Vista - PowerPoint PPT Presentation

1 / 48
About This Presentation
Title:

Vista

Description:

... you want to rush to Redmond, Wash. and rip somebody's liver out. ... Activation is good for 180 days. Activation. Out-of-Tolerance Grace. ... 30 days to re ... – PowerPoint PPT presentation

Number of Views:86
Avg rating:3.0/5.0
Slides: 49
Provided by: dc214D
Category:
Tags: vista

less

Transcript and Presenter's Notes

Title: Vista


1
Vista
Security or Insecurity?
2
Who, What, Why
  • piis8_at_yahoo.com
  • piis8, isac balder, I.B.
  • Vista RC1 Build 5600 Ultimate
  • Vista Enterprise Build 6000
  • Mileage may vary with home versions
  • Security Settings and Features
  • Is Vista really going to be better than XP?
  • Some statements contained herein are my own
    poorly validated conclusions and may be utter
    rubbish.

3
Vista
  • Windows Vista introduces breakthrough computing
    experiences that are both visually exciting and
    intuitively designed, and will positively change
    the ways in which you use your PC. - Microsoft
  • Windows Vista introduces dramatic improvements
    for business. - Microsoft
  • Windows Vista is the name of the latest release
    of Microsoft Windows, a line of proprietary
    graphical operating systems used on personal
    computers, including home and business desktops,
    notebook computers, and media centers. -
    Wikipedia
  • A big fucking headache. - hapless IT weeny
  • Vista is at best mildly annoying and at worst
    makes you want to rush to Redmond, Wash. and rip
    somebody's liver out. - Stephen Manes

4
License and Registration
  • Versions
  • EULA
  • Activation
  • Security Features
  • Security-ish Features
  • Hazardous Features
  • Parental Controls
  • QA

5
Versions
  • Starter (limited distributions with new PC)
  • Home Basic (N) - 199
  • Home Premium - 239
  • Business (N) - 299
  • Enterprise (volume license distribution)
  • Ultimate - 399
  • N designates EU Anti-Trust version with media
    related technologies removed.
  • Starter has no 64 bit support.

6
Versions - Home
  • Basic
  • No Aero GUI, Flip 3D, or Live Taskbar Thumbnails
  • Single Processor Support, 4 GB Max RAM Support
    (64 bit 8GB)
  • No Encryption or Backup Features (BitLocker, EFS,
    ShadowCopy, etc.)
  • Limited Media support, (No Xbox, Media Center,
    DVD Maker, etc.)
  • Limited Network support, 5 peer connections
    limit, No Domain support
  • Client Only for Remote Desktop
  • NO IIS

7
Versions - Home
  • Premium
  • Dual processor Support, 4GB Max RAM Support (64
    bit 16GB)
  • Scheduled Backup Only, no Encryption Features
  • Limited Network Support, No Domain support
  • Client Only for Remote Desktop
  • NO IIS

8
Versions - Business
  • Business
  • Dual Processor Support, 4 GB Max RAM Support (64
    bit 128GB)
  • No Parental Controls
  • No Media Center Components
  • No BitLocker (FDE)

9
Versions - Business
  • Enterprise
  • No Retail sales, Volume Licensing only
  • Dual processor Support, 4GB Max RAM Support (64
    bit 128GB)
  • No Parental Controls
  • No Media Center Components
  • No Upgrade Options

10
Versions - Ultimate
  • Ultimate
  • Everything Plus Ultimate Extras
  • Superset of Home and Business

11
EULA
  • EULA varies based on version
  • Center of much confusion and hyped controversy
  • MS is attempting to enforce what was always there

12
EULA
  • Activation Keys, Transfer Ability, etc.
  • Technically no change to the EULA
  • The change is in MSs attempt to enforce the EULA
  • Transfer - Re-installation to a new device is
    allowed once!
  • Retail version only, no transfer for
    Pre-Installed / OEM versions
  • a. Software Other than Windows Anytime Upgrade.
    The first user of the software may reassign the
    license to another device one time. If you
    reassign the license, that other device becomes
    the "licensed device." b. Windows Anytime
    Upgrade Software. The first user of the software
    may reassign the license to another device one
    time, but only if the license terms of the
    software you upgraded from allows reassignment.
  • Upgrade / Clean Install
  • By using the Up-grade option your previous OS key
    becomes invalid. Upgrade this replaces
    that, period.
  • Upgrade Version checks for existence of old OS.
    (Read XP)
  • Clean install on wiped hard drive requires
    install of old OS or a work around.

