baffled by efs

  • Thread starter Thread starter John
  • Start date Start date
J

John

xp pro 2
small psychology office
need to encrypt client files so all psychologists can see them
need to encrypt business files so only owner can see them

I keep thinking in terms of a password is needed to open the files or
folders. Apparently that isn''t the way efs works.

I'm hoping I don't have to hire another specialist to set this up.

Right now the computer opens on the one "user" screen and that's that.

My main fear is, I end up not being able to read anything and lose it all.

John
 
While EFS does have a way to "share" files, it's really designed more for
protecting files so that only the owner can access them. Mostly we see EFS
deployed on laptops to help keep the data confidential in case the laptop
gets stolen. EFS is integrated into the file system and automatically decrypts
files when the owner is logged in -- that's why you don't see any separate
password prompts.

For your case, a separate product, Windows Rights Management Services, is
better. The owner of a file can indicate who's allowed to do what -- read,
print, modify, delete, and so on. You can also set an "age limit" on files
so that they can't be used at all after a certain date. RMS requires Office
2003 Professional, Active Directory, and RMS CALs. There's lots of product
info and some deployment guides at http://www.microsoft.com/rms.

Steve Riley
(e-mail address removed)
 
Steve said:
While EFS does have a way to "share" files, it's really designed more
for protecting files so that only the owner can access them. Mostly we
see EFS deployed on laptops to help keep the data confidential in case
the laptop gets stolen. EFS is integrated into the file system and
automatically decrypts files when the owner is logged in -- that's why
you don't see any separate password prompts.

For your case, a separate product, Windows Rights Management Services,
is better. The owner of a file can indicate who's allowed to do what --
read, print, modify, delete, and so on. You can also set an "age limit"
on files so that they can't be used at all after a certain date. RMS
requires Office 2003 Professional, Active Directory, and RMS CALs.
There's lots of product info and some deployment guides at
http://www.microsoft.com/rms.

Steve Riley
(e-mail address removed)
Thanks I'll try it

john
 
On Sat, 25 Dec 2004 09:54:47 -0800, Steve Riley [MSFT]

The original poster's in a tuff situation; legally, confidentially
requires scrupulous attention to privacy, but accountability also
requires ongoing preservation of records. As he righly mentions, EFS
is great for privacy but increases the risk of data loss, unless
backup arrangements are as meticulously admin'd as privacy/access.
While EFS does have a way to "share" files, it's really designed more for
protecting files so that only the owner can access them. Mostly we see EFS
deployed on laptops to help keep the data confidential in case the laptop
gets stolen. EFS is integrated into the file system and automatically decrypts
files when the owner is logged in -- that's why you don't see any separate
password prompts.

That's also why it may fall short of what you are looking for, unless
something else is used to prevent visibility whenever logged on.
For your case, a separate product, Windows Rights Management Services, is
better. The owner of a file can indicate who's allowed to do what -- read,
print, modify, delete, and so on. You can also set an "age limit" on files
so that they can't be used at all after a certain date. RMS requires Office
2003 Professional, Active Directory, and RMS CALs. There's lots of product
info and some deployment guides at http://www.microsoft.com/rms.

Is RMS strong enough? Risks of reading files through 3rd-partyware,
viewers or older Office versions?

Ultimately, it comes down to the crunch of privacy vs. risk of data
loss. A file that's present, but no-one knows the pwd or decryption
key, may be effectively as lost as one barfed by ChkDsk /F.


---------- ----- ---- --- -- - - - -
Proverbs Unscrolled #37
"Build it and they will come and break it"
 
Is RMS strong enough? Risks of reading files through 3rd-partyware,
viewers or older Office versions?

There's no risk of third-partyware (cool term) or older versions of Office
reading the docs. RMS a system that's composed of an authentication mechansm
(AD), an xRML certificate server/policy generator (RMS Server), a client
portion (RMS client), and rights-aware applications (Office 2003 Professional).

When you compose a document and then protect it, the application's interface
into the RMS client asks you how you want to protect it: who (users) are
allowed to do what (access controls like read, print, edit, etc.) and how
long the document should last (expiration -- of the document, not the rights).
Finally the document is encrypted with a 256-bit AES key, which is then itself
encrypted with a series of other keys. (See the technical docs for all the
details.)

