Global Information Assurance Certification Paper

Page created by Roberta Dixon
 
CONTINUE READING
Global Information Assurance Certification Paper

                           Copyright SANS Institute
                           Author Retains Full Rights
  This paper is taken from the GIAC directory of certified professionals. Reposting is not permited without express written permission.

Interested in learning more?
Check out the list of upcoming events offering
"Security Essentials Bootcamp Style (Security 401)"
at http://www.giac.org/registration/gsec
Should You Use Microsoft Passport, .NET, and .Net My Services?
               By Richard Zurlnick

               This report details certain security risks and potential defects of the Microsoft Passport
               Service, .NET, and .NET My Services and considers the conduct of the Microsoft

                                                                                              s.
               Corporation This is a particular technology that has legal and regulatory ramifications. A

                                                                                           ht
               proposal addressing these issues is included.

                                                                                       rig
               Passport and .NET are being promoted heavily at the time if this writing. Passport is a
               single sign-in authentication service for .NET, designed for consumers and Web

                                                                                   ull
               merchants. A user can authenticate once through Passport and for the remainder of that
               session, the user will be automatically be permitted access to other secure .NET Web

                                                                                    f
               sites. Consumer information can be stored by Passport so that credit card numbers and

                                                                                 ns
               shipping
               Key        addresses
                     fingerprint    will automatically
                                 = AF19  FA27 2F94 998D be transferred
                                                            FDB5 DE3D  to the Web
                                                                           F8B5    merchant
                                                                                06E4        when a user
                                                                                       A169 4E46

                                                                              tai
               makes a purchase. Currently, users of Hotmail, MSN Messenger and Microsoft Certified
               Partners are required to use Passport. Other services such as My Calendar, My Wallet,

                                                                           re
               My Address, My Profile My Contacts, and My Notifications, will be tied to Passport.

                                                                       or
               At this time, Passport is available at no charge to users.

                                                                    th
               In the future, Passport will be the single sign-in for .NET My Services (formerly named
               Hailstorm) that will launch in 2002. All users and companies will pay a fee to use .NET
                                                                Au
               My Services. It will permit users from any company or to communicate with users from
               any other participating company regardless of the applications or systems native to each.
                                                             2,

               In this way, business can be conducted without forming custom templates for invoices,
                                                         00

               databases etc. The information and services will be available from a range of devices
                                                      -2

               including hand held devices and cellular phones.
               Passport and .NET use the following nonproprietary programming standards: i ii
                                                  00

               1.      XML: Extensible Markup Language
                                               20

                       XML uses symbols to describe the contents of a page or file, as does HTML.
                                            te

                       However, XML describes the content according to the data being presented, not
                                         tu

                       just how it is displayed. XML can be used to by disparate systems across the web
                       to interchange data.
                                      sti
                                   In

               2.      UDDI: Universal Description, Discovery, and Integration
                       UDDI is a registry service designed to act as a sort of telephone book for the
                               NS

                       Internet. Any business can list themselves by name, product, location, or the Web
                       services they offer. The goal is to allow businesses to find each other easily on
                           SA

                       the Web and interact with each other without incompatibilities.
                        ©

               3.     SOAP: Simple Object Access Protocol
                      SOAP provides an avenue for different operating systems to communicate with a
                      common program by standardizing how HTTP headers and XML files are
                      encoded. Thus, a Windows computer can call a program in a Linux computer
                      over the =Internet
               Key fingerprint           and then
                                  AF19 FA27   2F94pass andFDB5
                                                    998D   retrieve data.F8B5 06E4 A169 4E46
                                                                  DE3D

               4.      WDSL: Web Services Description Language

© SANS Institute 2000 - 2002               As part of GIAC practical repository.                  Author retains full rights.
WDSL is an XML-based language that specifies the services available at a
                       business and provides a method for others to access to those services over the
                       Internet. It supports UDDI.

               The security aspect of .NET is founded on the Microsoft Passport authentication service.

                                                                                                  s.
               On September 21, 2000, Microsoft announced that Passport authentication will be

                                                                                               ht
               handled by the Kerberos system. Kerberos was invented at the MIT Institute, and is

                                                                                           rig
               freely available with copyright provisos similar to that of the BSD operating system.
               Kerberos issues time limited, encrypted tickets to users who can then move from service

                                                                                       ull
               to service without reauthenticating. Each time a user switches to a new service, Kerberos
               issues a new ticket based on encrypted information from the client.

