Article Details
Scrape Timestamp (UTC): 2024-06-04 15:47:28.233
Original Article Text
Click to Toggle View
Microsoft deprecates Windows NTLM authentication protocol. Microsoft has officially deprecated NTLM authentication on Windows and Windows servers, stating that developers should transition to Kerberos or Negotiation authentication to prevent problems in the future. New Technology LAN Manager, better known as NTLM, is an authentication protocol first released in 1993 as part of Windows NT 3.1 and as the successor to the LAN Manager (LM) protocol. Microsoft says the NTLM protocols, which are still widely used today, are no longer under active development as of June and will be phased out in favor of more secure alternatives. This move isn't surprising, as Microsoft first announced its intention to kill off the aging authentication protocol in October 2023, urging admins to move to Kerberos and other contemporary authentication systems, like Negotiate. NTLM has been extensively abused in cyberattacks known as 'NTLM Relay' attacks, where Windows domain controllers are taken over by forcing them to authenticate against malicious servers. Despite Microsoft introducing new measures to defend against those attacks, like SMB security signing, attacks on NTLM authentication continue. For example, password hashes can still be snatched and used in "pass-the-hash" attacks, obtained in phishing attacks, or extracted directly from stolen Active Directory databases or a server's memory. The attackers can then crack the hashes to get a user's plaintext password. Apart from the weaker encryption used in NTLM, compared to more modern protocols like Kerberos, the protocol's performance is subpar, requiring more network round trips, and does not support single sign-on (SSO) technologies. All that said, NTLM is considered severely outdated by 2024 security and authentication standards, so Microsoft is deprecating it. NTLM phase-out process NTLM will still work in the next release of Windows Server and the next annual release of Windows. Still, users and application developers should transition to 'Negotiate,' which attempts to authenticate with Kerberos first and falls back to NTLM only when necessary. Microsoft recommends that system administrators utilize auditing tools to understand how NTLM is being used within their environment and identify all instances that need to be considered in formulating a transition plan. For most applications, replacing NTLM with Negotiate can be achieved by a one-line change in the 'AcquireCredentialsHandle' request to the Security Support Provider Interface (SSPI). However, there are exceptions where more extensive changes might be required. Negotiate has a built-in fallback to NTLM to mitigate compatibility issues during the transition period. Administrators stuck with authentication problems can check out Microsoft's Kerberos troubleshooting guide.
Daily Brief Summary
Microsoft has officially announced the deprecation of the NTLM authentication protocol in Windows, encouraging a shift to more secure alternatives like Kerberos and Negotiation.
NTLM, launched in 1993, has been vulnerable to cyberattacks, including NTLM Relay attacks where attackers force authentication against malicious servers.
Despite measures like SMB security signing to combat these vulnerabilities, NTLM's weaker encryption and lack of single sign-on support make it outdated by 2024 standards.
Microsoft emphasizes the transition to Negotiate, which prefers Kerberos and reverts to NTLC only if necessary, to enhance security and performance.
The company advises system administrators to use auditing tools to assess NTLM usage and develop a comprehensive transition strategy.
For most applications, migrating from NTLM to Negotiate requires minimal modification, potentially as simple as a one-line code change.
Microsoft provides resources such as a Kerberos troubleshooting guide to assist administrators during this transition period.