Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Security

Air Force Warns Microsoft/Others to Tighten Security 357

FattyBoeBatty wrote to us with a story from USA Today about the the Air Force and security concerns. The Microsoft point is the primary point of the article, but the AF CIO has also made the point at industry forums, and evidently with Cisco. Specific companies aside, I think it's a good thing that organizations are beignning to realize the exposure they have on security issues - and maybe will actually start to take steps to close them.
This discussion has been archived. No new comments can be posted.

Air Force Warns Microsoft/Others to Tighten Security

Comments Filter:
  • Nice to see... (Score:4, Interesting)

    by Pii ( 1955 ) <<gro.rebasthgil> <ta> <idej>> on Tuesday March 12, 2002 @01:20PM (#3150070) Journal
    You know, when a customer that has $6B dollars a year to spend on technology say jump, Microsoft had better damn well be asking "How High?"

    I'm kind of disappointed that the Air Force is using Exchange in the first place. I hope that when they realize that Microsoft is not ever going to be able to meet the somewhat unique requirements of the DoD (For them, lives do hang in the balance), that they are willing to take their business elsewhere.

  • by Pii ( 1955 ) <<gro.rebasthgil> <ta> <idej>> on Tuesday March 12, 2002 @01:26PM (#3150126) Journal
    Political pressure? Hogwash...

    The Air Force is waving it's $6 Billion annual budget at Microsoft, and saying to them that if their shoddy, unsecure software does not dramatically improve, these dollars will be going to your competitors.

    That's called "Economic Pressure," and in the free market, it's the single greatest motivator ever, and it always will be.

    To put it in democratic terms, the Air Force has issued fair warning that it intends to "vote with it's feet."

  • by BasharTeg ( 71923 ) on Tuesday March 12, 2002 @01:30PM (#3150177) Homepage
    Let's let free enterprise do its job. Political pressure has no role here. The private sector must remain free and independent so that it can provide the solutions that the marketplace wants.


    This is complete garbage. The government is a customer and a member of the marketplace too. Just as IBM, or DELL, or some other company who does business with Microsoft could put "pressure" on them, so can government agencies, who are customers also. The government harrassment, and Air Force's "threatening posture" are no different than two businesses exchanging fire over their differences. THIS is how free enterprise works. You are free to make a crappy product, but the Air Force is free to complain about it, demand that you fix it, slam you publicly about it, and threaten to take action, including switching to another product. You're forgetting the consumer side of "free enterprise."


    Besides, national security is a priority, and they have every right to demand security in the software that's trusted for that use. What happens when NASA buys a crappy booster rocket, and it falls apart? Are they not allowed to put political pressure on the company that produced it, because that would be a bother to free enterpise? Give me a break.

  • by rhizome ( 115711 ) on Tuesday March 12, 2002 @01:42PM (#3150282) Homepage Journal
    You probably have a different sense of "security" than Microsoft does. The edict from billg was only the first step in Microsoft's embracing and extending the public's perception of computer security. It's not that MS will re-engineer their software to meet security standards derived from decades of experience, because Microsoft has never done anything like that. The closest example to this process would be the focus on Internet Explorer throughout the late '90s, where MS made strides in browser engine design, but at the expense of standards and other browser companies. Microsoft has never played nice in the sandbox (only "concessions", like today's MSKerberos story from the EU), they simply use advertising and PR to redefine "security" as "that which Microsoft provides".
  • NSA Secure Linux (Score:4, Interesting)

    by PineHall ( 206441 ) on Tuesday March 12, 2002 @01:42PM (#3150286)
    Maybe the Air Force should look at NSA's secure Linux [nsa.gov]? It can install over Red Hat. (Is there a distribution out there that uses NSA's stuff?)
  • by gdyas ( 240438 ) on Tuesday March 12, 2002 @01:42PM (#3150287) Homepage

    Not about the Air Force or MS, but related.

    The Dep't of the Interior's networks & web sites are now just coming back up, after being shut down for over 2 months by court order due to an almost complete lack of security on the network that allowed virtually anyone with a port sniffer to get into the Indian Trust Database -- a terrible failure of their IT, and a wonderful example of how exposed & poorly run many government networks are. CNN has a short summary [cnn.com].

