Microsoft Admits XP Has Same Bug As Win2K 161
Arashtamere sends in a Computerworld story on a security flaw in the Windows 2000 pseudo-random number generator published by Israeli researchers earlier this month. Microsoft has now admitted that the flaw is present in XP too. Microsoft denies that the bug is a security vulnerability, since an attacker would have to have gained administrative access to a system before exploiting it. (The Israeli researchers point out that many common exploits provide admin access.) This stance apparently lets them off the hook for patching Win2K, which is in "extended support" mode, though it powers about 9% of US and EU business computers. Microsoft said that XP SP3, due in the first half of next year, will fix the bug. The company said that Vista, Windows Server 2003 SP2, and the new Windows Server 2008 are not vulnerable.
stupid (Score:4, Insightful)
Re:stupid (Score:4, Informative)
This PRNG vulnurability does just that. Keys derived from it can be recovered by an attacker who compromises the machine _after_ the key was used and discarded.
Re: (Score:3, Informative)
Because you own a machine _now_ doesnt give you access to the encryption keys that was generated in the past.
Except that it pretty much does for Windows NTFS encryption. Thank you "key recovery account". For that matter, on a Windows machine not in a domain with default settings, you can get the NTFS encryption keys with no accounts at all, just stick the drive in your machine and "recover" the keys with the local admin account. Checkbox feature for the win!
And if you're using real encryption instead, you're not caring about the Windows RNG I hope.
It's not about hard disk encryption (Score:3, Informative)
CryptGenRandom is supposed to be the Windows-equivalent of /dev/urandom. Except it's not, because of this design flaw. The implications of this extend far beyond encrypted NTFS volumes.
For example, an attacker can passively monitor a network of Windows machines, wait for one of them to do something interesting (like connect via SSL www.paypal.com), then actively compromise those selected machines later, and gain enough information to decrypt the captured SSL sessions.
Basically, if you encrypt somethin
Re: (Score:2)
As the GP said this is a fuss over nothing. It's one of those vulnerabilities where you have to think real hard to imagine a way it could be used maliciously. (Though I agree that MS should make proprietary crypto algorithms open to public scrutiny.)
Re: (Score:2)
You use the same password on other machines (Score:3, Insightful)
Re: (Score:2)
Re:stupid (Score:4, Insightful)
This was the point of palladium, that the keys would be locked up inside a separate box, segregated from the processor. Each process would only manipulate opaque handles to the keys.
One nice aspect of this attack is that if you gain admin access after key generation, but before the entropy pool is refreshed then you can play back the state of the random number generator to recreate the keys after the fact. But this just extends the window slightly, you still need an exploit to get admin first.
I have to agree with MS on this one... (Score:4, Insightful)
Re:I have to agree with MS on this one... (Score:4, Insightful)
History is full of examples, probably both within and out of the computing field where people thought that 'that' was impossible...
Re:I have to agree with MS on this one... (Score:5, Funny)
Naw. You just have to take a different approach. (Score:4, Insightful)
That is not 100% correct.
It is still a "security vulnerability".
It just cannot be exploited to increase your access on that machine.
That we know of. Today. So the code still needs to be patched. Security is not an "either / or" situation. You have to reduce the effectiveness of threats.
Re:Naw. You just have to take a different approach (Score:4, Interesting)
Thanks for the flashback to l0pht's old page....! For those who don't remember it before it got rolled into @stake:
L0pht, making the theoretical practical since 1992."
Re:Naw. You just have to take a different approach (Score:2, Informative)
So-called forward security (yes, looking at things in the past is 'forward'
Re:Naw. You just have to take a different approach (Score:2)
Re: (Score:2)
Re: (Score:2)
If you haven't tought your children to behave by the time a full lock and key is the only thing that will stop them then either your child has serious mental problems (which does happen sometimes but should be fairly rare) or you were a very bad parent.
