISA)
>
>
>
>
>
> ________________________________
>
>         From: isapros-bounce@xxxxxxxxxxxxx
> [mailto:isapros-bounce@xxxxxxxxxxxxx] On Behalf Of Jason Jones
>         Sent: Friday, August 31, 2007 8:15 AM
>         To: isapros@xxxxxxxxxxxxx
>         Subject: [isapros] Re: ISA and SAN Certs
>
>         Yep - one listener, two IPs, each IP assigned a
> different SSL cert.
>
>
>
>         Not sure if the SRV record will negate the need for
> the autodiscover URL and hence allow us to get away with a
> single SSL cert - have to check this...
>
>
>
>         From: isapros-bounce@xxxxxxxxxxxxx
> [mailto:isapros-bounce@xxxxxxxxxxxxx] On Behalf Of Thomas W Shinder
>         Sent: 31 August 2007 14:13
>         To: isapros@xxxxxxxxxxxxx
>         Subject: [isapros] Re: ISA and SAN Certs
>
>
>
>         Hi Jason,
>
>
>
>         One Web listener, but two IP addresses are being used
> by the Web listener, correct?
>
>
>
>         Thanks!
>
>         Tom
>
>
>
>         Thomas W Shinder, M.D.
>         Site: www.isaserver.org <http://www.isaserver.org/>
>         Blog: http://blogs.isaserver.org/shinder/
>         Book: http://tinyurl.com/3xqb7
>         MVP -- Microsoft Firewalls (ISA)
>
>
>
>
>
> ________________________________
>
>                 From: isapros-bounce@xxxxxxxxxxxxx
> [mailto:isapros-bounce@xxxxxxxxxxxxx] On Behalf Of Jason Jones
>                 Sent: Friday, August 31, 2007 6:50 AM
>                 To: isapros@xxxxxxxxxxxxx
>                 Subject: [isapros] Re: ISA and SAN Certs
>
>                 Hi Tom,
>
>
>
>                 Managed to get this working today too,
> although I am using two individual certs on the same external
> web listener. The internal cert on Exchange is SAN'd up and
> ISA publishes everything to the internal cert common name
> irrespective of the public URL.
>
>
>
>                 The key to most of it working is defining
> correct URLs in Exchange where is defines "External URLs" for
> things like OOF, OAB, EWS etc.
>
>
>
>                 Now we have all exchange 2k7 services (and
> all the new funky stuff) working externally...had to do a lot
> of it by investigation and cobbling blog entries together,
> not ideal, but go there at last.
>
>
>
>                 We currently have it working without SRV
> records, but just waiting for the ISP to add these records to
> test if that is a better solution...
>
>
>
>                 Cheers
>
>
>
>                 JJ
>
>
>
>                 From: isapros-bounce@xxxxxxxxxxxxx
> [mailto:isapros-bounce@xxxxxxxxxxxxx] On Behalf Of Thomas W Shinder
>                 Sent: 31 August 2007 00:32
>                 To: isapros@xxxxxxxxxxxxx
>                 Subject: [isapros] Re: ISA and SAN Certs
>
>
>
>                 I'd think that Jim might need to update his
> SAN article. The article implies that ISA doesn't support
> SANs on the Web listener, however I have a guy who has the
> autodiscover FQDN as a second SAN on the certificate bound to
> his Web listener and he's shown me strong evidence that it
> actually works, even though it shouldn't.
>
>
>
>                 I wish the Exchange or ISA UE teams could get
> it together to explain how to get autodiscovery working
> correctly and more importantly, show us how it works with and
> without DNS SRV records. It looks like once you have DNS SRV
> records, its a no brainer.
>
>
>
>                 Tom
>
>
>
>                 Thomas W Shinder, M.D.
