Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Security Bug Operating Systems Software Windows

Sasser Worm Takes Down UK's Coastguard 733

jonman_d writes "The Sasser worm has recently disabled the computer systems of Britain's Coastguard. Naturally, this event raises even more doubts over the reliability of Microsoft software in critical systems. Moreover, it raises questions of responsibility: if the worm writer is caught, can he be held at least partially responsible for any deaths that occured during this outage?"
This discussion has been archived. No new comments can be posted.

Sasser Worm Takes Down UK's Coastguard

Comments Filter:
  • He should be (Score:5, Insightful)

    by Heartz ( 562803 ) on Wednesday May 05, 2004 @05:32AM (#9061354) Homepage
    We must come down hard on these individuals. Virus/Worm writters write code with malicious intentions.

    It wouldn't be murder per say, but definitely manslaughter. If they catch the guy, I hope the full force of the law comes down on him.

  • by Interruach ( 680347 ) on Wednesday May 05, 2004 @05:34AM (#9061361) Journal
    Is Microsoft Software actually certified for safety critical systems? I thought it was not warranted for that use.
    However, it's not just the software at fault. Whoever implemented the system was sharing a network with other people's machines in some way, without a firewall. There is fault spread out here, between microsoft, the lifegaurds IT people, and the virus writer.
  • by rudy_wayne ( 414635 ) on Wednesday May 05, 2004 @05:34AM (#9061363)

    Why did the the UK Coastguard allow this to happen? The Sasser worm is 100% preventable if your system is properly patched and firewalled.

  • Re:He should be (Score:5, Insightful)

    by rokzy ( 687636 ) on Wednesday May 05, 2004 @05:35AM (#9061369)
    but also some responsibility on the retards who didn't get a secure system - MS is officially unsuitable for this sort of thing.

    if the virus writer is the "terrorist" then the coast guard admin is the idiot who ignored the "we're coming to bomb $building at $time on $day in a $colour van with registration $reg" message.
  • Hmmmm (Score:3, Insightful)

    by Professeur Shadoko ( 230027 ) on Wednesday May 05, 2004 @05:37AM (#9061376)
    I would rather blame the lazy sysadmin who spent his time surfing for pr0n instead of running windows update and setting the firewall up.
  • Methinks. (Score:2, Insightful)

    by haxor.dk ( 463614 ) on Wednesday May 05, 2004 @05:38AM (#9061381) Homepage
    "if the worm writer is caught, can he be held at least partially responsible for any deaths that occured during this outage?"

    Replace "outage" with "outrage".

    There is no way in hell an important insitution should put up with shit like this. If any arbitrary piece of code that gets sent around could bring my companys systems (as often as it is the case about WIndows XXX) to its knees I'd start seeing red about what the software manufacturer was spending its time on.

    And choose a different supplier.
  • by upside ( 574799 ) on Wednesday May 05, 2004 @05:38AM (#9061382) Journal
    My thoughts exactly. Back here in Finland a bank had to close shop in the entire country for a day because of Sasser. Instead of being worried about how they didn't update their systems I'm more worried why MS is being used on mission critical systems like banks and the coast guard.
  • It's not just Linux that forms a good alternative to Windows. OPenBSD was built to be a secure OS. Where lives are involved, there is good reason to go the extra mile to use an OS which, though less convenient, has proven to be more reliable. In the current era, with all these worms, Microsoft just isn't the best alternative. On the other hand, all they needed to do was use http://windowsupdate.microsoft.com and enable Windows' built-in firewall software. Worm and Virus writers should be made to know that they are accountable when their creations do what they were (mis)designed to do "take over systems, disable them, disrupt networks?" How do you actually catch the original author of a worm, anyway?
  • by Anonymous Coward on Wednesday May 05, 2004 @05:39AM (#9061387)
    The real question is why does Microsoft ship their systems with services listening on public ports?

    MacOS X ships with *0* ports open.
  • Just generally ... (Score:5, Insightful)

    by Quixotic Raindrop ( 443129 ) on Wednesday May 05, 2004 @05:40AM (#9061392) Journal
    ... no. To be guilty of any kind of homicide or manslaughter, your act has to have been the proximate cause [freeadvice.com] of a person's death. The writer(s) of the Sasser worm might have prevented the Coast Guard from rescuing someone in danger, but the fact that that person was in danger in the first place was not the fault of the virus writer, which would prevent even an involuntary manslaughter charge. Unless the worm caused, say, a malfuntion in the boat's bilge system, which caused the boat to take on too much water and capsize ...

    With that, are they off the hook? No way. If they are caught, there are lots of laws they could be charged with, some of which are felonies. Murder, or even manslaughter, are not among them, however. At least, not under this limited hypothetical.
  • by Anonymous Coward on Wednesday May 05, 2004 @05:40AM (#9061393)
    Microsoft provided a patch that prevents this. If you insist on holding them responsible for this, then the OpenBSD folks are responsible for anyone who (against recommendations) uses a version with the remote root exploit in it.
  • Sasser FUn! (Score:5, Insightful)

    by ender81b ( 520454 ) <wdinger@@@gmail...com> on Wednesday May 05, 2004 @05:42AM (#9061397) Homepage Journal
    Working tech desk during Sasser outbreak is fun lemme tell you. God save microsoft if they actually were responsible for tech support costs during this thing.

    I figure i've taken 40 some Sasser Calls. Each call takes about 7-10 minutes to clean it off and all that. So you figure, 320 minutes or 4 hours of my time. That comes to costing my company something like $40 odd dollars. Now multiply that 40 some by the thounsands of techs just like me who have to do the same thing.

    I almost can't blame the customers for doing this. Ever try just updating windows xp over broadband? Takes forever. Now try pulling down 50 some megs of critical updates over a freaking dialup modem. Remember - not a *single* major PC manufacturer I know of installs ANY critical updates on their home pc's they sell to the end user. Nothing. Nada. Dell, HP, Compaq, etc. I've ranted about how irresponsible and stupid this is before and i'll continue to do so now :). I've had two people call recently who - literally - just bought a brand new computer from the local best buy, plugged it into the internet and with 5 minutes got either Sasser or Blaster.

    I dearly, sincerly wish that Microsoft would actually build not only a real firewall into their products or/and shut off unneeded services to the internet. I also wish manufactures would actually ship their machines with all the critical updates installed. I also want a pony.

