{"id":18058,"date":"2022-02-02T10:48:18","date_gmt":"2022-02-02T18:48:18","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2022\/02\/02\/news-11791\/"},"modified":"2022-02-02T10:48:18","modified_gmt":"2022-02-02T18:48:18","slug":"news-11791","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/02\/02\/news-11791\/","title":{"rendered":"20 years after Gates\u2019 call for trustworthy computing, we\u2019re still not there"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/idge\/imported\/imageapi\/2022\/01\/11\/12\/internet_security_privacy-100715273-large.3x2-100916002-large.3x2.jpg?auto=webp&amp;quality=85,70\"\/><\/p>\n<p><strong>Credit to Author: Susan Bradley| Date: Mon, 17 Jan 2022 03:42:00 -0800<\/strong><\/p>\n<p>Do you feel more secure? Is your computing experience more trustworthy these days?<\/p>\n<p>Seriously \u2014 you\u2019re reading this article on a computer or phone, connecting to this site on an internet shared with your Grandma as well as Russian hackers, North Korean attackers, and lots of teenagers \u00a0looking at TikTok videos. It\u2019s been 20 years since then-Microsoft CEO Bill Gates wrote his <a href=\"https:\/\/www.wired.com\/2002\/01\/bill-gates-trustworthy-computing\/\" rel=\"noopener nofollow\" target=\"_blank\">Trustworthy Computing memo<\/a> where he emphasized security in the company\u2019s products.<\/p>\n<p>So are we actually more secure now?<\/p>\n<p>I\u2019m going to keep in mind the side effects from last week\u2019s Patch Tuesday security updates and consider them in my answer. First, the good news: I don\u2019t see major side effects occurring on PCs not connected to active directory domains (and I haven\u2019t seen any showstoppers in testing my hardware at home). I can still print to my local HP and Brother printers. I can surf and access files. So, while I\u2019m not ready yet to give an all-clear to install the January updates, when I do, I doubt you\u2019ll see side effects.<\/p>\n<p>But for businesses, this month\u2019s updates deliver a confusing and murky story. Microsoft has not exactly been a good trustworthy computing partner this month. Rather taking the past two decades to develop \u00a0bullet-proof, resilient systems, we get servers going into boot loops and admins having to boot into DOS \u00a0mode and run commands to uninstall updates.<\/p>\n<p>This isn\u2019t where we were supposed to be at this point.<\/p>\n<p>As Gates said 20 years ago: \u201cAvailability: Our products should always be available when our customers need them. System outages should become a thing of the past because of a software architecture that supports redundancy and automatic recovery. Self-management should allow for service resumption without user intervention in almost every case.\u201d<\/p>\n<p>And yet, I\u2019m still delaying updates on my computer systems because the latest updates, in particular, have shown that servers may have recovery issues. Case in point: \u201cWindows Servers domain controllers might restart unexpectedly.\u201d That cropped up after last week\u2019s security patches on all supported Windows server platforms. As noted in the <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/release-health\/status-windows-8.1-and-windows-server-2012-r2#2775msgdesc\" rel=\"noopener nofollow\" target=\"_blank\">known-issue write-up<\/a>, this occurs after using Microsoft\u2019s own recommended guidance for Active Directory hardening, which included using Shadow Principals in Enhanced Security Admin Environment (ESAE) or environments with Privileged Identity Management (PIM). The systems affected include Windows Server 2022 (<a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/january-11-2022-kb5009555-os-build-20348-469-e3fb2b38-3506-4dc9-8216-5d3546a6d2a4\" rel=\"noopener nofollow\" target=\"_blank\">KB5009555<\/a>); Windows Server, version 20H2 (<a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/january-11-2022-kb5009543-os-builds-19042-1466-19043-1466-and-19044-1466-b763552f-73bd-435a-b220-fc3e0bc9765b\" rel=\"noopener nofollow\" target=\"_blank\">KB5009543<\/a>); Windows Server 2019 (<a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/january-11-2022-kb5009557-os-build-17763-2452-c3ee4073-1e7f-488b-86c9-d050672437ae\" rel=\"noopener nofollow\" target=\"_blank\">KB5009557<\/a>); Windows Server 2016 (<a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/january-11-2022-kb5009546-os-build-14393-4886-0c2cac57-13b6-42e6-b318-41ca32428f91\" rel=\"noopener nofollow\" target=\"_blank\">KB5009546<\/a>); Windows Server 2012 R2 (<a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/january-11-2022-kb5009624-monthly-rollup-23f4910b-6bdd-475c-bb4d-c0e961aff0bc\" rel=\"noopener nofollow\" target=\"_blank\">KB5009624<\/a>) Windows Server 2012 (<a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/january-11-2022-kb5009586-monthly-rollup-9541f57c-89b0-48d6-ade2-31609678ce9b\" rel=\"noopener nofollow\" target=\"_blank\">KB5009586<\/a>). \u00a0<\/p>\n<p>I\u2019ve also seen reports that following the Active Directory security hardening guidance (created after the <a href=\"https:\/\/msrc-blog.microsoft.com\/2021\/12\/14\/ad-hardenings\/\" rel=\"noopener nofollow\" target=\"_blank\">November security releases<\/a>) will trigger the reboot problem if you\u2019ve <a href=\"https:\/\/blog.netwrix.com\/2022\/01\/10\/pacrequestorenforcement-and-kerberos-authentication\/\" rel=\"noopener nofollow\" target=\"_blank\">set the PACRequestorEnforcement\u00a0value to 2<\/a>.<\/p>\n<p>Even with cloud services, the issues around availability remain unsolved. For example, Microsoft 365 has a <a href=\"https:\/\/twitter.com\/MSFT365Status\" rel=\"noopener nofollow\" target=\"_blank\">Twitter account<\/a> whose entire focus is communicating on availability issues with the service. Rarely a week goes by that I don\u2019t get an alert about some service issue. Cloud services are hardened, but I don\u2019t see a lot of progress either with local servers or cloud services. Instead of planning on automatic recovery, we have to make sure we have alternative services and alternative ways to communicate should our systems be hit either by patching or by ransomware.