>                 Site: www.isaserver.org <http://www.isaserver.org/>
>                 Blog: http://blogs.isaserver.org/shinder/
>                 Book: http://tinyurl.com/3xqb7
>                 MVP -- Microsoft Firewalls (ISA)
>
>
>
>
>
> ________________________________
>
>                         From: isapros-bounce@xxxxxxxxxxxxx
> [mailto:isapros-bounce@xxxxxxxxxxxxx] On Behalf Of Thomas W Shinder
>                         Sent: Wednesday, August 29, 2007 2:38 PM
>                         To: isapros@xxxxxxxxxxxxx
>                         Subject: [isapros] Re: ISA and SAN Certs
>
>                         Never mind :)
>
>
>
>                         I found it:
>
>
>
>                         http://support.microsoft.com/kb/940881
>
>
>
>                         Thomas W Shinder, M.D.
>                         Site: www.isaserver.org
> <http://www.isaserver.org/>
>                         Blog: http://blogs.isaserver.org/shinder/
>                         Book: http://tinyurl.com/3xqb7
>                         MVP -- Microsoft Firewalls (ISA)
>
>
>
>
>
> ________________________________
>
>                                 From:
> isapros-bounce@xxxxxxxxxxxxx
> [mailto:isapros-bounce@xxxxxxxxxxxxx] On Behalf Of Thomas W Shinder
>                                 Sent: Wednesday, August 29,
> 2007 2:35 PM
>                                 To: isapros@xxxxxxxxxxxxx
>                                 Subject: [isapros] Re: ISA
> and SAN Certs
>
>                                 OK, that's an interesting
> sentence in a KB OL update article. But there's no mention of
> this anywhere else on the ms.com site.
>
>
>
>                                 In addition, how do we
> configure the SRV records?
>
>
>
>                                 Service?
>
>                                 Protocol?
>
>                                 Priority?
>
>                                 Weight?
>
>                                 Port number?
>
>                                 Host offering this service?
>
>
>
>                                 cid:image001.jpg@01C7F522.ABDB5600
>
>
>
>                                 I try to read minds best as I
> can, but I'm flailing on this one :))
>
>
>
>
>
>
>
>                                 Thomas W Shinder, M.D.
>                                 Site: www.isaserver.org
>                                 Blog:
> http://blogs.isaserver.org/shinder/
>                                 Book: http://tinyurl.com/3xqb7
>                                 MVP -- Microsoft Firewalls (ISA)
>
>
>
>                                 > -----Original Message-----
>                                 > From: isapros-bounce@xxxxxxxxxxxxx
>                                 >
> [mailto:isapros-bounce@xxxxxxxxxxxxx] On Behalf Of Jim Harrison
>                                 > Sent: Wednesday, August 29,
> 2007 2:27 PM
>                                 > To: isapros@xxxxxxxxxxxxx
>                                 > Subject: [isapros] Re: ISA
> and SAN Certs
>                                 >
>                                 > DatzDeWun!  O'curse it
> works in real life; I tested it.
>                                 >
>                                 >
> http://support.microsoft.com/kb/939184
>                                 > OL 2K7 seeks a
> "autodiscovery" SRV record first, and only if
>                                 > that fails,
>                                 > it'll seek the A record.
> This is based on the same domain suffix as
>                                 > specified in the mail domain.
>                                 > If your OL client is behind
> a CERN proxy (and it knows it), it can't
>                                 > specify that the proxy
> should look up a SRV record for
>                                 > autodiscover.sfx.
>                                 > The proxy assumes that any
> CERN request will be for a "host"
>                                 > and makes a
>                                 > DNS query for an A record.
>                                 >
>                                 > OL 2K7 uses the SRV record
> to discover the host
>                                 >
>                                 > -----Original Message-----
>                                 > From: isapros-bounce@xxxxxxxxxxxxx
>                                 >
> [mailto:isapros-bounce@xxxxxxxxxxxxx]
>                                 > On Behalf Of Thomas W Shinder
>                                 > Sent: Wednesday, August 29,
> 2007 12:15 PM
>                                 > To: isapros@xxxxxxxxxxxxx
>                                 > Subject: [isapros] Re: ISA
> and SAN Certs
>                                 >
>                                 > BAM!!!!