13
EULA
  • Home Basic and Premium No Virtualization
  • Vista cannot be guest OS
  • 4. USE WITH VIRTUALIZATION TECHNOLOGIES. You may
    not use the software installed on the licensed
    device within a virtual (or otherwise emulated)
    hardware system.
  • Ultimate allows virtualization if no DRM
    protected content is used and No BitLocker
    encryption is used.
  • Vista can be guest OS with restrictions
  • 6. USE WITH VIRTUALIZATION TECHNOLOGIES. You may
    use the software installed on the licensed device
    within a virtual (or otherwise emulated) hardware
    system on the licensed device. If you do so, you
    may not play or access content or use
    applications protected by any Microsoft digital,
    information or enterprise rights management
    technology or other Microsoft rights management
    services or use BitLocker. We advise against
    playing or accessing content or using
    applications protected by other digital,
    information or enterprise rights management
    technology or other rights management services or
    using full volume disk drive encryption.

14
Activation
  • Activation / Licensing. OS is licensed to a
    device not a user.
  • Volume Activation 2.0
  • KMS (Key Management Server) local server
  • MAK (Multiple Activation Key) communicates with
    MS
  • KMS, default port 1688, must have 25 devices
    before server will function
  • Initial Grace Period after install is 30 days.
    RC1 gave 14 days.
  • This grace period can be reset up to 3 times. The
    initial grace period can only be restarted by
    running sysprep /generalize, or by using
    slmgr.vbs rearm.
  • Retail activation is a one time occurrence with
    periodic checks.
  • Volume License Activation is good for 180 days.

15
Activation
  • Out-of-Tolerance Grace. Peripheral changes may
    affect the profile of the system and result in
    the need to re-activate. Microsoft states if two
    or more relevant components change. You have 30
    days to re-activate.
  • Under Volume licensing a new hard drive will
    require re-activation.
  • Non-Genuine Grace. A system fails the Genuine
    Validation process. You have 30 days to
    re-activate.
  • If a device is labeled as Unlicensed (the grace
    period is allowed to expire. The system runs in
    RFM (Reduced Functionality Mode) with very
    limited in one hour increments.

16
Activation
  • RFM (Reduced Functionality Mode)
  • On RC1 Vista presented an option to purchase a
    license and nothing else.
  • This however uses the web browser which give the
    user certain access to the hard drive other wise
    not presented by the GUI itself.
  • My default was Firefox further limiting some of
    my abilities, Given IE much greater access to the
    system would be capable.
  • On Enterprise Version
  • Same behavior
  • While in RFM
  • Access via Safe Mode (without networking)
  • no Remote Desktop
  • no Shares
  • 3rd party remote access??

17
Activation
  • While in RFM
  • 3rd party remote access??
  • Not all doors are closed.

18
Activation
  • Nov 12 2006, reports of an Activation workaround
    known as the BillGates Release.
  • BillGates Release is a patch that removes the
    production activation component and replaces it
    with a beta activation component from RC2 or a
    prior beta release.
  • Dec 7 2006, it is reported that individuals have
    circumvented the activation process, dubbed the
    MelindaGates Release.
  • Melinda Gates Release is a VMware Player with the
    MelindaGates image, a fake KMS server,
    bypassing communications with Microsoft.com
  • Dec 14 2006, it is reported that Dr. Chang has
    permanently activated his copy of Windows Vista
    with a custom patch.
  • Dr. Changs code will also convert the BillGates
    release to an MSDE edition. Code has since been
    removed from original post.

