Earlier today I read a blog post by fellow Australian IT pro Adam Fowler. In the post Adam shares his observation that LinkedIn is now asking users for their corporate (ie Outlook) login credentials for adding new connections.

linkedin

Adam also provides details for how to block LinkedIn’s servers from making the connection to your Exchange org should one of your users actually provide them the login details. The solution is fairly straightforward and worth considering, so please check it out and make up your own mind

I shared my own opinion of the matter earlier today on Twitter as well.

Though most people seemed to agree with me there was some debate about whether this feature of LinkedIn is as bad as I said it was.

On the one hand, it is a convenient way for LinkedIn users to add connections to their account. It is also something that is made technically possible by the way Exchange remote access works, if a company allows access with username/password only (eg without requiring two-factor).

On the other hand, LinkedIn has a history of serious security breaches. Also, it is one thing for a user to make a decision about whether to provide their personal email (eg Gmail) password when adding connections, it is a far more serious matter when the are providing corporate login credentials.

Consider that:

  • If LinkedIn was currently breached (without their knowledge) the credentials could be getting stolen each time they are submitted
  • Giving your corporate login credentials to a third party like this is a breach of many IT usage policies and can result in employee termination (not a good look when LinkedIn is supposed to help you with your career, not damage it)
  • It trains users that giving away their credentials to websites is okay (imagine a spoofed LinkedIn page and a phishing email campaign to trick users into visiting it)

Bottom line, I think this is a terrible thing and LinkedIn should stop it.

If you’re still not convinced, and in particular if you think LinkedIn is trustworthy and this is just harmless access to a user’s personal contacts, here is a screenshot of the “contacts” that LinkedIn found when I entered the login details for one of my test lab users.

LinkedIn suggested I connect with 107 people.

linkedin-02

Meanwhile, the mailbox actually only has a small number of contacts in it.

linkedin-03

It appears that LinkedIn accesses something other than just the contacts in the mailbox when a person provides them with corporate login credentials.

I ran some tests with two brand new mailboxes, and it seems that LinkedIn accesses both the Contacts and the Sent Items. For a test mailbox with no Contacts or Sent Items at all the LinkedIn page returned an error that it wasn’t able to recognise the webmail URL I had provided. But as soon as I sent just one email, the next attempt returned that email address in the list to invite to connect on LinkedIn.

Is this a bad thing? Absolutely. especially when LinkedIn has trouble telling the difference between a mailbox and a mailing list.

So what does LinkedIn store when you give them your login details?

In the first screenshot of the article you can see I had to provide the email address, username, password, and webmail URL.

On a second test run, I only had to provide username and password.

linkedin-04

That email address hasn’t previously been associated with my LinkedIn account, and for a lot of organizations the username for remote access is the same as the email address. So now in a LinkedIn breach the attacker will get my corporate email address, username (if it is the same as the email), and webmail URL. (Update: it was suggested to me that the details might just be stored in a cookie on my computer. So I tried from a different computer, in a different browser, from a different internet connection, and LinkedIn still has the webmail URL and email address already there).

What do you think, should LinkedIn stop offering this feature? Or should it be up to Exchange administrators to block LinkedIn from accessing their servers?

Update 29/6: LinkedIn responded to my questions:

linkedin

I tested again with a completely new account and found that:

  • The behaviour of scraping sent items has not changed
  • LinkedIn had retained all previous email addresses it collected from test accounts I used weeks ago, and was including them in the suggested contacts list yet again
  • The scraping is indiscriminate, even finding a conference room and an Exchange 2013 health mailbox

linkedin2

Comments on this article are now closed due to excessive spam.

About the Author

Paul Cunningham

Paul is a former Microsoft MVP for Office Apps and Services. He works as a consultant, writer, and trainer specializing in Office 365 and Exchange Server. Paul no longer writes for Practical365.com.

Comments

  1. Carl

    I’ve added the LinkedInEWS to the blocklist and that’s notworked either. As a few others seem to have come across too.

    I’m on Exchange 2010 SP1, so will have to look to adding the IP in IIS.

    1. Queeg

      LOL. Bad times for LinkedIn. However, it doesn’t look like a hijack…

      ” the outage was down to a mistake from LinkedIn’s DNS provider, which accidentally pointed the website’s homepage to a domain parking page. Rather amusingly that put the linkedin.com domain up for sale.”

      Takes me back to 2011 when Microsoft did the same thing taking out Office365 on the same day that Live went down. http://goo.gl/90nE7

      1. Avatar photo
        Paul Cunningham

        Sure, just a DNS provider error. And LinkedIn imports “your address book” while they’re trawling through your sent items.

        I’m not very trusting of LinkedIn at the moment. Or ever really.

