<div dir="ltr">Best solution in my mind is a url shortener. Just tell people to type go/cuic or go/finesse and it points to the correct url and the port number. Takes the complications out of the picture.<div class="gmail_extra"><div><div class="gmail_signature" data-smartmail="gmail_signature"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div style="color:rgb(0,0,0);font-family:Calibri,sans-serif;font-size:14px"><div style="font-family:Arial,sans-serif;font-size:12px;color:rgb(0,63,128)"><br></div>-Ankur</div></div></div></div></div></div></div></div></div></div></div>
<br><div class="gmail_quote">On Fri, Oct 21, 2016 at 4:57 AM, Norton, Mike <span dir="ltr"><<a href="mailto:mikenorton@pwsd76.ab.ca" target="_blank">mikenorton@pwsd76.ab.ca</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">It is not so much about compromising the redirect server, or cloud vs in-house, as compromising users' behaviour. Phishing is an attack on user behaviour (getting them to believe a fake site is real). By teaching users that it is perfectly normal to be redirected from the officially documented URI that they remember, to some complicated technical-looking URI that they don't comprehend, you are leaving them vulnerable to phishing. You want the normal user experience to be immediately obviously different than that link in the email message from "I.T. Department" asking to "verify your account," that redirects to some sneaky obfuscated URI hosting a fake login page. Redirects make it hard for users to tell if they actually ended up at the page they intended to, thus it is a way by which they could be tricked into using a fake page (phishing).<br>
<br>
-mn<br>
<br>
Sent from my Windows Phone<br>
______________________________<wbr>__<br>
From: Anthony Holloway<br>
Sent: 20/10/2016 5:05 PM<br>
To: Norton, Mike<br>
Cc: Cisco VoIP Group<br>
Subject: Re: [cisco-voip] DNS Friendly Names and URL Paths<br>
<span class=""><br>
So the cloud is a scary place, I see that. I wouldn't want to expose anyone to an extra risk. You could just avoid the whole attack vector thing by deploying a 100% on-prem solution though, no? And if you cannot trust your internal servers, then you're screwed either way.<br>
<br>
</span>Also, you cannot just throw out "attack vector" and "phishing" without backing that up. What sources can you cite that URL redirects are security risks? And not open redirect services either. The services I am referring to would not be open redirects<<a href="https://en.wikipedia.org/wiki/URL_redirection#Security_issues" rel="noreferrer" target="_blank">https://en.<wbr>wikipedia.org/wiki/URL_<wbr>redirection#Security_issues</a>>, rather they are protected/private, because you have to configure your own DNS to make it happen. URL shortening services are in use in our daily lives and they rely on the same exact techniques<<a href="https://en.wikipedia.org/wiki/URL_shortening#Techniques" rel="noreferrer" target="_blank">https://en.<wbr>wikipedia.org/wiki/URL_<wbr>shortening#Techniques</a>> I'm talking about here: HTTP 3XX Redirects. So, I'm not saying I'm a security expert, but I don't think it's fair to just say "It might get compromised, therefore it's bad." Otherwise, everything we do is bad, because everything is at risk. Even SSL itself<<a href="http://heartbleed.com/" rel="noreferrer" target="_blank">http://heartbleed.com/</a>><wbr>.<br>
<span class=""><br>
The problem with the reverse proxy/L7 load balance might be seen at the finesse level, as only a simple redirect is supported today, but otherwise, I would love more intelligence in the routing decision versus static redirects.<br>
<br>
And yes, of course, you could simply not bother, but seriously, I have yet to see an environment where bookmarks are pushed and documentation says "Look at your bookmarks to login to finesse." Instead, it has been a URL given to the users via documentation.<br>
<br>
