1. You are viewing our forum as a guest. For full access please Register. WindowsBBS.com is completely free, paid for by advertisers and donations.

Update for Windows XP (KB917021)

Discussion in 'Networking (Hardware & Software)' started by Arie, 2006/10/20.

  1. 2006/10/20
    Arie

    Arie Administrator Administrator Staff Thread Starter

    Joined:
    2001/12/27
    Messages:
    15,174
    Likes Received:
    412
    Microsoft released an update to enhance Windows XP support for Wi-Fi Protected Access 2 (WPA2) options in Wireless Group Policy (WGP), and to help prevent the Windows wireless client from advertising the wireless networks in its preferred networks list. For more information about this update, read Microsoft Knowledge Base Article 917021.

    Supported Operating Systems: Windows XP Service Pack 2

     
    Arie,
    #1
  2. 2006/10/21
    Bill Castner

    Bill Castner Inactive

    Joined:
    2006/08/30
    Messages:
    1,980
    Likes Received:
    0
    Thanks Arie.

    This sounds like a must-do upgrade for security reasons.
     

  3. to hide this advert.

  4. 2006/10/21
    Judy

    Judy Inactive

    Joined:
    2002/11/21
    Messages:
    228
    Likes Received:
    0
    I just read your newsletter re: this update. I went to the windows update page to see if this update had been downloaded automatically.

    I could not find it listed in my download history. Last download being October 10.

    Thinking that was quite a long time ago, and did I miss some downloads somehow since I have a new computer that may not yet be completely configured, I hunted for a list of downloads and finally found one that did list the last download to be on Ocotber 10.

    But, this KB917021 was not listed, and it looks like it was dated around the October 20th. AND, the details say you don't need it if you have Wireless Client Update installed.

    How do you know if you have Wireless Client update installed?

    I cannot find it in the Add/Remove program list

    And, if this is critical, why hasn't it been automatically downloaded?


     
    Judy,
    #3
  5. 2006/10/21
    Bill Castner

    Bill Castner Inactive

    Joined:
    2006/08/30
    Messages:
    1,980
    Likes Received:
    0
    This kind of upgrade would not be pushed automaticly by Windows Update. If you do a Manual, Custom Windows Update the upgrade should appear on the list, but not as "critical. "

    "How do you know if you have the Wireless Client Update installed?

    So, if you have KB893357 installed (the Wireless Client Upgrade), and Service Pack 2, you do not need this upgrade.
     
  6. 2006/10/21
    TonyT

    TonyT SuperGeek Staff

    Joined:
    2002/01/18
    Messages:
    9,068
    Likes Received:
    396
    Judy, you may be confused:

    The Wireless Client Update: October 18, 2006
    WPA2 Information Element Update: June 1, 2006

    The article Arie posred above refers to the Wireless Client Update. It was made availabe for download on the 18th Oct. The article states that if one installs this new Wireless Client Update then one need not also install separately the previous related update called WPA2 Information Element update. Apparantly this new update must contain the updates included in the previous one.

    To see which updates are installed on your comp:
    1. open add-remove programs
    2. click "show updates" link
    3. look for one numbered 917021 (Wireless Client Update)
    4. look for one numbered 893357 (WPA2 Information Element Update)
     
  7. 2006/10/22
    Bill Castner

    Bill Castner Inactive

    Joined:
    2006/08/30
    Messages:
    1,980
    Likes Received:
    0
    That is a more sensible interpretation.
    Thanks Tony T.
     
  8. 2006/10/23
    TonyT

    TonyT SuperGeek Staff

    Joined:
    2002/01/18
    Messages:
    9,068
    Likes Received:
    396
    no problem.
    Just so you know, it took me a couple reads of the kb arfticle to come to that understanding along w/ reading the data re the previous update.

    This is a long needed overdue update for ms wifi. I don't believe wifi will get secured more than this for some time though because such fixes reduce the 'user friendliness' of ms wifi.


    (probably should be a different discussion)
    The real problems lie in how the wifi service works with wifi drivers, limiting the functionaly & capabilites of the drivers. For example, windows won't natively support promiscious mode or rfmon mode in wifi drivers. If rfmon mode were supported (allowed by the wifi service) then the recent updates would be unnecessary as the client comp would never have to transmit in order to detect available wlans. It would be much more secure and simpler if there were no automatic searching for wlans (force user via a baloon notification) to "locate available wlans & connect), and once done then & only then allow the user to tell the wifi service to "remember my connection ".

