Microsoft Guidance for Enabling LDAP Channel Binding and LDAP Signing
Released: Aug 13, 2019
Last updated: Jan 9, 2024
- Assigning CNA
- Microsoft
- Impact
- None
- Max Severity
- None
Executive Summary
LDAP channel binding and LDAP signing provide ways to increase the security for communications between LDAP clients and Active Directory domain controllers. A set of unsafe default configurations for LDAP channel binding and LDAP signing exist on Active Directory domain controllers that let LDAP clients communicate with them without enforcing LDAP channel binding and LDAP signing. This can open Active Directory domain controllers to an elevation of privilege vulnerability.
Microsoft is aware that when these default configurations are used, an elevation of privilege vulnerability exists in Microsoft Windows that could allow a man-in-the-middle attacker to successfully forward an authentication request to a Windows LDAP server, such as a system running AD DS, which has not configured to require channel binding, and signing or sealing on incoming connections.
Microsoft is addressing this vulnerability by providing recommendations for administrators to harden the configurations for LDAP channel binding and LDAP signing on Active Directory domain controllers as follows:
In August 2019, Microsoft published ADV190023 with the following recommendations for settings:
- LDAP signing to Require Signing in group policy.
- Channel Binding Token (CBT) to 1 as a registry key or set the Domain controller: LDAP server channel binding token requirements group policy to When Supported after installing the March 10, 2020 updates.
On March 10, 2020, Windows updates will add options for administrators to harden the configurations for LDAP channel binding on Active Directory domain controllers. The updates add:
- Domain controller: LDAP server channel binding token requirements group policy.
- CBT signing events 3039, 3040, and 3041 with event source Microsoft-Windows-ActiveDirectory_DomainService in the Directory Service event log.
On August 8, 2023, Windows Updates for Server 2022 will add options for administrators to audit client machines that cannot utilize LDAP channel binding tokens via events on Active Directory domain controllers. The updates add the capability to enable CBT events 3074 & 3075 with event source Microsoft-Windows-ActiveDirectory_DomainService in the Directory Service event log.
On October 10, 2023, Windows updates for Server 2019 will add options for administrators to audit those clients. The updates add the capability to enable CBT events 3074 & 3075 with event source Microsoft-Windows-ActiveDirectory_DomainService in the Directory Service event log.
On October 17, 2023, Microsoft released Windows Server 2022, 23H2 Edition (Server Core installation). This version includes the options for administrators to audit client machines that cannot utilize LDAP channel binding tokens via events on Active Directory domain controllers, and includes the capability to enable CBT events 3074 & 3075 with event source Microsoft-Windows-ActiveDirectory_DomainService in the Directory Service event log.
With the release of the November 14, 2023 security updates, the auditing changes added in August 2023 are now available on Windows Server 2022. You do not need to install MSIs or create policies as mentioned in Step 3 of Recommended Actions.
With the release of the January 9, 2024 security updates, the auditing changes added in August 2023 are now available on Windows Server 2019. You do not need to install MSIs or create policies as mentioned in Step 3 of Recommended Actions.
Important The March 10, 2020 and updates in the foreseeable future will not make changes to LDAP signing or LDAP channel binding policies or their registry equivalent on new or existing domain controllers.
Note that LDAP signing Domain controller: LDAP server signing requirements policy already exists in all supported versions of Windows.
Recommended Actions
Microsoft recommends that administrators configure LDAP signing and LDAP channel binding as recommended in Step One of the Executive Summary of this advisory and as described in detail in KB4520412: 2020 and 2023 LDAP channel binding and LDAP signing requirements for Windows.
How to get notified of updates to this advisory
When the March 10, 2020 Windows updates become available, customers will be notified via a revision to this advisory. If you wish to be notified when these update are released, we recommend that you register for the security notifications mailer to be alerted of content changes to this advisory. See Microsoft Technical Security Notifications.
