C2 rating aside, NT isn't secure

 

Connecting state and local government leaders

Even as Microsoft Corp. begins capitalizing on the National Security Agency's recent C2 certification of Windows NT, computer security experts warn that NT can be penetrated easily by unauthorized users with basic programming skills. Industry sources say the vulnerabilities in Windows NT and other C2 operating systems create a golden opportunity for computer-literate moles throughout the Defense Department.

Even as Microsoft Corp. begins capitalizing on the National
Security Agency's recent C2 certification of Windows NT, computer security experts warn
that NT can be penetrated easily by unauthorized users with basic programming skills.


Industry sources say the vulnerabilities in Windows NT and other C2 operating systems
create a golden opportunity for computer-literate moles throughout the Defense Department.


According to DOD security criteria, a C2 rating is supposed to guarantee that an
operating system can prevent unauthorized access to specific files on a computer and
generate an uneraseable audit trail of attempts to gain access.


But at the Armed Forces Communications and Electronic Association's TechNet conference
in Washington this spring, dozens of attendees watched as Robert Wainright, a Camden,
N.J., computer security consultant, used commercial utilities to read, copy and delete
protected data on the hard drive of a PC running Microsoft Windows NT--all without leaving
a trace.


Wainright exploited the so-called "boot floppy" vulnerability of PCs with
Intel Corp. microprocessors and floppy disk drives. By interrupting a normal boot-up from
the hard drive, a user can invoke the system setup routines and boot from the floppy.
Using assembly language utilities, an intruder then can read, copy or delete files from
the hard drive, all without ever invoking the operating system and its security features.


NSA's National Computer Security Center certified Windows NT at the C2 level on July
31. Over the past three years, DOD has bought close to 100,000 copies of NT. Users include
the 1,400 people on the top-secret dedicated network that serves the Joint Chiefs of
Staff.


Now the Defense Information Systems Agency plans to install Windows NT on every system
connected to DISAnet, a 6,500-node, sensitive but unclassified network. The agency will
use Windows NT even though a recent DISA-commissioned study questioned the program's
security.


As part of its efforts to evaluate the security features of Windows NT, DISA earlier
this year hired I-NET Inc. in Bethesda, Md., to conduct an independent security review of
the operating system. I-Net used Version 3.5 of Windows NT for its review.


In a report dated June 16, parts of which were obtained by GCN from a source outside
the company and DISA, I-NET concluded that although the software did provide
"significant improvements in embedded network security," the boot floppy
vulnerability "makes Windows NT incapable of providing the required C2 security
features in the areas of identification and authentication, discretional access control or
audit protection for the "secure' operating system."


Sarah Jane League, DISA's chief information officer, told GCN that she was not aware of
the report's conclusions and that she has approved the Windows NT installations.


"We look to NSA for authority on these matters," League said in response to a
question about the vulnerability, "and they have just certified Windows NT as a C2
system."


NSA said in response to questions submitted by GCN that "it is not possible for
any operating system to be evaluated under the Trusted Computer System Evaluation Criteria
and receive a C2 rating if that operating system and host hardware platform does not
prevent unauthorized "booting from a floppy drive.' "


According to Kenneth Moss, head of the Windows NT C2 certification team at Microsoft,
the apparent contradiction is explained by the fact that the two ProLiant computers from
Compaq Computer Corp. on which Windows NT was evaluated by NCSC had floppy drives that
wer'MDUL''MDNM'e disabled.


NSA tends to relegate floppy-drive vulnerabilities to the "physical security"
arena, Moss said. This includes any measure, from removing the floppy drive each night to
installing a Fortezza encryption card, that can make it difficult for an intruder to boot
from the floppy.


Moss acknowledged that a smart user certainly could bypass NT's security features.
"We've done everything we can from a software perspective to prevent this from
happening," he said. The responsibility ultimately rests with system administrators
who must restrict user access to each system's power switch, floppy drive and the computer
case itself, he suggested.


But industry security experts said real-world users of C2-level systems rarely follow
such cumbersome guidelines. When C2 systems are used by security-cleared personnel in
restricted facilities, the users often begin to regard extra precautions as unnecessary.


Critics of the current C2 criteria say the reliance on physical security is at odds
with DOD's own C2 definitions, which don't distinguish between software and hardware.
Indeed, a May 1992 addendum to the Trusted Computer System Evaluation Criteria, or Orange
Book, explicitly states that C2-level security features "must be both tamperproof and
non-compromisable."


Security experts say the contradictions result from the application of an obsolete
security paradigm. "The Orange Book is a product of the mainframe era, when everyone
was sharing one big computer that was locked behind a glass box where only the system
administrator could get to it," one security consultant said.


The solution, some suggested, would be to expand requirements for C2 certification to
include user-friendly hardware security features that would preclude booting from the
floppy drive but still give users a reasonable level of independence.


Several of the industry sources who spoke to GCN for this article are associated with
companies that sell such products, usually plug-in circuit cards known as "hardware
reference monitors." Costing between $100 and $300 apiece, depending on features,
these products let users disable or lock the floppy drive, encrypt the hard drive and
invoke other security features that work in tandem with operating system security.


A senior executive at Fischer International Systems Corp. in Naples, Fla., said that
over the past three years the company has sold DOD customers "over 100,000
copies" of its Watchdog PC security product, which provides boot floppy protection
and other features.


X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.