Flame fallout: Microsoft encryption deadline looms Tuesday

Starting Tuesday Microsoft platforms will block the use of encryption keys less than 1024 bits so businesses that are still using weaker keys better get busy.

Changing the keys the Microsoft software uses isn't that tricky, but finding all the customer and third-party software in corporate networks that use smaller keys could require some searching.

BACKGROUND: In face of Flame malware, Microsoft will revamp Windows encryption keys

HELP: 11 (FREE!) Microsoft tools to make life easier

Users should download the update and test whether it breaks connections with existing applications before putting it into full production, experts say.

Also, automated tools such as those sold by ExtraHop and Venafi can help track down applications that won't comply with the Microsoft update.

The change in key length requirements came in the wake of an exploit against Windows Update becoming a key component of Flame malware attacks. Keys less than 1024 bits are deemed too easy to break with brute force attacks.

The patch has been available since August as an option to give customers time to check it out and install it, but after Tuesday it is no longer optional. "There are still a few days left if you haven't tested it, but don't let this be an 'I told you so' moment," says Paul Henry, security and forensic analyst at Lumension.

Affected platforms are: Windows XP, Windows Server 2003, Windows Server 2003 R2, Windows Vista, Windows Server 2008, Windows 7 and Windows Server 2008 R2 operating systems.

The upgrade does have some wiggle room. Applications signed before Jan. 1, 2010, are allowed to use keys smaller than 1024 bits.

The deadline coincides with October's Patch Tuesday, which for the second month in a row is pretty light, featuring just one critical bulletin.

It apparently addresses a long-standing flaw in code that was repeatedly used in SQL Server from 2000 on. Unpatched, it can allow a remote-code execution on affected platforms.

Since so many consecutive versions of SQL server are being patched by the same update, it indicates the update is addressing the same problem in all the versions, says Alex Horan, a product manager at Core Security. Generally one patch deals with a single flaw. "So from that I conclude this is the same issue (and therefore the same code) across these versions," he writes in an email.

Tim Greene covers Microsoft for Network World and writes the Mostly Microsoft blog. Reach him at tgreene@nww.com and follow him on Twitter @Tim_Greene.

Read more about wide area network in Network World's Wide Area Network section.

Join the CSO newsletter!

Error: Please check your email address.
Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Tim Greene

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts