Security Firm Bypasses Patch Guard 122
filenavigator writes, "This week the security firm Authentium found a workaround for Patch Guard, the security feature Microsoft has embedded into the 64-bit version of Windows. It is supposed to keep out unsigned drivers, kernel modifications, and security company competitors. With Authentium's workaround it can be turned off, software installed, and turned right back on. Microsoft immediately responded by saying their reckless ways are endangering the security of Windows users and that they will disable this hack quickly."
The Aura of Patchiness! (Score:2, Funny)
Reckless? (Score:5, Insightful)
Spelling correction. (Score:5, Funny)
Re:Spelling correction. (Score:4, Funny)
Re: (Score:1, Interesting)
One's a mistake; the other is deliberate.
Re: (Score:3, Informative)
Re: (Score:3, Insightful)
As a security company, Authentium ought to know how to handle exploits properly. Presumably if they had a trusting relationship with Microsoft, they'd let them know about it quietly. Instead, they announced it publicly, using it as a bargaining chip against Microsoft in case it reneges on its promise to provide adequate APIs for security vendors.
M
Re: (Score:1)
Backasswards compatibility (Score:3, Insightful)
It would seem to me that backwards compatibility is, once again, a security hole.
No it's not... This isn't about security anyway. (Score:2)
Reckless (Score:2, Insightful)
Re: (Score:2)
It is supposed to increase the security of software and content run on those machines against their users.
Let it be said again. (Score:4, Insightful)
If Microsoft hadn't been so assholeish about it, no one would have needed to circumvent their "protections".
LK
Re: (Score:2)
Re:Let it be said again. (Score:5, Insightful)
Re:Let it be said again. (Score:5, Insightful)
Re: (Score:3, Insightful)
Re: (Score:2)
However, Microsoft HAS decided that only kernel-mode drivers signed with a SPC (software publishing certificate) can be loaded [microsoft.com] on x64. Microsoft doesn't charge anything for a SPC directly, but you do need to buy a cert from a commercial CA [microsoft.com] like Verisign. There is also an option [msdn.com] that the user can
Re: (Score:2)
Uhhh, what? Daemon Tools 4.0.6 runs just fine in both 32-bit and 64-bit Vista. And Jesus Christ, as far as affording certs go I guess the majority of Slashdot has never heard of donating to a project you care about keeping around. $500 for a one-year license? Oh no, whatever shall we do?! Give me a fscking break, am a regular at many sites which operate off donations and pitch in when I can to keep what I like active.
Re: (Score:1)
And I should have used the preview button to catch that missing 'I'.
Re: (Score:2)
Re: (Score:1)
He's the one who chose to sell his name, so I find it difficult to cry too hard for him.
Re: (Score:2)
Re: (Score:2)
Politeness (Score:5, Funny)
Rather nice way to say "Thanks, we will fix this right away" eh?
Re: (Score:1)
'obvious' bug. (Score:4, Interesting)
If such an obvious bypass has not been considered, how many other such issues exist that are yet undiscovered?
Then, the supposed 'fix' is to disallow writing raw disk sectors for any non kernel code. This will only work when not allowing for things like disk editors and recovery tools, because those would need ways to bypass this and this just opens up new attack vectors.
MS PhotoEditor will outperform Adobe by 100x (Score:5, Insightful)
Yeah, sure it is a far fetched conspirational theory. Mods, before you mod it troll or offtopic or wierd or paranoid, take a look at the comments in the code outed by MainSoft. Obsolete version of Windows NT code. But it had numerous comments like, "Private entry point for Jim to get Excel access memory faster". Private entry points, calls that take shortcuts through several application layers and protocols... that is how security holes are made. Such close nexus between application coders and OS coders is the reason why such api-layers are violated.
Re: (Score:1)
Re:MS PhotoEditor will outperform Adobe by 100x (Score:5, Informative)
PatchGuard is only there to discourage apps that hook the syscall table (an inherantly unsafe operation) and make other modifications to the kernel's private, volaitle internal interfaces. When Windows NT was written, the MS devs never expected 3rd party devs to go poking around with the kernel's private interfaces, and are rightly disgusted when those 3rd party software programs cause problems because of it. Compare this to Linux: you are free to maintain your own custom build of the kernel, but in the mainline, all the kernel interfaces are so volaitle, every minor revision is binary incompatible with the rest. You'd never get a device driver accepted into the mainline if it depended on private interfaces that break every revision, even on a source level. Microsoft is well within their prerogative to make changes the Windows kernel's internal, private interfaces. This doesn't work too well when 3rd party apps are dependent on them never changing, especially when Windows crashes because of it. PatchGuard is a technical speed bump to make it harder for 3rd party software companies to screw with the kernel's internals. Microsoft knows that it's an unwinnable arms race [msdn.com], but hope that the 3rd parties will decide it's just easier to stick to the kernel's public interfaces. Microsoft is willing to create new stable public interfaces to support the necessary behavior.