    This outbreak isn't as bad as blaster was but still. I'm no MS hater, I understand their product code base is massive and keeping track of all that and bug fixes takes an enormous amount of money and time but they *seriously* need to work on security. I would estimate virus cleanup and spyware sucks up 10-15% of my time at work.
  • by tarunthegreat2 ( 761545 ) on Wednesday May 05, 2004 @05:42AM (#9061400)
    can he be held at least partially responsible for any deaths that occurred during this outage?

    That's an interesting point, which my college CS prof demonstrated to good effect. He asked the class one day - "How many of u expect your cars to be engineered such that they will run safely and properly 99.9% of the time?" Everbody's hand's go up. "How many of u think that if there is a life-threatening fault in the car, the engineers responsible for building it should be held accountable?" Everbody's hand goes, up, along with a few grunts of "DUH!". Then the next question: "How many of you feel that if mission-critical software, like the stuff that runs airplanes, fails, the programmers should be held accountable too?" Silence.... granted writing code ain't quite like building a car, but he got his point across. He wanted to bring home the fact that most software comes with the rider that it won't just one-day break. This applies to non-M$ as much as M$, though with a lot less frequency....
  • by jeffs72 ( 711141 ) on Wednesday May 05, 2004 @05:42AM (#9061401) Homepage Journal
    Why is it Microsofts fault? If it were Linux systems that hadn't been properly secured, weren't behind a firewall, and weren't patched properly, would we try to place some responsibility on college student / developer number #34875897 and #09875872 and demi-god Linus?

    Naturally, this event raises even more doubts over the reliability of Microsoft software in critical systems. Does it? Maybe it should raise some doubts over hiring admins that don't understand a firewall is important, can't figure out how to implement Microsoft SUS in their environment to auto-apply patches, can't properly secure their machines, etc.

  • by Peter Cooper ( 660482 ) on Wednesday May 05, 2004 @05:43AM (#9061410) Homepage Journal
    How hard is it to have a BSD or Linux box acting as an el-cheapo firewall between the Internet and your internal network? I have a $200 laptop which has done just that task for several years now. I can never be bothered to patch my (Windows) machines, but they never have trouble because they can only talk within each other and not get attacked from the outside. Jeez, even if you paid someone to install it, you could have the whole job done for $1000 with old hardware and a copy of FreeBSD.

    I offer one reason why this doesn't happen too often, particularly in the UK. Way too many 'technical consultancies' for institutions like the coastguard are staffed by MCSEs with no proper computer science knowledge who just install Windows XP on every machine, set up 'Internet Connection Sharing', and leave. They wouldn't even dream of putting a non-Windows box on a network!

    Thankfully these worms and virus attacks are showing up these idiotic 'we only touch Microsoft stuff' agencies for what they're worth. Any decent technical consultant should be able to advise companies on the right hardware and software to use, independent of vendors.. so it might be Microsoft on the client end, and UNIX on the back end.. but no, the UK (at least) is filled with MCSE ridden agencies who get totally lost when they don't have a 'Start' button to click.
  • a reminder... (Score:2, Insightful)

    by ptolemu ( 322917 ) <(ac.retsamcm) (ta) (myetap)> on Wednesday May 05, 2004 @05:45AM (#9061418) Homepage Journal
    that the more we depend on technology the more important it is to realize this dependence and the implications of trusting it blindly
  • by Anonymous Coward on Wednesday May 05, 2004 @05:46AM (#9061423)
    if it wouldn't require you to reboot the OS after installing a secturity patch.

    so in that scenario there would be NO excuses for having the system outdated.
  • Devil's advocate (Score:5, Insightful)

    by pleitner ( 95644 ) on Wednesday May 05, 2004 @05:46AM (#9061424)
    While I fully agree that the authors of virus/worms etc must be held accountable for their actions, surely there are other parties that are also liable for any issues that arrise from a virus/worm infestation.

    The obvious one is the good old Microsoft. This has been beaten to death so many times that I am not going to delve into it...

    The other group to consider is the people who have been infected. They have partially brought any problems upon themselves. This happens because of many things including the choice they made to run the system was vulnerable, the choice to not patch promptly (if a patch was available), the choice to not better secure their critical systems, etc.

    Blaming the virus/worm authors and the author of the vulnerable software is easy (and absolutely right), but people really need to start looking beyond that and realise that it is really their decisions that are the core issue. If you don't want to be vulnerable to Windows virii/worms then don't run Windows. If you need to run Windows, secure it. If is a critical app, pay some serious attention to it...

    Basically, I am advocating a bit of responsibility for ones own destiny...
  • by Flingles ( 698457 ) on Wednesday May 05, 2004 @05:47AM (#9061429) Journal
    Does that mean if I leave my bicycle unchained, and a person takes advantage of the situation it's my fault? I say anyone who creates a virus solely for the destruction of private property should not only be partially responsible but fully, for all setbacks caused. The worst thing that could happen to microsoft is a case of false advertising, if they specifically said it is more secure than this. Otherwise, no one forced you to buy windows.
  • by baadfood ( 690464 ) on Wednesday May 05, 2004 @05:48AM (#9061432)
    Seriously, whoever was responsible for designing and implementing the system the coast guard uses is at fault. I can't belive that people who put together systems that perform life critical functions cannot be held liable for the choices they make - I dont think the OS choice is relevent. Its the setting up of a system that is exposed to the internet. Systems on which peoplses lives depend have no business being connected to unsecure systems - they should be dealing ONLY with the data needed to perform their task.
  • by ForestGrump ( 644805 ) on Wednesday May 05, 2004 @05:50AM (#9061444) Homepage Journal
    But 5 years from now, when eveyrone gets used to using a GPS and some fancy mapping program, what then?

    Paper? what paper? oh! ePaper!
    nope, our laptop got the virus last night. Sorry, WE CAN'T RESCUE YOU UNTIL WE GET OUR LAPTOP FIXED!

