Vulnerabilities / Threats
11/15/2013
11:33 AM
50%
50%

Microsoft May Encrypt All Server-To-Server Communications

Microsoft admits it doesn't encrypt all server-to-server communications, opening the way for the NSA and others to access the data flow.

Windows 8.1: A Visual Tour
Windows 8.1: Visual Tour
(click image for larger view)

Microsoft doesn't currently encrypt all its server-to-server communications. But in response to reports that the National Security Agency (NSA) is tapping communications between datacenters, Microsoft officials are rethinking that approach.

"What I can say today is server-to-server transportation is generally not encrypted," Dorothee Belz, vice president of legal and corporate affairs for Microsoft in Europe, told the European Parliament's civil liberties committee during a hearing into the mass surveillance of European citizens. "That is why we are currently reviewing our security systems."

Officials from Facebook, Google, and Microsoft testified before the committee that at no point did they give the NSA direct or unrestricted access to their networks. But according to recently published documents leaked by former NSA contractor Edward Snowden, an NSA program code named Muscular -- jointly operated with Britain's GCHQ -- has been accessing the data that flows between servers operated by Google, Yahoo, and likely other major technology players.

[ Are you ready for the Windows XP Security Apocalypse? ]

As a result, the NSA could use Muscular to directly access targeted networks -- including potentially Hotmail and Outlook.com email traffic, as well as such services as Office 365 and SkyDrive -- without having to find a way around or be stopped outright by a layer of encryption.

But a Microsoft spokesman told the Register that the company is reconsidering its crypto choices. "Over the last few years, Microsoft and others have increased protection of customer data travelling across the Internet by increasing use of SSL for services. However, recent disclosures make it clear we need to invest in protecting customers' information from a wide range of threats, which, if the allegations are true, include governments," he said. "We are evaluating additional changes that may be beneficial to further protect our customers' data."

In the wake of Belz's disclosure, information security and privacy experts have questioned how Microsoft's online services -- including cloud services -- could be considered secure if the underlying communications aren't encrypted.

"Every European company which has used US-based cloud services must have a contract which specifies conditions for secure data processing," Caspar Bowden, a privacy researcher who formerly served as the chief privacy adviser to Microsoft, told the Register. "It is negligent for cloud companies to have failed to encrypt the high-speed links between datacenters, and this has left EU citizens' data wide open to political and economic surveillance from many Signit powers," government agencies tasked with gathering so-called signals intelligence.

Encryption would be one way to counter -- or at least curtail -- NSA surveillance. Another approach would be for Congress to pass laws that restrict the breadth of information the agency could collect, as well as to scrutinize the agency's collection efforts more closely.

Rep. James Sensenbrenner (R-WI), who authored the USA Patriot Act that the NSA has used to justify its massive digital dragnet, told the European committee that the NSA's surveillance activities occurred outside of congressional oversight. "I hope that we have learned our lesson and that oversight will be a lot more vigorous."

Sensenbrenner has also continued to criticize what he calls an "overbroad interpretation" of the USA Patriot Act, which the NSA says authorizes the digital dragnet it has created. To that end, he has introduced the Uniting and Strengthening America by Fulfilling Rights and Ending Eavesdropping, Dragnet-collection, and Online Monitoring (USA Freedom) Act, together with Sen. Patrick Leahy (D-VT). The bill would still allow the NSA to monitor people suspected of having ties to terrorism, but it would prohibit the arbitrary collection of massive amounts of information on millions of people.

In addition, Sensenbrenner called on European government officials -- who run their own Signit operations and, no doubt, datacenter taps -- to work with the United States. "I ask my friends here in the European Parliament to work pragmatically with the United States to continue balanced efforts to protect our nations. Together we can rebuild trust while defending civil liberties and national security on both sides of the Atlantic."

Want to relegate cloud software to edge apps or smaller businesses? No way. Also in the new, all-digital Cloud Software: Where Next? special issue of InformationWeek: The tech industry is rife with over-the-top, groundless predictions and estimates (free registration required).

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-4807
Published: 2014-11-22
Sterling Order Management in IBM Sterling Selling and Fulfillment Suite 9.3.0 before FP8 allows remote authenticated users to cause a denial of service (CPU consumption) via a '\0' character.

CVE-2014-6183
Published: 2014-11-22
IBM Security Network Protection 5.1 before 5.1.0.0 FP13, 5.1.1 before 5.1.1.0 FP8, 5.1.2 before 5.1.2.0 FP9, 5.1.2.1 before FP5, 5.2 before 5.2.0.0 FP5, and 5.3 before 5.3.0.0 FP1 on XGS devices allows remote authenticated users to execute arbitrary commands via unspecified vectors.

CVE-2014-8626
Published: 2014-11-22
Stack-based buffer overflow in the date_from_ISO8601 function in ext/xmlrpc/libxmlrpc/xmlrpc.c in PHP before 5.2.7 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code by including a timezone field in a date, leading to improper XML-RPC encoding...

CVE-2014-8710
Published: 2014-11-22
The decompress_sigcomp_message function in epan/sigcomp-udvm.c in the SigComp UDVM dissector in Wireshark 1.10.x before 1.10.11 allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted packet.

CVE-2014-8711
Published: 2014-11-22
Multiple integer overflows in epan/dissectors/packet-amqp.c in the AMQP dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 allow remote attackers to cause a denial of service (application crash) via a crafted amqp_0_10 PDU in a packet.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?