        1. Avatar photo
          Paul Cunningham

          Has Facebook started soliciting corporate login credentials and using them to make direct connections to Exchange servers?

        2. Adam Fowler

          I stopped using Facebook last December 🙂

  2. Queeg

    LinkedIn introduced this feature in 2012 (July/August) and have articles all over the site about it including how to stop it. http://help.linkedin.com/app/answers/detail/a_id/5025

    Could I respectfully ask why the sudden interest/panic in this aged feature?

    1. Adam Fowler

      If we were talking about a vulnerability of Windows 7 just discovered, that had been around since a patch last year, would you say the same thing?

      1. Queeg

        Hi Adam, Thanks for taking the time to reply.

        I think you have have misunderstood my question though, or maybe it came across as aggressive. Apologies for this.

        This is a known feature which is well documented and relatively easy to restrict.
        My question really is, “Has something new come to light on this feature, that I should be concerned about?”.

        I would say that this feature is innocuous compared to the likes of the LinkedIn Social Connector.

  3. Dominic

    You could use Url Rewrite if you have Windows 2008 and later

    Download Url Rewrite from http://www.microsoft.com/en-us/download/details.aspx?id=7435

    Install it on the Client Access Servers.

    Open Up IIS, drill down to the EWS virtual directory

    Open up Url Rewrite

    Click on Add Rules and select Request Blocking under Inbound Rules.

    Under Block Access Based On Select “User -agent Header”

    Under Block request that Select “Matches the Pattern”

    Under Pattern (User-agent Header) enter the following “LinkedInEWS*”

    Under Using Select “Wildcards”

    Under How to Block Select “Send an HTTP 403 (Forbidden) Response”

    Click on Ok

    Restart IIS and test.

  4. Aron

    Could anyone refer a link to a (plain text) network capture or transcript of the connection details?
    This would be in the interest of determining other parameters of the connection, such as user-agent used etc. The results could benefit additional security measures such as reverse proxy or firewalls to block the connection.

  5. Arvin

    Idea suggested by David above worked.

    1. David

      Arvin – glad to hear it – hope you blocked EWS & OWA…

  6. Arvin

    I’d tried the block and Exchange is still allowing the access!!

    Does anyone have a solution to this?

  7. Adam Fowler

    Hey,
    I’m having similar results and so are others in regards to blocking LinkedIn:
    http://www.adamfowlerit.com/2013/06/02/linkedin-securityinformation-risks-with-exchange/#comments

    There’s more discussion here so I’ll direct people to this, but personally I tried even changing from the black list to the white list, and I still didn’t get EWS blocking, even though all details online say this should be it.

    For someone that’s done this successfully, what do you see in the Exchange IIS logs, and what happens when you try to enter your Exchange details on LinkedIn, does it just deny?

  8. Edwin

    It seems that there is some discussion about the block, for some it works for others it doesnt.
    Can you confirm this Paul?

  9. David

    Paul – we run an Exchange 2007 shop. I’m going into IIS/EWS & OWA and blocking the 2 LinkedIn sties i’ve identified so far.
    216.52.242.13
    216.52.242.14

    While i plan on testing, do you see any issue or additional concerns?

    cheers!

    1. Avatar photo
      Paul Cunningham

      Blocking their IPs from making inbound connections is a decent workaround. Until they change IPs, unfortunately :-/

    2. Edwin

      Where would i block this precisely?

      1. David

        Using IIS Manager
        Select web sites – EWS
        Select properties
        Select Directory Security tab
        Select edit – IP Address and domain name resolution
        select add – group of computers
        enter network ID: 216.052.242.0
        subnet mask 255.255.255.0

        confirm it lists “denied” for range of computers. This is the entire C-class for LinkedIn. You could also just enter the 2 servers they are currently using, but as Paul stated, it works until they change servers.

        Additionally, i would also update the web site for OWA. They have your users’ credentials – block OWA as a precaution.

        Finally, by scraping the IIS logs, identify the users and have them change their passwords.

        1. Edwin

          Great, i’ll test it tomorrow, i’m not an iis wizzard so i was a bit lost :-).
          Thanks

        2. Edwin

          Hi David,
          There is no properties in IIS 7 (W2K8-R2).
          So far i havent found the directory security tab settings anywhere.

  10. mjf2013

    @Stephen M:

    apologies, the link I previously posted only applys to Exchange 2010.

    1. Jason M

      Any chance this doesn’t work on Exchange 2010 SP2? I have two environments that I have set the Org.Config to EnforceBlockList and added LinkedInEWS to the EWSBlocklist.. Rebooted one environment and am still able to pull new contacts into a LinkedIn account..

  11. Stephen M

    Is there any way to block this in an Exchange 2007 environment ?

  12. Steven

    We are having trouble blocking linkedin from our exchange2010 environment. Can someone put some nice easy steps together?