19
Security Features
  • Users
  • UAC User Account Control
  • Audit
  • Shares
  • Security Center
  • Firewall
  • EFS
  • BitLocker (FDE)
  • Defender
  • Services Lockdown
  • DEP Data Execution Prevention

20
Users
  • Login, Windows Welcome screen is the only
    available logon
  • Displays all enabled accounts on the system,
    default is install account
  • Setting Do not display last user name gives an
    empty user password prompt
  • Guest and Administrator are disabled by default
    with blank passwords.
  • Administrator is not visible via User Accounts
    in Control Panel
  • Built-in Guest account cannot set a password via
    User Accounts in Control Panel
  • Built in Administrator account stays disabled in
    Safe Mode
  • Password Policy is still blank with no complexity
    by default
  • Anonymous enumeration is disabled by default
  • Same as XP SP2
  • NT-Offline does not work

21
UAC
  • Think pseudo-sudo with a prompt on crack / hyper
    nag
  • Prompt For Consent (admin)
  • Prompt For Credentials (admin and user)
  • Elevate Without Prompting (admin)
  • Automatically Deny Elevation Requests (user)
  • Home (
  • Most users run as administrator and will only see
    the consent prompt
  • One more box to simply click on
  • Domain \
  • Can extend and enhance polices and roles.
  • Another layer of complexity for Windows admins.
  • Can be disabled
  • This is not recommended by MS.

22
UAC
  • Operates by generating two access tokens for each
    administrator
  • Standard user access token
  • Full administrator access token
  • Integrity Levels
  • Low, medium, high, system
  • Process / objects of one level can only write to
    equal or lower levels
  • Reading of objects is allowed by any level,
    read-up policy
  • Integrity Levels can be assigned to every
    securable object
  • If no assignment is defined the object defaults
    to medium
  • Regardless of IL level if an executable is
    started from a high integrity process it will run
    with the higher IL
  • IE is a low IL, ran with runas IE executes with
    a medium IL
  • User Interface Privilege Isolation (UIPI) is the
    enforcement piece that completes the security
    model
  • Joanna Rutkowska has already demonstrated the
    ability to hi-jack higher IL levels
  • This spawned a fun blog exchange with Mark
    Russinovich of Sysinternals fame

23
UAC
  • Nine (9) configurable settings in Local Security
    Policy ? Security Options
  • Controlled via Group Policy in Domain environment
  • By default UAC is not applied to the Built-in
    Administrator account
  • Account is disabled, but still seems kinda silly
  • Standard user when prompted for credentials is
    given a selection of all enabled local admin
    accounts.
  • If connected to a domain you get an empty user
    password prompt
  • Prompts are not presented uniformly
  • User and Admin not prompted for the same objects
    (user is prompted for less)
  • User has view access of some admin prompted
    objects and no access to others
  • Behavior is the same in XP, but without the
    prompts (information disclosure)
  • Prompt locations are pre-determined by the OS.
  • Admin cannot configure which users get prompted
    for what objects.

24
UAC
  • UAC and assumes Administrator level for all
    software installs.
  • File name includes the string setup
  • Embedded installer manifest
  • Application UAC awareness
  • New and ALL 64 bit apps must be UAC aware
  • Legacy apps are handled via Virtual Store
    Redirection which is stated by MS as it is a
    short-term fix and not a long-term solution
  • Work around 1 - Hack up a new manifest and mod
    the executable
  • Work around 2 - disable UAC
  • Compatibility tools are available from Microsoft
    as separate downloads
  • Application Compatibility ToolKit 5
  • Application Verifier
  • Standard User Analyzer

25
Audit
  • Audit events are still disabled by Default
  • Same 9 categories as XP
  • Better Logging but not totally centralized
  • Event Viewer
  • Windows logs (security, application, system,
    setup, forwarded logs)
  • Application and Service Logs (DFS Replication,
    Hardware Events, IE, KMS, Media Center,
    Microsoft)
  • Subscriptions
  • FW Log - C\Windows\System32\Logfiles\Firewall\pfi
    rewall.log
  • Parental Log Within the Account Management UI
    of the individual account
  • Log Parser 2.2 reportedly works within Vista
  • At least one sidebar gadget is available
  • Some reporting options rely on pre-vista Office
    components

