Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Security

Interview With Microsoft's Chief of Security 245

Paul Coe Clark III writes: "I interviewed Howard Schmidt, Microsoft's head of security, questioning him about, among other things, cyberterrorism and Redmond's responsibility for insecure features in the wake of many virus attacks. /. readers might find it interesting. They can find it here."
This discussion has been archived. No new comments can be posted.

Interview With Microsoft's Chief of Security

Comments Filter:
  • USA Patriot Act (Score:3, Informative)

    by pgrote ( 68235 ) on Wednesday December 19, 2001 @06:59PM (#2729126) Homepage
    The article references this. Here are a couple of URLS on it:

    Full Bill:
    http://www.politechbot.com/docs/usa.act.final.10 24 01.html

    EFF Analysis:
    http://www.eff.org/Privacy/Surveillance/Terroris m_ militias/20011031_eff_usa_patriot_analysis.html
  • by Howie ( 4244 ) <.howie. .at. .thingy.com.> on Wednesday December 19, 2001 @07:22PM (#2729245) Homepage Journal
    But there are also best-practice methods to avoid bugs in the first place during the coding stage. Software is not a manufacturing process where you can only test the end product. It's an engineering process which can have checks and balances all through development.



    Ironically, you can find a lot of good information about this in a Microsoft Press book: Writing Solid Code by Steve Maguire. As Maguire points out, leaving your bugfinding to the testers is folly.

  • Re:They're trying (Score:5, Informative)

    by (H)elix1 ( 231155 ) <slashdot.helix@nOSPaM.gmail.com> on Wednesday December 19, 2001 @08:12PM (#2729518) Homepage Journal
    Apparently MS realizes they made a wrong decision in their approach to security (trusting the sysadmin's dilligence), and they are making strong strides to change this now, and in the future.


    You think they are making strides to clean this up? Looks like patching the PR to me. Take a look at this...
    MS rolls out security obscurity bribe program [theregister.co.uk]

    [microsoft.com]
    Code of Conduct:
    Microsoft Gold Certified Security Solutions Partners are leaders in the security industry, not only in their products and solutions, but also in their standards of behavior. All Microsoft Gold Certified Security Solutions Partners shall follow a code of conduct regarding the responsible handling of security vulnerabilities. This code of conduct is intended to allow a product vendor to address any individual vulnerability and issue a patch, workaround or other response to the public. Microsoft Gold Certified Security Solutions Partners shall take reasonable steps to ensure that they do not publicly disclose details that would directly allow an outside party to develop or execute an attack exploiting the vulnerability.
  • Nail on the head. (Score:3, Informative)

    by Ungrounded Lightning ( 62228 ) on Wednesday December 19, 2001 @08:12PM (#2729522) Journal
    I think it doesn't make any difference whether it is open source or closed source, it's a matter of identifying them once the product is released.

    So...who cares if there are problems. We'll find them eventually - as soon as someone exploits them and we hear about it.


    Precicely.

    If you want bug-free code you need to start at the architecture/design process (avoiding bug-prone choices), then debug as you go. It's like growing a perfect crystal - you push the impurities out as it solidifies, so only the boundary needs attention. The longer you wait, the larger your search space for each bug, and the bigger the hive of ofspring each bug has produced as new code was added to buggy code.

    Security issues are a special case of "bugs", with more than the typical amount of effort needed at precoding stages to avoid building unfixable problems into the basic architecture.

    I wonder if they release their code like that for QA as well. It's a matter of identifying bugs once the product is released.

    My impression is that Schmidt is completely unaware that software QA, or any other pre-release potential for (securyty) bug suppression, exists. At a minimum his statement implies that Security as a department doesn't participate in architecture, design, code reviews, or QA, and that its leader either feels no need to do so, or is deliberately directing attention away from an inability to affect those stages.