<\/p>\n<p>More from Gates: \u201cSecurity: The data our software and services store on behalf of our customers should be protected from harm and used or modified only in appropriate ways. Security models should be easy for developers to understand and build into their applications.\u201d<\/p>\n<p>And yet, last week\u2019s security releases included confusing communication regarding a potentially wormable flaw. The https bug in the form of CVE-2022-21907 is\u00a0<a href=\"https:\/\/twitter.com\/wdormann\/status\/1480972462812770305\" rel=\"noopener nofollow\" target=\"_blank\">not clear on which versions are vulnerable<\/a>. Clarification and analysis had to come from external sources before we could <a href=\"https:\/\/attackerkb.com\/topics\/xlCKfuW3a8\/cve-2022-21907?referrer=profile\" rel=\"noopener nofollow\" target=\"_blank\">figure out Windows 10 version 1809 and Server 2019 are not vulnerable<\/a>\u00a0by default \u2014 unless the HKLM:SystemCurrentControlSetServicesHTTPParameterEnableTrailerSupport registry key is set to 1. Versions of Windows 10 after 1809 <em>are<\/em> vulnerable by default. I\u2019d argue that 20 years after the release of the trustworthy computing memo, our security models \u2014 and just as importantly, our security communication \u2014 still aren\u2019t easy to understand.<\/p>\n<p>We\u2019re also tracking <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/release-health\/status-windows-8.1-and-windows-server-2012-r2#2776msgdesc\" rel=\"noopener nofollow\" target=\"_blank\">issues with HyperV servers on Server 2012R2<\/a>\u00a0(and, it appears, only that platform) where virtual machines fail to start after applying KB5009624 on devices using UEFI. If you have any virtual servers hosted on Server 2012R2, hold back on installing updates on those platforms.<\/p>\n<p>And users of Windows 10 workstations that rely on Virtual Private Networks for remote access are having to uninstall the January updates due to a side effect that breaks VPN access on Windows 10 or Windows 11 systems. For those who rely on L2TP VPN or IPsec VPN, you will <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/release-health\/status-windows-11-21h2#2773msgdesc\" rel=\"noopener nofollow\" target=\"_blank\">fail to connect using VPN<\/a>\u00a0after installing the updates.<\/p>\n<p>Gates closed out his memo with this: \u201cGoing forward, we must develop technologies and policies that help businesses better manage ever larger networks of PCs, servers and other intelligent devices, knowing that their critical business systems are safe from harm. Systems will have to become self-managing and inherently resilient. We need to prepare now for the kind of software that will make this happen, and we must be the kind of company that people can rely on to deliver it.\u201d\u00a0<\/p>\n<p>So how did that work out? We\u2019re in the same place we were 20 years ago; we still have to rely on ourselves to decide on the right time to install updates.<\/p>\n<p>So how do you really feel about security? Join the discussion in the <a href=\"https:\/\/www.askwoody.com\/forums\/topic\/trustworthy-computing-memo-is-20-years-old\/\" rel=\"noopener nofollow\" target=\"_blank\">AskWoody forums<\/a>!<\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3647289\/20-years-after-gates-call-for-trustworthy-computing-we-re-still-not-there.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/idge\/imported\/imageapi\/2022\/01\/11\/12\/internet_security_privacy-100715273-large.3x2-100916002-large.3x2.jpg?auto=webp&amp;quality=85,70\"\/><\/p>\n<p><strong>Credit to Author: Susan Bradley| Date: Mon, 17 Jan 2022 03:42:00 -0800<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p>Do you feel more secure? Is your computing experience more trustworthy these days?<\/p>\n<p>Seriously \u2014 you\u2019re reading this article on a computer or phone, connecting to this site on an internet shared with your Grandma as well as Russian hackers, North Korean attackers, and lots of teenagers \u00a0looking at TikTok videos. It\u2019s been 20 years since then-Microsoft CEO Bill Gates wrote his <a href=\"https:\/\/www.wired.com\/2002\/01\/bill-gates-trustworthy-computing\/\" rel=\"noopener nofollow\" target=\"_blank\">Trustworthy Computing memo<\/a> where he emphasized security in the company\u2019s products.<\/p>\n<p>So are we actually more secure now?<\/p>\n<p>I\u2019m going to keep in mind the side effects from last week\u2019s Patch Tuesday security updates and consider them in my answer. First, the good news: I don\u2019t see major side effects occurring on PCs not connected to active directory domains (and I haven\u2019t seen any showstoppers in testing my hardware at home). I can still print to my local HP and Brother printers. I can surf and access files. So, while I\u2019m not ready yet to give an all-clear to install the January updates, when I do, I doubt you\u2019ll see side effects.<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3647289\/20-years-after-gates-call-for-trustworthy-computing-we-re-still-not-there.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[10516,714,24580,10525,10761],"class_list":["post-18058","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-microsoft","tag-security","tag-small-and-medium-business","tag-windows","tag-windows-10"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18058","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=18058"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18058\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=18058"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=18058"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=18058"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}