It is this encrypted document which is then stored. Without possession of
the necessary keys, you can't decrypt the document key, meaning that you
can't decrypt the document. If you try to open a protected document in anything
other than the application used to create the document (or in the rights
management add-on for IE), you'll just get a bunch of binary junk. Only the
correct rights-aware application can make sense of the encrypted file format,
validate the manifest, authenticate the user, and decrypt the document key.
Then the application will render the decrypted contents in the window and
(in conjunction with the RMS client) enforce the rights present on the document.
Without the client, the application is unable to properly parse and render
the file.

The RMS key store, a file on your PC called LOCKBOX.DLL, is itself resistant
to tampering: if you try to move it to another PC, or if you change your
system clock, for example, the file will self-destruct.

RMS also includes a way for an "RMS auditor" of sorts to take ownership of
files created by people who have subsequently left the company. There's been
a lot of thought put into this product to make it enterprise-class right
at version 1.0. I'm pretty impressed with it (of course, you'd expect me
to say that! hehe).

Steve Riley
(e-mail address removed)


On Sat, 25 Dec 2004 09:54:47 -0800, Steve Riley [MSFT]

The original poster's in a tuff situation; legally, confidentially
requires scrupulous attention to privacy, but accountability also
requires ongoing preservation of records. As he righly mentions, EFS
is great for privacy but increases the risk of data loss, unless
backup arrangements are as meticulously admin'd as privacy/access.
While EFS does have a way to "share" files, it's really designed more
for protecting files so that only the owner can access them. Mostly
we see EFS deployed on laptops to help keep the data confidential in
case the laptop gets stolen. EFS is integrated into the file system
and automatically decrypts files when the owner is logged in --
that's why you don't see any separate password prompts.
That's also why it may fall short of what you are looking for, unless
something else is used to prevent visibility whenever logged on.
For your case, a separate product, Windows Rights Management
Services, is better. The owner of a file can indicate who's allowed
to do what -- read, print, modify, delete, and so on. You can also
set an "age limit" on files so that they can't be used at all after a
certain date. RMS requires Office 2003 Professional, Active
Directory, and RMS CALs. There's lots of product info and some
deployment guides at http://www.microsoft.com/rms.
Is RMS strong enough? Risks of reading files through 3rd-partyware,
viewers or older Office versions?

Ultimately, it comes down to the crunch of privacy vs. risk of data
loss. A file that's present, but no-one knows the pwd or decryption
key, may be effectively as lost as one barfed by ChkDsk /F.
---------- ----- ---- --- -- - - - -
Proverbs Unscrolled #37
"Build it and they will come and break it"
---------- ----- ---- --- -- - - - -
 
On Sun, 26 Dec 2004 14:38:35 -0800, Steve Riley [MSFT]
There's no risk of third-partyware (cool term) or older versions of Office
reading the docs. RMS a system that's composed of an authentication mechansm
(AD), an xRML certificate server/policy generator (RMS Server), a client
portion (RMS client), and rights-aware applications (Office 2003 Professional).
...the document is encrypted with a 256-bit AES key, which is then itself
encrypted with a series of other keys.

That's the key point; so rights-unaware apps can't see anything,
instead of the risk of seeing everything.
It is this encrypted document which is then stored. Without possession of
the necessary keys, you can't decrypt the document key, meaning that you
can't decrypt the document.
The RMS key store, a file on your PC called LOCKBOX.DLL, is itself resistant
to tampering: if you try to move it to another PC, or if you change your
system clock, for example, the file will self-destruct.

DoS opportunities abound there, then. I hope it's not one of those
always-same-name, always-same-place files?

I understand sensitivity to system clock changes, but what about
natural risks such as laptops and time zones, flat CMOS batteries and
motherboard replacements, and time servers that nudge the clock?
RMS also includes a way for an "RMS auditor" of sorts to take ownership of
files created by people who have subsequently left the company. There's been
a lot of thought put into this product to make it enterprise-class right
at version 1.0. I'm pretty impressed with it (of course, you'd expect me
to say that! hehe).

It does sound well thought-out, but it has to be part of a strong
whole, else it could be both ineffective and dangerous.

The data loss risks seem to be similar in magnitude as EFS, so you
need to be absolutely COAB certain of backing up both the data files,
and the key as held in the .DLL or whatever. How does the fragility
of that .DLL work in the context of a data restore?

There may be an additional risk, beyond EFS, when it comes to VBA or
macro infection of "data" files. An av running on EFS may be able to
scan files, but this is likely not the case here. So I'd want to rip
out or totally suppress any scripts, VBA, macros etc. within these
files, as these would be well-positioned to export file contents.