The only thing I can think of that you might be talking about for reduced performance is if you meant no intermediate buffering when you said "direct disk write". The FILE_FLAG_NO_BUFFERING and FILE_FLAG_WRITE_THROUGH [microsoft.com] buffering options are unrelated to direct disk access (which actually means bypassing the filesystem to access the block device directly). Write through and unbuffered IO aren't going anywhere.
As for special hooks that MS applications get into the OS that no one else gets, how about an actual example?
Re: (Score:2)
Well couple of minutes in google fetches this gem
from this site. [tfproject.org] Since MS is closed sour
Re: (Score:2)
Excel 5.0 was released in 1993 for Win16 and uses undocumented messages in one of the windows common controls. I was hoping for something a little more substantive, more recent, and involving the kernel.
In the InquireVisRgn comment doesn't mention anywhere that InquireVisRgn or the "private entry point" is used by anything but the OS itself. It's not an issue if the OS is using its own private interfaces.
Notice that in the article, they noted that there were about as many compatibility hack
Goes in the source tree? Why? (Score:1, Redundant)
You know there will be provisions for THEIR apps to do such a thing since they are 'trusted', but deny others the same direct access 'for your security' .
Re: (Score:1)
This problem on Vista isn't newly discovered. It was discussed here [redhat.com] earlier this month, in fact.
Re: (Score:2)
It just surprises me that Vista didn't guard against it so far because of it being such a well known concept, and even if you didn't know the concept, it shoul
Remember what "security" means (Score:5, Insightful)
To users, security is about protecting the machine from external threats.
To Microsoft, security is about protecting the machine from everyone, including the owner and admin.
To users, security is about protecting the user's personal data and ability to use the machine.
To Microsoft, security is about protecting someone's data (not necessarily the user's) from everyone (perhaps including the user).
To the computer's owner, the machine is entirely their own domain, and exists for their own benefit to maximize their own interests.
To Microsoft, the machine is partitioned and not all of it belongs to the owner, ultimately to maximize Microsoft's interests.
To the computer's owner, their relationship to Microsoft is that the computer owner is the customer.
To Microsoft, their relationship to the computer's owner, is that the owner is both a customer and a product.
Re: (Score:2)
Re: (Score:2)
To Microsoft, security is about protecting someone's data (not necessarily the user's) from everyone (perhaps including the user).
the population of the US is 300 million.
at any given moment there must be millions of users running a PC without advanced skills or technical support. no help desk. no system adminstrator. no geek living next door with a clue to what has gone wrong and how to fix it.
in that co
Re: (Score:2)
When a machine's (or its maker's) intentions are above its user's, something is running very wrong. My machine is mine. And I will make it mine.
If that means to break the law, so be it.
Re: (Score:2)
And right there is half the problem; the most common threat faced by a desktop machine is that of a user with admin privs unwittingly installing a trojan or virus.
Banging head against cement.... (Score:2)
1. Microsoft historically cannot secure it's own operating system.
2. Microsoft wants to charge for securing it's operating system.
3. Microsoft makes it difficult for *others* to secure it's operating system.
Yeesh...
1. Ford historically makes cars that explode.
2. Ford wants to charge extra for a car with "
Re:Banging head against cement.... (Score:4, Insightful)
Re: (Score:2)
But if you actually use their OS it makes no sense because the fox is guarding the chicken coop.
Re: (Score:2)
Re: (Score:2)
That is not "reasonable". In fact, it totally screws many independent software developers. For example, if you have a piece of software with a driver that gets frequently updated, do they really expect you to get every one tested and signed by MS? This is their way of making money and locking out smaller software companies.
I don't see how it helps security, anyway. If something has gotten to the point w
Re: (Score:2)
That is not "reasonable". In fact, it totally screws many independent software developers. For example, if you have a piece of software with a driver that gets frequently updated, do they really expect you to get every one tested and signed by MS? This is their way of making money and locking out smaller software companies.
Maybe those small developers should write their code properly so such frequent updates aren't necessary ?
I don't see how it helps security, anyway. If something has gotten to the poi
Re: (Score:1)
http://www.fuelsafe.com/mustang.htm [fuelsafe.com]
KFG
Re: (Score:2, Funny)
1. Uncle Ben [unclebens.com] historicly produces meals that make me constipated. 2. Uncle Ben wants to charge extra for meals that wont make me constipated. 3. Uncle Ben makes it hard for others to take a shit.
The conclusion: (Score:3, Insightful)
RTFA! (Score:2)
Anyways, good riddance that this company found another way around...
