NSA, Microsoft Worked Together on Windows Vista Security
NSA, Microsoft Worked Together on Windows Vista Security
JAN 10, 2007
The U.S. agency best known for eavesdropping on telephone calls had a hand in the development of Microsoft’s Vista operating system, Microsoft confirmed Tuesday.
The National Security Agency (NSA) stepped in to help Microsoft develop a
configuration of its next-generation operating system that would meet U.S.
Department of Defense (DoD) requirements, said NSA spokesman Ken White.
This is not the first time the secretive agency has been brought in to consult
private industry on operating system security, White said, but it is the first
time the NSA has worked with a vendor prior to the release of an operating
system.
By getting involved early in the process, the NSA helped Microsoft ensure that
it was delivering a product that was both secure and compatible with existing
government software, he said.
"This allows us to ensure that the off-the-shelf security configuration that the
DoD customer receives is at a level that meets our standards," White said. "It
just makes a lot more sense to be involved up front than it does to have the tail
wag the dog."
The NSA’s involvement in Vista was first reported Tuesday by The Washington Post.
The NSA has
provided guidance on how best to secure Microsoft’s Windows XP and
Windows 2000 operating systems in the past. The agency is also credited with
reviewing the Vista Security Guide published on Microsoft’s
website.
Microsoft declined to allow its executives to be interviewed for this story. But
in a statement, the company said it asked a number of entities and government
agencies to review Vista, including the NSA, the North Atlantic Treaty
Organization (NATO), and the National Institute of Standards and Technology
(NIST).
Still, the NSA’s involvement in Vista raises red flags for some. "There
could be some good reason for concern," said Marc Rotenberg, executive director
of the Electronic Privacy Information Center (EPIC). "Some bells are going to go
off when the government’s spy agency is working with the private
sector’s top developer of operating systems."
Part of this concern may stem from the NSA’s reported historical interest
in gaining "backdoor" access to encrypted data produced by products from U.S.
computer companies like Microsoft.
In 1999, U.S. Congressman Curt Weldon said that "high-level deal-making on
access to encrypted data had taken place between the NSA and IBM and Microsoft,"
according to EPIC’s website.
With Vista expected to eventually power the majority of the world’s
personal computers, it would be tempting for the government agency to push for a
way to gain access to data on these systems, privacy advocates say.
The NSA provided guidance on Vista’s security configuration, but it did
not open any back doors to Windows, White said. "This is not the development of
code here. This is the assisting in the development of a security configuration,"
he said.
While the NSA is best known for its surveillance activities, the work with
Microsoft is being done in accordance with the NSA’s second mandate: to
protect the nation’s information system, White said. "This is the other
half of the NSA mission that you never hear much about," he said. "All you ever
hear about is foreign signal intelligence. The other half is information
assurance."
-Robert McMillan, IDG News Service (San Francisco Bureau)
FLASHBACK: How NSA access was built into Windows
Duncan Campbell 04.09.1999Careless mistake reveals subversion of Windows by NSA.
A CARELESS mistake by Microsoft programmers has revealed that special access
codes prepared by the US National Security Agency have been secretly built into
Windows. The NSA access system is built into every version of the Windows
operating system now in use, except early releases of Windows 95 (and its
predecessors). The discovery comes close on the heels of the revelations earlier
this year that another US software giant, Lotus, had built an NSA "help
information" into its Notes system, and that security functions on other software
systems had been deliberately crippled.
The first discovery of the new NSA access system was made two years ago by
British researcher Dr Nicko van Someren. But it was only a few weeks ago when a
second researcher rediscovered the access system. With it, he found the evidence
linking it to NSA.
Computer security specialists have been aware for two years that unusual
features are contained inside a standard Windows software "driver" used for
security and encryption functions. The driver, called ADVAPI.DLL, enables and
controls a range of security functions. If you use Windows, you will find it in
the C:\Windows\system directory of your computer.
