Re: Attacking EFS through cached domain logon credentials

2003-01-24 Thread Todd Sabin
"John Howie" <[EMAIL PROTECTED]> writes:

> Todd (and lists),
> 
> You wrote:
> 
> > 
> > This is not completely correct, and I wanted to clarify how an attack
> > against a domain-member's EFS encrypted files can work.  The threat
> > model is this:
> > 
> 
> It is important to distinguish between a weakness in EFS (there is none,
> as described here) and the risk associated with using cached logon
> credentials.

I agree there's no bug here, if that's what you mean.  Whether this is
a 'weakness', risk, vulnerability, or whatever is mainly semantics.
Let's just say it's a property of EFS that its encryption is no
stronger than the user's password in the scenario I outlined.

The underlying point is that many organizations probably have password
policies (complexity requirements and maximum password age) designed
in part to mitigate the risk of the passwords being cracked before
they expire (and become useless).  Often, maximum age is in the
ballpark of 45 days.

The problem is that if someone has obtained a stolen laptop as I
described, the user's password doesn't become useless when it expires
unless the information in the files encrypted with EFS also becomes
useless.

If you want to encrypt information that has long term value, you
probably need to either seriously reevaluate your password complexity
requirements, put smart cards or some other hardware into the mix (as
you mentioned), or use something other than EFS.

-- 
Todd Sabin  <[EMAIL PROTECTED]>
BindView RAZOR Team<[EMAIL PROTECTED]>



RE: Attacking EFS through cached domain logon credentials

2003-01-22 Thread John Howie
Todd (and lists),

You wrote:

> 
> This is not completely correct, and I wanted to clarify how an attack
> against a domain-member's EFS encrypted files can work.  The threat
> model is this:
> 

It is important to distinguish between a weakness in EFS (there is none,
as described here) and the risk associated with using cached logon
credentials.

It is not just EFS which is at risk through 'cracking' an account like
you describe, there are so many other 'secrets' in a user's profile
including passwords to websites remembered by IE, POP3 email account
passwords in Outlook and Outlook Express, VPN passwords, etc.

Truly sensitive data should not be stored on a laptop, and when it must
use two-factor authentication such as a Smart Card (which does reduce
the risk associated with cached logon credentials) or a SecureID token.
If nothing else, some laptops these days come with passwords to
lock/unlock the hard drive.

Regards,

John Howie CISSP MCSE
President, Security Toolkit LLC