                                                                                      f
               Kerberos is well maintained and is likely the best choice for .NET, but it is vulnerable.

                                                                                   ns
               A visit
               Key       to the Kerberos
                     fingerprint  = AF19home
                                          FA27page
                                                2F94security  section
                                                      998D FDB5       reveals
                                                                    DE3D       a litany
                                                                            F8B5   06E4ofA169
                                                                                           vulnerabilities
                                                                                               4E46        that

                                                                                tai
               affect it.iii The bugs range from buffer overflows to root vulnerability to denial of
               service attacks. The CERT/CC (Carnegie Mellon Emergency Response Team

                                                                             re
               Coordination Center) states in Advisory 2000-06 “If vulnerable services are enabled on

                                                                         or
               the Key Distribution Center (KDC) system, the entire Kerberos domain may be
               compromised.”iv When corporations and ordinary users trust it in the .NET paradigm,

                                                                      th
               the attacks on Kerberos and its integrity will increase in number and severity.
                                                                  Au
               Microsoft has altered Kerberos with its own proprietary extensions that can potentially
               cause compatibility issues with non-Windows servers. At issue is a digitally signed PAC
                                                               2,

               (Privilege Attribute Certificate) added to Kerberos by Microsoft that is not compatible
                                                           00

               with the DCE (Digital Computing Environment), an agreed upon standard by which
                                                        -2

               computers can exchange data and use applications through networks.v Microsoft itself
               states, “UNIX systems using MIT's Kerberos implementation need some special
                                                    00

               configurations to be able to participate in a Windows 2000 domain using Kerberos
               authentication”vi
                                                 20

               There is a potential Denial of Service to Windows clients attempting to receive
                                             te

               authorization to use services from a non-Windows server because not every company or
                                           tu

               organization will install a Widows proxy server or perform the configuring and mapping
               necessary to become compatible with the Microsoft version of Kerberos.vii Such
                                       sti

               companies and organizations may be denied a certificate to be in the “federation of trust”
                                     In

               by Microsoft and therefore not eligible to participate in the Passport system.
               Microsoft has subverted a freely available and widely used authentication protocol by
                                NS

               requiring proprietary modifications in any non-Windows server.viii This becomes a
               serious issue when, as Microsoft plans, Passport becomes the dominant authentication
                            SA

               service on the Internet. Windows XP makes no fewer than 5 attempts to convince a new
               user to sign up for Passport.
                        ©

               During the final editing of this report, Microsoft announced that it would use an industry
               standard version of Kerberos. The point can still be made though, that the first
               inclination of Microsoft is to use its monopoly position to exclude competitors.
               It is still true, however, that while Passport will have no trouble authenticating users, the
               PACfingerprint
               Key    can prevent = users
                                    AF19 from
                                          FA27receiving
                                                2F94 998Dauthorization
                                                            FDB5 DE3D   to services
                                                                            F8B5 06E4offered
                                                                                         A169by4E46
                                                                                                non-Windows
               servers.ix
               Passport itself has several known vulnerabilities. Dave Thomas of Bugtoaster, the
               software quality assurance company inadvertently discovered a security hole when using

© SANS Institute 2000 - 2002                 As part of GIAC practical repository.                     Author retains full rights.
Passport with Windows 95/98 machines. The client DUN (dial-up networking) uses a
               shared API (Application Program Interface) to summon the Passport credentials from an
               encrypted file. When the user logs into the Passport Data center, the API passes the
               username and password in clear text from one process to another in a known memory
               area specified by the API for Windows. An attacker can easily write a worm designed to

                                                                                                 s.
               retrieve and transmit the credentials thereby compromising the user’s data and possibly

                                                                                              ht
               their finances.

                                                                                          rig
               Windows 2000 and NT do not pass unencrypted login information through memory but
               are still vulnerable. Steve Gibson, who heads the computer security firm of Gibson

                                                                                      ull
               Research (http://.grc.com,) states that an attacker can write a worm that records
               keystrokes from any version of Windows and transmit the results which include the

                                                                                     f
               username and password.x

                                                                                  ns
               Microsoft
               Key          has an= infamous
                     fingerprint    AF19 FA27 reputation for deficient
                                                 2F94 998D    FDB5 DE3Dsecurity.
                                                                           F8B5The    following
                                                                                   06E4          incidents
                                                                                         A169 4E46