26
Shares
  • File sharing is enabled by default
  • Same old default admin shares
  • C
  • ADMIN
  • IPC
  • Vista by default does not use Simple File
    Sharing, a sharing feature that was enabled by
    default in XP
  • UAC blocks local admin accounts from remotely
    accessing remote admin shares
  • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Pol
    icies\system\LocalAccountTokenFilterPolicy
  • Sharing is unnecessarily convoluted with
    additional options.
  • Public Folder Sharing
  • Password Protected Sharing
  • Media Sharing

27
Security Center
  • Return of Automatic Updates, Windows Firewall,
    and Internet Security Settings (IE Security Tab)
  • Expanded to include Malware (Virus / Spyware)
    and UAC

28
Firewall
  • Now does outbound inspection
  • Default action is allow all outbound
  • Default logging, disabled
  • True to MS you now have four locations in which
    to configure the Firewall
  • Control Panel Limited options / Control Panel
    ? Windows Firewall
  • MMC (local computer) Advanced options /
    wf.msc
  • MMC (local group policy) Advanced options /
    Local Security Policy
  • Command line netsh firewall
  • Rules and Logging are controlled on a per profile
    basis
  • Profiles are auto-detected
  • Domain profile connected a windows domain
  • Private profile connected to a non-windows
    domain
  • Public profile connected to a public network
  • Default log has moved from C\Windows\pfirewall.lo
    g to C\Windows\System32\LogFiles\Firewall\pfirewa
    ll.log

29
Firewall
  • Control Panel UI
  • Enable / disable firewall
  • Enable disable exceptions
  • Reset to defaults
  • Logging Option is removed from the Control Panel
    UI
  • Control Panel UI does not allow modification of
    the properties of default Firewall Rules
  • Exceptions are still port centric with no port
    range support
  • Exceptions still allow Scope, ip address
    limitations
  • Reset Option does not affect group policy
    settings.

30
Firewall
  • wf.msc allows for advanced functionality
  • If group policy is left untouched, all
    functionality is available
  • Can modify default rules
  • Can monitor active log file
  • Cannot modify settings made through local group
    policy
  • Real rules can be made with the following
    attributes
  • User
  • Computer
  • Multiple port, comma separated 80, 443, 8080
  • Profile
  • Interface type (local, remote, wireless)
  • Secure / unsecured connections

31
Firewall
  • Local Group Policy MMC interface via Control
    Panel ? Administrative Tasks ? Local Security
    Policy ? Windows Firewall with Advanced
    Security
  • available in home? Probably not
  • Advanced functionality but not all
  • Does not allow for mod of default rules
  • Does not allow for monitoring of active log
  • Does not have a reset option

32
EFS
  • File level encryption
  • Full Support in Business, Enterprise, and
    Ultimate
  • Default AES 256 bit
  • Right Click and enable via properties of file
  • CLI command Cipher.exe
  • Limited Support in Home
  • if you have the encryption key or certificate,
    you can
  • Decrypt files by running Cipher.exe
  • Modify an encrypted file
  • Copy an encrypted file as decrypted to a hard
    disk
  • Import EFS certificates and keys
  • Back up EFS certificates and keys by running
    Cipher.exe

33
BitLocker
  • Full Disc encryption
  • Supported in Enterprise and Ultimate
  • Hardware dependent
  • Trusted Platform Module (TPM) 1.2 specification
    requirements of the Trusted Computing Group
  • TPM chip
  • TPM capable BIOS
  • BitLocker does not like debuggers
  • It is strongly recommend that you do not run a
    debugger when BitLocker is enabled. Running a
    debugger on your BitLocker-enabled computer
    requires you to follow the recovery process every
    time you restart the computer.
  • Test System not TPM capable.