    The trouble arises though because all too often wifi adapters are bundled w/ their own connection software that auto takes over the connection & stops windows from managing the connection. This only confuses the user more. (he now has 2 wifi icons in his tray). My experience has taught me that wifi works best when letting windows manage the connection and to disable 3rd party wlan managers.
     
  9. 2006/10/23
    Bill Castner

    Bill Castner Inactive

    Joined:
    2006/08/30
    Messages:
    1,980
    Likes Received:
    0
    I too am happier with XP than third-party wireless connectoids.

    Post-VISTA there will be several important Wifi products from Microsoft. The Live Wifi client in Beta now is terrific.
     
  10. 2006/10/27
    booBot

    booBot Inactive

    Joined:
    2006/10/27
    Messages:
    42
    Likes Received:
    0
    WZC (or is it WAC now?) and user's credentials on hardware tokens.

    Yes, KB917021 is very usefull an welcome update.

    Does anybody here know if there will be the last important enhancement for the WZC - the introduction of support for the user certificates on hardware tokens?

    I've been struggling with the Aladdin's eToken PRO - WZC currently ignores any non-software storages... The Aladdin's developers could not help with this. I have to use my WPA2-Enterprize with the cert in the registry store...

    winXP-SP2, Aladdin's RTE v3.65.

    Thank you in advance,
    Tony.
     
  11. 2006/10/27
    Bill Castner

    Bill Castner Inactive

    Joined:
    2006/08/30
    Messages:
    1,980
    Likes Received:
    0
    Check the Enable network access control using IEEE 802.1X check box.

    For EAP type, select PEAP. Click Properties. The PEAP Properties screen appears. Click Server Certificate authentication at the top.

    Currently Generic Token Card is the only second phase EAP type available. Click Properties. The Generic Token Card Properties screen appears. There is a provision for hardware tokens.
     
  12. 2006/10/28
    booBot

    booBot Inactive

    Joined:
    2006/10/27
    Messages:
    42
    Likes Received:
    0
    Nope...

    I'm not sure what you describe here.

    My WPA2-Enterprize is EAP-TLS, but I did try all other settings. And I did specifically select the Use my smart card option - does not work. I see a momentarily appearing baloon and then the message of "not finding the smart card ". (I do have the "Generic smart card support" update installed)
     
  13. 2006/10/28
    Bill Castner

    Bill Castner Inactive

    Joined:
    2006/08/30
    Messages:
    1,980
    Likes Received:
    0
    EAP-TLS authentication with smart cards, while supported for dial-up and VPN connections, is not supported for wireless connections.
     
  14. 2006/10/28
    booBot

    booBot Inactive

    Joined:
    2006/10/27
    Messages:
    42
    Likes Received:
    0
    Strange.

    Is it the intentional omission?
    Any plans to implement it?
     
  15. 2006/10/28
    Bill Castner

    Bill Castner Inactive

    Joined:
    2006/08/30
    Messages:
    1,980
    Likes Received:
    0
    It was intentional.
    There are no current implementation plans.

    The reason for this is that Microsoft is a very standards based developer. As far as their official position it would be that they make every effort to be inclusive of standards-based security features. (I know of no other company that offers as wide a range of wireless supplicants as found in XP SP2).

    But there are no standards for hardware tokens in EAP-TLS.

    For example in Alladin a proprietary means is to read the key. Standards Working Groups believe being able to display the private key modulus and export it is not the same; in the Aladdin case it can be displayed but not exported. What is being displayed is not sufficient to sign a message or re-import the key back onto a token.

    There are number of different token technologies. Token technology that will allow a key pair to be generated on the token rarely gives you the ability to export the key. If the public/private key pair is generated on the token, not exportable, and the token is lost, the only thing that protects the key is the pin/password that secures opening the key store on the token.

    Until a standard is achieved, Microsoft will insist it would be up to the Manufacturer (Alladin in your case) to supply the necessary supplicant.

