Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Security Operating Systems Software Windows

New Vista Random Numbers to Include NSA Backdoor? 269

Schneier is reporting that Microsoft has added the new Dual_EC-DRBG random-number generator to Vista SP1. This random-number generator is the same one discussed earlier that may have a secret NSA backdoor built into it.
This discussion has been archived. No new comments can be posted.

New Vista Random Numbers to Include NSA Backdoor?

Comments Filter:
  • From the article (Score:3, Insightful)

    by tieTYT ( 989034 ) on Monday December 17, 2007 @05:20PM (#21731034)
    "It's not enabled by default, and my advice is to never enable it. Ever."
  • Clever! (Score:5, Insightful)

    by spun ( 1352 ) <loverevolutionary@@@yahoo...com> on Monday December 17, 2007 @05:30PM (#21731206) Journal
    I see what you did there. You implied that anyone who criticizes the US or Vista is a paranoid loony. Now why would you do that? Do you just assume that people will criticize the US? Is the US that worthy of criticism that you have to defend it preemptively? I know that's a popular tactic these days, but is it entirely necessary? Nice how you posted AC, too. You sir are an all-around class act.
  • by Kadin2048 ( 468275 ) * <slashdot.kadin@xox y . net> on Monday December 17, 2007 @05:32PM (#21731234) Homepage Journal
    Agreed. The only interesting thing about this whole story is that the NSA apparently reviewed the PRNG function and rubber-stamped it, missing the critical vulnerability. Since the vulnerability really isn't that good of a backdoor, and doesn't seem to have been all that subtle, I think this is far more likely to be incompetence rather than malice on their part.

    As an American, that doesn't make me feel a whole lot better -- in some ways, I'd really like to have the secret agencies of so many spy movies rather than the massive bureaucratic pile that I know exists in reality -- but disappointment in government is something I've gotten used to. You don't last long in Washington without it.
  • by rrkap ( 634128 ) on Monday December 17, 2007 @05:41PM (#21731384) Homepage
    So, let's review:

    1. Government introduces a new cryptography standard (which it will presumably require for some applications) that requires that systems provide a choice of 4 random number generators, one of which MAY have a flaw.
    2. Manufacturers implement the new standard.
    3. Grand conspiracy!!!

    Come on, could it just possibly be that Microsoft wants to be able to claim to be NIST 800-90 compliant for customers who want that kind of thing and that the NSA likes the idea of there being a variety of random number generators available? The only way that making this function available is a risk is the NSA also has control of the application and can force it to call this random number generator without properly seeding it. If they have that level of control, they have enough control to do whatever else they want in a much more direct way.
  • by secPM_MS ( 1081961 ) on Monday December 17, 2007 @05:41PM (#21731388)
    Sorry to deflate the conspiracy theorists. Certain governmental customers wanted the ECC random number generator. MS provided it. This random number generator is not used by default. The default random number generator is CryptGenRandom, which was revised to deal with the issues that have been discussed with rather more sensationalism than was warranted.

    Customers who want to use the ECC generator can choose to use it. This is rather like turning on FIPS mode.

    As for backdoors, anybody who is paranoid about this issue will ignore or disbelieve me when I say that there is no backdoor that I am aware of. The Common Criterial evaluators look for such issues and submit issues for fixing if and when they find them. Other governments are not going to be willing to buy a system with a NSA backdoor. From a more practical demonstration point of view, if there was a backdoor, governments would not need to get warrants for inserting hardware keyloggers or custom malware on systems to access system information. Governments both in the US and elsewhere do this, which suggests that no backdoor is available.

  • by hey! ( 33014 ) on Monday December 17, 2007 @05:45PM (#21731442) Homepage Journal
    I disagree.

    This has absolutely nothing to do with open or closed source. A completely open source random number generator would have precisely the same vulnerability, because the problem isn't potential skulduggery by the vendor, it's potential skulduggery by the people who designed the standard.

    What Microsoft has done is to implement a questionable standard. It makes no sense in this case to blame them for its shortcomings, especially since developers have alternative standards they can use.

    Now when it comes to application software using a random number generator, then there actually is a closed/open source argument to be made. Do you know which random number generator is used by the software you use? With closed source, almost certainly not. With open source, programmers can undo the choice of the dodgy elliptic curve RNG and replace it with a more solid, equally standards compliance alternative. And get a speed boost too. You also know that you might not want to trust the source for your software if they use the inferior algorithm.
  • by rrkap ( 634128 ) on Monday December 17, 2007 @05:46PM (#21731456) Homepage

    I'm 24 years old. I don't want to go through the next 50 years of my life living in an international air of worry and uncertainty. I don't want to live in a permanent state of fear, generated by a megalomaniacal American government taking advantage of the majority low IQ populous' capacity for being brainwashed.