</span>Perhaps a landing page akin to Google's old iGoogle<<a href="https://en.wikipedia.org/wiki/IGoogle" rel="noreferrer" target="_blank">https://en.wikipedia.<wbr>org/wiki/IGoogle</a>> could be used to ease the distribution and launching of app URLs. Some apps already have something simliar. Like when you go to the UCCX landing page there's a link for AppAdmin and CUIC. Too bad there's no link for Finesse. And too bad it looks like garbage. And too bad there's not like a single landing page for CUCM, CUC, UCCX, etc.<br>
<span class=""><br>
On Thu, Oct 20, 2016 at 5:14 PM, Norton, Mike <<a href="mailto:mikenorton@pwsd76.ab.ca">mikenorton@pwsd76.ab.ca</a><<wbr>mailto:<a href="mailto:mikenorton@pwsd76.ab.ca">mikenorton@pwsd76.ab.ca</a><wbr>>> wrote:<br>
I would be a bit wary of HTTP redirects being a convenient attack vector for phishing. Especially if they are happening over unencrypted HTTP and across the Internet. But even just behaviorally, I don’t think it is a good practice to get users comfortable seeing the “official” URIs be redirected to ugly technical-looking URIs. Makes it easier to trick them into using a fake page. If they’re used to always seeing a memorable simple and pretty URI, then they’re more likely to notice when something is amiss.<br>
<br>
An alternative would be to rewrite URIs with a reverse proxy (or L7 load balancer). This would avoid the need for redirects and would keep the user’s browser pointed at a nice pretty URI. As a security bonus, you’d be able to firewall direct L3 access to the application service, and also your client machines wouldn’t need to be allowed to access weird ports.<br>
<br>
Another option is to just not bother with friendly names, push favourites/bookmarks into users’ browsers (e.g. via group policy, mdm) and train them to get to the applications that way.<br>
<br>
-mn<br>
<br>
<br>
</span>From: cisco-voip [mailto:<a href="mailto:cisco-voip-bounces@puck.nether.net">cisco-voip-bounces@<wbr>puck.nether.net</a><mailto:<a href="mailto:cisco-voip-bounces@puck.nether.net">cisco-<wbr>voip-bounces@puck.nether.net</a>>] On Behalf Of Anthony Holloway<br>
<span class="">Sent: October-20-16 1:07 PM<br>
</span>To: Cisco VoIP Group <<a href="mailto:cisco-voip@puck.nether.net">cisco-voip@puck.nether.net</a><<wbr>mailto:<a href="mailto:cisco-voip@puck.nether.net">cisco-voip@puck.nether.<wbr>net</a>>><br>
<span class="">Subject: [cisco-voip] DNS Friendly Names and URL Paths<br>
<br>
Since the list is slow this week....<br>
<br>
Ever since the push for DNS and FQDN over IP Address, I have been giving application servers a Subject Alternative Name (SAN) so that users accessing Self-Care Portal, Finesse, etc. do not have to be bothered with server names.<br>
<br>
E.g.,<br>
Instead of this:<br>
<br>
<a href="https://mspvmcucm001.company.com/ucmuser" rel="noreferrer" target="_blank">https://mspvmcucm001.company.<wbr>com/ucmuser</a><br>
<br>
They would be able to use this:<br>
<br>
<a href="https://myphone.company.com/ucmuser" rel="noreferrer" target="_blank">https://myphone.company.com/<wbr>ucmuser</a><br>
<br>
That works pretty well, and Tomcat certs are easily signed to support the extra alias.<br>
<br>
However, when it comes to UCCX, it's a little more complicated with the following example:<br>
<br>
<a href="https://finesse.company.com:8445/desktop" rel="noreferrer" target="_blank">https://finesse.company.com:<wbr>8445/desktop</a><br>
<br>
Because the alias is not exactly fitting for all things on UCCX, such as:<br>
<br>
<a href="https://finesse.company.com:8444/cuic" rel="noreferrer" target="_blank">https://finesse.company.com:<wbr>8444/cuic</a><br>
<br>
That's confusing, and also because the user still has to remember the port and path on the end.<br>
<br>
<a href="https://finesse.company.com" rel="noreferrer" target="_blank">https://finesse.company.com</a> will not automatically take you to <a href="https://finesse.company.com:8445/desktop" rel="noreferrer" target="_blank">https://finesse.company.com:<wbr>8445/desktop</a><br>
<br>
Today I had a co-worker ask me how it might be possible to have both:<br>