    Microsoft does make this much easier for a developer under Vista. The new network stack has deliberate hooks for custom supplicants.
     
  16. 2006/10/29
    booBot

    booBot Inactive

    Joined:
    2006/10/27
    Messages:
    42
    Likes Received:
    0
    That is very regretfull if true.

    Oh, please, don't! :D

    And there should not be any.
    It is not about tokens. EAP-TLS is about any certificate-based authentication.
    It, as such, should not worry about where actually a cert is stored.

    I'm I right on reading this as the demand for the private key to be exportable|retrievable from a hardware token?!
    The message signing goes on in the token's hardware, there is no legitimate reason to demand to export the signing key out! (Other that the escrow policy, it that case one may generate *.p12 file and import it into a token while storing the file safely. This all defeats the hardware tokens idea - and I would never let my private key to lay somewhere else.)

    This is the Good Thing (tm) in my eyes. The whole idea of hardware tokens is about inretrievability of a private key.

    What is wrong here?
    I see it 100% correctly done - the token itself demands the PIN to access it and there is the RSA-key passphraze, protecting the key.

    To my eyes the fact that WZC does not try the the certs in tokens is just a silly mistake.
    The actual hardware-based cert is clearly visible in user's cert-store, it is quite usable for it's intended usages (if allowed by it's extentions) - I have keys to sign|decode my e-mail. I have certs to do my VPN. All in my token. The only service that ignores hardware storage here - is WZC.
    I do hope that winXP-SP3 will finally address this issue.
     
  17. 2006/10/29
    TonyT

    TonyT SuperGeek Staff

    Joined:
    2002/01/18
    Messages:
    9,068
    Likes Received:
    396
  18. 2006/10/29
    booBot

    booBot Inactive

    Joined:
    2006/10/27
    Messages:
    42
    Likes Received:
    0
    Thanks, Tony.
    I have no problems with WiFi, WPA2-Enterprize, EAP-TLS and WZC - as long as I've given up on insisting in WZC to use my cert stored in the token. WZC and the same cert in the software storage works just fine.
    My check-boxes are set exactly as shown in those documents above.

    All I want|wish is WZC to use CryptoAPI as all other win32 programs do.

    If it would try something similar to "cryptoapicert "THUMB=xx xx xx... "" - then all will work automagically - the Aladdin's (in my case of using their RTE) top-up would appear asking for the token's PIN and then another - asking for the RSA-key's passphraze.

    RE Bill Castner's statement about lack of standartization for tokens in EAP-TLS:
    No S/MIME RFC|document ever mentions hardware tokens either, Aladdin's eToken PRO in particular. But somehow all decent PKCS#11-aware e-mail clients are able to use hardware tokens just fine... What do they do wrong?! Do they violate S/MIME standards?!

    RE "lost|stolen" status of a token - this is completely irrelevant to EAP-TLS standards as well. Besides, a cert on the software storage is far more vulnerable to all sorts of abuse...

    I hope someone responsible from MS is reading this site too. Please relay my plea for making the WZC fully PKCS#11-aware service.
     
    Last edited: 2006/10/29
  19. 2006/11/09
    Judy

    Judy Inactive

    Joined:
    2002/11/21
    Messages:
    228
    Likes Received:
    0
    Thanks for the explanation re: how to find if the updates are installed on my computer.

    I do have the "hotfix" KB893357, but do NOT have the last update 917021. In reading the KB article on the Microsoft page, I understand that this update does offer additional security in addition to that in 893357 update.

    But, didn't someone say that the 917021 update was not needed if you had 893357?

    Or am I completely confused?

     
  20. 2006/11/09
    booBot

    booBot Inactive

    Joined:
    2006/10/27
    Messages:
    42
    Likes Received:
    0
    You are.
    It is exactly the other way around: the 893357 update was not needed if you had 917021.
    Actually, the KB917021 is the security fix - it prevents the vulnerabilities, if you read the description properly...
     
  21. 2006/11/13
    Judy

    Judy Inactive

    Joined:
    2002/11/21
    Messages:
    228
    Likes Received:
    0
    Thanks for setting me straight. I did read the article and the KB instructions, but did not understand, so as you say, I did not read it correctly and I was most definitely confused.

    Will now download the correct security fix.

     

Share This Page

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.