Consider the following scenario:
- You use Microsoft Internet Security and Acceleration (ISA) Server 2006 to publish a Microsoft Exchange Outlook Web Access (OWA) server.
- The relevant Web listener is configured to accept both HTTP and HTTPS connections.
- The relevant Web listener is also configured to redirect all HTTP connections to HTTPS connections.
- A user performs the following procedure:
- The user connects to the OWA site by using the following URL:
http://<FQDN>/owaNote The <FQDN> placeholder represents the fully qualified domain name (FQDN) of the Exchange server.
ISA Server sends an HTTP 302 response that includes the following HTTPS URL instead of an HTTP URL:
- The browser connects to the HTTPS side of the Web listener and then issues a "GET /owa" request.
- ISA Server sends a response that includes the Forms Based Authentication (FBA) page through the HTTPS connection, and then ISA Server assigns a cookie for this session.
- The user edits the URL in the browser to delete the "s" from the protocol, and then the user clicks Go or presses ENTER. For example, the user changes the URL from "https://<FQDN>/cookieauth.dll?<parameters>" to "http://<FQDN>/cookieauth.dll?<parameters>."
- The browser issues a "GET /cookieauth.dll" request through the HTTP connection. This request includes the cookie that was assigned in step 3.
- ISA Server sends a response that includes the FBA page over the HTTP connection.
- The user enters the credentials and clicks Log On. The user’s credentials are sent over the HTTP connection.
If the user is successfully authenticated in this scenario, ISA Server redirects the browser to the following URL:
However, you expect ISA Server to prevent the user from changing "HTTPS" to "HTTP" in step 4.
When ISA Server sends the HTTP 302 response in step 1, neither ISA Server nor the browser closes the HTTP connection. In step 5, the browser issues the "GET /cookieauth.dll" request through the existing HTTP connection, and the request includes a cookie that ISA Server has assigned for this session. Therefore, ISA Server recognizes the session as a pre-existing session and responds to the request by issuing the FBA page.
To resolve this problem, apply the hotfix that is mentioned in the following Microsoft Knowledge Base article:
Description of the ISA Server 2006 hotfix package: November 19, 2008
To work around this problem, follow these steps:
- Split the combination (HTTP/HTTPS) Web listener into two separate listeners. Configure one of them for HTTP and the other for HTTPS.
- Create a Web publishing rule, and configure it as follows:
Name = OWA redirect
When the user tries to change the URL (as in step 4) after you apply this Web publishing rule, ISA Server redirects the HTTP request back to HTTPS.
Action = Deny
Redirect HTTP requests to this Web page: https://<FQDN>/owa
Public name = <FQDN>
Paths = /owa/*, /clientauth.*
Listener = HTTP only
Microsoft has confirmed that this is a problem in the Microsoft products that are listed in the "Applies to" section.
For more information about software update terminology, click the following article number to view the article in the Microsoft Knowledge Base:
Description of the standard terminology that is used to describe Microsoft software updates
Article ID: 958607 - Last Review: January 21, 2009 - Revision: 1.0
- Microsoft Internet Security and Acceleration Server 2006 Service Pack 1, when used with:
- Microsoft Internet Security and Acceleration Server 2006 Standard Edition
- Microsoft Internet Security and Acceleration Server 2006 Enterprise Edition
|kbexpertiseinter kbfix kbsurveynew kbqfe KB958607|