Finally, one has to consider de-facto "programming" opportunities that
arise when exploitable code defects come to light. For example, a
JPEG embedded in a .DOC that exploited the JPEG handler to run as raw
code could be a problem, if av can't scan in in the encrypted file.


---------- ----- ---- --- -- - - - -
Proverbs Unscrolled #37
"Build it and they will come and break it"
 
Comments inline.

Steve Riley
(e-mail address removed)


On Sun, 26 Dec 2004 14:38:35 -0800, Steve Riley [MSFT]
There's no risk of third-partyware (cool term) or older versions of
Office reading the docs. RMS a system that's composed of an
authentication mechansm (AD), an xRML certificate server/policy
generator (RMS Server), a client portion (RMS client), and
rights-aware applications (Office 2003 Professional).

...the document is encrypted with a 256-bit AES key, which is then
itself encrypted with a series of other keys.
That's the key point; so rights-unaware apps can't see anything,
instead of the risk of seeing everything.
It is this encrypted document which is then stored. Without
possession of the necessary keys, you can't decrypt the document key,
meaning that you can't decrypt the document.

The RMS key store, a file on your PC called LOCKBOX.DLL, is itself
resistant to tampering: if you try to move it to another PC, or if
you change your system clock, for example, the file will
self-destruct.
DoS opportunities abound there, then. I hope it's not one of those
always-same-name, always-same-place files?

Each person's RMS lockbox is stored in %USERPROFILE%\Local Settings\Application
Data\Microsoft\DRM. Once you complete the registration process, your lockbox
is no longer a single DLL but a series of files that store information about
your computer, you, and the keys you've acquired during various document
creation and consumption activities.

The security on the folder is set such that only the user, the local administrator
group, and the system have access. The files are marked read-only. Every
key that gets generated throughout the lifetime of an RMS installation is
also kept on the RMS server automatically. If you accidentally destroy your
lockbox, or if some worm maliciously does, all you need to do is re-register
your computer to RMS and you'll get a brand new lockbox with all of your
keys intact.

I understand sensitivity to system clock changes, but what about
natural risks such as laptops and time zones, flat CMOS batteries and
motherboard replacements, and time servers that nudge the clock?

When you travel you should change your time zone, not your time. The time
is stored in the system and in the lockbox in GMT and always offset by your
time zone for display.

There is a little bit of leeway for things like dead batteries and clock
nudging. What we're looking more for are date changes.

If you replace your motherboard you will need to re-register your computer
for RMS because your hardware signature will have changed. The re-registration
process will delete your current lockbox, generate a new one, and repopulate
it with all your keys from the RMS server.

It does sound well thought-out, but it has to be part of a strong
whole, else it could be both ineffective and dangerous.

Right, that's why it's critical to read through the planning and deployment
guides before you embark upon building an RMS infrastructure for your organization.
There's even a process you have to go through if/when you decide to decommission
RMS -- remember, everything's encrypted, and you have to remove the encryption
before you simply shut down your server!

The data loss risks seem to be similar in magnitude as EFS, so you
need to be absolutely COAB certain of backing up both the data files,
and the key as held in the .DLL or whatever. How does the fragility
of that .DLL work in the context of a data restore?

So long as your hardware doesn't change, restoring works fine. But since
the RMS server keeps copies of all your keys, it's probably easier just to
re-register a restored client in RMS.

There may be an additional risk, beyond EFS, when it comes to VBA or
macro infection of "data" files. An av running on EFS may be able to
scan files, but this is likely not the case here. So I'd want to rip
out or totally suppress any scripts, VBA, macros etc. within these
files, as these would be well-positioned to export file contents.
Correct.


Finally, one has to consider de-facto "programming" opportunities that
arise when exploitable code defects come to light. For example, a
JPEG embedded in a .DOC that exploited the JPEG handler to run as raw
code could be a problem, if av can't scan in in the encrypted file.

RMS isn't a substitute for patching. :)
 
cquirke typed stuff
Each person's RMS lockbox is stored in %USERPROFILE%\Local Settings\Application
Data\Microsoft\DRM. Once you complete the registration process, your lockbox
is no longer a single DLL but a series of files

And they aren't scoopable, one hopes; I see you use NTFS permissions
etc. to raise the bar, but it's only a bar if you're "outside".
If you accidentally destroy your lockbox, or if some worm maliciously does,
all you need to do is re-register your computer to RMS and you'll get a
brand new lockbox with all of your keys intact.
Cool!
When you travel you should change your time zone, not your time.