34
Defender
  • MSs answer to Anti-Spyware
  • In comparisons Defender did not identify the
    multitude of objects as identified by other
    products
  • Now integrated into Security Center
  • RC1 and Enterprise pre-installed Defender ver.
    1.1.1505.0
  • Latest on Website ver. 1.1.1593.0 (20061229)
  • Windows Update updates Engine and definitions
  • Defender prefers uninstall prior to install of
    newer version
  • Vista has no uninstall option for Defender
  • Install attempt reports that defender is already
    installed

35
Service Lockdown
  • MS has modified the behavior of various services
  • Applied an ACL model to services
  • As Per MS
  • Introduction of a per-service security identifier
    (SID).
  • Services can apply explicit ACLs to resources
    which are private to the service
  • Moving services from LocalSystem to a lesser
    privileged account such as LocalService
  • Removal of un-necessary Windows privileges on a
    per-service basis for example debugging.
  • Applying a write-restricted access token to the
    service process.
  • Services are assigned network firewall policy.
    The firewall policy is linked directly to
    per-service SID.
  • Implementation of Kernel Patch Protection / Patch
    Guard
  • MS choose to block raw disk access from user mode
  • Sc.exe - for manual service foo.

36
DEP
  • Actually a feature from XP SP2
  • Supposed to randomize the memory locations used
    to thwart overflow attempts
  • Enabled by default on Vista
  • Essential programs and services only
  • Can be configured for all programs except x
  • bcdedit.exe - for manual foo.

37
Security-ish Features
  • IE 7
  • AutoPlay
  • Networking / IP Stack

38
IE 7
  • Security Feature??
  • Built-in Pop-up Blocking
  • Built-in Anti-Phishing
  • New user messages
  • Busted Java implementation
  • Still a malignant growth attached to the OS

39
AutoPlay
  • Is it a security Feature
  • Think Sony Rootkit
  • Now has a dedicated Menu under Control Panel
  • Easier for the average user to disable

40
Networking / IP Stack
  • New Stack, Compound TCP (CTCP),
  • enabled by default
  • Stack Changes
  • Receive Window Auto-Tuning
  • Receive-side Scaling
  • ECN Support
  • IPv6 enabled by default
  • Network Access Protection touted to improve NAC
    interoperability

41
Hazardous Features
  • People Near Me
  • Meeting Space
  • IPv6

42
People Near Me
  • People Near Me (PNM)
  • Peer-to-peer technology for network discovery and
    collaboration
  • Red beacon that screams pound my ass (insert
    goatse picture here)
  • Uses Peer Name Resolution Protocol (PNRP)
  • Automatic sign-in can be configured
  • XP can play with PNRP 2.0 patch

43
Meeting Space
  • Meeting Space
  • Old Net-Meeting on trailer park meth
  • Requires
  • File Replication
  • People Near Me
  • Firewall Rules
  • Supported in most versions
  • Basic can join, but can not host meetings
  • Ports
  • 801 and 3587 TCP
  • 1900, 3540, and 3702 UDP
  • Requires administrative credentials (initial
    setup)

44
Parental Controls
  • Not Security per say but interesting
  • Home versions
  • Feedback Controlled via Windows Live
  • Requires windows live account
  • Activity Reporting (not in central log location)
  • Logs
  • Top 10 websites visited and blocked
  • Web overrides / file downloads / blocked
    downloads
  • Logon times / apps used / app overrides / games
    played
  • Email / instant messaging / media player

45
Parental Controls
  • Web restrictions
  • MS managed site and content lists
  • Custom white list
  • Block file downloads (all or none)
  • Feedback handled via Windows Live
  • Time restrictions
  • Game restrictions
  • Ratings (selectable among 8 rating organizations)
  • White list
  • Program restrictions
  • White list

46
Windows Update
  • As of 19 Feb 2007 there are 10 updates for my
    Enterprise device
  • 6 Vista updates
  • Malicious Software Removal Tool Engine update
  • Error Reporting (sends to MS w/out notification)
  • IE Phishing performance issue
  • Application Compatibility fixes (unspecified set
    of apps)
  • Pre-Installed OS and Activation issue
  • Windows Search / non-Gregorian calendar issue
  • 2 content updates
  • Defender definitions
  • Junk mail filter
  • 2 driver updates

47
QA
  • Questions?
  • piis8_at_yahoo.com is now accepting all flames and
    rants

48
(No Transcript)
Write a Comment
User Comments (0)
About PowerShow.com