Why All The Hype About 0day? 85
nuthinbutspam writes "Michael Sutton has up an interesting post on the security vulnerabilities that we really need to be concerned about. According to Sutton, it's not the new ones that are scary, it's the old ones that have long since been forgotten. He illustrates his point by walking through an example where he uses Google and Yahoo! to identify 50 web servers that are wide open to attack. The list includes an ivy league school, various colleges and a company traded on the NYSE. Sobering stuff."
Re: (Score:1)
Re:slashdotted after 0 comments (Score:5, Funny)
Re: (Score:2)
Wow. You mean 51st?
Re: (Score:2, Funny)
Re: (Score:1)
Is this the Meta-Slashdot Affect that I've heard so much about?
Re: (Score:1)
All security is important (Score:5, Insightful)
Phrased slightly differently ... (Score:5, Insightful)
On the other hand, those of us who DO secure their systems ARE concerned. And rightfully so.
Re: (Score:2)
Re: (Score:1)
And curse the miscreants who are now mere irritants to those of us who do, many of whom are inside the castle walls.
Agreed. I've always assumed that "Pro" crackers (Score:3, Interesting)
Re: (Score:1, Interesting)
If I went around the day that Microsoft released the August patches I'd probably find that most if not all of the computers I was able to check were in fact *not* patched. Now, checking a few days later, or to cover those that wait a week or even a month I'd probably find a much larger number that are patched. I'd also probably find those pesky Ivy Leauge computer n
Re: (Score:2, Insightful)
Why the omnipresent need to analogize the most straightforward things? The world may never know.
Re: (Score:2)
Oh.... right...
Re:All security is important (Score:5, Funny)
Why the omnipresent need to analogize the most straightforward things? The world may never know.
Because a good analogy is like a diagonal frog.
Re: (Score:3, Funny)
That analogy is almost, but not quite, entirely unlike a diagonal frog.
Re: (Score:2)
A lot of people on Slashdot are computer people, and a lot of us, including me, have to (or just want to) explain technical computer concepts to non-technical people. Most of the concepts are, as you said, pretty fucking simple, but the jargon is very intimidating and counter-intuitive to non-techies.
So, I think there's a tendency for geeks to resort to metaphor as a way of making computer-speak more cute-n
Re:All security is important (Score:5, Insightful)
How is that surprising? Does he think that never does some department set up a small server for itself, then in a couple years, the person admining it leaves, and since the machine is still 'working', people continue to let it run/use-it. After a while, running with no admin, it gets way out of date on patches and is vulnerable to anybody. Happens all the time. And it's got absolutely nothing to do with an active and competent admin worrying about 0-day exploits on the boxes that they ARE taking care of.
Re: (Score:2, Insightful)
Re: (Score:3, Insightful)
I didn't say every machine was a 'junk' machine, but if you have any experience at Universities, you often will see departments 'doing their own thing' when it comes to departmental servers, where the IT department of the University is not involved in their administration at all other than supplying an IP-address/DNS. The IT department's 'security model' is usually for machines directly under their control. Not the computer
Found an alternate link (Score:1, Informative)
Re: (Score:1)
Wrong Perspective (Score:5, Insightful)
Michael Sutton has up an interesting post on the security vulnerabilities that we really need to be concerned about. According to Sutton, it's not the new ones that are scary, it's the old ones that have long since been forgotten.
The old ones may be the most worrying to people tracking security in general. They are not, however, the most worrying to those of us looking to secure our own networks, since we know how to stop them. It is a matter of control. I can patch and Firewall, and ACL away any old worms and detect them if they get through. I might be helpless, however, if a new, zero day worm hits.
Re: (Score:2)
Zero-day exploits also, after time, become old ones
Re: (Score:1)
Hint don't connect the network cable until you have finished all of your cds
Re:Wrong Perspective (Score:5, Insightful)
Re:Wrong Perspective (Score:5, Funny)
You're right. These days those uniformed users don't even need warrants.
Re: (Score:2)
Re: (Score:3, Funny)
Re:Wrong Perspective (Score:5, Funny)
Re: (Score:3, Insightful)
simple (Score:4, Funny)
Just wait and see how long it takes before it gets patched.
Re:simple (Score:4, Funny)
mod parent up (Score:1, Redundant)
If I had the points I'd do it myself. But I don't.