Scope for user failure there ;-)
There is a bit of leeway for dead batteries and clock nudging.

So it's not a fine-grained Kerberos-style synch thing - OK.
What we're looking more for are date changes.

Actually, I inadvertently change my date on a regular basis, when
popping up the time thing from SysTray to use it as a calender.

Changing the month to look up dates etc. changes the date when you
close the dialog, unless you are careful to undo, even if you
carefully didn't click on any dates while fiddling. That's on Win95
SR2 and Win98 SE; dunno if it's different in XP.

I'm just thinking, it's a casual and likely unreported practice that
could spawn a few support calls :-p
Right, that's why it's critical to read through the planning and deployment
guides before you embark upon building an RMS infrastructure for your organization.
There's even a process you have to go through if/when you decide to decommission
RMS -- remember, everything's encrypted, and you have to remove the encryption
before you simply shut down your server!

Indeed! This is a brick wall end-users often run into when they
"just" format and re-install Windows, and find some vandor's sware
won't install because it thinks it's stuill installed on an OS
installation that no longer exists (thus uninstall not possible).
So long as your hardware doesn't change, restoring works fine. But since
the RMS server keeps copies of all your keys, it's probably easier just to
re-register a restored client in RMS.

And you need to backup the RMS data set, surely? Implies that theft
of a backup gets both half of the puzzle.

Are there ways to force suppression or stripping of such content?
RMS isn't a substitute for patching. :)

The length of Day Zero will not always be positive. Goedel says any
non-trivial (number) system will generate values outside the system,
which one can view as a statement on complexity vs. entropy.

What I take home from that, is that if you want to trust code (even
your own code) to behave only as designed, you should keep it trivial!

So in the sort of setting we are talking about here, I'd want to
trivialize the contents of these files (as I cannot av-scan them). So
I'd really prefer to kill not only scripts, macros and VBA, but any
sort of OLE container stuff that extends the world of the Office app
to the world of just about any data-handling code in the system.

I'd like to have faith in the non-exploitability of the internals of
the MS Office apps themselves, but that's asking a lot - such as a new
and simplified file type with trivial interpretation code, that could
be considered safe to hide within a can't-scan-this wrapper.


---------- ----- ---- --- -- - - - -
"He's such a character!"
' Yeah - CHAR(0) '
 
Answers inline.

Steve Riley
(e-mail address removed)


On Mon, 27 Dec 2004 13:30:03 -0800, Steve Riley [MSFT]
cquirke typed stuff
On Sun, 26 Dec 2004 14:38:35 -0800, Steve Riley [MSFT]

...the document is encrypted with a 256-bit AES key, which is then
itself encrypted with a series of other keys.

That's the key point; so rights-unaware apps can't see anything,
instead of the risk of seeing everything.

The RMS key store, a file on your PC called LOCKBOX.DLL, is itself
resistant to tampering: if you try to move it to another PC, or if
you change your system clock, for example, the file will
self-destruct.

DoS opportunities abound there, then. I hope it's not one of those
always-same-name, always-same-place files?
Each person's RMS lockbox is stored in %USERPROFILE%\Local
Settings\Application Data\Microsoft\DRM. Once you complete the
registration process, your lockbox is no longer a single DLL but a
series of files
And they aren't scoopable, one hopes; I see you use NTFS permissions
etc. to raise the bar, but it's only a bar if you're "outside".

"Scoopable?" Meaning copyable between computers that are both on the "inside?"
Won't work. The lockbox customization process builds uniquely-identifiable
lockboxes for each computer. If you try to copy the lockbox files from one
PC to another, the RMS client will sense this and the lockbox files will
self-destruct.

Scope for user failure there ;-)

So it's not a fine-grained Kerberos-style synch thing - OK.

Actually, I inadvertently change my date on a regular basis, when
popping up the time thing from SysTray to use it as a calender.

Changing the month to look up dates etc. changes the date when you
close the dialog, unless you are careful to undo, even if you
carefully didn't click on any dates while fiddling. That's on Win95
SR2 and Win98 SE; dunno if it's different in XP.