    The interesting story here is that my mom (a Nat'l Park Service employee) was recently given a service award for letting the accounting people go to her house & use her computer at home (which I set up, and is secure, running WinXP behind a Linksys BFSR41 routed switch w/ firewall) to install software to make payments to contractors, do office supply, etc.

    Interior deserved what they got & should have had their shit together, but the result was over 2 months of torture for almost every DoI employee. It's fearsome, though, that a firewalled home connection could be more secure than government and military networks. I dunno about the military, but Interior is apparently desperate for decent IT support.

  • by theinfobox ( 188897 ) on Tuesday March 12, 2002 @01:43PM (#3150291) Homepage Journal
    This "warning" to Microsoft makes me wonder if the Air Force will soon be recieving a letter from MS's Licensing Dept. about whether they have the "correct" number of Windows and Office licenses.

    And on a more serious note... A couple of posts have questioned why the AF uses MS products. When I was in the Air Force we were directed to convert our bases' Novell/cc:mail/Linux servers all over to MS products. The reason we were told was that they wanted a standard set of products used at all AF locations. This way, when you went from base to base, you would already be familiar with the software infrastructure. The reason MS was chosen was because it was easier to train people to learn the basics of Windows compared to the others. At the time, the Air Force was also learning that if they spent 4 years teaching someone to be a Linux/Solaris/etc guru, they would opt for a civilian job when their re-enlistment time came(i.e. they rather double or triple their salary and not have to worry about being sent to Bosnia).
  • Re:My Humble Opinion (Score:5, Interesting)

    by gmack ( 197796 ) <gmack@noSpAM.innerfire.net> on Tuesday March 12, 2002 @01:47PM (#3150326) Homepage Journal
    That is a complete load of crap. How many apache exploits have we seen in 2 years? How many in IIS? Apache runs 60% of web sites according to netcraft. Yet Apache has had few exploits.

    What really blows your theory apart is that in the past there have been smaller companies with worse records.

    MS' problem is that they never seem to consider the security implications when they start tossing on new features. Then when something does break they pass the blame. Or cry about getting more attention for being the leader.

    I find it rather sad that they clame to have a server that any monkey can set up and run but then when it breaks they blame the monkey.

    The problem does *not* end with the discovered exploit either. Exploits happen and they need to deal with them properly.

    This means:
    Not treating exploits as a PR problem.
    Not rolling bug fixes into feature upgrades.
    Not having other software accidentally remove fixes.

  • by jfonseca ( 203760 ) on Tuesday March 12, 2002 @02:03PM (#3150501)
    Microsoft's sense of security is not only different from mine, it is different from reality. Like a PhD thesis, these types of things are only proven in practice, and practice shows, time and time again, that their approach to software construction is insecure.

    And still some admire them for releasing timely patches. Well if were Microsoft I'd thank the white hats for warning them of a security flaw weeks before the public.

    I agree with you. Their view of security is a marketed approach to security. Just read what Bruce Schneier has to say [counterpane.com] about Microsoft's "sense".

    Still on the practical side of things, not going into OS wars, just subscribe to bugtraq and do a little statistics on daily microsoft bugs and holes discovered. I find it amazing that anyone out there on mission critical environments, specifically official government and defense agencies, are still using this stuff.

    I apologize if I am offending some Microsoft fans out there but to me Microsoft security, reliability and credibility have ceased to exist long ago.
  • by PHAEDRU5 ( 213667 ) <instascreedNO@SPAMgmail.com> on Tuesday March 12, 2002 @02:05PM (#3150518) Homepage
    When I was stationed at Langley I was part of a team that implemented the first version of what's now called CTAPS.

    One part of the project was to take an existing application, Combat Airspace Deconfliction System (CADS), written in Modula 3 on a PC and re-implement it in C/GKS on a MicroVAX III running Ultrix.

