To: PJ Strifas who wrote (30491 ) 2/27/2000 8:05:00 PM From: Spartex Respond to of 42771
A Security Flaw Is A Security Flaw: Microsoft And The Win2000 Bug Sat Feb 26 00:17:00 EST 2000 Feb. 25, 2000 (InternetWeek - CMP via COMTEX) -- At first I was surprised to learn about Microsoft's apparent lapse in Windows 2000 security. Was it really possible that Microsoft, despite its history of not quite getting the concept of security, would really ship an operating system that lets anyone with Active Directory administrator privileges have his run of sensitive company data? Was it possible that Microsoft had forgotten even the most basic tenets of IT security? The original source of this revelation, Novell, certainly has a vested interest in poking holes in Active Directory. The Provo, Utah-based network operating system vendor is struggling to compete with Microsoft's marketing machine. The question is whether this a real hole or just Novell hype. We decided to find out. Contributing editor Alan Zeichick, who recently completed a review of Windows 2000 for InternetWeek, had also recently reviewed Novell's NetWare 5.0 and had taken a close look at the security provisions of both operating systems. If anyone would be able to tell whether there's a hole in Active Directory, it's Alan. He found a major hole in Active Directory almost immediately. Following the steps published by Novell on its Web site, Alan was able to take ownership of directory objects that the security setup had barred him from accessing. Once he took ownership, he was able to see, and copy, anything he found. Microsoft, in its response to Novell's claims, first tried obfuscation. In a document that was notable for its density, Microsoft claimed that Novell was wrong. In any case, Microsoft continued, if someone were to break into an area that they weren't supposed to be in, the security log would record it. Over the Presidents Day weekend, Microsoft revised its response, saying that the ability for any administrator to break into any area in Active Directory by simply transferring ownership of the directory object is a feature, not a bug. That way, according to Microsoft, if something should happen to the network administrator, another administrator would be able to assume control of an Active Directory server. Perhaps. But the basic concept of security is to keep people from seeing things they're not supposed to see. For example, if you keep your payroll or personnel information in a protected area on your server, only certain people should be able to see it. To allow anyone with administrator-level permissions anywhere in Active Directory to browse through such private information, controlled only by an entry in a security log that might or might not get noticed, violates all sorts of security practices. It's also a good way to test your liability insurance. Microsoft's response? Put such information into a separate domain. In other words, the security in Active Directory isn't really very good, because by Microsoft's own admission, you can't keep people out if you're using it. Instead, you have to go back to Windows NT's old domain-style management, losing all of the perceived benefits of Active Directory. Or, of course, you can pick another means of protecting your information altogether, such as choosing Novell's NDS for your directory service. That might play right into the hands of Novell after all, but a security flaw is a security flaw. Wayne Rash is managing editor/technology. He can be reached at wrash@cmp.com or wrash@mindspring.com.ragingbull.com