Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

'Devastating' flaw found in Windows' authentication system (Uh-oh, a major Kerberos vulnerability)
The Register ^ | Dec 15, 2015 | Kieren McCarthy

Posted on 12/15/2015 1:41:21 PM PST by dayglored

click here to read article


Navigation: use the links below to view more comments.
first previous 1-2021-33 last
To: dayglored
I think the point is that no vulnerability should be "excused away". Flaws -- regardless of where and what they are -- should get identified, analyzed, and fixed. >

What would you say to someone who breathlessly announced they had found a fundamental flaw in the Linux OS that gave you complete control of the machine, but only if you're logged in as Root?

21 posted on 12/15/2015 5:25:02 PM PST by tacticalogic ("Oh bother!" said Pooh, as he chambered his last round.)
[ Post Reply | Private Reply | To 18 | View Replies]

To: tacticalogic
> What would you say to someone who breathlessly announced they had found a fundamental flaw in the Linux OS that gave you complete control of the machine, but only if you're logged in as Root?

1. If there's a security vulnerability due to a design flaw or implementation error, and the story we hear is that it's only available for exploitation when one is already logged in as root, then yes it is serious and yes it has to get fixed, just as if it didn't require already being root.

2. That is especially true if that story comes from the same outfit that made the error in the first place. What level of reliability should one place on a glib dismissal of risk made by the same outfit that didn't know enough to catch the error when it happened?

3. Being logged in as root does not give you complete control of the machine. Being root has limits: for example, root can't decrypt strong encryption or a good password hash. If a security vuln allowed root to do more than they could without it, then it obviously needs to get fixed, not excused.

22 posted on 12/15/2015 6:40:40 PM PST by dayglored ("Listen. Strange women lying in ponds distributing swords is no basis for a system of government.")
[ Post Reply | Private Reply | To 21 | View Replies]

To: dayglored

If that’s your take on it, then you need to go shut down all of your Windows servers. Now.


23 posted on 12/15/2015 7:00:35 PM PST by tacticalogic ("Oh bother!" said Pooh, as he chambered his last round.)
[ Post Reply | Private Reply | To 22 | View Replies]

To: dayglored
Thanks for explaining that better than I ever could :^>
24 posted on 12/15/2015 7:13:00 PM PST by Company Man (I say we take off and Trump the site from orbit. It's the only way to be sure.)
[ Post Reply | Private Reply | To 19 | View Replies]

To: dayglored
I'm sure you're not actually saying that there's no value to fixing the vuln, right?

The "fix" is to install Credential Guard.

Windows stores passwords for service accounts and interactive logins in memory. Programs like MimiKatz running under local admin authority can read them. The "vulnerability" this researcher claims to have found has been known about and discussed by Microsoft and various people in the security community for quite some time.

25 posted on 12/15/2015 7:40:28 PM PST by tacticalogic ("Oh bother!" said Pooh, as he chambered his last round.)
[ Post Reply | Private Reply | To 18 | View Replies]

To: dayglored

Agreed.


26 posted on 12/15/2015 7:42:24 PM PST by SunTzuWu
[ Post Reply | Private Reply | To 18 | View Replies]

To: tacticalogic
> If that's your take on it, then you need to go shut down all of your Windows servers. Now.

I don't have that option. We have some mission critical applications that only run on Windows Server.

So instead of shutting them down, I do what's possible to protect them from intrusion and compromise. For example, none of my Windows machines -- servers, workstations, any of them -- are reachable directly from outside the LAN (which itself is securely locked down and monitored). The machines that face the outside are hardened Unix and Linux. Granted, nothing is perfect, but I prefer to depend on *ix at the outer perimeter.

