Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

Microsoft Vision Raises Questions

Past developments suggest that Microsoft's future security road may be a bumpy ride

SAN FRANCISCO -- RSA Conference -- Microsoft's top dogs in security offered their vision of the future of enterprise security in their keynote address here yesterday. But some attendees left the address scratching their heads, wondering about the efficacy of some key building blocks in the software giant's strategy.

In their presentation, company chairman Bill Gates and chief resource and strategy officer Craig Mundie described a "trustworthy computing" environment built on IPSec, digital certificates, and IP Version 6. The company also unveiled its initial implementations of Enhanced Validation SSL and CardSpace, a means of storing data from tokens of authentication on a PC.

But many of these key components of Microsoft's strategy are unproven, and in some cases they are downright controversial, observers note. IPSec, for example, has been criticized for its potential to serve as a carrier for future malware.

SSL VPNs are more secure than IPSec when the remote user's machine is connected to the network, said Dino Dai Zovi, a researcher with Matasano Security, in an interview last year. (See Holes Remain in SSL VPNs.)

"With an IPSec VPN, the remote user's machine is fully connected to the remote network," Dai Zovi said. "Worms and other malware can connect directly to hosts on the corporate network over the VPN link. With an SSL VPN, software running on the remote user's machine does not have direct access to the corporate network."

Similarly, some users have registered concerns about deploying IPv6, partly because it could create a whole new playing field for hacker exploits and partly because most security vendors don't yet support it. Government agency officials in December registered concern that security companies aren't moving faster on IPv6, and other experts warned that transitional "hybrid" networks using both IPv4 and IPv6 might have twice the vulnerabilities of either one alone.

Gates and Mundie also spent a significant amount of time discussing the use of digital certificates in future PC communications, and the company demonstrated its initial deployment of the EV SSL standard on Internet Explorer 7 here today, using certificates from more than a dozen different certificate authorities.

Yet research published earlier this year by Microsoft and Stanford University suggests that users aren't much safer when they use EV SSL. "Unfortunately, participants who received no training in browser security features did not notice the [EV] indicator and did not outperform the control group," the study says. "The participants who were asked to read the IE help file were more likely to classify both real and fake sites as legitimate whenever the phishing warning did not appear." (See EV SSL: Dead on Arrival?)

Microsoft also demonstrated CardSpace -- its technology for storing information on tokens of authentication under Windows Vista -- and announced that it is seeking greater integration between CardSpace and the proposed Open ID 2.0 standards. Gates said that the Open ID 2.0 effort is "very complementary" to the work that Microsoft has done on its Web services security specs, WS-Security and WS-Star.

But CardSpace is unproven in the field, and there are some real questions about whether users should deploy Open ID 2.0 or some sort of federated identity technology, such as the one proposed by the Liberty Alliance. "That's a very difficult debate," says Michael Barrett, CISO at PayPal.

Gates and Mundie were clear that some of the technologies they were discussing were "not there yet," as Mundie put it. But they were equally clear that they view technologies such as IPSec and IPv6 as strategic to Microsoft applications in the future. "By the end of the year, we'll be able to move quite gracefully in the direction of IPv6," Mundie said.

— Tim Wilson, Site Editor, Dark Reading

  • Microsoft Corp. (Nasdaq: MSFT)
  • Matasano Security LLC

    Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    Data Privacy Protections for the Most Vulnerable -- Children
    Dimitri Sirota, Founder & CEO of BigID,  10/17/2019
    State of SMB Insecurity by the Numbers
    Ericka Chickowski, Contributing Writer,  10/17/2019
    Tor Weaponized to Steal Bitcoin
    Dark Reading Staff 10/18/2019
    Register for Dark Reading Newsletters
    White Papers
    Video
    Cartoon
    Current Issue
    7 Threats & Disruptive Forces Changing the Face of Cybersecurity
    This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
    Flash Poll
    2019 Online Malware and Threats
    2019 Online Malware and Threats
    As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2017-8087
    PUBLISHED: 2019-10-22
    Information Leakage in PPPoE Packet Padding in AVM Fritz!Box 7490 with Firmware versions Fritz!OS 6.80 and 6.83 allows physically proximate attackers to view slices of previously transmitted packets or portions of memory via via unspecified vectors.
    CVE-2019-10079
    PUBLISHED: 2019-10-22
    Apache Traffic Server is vulnerable to HTTP/2 setting flood attacks. Earlier versions of Apache Traffic Server didn't limit the number of setting frames sent from the client using the HTTP/2 protocol. Users should upgrade to Apache Traffic Server 7.1.7, 8.0.4, or later versions.
    CVE-2019-12147
    PUBLISHED: 2019-10-22
    The Sangoma Session Border Controller (SBC) 2.3.23-119 GA web interface is vulnerable to Argument Injection via special characters in the username field. Upon successful exploitation, a remote unauthenticated user can create a local system user with sudo privileges, and use that user to login to the...
    CVE-2019-12148
    PUBLISHED: 2019-10-22
    The Sangoma Session Border Controller (SBC) 2.3.23-119 GA web interface is vulnerable to an authentication bypass via an argument injection vulnerability involving special characters in the username field. Upon successful exploitation, a remote unauthenticated user can login into the device's admin ...
    CVE-2019-12290
    PUBLISHED: 2019-10-22
    GNU libidn2 before 2.2.0 fails to perform the roundtrip checks specified in RFC3490 Section 4.2 when converting A-labels to U-labels. This makes it possible in some circumstances for one domain to impersonate another. By creating a malicious domain that matches a target domain except for the inclusi...