    Boy, im not optimistic tonight.
    -Grump
  • Re:Methinks. (Score:2, Insightful)

    by upside ( 574799 ) on Wednesday May 05, 2004 @05:51AM (#9061445) Journal
    Yup, a new supplier and a contract that stipulates a certain level of service. I'm also surprised why critical systems are linked to the Internet.
  • by eclectro ( 227083 ) on Wednesday May 05, 2004 @05:51AM (#9061447)
    Like no system except a Microsoft system has ever gone down. The first f---- worm ever written was for Unix, nerds.

    I think that there is a difference between going down occasionally and going down every week.

    BTW, that is Mr. Nerd to you.
  • by dexterpexter ( 733748 ) on Wednesday May 05, 2004 @05:52AM (#9061449) Journal
    In addition, I was fairly sure that there was a limited liability policy on software that limited damages that could be recovered from death or other injuries caused by software (this includes both the Microsoft product, since people have mentioned their potential liability, and the virus itself, if you want to extend the definition of software to viruses) to the price of the CD. In this case, since it was a virus propagating, then the price of the CD is nothing, which would limit the liability of the virus writer to nothing. I know that this is true of the United States; I am not sure about the U.K., however.

    On the other hand, one could take the Patriot Act into consideration, at least in the U.S. If it were shown that the attack was intentional to take down the system of rescue personnel, this could consider an act of terror and thus the virus writers could be tried as terroritsts.

    We must also consider the administrator who did not patch the system. He might not be legally held responsible, but I am sure that his bosses will see this another way.

    In the U.S., the virus writers probably wouldn't be prosecuted for software-caused manslaughter (because of the limited liability thing), but they would still get charged with felonies, as you pointed out.

    The U.K, on the other hand... that is something different entirely.

    The question is, if the Virus Writers themselves even came from the U.K.
    Wouldn't they be prosecuted under their country's laws unless expediated? Which, since we don't know who they are, this question shall remain unanswered.
  • by Bender Unit 22 ( 216955 ) on Wednesday May 05, 2004 @05:52AM (#9061451) Journal
    and some clause in the Patriot Act
    doesn't everything? seems to me that it get stretched more than a rubber band.
  • by Alioth ( 221270 ) <no@spam> on Wednesday May 05, 2004 @05:53AM (#9061455) Journal
    Windows is a consumer operating system (despite labels like Windows XP Professional). It has no business being installed on any critical system. This just goes to demonstrate further that you can't cut corners and make false economies by installing consumer operating systems where they are not appropriate.
  • by ColaMan ( 37550 ) on Wednesday May 05, 2004 @05:54AM (#9061457) Journal
    It depends on how you look at it:

    The computer mapping system (I presume) is easier to use than the paper maps. So if someone's missing and it takes (say) an extra 5 minutes to get the map out, plot drifts and currents and say "we'll search here", and the searchplane passes overhead 4 minutes after the boat has sunk without trace... is this still safety critical? If an extra life could have been saved if you had the computer system up?
  • by sholden ( 12227 ) on Wednesday May 05, 2004 @05:57AM (#9061470) Homepage
    Firewalls aren't enough.

    Someone always manages to bring an infected laptop inside the firewall.

    Those 'technical consultancies' need to include keeping the systems patched in that TCO they love to rant about so much.
  • by HolyCoitus ( 658601 ) on Wednesday May 05, 2004 @05:57AM (#9061472)
    I do sue Ford though if they later tell me that I also needed to buy doors to my car (firewall) and that the car had a mechanism to allow anyone with the proper knowledge to cause damage to it without even being near it (antivirus).

    This isn't a car. Not only do they not give you the full package, they can force the vendors with a license into not giving it to you as well.

    "You can't package that, it's against our license."
  • Re:He should be (Score:4, Insightful)

    by Anonymous Coward on Wednesday May 05, 2004 @06:00AM (#9061495)
    if the virus writer is the "terrorist" then the coast guard admin is the idiot who ignored the "we're coming to bomb $building at $time on $day in a $colour van with registration $reg" message.

    Don't forget the 'oh, and please leave the gate open or we'll have to go somewhere else'.

    Yes, it is partially Microsoft to blame as well - which twit thought it would be a good idea to have ports open by default with services listening to whatever crap other computers might send? You really have to trust your programming to allow something like that. If it's not actually necessary, why do it?
  • by m_dob ( 639585 ) on Wednesday May 05, 2004 @06:02AM (#9061511) Homepage
    Bad analogy. If Ford find a critical fault, they recall the product. How many critical faults have MS found in XP so far?
  • by thesp ( 307649 ) on Wednesday May 05, 2004 @06:02AM (#9061512)
    The one consistent question that keeps being raised in my mind whenever I hear about mission critical systems being brought down by worms/viruses is: Why were these systems ever connected to the wider world in the first place? Mapping systems? Baggage loading computers? Surely these don't need to talk outside anything but a single discrete group of computers. My fear is that people tend to put web browsers, email clients etc on any system these days, for convenience, which is quite bad for security. Here in my office we have two networks, with two machines on the desk (on a KVM switch), one for external email, internet etc, and one for internal work (it's called COREnet). We've had problems with the former, but the critical, internal stuff has gone on quite happily on the latter, untroubled by worms. Oh, and software patches and antivirus are available centrally on COREnet, so the boxes on the internal network aren't just left to chance should something come on via zipdisk/cd. And our company rolls on....
  • by Anonymous Coward on Wednesday May 05, 2004 @06:04AM (#9061523)
    The simple fact is that these limitied liability clauses in licenses aren't worth a damn. If this is something actually written in law in the US then your country is even more screwed up than anyone though.
  • Re:He should be (Score:5, Insightful)

    by dexterpexter ( 733748 ) on Wednesday May 05, 2004 @06:06AM (#9061533) Journal
    You see, I disagree. I see this another way: If this were a car company, security would be an issue that wouldn't even be feigned with interest from the court system.

    Operating systems are designed to be just that...an operating system. No matter how secure they make it, there will be some dirty virus writer out there that shatters that security. Now, I think it is good business practice for software companies to protect the best that they can against hackers, scripts, viruses, etc. However, that really isn't the business they are in... security. The deplorable human state has forced them into this position, but I pose the question: is it fair?

    I mean, back to your car reference: If you drove through a bad neighborhood and a guy runs out, beats your window in with a baseball bat, and steals your backback, is the car company responsible for not making unbreakable windows? (pun intended) This would probably be laughed out of court, so I don't see how we can really blame the Operating System companies for a lack of security when all they are selling is an operating system.