ADVAPI.DLL works closely with Microsoft Internet Explorer, but will only run
crypographic functions that the US governments allows Microsoft to export. That
information is bad enough news, from a European point of view. Now, it turns out
that ADVAPI will run special programmes inserted and controlled by NSA. As yet,
no-one knows what these programmes are, or what they do.
Dr Nicko van Someren reported at last year's Crypto 98 conference that he had
disassembled the ADVADPI driver. He found it contained two different keys. One
was used by Microsoft to control the cryptographic functions enabled in Windows,
in compliance with US export regulations. But the reason for building in a second
key, or who owned it, remained a mystery.
A second key Two weeks ago, a US security company came up with conclusive
evidence that the second key belongs to NSA. Like Dr van Someren, Andrew
Fernandez, chief scientist with Cryptonym of Morrisville, North Carolina, had
been probing the presence and significance of the two keys. Then he checked the
latest Service Pack release for Windows NT4, Service Pack 5. He found that
Microsoft's developers had failed to remove or "strip" the debugging symbols used
to test this software before they released it. Inside the code were the labels
for the two keys. One was called "KEY". The other was called "NSAKEY".
Fernandes reported his re-discovery of the two CAPI keys, and their secret
meaning, to "Advances in Cryptology, Crypto'99" conference held in Santa Barbara.
According to those present at the conference, Windows developers attending the
conference did not deny that the "NSA" key was built into their software. But
they refused to talk about what the key did, or why it had been put there without
users' knowledge.
A third key?! But according to two witnesses attending the conference, even
Microsoft's top crypto programmers were astonished to learn that the version of
ADVAPI.DLL shipping with Windows 2000 contains not two, but three keys. Brian
LaMachia, head of CAPI development at Microsoft was "stunned" to learn of these
discoveries, by outsiders. The latest discovery by Dr van Someren is based on
advanced search methods which test and report on the "entropy" of programming
code.
Within the Microsoft organisation, access to Windows source code is said to be
highly compartmentalized, making it easy for modifications to be inserted without
the knowledge of even the respective product managers.
Researchers are divided about whether the NSA key could be intended to let US
government users of Windows run classified cryptosystems on their machines or
whether it is intended to open up anyone's and everyone's Windows computer to
intelligence gathering techniques deployed by NSA's burgeoning corps of
"information warriors".
According to Fernandez of Cryptonym, the result of having the secret key inside
your Windows operating system "is that it is tremendously easier for the NSA to
load unauthorized security services on all copies of Microsoft Windows, and once
these security services are loaded, they can effectively compromise your entire
operating system". The NSA key is contained inside all versions of Windows from
Windows 95 OSR2 onwards.
"For non-American IT managers relying on Windows NT to operate highly secure
data centres, this find is worrying", he added. "The US government is currently
making it as difficult as possible for "strong" crypto to be used outside of the
US. That they have also installed a cryptographic back-door in the world's most
abundant operating system should send a strong message to foreign IT
managers".
"How is an IT manager to feel when they learn that in every copy of Windows
sold, Microsoft has a 'back door' for NSA - making it orders of magnitude easier
for the US government to access your computer?" he asked.
Can the loophole be turned round against the snoopers?
Dr van Someren feels that the primary purpose of the NSA key inside Windows may
be for legitimate US government use. But he says that there cannot be a
legitimate explanation for the third key in Windows 2000 CAPI. "It looks more
fishy", he said.
Fernandez believes that NSA's built-in loophole can be turned round against the
snoopers. The NSA key inside CAPI can be replaced by your own key, and used to
sign cryptographic security modules from overseas or unauthorised third parties,
unapproved by Microsoft or the NSA. This is exactly what the US government has
been trying to prevent. A demonstration "how to do it" program that replaces the
NSA key can be found on Cryptonym's.
According to one leading US cryptographer, the IT world should be thankful that
the subversion of Windows by NSA has come to light before the arrival of CPUs
that handles encrypted instruction sets. These would make the type of discoveries
made this month impossible. "Had the next-generation CPU's with encrypted
instruction sets already been deployed, we would have never found out about
NSAKEY."
Disclaimer