An article on Windows (in)security
---------- Begin Forwarded Message ----------
From: first@individual.com (An Information Service of INDIVIDUAL Inc.) (by way of [Some initial stuff seems missing, sorry.]
``No.''
And so it went. Once the security configuration is established and the security profiles are put in a database-like protected file system, accessing that data to get a full view of the security policy implementation is near impossible. An administrator must retrieve individually each piece of data stored in the security database, then manually collate and compile it into a usable form.
In a large operation, the security administrator will build a security database by virtue of the number of objects and characteristics assigned to each object during configuration. But Windows NT offers little way to access and manipulate that database for analysis, rapid reconfiguration or global views. It appears, and Microsoft engineers agree, someone will have to build a utility program to take advantage of the security database via the maze of APIs available to third-party developers.
Kevin Phaup, program manager lead of Microsoft's Business Systems Division, put the best spin he could on this first major Windows NT shortcoming. ``Pull the data into a database and then massage it,'' he said. ``We have a new product - System Management Server from the Back Office Suite - that could help.''
I agree, but why would I want to buy a brand-new operating system that needs help out of the box?
What's more, the third-party database solution for security administration is a hopeless short-term patch. To be truly effective, it needs a much tighter integration with Windows NT's APIs to permit not only systemic analysis, but also systemic security changes based on selected criteria.
If administrators want to change the access rights of every user so they can log on at 7 a.m. instead of 8 a.m., they cannot do it with Windows NT 3.5. They might be able to do it with a third-party product or with Windows NT 4.0.
``If someone builds an administration product like that, they'll make a lot of money,'' Phaup says.
A WEEKEND'S WORK Windows NT has other security problems, as well. For example, it does not have data cryptography, which is essential to make sure a network is reasonably secure from eavesdropping and integrity breaches. Microsoft, which knows encryption technology, easily could have included the appropriate algorithms in software to make Windows NT more secure.
Microsoft's Phaup agrees it would have been simple to add encryption to Windows NT. ``The hooks are all there,'' he said.
But Windows NT does not need cryptography for C2 certification. And perhaps even more telling, Microsoft cannot export cryptography outside the U.S. due to export control laws that prohibit it from doing so without licensing. Of course, the company could have made two versions of Windows NT: one with crytography for domestic use and one without cryptography for export.
According to Phaup, Microsoft was reluctant to do so for two reasons. ``Security is way down on the list of corporate concerns and desires and wants in an OS. It's in the top 20, but not the top 3,'' he says. ``And the testing cycle would have been a double killer.''
Windows NT's last major shortcoming lays in the omission of a feature that most security experts consider virtually indispensable: boot control.
In the DOS/Windows world, third-party PC security is reasonably attempted by forcing users to boot from the C drive and making them log on with IDs and passwords. However, if a bootable DOS diskette is inserted in the A drive, the PC will boot without a logon, and the A:> will appear.
But if the user attempts to log over to the C drive, the system will come back with a message such as: Invalid drive specification. Security experts recognize this as an inexpensive technique that will keep out casual intruders and nontechnical types.
One way to mandate boot control is with a hardware or firmware addition to the PC in the form of an add-on card. The hardware boot process is interrupted, and then even access to the A drive can be restricted until the actual logon process through the legal boot drive has been successfully completed.
In Windows NT, boot control does not even exist as an option. Again, this suggests that Microsoft's security effort was driven by C2 certification, not by security itself.
In its defense, there is a lot to like about Windows NT and the plethora of functionality it offers from the application standpoint. But Windows NT sorely lacks in security, so much so that it almost would be safer not to use any security.
Windows NT must evolve quickly to garner a spot in the secure operating system arsenal or somehow steal market share from the likes of Novell. It just is not there yet. But Microsoft's Phaup left me with one closing thought. ``Have you talked to the Cairo [Windows 95.5] guys yet?''
2Schwartau is an independent consultant, writer and lecturer on network security topics. He can be reached at Interpact, Inc. at (813) 393-6600, or via electronic mail at P00506@psilink.com.
[01-23-95 at 15:10 EST, Copyright 1995, Network World, File: x0123303.8dn]
Windows NT must evolve quickly to garner a spot in the secure operating system arsenal or somehow steal market share from the likes of Novell. It just is not there yet. But Microsoft's Phaup left me with one closing thought. ``Have you talked to the Cairo [Windows 95.5] guys yet?''
2Schwartau is an independent consultant, writer and lecturer on network security topics. He can be reached at Interpact, Inc. at (813) 393-6600, or via electronic mail at P00506@psilink.com.
FYI, there's been some controversy lately on the Firewalls list about Winn Schwartau. For one thing, he apparently works as a marketer for the company that makes the Sidewinder firewall, so this "independent consultant" bit has been judged rather misleading by some people. Last I saw, someone was requesting an apology/explanation from Internet World or some such magazine for the last paragraph above, or a reasonable facsimile. This arose because he apparently wrote a highly favorable review of Sidewinder for the aforementioned `zine, in which he also criticized Bellovin & Cheswick's firewalls bible for not discussing "type enforcement" (used/implemented by Sidewinder). The latter criticism has been vigorously defended by some third parties, and I don't know enough about the subject to make any clear judgement about it. Anyway, since he's knocking the security of something else in the article here, I thought it appropriate to point all this out. [Lest anyone ask me, you can join the firewalls list by sending mail to majordomo@greatcircle.com with "subscribe firewalls" in the body, not in the subject. There's a digest format (use "subscribe firewalls-digest") which I recommend over the standard list distribution.] -L. Futplex McCarthy
participants (2)
-
L. McCarthy -
Rich Salz