References
See the following Microsoft Knowledge Base articles for detailed guidance on how to enable LDAP channel binding and LDAP signing on Active Directory domain controllers:
- KB4520412: 2020 and 2023 LDAP channel binding and LDAP signing requirements for Windows
- KB4034879: LDAP channel binding
- KB935834: LDAP signing
- KB4546509: Frequently asked questions about changes to Lightweight Directory Access Protocol
FAQ
Where can I find further answers to my questions?
For a list of Frequently Asked Questions on LDAP channel binding and LDAP signing on Active Directory Domain Controllers, see KB4546509: Frequently asked questions about changes to Lightweight Directory Access Protocol. See also KB4520412: 2020 and 2023 LDAP channel binding and LDAP signing requirements for Windows.
Exploitability
The following table provides an exploitability assessment for this vulnerability at the time of original publication.
- Publicly disclosed
- Yes
- Exploited
- No
- Exploitability assessment
- Exploitation Less Likely
Acknowledgements
Security Updates
To determine the support lifecycle for your software, see the Microsoft Support Lifecycle.
Disclaimer
Revisions
With the release of the January 9, 2024 security updates, the auditing changes added in August 2023 are now available on Windows Server 2019. You do not need to install MSIs or create policies as mentioned in Step 3 of Recommended Actions.
With the release of the November 14, 2023 security updates, the auditing changes added in August 2023 are now available on Windows Server 2022. You do not need to install MSIs or create policies as mentioned in Step 3 of Recommended Actions.
On October 17, 2023, Microsoft released Windows Server 2022, 23H2 Edition (Server Core installation). This version includes the options for administrators to audit client machines that cannot utilize LDAP channel binding tokens via events on Active Directory domain controllers, and includes the capability to enable CBT events 3074 & 3075 with event source Microsoft-Windows-ActiveDirectory_DomainService in the Directory Service event log.
Microsoft is announcing that the October 10, 2023 updates are available for Windows Server 2022 and Windows Server 2022 (Server Core installation) to enable administrators to audit client machines that cannot use events to utilize LDAP channel binding tokens on Active Directory domain controllers. The updates add the capability to enable CBT events 3074 & 3075 with event source Microsoft-Windows-ActiveDirectory_DomainService in the Directory Service event log.
Microsoft is announcing that the August 8, 2023 updates are available for Windows Server 2022 and Windows Server 2022 (Server Core installation) to audit client machines that cannot utilize LDAP channel binding tokens via events on Active Directory domain controllers. The updates add the capability to enable CBT events 3074 & 3075 with event source Microsoft-Windows-ActiveDirectory_DomainService in the Directory Service event log.
Microsoft is announcing that the March 10, 2020 security updates are available that add options for administrators to harden the configurations for LDAP channel binding on Active Directory domain controllers. These options are: 1. "Domain controller: LDAP server channel binding token requirements" group policy. 2. CBT signing events 3039, 3040, and 3041 with event source Microsoft-Windows-ActiveDirectory_DomainService in the Directory Service event log. Note that these March 10, 2020 updates and updates in the foreseeable future will not make changes to LDAP signing or LDAP channel binding policies or their registry equivalent on new or existing domain controllers.
The following revisions have been made: 1. Clarified the actions customers need to take to harden the configurations for LDAP channel binding and LDAP signing on Active Directory Domain Controllers. 2. In the References section, added a link to KB4546509: https://support.microsoft.com/en-us/help/4546509 - Frequently asked questions about changes to Lightweight Directory Access Protocol. 3. Updated the FAQ section to direct customers to KB4546509.
In the Recommended Actions section, added information that details what will be included in the March 2020 updates to enable hardening LDAP Channel Binding and LDAP Signing. Included information about a future monthly update that will LDAP signing and channel binding on domain controllers configured with default values for those settings. These are informational changes only.
In the Recommended Actions section, updated the opening sentence to indicate that the Windows update will be available in March 2020.
Revised Recommended Actions section to provide customers with more detailed information about actions to take to make LDAP channel binding and LDAP signing on Active Directory Domain Controllers more secure.