Microsoft Tightens Security, Deals IT Folks Headaches in Flame Fight
July 12, 2012 12:00 PM
comment(s) - last by
Microsoft roots out obsolete MD5 certificates, disallows RSA keys shorter than 1024 bits
In August, Windows computers will receive a critical update via Windows Update. The patch is designed to close a security loophole in Windows' encryption that is being actively exploited by malware authored by the U.S. government and Israel.
I. Exploiting Trust in Microsoft
Currently, Windows allows 256-, 384-, and 512-bit keys. Some Microsoft Corp. (
) Terminal Server Licensing (MSTL) certificates until recently also used
the weak MD5 hashing algorithm
, despite the algorithm being officially discontinued in 2009.
The weaknesses, both on the hashing and the key-length front, allowed "world-class" malware authors -- believed to be in the employ of the U.S. government and Israel -- to write
a piece of malware called Flame
, which uses a MTSL certificate cracked by a hitherto unknown attack called MD5 chosen prefix collision.
Certificate in hand, Flame was able to masquerade as a Windows Update from the ultimate trusted source in the Windows world -- Microsoft. Thus the malware quickly proliferated in its intended target location -- Iran and the Middle East.
Flame has narrowly targeted the Middle East, particularly Iran. [Image Source: Kapersky Labs]
II. Microsoft Fights Back With Patch
Kurt L. Hudson, a senior technical writer at Microsoft, has posted a
blog regarding next month's Windows Update, which is expected to tighten key restrictions to prevent further abuse.
To further reduce the risk of unauthorized exposure of sensitive information, Microsoft has created a software update that will be released in August 2012 for the following operating systems: Windows XP, Windows Server 2003, Windows Server 2003 R2, Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2. This update will block the use of cryptographic keys that are less than 1024 bits.
To prepare for this update, you should determine whether your organization is currently using keys less than 1024 bits. If it is, then you should take steps to update your cryptographic settings such that keys under 1024 bits are not in use.
The update could render applications with signatures shorter than 1024-bits unable to install. It may also create difficulties with certain websites, SSL certificates, and Active X controls.
Shorter keys will no longer be considered valid in Windows. [Image Source: Microsoft]
Corporate users are given a series of suggestions to prepare the signature length bump. It remains to be seen exactly how difficult the transition will be for everyday consumers.
1024-bit signatures will be short-lived, as well.
The National Institute of Science and Technology
[PDF] Dec. 31, 2013 as the official target date to black out 1024-bit key encryption using the RSA and DSA algorithms.
Key-based encryption algorithms are only as secure as the enemy is weak hardware- and algorithm-wise. [Image Source: Margie Stibora]
The security community must constantly bump encryption algorithm strength and length in the face of ever increasing computing power and clever new attacks.
No encryption standard is safe
from individuals with sufficient computing power and savvy in the long run -- even quantum encryption has proved susceptible to attacks on the hardware used to encrypt the quantum bits (qBits). Thus security is measured in fleeting moments of safety, using technology that in years will be rendered useless.
III. Did the U.S. go to War With Iran?
Since Flame was discovered, Microsoft has also conducted a vigorous screen of its licensing certificates and discovered 28 other certificates that did not live up to its current standards, but had escaped correction in past cleanups.
Flame remains a hot topic, as both it and Stuxnet are the subject of lively debate over whether the U.S. "
" on Iran by unleashing the malware on it.
Rooting out the Flame worm is a top priority for Microsoft. [Image Source: Krishnan Vasuvedan]
Presidents George W. Bush Jr. and Barack H. Obama both
the use of the malware against the Asian nation. Stuxnet primarily
targeted Iran's nuclear weapons refining facilities
, while Flame offered
a general attack on Iran's oil industry
-- one of the key sources of GDP for the nation.
This article is over a month old, voting and posting comments is disabled
RE: Did the US go to war with Iran...
7/13/2012 9:48:54 AM
Mechanic is right, it would do everyone well to learn about the real history of this country rather than the one force fed you through institutions. There are many, many books that are no longer even in print because history is actively suppressed int his country. Take Ferdinand Lundberg for example. He first blew the whistle on William Hearst in 1936 with "Imperial Hearst". He has several other books, two of which are pretty good historical accounts of the US and world elites. The Rich and the Super Rich is 800 pages of how this country was really formed. Another good one of his is Cracks in the Constitution. I find it funny how people tout their constitutional rights on their shoulders, when in reality they have meant a whole lot of nothing for as long as they've really been around. Both are out of print, get them from a library if you can or find a used copy and set your mind free ;)
I am not a liberal or conservative, I do not believe in bipartisanship as it is only created to make us fight among ourselves and ignore the real issues. I have a set of moral values and they do not fall into the definition of democratic or republican. Until the American people realize we are being pitted against each other and that those in power (behind the pawn of a president) never change seats we will never be able to, to quote RAtM, band together and "take the power back."
"Let's face it, we're not changing the world. We're building a product that helps people buy more crap - and watch porn." -- Seagate CEO Bill Watkins
United States Accused of Using Flame to try to Cripple Iran's Economy
June 22, 2012, 1:31 PM
Japanese Researchers Crack Supposedly Hack-Proof Cryptography
June 19, 2012, 3:54 PM
Microsoft Aims to Harden Windows Update to Fight "Flame"
June 6, 2012, 2:24 PM
NYT: President Obama Authorized Stuxnet Attack on Iran
June 1, 2012, 1:54 PM
Inside the Mega-Hack of Bitcoin: the Full Story
June 19, 2011, 6:40 PM
Report: AT&T Eyeing $40B DirecTV Purchase
May 1, 2014, 8:00 AM
WebOS Class Action Settlement Costs HP $57 Million
April 1, 2014, 10:22 AM
IBM Workers Strike Over Terms of Deal That Will Have Them Working for Lenovo
March 6, 2014, 9:29 AM
Google Picking Up Artificial Intelligence Company "DeepMind" for $400 Million
January 27, 2014, 9:25 AM
Quick Note: Qualcomm Grabs up Palm, IPAQ, and Bitfone Patent Portfolio from HP
January 24, 2014, 9:18 AM
Verizon Buys Intel Media OnCue Cloud TV assets
January 21, 2014, 10:26 AM
Most Popular Articles
Appalling Negligence: Decade-Old Windows XPe Holes Led to Home Depot Hack
September 8, 2014, 8:58 PM
iBend: Reports Grow of Razor-Thin iPhone 6+ Folding Like Origami in Your Pocket
September 23, 2014, 6:08 PM
New AT&T Mobile Share Value "Double Data" Promotion Lasts Through October
September 28, 2014, 8:32 AM
Update: Apple Releases iOS 8.0.2 Update to Make Up for Botched 8.0.1 Release
September 25, 2014, 8:19 PM
TiVo Mega Features 24TB of Storage, Can Record Three Years* Worth of TV Content
September 8, 2014, 8:45 AM
Latest Blog Posts
The Surface Mini That Was Never Released Gets "Hands On" Treatment
Sep 26, 2014, 8:22 AM
ISIS Imposes Ban on Teaching Evolution in Iraq
Sep 17, 2014, 5:22 PM
Space Terrorism is a Looming Threat For the United States
Apr 23, 2014, 7:47 PM
Facebook Aims to Provide Internet to "Every Person in the World" with Drones, Satellites
Apr 1, 2014, 10:20 AM
Retail Mobile Sites Experience Outages in Light of Simplexity's Bankruptcy
Mar 14, 2014, 8:48 AM
More Blog Posts
Copyright 2014 DailyTech LLC. -
Terms, Conditions & Privacy Information