PubForum 2008

I will not only be attending PubForum 2008 but I will be speaking at it.  The event is being held in Dublin from May 9th until the 11th in the Camden Court Hotel in Lower Camden Street, Dublin 2.

PubForum is run by Alex Yushchenko, a Terminal Services MVP and virtualisation pro.  The idea is to educate about server based computing (AKA thin client) and virtualisation.  As the name suggests, there is also some beer consumed.  The types of people present include the biggest names in this market in Europe.  I was at a previous event in Brussels in 2006 as a delegate and it was a real eye opener on how big and complex this market it … I just thought there was Microsoft, Citrix and VMware.  Damn, I was wrong!  It was also a lot of fun … I barely remember me and a colleague spending endless hours with a bunch of crazy Swedes and Norwegians in the hotel bar every night.

My presentation is called "Adventures In Blade/SAN/Virtualisation and My ‘Ideal’ Design" .. basically what I’ve learned while doing this sort of thing in the past, what I’m also doing right now and what I’d do with unlimited budget.  It’s bound to be an hour of … open debate 🙂

Novell Buys Platespin

Platespin is well known in the virtualisation market for providing solution for identifying candidates for virtualisation, converting physical to virtual (P2V) and for maintaining P2V on a live basis, e.g. for virtual DR.  It’s just been announced that Novell has purchase this Canadian company.  Novell says that service should continue as before.

Credit: Dennis Olidis

Disk Encryption Cracked?

Recent headlines in Ireland made more people aware of disk encryption.  A laptop containing personal information of 170,000 Irish blood donors was stolen in New York.  The laptop was being used to transport data as part of an application upgrade process.  Normally, security experts would have been screaming … we remember the information loss in the UK with a third of the population’s personal information going missing on insecure CD’s or DVD’s.  But in this case, the Blood Transfusion Service knew what they were doing.  They’d encrypted the disk so that data was effectively secure.  Or so we all thought!

A team in Princeton University has reportedly cracked disk encryption.  I’m not talking just about SafeBoot or Windows BitLocker … I’m talking about disk encryption in general!

For disk encryption to work, the operating system on the computer must have access to the disk.  For this it stores decryption keys in RAM to be able to decrypt the disk as it uses it.  RAM does not instantly lose it’s contents when you turn off your PC as we are taught in basic computer science.  It actually takes a little while for the contents to dissipate.  This process takes longer if you can chill the RAM boards using something like a can of compressed air.  Once the attacker obtains physical access to the machine (by breaking into an insecure branch office "computer room" or stealing a laptop in an airport or cafe) then they can start this process.  Now they boot up the machine with a special tiny operating system that minimises it’s impact on RAM.  They scan the contents of RAM and can identify patterns associated with AES, DES and RSA.  This now gives them the information required to read the disks of the target computer.  The attacker has almost instant access to information that was otherwise considered virtually impregnable.

What does this mean?  We have to return to thinking that physical security is still a primary answer to data security.  Information on PDA’s, laptops and even servers in insecure branch offices is back to being vulnerable to dedicated attackers.  Ordinary criminal loss is not a concern because this vulnerability requires an immediate attack on the RAM chips in the computer.  It remains a concern where we have a real risk of being attacked by attackers with a target in mind when they start the attack.

Let’s consider two scenarios.  A company gives laptops to directors with a 3rd party disk encryption solution.  It uses AES 256bit encryption.  The director sits in a cafe drinking coffee and reading mail.  An attacker paid by a rival company or an intelligence agency (we know certain European countries do this on behalf of native firms, mais oui!) walks in and grabs the laptop before running out.  A van is waiting outside with a couple of engineers who can proceed with the attack.  The data on the laptop is lost.  The director’s inbox is vulnerable; replicated files, etc all are there.  And as we know, directors have access to the most sensitive of data.

Here’s a worse scenario.  We’ve been told not to place Active Directory domain controllers in branch offices where we cannot physically secure those machines.  The reason is that a domain controller contains a replica of all users usernames and passwords.  If the server is stolen then the entire forest is vulnerable and must be flattened/rebuilt.  The solution from Microsoft was a Windows 2008 Read Only Domain Controller (RODC) with BitLocker disk encryption.  This does two things.  Disk encryption virtually secures the contents of the disk (or so we thought).  The RODC only replicates data of users in the branch office.  This means that once the RODC is lost, an administrator can reset those accounts.  It didn’t have to be done immediately because we know the disk encryption would slow down even the NSA for a long enough period.  Here’s the new scenario.  An attacker breaks into the branch office on a Friday night.  He powers down the RODC and proceeds with the attack with the server in situ.  He takes a copy of the required user data from the RODC and puts it on his laptop.  He leaves before the weekend is over and nothing is suspected.  Using the usernames and passwords that he now has, the attacker can attack the rest of the target network with ease.