Re:I have to agree with MS on this one... (Score:4, Insightful)
Re:I have to agree with MS on this one... (Score:4, Funny)
Re: (Score:2, Funny)
YHBT. YHL. HAND.
Re: (Score:2)
this sounds like a bad ass case of pot, kettle, black.
Re: (Score:2)
I think you hit reply at the wrong place. My point was that someone who writes 'Abble' and 'Linuzzz' is so obviously a troll, that you shouldn't reply. That's... sort of not in vein with what you replied...
Re: (Score:2)
ahh well
Re: (Score:2)
Re: (Score:3, Insightful)
Re: (Score:2, Insightful)
Yes.
Yes.
Terms like M$, Linuzzz etc. amount to petty, schoolyard name-calling. Useful dialog is only diminished by them.
Re: (Score:3, Insightful)
I know twitter/erris posts regularly but not that often.
What the hells has that got to do with anything?
Plenty of people call microsoft M$. Personally I prefer calling them MicroShite but that is my preference.
Twitter also occasionally makes some valid points in some of his posts but who cares about facts when you can just slag someone off without taking the time to exercise your brain.
I am not saying the Linux is perfect, it pisses me off just as regularly as Windows does but at least with Linux I can do something about it like commit a patch. With Windows I
Re: (Score:2)
You know, the ones who swore blind that we shouldn't believe that just because 2K was flawed [slashdot.org] that XP would be too.
I don't see any of them here with their "mea culpas"
Re: (Score:2)
They're the ones who are now claiming that you need to have admin access on a machine to exploit this bug. If it's true that any user can debug its own processes, then this claim is simply wrong.
Re: (Score:2)
yeah, sorry that post was pointless... To add some substance:
Is there any reason that MS can't make portions of their code "open Source" but not-free?
I.e.: You may look at this source code and even compile it for evaluation, you may not, however use this code for any production (including home pc) uses.
Technically I think they could, but realistically I doubt it would ever happen (aside from large c
Re: (Score:3, Insightful)
Most of the other ways to get to the passwords would leave a detectable trace, especially keyloggers. Or they need a reboot. If you're really after the user passwords, resetting them to something else is also not an option. AFAIK there is no other *easy* w
Re: (Score:2)
Re:I have to agree with MS on this one... (Score:4, Funny)
Re: (Score:2)
Re: (Score:3, Interesting)
on multiple systems. If you can crack them you can
very likely gain access to other systems without having
to wait for uses to login at a time when you dont know
how long you have control of the system
Re: (Score:2, Insightful)
"At the moment we know of no way to abuse this bug without already having obtained Administrative access."
I will almost bet money that there is a smart bugger out there which find a way to abuse this.
That we don't know of a fearsible attack right now is no excuse not to fix the bug IMHO.
Re:I have to agree with MS on this one... (Score:5, Insightful)
Many corporate computers have local admin accounts that are likely to share a user/password combo across large numbers of machines. A keylogger might not get you these credentials, but the ability to crack these credentials could get you admin access to a huge number of other computers.
It is people like you who make sure that security consultants will never want for work.
Re: (Score:3, Insightful)
Re: (Score:2)
If you work in computers, quit. You're bad for society.
Re: (Score:2)
Re: (Score:2)
Your previous reply missed the mark by such a wide berth I thought you were too fucking stupid to recognize your own stupidity. After all, you were claiming that if any admin flaws exist, then it doesn't matter if the cryptography is also broken, which is one of the most ignorant and fuckwitted claims I've ever read.
I mean honestly, it was such a dumb fucking claim that I really didn't think you'd recognize how utterly inferior and useless you are.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
I say that because they were usually stored in a database or spreadsheet that wasn't well-protected, and that offered them up cleartext with little to no oversight.
It's possible to do it better, but I've yet to see anybody actually do so.
At last... (Score:5, Funny)
A reason to upgrade to Vista! ;)
Re: (Score:2, Funny)
Re: (Score:2)
Re: (Score:1, Interesting)
Re: (Score:3, Funny)
At the cost of "upgrading" your old PC, you can get a new box with much more power than you need!