                                                                               tai
               illustrate its inadequate enforcement of its own security policies:
               On March 22, 2001, an individual who falsely claimed to be a Microsoft employee used

                                                                            re
               social engineering techniques to convince Verisign Inc. to issue official digital

                                                                        or
               certificates with the common name "Microsoft Corporation". An attacker can use these

                                                                     th
               certificates to distribute malicious code that professionals and ordinary users would trust
               as genuine Microsoft code. In particular, the Class 3 certificates convey the ability to sign
                                                                 Au
               executable content including ActiveX controls, Office macros, and other software.
               Potentially, the greatest harm can come from ActiveX and Office macros because both
                                                              2,

               can be sent as either web pages or HTML mail. xi
                                                          00

               Was Verisign at fault? Yes, but Microsoft hired Verisign to ensure the security and
                                                       -2

               integrity of its certificates. Microsoft must have procedures in place to test the security of
               not just its products, but also the agents assigned to distribute them.
                                                   00

               On April 25, 2001, Microsoft Product Support Services (PPS) issued an advisory bulletin
               concerning certain security hotfixes available only to its Premier Customers and Gold
                                                20

               Partners. From April 6, 2001 to April 23, 2001, Microsoft hotfixes downloaded to these
               specific customers had been infected with the Funlove virus.xii
                                             te
                                          tu

               This is a similar situation to the Verisign incident as it was a third party who distributed
               the hotfix.xiii Microsoft must accept responsibility for damage done to its customers by
                                       sti

               the missteps of its officially sanctioned agents. Third party vendors must obtain a
                                    In

               certificate from Microsoft in order to deliver .NET compatible services. Potential .NET
               customers must consider Microsoft’s track record before deciding if .NET will be as
                               NS

               secure as possible.
               On June 22, 2001, Microsoft failed to renew its Digital Certificate for
                           SA

               secure.microsoft.co.uk, an e-commerce site for developers that wish to purchase software
               before its official release. Visitors to the site could not be sure that it was the official
                        ©

               Microsoft entity.xiv
               On January 4, 2001, Several Microsoft Websites experienced a blackout. Microsoft.com,
               MSN, Hotmail, Expedia.com and MSNBC were all unavailable to users for a day. The
               cause of this Denial of Service was, as Microsoft stated: “A Microsoft technician made a
               configuration
               Key   fingerprintchange
                                  = AF19to FA27
                                           the routers
                                                 2F94 on  the FDB5
                                                       998D   edge ofDE3D
                                                                       Microsoft's Domain
                                                                           F8B5 06E4        Name
                                                                                         A169  4E46Server
               network.” Knowledgeable Microsoft watchers say that one reason so many sites were
               inaccessible is that all four of its Domain Name Servers were on the same subnet, a
               vulnerable arrangement uncharacteristic of a sophisticated provider. xv

© SANS Institute 2000 - 2002                As part of GIAC practical repository.                    Author retains full rights.
On October 16, 2001 Zdnet reported that a member of the Certified Partners area of
               Microsoft.com was shown a VBS error message that led to detailed information about the
               names and addresses of Microsoft’s Web and database servers in addition to usernames
               and passwords provided in clear text. This area of Microsoft.com is gated by Passport.
               Microsoft and third parties are capable of security holes that Passport does not guard

                                                                                                 s.
               against.xvi

                                                                                              ht
               Microsoft has a less than stellar record in developing its own security products.

                                                                                          rig
               On April 16, 2001 Microsoft issued Security Bulletin MS01-021, which contained a
               patch for a Denial of Service vulnerability in the default configuration of its ISA (Internet

                                                                                      ull
               Security and Acceleration) server, an enterprise firewall and Web cache server. If an
               external attacker can induce a network user to open an HTML e-mail containing a request

                                                                                     f
               of excessive length, the server will see it as access violation and will cease to pass traffic.

                                                                                  ns
               This fingerprint
               Key   is significant because
                                 = AF19  FA27the2F94
                                                 ISA was
                                                      998Dtouted
                                                            FDB5byDE3D
                                                                     Microsoft
                                                                             F8B5as06E4
                                                                                    security
                                                                                        A169 product,
                                                                                               4E46

                                                                               tai
               specifically a firewall.xvii
               Microsoft products are frequent victims of exploits and virus and worm attacks. The

                                                                            re
               company issues patches on a regular basis, sometimes before a major attack takes place.

