Feeds

Microsoft denies NT failed crypto tests

But some form of compliant module appears to be in the works anyway...

  • alert
  • submit to reddit

Security for virtualized datacentres

Microsoft has hotly denied claims that Windows NT 4.0 has failed US government cryptography tests (see earlier story), and has posted a response on the NTbugtraq mailing list. According to Microsoft, the module submitted for evaluation has not yet undergone final testing, and -- QED -- cannot have failed. The Microsoft riposte takes the form of a FAQ produced by Microsoft NT Security product manager Jason Garms. The FAQ denies failure of US government FIPS 140-1 testing, and points out that it is the module Microsoft Enhanced DSS/Diffie-Hellman Cryptographic Provider (CP) which has been submitted for testing, not NT. This is the module which has not undergone final testing. He also points out that the testing lab was not contracted to examine the secuirty of NT 4.0 or the Microsoft CryptoAPI, and says that "while accredited CMVP testing laboratories do make design and implementations back to the vendor to maximise the probability that a cryptomodule will achieve FIPS 140-1 validation, no redesign or change in the Windows NT product was required". But we've not completed testing yet, one might observe. As regards applications, Garms claims that there will be no disruption, the difference being that some apps such as Internet Explorer 4.0 or Outlook 98 won't be able to take advantage of the new cryptomodule’s features, while IE 5.0 will be able to. Finally, he says that the "shipping vehicle" for the new cryptomodule will be determined once it completes evaluation. So, you might wonder, what has this little lot been all about then? On the one hand we've got claims that NT has failed cryptographic tests, and on the other we have absolute denials. It would appear that someone is being less than candid. If we rewind to the original Network World story then we can note that one Patrick Arnold, program manager at Microsoft Federal Systems, is quoted as saying a fix will be offered in Q1, and that "only Internet Explorer 5.0 will know how to work in FIPS mode". So Arnold clearly thinks there's a problem of some sort that warrants a fix. And maybe we can dovetail that neatly into what Garms is talking about -- a FIPS module for NT that is currently undergoing testing, and that will quite possibly ship in this quarter. So maybe Garms FIPS 140-1 cryptomodule is Arnold's fix. We'll leave you to draw your own conclusions about who's being candid here, and about the -- allegedly untested -- CryptoAPIs of NT 4.0. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
Facebook pays INFINITELY MORE UK corp tax than in 2012
Thanks for the £3k, Zuck. Doh! you're IN CREDIT. Guess not
Big Content outs piracy hotbeds: São Paulo, Beijing ... TORONTO?
MPAA calls Canadians a bunch of bootlegging movie thieves
Google Glassholes are UNDATEABLE – HP exec
You need an emotional connection, says touchy-feely MD... We can do that
Just don't blame Bono! Apple iTunes music sales PLUMMET
Cupertino revenue hit by cheapo downloads, says report
US court SHUTS DOWN 'scammers posing as Microsoft, Facebook support staff'
Netizens allegedly duped into paying for bogus tech advice
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
Verizon bankrolls tech news site, bans tech's biggest stories
No agenda here. Just don't ever mention Net neutrality or spying, ok?
prev story

Whitepapers

Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.