You may recall that about a decade ago, Microsoft's Jim Allchin, who was a central figure in the development of Windows Server and the building of Microsoft's server business, wrote:

"I think our teams lost sight of what bug-free means, what resilience means, what full scenarios mean, what security means, what performance means, how important current applications are, and really understanding what the most important problems our customers face are."
Have things changed? Sure. In my opinion, Windows Server has many strengths and has come a very long way in the direction of serious security, but it's still got a way to go, and a sysadmin who puts Windows on their outer perimeter today is taking unnecessary chances.

Nonetheless, there's no need to shut them all down. Just protect them. :-)

27 posted on 12/15/2015 8:07:38 PM PST by dayglored ("Listen. Strange women lying in ponds distributing swords is no basis for a system of government.")
[ Post Reply | Private Reply | To 23 | View Replies]

To: dayglored
OK. Now, given that no OS is perfect then any of them can be compromised, and your job is to do everything you can to mitigate those vulnerabilities and prevent that.

Part of that is knowing what the weaknesses are so you know what to concentrate on. Your reaction to the article seems to indicate you didn't know about this one.

28 posted on 12/15/2015 8:21:10 PM PST by tacticalogic ("Oh bother!" said Pooh, as he chambered his last round.)
[ Post Reply | Private Reply | To 27 | View Replies]

To: dayglored

What I can’t belive is that they are still using ntlm. That has been known for years to have serious unfixable flaws.

Astounding.


29 posted on 12/15/2015 8:46:48 PM PST by zeugma (Last time I was sober, man I felt bad. Worst hangover I've ever had.)
[ Post Reply | Private Reply | To 27 | View Replies]

To: tacticalogic
> Part of that is knowing what the weaknesses are so you know what to concentrate on. Your reaction to the article seems to indicate you didn't know about this one.... The "vulnerability" this researcher claims to have found has been known about and discussed by Microsoft and various people in the security community for quite some time.

I had heard about it but I'll plead guilty to not paying it much attention, as my professional concentration has nearly always been *ix -- Windows servers have been a pain in my ass whenever I've had to deal with them professionally (which is since NT4 in the mid-90's). I have great respect for guys who choose to become serious, experienced Windows admins -- it's a hell of a row to hoe. It's not a path I would choose.

So since I've been fortunate (so far) and there's been an experienced Windows admin on my team wherever I've worked, I've only had to know a little about Windows, relative to my knowledge of Unix and Linux, which has been my concentration. And there's plenty there to be concerned about, security-wise, too.

30 posted on 12/15/2015 9:19:08 PM PST by dayglored ("Listen. Strange women lying in ponds distributing swords is no basis for a system of government.")
[ Post Reply | Private Reply | To 28 | View Replies]

To: dayglored

Create a bootable Linux Live USB stick and boot your Windows computer. You can see, access, change or delete any file on the hard disk with NO password required. A janitor with a Linux Live USB stick could look at every file on every Windows computer in your office.


31 posted on 12/15/2015 9:21:53 PM PST by r_barton
[ Post Reply | Private Reply | To 1 | View Replies]

To: r_barton
> Create a bootable Linux Live USB stick and boot your Windows computer. You can see, access, change or delete any file on the hard disk with NO password required. A janitor with a Linux Live USB stick could look at every file on every Windows computer in your office.

That's why most of them are VMs without USB or CD/DVD, and the metal instances are physically inaccessible without (physical hardware) keys.

32 posted on 12/15/2015 9:24:47 PM PST by dayglored ("Listen. Strange women lying in ponds distributing swords is no basis for a system of government.")
[ Post Reply | Private Reply | To 31 | View Replies]

To: dayglored

There are numerous safeguards to protect against this.

Use the “Protected Users” group in AD
Turn off Kerberos delegation for privileged users (protects against PTH as well)
Use fine-grained password policies for privileged users and require 15+ character pass phrases
Use attribute-based access control for privileged resources such as domain controllers

You can also change your krbtgt account password on a regular basis. We have ours scripted as a scheduled task that runs weekly. It’s as secure as salting your password hashes.


33 posted on 12/16/2015 10:11:47 AM PST by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 1 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-33 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson