Windows NT System Key Permits Strong Encryption of the SAMLast reviewed: October 27, 1997Article ID: Q143475 |
The information in this article applies to:
SUMMARYThe Windows NT Server 4.0 System Key hotfix provides the capability to use strong encryption techniques to increase protection of account password information stored in the registry by the Security Account Manager (SAM). Windows NT Server stores user account information, including a derivative of the user account password, in a secure portion of the Registry protected by access control and an obfuscation function. The account information in the Registry is only accessible to members of the Administrators group. Windows NT Server, like other operating systems, allows privileged users who are administrators access to all resources in the system. For installations that want enhanced security, strong encryption of account password derivative information provides an additional level of security to prevent Administrators from intentionally or unintentionally accessing password derivatives using Registry programming interfaces. This file has been posted to the following Internet location:
ftp://ftp.microsoft.com/bussys/winnt-public/fixes/usa/nt4 /hotfixes-postSP2/sec-fix MORE INFORMATIONThe strong encryption capability with the Windows NT 4.0 System Key hotfix is an optional feature. Administrators may choose to implement strong encryption by defining a System Key for Windows NT. Strong encryption protects private account information by encrypting the password data using a 128-bit cryptographically random key, known as a password encryption key. Only the private password information is strongly encrypted in the database, not the entire account database. Every system using the strong encryption option will have a unique password encryption key. The password encryption key is itself encrypted with a System Key. Strong password encryption may be used on both Windows NT Server and Workstation where account information is stored. Using strong encryption of account passwords adds additional protection for the contents of the SAM portion of the registry and subsequent backup copies of the registry information in the %systemroot%\repair directory created using the RDISK command and on system backup tapes. The System Key is defined using the command Syskey.exe. Only members of the Administrators group can run the Syskey.exe command. The utility is used to initialize or change the System Key. The System Key is the "master key" used to protect the password encryption key and therefore protection of the System Key is a critical system security operation. There are three options for managing the System Key designed to meet the needs of different Windows NT environments. The System Key options are the following:
WARNING: If the System Key password is forgotten or the System Key floppy disk is lost, it may not be possible to start the system. Protect and store the System Key information safely with backup copies in the event of emergency. The only way to recover the system if the System Key is lost is using a repair disk to restore the registry to a state prior to enabling strong encryption. See the Repair Issues section below. Strong encryption may be configured independently on the Primary and each Backup Domain Controllers (DCs). Each domain controller will have a unique password encryption key and a unique System Key. For example, the Primary DC may be configured to use a machine generated System Key stored on a disk, and Backup DCs may each use a different machine generated System Key stored on the local system. A machine generated System Key stored locally on a Primary domain controller is not replicated. Before enabling strong encryption for Primary domain controllers, you may want to ensure a complete updated Backup domain controller is available to use as a backup system until changes to the Primary domain are complete and verified. Before enabling strong encryption on any system, Microsoft recommends making a fresh copy of the Emergency Repair Disk, including the security information in the registry, using the command, RDISK /S. Please see the following article in the Microsoft Knowledge Base prior to using RDISK /S:
ARTICLE-ID: Q122857 TITLE : RDISK /S and RDISK /S- Options in Windows NTThe SYSKEY command is used to select the System Key option and generate the initial key value. The key value may be either a machine generated key or a password derived key. The SYSKEY command first displays a dialog showing whether strong encryption is enabled or disabled. After the strong encryption capability is enabled, it cannot be disabled. To enable strong authentication of the account database, select the option "Encryption Enabled", and click OK. A confirm dialog appears reminding the administrator to make an updated emergency repair disk. A new dialog appears presenting options for the Account Database Key. Use the options available on Account Database Key dialog to select the System Key. After selecting the System Key option, Windows NT must be restarted for the System Key option to take effect. When the system restarts, the administrator may be prompted to enter the System Key, depending on the key option chosen. Windows NT detects the first use of the System Key and generates a new random password encryption key. The password encryption key is protected with the System Key, and then all account password information is strongly encrypted. The SYSKEY command needs to be run on each system where strong encryption of the account password information is required. SYSKEY supports a "-l" command option to generate the master key and store the key locally on the system. This option enables strong password encryption in the registry and allows the command to run without an interactive dialog. The SYSKEY command can be used at a later time to change the System Key options from one method to another, or to change the System Key to a new key. Changing the System Key requires knowledge of, or possession of, the current System Key. If the password derived System Key option is used, SYSKEY does not enforce a minimum password length, however long passwords (greater than 12 characters) are recommended. The maximum System Key password length is 128 characters.
REPAIR ISSUESIntroduction of strong encryption of account password information changes the SYSTEM and SAM portions of the registry in ways that effect the repair options available for recovery of a Windows NT system. Always use the RDISK command with the /S option to create a new Emergency Repair Disk including a backup copy of the SYSTEM and SAM portion of the registry in the \Repair folder. For complete recovery options, the following Emergency Repair Disks should be available:
The following table lists the recovery options available.
Desired System Repair disk to Repaired System Configuration applyafter Repair
Windows NT 4.0, Use the "Pre-hotfix" Registry matches system before prior to hotfix repair disk hotfix installed; the three installation system security component files need to be repaired from the Windows NT 4.0 compact disc to match the pre-hotfix registry format. Windows NT 4.0 with Use the "hotfix – Registry matches the system hotfix installed, Before Encryption" before strong encryption. but strong repair disk System Key is not in effect; encryption is not strong encryption not enabled. enabled System security files do not need to be repaired from the Windows NT 4.0 compact disc. Windows NT 4.0 with Use the "hotfix – Registry matches the system hotfix installed, After Encryption" with strong encryption enabled; and strong repair disk the System Key in effect is the encryption is System Key used at the time the enabled repair disk was made.In the event that an Administrator needs to repair the system after the System Key hotfix is installed, both the SYSTEM and SAM portions of the registry need to be repaired at the same time. The System Key option in the SYSTEM portion of the registry must match the strong encryption key used for the SAM portion of the registry. If one registry hive is repaired without the other, it may be possible for the system to try to use a different System Key option (password derived or machine generated) that does not match the strong encryption key used for the account password information. Installation of the System Key hotfix will update the checksums for the system security component (Winlogon.exe, Samsrv.dll, Samlib.dll) in the System.log file. The System.log file is saved on the Emergency Repair Disk. The System.log file is used during recovery to determine if the files need to be updated from the Windows NT Server 4.0 CD-ROM to match the pre-hotfix registry configuration. If the desired recovery system configuration is Windows NT Server 4.0 with the System Key hotfix, you will not be asked to repair these system security files. After installing the System Key hotfix, and you have not enabled strong encryption, if you attempt to repair the system files using a repair disk created before installing the System Key hotfix (that is, using the "pre- hotfix" repair disk) you also MUST repair the SYSTEM and SAM registry. If you do not repair the registry, the system files and registry format will not match. You will get an error (error number C00000DF) when you attempt to log on. When the registry and system files are mismatched, the recovery procedure is to repair matching system and registry files. Either repair the registry hives from the same "pre-hotfix" repair disk, or use the "hotfix – Before Encryption" repair disk, which has a registry format that matches the System Key hotfix system files. Finally, if you have a situation where the system security files (Winlogon, Samsrv.dll, Samlib.dll) are corrupted, then you must recover the system using a "Pre-hotfix" repair disk and repair the corrupted files from a Windows NT Server 4.0 CD-ROM. You must also repair the SYSTEM and SAM registry hives to match the system files from the "Pre-hotfix" repair disk.
|
Additional query words: 4.00 sp3
© 1998 Microsoft Corporation. All rights reserved. Terms of Use. |