    Now, again, I think that they should secure it to the best of their ability... and that some of the security holes I have seen are ridiculous. And, if they tout complete security as a feature, then they are taking on that part of the business.
    But, and correct me if I am wrong, I don't think most companies advertise 100% security anymore for this very reason. Because that is just a pipedream.

    If someone breaks into my house, I am not suing the person who built my house. I am buying a security system (firewall) and using it. However, I assume that this isn't 100% effective, either.

    Just I thought. I could be wrong.
  • Morons! (Score:5, Insightful)

    by Pan T. Hose ( 707794 ) on Wednesday May 05, 2004 @06:07AM (#9061537) Homepage Journal

    From the article [independent.co.uk]:

    The Sasser worm, which exploits a flaw in Microsoft's Windows software, disrupted work at the Marine and Coastguard Agency, forcing staff to use pencil and paper to find ships and locate distress calls on maps. [...]

    Anyone with an infected machine should visit Microsoft's website to download a software "patch" to fix their system.

    No! Anyone with an infected machine should stop visiting Microsoft's website and never use Windows in such a critical environment as the Marine and Coastguard Agency for God's sake!

  • Wrong (Score:3, Insightful)

    by mericet ( 550554 ) on Wednesday May 05, 2004 @06:07AM (#9061538) Homepage
    IANAL, but:
    Limited liability exists only when the software was voluntarily and knowingly installed (e.g. after reading a EULA and clicking OK). So you can expect full liabilty (both criminal and civil). In many jurisdications, if a virus directly caused a death they could be charged with murder.

    The admin is guilty of negligence, again both criminal (only in the case of gross negligence, which could be failing to patch a critical system), and civil (although as an employee, this usually only means losing his/her job), the employer will probably be liable to (probably civil cases only though).

  • by Anonymous Coward on Wednesday May 05, 2004 @06:13AM (#9061564)
    There is a hole in your house, some kid comes, pees through the hole, which causes a short-circuit and destroys your house.

    Be a man, don't send the kid to jail. He didn't destroy your house with a bulldoser, he just peed in a hole. Admit that your house was fragile, and blame *yourself* for it.
  • Re:He should be (Score:2, Insightful)

    by next1 ( 742094 ) on Wednesday May 05, 2004 @06:14AM (#9061566) Journal
    in the case of cars, one that comes to mind is the SUV rollover thing in the US a while back, but as i recall in that case they knew that the SUVs had that problem and intentionally released the vehicles anyway.

    i really don't think ms has ever deliberately released a product that they themselves know will be exploited, so this is not intentional on their part and therefore i don't think you can say they are allowing it to happen.

    negligence maybe but that would probably be difficult to prove.

    also, they are fixing the problems, maybe not fast but they are doing it.

    i would say if anything the coastguard holds more responsibility for using an unsuitable OS and software for the job. them and of course the virus writers.
  • Re:Bad Admins (Score:5, Insightful)

    by pe1chl ( 90186 ) on Wednesday May 05, 2004 @06:15AM (#9061570)
    You assume that an admin knows everything, and has infinite time on his hands.

    In reality, companies have selected Windows after being told that its administration is much easier than for competing systems. Admins only need to know which buttons to click to setup a new system. In-depth knowledge about the underlying principles is often not available, with the excuse that it was supposed to be unneccessary.

    In the end, it may be better to install a system that is a bit more difficult to administer, and thus avoid the administration by unqualified personnel.
  • Re:Sasser FUn! (Score:3, Insightful)

    by Zocalo ( 252965 ) on Wednesday May 05, 2004 @06:15AM (#9061577) Homepage
    I figure i've taken 40 some Sasser Calls. Each call takes about 7-10 minutes to clean it off and all that. So you figure, 320 minutes or 4 hours of my time. That comes to costing my company something like $40 odd dollars. Now multiply that 40 some by the thounsands of techs just like me who have to do the same thing.

    Or try this: According to Microsoft 1.5m users downloaded the cleanup tool via Windows Update. This does not include users that cleaned off their systems via a third party tool from an AV vendor of course. At 10min/infection that's 15m wasted minutes or about 28 *years* of people's time wasted - and that's probably a conservative estimate. Tell me again why the current sentencing guidelines for computer crimes are too harsh...

  • by zakezuke ( 229119 ) on Wednesday May 05, 2004 @06:16AM (#9061583)
    Why did the the UK Coastguard allow this to happen? The Sasser worm is 100% preventable if your system is properly patched and firewalled.

    If their Coastguard's mentality is anything their American counterpart's I can think of a damn good reason why this happened. *Support contracts*. Legendary documents written in stone that require that a specific agency do all maintance and repair of their PCs. Dispite the fact that the operator is more then able to click on the reccomended patches, doing so could get you into alot of trouble. Your not going to trust your military's computer system to enlisted folk, and chances are the officers are not aware of preventive measures. Those who are assign such tasks to contract companies.

    Taking these matters on your self opens you up to a whole bunch of no fun, such as the military justice system. So one learns it's not their job... nothing will ever get done about it... and hope one's tour of duty is up reall soon before you go insane.
  • by jpop32 ( 596022 ) on Wednesday May 05, 2004 @06:18AM (#9061587)
    Microsoft has to take part of the responsibility and offer to send consultants out for free to patch and fix the servers.

    Or, even better, ship Windows with a piece of software that does that automatically? Oh, wait, they already do that...

    It needs to be said again: YOUR COMPUTER IS YOUR RESPONSIBILITY! The patch for this one was available for some time (a month or so). You can't pin this one on Microsoft any more than you can blame the car manufacturer for car breakdown after you missed your scheduled service.

    Isn't it about time to start introducing fines for people who propagate worms and viruses? Yes, fines for getting your machine infected. It's illegal to drive a malfunctioning car, why should it be legal to operate a malfunctioning computer? Both are a danger to the public.
  • Re:He should be (Score:3, Insightful)

    by shrykk ( 747039 ) on Wednesday May 05, 2004 @06:27AM (#9061624)
    If your gun exploded in your hand you'd sue the manufacturer.