I'm just thinking, it's a casual and likely unreported practice that
could spawn a few support calls :-p

On NT/2000/XP/2003 only local administrators have permission to adjust system
clocks. This can be a mitigator. Otherwise, yes, there will be some necessary
retraining so that people don't change their clocks -- only their time zones.

Indeed! This is a brick wall end-users often run into when they
"just" format and re-install Windows, and find some vandor's sware
won't install because it thinks it's stuill installed on an OS
installation that no longer exists (thus uninstall not possible).

And you need to backup the RMS data set, surely? Implies that theft
of a backup gets both half of the puzzle.

Oh yes, part of the normal processes of managing an RMS server is to make
regular backups -- this is no different than any other piece of critical
information infrastructure. You can also store keys on a hardware storage
module (HSM), which is an effective form of key backup that also increases
security considerably.

Are there ways to force suppression or stripping of such content?

Outside of Office there's no way to inspect the rights-protected (encrypted,
remember) files to see whether they contain macros. There might be a way
to set a global no-execute within Office, but I don't know about that...
I'm a security guy, not an Office guru! :)

The length of Day Zero will not always be positive. Goedel says any
non-trivial (number) system will generate values outside the system,
which one can view as a statement on complexity vs. entropy.

What I take home from that, is that if you want to trust code (even
your own code) to behave only as designed, you should keep it trivial!

We are in violent agreement here. :) We've done a lot of testing of the lockbox
handling code, making sure that it rejects unexpected input rather than barfing
in some insecure way.

So in the sort of setting we are talking about here, I'd want to
trivialize the contents of these files (as I cannot av-scan them). So
I'd really prefer to kill not only scripts, macros and VBA, but any
sort of OLE container stuff that extends the world of the Office app
to the world of just about any data-handling code in the system.

I'd like to have faith in the non-exploitability of the internals of
the MS Office apps themselves, but that's asking a lot - such as a new
and simplified file type with trivial interpretation code, that could
be considered safe to hide within a can't-scan-this wrapper.

These are good points, and we're thinking about them. Of course, it's important
to remember that there are two definitions of "secure": private and inspected.
When some people mention "security" they mean knowing everything -- inspecting
all the content. Other people mean "privacy" -- keeping information confidential.
It's generally impossible to have both! The business need that RMS satisfies
is two fold: access controls that work regardless of where the object (file)
lives and complete privacy outside the access control system. The trade-off
is your ability to inspect. And this, perhaps, isn't as large of an issue
as you might imagine. Since document authors always first create clear-text
files on their own computers, any virus-scanning system that knows how to
look for macro viruses will still flag the existence before the file is saved.

RMS does allow you to create document "templates" and enforce their use.
Again, this is more of an Office thing so I don't readily know the answer,
but maybe your templates could all be set to refuse the creation of macros.
Need to research this more, I guess.
 
On Tue, 28 Dec 2004 19:24:39 +0200, "cquirke (MVP Win9x)"
Changing the month to look up dates etc. changes the date when you
close the dialog, unless you are careful to undo, even if you
carefully didn't click on any dates while fiddling. That's on Win95
SR2 and Win98 SE; dunno if it's different in XP.
I'm just thinking, it's a casual and likely unreported practice that
could spawn a few support calls :-p

More on this: In Win98 SE, it appears as if cursory changes in this
dialog take immediate effect. I picked this up because I know Eudora
will prompt for new version checks every month, and it did this as
soon as I changed from December in the drop-down list of months, even
though I hadn't clicked a date, not Apply, OK or close-the-dialog.

If this is the case, it makes it rather dangerous to be sensitive to
timedate changes in realtime, as Office Rights Management appears to
do. If a user falls into this hole, the chances of them remembering
it and mentioning it in a support call are very low indeed.


---------- ----- ---- --- -- - - - -
"He's such a character!"
' Yeah - CHAR(0) '
 
cquirke again
"Scoopable?" Meaning copyable between computers that are both
on the "inside?"

Yes - IOW, I scoop the data files, plus the repository for the keys,
and then I "restore" them to an arbitrary PC.

I'm challenged to see how the system can facilitate restore on to an
arbitrary (replacement) PC while blocking the above scenario, and the
only solutions I can see is some part of the puzzle that has to be
kept out-of-band, e.g. on a USB stick locked up somewhere.
Won't work. The lockbox customization process builds uniquely-identifiable
lockboxes for each computer. If you try to copy the lockbox files from one
PC to another, the RMS client will sense this and the lockbox files will
self-destruct.