>                                 >
>                                 > I think I get it. On the TO
> tab for the autodiscover.msfirewall.org, I
>                                 > can still use
> owa.msfirewall.org since it resolves to the same IP
>                                 > address as
> autodiscover.msfirewall.org on the internal network -- and
>                                 > the path is going to
> /autodiscover, so that's cool. It's all making
>                                 > sense on paper -- now to
> see if it works in real life :)
>                                 >
>                                 > BTW -- why do I need a SRV
> record for OL autodiscovery? I haven't seen
>                                 > any documentation on that
> requirement on the Exchange side.
>                                 >
>                                 > Thanks!
>                                 > Tom
>                                 >
>                                 > Thomas W Shinder, M.D.
>                                 > Site: www.isaserver.org
>                                 > Blog:
> http://blogs.isaserver.org/shinder/
>                                 > Book: http://tinyurl.com/3xqb7
>                                 > MVP -- Microsoft Firewalls (ISA)
>                                 >
>                                 >
>                                 >
>                                 > > -----Original Message-----
>                                 > > From: isapros-bounce@xxxxxxxxxxxxx
>                                 > >
> [mailto:isapros-bounce@xxxxxxxxxxxxx] On Behalf Of Jim Harrison
>                                 > > Sent: Wednesday, August
> 29, 2007 2:09 PM
>                                 > > To: isapros@xxxxxxxxxxxxx
>                                 > > Subject: [isapros] Re:
> ISA and SAN Certs
>                                 > >
>                                 > > Yes; I'd forgotten about
> the OL client's "SAN problem".
>                                 > > It amazed me how much
> noise the Exch folks make about the same
>                                 > > limitation for ISA..
> ..but I digress.
>                                 > >
>                                 > > "Web Publishing Rule that
> is publishing the
>                                 > >
> autodiscover.msfirewall.org/autodiscover path must be
>                                 > > configured on the
>                                 > > TO tab to use
> autodiscover.msfirewall.org " - how do you
>                                 > cone to that
>                                 > > contusion?
>                                 > > Why do you think you need
> to use "autodiscover" in the ISA rule
>                                 > > published hostname?  Use
> whatever works for ISA and let the
>                                 > > client be as
>                                 > > stupid as you want.
>                                 > >
>                                 > > -----Original Message-----
>                                 > > From: isapros-bounce@xxxxxxxxxxxxx
>                                 > >
> [mailto:isapros-bounce@xxxxxxxxxxxxx]
>                                 > > On Behalf Of Thomas W Shinder
>                                 > > Sent: Wednesday, August
> 29, 2007 12:05 PM
>                                 > > To: isapros@xxxxxxxxxxxxx
>                                 > > Subject: [isapros] Re:
> ISA and SAN Certs
>                                 > >
>                                 > > Hi Jim,
>                                 > >
>                                 > > CIL...
>                                 > >
>                                 > > Thomas W Shinder, M.D.
>                                 > > Site: www.isaserver.org
>                                 > > Blog:
> http://blogs.isaserver.org/shinder/
>                                 > > Book: http://tinyurl.com/3xqb7
>                                 > > MVP -- Microsoft Firewalls (ISA)
>                                 > >
>                                 > >
>                                 > >
>                                 > > > -----Original Message-----
>                                 > > > From:
> isapros-bounce@xxxxxxxxxxxxx
>                                 > > >
> [mailto:isapros-bounce@xxxxxxxxxxxxx] On Behalf Of Jim Harrison
>                                 > > > Sent: Wednesday, August
> 29, 2007 1:49 PM
>                                 > > > To: isapros@xxxxxxxxxxxxx
>                                 > > > Subject: [isapros] Re:
> ISA and SAN Certs
>                                 > > >
>                                 > > > All good points, but
> really orthogonal to the question of how ISA
>                                 > > > handles SAN certs.
> Actually, I wrote that because some folks were
>                                 > > > whining about how ISA
> handled SAN certs in general.  In
>                                 > > fact, I tried
>                                 > > > not to delve into the
> variant forms of self-inflicted ISA
>                                 > manglement
>                                 > > > pain that were filling
> other blogs.
>                                 > > >
>                                 > > > Q1 - Why do you need a
> second listener?  Use your DNS to point
>                                 > > > autodiscover to the
> same Exch listener.  The public name is a
>                                 > > > rule; not
>                                 > > > a listener arttribute.