Re: (Score:2)
Next time I'll be more careful. [wikipedia.org]
Obscurity... (Score:3, Interesting)
If you can package it to put it into a black box, someone's either going to open it, poke at it for a response, or figure out how to replace it. And especially with computers, they'll figure out how to use it in a more general way than you intended.
If you cannot accept that your ideas, no matter how big or well-crafted, are just a part of the greater ocean of ideas, then as long as your ideas can be used, your ideas are going to be swept away against your wishes. Until the nature of humanity is changed, that is the nature of the way we deal with ideas (and thus software/hardware). I personally find much more comfort in that dynamic than pain - there are many more ways to use that dynamic rather than fight against the ocean, so to speak.
Ryan Fenton
Bit of a stretch (Score:3, Interesting)
Re: (Score:2)
Unsigned drivers (Score:1)
Re: (Score:2)
Last time I checked anyone could write a driver for Darwin/MacOS X. No need to pay a $500 privilege to do so.
Wait, wait. . . (Score:2, Insightful)
Re: (Score:2)
Funny thing is that it's useless, it won't stop people from copying data or emulating hardware.
At least not until the hardware itself is able to recognize Windows and refuse to run everything else. And even then, it is a hard problem to solve.
Re: (Score:1)
Re: (Score:2)
Change a few words around and I'd think you were describing Mac OSX on Intel:
"At least not until the OS itself is able to recognize apple hardware and refuse to run on everything else."
Re: (Score:2)
Re: (Score:1)
I may get a karma hit for this, but. . .
My concern is not whether you have control over your own computer system, but whether an unauthorized person is able to hook the kernel to install a root kit wreaking havoc on my own system. Remember, it was MS's laudable decision to make admin the default mode in XP to begin with rather than following Linux and OSX method of requiring password access for any system level manipulation opening us up to a myriad of web bugs. It is because of this poor judgement tha
Dear Microsoft... (Score:2)
Seriously, did they think this wouldn't be broken? This has become a bad joke. Big company uses software to protect their code, rag tag team of coders breaks it, big company throws a hissy fit, we all laugh at and mock the company.
How many more times must this happen before someone at one of these megalithic corporations realizes all they're doing is reinventing the wheel over...and over...and over again?
Nice Anti-Microsoft blurb - good job, editors (Score:5, Informative)
Uhm. Yes. According to -some- security company competitors whose entirely livelihood depends on Windows being as insecure as it is? Certainly not according to Microsoft itself.
"Microsoft immediately responded"
really?
Microsoft doesn't respond anywhere in that article. In fact, page 2 (yes, it's one of THOSE articles) specifically reads:
"Microsoft representatives didn't immediately respond to calls seeking comment on Authentium's move."
So where -did- they respond?
"by saying their reckless
and that whole article doesn't contain the word 'reckless' at all. So where did they say this, again?
Mind you, the article itself is in error when on page 2 it states:
"Next Page: Microsoft defends itself."
And when you get to page 3, you get:
- a symantec spokesperson
- an industry watcher, possibly:
- Andrew Jaquith of Yankee Group
But absolutely no Microsoft. So where is Microsoft defending itself?
Don't get me wrong, I think PatchGuard probably has more holes than a slice of Swiss cheese... but the submitter's text needs redacting, and the original article could do with an -actual- statement from Microsoft.
The Microsoft statement is behind the other link (Score:3, Informative)
Perhaps this link was added to the slashdot summary after you posted your comment for all I know, but the slashdot summary that I read had two links, and I found that statement quite clearly after following the first link [intelliadmin.com]. About the 13th paragraph down in that article states, complete with the
Re: (Score:2)
I think I'm still looking for the statement about something being quote reckless unquote, though. Saying that they are unhappy (duh), and that user's might find themselves in a pickle if relying on a product which uses a method that will be rendered defunct soon (or already is, according to that article you linked to), is hardly saying that Authentium was being reckless and endangering Windows security and
Wayback Machine... (Score:1, Insightful)
I haven't had a machine with one of those in at least 5 years. I also don't have a 5 1/4" floppy drive anymore. Both turn a modern dual-core machine into an Apple ][e class machine.
In all seriousness, why is this even supported in 64bit Vista?
Memory is no longer a constraint in a 64bit system. If you can afford $450+ (widely leaked price) for the non-crippled Vista, you can afford the RAM. And if you're running a server, paging = death, even when using 15k RPM drives.
Re: (Score:3, Informative)
Sure, 64-bit means a memory cap so high it is very unlikely you will ever reach it, but what is the highest one machine is going to have? 8GB? 16GB? Even with that much memory, a paging file can sometimes increase performance. It may be because of architectural design faults. At one point L
Re: (Score:1, Insightful)
Swap
Re: (Score:3, Insightful)
Re: (Score:1)
In practice, this might not always work perfectly (especially when you're doing a lot of disk I/O); but I suppose it works pretty well most of the time for most people. It does - most of the time - for me at least.
