Microsoft Tightens Security, Deals IT Folks Headaches in Flame Fight
July 12, 2012 12:00 PM
comment(s) - last by
Microsoft roots out obsolete MD5 certificates, disallows RSA keys shorter than 1024 bits
In August, Windows computers will receive a critical update via Windows Update. The patch is designed to close a security loophole in Windows' encryption that is being actively exploited by malware authored by the U.S. government and Israel.
I. Exploiting Trust in Microsoft
Currently, Windows allows 256-, 384-, and 512-bit keys. Some Microsoft Corp. (
) Terminal Server Licensing (MSTL) certificates until recently also used
the weak MD5 hashing algorithm
, despite the algorithm being officially discontinued in 2009.
The weaknesses, both on the hashing and the key-length front, allowed "world-class" malware authors -- believed to be in the employ of the U.S. government and Israel -- to write
a piece of malware called Flame
, which uses a MTSL certificate cracked by a hitherto unknown attack called MD5 chosen prefix collision.
Certificate in hand, Flame was able to masquerade as a Windows Update from the ultimate trusted source in the Windows world -- Microsoft. Thus the malware quickly proliferated in its intended target location -- Iran and the Middle East.
Flame has narrowly targeted the Middle East, particularly Iran. [Image Source: Kapersky Labs]
II. Microsoft Fights Back With Patch
Kurt L. Hudson, a senior technical writer at Microsoft, has posted a
blog regarding next month's Windows Update, which is expected to tighten key restrictions to prevent further abuse.
To further reduce the risk of unauthorized exposure of sensitive information, Microsoft has created a software update that will be released in August 2012 for the following operating systems: Windows XP, Windows Server 2003, Windows Server 2003 R2, Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2. This update will block the use of cryptographic keys that are less than 1024 bits.
To prepare for this update, you should determine whether your organization is currently using keys less than 1024 bits. If it is, then you should take steps to update your cryptographic settings such that keys under 1024 bits are not in use.
The update could render applications with signatures shorter than 1024-bits unable to install. It may also create difficulties with certain websites, SSL certificates, and Active X controls.
Shorter keys will no longer be considered valid in Windows. [Image Source: Microsoft]
Corporate users are given a series of suggestions to prepare the signature length bump. It remains to be seen exactly how difficult the transition will be for everyday consumers.
1024-bit signatures will be short-lived, as well.
The National Institute of Science and Technology
[PDF] Dec. 31, 2013 as the official target date to black out 1024-bit key encryption using the RSA and DSA algorithms.
Key-based encryption algorithms are only as secure as the enemy is weak hardware- and algorithm-wise. [Image Source: Margie Stibora]
The security community must constantly bump encryption algorithm strength and length in the face of ever increasing computing power and clever new attacks.
No encryption standard is safe
from individuals with sufficient computing power and savvy in the long run -- even quantum encryption has proved susceptible to attacks on the hardware used to encrypt the quantum bits (qBits). Thus security is measured in fleeting moments of safety, using technology that in years will be rendered useless.
III. Did the U.S. go to War With Iran?
Since Flame was discovered, Microsoft has also conducted a vigorous screen of its licensing certificates and discovered 28 other certificates that did not live up to its current standards, but had escaped correction in past cleanups.
Flame remains a hot topic, as both it and Stuxnet are the subject of lively debate over whether the U.S. "
" on Iran by unleashing the malware on it.
Rooting out the Flame worm is a top priority for Microsoft. [Image Source: Krishnan Vasuvedan]
Presidents George W. Bush Jr. and Barack H. Obama both
the use of the malware against the Asian nation. Stuxnet primarily
targeted Iran's nuclear weapons refining facilities
, while Flame offered
a general attack on Iran's oil industry
-- one of the key sources of GDP for the nation.
This article is over a month old, voting and posting comments is disabled
RE: Did the US go to war with Iran...