    Can I suggest you up your meds? Your current dosage isn't doing its job.

  • by morgan_greywolf ( 835522 ) on Monday December 17, 2007 @05:47PM (#21731470) Homepage Journal
    Who even says that at an RNG has to be at the OS level? If NSA or its customers want to use Dual_EC_DRBG, there is nothing stopping them from doing so on Vista or any other OS.

    As another poster said, where in the OS is this used? Do you know? Does anyone but Microsoft?
  • by morgan_greywolf ( 835522 ) on Monday December 17, 2007 @05:53PM (#21731582) Homepage Journal

    This random number generator is not used by default.
    Prove it. Oh, that's right, you can't because you don't have the source code. Unless maybe you're astroturfing. Even then you'd be under an NDA anyhow.

    Other governments are not going to be willing to buy a system with a NSA backdoor.
    And other governments have replaced Windows with custom Linux distros due to the potential of this very problem. This is a fact that cannot be denied.

  • Re:Really... (Score:4, Insightful)

    by Applekid ( 993327 ) on Monday December 17, 2007 @05:58PM (#21731676)
    What you're essentially proposing is encrypting the same data twice, first with the questionable algorithm, then with another algorithm of your choice. If that's the case, you might as well just encrypt it with the second algorithm, hopefully more complicated than just shifting and adding. ;)
  • by secPM_MS ( 1081961 ) on Monday December 17, 2007 @06:04PM (#21731766)
    I don't have to prove it. Not only that, but you wouldn't believe me if even if the code was released - after all, how do you know that the code corresponds to the actual binary?

    Look at the FIPS and CC documentation. Governments do use these systems in security critical environments, but they configure them very carefully. There is configuration data available on how to configure system for security critical environments. Selecting your random number generator is one of the things you can do.

    The staff working on this are noted cryptographers who do know what they are doing. I have been working with the cryptographers at Microsoft for some time and I have been working in crypto related areas for > 20 years.

  • by dvice_null ( 981029 ) on Monday December 17, 2007 @06:18PM (#21731944)
    > As for backdoors, anybody who is paranoid about this issue will ignore or disbelieve me when I say that there is no backdoor that I am aware of.

    I can believe that you don't know, but would they really tell you if there were such backdoors?

    > Governments both in the US and elsewhere do this, which suggests that no backdoor is available.

    If you had a backdoor which allows you to access remote computers anywhere would you
    a) Tell everyone that you can do it
    b) Use some dummy keyloggers and malware to suggests that you can't do it
  • by gazbo ( 517111 ) on Monday December 17, 2007 @06:53PM (#21732360)
    Wait a minute...so the wife has to quit her job due to cock-based time constraints, and also the husband has to clean each and every cock.

    Well surely that implies he'll not have time to work either? So who's going to earn money to feed them and pay the mortgage? I assume it's the African-Americans mentioned in the story - if so, why not mention this benevolence in the story - surely it's a mitigating factor? Frankly, I'm beginning to suspect the telling of this story has a racist bias.

  • by mpapet ( 761907 ) on Monday December 17, 2007 @06:53PM (#21732368) Homepage
    Let's walk through these expert comments one step at a time:

    Anybody who is paranoid about this issue

    Did you see what just happened there? This is a clever sleight of words used to disparage and marginalize anyone who questions his premise. Disagree? Put on your tin foil hat and go to the psych ward. There's no room for discussion or even consideration of alternatives. Based on my direct, but very distant experience, Bruce is right in calling the backdoor.

    The Common Criterial evaluators look for such issues
    They do? Really? Anyone that has undergone EAL evaluation knows it's a giant tree-killing documentation project above all. I don't want to bore anyone with the details of CC evaluation, but it's not a creditable rebuttal to the issue. The meat of the matter from wikipedia "Higher EAL levels do not necessarily imply "better security", they only mean that the claimed security assurance of the TOE has been more extensively validated." http://en.wikipedia.org/wiki/Common_Criteria [wikipedia.org]

    As another post so insightfully states, there's no reason why, IF some project actually needs the feature, they can't install it as a library. Just like we all do for openssl on windows.
  • by Burz ( 138833 ) on Monday December 17, 2007 @07:13PM (#21732550) Homepage Journal

    I have been working with the cryptographers at Microsoft for some time and I have been working in crypto related areas for > 20 years.
    A dubious distinction. Microsoft is almost criminally negligent when it comes to encryption and most other security issues. Between that and your obvious conflict of interest here, why should anyone believe you?

    I'll heed Schneier's concerns over your schilling any day. I'd set his words to music before accepting that soiled "expert opinion" you're pushing, because at the very least you are deranged for smearing those concerns as "paranoid" against the backdrop of massive government spying we see today.
  • by LaskoVortex ( 1153471 ) on Monday December 17, 2007 @07:29PM (#21732696)
    > For some reason, the /. crowd thinks it is acceptable that a majority of the population uses an OS which is horribly less secure than the ones we ourselves use (Linux, Macs, etc...).

    You haven't done a survey so you don't know the usage. I'd imagine more than half of the /. crowd are gamers and thus satisfy their guilty pleasures on a vista box. There is a lot of complaining about vista here simply because that is the major OS of /. Your points are valid, but they are largely falling on ears deafened by the explosions of "Quake" or whatever the kids are playing these days.
  • Re:Clever! (Score:3, Insightful)

    by Bill, Shooter of Bul ( 629286 ) on Monday December 17, 2007 @07:42PM (#21732834) Journal
    No, he said there are some paranoid people here "who rant about how U.S. is a fascist state and how Vista is the new 'evil'"

    Thats true. That does not imply what that any criticism is paranoid. It is possible for a subject to be criticized legitimately by some people, and delusionaly by others. He's referring to those who always lose arguments due to godwin's law.
  • by Burz ( 138833 ) on Monday December 17, 2007 @08:31PM (#21733242) Homepage Journal
    I agree with the overall thrust of your post, BUT:

    unless we actually do something to fix the social barriers to the adoption of Linux
    ...seems to imply the problem mainly lies with society in general. But the problem is basically within the Linux community: You are trying to sell people on nothing. [slashdot.org] At least nothing they can grasp, being non-sysadmins and non-programmers.

    Contrast the product structure of "Linux" with more successful FOSS projects like Firefox and OpenOffice, and learn the lesson well... or be content watching MS not only rebound in desktop share, but use that to eventually kick FOSS out of the server space as well. MS already has the cooperation of governments to standardize on Active Directory for Internet/Web logins! Think about that. [samba.org]

    In short, by referring to "Linux" as anything more than a kernel, you are leading all sorts of people (even programmers from the end-user application space) into a great deal of unexpected confusion, denying them a stable computing platform in the process... a platform that could have been a viable alternative to Redmond's greedy mendacity. It as if we all started referring to any browser or other program with Gecko in it as "Firefox", and millions of people put those "Firefox" distros on the shelf intending to switch over "someday".

    The Linux geekdom think they are so intelligent; In truth they've yet to learn even how to speak. Count me off that bandwagon.
  • by wirelessbuzzers ( 552513 ) on Tuesday December 18, 2007 @02:40AM (#21735780)

    As for backdoors, anybody who is paranoid about this issue will ignore or disbelieve me when I say that there is no backdoor that I am aware of. The Common Criterial evaluators look for such issues and submit issues for fixing if and when they find them.
    I don't think you understand the issue here. Nobody is claiming that this represents a backdoor in Microsoft's code. The issue is that the approved parameters for the algorithm Dual_EC_DRBG could be a back door.

    Essentially, Dual_EC_DRBG is a public-key encryption algorithm* disguised as a random number generator. The NIST parameters are a public key. The generator has some painfully-generated random internal state. It steps by encrypting* using the internal state as a parameter. It outputs the ciphertext*. It sets the plaintext* as the next state. To recover the next state, or even to distinguish the next state from random*, is equivalent to breaking the encryption algorithm. EC-DH is a pretty well-respected algorithm, so probably nobody is going to break it. This would imply that the DRBG is secure, i.e. nobody else can distinguish it from actual random numbers.

    *Not quite accurate, but a full explanation would be an automatic TL;DR.

    Unless, of course, the government (or someone else) has the private key (the "back door") corresponding to that public key. They probably don't, but they almost certainly can't prove it. Since Dual_EC_DRBG is slow, only paranoid people would recommend it anyway. Because of the potential back door, no cryptographer thinks you should use it, but Microsoft has included it anyway. This is probably to say they meet some government standard, but it's causing a tempest in a teapot, possibly because it reminds people of the whole _NSAKEY mess.

    And yes, I am a cryptographer.

New York... when civilization falls apart, remember, we were way ahead of you. - David Letterman

Working...