|
From ZDnet -------------------------------------------- Firm finds big security holes in Windows NT By Robert Lemos, ZDNN June 1, 1998 5:27 PM PDT Flaws in Microsoft Corp.'s Windows NT software threaten the security of companies using the Internet to tie together their far-flung corporate locations, a computer security consulting firm declared on Monday. "We were able to sniff passwords, eavesdrop on the networks, and passively do traffic analysis," said Bruce Schneier, president of Counterpane Systems Inc., of Minneapolis, Minn. "Any Microsoft NT server on the Internet is insecure." Microsoft's report card on security has a few F's. Last year, the company was criticized for the security threat posed by ActiveX. Monday, crypto rivals Network Associates and RSA Data Security settled their suit. Counterpane discovered the problems while doing a security analysis on a Windows NT, an operating system used by a swiftly growing number of corporations as the foundation for their computer networks. Microsoft (MSFT) confirmed the security problems later the same day. VPNs increasingly popular The flaws weaken the security of so-called "virtual private networks," or VPNs, based on NT and point-to-point tunneling protocol, or PPTP. These VPNs connect company networks from various locations and are quickly becoming popular in the corporate world as a low-cost solution to buying a dedicated phone line to connect computers between company sites. "A lot of people are creating their virtual private networks using NT," said Schneier. "That makes the flaw that much more serious." 'A lot of people are creating virtual private networks using NT. That makes the flaw that much more serious.' -- Bruce Schneier, Counterpane Systems Inc. The PPTP is Microsoft's homegrown way of securely sending and receiving data over the public Internet. It's also used to identify whether the person logging in a valid user. But the software giant would have been better off using one of the public -- and stress-tested -- standards, said Schneier. "Developing security implementations in-house is very difficult to do right," said Schneier. "That's why it's important to adopt a publicly tested and recognized standard." Microsoft promises fix ASAP Windows NT system can use either a 40-bit or 128-bit encryption key to protect a company's data. Those keys, in and of themselves, are extremely secure. The problem is that NT secures those keys with a flawed password system. "Anyone with a list of the top 10 million passwords can break over 99 percent of the systems out there," he said. Microsoft promises to fix the flaws as soon as possible. "(Part of the problem) is already fixed," said Karan Khanna, product manager for Windows NT security at Microsoft. "We will be releasing patches to fix the rest as soon as we can." Khanna attempted to put the flaws in perspective. "The amount of security an organization enforces depends on its needs," he said. "The CIA spends billions of dollars on security -- our customers don't need the level." Is fix worse than flaw? That you-get-what-you-pay-for philosophy could quickly backfire on the software giant, however. Despite the stress on getting fixes out as soon as possible, many times such patches just make more problems for system administrators, said Schneier. "Last time they released a fix, it broke so many other parts of Windows NT, Microsoft had to pull it off the Web site three weeks later," he said. +--- | This is the Midrange System Mailing List! | To submit a new message, send your mail to MIDRANGE-L@midrange.com. | To subscribe to this list send email to MIDRANGE-L-SUB@midrange.com. | To unsubscribe from this list send email to MIDRANGE-L-UNSUB@midrange.com. | Questions should be directed to the list owner/operator: david@midrange.com +---
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.