                                                                        or
               This was the case when the Code Red and Nimda worms caused the recent wave of

                                                                     th
               Microsoft server infestations. However, this serves to reinforce the argument that the
               products are not introduced to the market in a secure state.
                                                                 Au
               John Pescatore of the well-respected Gartner Group issued an advisory on September 19,
               2001 stating in part that:
                                                              2,

                      Gartner remains concerned that viruses and worms will continue to attack IIS until
                                                           00

                      Microsoft has released a completely rewritten, thoroughly and publicly tested, new
                                                       -2

                      release of IIS. Sufficient operational testing should follow to ensure that the initial
                      wave of security vulnerabilities every software product experiences has been
                                                   00

                      uncovered and fixed. This move should include any Microsoft .NET Web services,
                      which requires the use of IIS. Gartner believes that this rewriting will not occur
                                                20

                      before year-end 2002 (0.8 probability)xviii
                                             te

               There are a number of privacy and security issues to consider before agreeing to use
                                          tu

               .NET and Passport. The Passport login consists of the user’s e-mail and password. It is a
               relatively easy matter to obtain someone’s e-mail address and then use standard password
                                       sti

               guessing or cracking techniques to gain access to their account. An attacker would be
                                    In

               authenticated to the Web sites holding the user’s bank accounts, credit cards, e-mail,
               personal files, calendar, etc. In the case of .NET My Services, an unknown hacker or a
                               NS

               competitor could access business applications, financial accounts, and sensitive files and
               e-mail.
                           SA

               There are privacy concerns based on the constant collecting and storing of personal data.
               As the Passport grows and matures, the network will contain considerable information
                        ©

               about the personal habits, choices, and relationships of its viewers. Details about one’s
               personal health and employment can be stored on .NET. The temptation to capitalize on
               this valuable consumer/employee information will be powerful.
               The Passport Whitepaper states: “Microsoft Web sites or services are not allowed to mine
               the .NET
               Key         Passport
                    fingerprint     database
                                 = AF19  FA27 and  do not
                                                2F94  998Dhave access
                                                            FDB5       to it.F8B5
                                                                    DE3D      Microsoft
                                                                                   06E4will
                                                                                        A169 not4E46
                                                                                                 share .NET
               Passport information with any Microsoft or third-party service operator.” The same
               Whitepaper leaves a loophole: “This document is for informational purposes only.

© SANS Institute 2000 - 2002                As part of GIAC practical repository.                     Author retains full rights.
MICROSOFT MAKES NO WARRANTIES, EXPRESSED OR IMPLIED, IN THIS
               DOCUMENT.”xix
               Microsoft has shown itself to be a vigorous legal advocate for itself. Its Attorneys
               threatened Slashdot.com for discussing the Kerberos implementation that Microsoft had
               published on the Internet, claiming such discussions were violations of the Digital Media

                                                                                                s.
               Copyright Act.xx A company attorney warned a former Microsoft contract employee,

                                                                                             ht
               Jason Bishop, who worked on the development of SOAP, just before he was to give a

                                                                                         rig
               speech at Java-XML SIG. Mr. Bishop had done nothing to indicate that he would violate
               any agreement between himself and Microsoft. Three Microsoft SOAP people, including

                                                                                     ull
               one attorney came to the meeting, ostensibly to intimidate Bishop.xxi
               In its Passport Whitepaper, Microsoft emphasizes the security measures built into

                                                                                     f
               Passport such as redundancy, SSL (Secure Socket Layer), and Triple DES (Data

                                                                                  ns
               Encryption
               Key            Standard).
                     fingerprint  = AF19However,
                                          FA27 2F94 just in the
                                                       998D     past DE3D
                                                              FDB5   ten months,
                                                                           F8B5Micrososft
                                                                                  06E4 A169has  spread a
                                                                                              4E46

                                                                               tai
               virus to its favored customers through a hotfix, handed out an official Microsoft digital
               certificate to an imposter, experienced a blackout by its own hand, neglected to renew a

                                                                            re
               digital certificate for one of its Web sites, released a flawed firewall, attempted to

                                                                        or
               interfere with a discussion on a Web site, revealed confidential information about its

                                                                     th
               servers and users, and issued 51 Security Bulletins.
               Consumers, businesses, and governments will be investing a great deal of faith in
                                                                 Au
               Microsoft and its “federation of trust” (third parties). What liability will Microsoft have
               if it or one of the third parties neglects to follow security procedures as has happened in
                                                              2,

               the past? Microsoft tends to use tunnel vision when it pursues a goal. There is little
                                                          00

               regard for antitrust concerns or consumer protection. Its softly worded Security Bulletins
                                                       -2

               do not assuage the professional computer security community.
               On April 3, 2000,U.S. District Court Judge Thomas Penfield Jackson ruled “…Microsoft
                                                   00

               used its monopoly power by anticompetitive means and attempted to monopolize the
               Web browser market, both in violation of §2. Microsoft also violated § 1 of the Sherman
                                                20

               Act by unlawfully tying its Web browser to its operating systems.” (An appeal is
               pending).xxii In September 2001, The Consumer Federation of America, Consumers
                                            te
                                          tu

               Union, Media Access Project and U.S. Public Interest Research Group, joined together to
               write a letter to federal and state prosecutors that expressed their belief that Microsoft is
                                       sti

               flaunting the ruling of the federal appeals court by integrating its Internet services into
                                    In

               Windows XP.xxiii
               Microsoft has recently used the image of a padlock to demonstrate its new emphasis on
                               NS

               security but there is no clear or prominent warning on the Passport sign-up page that
               discloses the possibility of lost or stolen data, compromised user ID’s and passwords,
                           SA

               disclosure of private information, or service blackouts. Microsoft simply offers a
               disclaimer of responsibility within its Passport “Terms of Use” document.xxiv
                        ©

               A vendor can never promise total security for data or 100 % uptime. However, when a
               vendor seeks and is likely to become the dominant authenticator of the Internet for
               consumers, business and governments, then a mandatory disclosure of the risks involved
               seems reasonable.
               Before
               Key      it is permitted
                     fingerprint  = AF19collect
                                          FA27fees  to 998D
                                                 2F94  directFDB5
                                                              the majority
                                                                     DE3D of  Internet
                                                                           F8B5   06E4commerce
                                                                                       A169 4E46 through its
               servers, consumers and businesses must be shielded from Microsoft’s legal might and
               must be granted inexpensive avenues of recourse for damage that exceeds that legal

© SANS Institute 2000 - 2002                As part of GIAC practical repository.                   Author retains full rights.
threshold. This will require a sort of “Internet Bill of Rights” piece of legislation passed
               by Congress and regulated by the Federal Communications Commission.
               It will contain these elements:

                  1. A statement indicating the thresholds of damages, losses, and blackouts caused by

                                                                                                         s.
                       a Web entity that has not followed its own procedures or neglected to act

                                                                                                      ht
                       reasonably to prevent a damaging failure.

                                                                                                  rig
                  2. A disclosure of risks associated with the use of the particular Internet service.
                  3. An uncomplicated specific procedure that allows consumers to contact the vendor

                                                                                              ull
                       and make a claim for losses and damages beyond the legal threshold.
                  4. The appropriate state and federal agencies to contact if the vendor disallows the

                                                                                           f
                       consumer’s claim.

                                                                                        ns
               Key5.fingerprint
                       Certain restrictions
                                = AF19 FA27 against
                                               2F94predatory
                                                    998D FDB5lawsuits
                                                                DE3D  brought by monopolies
                                                                        F8B5 06E4   A169 4E46 against

                                                                                     tai
                       consumers or public interest groups.

                                                                                  re
                      Any Web entity that accepts payment for goods and services would be required to

                                                                              or
                      post this Bill of Rights with a link from the home page. The page that collects the

                                                                           th
                      payment would contain the full text of the Bill of Rights. When services are provided
                      for no charge, the Web entity would be required to post only a disclosure of risks in
                                                                       Au
                      the same way.
                      Should you use Microsoft Passport .NET and .NET My Services? Consider the
                                                                    2,

                      record of the Microsoft Corporation regarding its privacy and security foibles, its
                                                                00

                      anticompetitive tendencies and anti-consumerism, and its powerful and intimidating
                                                             -2

                      legal tactics. The degree of personal risk is difficult to quantify, but you should use
                      Passport and .NET only if it fills very important needs in your personal or
                                                         00

                      professional life.
                                                     20
                                                  te
                                               tu
                                            sti

               i
                   Eisenberg, Robert. “What is HailStorm?” DevX.com. April-June 2001. URL:
                                         In

               http://www.enterprise-zone.com/articles/hailstorm/reisenberg/reisenberg-01.asp
               ii
                   http://whatis.techtarget.com/
                                    NS