What if the PC is lost, i.e. destroyed or stolen?
On NT/2000/XP/2003 only local administrators have permission to adjust system
clocks. This can be a mitigator.

Well-phrased, as it's a band-aid, and an optional one at that. But as
we're talking about an off-by-default functionality that is to be used
within a properly-administered setting, it's not unreasonable.

I imagine many such installations will also be using Kerberos, which I
understand has even more rigorous timing sensitivities.

Perhaps all that needs to be done is to stress the need to manage RTC
rights, and perhaps re-visit the "time" dialog box so that only
changes committed by "OK" (perhaps through an "Are you sure/nuts?"
confirmation) have any effect at all.

As it is, and as posted, it seems as if that dialog box is "live";
changes may be undone if the user [x] or Cancels, but by that stage,
something that monitors RTC in real time could have pulled the pin.

That's an extension of the "scoopability" thing mentioned earlier.

I can see a pattern here - that if you deploy this technology, it's
crucial that related settings are sanity-checked and possibly
maintained on an ongoing basis. Else we may see reports of "holes"
that are just a mismatch of unrelated settings, but damaging press.
You can also store keys on a hardware storage module (HSM),
which is an effective form of key backup that also increases
security considerably.

Ah; that's the "out of band" thing I was thinking of earlier. That's
far better than to expect the user to be the HSM hardware, as a
"password" would do. Just as PCs fare badly at being human, so humans
fare badly at being reliable dumb hardware :-)

I can see USB sticks playing new roles that may require some attention
at the raw driver code level, just as one extends other security deep
down into post-FATxx file systems.
Outside of Office there's no way to inspect the rights-protected (encrypted,
remember) files to see whether they contain macros.

That's a re-statement of the problem, which IMO is a serious one.
There might be a way to set a global no-execute within Office,
but I don't know about that... I'm a security guy, not an Office guru! :)

I'd be inclined to build it into Rights Management itself - i.e. a
hard setting that dumbs down file content to safe levels if it is to
be hidden from the system by encryption.

We've already seen how password-encrypted .zip, combined with quite
plausible SE, can be routinely used to bypass av. After all, it's
been how we've submitted malware samples to av vendors for a while now
(or for me, anyway... "the password is 'This is a VIRUS!!' " etc.).

Heh, I'm waiting for the first such malware to claim legitimate
software status by a password that is an EULA, e.g. "By opeing this
file I acknowledge the right of the software to..."

The thing is; these things may be intended to do such-and-such, but in
reality, code is neutral. A strong glove works just as well to keep
your assailant's hand warm and safe as it does yours.
We are in violent agreement here. :) We've done a lot of testing of the lockbox
handling code, making sure that it rejects unexpected input rather than barfing
in some insecure way.

Glad to hear that. You'd also want to make sure your code is the only
code that touches the box, and that it's not extensible, and that the
next generation of devs to version it up maintain your prudence.
These are good points, and we're thinking about them.

I've wanted to pull a large mass of such concepts together as a
section at my site (http://cquirke.mvps.org) but time etc. :-p

Namely, "depth"...
- assume your defences will fail
- plan what to do when that happens
- don't trust even your own code
- be prepared to amputate subsystems at a moment's notice
- beware of inappropriate "feature sprawl" (e.g. RPC)

....and what I call "risk WYSIWYG"...
- abstract reality towards user's intuitive understanding
- give user clear risk information
- never exceed the risk information the user acted upon
- current risk order may change (e.g. is .jpg safer than .doc?)

....and how that comes down to common realities:
- if user wants to "view" or "read", never "run"
- if user wants to "list", don't delve *into* what is listed
- be bound by visible risk indicators, e.g. file name .ext
- don't auto-integrate newly-discovered drives, even HD (S-ATA?)
- provide safe maintenance tools ("Safe Mode" isn't)
remember that there are two definitions of "secure": private and inspected.
When some people mention "security" they mean knowing everything -- inspecting
all the content. Other people mean "privacy" -- keeping information confidential.
It's generally impossible to have both!

This is one of the deep and crucial differences between Home and Pro.

Home users lack pro infrastructure. Thier PCs evolve on an ad-hoc
basis, there's usually only one PC that is unique and must survive,
backups are poor, incomplete and may be absent, etc. The user in the
chair should have full and unfettered access to everything. Notional
"administrators" via the 'net or LAN should have no access at all.