<br>
A) A different alias for each sub-component of the application server (E.g., Finesse vs CUIC)<br>
<br>
B) Have the port and path appended automatically<br>
<br>
I decided that a shim would be appropriate here. We would take the various aliases, send them to a web server, which would then initiate an HTTP Header Location redirect to the appropriate port and path.<br>
<br>
A PHP example could be:<br>
<br>
URL: <a href="https://agent.company.com/" rel="noreferrer" target="_blank">https://agent.company.com/</a><br>
PHP: <?php header('Location: <a href="https://mspvmuccx001.company.com:8445/desktop''" rel="noreferrer" target="_blank">https://mspvmuccx001.company.<wbr>com:8445/desktop''</a>); exit; ?><br>
<br>
</span>This uses the HTTP Location<<a href="https://en.wikipedia.org/wiki/HTTP_location" rel="noreferrer" target="_blank">https://en.wikipedia.<wbr>org/wiki/HTTP_location</a>> header, which sends an HTTP 3XX response code to the client and let's them know where to go to get the "right" page. Unfortunately, that does mean that the address changes in your browser from the first URL to the second URL. This isn't terrible, but it does mean that you'll still want a friendly looking CNAME record for your host still, as I described above.<br>
<span class=""><br>
But, this would require me to install a web server in each environment and configure it, or ask for shared web server space. A better solution? The cloud!<br>
<br>
I stumbled across a public service that does just this. The cloud service I found is:<br>
<br>
<a href="https://www.easyredir.com/" rel="noreferrer" target="_blank">https://www.easyredir.com/</a><br>
<br>
They have both paid and a free plans:<br>
<br>
<a href="https://www.easyredir.com/free-url-redirection" rel="noreferrer" target="_blank">https://www.easyredir.com/<wbr>free-url-redirection</a><br>
<br>
I was able to set this up in about 10 minutes and it works exactly like I have explained above. I have no affiliation to them, and I'm sure there's other services out there.<br>
<br>
</span>Icing on the cake I suppose, I was even able to take a public domain record (E.g., <a href="http://company.com" rel="noreferrer" target="_blank">company.com</a><<a href="http://company.com" rel="noreferrer" target="_blank">http://company.com</a><wbr>>) and redirect it to a private domain record (E.g., company.local), proving that your application servers need not be accessible from the internet.<br>
<span class=""><br>
In fact, your target url doesn't even have to be a public domain either.<br>
<br>
E.g.,<br>
<a href="https://agent.company.local" rel="noreferrer" target="_blank">https://agent.company.local</a> can point to <a href="https://mspvmuccx001.company.local:8445/desktop" rel="noreferrer" target="_blank">https://mspvmuccx001.company.<wbr>local:8445/desktop</a><br>
<br>
</span>The only requirement is that your client PC can resolve the private record (.local) to the public service host (on <a href="http://easyredir.com" rel="noreferrer" target="_blank">easyredir.com</a><<a href="http://easyredir.com" rel="noreferrer" target="_blank">http://<wbr>easyredir.com</a>>), and that the returned redirect location (.local again) is also accessible to your client PC.<br>
<span class=""><br>
Has anyone come across something like this before? How are you solving all the different ports and paths now under your administrative domain?<br>
<br>
This does not replace your need for a smart load-balancer in the case of a server failure, though Finesse should at least redirect you to the Master node, should your DNS record point to the Slave.<br>
<br>
</span>______________________________<wbr>_________________<br>
cisco-voip mailing list<br>
<a href="mailto:cisco-voip@puck.nether.net">cisco-voip@puck.nether.net</a><br>
<a href="https://puck.nether.net/mailman/listinfo/cisco-voip" rel="noreferrer" target="_blank">https://puck.nether.net/<wbr>mailman/listinfo/cisco-voip</a><br>
</blockquote></div><br></div></div>