    It's not so simple as 'microsoft is accessory to manslaughter' though. I'm sure the Microsoft EULA says it's not for use in safety-critical applications. People need to "vote with their feet" and switch to other products if they want secure systems, then MS may address the problem.
  • by sotonboy ( 753502 ) on Wednesday May 05, 2004 @06:28AM (#9061631)
    Unfortunately, there is one more option. That is the cost of maintaining windows systems. Believe it or not, there are people out ther (my self included) who dont have broadband. Please try keeping a windows install up to date over dial-up. It cant be done. Once a month I unplug my machine and take it to a friends house to update it. For people like myself (who exist in our millions) windows cannot be kept up to date, and Gates denys that we exist. If microsoft were really taking security seriously, then all patches would be included weekly on magazine cover discs. And ISO images would be downloadable from msupdate so that we could download elsewhere. Unfortunately this is not the case and there is _NO_ good reason for it. Cost is zero to ms.
  • by nuggz ( 69912 ) on Wednesday May 05, 2004 @06:33AM (#9061648) Homepage
    Why would it be wrong to promote your product now?

    This is the right time to promote it, and the positive aspects compared to the current solution. You will likely have an easier time trying to point out some of the flaws with their current situation.
  • Re:He should be (Score:2, Insightful)

    by bnet41 ( 591930 ) * on Wednesday May 05, 2004 @06:34AM (#9061655)
    if the gun exploded in someones hand then that would be a result of a defect, and something that is not caused by a malicious user. Slam Microsoft all you want, nothing wrong with that, but realize this specific incident would not have happened with out a malicious user.
  • we should be (Score:5, Insightful)

    by poptones ( 653660 ) on Wednesday May 05, 2004 @06:34AM (#9061656) Journal
    Yup, it comes down to everyone. It's easy to say "MS sucks, look at this proof" but the fact is MANY systems are vulnerable to malicious intent and the free solutions escape much of this attention simply because fewer people seem to be - for now - writing exploits.

    A solution to this problem has been around for weeks now, yet one or more of these system were left unpatched. So yeah, the virus writer surely bears some responsibility, but then again so does the coast guard. And even if an MS OS did not exist at all and these folks had been running linux, if there were a similar exploit floating around in the wild would the admins who left this door open have fared any better then?

    You can't hold MS responsible for the incompetence of the coast guard admins. Yeah, their software had an exploit - but they also had a solution available and it's not like this was any kind of secret. I hate to be this trite, but it's appropo here to remind everyone what "mama" always said: stupid is as stupid does...

  • Re:He should be (Score:5, Insightful)

    by cherokee158 ( 701472 ) on Wednesday May 05, 2004 @06:49AM (#9061713)
    I completely agree. If some moron breaks a window, you don't blame the windowmaker.

    Sadly, though, people still insist upon hounding the easy target. Look at the plight of the tobacco companies. I smoked for ten years, and let me tell you: I never met a smoker who did not know that smoking was bad for them, even potentially fatal. Unfortunately, once they've succumbed to the big C, their survivinng heirs go nuts and sue everyone remotely connected with their deaths.

    This is true in aviation, too...half the price of a new plane just covers the manufacturer's liability insurance. Surviving heirs seem to insist upon driving another nail into their dead spouses' favorite hobby whenever the poor slob augers in.

    How the gun companies have managed to, ahem, dodge the bullet in this regard so long is beyond me.

    Anyway, I think it's obvious that you cannot have a completely secure OS unless you bury it in a box somewhere and don't let it talk to anybody. Fat lot of good it would do anyone then.

    String the little vandals up, they deserve it. I think most of these little punks do it for the power trip, anyway (Dude, we shut down the Eastern Seaboard power grid, huh, huh). Let them have a little taste of the responsibility that comes with power.

    Maybe we could lock them in a little room with a bunch of REAL worms...
  • Sue Microsoft (Score:1, Insightful)

    by Anonymous Coward on Wednesday May 05, 2004 @06:58AM (#9061746)

    They have more cash to settle this than the virus writer. Obviously they do not want to have this kind of "using Microsoft products kills innocent people" cases fight out in court with a lot of publicity.

    It's not a question of who is guilty - obviously the virus writers intention was not to kill people by disabling coast guards system, the network admins did not mean this to happen by leaving their systems wide open and Microsoft did not guarantee their OS to work in critical situations like this. The world would be better place with less stupid lawsuits, but if you are still going to sue someone, sue the one with most cash :)
  • Re:He should be (Score:3, Insightful)

    by dexterpexter ( 733748 ) on Wednesday May 05, 2004 @07:04AM (#9061778) Journal
    Why is that the Operating System companies responsibility, though? When does the act of booting a machine and writing a document imply security? An operating system, in the beginning, likely did not have security in mind at all. It was crimminal behavior that forced them, at the cry of the market, to start securing the system. However, how much responsibility is it of the OS company to provide security against crimminal behavior when that isn't a part of their business model? Why not leave that responsbility to the companies for whom it is their business model, like Norton or McAfee?

    In assuming security is the responsibility of the OS company, then yes, they are selling you an inferior part (which you still bought). However, I know we have insisted that it is their responsibility, but the question is: is it really?

    Why exactly is it incumbant of the provider to include state of the art security when third party security programs are available? Why can't an OS company focus on its core business without branching into crime prevention?
    And, with alternative operating systems available and the track record of MS insecurity, then why don't people make the switch over to another system if the OS they currently use doesn't live up to their expectations?

  • by DrYak ( 748999 ) on Wednesday May 05, 2004 @07:17AM (#9061825) Homepage
    is the car company responsible for not making unbreakable windows?


    There's something wrong with your exemple.
    There are car company that do make unbreakable windows and they do advertise their windows as such. (used by diplomats, etc...)

    The other companies don't make unbreakable windows, and never advertise their car as such.

    BUT !!!!

    There are some Operating system designers, that create unreliable OS, but still advertise them as secure.

    So in your example, if the car was Royce diplomatic model with unbreakable glass, when this happens, the court won't laugh but take it very seriously.

    And the Operating System compagniy should be blamed because it pretends it software is secure, when it clearly isn't.

  • Re:He should be (Score:5, Insightful)

    by AllUsernamesAreGone ( 688381 ) on Wednesday May 05, 2004 @07:25AM (#9061850)
    The problem with patching Windows systems is that a responsible admin will not simply roll out the patches across all the systems. Microsoft is very good at giving you two problems for the price of fixing one so a lot of Windows admins do extensive testing of patches before applying them across all their systems. In another situation, I would give them the benefit of the doubt and say they were hit while testing the patch.