(now, where is that Open SuSE [opensuse.org] installation CD...)
Got to hand it to those Novell people, that's a nice OS!
Anyone here manage to get Vista and Open SuSE to "dual boot", and if so, any issues?
Re: (Score:2)
Re: (Score:2)
THe paper refered to. (Score:5, Insightful)
I fail to see why you would need administative privelidges however. You would only need to run in the userspace of the process that did run the random number generator before. Having administrative privs would be nice to inject code into that userspace, but is not needed i think.
It can get even worse if from a public key part the random number that was used to generate it can be extracted, what was done in early ssl implementation attacks.
Re:THe paper refered to. (Score:4, Insightful)
Theoretically, one would need knowledge of just one TCP sequence number, and then it could generate the future sequence numbers coming out of the box. Therefore one would be able to hijack TCP/IP sessions *much* faster and easier than before.
Anyone know to the contrary?
Re: (Score:2)
If that's true of the NT line, you could exploit this without admin privileges easily.
Re: (Score:2)
And Vista? (Score:1)
Re: (Score:2)
Only after Windows 7 is released.
Article (Score:5, Interesting)
Very brief summary of article
Each process has their own instance of the generator, and the refresh of the internal state is done after 128 kbs of output from the generator (roughly 600-1200 SSL connections with IE). Not only that, it is run in the userspace so it is not a security violation to examine the internal state of the generator. The function used is not one-way which provides a means looking at past transactions of a user (within the 128 kbs of data).
Re: (Score:2)
Open access (Score:2)
Some food for thought for Vista haters (Score:1, Flamebait)
Re: (Score:2, Redundant)
Re: (Score:2)
A lot of people assumed it wasn't because the testing was done on Win2k, but Microsoft never confirmed it. In fact, the article states they were very hesitant to do just that:
As recently as last Friday, Microsoft hedged in answering questions about whether XP and Vista could be attacked in the same way [...] Yesterday, however, Microsoft responded to further questions and acknowledged that Windows XP is vulnerable
So, in light of them actually admitting they're at fault, why wouldn't you trust it?
Re: (Score:2)
There are other reasons not to trust MS, of course, but from what I understand
Re: (Score:2)
One entry on Raymond Chen's blog (which is a goldmine for the weird quirky things that some programs expect Windows to handle) explained a situation where
Re: (Score:2)
Yep, the most important thing to a customer is to keep thier software working.
Upgrading to a new version of windows eventually is practically forced by the older version getting it's support dropped by hardware and soft
Meanwhile, in the *nix (Score:4, Informative)
No, sorry, you can keep Vista for yourself.
Re: (Score:2, Informative)
My point... (Score:2)
Open source code. Easier to do research on it, easier to fix.
Whereas Windows has closed source, and you're pretty much stuck relying on Microsoft to provide fix (which they might not, hoping to use it as an argument to encourage shift toward Vista).
Re: (Score:3, Informative)
Because they can. (Score:1)
Open crypto algorithms; no fix for Win2K (Score:5, Insightful)
In any case, the thing that surprised me most from the article was that Windows 2000 users would be left out in the cold: "Because the company has determined that the PRNG problem is not a security vulnerability, it is unlikely to provide a patch [for Win2K]." Wow. Especially when it's something this easy to fix. This bug also solves any attacker's problem of trying to sort valuable from non-valuable information, since presumably any valuable information (credit cards used online, etc) will use encryption. And while someone suggested that a program should use its own random number generator, there is a problem because, in general, your application (not running as Admin) shouldn't have access to nearly the same amount of entropy sources (like network activity, GUI inputs, etc).
--
Educational microcontroller kits for the digital generation -- great gift! [nerdkits.com]
Re: (Score:2, Informative)
It might be easy to code the fix, but it's (at least) an order of magnitude more work to actually test it. Windows supports thousands of different hardware configurations, in hundreds of different languages.