Pro IT has strong infrastructure to manage backups and identities, and
is more concerned about unauthorised access than loss. Aside from the
servers, workstations are rarely unique and need not be preserved.
Physical access is extended to semi-trusted personnel that should be
overridden by "the admin", who may work remotely via the network.

The end point crunches down to: Who wins, the guy with physical access
i.e. at the keyboard, or the notional administrator? Because Home and
Pro answer that Q differently, they need to be different products.
...access controls that work regardless of where the object (file)
lives and complete privacy outside the access control system.
The trade-off is your ability to inspect.

It's a particular re-statement of: One admin's maintenance tools are
another "admin's" hacking tools :-)
And this, perhaps, isn't as large of an issue as you might imagine. Since
document authors always first create clear-text files on their own computers,
any virus-scanning system that knows how to look for macro viruses will
still flag the existence before the file is saved.

Hooyyy... that's like de-bulking a tumour that's already spread
through the bloodstream. Yes, it's a best-case that will reduce the
tumour load, but... for starters; consider the author may be in the
field, working on a corporate laptop that depends upon daily network
access to have the av updated. By the time he's back on the LAN, he's
remembered to apply rights management to his data so it can be
uploaded to the LAN. Any malware will be encapsulated before his av
is up to speed; the opportunity is GFE (Gone For Ever).

This is an old issue for me, when I clean up active malware in the
field, because two sealed malware repositories already exist; System
Restore (which can be purged and rebuilt at the first clean point) and
email mailboxes in most email apps (Eudora's OK there).

What I do in such cases is import the email into Eudora, which causes
all attachments to be split out of the "messages". As long as I
disable "use MS Viewer", Eudora doesn't auto-run scripts of
IE-orientated exploits, so the messages are safe. I can then scan the
attachments, and either work back to delete and purge corresponding
messages in the other email app, or I can say:

"Clean system, or keep your old email. Pick one."

Because you can't rely on detecting exploiters (malware), you may
prefer to exclude risks (malware opportunities).
RMS does allow you to create document "templates" and enforce their use.
Again, this is more of an Office thing so I don't readily know the answer,
but maybe your templates could all be set to refuse the creation of macros.
Need to research this more, I guess.

It's worth looking at. The thing to remember is that it may appear
that a peculiar set of circumstances that are required to exploit a
risk may seldom occur, they can often be hard-coded into a malware or
library and become pervasive within hours.

-- Risk Management is the clue that asks:
"Why do I keep open buckets of petrol next to all the
ashtrays in the lounge, when I don't even have a car?"
 
A few inline.

Steve Riley
(e-mail address removed)


Yes - IOW, I scoop the data files, plus the repository for the keys,
and then I "restore" them to an arbitrary PC.

I'm challenged to see how the system can facilitate restore on to an
arbitrary (replacement) PC while blocking the above scenario, and the
only solutions I can see is some part of the puzzle that has to be
kept out-of-band, e.g. on a USB stick locked up somewhere.

Restore works only if you're truly restoring to the exact same computer with
the exact same user(s). Otherwise you have to re-register the computer to
RMS and get a newly-built lockbox with all of your previously-generated and
-issued keys.

What if the PC is lost, i.e. destroyed or stolen?

Rebuild the lockbox, as above. Your choice whether to additionally revoke
all that user's certificates. If you do, then the user's new lockbox will
be empty, and as they access documents to which they've been granted permission,
new keys get generated.

On NT/2000/XP/2003 only local administrators have permission to
adjust system clocks. This can be a mitigator.
Well-phrased, as it's a band-aid, and an optional one at that. But as
we're talking about an off-by-default functionality that is to be used
within a properly-administered setting, it's not unreasonable.

I imagine many such installations will also be using Kerberos, which I
understand has even more rigorous timing sensitivities.

Perhaps all that needs to be done is to stress the need to manage RTC
rights, and perhaps re-visit the "time" dialog box so that only
changes committed by "OK" (perhaps through an "Are you sure/nuts?"
confirmation) have any effect at all.

As it is, and as posted, it seems as if that dialog box is "live";
changes may be undone if the user [x] or Cancels, but by that stage,
something that monitors RTC in real time could have pulled the pin.

We have to watch for changes to the RTC so that we can tell if people are
trying to circumvent any expiration policies on documents.

RMS is intended for use in small, medium, and large enterprise environments,
not the home. Windows 9x was writen long before real enterprise management
of PC resources was on the minds of most IT departments and certainly long
before technologies like RMS were envisioned. We won't be making any changes
to the dialog box in those operating systems. And since RMS really relies
on AD, it's inapproproate to be using 9x as clients in that case anyway.

I can see a pattern here - that if you deploy this technology, it's
crucial that related settings are sanity-checked and possibly
maintained on an ongoing basis. Else we may see reports of "holes"
that are just a mismatch of unrelated settings, but damaging press.

As is true of any ground-breaking technology :)
That's a re-statement of the problem, which IMO is a serious one.

I'd be inclined to build it into Rights Management itself - i.e. a
hard setting that dumbs down file content to safe levels if it is to
be hidden from the system by encryption.

That would be a function of Information Rights Management (IRM), the Office
feature that works with RMS. It's a good point and worth mentioning to the
Office folks.
 
Steve said:
A few inline.

Steve Riley
(e-mail address removed)
SNIP

I'm the original threader. Right now I'm just using winrar to zip and
encrypt all the files in xp pro. It works but is cumbersome and I wonder
if it leaves any traces around. Also, the raw files are available during
the day until I re-rar everything. Not very good.

It looks like I need to amploy a consultant to set up what you are
talking about. It looks very complicated and dangerous... i.e. I'm stuck
not being able to get my data. I went to a couple sites but haven't the
time to get into it that deeply.

Would be nice to have something simple that just encrypts an entire
directory with a password. We are required to have 3 levels of "locks."
The office front door is one, the windows password is 2, and the
"whatever" could be 3.

John
 
cquirke
As it is, and as posted, it seems as if that dialog box is "live";
changes may be undone if the user [x] or Cancels, but by that stage,
something that monitors RTC in real time could have pulled the pin.

Tested in Win98SE, WinME and XPHomeSP2; only in Win98SE did cursory
changes apply to the timedate of a new folder created at the "time".
We have to watch for changes to the RTC so that we can tell if people are
trying to circumvent any expiration policies on documents.
RMS is intended for use in small, medium, and large enterprise environments,
not the home. Windows 9x was writen long before real enterprise management
of PC resources and technologies like RMS were envisioned. We won't be
making any changes to the dialog box in those operating systems.

Fair enough. Nice that (at least part of) the behavior was fixed in
WinME onwards (I didn't test all possible effects, but it looks fixed)

(on risks of "rich" content e.g. macros, DDE etc.)
That would be a function of Information Rights Management (IRM), the Office
feature that works with RMS. It's a good point and worth mentioning to the
Office folks.

Ah, that's a bit off my beat; do you pass that way at all?


------------ ----- ---- --- -- - - - -
The most accurate diagnostic instrument
in medicine is the Retrospectoscope
 
John said:
SNIP

I'm the original threader. Right now I'm just using winrar to zip and
encrypt all the files in xp pro. It works but is cumbersome and I wonder
if it leaves any traces around. Also, the raw files are available during
the day until I re-rar everything. Not very good.

It looks like I need to amploy a consultant to set up what you are
talking about. It looks very complicated and dangerous... i.e. I'm stuck
not being able to get my data. I went to a couple sites but haven't the
time to get into it that deeply.

Would be nice to have something simple that just encrypts an entire
directory with a password. We are required to have 3 levels of "locks."
The office front door is one, the windows password is 2, and the
"whatever" could be 3.
Hi

SafeGuard LAN Crypt is another option (certificate based and not
password based though):

http://www.utimaco.com/indexmain.html

(we are using their "SafeGuard Easy" product for local hard disk
encryption on all laptops, and we are very satisfied with the product).

The BestCrypt product found at http://www.jetico.com/ also looks
interesting.
 
John said:
xp pro 2
small psychology office
need to encrypt client files so all psychologists can see them
need to encrypt business files so only owner can see them

I keep thinking in terms of a password is needed to open the files or
folders. Apparently that isn''t the way efs works.

I'm hoping I don't have to hire another specialist to set this up.

Right now the computer opens on the one "user" screen and that's that.

My main fear is, I end up not being able to read anything and lose it all.

John

Hey John,
ever heard of FTP's?? U can lock different users into different
"paths"."folders".or what have you and if you would really like U can always
partition the drive inot halves!! Allowing you free reign, one side for
buisness and one for Dr'in type stuff, oh and btw.Im suicidal or was until I
got my SS going again! : )
 
Back
Top