    However, this isn't another situation and, if their machines had been properly firewalled (can someone please explain to me why any ports other than those for servers running in a DMZ should be visible over the net, because I'll be damned if I can think of any) they wouldn't have been infected. Hell, if they had zonealarm running on all the boxes they'd be safe even if they don't have a decent firewalls between their LANs and the net.

    Yes, Microsoft isn't without blame (maybe if they made patches that didn't crap all over your machines life would be better) but in this case sloppy admins have struck again.
  • Re:He should be (Score:5, Insightful)

    by andy landy ( 306369 ) <aplandells&hotmail,com> on Wednesday May 05, 2004 @07:28AM (#9061861) Homepage
    I still don't buy the "Microsoft is responsible" talk, sure their software is buggy, but so is many other software. I've seen Linux and other Unix systems rooted, yet nobody starts claiming "It's all Linus' fault" etc.

    Okay, so the Free Software folk invariably have patches out within hours of an exploit being discovered, but this hole has already been patched too.

    The onus is on the virus writers (and Script Kiddies etc) who write malicious code and to some degree on people not maintaining their systems.

    Not locking your front door doesn't give you the right to blame the door-making companies when you get burgled. You can still blame the burglars, but you're out of luck if you claim insurance since it's your own fault.

    It's different if there aren't any patches, and I'm well aware that Microsoft have their problems and need to be more secure, but I still stand by my judgement that they can't be held responsible for every virus outbreak that happens!
  • Re:Overexagerrated (Score:2, Insightful)

    by oshy ( 674602 ) on Wednesday May 05, 2004 @07:30AM (#9061866)
    One of the comments made about it on TV was that the PCs used for checking coordinates went wonky.

    However, as part of the procedure for locating vessles, they check them against paper charts.

    Looks like they didnt trust PCs to start with. Now they've been proven right.
  • by supersnail ( 106701 ) on Wednesday May 05, 2004 @07:36AM (#9061887)
    Not quit correct?

    There is a UK Coast Guard service. But this is a comparativlely small organisation which monitors radios traffic for distress calls, does traffic management on busy shipping routes and coordinates search and rescue operations.

    The actual rescue is usually done by the RNLI which has boats manned by volenterr crews and is funded as a charity, or, if anything airborne is required it is supplied by the airforce, (additionally police, fire brigade etc. may be called in).

    The actual effect of the outage doesn't seem to severe as computers are not extensively used. Radio and telephone being perfectly adequate to coordinate this sort of stuff.

  • Natja (Score:3, Insightful)

    by Graymalkin ( 13732 ) * on Wednesday May 05, 2004 @07:40AM (#9061904)
    I would have thought after MSBlaster ripped through the Windows world that people would have learned to keep Windows away from any and all open internet connections. While competent admins ought to keep their systems patched I find it difficult to understand why networks aren't properly firewalled. If you want to be cheap about it you can just have a single firewall at external connections. A little fancier set-up would be transparent packet filters to segment portions of the network from one another. Keeping everything off the network that wasn't intended to be there would nip many of these sorts of worms in the bud.

    I think the bigger issue here is why systems like this, even relatively non-critical ones like the UK Coast Guard's mapping system, are running Windows. I would think that an organization like the CG would be able to get their vendors to develop applications for whatever OS they were running. Agencies set some criteria and contractors meet said criteria. If they were running say Linux I don't think it is far fetched to believe that some contractor would be able to develop the required mapping software for it. The CG might be running COTS software that runs only on Windows but I don't find that likely. I'd welcome an answer however.

    Windows is known to be an extremely insecure system despite Microsoft's claims. While Service Pack 2 might magically fix all sorts of problems it is not available to end-users yet. Those magical fixes don't mean much to the here and now. It looks as if Windows' vulnerabilities are costing companies quite a bit of money and eating into their bottom line. I would have thought by now Windows would be on its way out the door in many organizations since their competition such as it is can do many of the same tasks either cheaper or more reliably.
  • Re:Wrong (Score:3, Insightful)

    by mericet ( 550554 ) on Wednesday May 05, 2004 @07:43AM (#9061913) Homepage
    No, the car analogy is wrong. At least in the jusrisdictions I'm familiar with, as long as you commited a crime (virus writing/distributing) deliberatly, you commited all side effects of said crime. A more accurate analogy would be an accidental death caused by arson. At least in my jurisdiction, virus writing/distributing is a crime by itself.

    If they didn't have an admin. Managment would still be potentially liable (negligence of not having a competent admin), and civil liability would not be diminished.

  • Re:He should be (Score:5, Insightful)

    by ichimunki ( 194887 ) on Wednesday May 05, 2004 @08:00AM (#9062008)
    There is little comparison between unlocked doors and computer worms. If my nieghbor doesn't lock his door and gets robbed, this probably doesn't mean that the robbers will now use my neighbor's house as a place from which to launch a robbery of my house. However, on the net, when someone leaves an unsecured, hacked system running, their computer increases the risks for everyone else because, whether they know it or not, they are helping the virus writers breed their nasty little piece of software.

    Whether or not my neighbor is to blame for having been robbed (which I don't believe he is), the point is: if my neighbor's computer is hacked and starts to attack mine, that's when we start to have a heightened sense of his responsibility in the matter.
  • by FreeUser ( 11483 ) on Wednesday May 05, 2004 @08:00AM (#9062013)
    Seriously, whoever was responsible for designing and implementing the system the coast guard uses is at fault.

    I find this propensity for blaming the victim to be very disturbing. Microsoft has been fraudulantly representing their system as both stable and secure, just as they have been fraudulantly representing their system as less expensive than their competitors' products (GNU/Linux, OS X, *BSD, etc). This is a matter of public record ... one need only peruse their website and their past marketing of Windows, coupled with their slanderous misrepresentations of competitors such as Linux.

    Now, one can argue that the technical staff of the coast guard should have known better (so too should every victim of every fraud perpetrated), but the fact that they didn't is hardly negligence on their part, when their vendor misrepresents their product's security on a daily basis.