7/13/2012 9:48:54 AM
Mechanic is right, it would do everyone well to learn about the real history of this country rather than the one force fed you through institutions. There are many, many books that are no longer even in print because history is actively suppressed int his country. Take Ferdinand Lundberg for example. He first blew the whistle on William Hearst in 1936 with "Imperial Hearst". He has several other books, two of which are pretty good historical accounts of the US and world elites. The Rich and the Super Rich is 800 pages of how this country was really formed. Another good one of his is Cracks in the Constitution. I find it funny how people tout their constitutional rights on their shoulders, when in reality they have meant a whole lot of nothing for as long as they've really been around. Both are out of print, get them from a library if you can or find a used copy and set your mind free ;)
I am not a liberal or conservative, I do not believe in bipartisanship as it is only created to make us fight among ourselves and ignore the real issues. I have a set of moral values and they do not fall into the definition of democratic or republican. Until the American people realize we are being pitted against each other and that those in power (behind the pawn of a president) never change seats we will never be able to, to quote RAtM, band together and "take the power back."
"Can anyone tell me what MobileMe is supposed to do?... So why the f*** doesn't it do that?" -- Steve Jobs
United States Accused of Using Flame to try to Cripple Iran's Economy
June 22, 2012, 1:31 PM
Japanese Researchers Crack Supposedly Hack-Proof Cryptography
June 19, 2012, 3:54 PM
Microsoft Aims to Harden Windows Update to Fight "Flame"
June 6, 2012, 2:24 PM
NYT: President Obama Authorized Stuxnet Attack on Iran
June 1, 2012, 1:54 PM
GPS Units Lead Washington Drivers into Dangerous Territory
June 20, 2011, 12:39 PM
Google's Gleaming Glass HQ Gets Mountain View Snub, LinkedIn Gets the Love
May 7, 2015, 6:58 AM
Tech's Tax Day Fortunate Few: Qualcomm, Xerox, GE, et al. Pay Little or No Taxes
April 15, 2015, 11:30 AM
LinkNYC Terminals to Blanket New York City With Free WiFi, Free Calls, and Ads
November 17, 2014, 6:50 PM
Microsoft is Open-Sourcing Most of .NET, Adding OS X and Linux Support
November 12, 2014, 8:27 PM
Home Depot Lost 53 Million Emails, Blames Windows, Buys Execs New Macs
November 9, 2014, 5:00 PM
Former NSA Lawyer: If Google, Apple Encrypt User Data, They’ll Wither on the Vine Like Blackberry
November 6, 2014, 12:15 PM
Most Popular Articles
Why the U.S. Won't be Able to Ban Google's New Huawei Marshmallow Flagship Phone
October 3, 2015, 5:27 PM
Apple's First Fixes to iOS 9 Land w/ iOS 9.0.1 Release
September 23, 2015, 6:11 PM
Apple Watch Commands 2 in 3 Smart Watch Sales, WatchOS 2 Sweetens the Pitch
September 20, 2015, 6:07 PM
Tag Heuer Admits Its $1,800 Smartwatch Was Inspired By Apple -- Price-Wise
September 30, 2015, 6:32 PM
Breaking Bad: How to Crash Google's Chrome Browser With Just 8 Characters
September 23, 2015, 11:08 AM
Latest Blog Posts
Sceptre Airs 27", 120 Hz. 1080p Monitor/HDTV w/ 5 ms Response Time for $220
Dec 3, 2014, 10:32 PM
Costco Gives Employees Thanksgiving Off; Wal-Mart Leads "Black Thursday" Charge
Oct 29, 2014, 9:57 PM
"Bear Selfies" Fad Could Turn Deadly, Warn Nevada Wildlife Officials
Oct 28, 2014, 12:00 PM
The Surface Mini That Was Never Released Gets "Hands On" Treatment
Sep 26, 2014, 8:22 AM
ISIS Imposes Ban on Teaching Evolution in Iraq
Sep 17, 2014, 5:22 PM
More Blog Posts
Copyright 2015 DailyTech LLC. -
Terms, Conditions & Privacy Information