               iii
                   http://web.mit.edu/kerberos/www/advisories/index.html
               iv
                    http://www.cert.org/advisories/CA-2000-06.html 17 May 2000
                               SA

               v
                   Ts’o, Theodore. “Microsoft ‘embraces and extends’ Kerberos V5.” Usenix.org. 3 Dec. 1997. URL:
               http://www.usenix.org/publications/login/1997-11/embraces.html
                            ©

               vi
                 http://www.microsoft.com/technet/treeview/default.asp?url=/technet/ssssprodtechn
               ol/ windows2000serv/ maintain/featusability/rsvpker.asp
               vii
                    Orlowski, Andrew. “Why Microsoft's Open HailStorm promises flatter to deceive.” The Register.
               21 September 2001. URL: http://www.theregister.co.uk/content/archive/21792.html
               viii
                   Babcock, Charles. “Kerberos Made To Heel To Windows 2000.” zdnet.com. 28 February 2000. URL:
               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
               http://www.zdnet.com/zdnn/stories/news/0,4586,2449668,00.html
               ix
                 Orlowski, Andrew. “Why Microsoft's Open HailStorm promises flatter to deceive.” The Register.
               21 September 2001. URL: http://www.theregister.co.uk/content/archive/21792.html
               x
                 Rush, Wayne. “Your Stolen Passport.” zdnet.com 26 Sept 2001. URL:
                   http://techupdate.zdnet.com/techupdate/stories/main/0,14179,2814881,00.html

© SANS Institute 2000 - 2002                     As part of GIAC practical repository.                        Author retains full rights.
xi
                   Poulsen, Kevin “Microsoft vexed by falsified certs.” Security Focus. 22 May 2001
               URL: http://www.securityfocus.com/news/178
               xii
                   Weiss, Todd R. “Missing Antivirus Software Left Microsoft Clients Vulnerable.” 26 April 2001

                                                                                                         s.
               http://www.computerworld.com/storyba/0,4125,NAV47_STO59982,00.html
               xiii

                                                                                                      ht
                   Leyden, John. “Microsoft Hotfixes Infected With Funlove Virus.” The Register. 25 April 2001.
               URL: http://www.theregister.co.uk/content/archive/18516.html

                                                                                                  rig
               xiv
                   Leyden, John. “Microsoft Fails to Renew its Digital Certificate.” The Register. 29 June 2001.
                URL: http://www.theregister.co.uk/content/archive/20082.html

                                                                                              ull
               xv
                   Leyden, John. “Microsoft Blames Lowly Techie For Web Blackout.” 25 January 2001.
               URL: http://www.theregister.co.uk/content/archive/16354.html

                                                                                           f
               xvi
                    Berlind, David “Microsoft.com error reveals IDs, passwords.” 16 Oct 2001 URL:

                                                                                        ns
               http://techupdate.zdnet.com/techupdate/stories/main/0,14179,2818129,00.html
               Key    fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46

                                                                                     tai
               xvii
                   http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bull

                                                                                  re
               etin/ms01-021.asp 25 April, 2001
               xviii
                    Pescatore, John. “Nimda worm Shows you can’t always patch fast enough” 19 Sept. 2001

                                                                              or
               http://www3.gartner.com/DisplayDocument?doc_cd=101034 19 Sept. 2001
               xix
                    http://www.microsoft.com/myservices/passport/technical.doc Sept. 2001

                                                                           th
               xx
                   Kermath, Annie. “Slashdot Gives Microsoft Lawyers The Bum’s Rush.” 19 May 2000.
                                                                      Au
               URL: http://www.theregister.co.uk/content/archive/10934.html
               xxi
                    Lettice, John. “Microsoft Sends in Lawyers to Stop ‘Open’ SOAP From Getting Out” 25 May 2000.
                                                                   2,
               URL: http://www.theregister.co.uk/content/archive/10986.html
               xxii
                                                               00

                    BBCNews. “Excerpts from the Guilty Verdict.” 3 April 2000 URL:
               http://news.bbc.co.uk/hi/english/in_depth/business/2000/microsoft/newsid_700000/7
                                                           -2

               00702.stm
               xxiii
                 Ricuitti, Mike. “Strategy: Blueprint Shrouded in Mystery.” 18 Oct. 2001
                                                       00