    I can't belive that people who put together systems that perform life critical functions cannot be held liable for the choices they make

    I dont think the OS choice is relevent.

    Clearly the data do not support this. Mac OS X is demonstrably more secure than windows, both systematically through an architectural analsys, and through historical emperical data (number of exploits, timeliness of patches, effectiveness of patches, etc.). Ditto for the various flavors of BSD, ditto for Linux, ditto for IBM's various mainframe operating systems, and the list goes on.

    Clearly, as the underlying architect and definition of a system's security design, policy, and implimentation, the operating system is the single most relevant design choice one can make.

    Its the setting up of a system that is exposed to the internet. Systems on which peoplses lives depend have no business being connected to unsecure systems - they should be dealing ONLY with the data needed to perform their task.

    That is unrealistic. Systems which are networked together can save lives. A ship is in trouble and automatically reports its position for rescue, allowing the crew to get on with the more immediate task of not drowning. A hospital computer notes a patient's decline and automatically notifies other systems, which notify the appropriate physicians and medical staff. Proper implimentation is critical, of course, but the "cut the cable" solution is nonsensical, particularly when reasonably secure alternatives such as Linux, Mac OS X, and *BSD exist and are well proven.

    The worm writer, and Microsoft's fraudulant representation of their operating system as stable and secure, are the primary culprits in this fiasco. It is time we stopped blaming their victims, and held the perpetrators responsible instead.
  • by zogger ( 617870 ) on Wednesday May 05, 2004 @08:11AM (#9062092) Homepage Journal
    ... are a LOT more responsible about their products as a rule then almost any industry, perhaps airplanes might be the closest, they always recall and repair or replace defective products, and go to some lengths to get the word out to the owners, and it goes beyond 90 days, and beyond the original owner on any defects. I know because I worked in a firearms warranty repair center before and been an enthusiast since I was about as tall as a .22 rifle. It's years and years in some cases with warranties. Many now come with a default "forever" warranty. In fact, they have some of the best warranties and repair/recall efforts in any industry. We would be *lucky* if all products had as good a warranty. Like name a major manufactured mechanical product that comes with a lifetime warranty now. Washing machine? Automobile? Bicycle? Hard drives? Radio? Anything? There might be but I can't think of any off the top of my head, but firearms are treated that way in a lot of cases now, and even in other cases where the warranties expire, recalls are still done if a defect is found.

    The big problem is software got a compoletely 100% "free ride" in the beginning, it was allowed to be sold with zero warranties, I guess to get the business off the ground or something. Or maybe... I dunno, can't think of a good reason really. They just slap got away with something no other industry has as far as I know. You can't sell a 1 cent stick of gum without it having actual and implied warranty to it.

    This deal was way back when it first really took off (I really need to research this now,it's gonna bug me why they got such a sweet deal), now it's been decades. DECADES. Untold hundreds of billions of dollars in pure profits. Huge numbers of wealthy people and businesses involved with it. It's "mature" now. Time to insist on "profitable" software to have warranties, and hold the manufacturers liable for obvious defects. They have "Get out of any Responsibility" EULAs, but still "enjoy" full ME ME ME IT'S ALL MINE MY PRECIOUSSSS protection "under law" for "Intellectual Property" and make tons of cash, well, that is teh obvious suck now and ayone can see that.

    It's one or the other, if the software makers want to treat electronic digits as some sort of extremely valuable commodity product, with PATENTS on it even, which they sell at a very, very good profit, they need some sort of a minimum consumer warranty applied to them, or strip them of their profitability, one or the other. Enough's ENOUGH on the free ride they get. The software industry is "mature" enough to treat those business people as normal adults, same as anyone else in any other industry.

    We NEED a class action suit in general against free ride EULAs across the board for for-profit software, and it needs to go to the supreme court and be won.

    I am surprised as all get out with all the other litigation that goes on in our society that a set of profitable businesses who have gotten hosed over and over and over again by these obvious defects haven't challenged those EULAs as being absurd and illegal in the first place. Name another industry that would dare to put out such a "contract" for consumers and have it accepted. It's quite absurd, they'd be laughed at, but "software" is now the biggest example of legal "conware" there is.

    And YEP, I could care less if it meant that "releases" slowed to a crawl, wouldn't bother me one bit or byte. Consumers want quality, few if any defects, they just been faked out that crapware is "good enough" and the industry as a whole has all colluded to profit off of crap and conware. It's just plain stupid, and ethically wrong. We can see now that software is so "embedded" in our society that you can't really say now that "no one is effected" when defects show up. it can get downright dangerous, and it certainly costs consumers tons of cash to keep fix and repaired stuff that shouldn't be shipped broken in the first place. We need less patches, and more "it don't need to be patched" software
  • Re:He should be (Score:5, Insightful)

    by Alan Cox ( 27532 ) on Wednesday May 05, 2004 @08:21AM (#9062146) Homepage
    In the UK at least the police would have quite a list of things to charge the virus writer with. The coastguard and microsoft might also have liabilities.

    As with most of the EU you cannot disclaim liability for death and some forms of injury, whatever you write on the license. (Nowdays "Not verified for use in safety critical systems" seems to have become an accepted way of ensuring the liability lands on the user though).

    Considering the car analogy

    You can be liable if you make a car with dodgy
    brakes (unsuitable product, forseeable that it will cause an accident)
    You can be liable if you knowingly drive a car with bad brakes (because its forseeable that this will cause an accident)
    and you are most definitely going to get into trouble if you empty a bucket of oil over the road surface (aka writing the worm)

  • by Oligonicella ( 659917 ) on Wednesday May 05, 2004 @08:32AM (#9062215)
    Disabling emergency systems is *not* a "soft" crime. The have radio, unfortunately radio can't store and retrieve information.

    The worm writer is responsible for damages caused by their disabling any system they target. Just because they target the world doesn't excuse them from the smaller impacts.

    No, the great bulk of shashdotters don't write and distribute malicious code.
  • by mpe ( 36238 ) on Wednesday May 05, 2004 @08:38AM (#9062250)
    Is Microsoft Software actually certified for safety critical systems? I thought it was not warranted for that use.