    That the head of security for Microsoft could emit such an answer is appalling. But it also goes a long way toward explaining the security problems in Microsoft products.
  • by brinkster ( 523812 ) on Wednesday December 19, 2001 @08:14PM (#2729529)
    If you have been following this on bugtraq MS hasn't fixed the problem and it is still possible to hide the file. Click this link and a patched IE6 will tell you you're downloading a txt file but it's really an exe. http://kuperus.xs4all.nl/microsoft.txt [xs4all.nl]
  • by richj ( 85270 ) on Wednesday December 19, 2001 @08:37PM (#2729611)
    Microsoft is in the same boat. It won't be until the Blue Screen of Death is really, provably responsible for human fatalities (Think saftey control at a power plant, or a crash aboard a military vehicle of some kind) that Microsoft will start being more responsible about their security and program design.

    I find the USS Yorktown [sciam.com] still a pretty good example when people start thinking about using Windows in a mission-critical application.
  • by J. J. Ramsey ( 658 ) on Wednesday December 19, 2001 @10:20PM (#2729975) Homepage
    "My question regarding this issue is: how do you feel about this issue? Do you really think that not fully disclosing a vulnerability will prevent exploits to be made? One of the arguments for full disclosure is that sysadmins are able to reproduce the error so that they can test if their system is vulnerable, but with limited disclosure this will only be possible for a small (and probably malicious) public."

    How people *feel* about this issue is irrelevant. Full disclosure, for all its faults, has worked better than just telling the vendor or a select few. Generally what has happened when vulnerabilities were kept quiet was that the vendor sat on the problem or took care of it at its leisure, leaving systems open for crackers who could and did silently exploit the vulnerabilities. Full disclosure 1) lights a fire under the vendor so that it actually *does* something, and 2) allows others a chance to find ways of coping with the vulnerability until a fix comes.

    This is not theory; it has been shown to work in practice.
  • by john_uy ( 187459 ) on Wednesday December 19, 2001 @10:32PM (#2730030)
    As of Dec. 20, 2001, the total number of published security bulletins is only 58 compared to 100 in 2000 and 60 in 1999. This year, there are 4 cumulative patches so the actual number of published security threats is around 54.

    The last 3 security vulnerabilities for XP relate to IE, Windows Media, and USB plug and play feature.

    I should say that the products of Microsoft are just becoming mature right now. It is unfair for Linux and Unix since they I believe they have been ages before Microsoft introduced Windows. So it terms of maturity, Linux took years just as Microsoft is.

    Like in service packs, the Windows 3.51 had around 13 (or more if I remember correctly.) Windows NT4.0 had 6 (the 7th was not released officially.) Windows 2000 now has 2 (and they are releasing SP3 Q1 2002.) There is WindowsXP although there is no SP around (I believe it may be in the alpha stages.) The number of service packs that is released actually decreases due to the maturity of their products. And most people even some *nix guys say that WindowsXP is actually more stable than ever.

    It is also noteworthy to say that the base OS of Windows is getting more secure. It is just the apps integrated with the Internet that have most of the security threats like IE, Outlook, Office. For the servers in W2K, the services are the ones problematic and the user has the freedom to deactivate some and use an alternative. Like in Linux, the same thing applies where a server may use the services from different publishers.

    I am not saying that Microsoft is good or anything but I say that comparing Windows (PRO/HOME) and Linux/Unix is like comparing apples and oranges. They are built for different purpose thus designed differently.

    In the server arena, I think that it is only in Windows 2000 that they released their 1st server OS and not in Windows NT 4.0. Their Windows .NET server hopefully will do better than W2K servers.
  • by loopkin ( 267769 ) on Thursday December 20, 2001 @06:09AM (#2731091) Homepage
    Actually it's even worse.

    No need to discuss that point on bugtraq, everybody in the web industry knows about it.

    I found that bug (or feature, according to MS), months ago (even years maybe), when trying to generate on-the-fly pdfs as part of the web application i was working on. I think that almost any engineer or prgrammer working on web sites should know it. This is not a problem of security by obscurity, but a problem of unsecurity by stupidity (from MS).

    In fact, this is an argument to null the whole "security by obscurity" strategy. When every engineer or programmer knows about the bug, then there's no obscurity anymore. And with many of the security bugs found on MS OSes, it's what indeed happens, sooner or later. In fact, i think this is what happens with most software, not only MS', and that's why it's not responsible from them to use such a strategy.

Work is the crab grass in the lawn of life. -- Schulz

Working...