>                                 > >
>                                 > > TOM: We need a second
> listener because we can't have two
>                                 > certificates
>                                 > > with different common
> names listening on the same listener using the
>                                 > > same IP address. OK, in
> ISA 2006 I *can* use multiple
>                                 > > certificates using
>                                 > > the same listener, but
> each of the certificates must be
>                                 > assigned to a
>                                 > > different IP address, so
> no big deal there -- so I create two
>                                 > > different
>                                 > > Web Publishing Rules --
> one for owa.msfirewall.org and a second Web
>                                 > > Publishing Rule for
> autodiscover.msfirewall.org. So far so
>                                 > > good and SANs
>                                 > > aren't even an issue.
>                                 > >
>                                 > > > Q2 - why does the
> external OL client give a rats bahootie
>                                 > > > what's listed
>                                 > > > in the cert used at the
> CAS?  It never sees it.
>                                 > >
>                                 > > TOM: That's true and I
> didn't mean to imply that it did. The
>                                 > > concern is
>                                 > > that common name and the
> first SAN on the Web site
>                                 > > certificate bound to
>                                 > > the Client Access Server
> site is owa.msfirewall.org. The
>                                 > second SAN is
>                                 > > autodiscover.msfirewall.org
>                                 > >
>                                 > >
>                                 > > > Q3 - why is the lack of
> the autodiscover.suffix public
>                                 > name make the
>                                 > > > /autodiscover path
> "useless"?  "Incomplete" perhaps, but
>                                 > > > hardly useless.
>                                 > >
>                                 > > TOM: Because the OWA
> publishing rule is listening for
>                                 > > owa.msfirewall.org, NOT
> autodiscover.msfirewall.org. Since
>                                 > > there are two
>                                 > > certificates involved
> here, one with the common name
>                                 > > owa.msfirewall.org
>                                 > > and a second with
> autodiscover.msfirewall.org -- we have to use two
>                                 > > different IP addresses,
> and owa.msfirewall.org is NOT going
>                                 > to resolve
>                                 > > to the same IP address as
> autodiscover.msfirewall.org. Thus,
>                                 > > adding the
>                                 > > /autodiscover path to the
> owa.msfirewall.org Web Publishing
>                                 > Rule won't
>                                 > > work and is extraneous.
> The /autodiscover path only applies to the
>                                 > >
> autodiscover.msfirewall.org Web Publishing Rule.
>                                 > >
>                                 > > >
>                                 > > > IOW, create your SRV
> and A records for autodiscover.suffix, add
>                                 > > > "autodiscover.suffix"
> to the public names (ISA 2006 only) and
>                                 > > > make sure
>                                 > > > the cert used in the
> ISA web listener includes
>                                 > > > "autodiscover.suffix" in
>                                 > > > the SAN.
>                                 > >
>                                 > > Again, the issue isn't
> with the Web listeners, I have no
>                                 > problem with
>                                 > > that. The issue is with
> the connection between the ISA
>                                 > > Firewall and the
>                                 > > Client Access Server. The
> Web site certificate bound to the Client
>                                 > > Access Server has a
> common name and a first SAN name of
>                                 > > owa.msfirewall.org and a
> second SAN name of
>                                 > > autodiscover.msfirewall.org.
>                                 > >
>                                 > > Given that, the Web
> Publishing Rule that is publishing the
>                                 > >
> autodiscover.msfirewall.org/autodiscover path must be
>                                 > > configured on the
>                                 > > TO tab to use
> autodiscover.msfirewall.org -- HOWEVER, and
>                                 > this is THE
>                                 > > QUESTION -- with the ISA
> Firewall when establishing the SSL channel
>                                 > > between itself and the
> Client Access Server, be able to use
>                                 > the SECOND
>                                 > > SAN on the Client Access
> Server Web site certificate to allow the
>                                 > > connection?
>                                 > >
>                                 > > Make sense?