    A couple of months after the re-implementation, my team got a call from an Army guy looking to use CADS. We asked him if he wanted to buy a MicroVAX III and learn how to use UNIX. Answer: No. He got the TEMPEST Z-150/Modula 3 version, as did a lot of other people.

    The reason Microsoft has gotten around is that it offered a reasonably simple-to-use product on a reasonably cheap hardware platform. Things may have changed since then, but there is a reason Microsoft is everywhere, and it's not all to do with a lack of military intelligence.
  • Air force warns MS (Score:1, Interesting)

    by Anonymous Coward on Tuesday March 12, 2002 @02:05PM (#3150521)
    I don't know why the Gov't just doesn't teach them a hard lesson and start switching to Linux. I think it's frightening to think the Gov't relies so heavily on a closed OS with a very poor track record on security. Instead of telling MS "Please, make your software more secure" and then wait a few years for that more secure OS when they can have it now and many other benefits by using linux for instance.
  • by BLAMM! ( 301082 ) <<ralamm> <at> <gmail.com>> on Tuesday March 12, 2002 @02:06PM (#3150530)
    Tis true. But the sad fact is that the AF has a terrible time holding onto the technically savvy people needed to make this happen. Once trained, they get out to make 2 or 3 times the money in the civilian world. I know I was one of them.

    Speaking from experience, the typical geek simply isn't cut out for the military life. And to make matters worse, advancing in the military means spending more time being a pointy-haired boss and less time being a geek. That's the way it is.

    I'd love to see linux adopted by the AF, but 1) I've had the suggestion shot down too many times myself to expect it to actually happen and 2) they will have a tough time gathering the experience to do it.
  • Re:My Humble Opinion (Score:4, Interesting)

    by sphealey ( 2855 ) on Tuesday March 12, 2002 @02:14PM (#3150594)
    In my humble opinion, the only reason all the security holes are being found in Microsoft's software, is by virtue of the fact that it is, like it or not, running the majority of the world's computers, something like 95%. I am sure that if any other OS was as widely used, more breaches would be found
    How long have you been involved with information technology? Do you remember the days when computer systems actually worked according to specification? And when their suppliers could understand and fix things that were broken? To pick a very recent example, were you around when Microsoft marketing and monopoly clout started pushing Netware out of the NOS arena, despite the fact that Microsoft's offering had 20% of the features and 5% of the stability of Netware? Have you ever compared MS Active Directory to Novell eDirectory on a point-by-point basis, including features, managability, and stability?

    sPh

  • by praedor ( 218403 ) on Tuesday March 12, 2002 @02:16PM (#3150607) Homepage

    Yeah, keep parroting this...then you should mention that at the same time the vulnerability was announced, a fix was available: download zlib-1.1.4. Sheesh. You NEVER get this responsiveness from M$. Also, the vulnerability wasn't a root exploit, you couldn't trash a system with it, couldn't use it to gain root.

  • by Amazing Quantum Man ( 458715 ) on Tuesday March 12, 2002 @02:37PM (#3150799) Homepage
    Dude, remember that the DoD has a rather different idea of "Secure" than the average website (.com OR .gov).

    When they say "secure", they're talking Orange Book. They're talking about lives in the balance. "Secure" means, "If you fucked up, somebody died."
  • by ftobin ( 48814 ) on Tuesday March 12, 2002 @06:19PM (#3152604) Homepage

    First of all, if you were a smart unix user, you would not be using Sendmail. You talk about 'understanding', but do not understand that you have a nice choice of alternatives that are much more proactively secure than Sendmail, such as Postfix or Qmail. Same goes for Bind (we have djbdns and such). What do you get from Microsoft? Their one product. Big choice there.

    I do so fully well how and why things work. That's why I say to choose free unixes. They are not blackboxes. You can easily poke in, and figure out what's wrong. You can fix the problems yourself, even more proactively than your proprietary provider. All this and more you cannot do with proprietary, closed products.

    Furthermore, you aren't being proactive by simply applying vendor-supplied patches when they say to; that's reactive. Being proactive means learning how your software security works, especially internally, and performing appropriate actions.

It is easier to write an incorrect program than understand a correct one.

Working...