Re: (Score:2, Interesting)
Some applications need a lot of RAM, but not all at once. So if they don't do a lot of page-outs, they are actually put a much less significant load on the overall system than the same applications would if they had to store their entire state in physical RAM.
Re: (Score:1)
Secondly swap is invaluable when running large multiuser application servers.
Yes swap will kill your web server, probably your file server too, but when it comes to user applications where a large proportion of them will be suspended at any one time, I'm not going to put 16G of ram in a server when 8G and 8G of swap is perfectly sufficient. For instance a user leaves a browser open at some page for 4 days, it's not doing anything, but
Re: (Score:2)
A few notes:
This ranks with WMP crack (Score:2)
thoughts on patchguard (Score:5, Insightful)
Also, a lot of people are really talking it up about how Microsoft sucks and patchguard is just another flawed attempt at security by a company that doesn't know its ass from its elbow (or something to that nature)...but I haven't seen much if any effort by any of the other mainstream OSes to prevent kernel patching at all. It is downright trivial to write a Linux kernel module which hooks all sorts of critical data structures, same with FreeBSD and Solaris.
Is it the argument of the anti-patchguard people that if it can't be done perfectly, lets not even bother?
I guess the major driving point of my being a Microsoft apologist in this case is that, at least from an academic point of view, the kernel is supposed to be the only software which accesses these low level things and abstracts out interfaces for the rest of the software to utilize...the kernel shouldn't be exposing anything like direct disk access, or kernel space memory to user space....ever, under any circumstances. do that and things like rootkits are an awful lot harder to make in the first place.
Some Linux distros are starting to get the point by limiting and sometimes eliminating entirely access to
The way I see it, Microsoft may not be perfect, but at least they are trying.
proxy
Seriously (Score:2)
Re: (Score:3, Informative)
Nope,
I can build my Linux kernel without module support. Your module is not going to get loaded.
Enjoy,
Re: (Score:2)
Granted, using something like GRSecurity, it's certainly doable. It does, however, require some third party help.
Re: (Score:3, Informative)
Eivind.
Re: (Score:2)
This is about stopping the user from modifying the kernel's behaviour, so that Microsoft can lock down your computer and control what you do with it.
N
Re: (Score:2)
Secondly to respond it being about
Well yea, who says that the user should be able to?
Re: (Score:3, Funny)
That might fix a few Windows kernel bugs, but imagine the hordes of new bug reports you'd see instead:
"I want to start Excel, but it's in the Arathi Highlands and I keep getting PKed by a level 60!"
Biased story submission, (Score:3, Informative)
But the article reads differently. "Microsoft representatives didn't immediately respond to calls seeking comment on Authentium's move. O'Donnell said that Authentium has informed Microsoft of its work, and that the software company asked it to abandon the tactic and wait for its new APIs
Re: (Score:2)
Patch Guard according to Sophos (Score:2)
This posting itself only provides a direct link to a Sophos article, and does not indicate any opinion on the subject, either of mine or of my employer (whomsoever that may be - which I'm not telling you).
Re: (Score:2)
Unsigned drivers necessary for now (Score:2, Informative)
Re: (Score:1)
Best. Grammar error. Ever. (Score:2)
This is why God invented ambiguous references:
Microsoft immediately responded by saying their reckless ways are endangering the security of Windows users
Finally, admission of guilt.
Yeah, right. Reckless. (Score:2)
Same way it would have been reckless to point out the iceberg to the captain of the Titanic.
Security against the user will not work (Score:2)
It's sensible to assume that they will be used instead.
The battle for system security is up, and this time it's not MS and its users against the malware writers. It is MS against its users, and users against malware authors. Yes, I did not forget about the tangent of MS against ma
Re: (Score:1)
New Canonical Oxymoron: Microsoft Security Feature (Score:2)
Anything that highlights one of the many flaws in a typical Microsoft (In)security feature should not be considered an a mere exploit or even a workaround, but rather a tremendous public service! When said public service enables the installation of real security features (as opposed to the buggy bloatware which Microsoft Hype(tm) labels a "security f
not X64 just Vista (Score:2)
But but but (Score:2)
Right, I'm sulking now ;p
Sorry what was that? (Score:1)
Re: (Score:2)
Re: (Score:2)
So, yes, involving a second website in order to get an anti-Microsoft quote is indeed a biased summary.
Re: (Score:2)
This was followed by the sig, "The sun is hot! Water is wet! Slashdot summary is biased! News at eleven."
I