Yeah, Microsoft could release this as a hotfix. For any customer that screams loud enough (and pays enough), they may well do.
To be honest, I'd rather see Microsoft focus their efforts on XP SP3, Vista SP1 and 2008 RTM (2003 SP2 only just came out,
Re: (Score:3, Insightful)
Re: (Score:3, Insightful)
(Well MAYBE Debian...)
Most of them crap out after 12 months!
Re: (Score:2)
Re: (Score:3)
Well, that depends. They already have the code and it is not that the API needs to much testing I suppose. I mean, getRandomXxx() with some 4 different strings for Xxx should be enough. Feed the output into a FIPS random number testing tool (for testing weirdness, I mean the code has already been tested in other configurations) and go.
Sure it is a bit of work, but the test code should be available alr
Re: (Score:2)
Can't take that long to generate a few thousand points to plot to check distribution of their PRNG.
Re: (Score:2)
W2K has been given the shaft for awhile from MS. (Score:2)
The real downside of W2K is that MS has given it the shaft for awhile, even when it wasn't in extended support they were still not supporting it very well for the last couple years as far as th
Re:W2K has been given the shaft for awhile from MS (Score:2)
I'd settle for two.
Re: (Score:2)
Some applications don't handle it as well as they should, but that's an application issue.
One of many ... (Score:2, Funny)
More correctly, "Microsoft Admits XP has same bugs as Win2K."
No hotfix ? (Score:3, Interesting)
It should be an offence to know and state you know about a bug but sit on the fix for months. This is a really stupid MS position and will push people more towards alternatives like GNU/Linux.
It should be a hot fix right now.
Re: (Score:2)
Some people might see it as an annoying limit like the people that bought 28800 bps modems and found that Win 3.11 couldn't go past 9600 bps due to an arbitrary
This is Why Open Source is Good. (Score:5, Insightful)
No worries about whether or not it's even legal to fix a machine that I'm using to run my business.
I'm not generally fond of defending Microsoft... (Score:2)
As to patching Windows 2000: They're going to patch XP, and if the bug is in both, chances are it's the same code. I believe they should at least look at it and see if a patch is going to be simple. That said, it'd have to be darned simple to be worth it: if you're
Re:I'm not generally fond of defending Microsoft.. (Score:2)
MS Admits... (Score:2)
Let's see here. When I bought my new laptop (with MCE on it), I logged in as myself (with admin rights). I tried to downgrade myself to a "Power User"
I was told by MCE that "there must be at least one administrator".
I logged out and logged in as "Administrator" and tried to downgrade my normal userid.
I was told once again by MCE that "there must
Re: (Score:2)
Yet they didn't use that logic with driver signing (Score:2)
Thank you, Microsoft, for proving that you lied about the reason why you made driver signing mandatory.
Re: (Score:3, Insightful)
They also could have worded this a lot more diplomatically than they did. So yes, the GP is flamebait.
Re: (Score:2)
Re: (Score:2)
Can we put this to sleep now? (Score:2)
Re: (Score:3, Informative)
The nub of the problem is that a deterministic state machine can never produce random behaviour. The long term solution would
Re: (Score:2)
There are plenty of other potential sources of randomness you can tap into, the least significant bits of timestamps for various external events, noise on analog inputs (such as the sound card) and many others.
Re: (Score:2)
Re: (Score:2)
I just don't see how its possible just from looking at the numbers themselves unless you're selecting from a pre-known selection of algorithms and comparing expected results with actual output from the generator given a specific seed. If you don't know the algo then you could be making educated guesses for literally years and still not work out the algorithm.
Eh? You reverse engineer the machine code, which is exactly what they did. Doesn't matter if it runs in kernel space either, just take any x86 VM and there you go. Hell, they used a pretty weird scheme with hashes and symmetric encryption, but once you figure out when those - rather standardized - algorithms are called, it's a piece of cake. At least for someone that knows a fair bit about debugging and reverse engineering. Many CS mayors *should* be able to do this.
First lesson about cryptography: don't a