*sigh* (Score:3, Funny)
Please troll me up, I am aching for some negative karma.
You don't have to (Score:2)
Take your pick.
Re: (Score:3, Funny)
Security is simple (Score:4, Insightful)
That's why Step 2 of making a truly secure network is to assume "everything I have done so far is wrong and my server is slightly less airtight than a block of swiss cheese infested by cheese-eating termites".
Re:Security is simple (Score:5, Funny)
You just HAD to drag the French into this.
Re: (Score:2)
That just leaves step 1?
Re: (Score:2)
(Within reasonable limits based on cost and accessibility, of course.)
Re: (Score:2)
Whoa, slow down there. If I've learned anything from reading Slashdot, it's that step 3 is always "Profit!". Clearly, since your step 3 is NOT "Profit!", you've made some kind of mistake. Might want to look into that.
Ivy League school was Harvard (Score:4, Informative)
http://hcs.harvard.edu/~freeculture/wiki/index.ph
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
"Wow, I got slash-dotted! I must have done something awesome on the wiki!"
15 seconds later pulling up the story all the referrers show.
"Ah crap!"
Re: (Score:3, Interesting)
Any school that has an area where any student can put up arbitrary PHP code is going to have tons of sites with vulnerabilities.
It's not on an official school server, and presumably the hosting on such sites is set up with sufficiently tight permissions to prevent any serious damage from being done if people run arbitrary, crappy PHP code.
Nuff said on that vulner
Re: (Score:2)
Re: (Score:1)
We'll get it patched at some point, probably in a few weeks when school starts. Right now we can't patch it because we're running an ancient MySQL, and we can't patch that because we'll have to migrate all the databases, and we're too lazy to do that (plus, if it fucks up there
warez (Score:1, Funny)
"Zero day" is a marketing gimmick (Score:4, Insightful)
I have been in a meeting with a Microsoft security "expert" who seriously claimed that exploits are only be produced by reverse-engineering Microsoft's patches, and that the primary risk is that the time it takes to reverse-engineer a patch is decreasing. If that was really true, Microsoft could stop all exploits immediately by never releasing any more patches. The primary risk is that there's a flaw in the software, obviously, and the clock starts ticking the moment people start using the buggy software, not the moment Microsoft tells us to patch it.
However, admitting that Microsoft is REACTING to hackers rather than the other way around makes them look kinda dumb. Thus the "zero day" myth.
Re: (Score:1, Insightful)
Normally you have some lag in there... People hear there's a weakness in some piece of software, and it takes the black hats a few days to come up with a way to attack that weakness. In the mean time folks are scrambling to harden their systems against the coming attack...security companies and software vendors are (supposedly) working on a patch...
Re: (Score:1)
Our little secret (Score:2, Insightful)
There are many things that can keep you comfy, like daily updates and 24/7 monitoring of advisories, but the professionals do not always submit their findings. Security gurus submit holes as part of their work or to get their name known or to make a point..but many will stay in the dark. The really serious ones will always have their own unreported set of vulns in various platforms, 99% of the time these are buffer overflows at the kernel l
Damn! (Score:1, Funny)
Patch Rapidly (Score:1)
It's a fundamental problem of the "security biz" (Score:2, Interesting)
Think about it, how do you get famous in security? You break something. Further, a lot of
Back to the Future (Score:2)
The future's so bright, I gotta wear shades of Max Headroom [google.com].
Slashdotted (Score:1)
Re: (Score:1)
Now let's see a well written journal entry. (Score:3, Insightful)
Btw the NYSE company isn't even named it coudl be any entertainment company from Universal studios to a small IPO that is making a casual game for people that costs 2 dollars, as well as single computer on a lan. With no meantion of if these are "honey pots" which will get people's attention but it will actually have no access to the real network since it's segregated.
I think slash dot needs to stop posting "news that's not news" and start pointing "news that matters" again.
Setuid root and servers running under root (Score:2)
A lot of it is due to to poor configuration conventions that continue to this day. This involves running servers as root, and a system setuid root programs, such as X. I am quite perplexed that simple steps have not been taken to remedy these problems, such as by running X under its own user and only giving that user access to the video hardware that X needs to run.
Setuid root is a problem since if there is a vulnerability in a server