               URL: http://news.cnet.com/news/0-1003-201-7502765-0.html
               xxiv
                       http://www.passport.com/consumer/termsofuse.asp?lc=1033&id=950&cb=0&cbid=
                                                    20
                                                te
                                             tu
                                          sti
                                      In
                                 NS
                              SA
                            ©

               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46

© SANS Institute 2000 - 2002                    As part of GIAC practical repository.                             Author retains full rights.
Last Updated: January 26th, 2021

      Upcoming Training

SANS Cyber Security West: Feb 2021                ,                          Feb 01, 2021 - Feb 06, 2021   CyberCon

Open-Source Intelligence Summit & Training 2021   Virtual - US Eastern,      Feb 08, 2021 - Feb 23, 2021   CyberCon

SANS Secure Japan 2021                            , Japan                    Feb 22, 2021 - Mar 13, 2021   CyberCon

SANS Scottsdale: Virtual Edition 2021             ,                          Feb 22, 2021 - Feb 27, 2021   CyberCon
                                                  Virtual - Greenwich
SANS London February 2021                         Mean Time, United          Feb 22, 2021 - Feb 27, 2021   CyberCon
                                                  Kingdom
SANS Cyber Security East: March 2021              ,                          Mar 01, 2021 - Mar 06, 2021   CyberCon

SANS Secure Asia Pacific 2021                     Singapore, Singapore       Mar 08, 2021 - Mar 20, 2021   Live Event

SANS Secure Asia Pacific 2021                     , Singapore                Mar 08, 2021 - Mar 20, 2021   CyberCon

SANS Cyber Security West: March 2021              ,                          Mar 15, 2021 - Mar 20, 2021   CyberCon

SANS Riyadh March 2021                            , Kingdom Of Saudi         Mar 20, 2021 - Apr 01, 2021   CyberCon
                                                  Arabia
SANS Secure Australia 2021                        Canberra, Australia        Mar 22, 2021 - Mar 27, 2021   Live Event
                                                  Virtual - Central
SANS Munich March 2021                            European Time,             Mar 22, 2021 - Mar 27, 2021   CyberCon
                                                  Germany
SANS Secure Australia 2021 Live Online            , Australia                Mar 22, 2021 - Mar 27, 2021   CyberCon

SANS 2021                                         ,                          Mar 22, 2021 - Mar 27, 2021   CyberCon

SANS Cyber Security Mountain: April 2021          ,                          Apr 05, 2021 - Apr 10, 2021   CyberCon
                                                  Virtual - Central
SANS SEC401 (In Spanish) April 2021               European Summer Time,      Apr 12, 2021 - Apr 23, 2021   CyberCon
                                                  Spain
SANS Cyber Security East: April 2021              ,                          Apr 12, 2021 - Apr 17, 2021   CyberCon

SANS London April 2021                            Virtual - British Summer   Apr 12, 2021 - Apr 17, 2021   CyberCon
                                                  Time, United Kingdom
SANS Autumn Australia 2021                        Sydney, Australia          Apr 12, 2021 - Apr 17, 2021   Live Event

SANS Autumn Australia 2021 - Live Online          , Australia                Apr 12, 2021 - Apr 17, 2021   CyberCon

SANS Secure India 2021                            , Singapore                Apr 19, 2021 - Apr 24, 2021   CyberCon

SANS Baltimore Spring: Virtual Edition 2021       ,                          Apr 26, 2021 - May 01, 2021   CyberCon

SANS Cyber Security Central: May 2021             ,                          May 03, 2021 - May 08, 2021   CyberCon

SANS Security West 2021                           ,                          May 10, 2021 - May 15, 2021   CyberCon

SANS Cyber Security East: May 2021                ,                     May 17, 2021 - May 22, 2021        CyberCon
                                                  Virtual - Central
SANS Stockholm May 2021                           European Summer Time, May 31, 2021 - Jun 05, 2021        CyberCon
                                                  Sweden
                                                  Virtual - Central
SANS In French May 2021                           European Summer Time, May 31, 2021 - Jun 05, 2021        CyberCon
                                                  France
SANS Cyber Security Central: June 2021            ,                          Jun 07, 2021 - Jun 12, 2021   CyberCon

SANS SOC Training 2021                            ,                          Jun 14, 2021 - Jun 19, 2021   CyberCon

SANS Cyber Security Mountain: June 2021           ,                          Jun 21, 2021 - Jun 26, 2021   CyberCon
You can also read