  13. Mike

    As an IT professional in a post-secondary institution, it’s part of our mandate to protect the privacy of students – therefore I’d say that LinkedIn needs to be more transparent about it, or just stop completely.

  14. Dan

    Scary, and I have some users who are LinkedIn junkies that wouldn’t think twice about entering their network credentials.

  15. Paul

    Embarrassed to ask, but…how can this be controlled in Exchange 2003?

  16. Mark Nash

    Hi

    Is this a problem with hosted exchange ? I have many users in my company who are both social website junkies and quite challenged in the common sense department. This is the kind of thing I fully expect many of them to do.

    Thanks

    Mark

  17. Cuenca

    Can you help to clarify the concept on the default setting on the Organizationconfig (EXC2010 SP3)
    under the get- OrganizationConfig
    (the EwsApplicationAccessPolicy is blank , This mind the ewsallowlist is set?)

    EwsAllowOutlook :
    EwsAllowMacOutlook :
    EwsAllowEntourage :
    EwsApplicationAccessPolicy :
    EwsAllowList :
    EwsBlockList

  18. Alex

    Guys is this possible in Exchange 2007? Set-OrganizationConfig does not allow me to change ews app access policy to “EnforceBlockList”…it’s almost like it’s not even an option. Is this only possible for 2010/2013? Sorry if this is a stupid question.

    1. GB @ CFS

      Only available on Exchange 2010 SP1

  19. Leo

    We IT pro are way to smarter to get caught up with this sort of dump favour from Linkedin.

    But, you will be surprised there are people out there will actually fall into this trap easily!

    Sad but true.

  20. Robert Coggins

    My concern is what other services are starting to do this. Correct me if I am wrong but these steps will only block linkedin right? Looks like about the only way to fully restrict this is by using multi-factor authentication. Or, do you have another idea that might block this across the board?

    1. Avatar photo
      Paul Cunningham

      I agree, this is a concern. Blocking EWS entirely, using the EWS whitelist, implementing two-factor… there’s options I guess but not all of them will suit everyone.

      User education as well.

      1. Shane Bryan

        Sites requesting this sort of info should be clearer to the user that ‘No, we’re just not scraping your personal Outlook contacts, if you enter your business network password, we’re going to scrape your GAL as well while we’re in there. Maybe see what your IT Department thinks of that first hmmm?’

        But that will never happen.

  21. Shane Bryan

    yah i let Facebook scrape my Gmail contacts but there’s no chance in hell i’d let it go through my Outlook or OWA.

  22. S.E.

    I agree big time.
    The same goes for Facebook. I’m not even registered there but when I tried it’s (almost) first thing to ask were my credentials to my mailbox (for the purpose of acquiring contacts). That’s something I would not approve.

  23. Shane Bryan

    did some testing here.

    blocked access to my mailbox, LinkedIn wouldn’t import my contacts.

    allowed access to a test account, LinkedIn would import them.

    blocked access to a colleagues mailbox, LinkedIn wouldn’t import his contacts, but it must have remembered our OWA address as it asked me, but not my colleague!!

    just goes to show you that if they can’t disclose what information they’re gathering, they can’t be trusted.

    it’s now been blocked at the org level. thanks Paul and Adam.

    1. Avatar photo
      Paul Cunningham

      I did some more testing tonight as well with a brand new mailbox and brand new LinkedIn account.

      LinkedIn fails to connect (but gives a misleading error that the URL was wrong) if there’s no “contacts” found. But then as soon as I send one email from the test mailbox, LinkedIn is then able to connect and suggest the recipient of that sent mail as a connection.

      So clearly it is grabbing the Contacts + Sent Items and merging the two into the suggested connections list.

      Using Sent Items is ridiculous in my opinion. This whole thing is poorly thought out by LinkedIn.

      1. Shane Bryan

        Ahh I was wondering about if it was scraping sent items or outlooks ‘suggested contacts’. Interesting.

        And I agree, using Sent Items is ridiculous. Glad thanks to you guys that it was easy to block.

        Going through our IIS logs, there was an instance of someone doing it – so glad I read this.

  24. Shane Bryan

    Disgusting. Looking at blocking it thanks to Adam’s instructions.

    If I was one of the tin foil hat brigade, I’d even say that calling it ‘work username’ instead of ‘domain username’ is not an attempt at ‘keeping it simple’ but hiding what they’re doing from people that wouldn’t know any better.

  25. Adam Fowler

    Thanks for the references, hoping we’ll get some answers around this. Very surprised nobody else really seemed to notice this!

  26. David Wedrat

    Thats a lot of trust to be giving LinkedIn.
    Thanks for the heads up.

  27. Chris Brown

    Wow, that’s entirely uncool.

Comments are closed.