>                                 > >
>                                 > >
>                                 > > >
>                                 > > > Jim
>                                 > > >
>                                 > > > -----Original Message-----
>                                 > > > From:
> isapros-bounce@xxxxxxxxxxxxx
>                                 > > >
> [mailto:isapros-bounce@xxxxxxxxxxxxx]
>                                 > > > On Behalf Of Thomas W Shinder
>                                 > > > Sent: Wednesday, August
> 29, 2007 11:33 AM
>                                 > > > To: isapros@xxxxxxxxxxxxx
>                                 > > > Subject: [isapros] Re:
> ISA and SAN Certs
>                                 > > >
>                                 > > > This is a good step in
> understanding some of the issues,
>                                 > > but I suspect
>                                 > > > the major problems
> people are running into relates to
>                                 > publishing the
>                                 > > > autodisocvery site.
> You'll notice that when you run the Exchange
>                                 > > > Publishing Wizard in
> ISA 2006 that is includes an
>                                 > > /autodiscover path,
>                                 > > > which is completely
> useless, since the client is looking for
>                                 > > >
> autodiscover.domain.com/autodiscover and not the Client
>                                 > > Access Server
>                                 > > > Public Name, which
> would be something like owa.domain.com.
>                                 > > >
>                                 > > > OK, easy problem to
> solve, right? All we need to do is
>                                 > > create a second
>                                 > > > Web listener on a
> second IP address and configure it to listen for
>                                 > > > public name
> autodiscover.company.com.  HOWEVER, the Client Access
>                                 > > > Server's common/subject
> name and first SAN is owa.company.com. The
>                                 > > > second SAN is
> autodiscover.company.com.
>                                 > > >
>                                 > > > So, if we put on the TO
> tab autodiscover.company.com, will
>                                 > > ISA 2006 be
>                                 > > > able to "consume" the
> second SAN to support to the Outlook 2007
>                                 > > > autodiscovery service?
>                                 > > >
>                                 > > > Thanks!
>                                 > > > Tom
>                                 > > >
>                                 > > > Thomas W Shinder, M.D.
>                                 > > > Site: www.isaserver.org
>                                 > > > Blog:
> http://blogs.isaserver.org/shinder/
>                                 > > > Book: http://tinyurl.com/3xqb7
>                                 > > > MVP -- Microsoft Firewalls (ISA)
>                                 > > >
>                                 > > >
>                                 > > >
>                                 > > > > -----Original Message-----
>                                 > > > > From:
> isapros-bounce@xxxxxxxxxxxxx
>                                 > > > >
> [mailto:isapros-bounce@xxxxxxxxxxxxx] On Behalf Of Jim Harrison
>                                 > > > > Sent: Wednesday,
> August 29, 2007 1:10 PM
>                                 > > > > To: isapros@xxxxxxxxxxxxx
>                                 > > > > Subject: [isapros]
> ISA and SAN Certs
>                                 > > > >
>                                 > > > >
>                                 > > > > Another isablog for
> your reading pleasure.
>                                 > > > >
>                                 > > > >
>                                 > > > >
> http://blogs.technet.com/isablog/archive/2007/08/29/certificat
>                                 > > > > es-with-mu
>                                 > > > >
> ltiple-san-entries-may-break-isa-server-web-publishing.aspx
>                                 > > > >
>                                 > > > > All mail to and from
> this domain is GFI-scanned.
>                                 > > > >
>                                 > > > >
>                                 > > > >
>                                 > > > >
>                                 > > >
>                                 > > >
>                                 > > > All mail to and from
> this domain is GFI-scanned.
>                                 > > >
>                                 > > >
>                                 > > >
>                                 > > >
>                                 > >
>                                 > >
>                                 > > All mail to and from this
> domain is GFI-scanned.
>                                 > >
>                                 > >
>                                 > >
>                                 > >
>                                 >
>                                 >
>                                 > All mail to and from this
> domain is GFI-scanned.
>                                 >
>                                 >
>                                 >
>                                 >
>
> All mail to and from this domain is GFI-scanned.
>
>
> All mail to and from this domain is GFI-scanned.
>
>
>
>
>
> All mail to and from this domain is GFI-scanned.
>
>
>
>
>
> All mail to and from this domain is GFI-scanned.
>
>
>
>
>
>
>


Other related posts: