Americas

  • United States

Asia

sbradley
Contributing Writer

20 years after Gates’ call for trustworthy computing, we’re still not there

opinion
Jan 17, 20225 mins
MicrosoftSecuritySmall and Medium Business

Then-Microsoft CEO Bill Gates spelled out what his company needed to do to build in better security two decades ago. And yet….

Privacy lock image

Do you feel more secure? Is your computing experience more trustworthy these days?

Seriously — you’re reading this article on a computer or phone, connecting to this site on an internet shared with your Grandma as well as Russian hackers, North Korean attackers, and lots of teenagers  looking at TikTok videos. It’s been 20 years since then-Microsoft CEO Bill Gates wrote his Trustworthy Computing memo where he emphasized security in the company’s products.

So are we actually more secure now?

I’m going to keep in mind the side effects from last week’s Patch Tuesday security updates and consider them in my answer. First, the good news: I don’t see major side effects occurring on PCs not connected to active directory domains (and I haven’t seen any showstoppers in testing my hardware at home). I can still print to my local HP and Brother printers. I can surf and access files. So, while I’m not ready yet to give an all-clear to install the January updates, when I do, I doubt you’ll see side effects.

But for businesses, this month’s updates deliver a confusing and murky story. Microsoft has not exactly been a good trustworthy computing partner this month. Rather taking the past two decades to develop  bullet-proof, resilient systems, we get servers going into boot loops and admins having to boot into DOS  mode and run commands to uninstall updates.

This isn’t where we were supposed to be at this point.

As Gates said 20 years ago: “Availability: Our products should always be available when our customers need them. System outages should become a thing of the past because of a software architecture that supports redundancy and automatic recovery. Self-management should allow for service resumption without user intervention in almost every case.”

And yet, I’m still delaying updates on my computer systems because the latest updates, in particular, have shown that servers may have recovery issues. Case in point: “Windows Servers domain controllers might restart unexpectedly.” That cropped up after last week’s security patches on all supported Windows server platforms. As noted in the known-issue write-up, this occurs after using Microsoft’s own recommended guidance for Active Directory hardening, which included using Shadow Principals in Enhanced Security Admin Environment (ESAE) or environments with Privileged Identity Management (PIM). The systems affected include Windows Server 2022 (KB5009555); Windows Server, version 20H2 (KB5009543); Windows Server 2019 (KB5009557); Windows Server 2016 (KB5009546); Windows Server 2012 R2 (KB5009624) Windows Server 2012 (KB5009586).  

I’ve also seen reports that following the Active Directory security hardening guidance (created after the November security releases) will trigger the reboot problem if you’ve set the PACRequestorEnforcement value to 2.

Even with cloud services, the issues around availability remain unsolved. For example, Microsoft 365 has a Twitter account whose entire focus is communicating on availability issues with the service. Rarely a week goes by that I don’t get an alert about some service issue. Cloud services are hardened, but I don’t see a lot of progress either with local servers or cloud services. Instead of planning on automatic recovery, we have to make sure we have alternative services and alternative ways to communicate should our systems be hit either by patching or by ransomware.

More from Gates: “Security: The data our software and services store on behalf of our customers should be protected from harm and used or modified only in appropriate ways. Security models should be easy for developers to understand and build into their applications.”

And yet, last week’s security releases included confusing communication regarding a potentially wormable flaw. The https bug in the form of CVE-2022-21907 is not clear on which versions are vulnerable. Clarification and analysis had to come from external sources before we could figure out Windows 10 version 1809 and Server 2019 are not vulnerable by default — unless the HKLM:SystemCurrentControlSetServicesHTTPParameterEnableTrailerSupport registry key is set to 1. Versions of Windows 10 after 1809 are vulnerable by default. I’d argue that 20 years after the release of the trustworthy computing memo, our security models — and just as importantly, our security communication — still aren’t easy to understand.

We’re also tracking issues with HyperV servers on Server 2012R2 (and, it appears, only that platform) where virtual machines fail to start after applying KB5009624 on devices using UEFI. If you have any virtual servers hosted on Server 2012R2, hold back on installing updates on those platforms.

And users of Windows 10 workstations that rely on Virtual Private Networks for remote access are having to uninstall the January updates due to a side effect that breaks VPN access on Windows 10 or Windows 11 systems. For those who rely on L2TP VPN or IPsec VPN, you will fail to connect using VPN after installing the updates.

Gates closed out his memo with this: “Going forward, we must develop technologies and policies that help businesses better manage ever larger networks of PCs, servers and other intelligent devices, knowing that their critical business systems are safe from harm. Systems will have to become self-managing and inherently resilient. We need to prepare now for the kind of software that will make this happen, and we must be the kind of company that people can rely on to deliver it.” 

So how did that work out? We’re in the same place we were 20 years ago; we still have to rely on ourselves to decide on the right time to install updates.

So how do you really feel about security? Join the discussion in the AskWoody forums!

sbradley
Contributing Writer

Susan Bradley has been patching since before the Code Red/Nimda days and remembers exactly where she was when SQL slammer hit (trying to buy something on eBay and wondering why the Internet was so slow). She writes the Patch Watch column for Askwoody.com, is a moderator on the PatchManagement.org listserve, and writes a column of Windows security tips for CSOonline.com. In real life, she’s the IT wrangler at her firm, Tamiyasu, Smith, Horn and Braun, where she manages a fleet of Windows servers, Microsoft 365 deployments, Azure instances, desktops, a few Macs, several iPads, a few Surface devices, several iPhones and tries to keep patches up to date on all of them. In addition, she provides forensic computer investigations for the litigation consulting arm of the firm. She blogs at https://www.askwoody.com/tag/patch-lady-posts/ and is on twitter at @sbsdiva. She lurks on Twitter and Facebook, so if you are on Facebook with her, she really did read what you posted. She has a SANS/GSEC certification in security and prefers Heavy Duty Reynolds wrap for her tinfoil hat.