The solution remains as clear as it always has been.  Physical security remains the key to ultimate security.  I’m not saying we should abandon encryption.  It still plays a part in normal theft/loss and let’s face it, the documented attack requires a dedicated attacker who can do the process almost instantly after powering off the machine.  It’s funny how something as simple as a can of compressed air can be used to defeat something as complex as disk encryption.  I bet MacGuyver would be proud!

Credit: Anthony Garmont.

What’s Up?

Things have been pretty hectic as of late.  I’ve started a job where I’m designing a server outsourcing/hosting solution from scratch.  As you can imagine, that’s pretty time consuming, especially since I want to do it right.  I’ve also got another project that I was doing during business hours before this job but I’m now doing at night and the weekends.  It’s pretty important too because I must get it right too.  More details on that will follow.

Oh – my heart is growing blacker and blacker as the minutes pass.  I just passed two MS partnership assessments:

  • Small Business Sales and Marketing
  • Small Business Sales and Marketing Assessment

I think an angel just died or something 😉

Configuration Manager 2007 SP1 and R2

Beta releases of SCCM 2007 Service Pack 1 and the Release 2 version are now available to download from Connect.  The only information I’ve found on the products is included in the download which I haven’t had time to bring down yet.  It’s gonna be a couple of months before I get looking at these but SCCM 2007 R2 is of great interest to me.

WSUS 3.0 SP1 Released

Microsoft has released WSUS 3.0 SP1.  This package contains all the components you require to install WSUS 3.0 and SP1.  The server component is supported on Windows Server 2003 SP1 and Windows Server 2008.

WSUS is Microsoft’s free patching solution for Microsoft products, not just Windows.

The improvements are:

  • Support for Windows Server 2008. 
  • New Client Servicing API.
  • Improvements for local publishing: supports publishing of drivers within the enterprise by using vendor provided catalogs. API include support for bundles and prerequisites. 
  •  All hotfixes: WSUS 3.0 SP1 includes all the changes and hotfixes that have been issued since the release of WSUS 3.0. 
  • Support for Microsoft SQL Server 2005: WSUS 3.0 SP1 lets you use SQL Server 2005.

Microsoft also released a number of documents for you to read:

Windows Server 2008 Application Support

Bink posted a very useful link to a Microsoft blog post that lists currrent and future listings of supported Microsoft applications on Windows Server 2008.

What will support Windows Server 2008 at RTM?

  • .NET Framework 2.0 (installed)
  • .NET Framework 3.0 SP1 ( part of Application Server role )
  • .NET Framework 3.5
  • Dynamics CRM 4.0
  • Exchange Server 2007 SP1
  • Forefront Security Server 1.0
  • MOSS SP1 ( installation notes for Windows Server 2008)
  • SQL Server 2005 SP2
  • System Center Data Protection Manager 2007
  • System Center Configuration Manager 2007 (Formerly SMS)
  • System Center Operations Manager 2007
  • Windows Sharepoint Services 3.0 SP1 ( installation notes for Windows Server 2008 )
  • Visual Studio 2008
  • WSUS 3.0 SP1

Clearly there are some critical applications which are included in this list, including SQL, Exchange, MOSS and Windows Sharepoint Services. We will ship the Hyper-V technology 180days after RTM.

What are we planning to support in the first half of 2008?

  • Dynamics AX 2009
  • MOM SP1
  • SCCM 2007SP1
  • System Center Essentials 2001
  • Forefront Client Security SP1

What are we planning to support in the second half of 2008?

  • Application Virtualization 4.5
  • Commerce Server 2007 SP2
  • HIS 2006 SP1
  • MOM 2005 SP1
  • SQL Server 2008
  • System Center Essentials 2001
  • Windows System Center VMM 2.0
  • Windows Essential Business Server
  • Windows Home Server vNext
  • Windows HPC Server 2008

So What will not be supported?

  • SMS 2003
  • System Center Reporting Manager
  • Internet Security and Acceleration Server 2006 and earlier

Credit: Bink.

Some Information on Entourage 2008

The EHLO blog (The MS Exchange team) has posted some links to information on new features in Entourage 2008.  Entourage is the Mac alternative of Outlook.  It’s used to access an Exchange server.

<RANT> OK – why the hell are people buying "handbag PC’s" in if they are using a Microsoft server infrastructure?  Hello!?!?!  Just spend €600 to get a good PC with Windows on it and install Office.  Another €100 gets you a Windows laptop.  They’re cheaper to own too.  And this rubbish about Mac OS being more secure and more stable.  Pure and utter RUBBISH! </RANT>

Anyway, long story short, Entourage 2008 and Mac Office 2008 will give you as much as they can to access a MS server infrastructure.  You will never get the full and integrated experience that Windows and Office 2007 will give you.  It comes down to a dependency on Windows RPC.

Check out the links if you’re unfortunate enough to have those fashionable white PC’s on your network and you need to give them more than basic access to your Exchange servers.

Can you tell that I’m a fan of Macs on an MS network?  🙂