    Back to the issue of using the right tool for the right job. In many situations no "Off The Shelf" ("Commercial" or otherwise) is suitable.
    From an engineering POV an Open Source System is more likely to be a good tool, even if you use some standard package/distribution as a starting point. Since you can then verify that it does what it should do and only what it should do. (A lot of malware involves use of unneeded "features".) Something which is very difficult with proprietary software since you need to take things of trust from the vendor and virtually impossible with something like Windows. Which in addition to being proprietary software contains deliberate "sphagetti code".
  • Re:He should be (Score:3, Insightful)

    by infinite9 ( 319274 ) on Wednesday May 05, 2004 @09:49AM (#9062825)
    Not locking your front door doesn't give you the right to blame the door-making companies when you get burgled.

    What if the door company advertised their doors in a way that led you to believe that the door was locked when a design flaw meant it wasn't? And when the design flaw was pointed out to them, they mentioned it with a free fix on their website, but did nothing else? And a hundred thousand people were all robbed on the same night? In meatspace, people would be screaming for blood. I think the admins may have also been at fault here. But as someone else pointed out, what if they were still testing that patch?
  • by CmdrGravy ( 645153 ) on Wednesday May 05, 2004 @09:58AM (#9062897) Homepage
    To be fair to the coast guard although there computer system was inoperative they did have a perfectly workable backup solution in place which they were able to use to exactly the same end result as they would have achieved using the computers.

    OK so it was a worm which took down the systems this time which is something you can protect against but at the end of the day you shouldn't rely on any computer system without a manual backup process ( if it is possible to implement one ) which can take over for safety critical work. Computers are complex things and can fail for a huge variety of reasons some of which should be preventable ( in this case ) and some which aren't reasonably preventable.
  • by Zak3056 ( 69287 ) on Wednesday May 05, 2004 @10:08AM (#9062974) Journal
    How hard is it to have a BSD or Linux box acting as an el-cheapo firewall between the Internet and your internal network? I have a $200 laptop which has done just that task for several years now. I can never be bothered to patch my (Windows) machines, but they never have trouble because they can only talk within each other and not get attacked from the outside. Jeez, even if you paid someone to install it, you could have the whole job done for $1000 with old hardware and a copy of FreeBSD.

    If you're talking about your home network, yeah, I guess that's okay--but in a business environment (which is what you're talking about, since you mention armies of MS only consultants) what happens when your road warriors VPN in, and infect your ENTIRE FUCKING NETWORK because you thought that a simple NATing firewall was "good enough" security, and didn't bother to patch your boxes?

    Don't get me wrong--what you suggest will reasonably protect you from quite a few threats--but it's NOT the panacea you make it out to be.

  • Re:He should be (Score:3, Insightful)

    by Atzanteol ( 99067 ) on Wednesday May 05, 2004 @10:31AM (#9063271) Homepage
    Bill Gates never claimed that Windows would be invulnerable to viruses and other security holes. It's not the OS's "job" (according to MS) and it's not what the customers expect. It's sorta like suing Levis because your jeans don't stop bullets. They never claimed they would.

    Caveat emptor if you will.
  • by Hogbert ( 16729 ) on Wednesday May 05, 2004 @10:34AM (#9063326) Homepage
    Does it make a difference ?

    The bank offices were closed; they did not do business. No data was lost but the customers were not given service. No good.

    Hogbert
  • Re:we should be (Score:3, Insightful)

    by SillyNickName4me ( 760022 ) <dotslash@bartsplace.net> on Wednesday May 05, 2004 @10:36AM (#9063358) Homepage
    Yup, it comes down to everyone. It's easy to say "MS sucks, look at this proof" but the fact is MANY systems are vulnerable to malicious intent and the free solutions escape much of this attention simply because fewer people seem to be - for now - writing exploits.

    That almost sounds like a real argument, it is not.

    • Most other systems that want to call themselves 'modern' listen to a very limited group of services only by default, and those are services to be known to be generally safe (tho at times things do happen with those as well) and have been comming with built in firewall software for at least half a decade. Note that that includes almost all free unix variations.
    • OSS software has a much better track record documenting and fixing problems

    Both MS and those admins are responsible. MS for knowingly selling an unsafe system, and the admins for knowingly using it.

    That MS systems still listen to the entire world on a whole variety of different ports is a huge part of the problem, and it not comming with a product like ZoneAlarm by default to at least mitigate the problem a bit is really a very significcant part of what makes worms like sasser go well.

    The impopular platforms don't get targetted argument is old, and if you'd just take a peak at the insane amount of malware for the Amiga platform, you'd see how stupidl;y wrong the argument is proven to be by reality.

    THe only partial truth in your argument is that the admins are aslo to be blamed.

  • Re:we should be (Score:3, Insightful)

    by Jim_Maryland ( 718224 ) on Wednesday May 05, 2004 @10:50AM (#9063557)
    OSS software has a much better track record documenting and fixing problems

    Just wanted to point out that in this case, the system admins that didn't patch the MS OS probably wouldn't take the time to update their OSS either.

    I agree that most OSS is more secure, but if admins don't do their part, the system will be vulnerable no matter what OS or application is used. That being said, MS certainly keeps admins busier than other OS's. I find updating my UNIX systems (Solaris and IRIX) much simpler than my MS Win32s (although sometimes patching a single MS Win32 system can be easier than a single UNIX box but for labs or remote locations, UNIX is definitely easier).
  • Re:we should be (Score:2, Insightful)

    by Anonymous Coward on Wednesday May 05, 2004 @12:17PM (#9064628)
    Except one small problem. Extending your logic: The tire company has put a recall on the tire that says the the tire blows out at high speed, please have them fixed. We'll give the the repair for free.

    If the person doesn't make the repairs....
  • by blakestah ( 91866 ) <blakestah@gmail.com> on Wednesday May 05, 2004 @12:24PM (#9064714) Homepage
    So how do you remotely administer one of these machines ?

    You turn on the services.

    The real point is that no outside software can do anything bad to a Mac machine by default, because no ports are open.

    If you turn a service on, then you KNOW IT IS ON, and you KNOW YOU NEED TO CHECK IT FOR SECURITY.

    We're talking consumer client OSs. The vast majority of the users never turn anything on (and by default, never get a worm).

    Imagine if Windows took that same philosophy...

    In general, I am perfectly happy for even server machines to be shipped with only those ports open that I manually specify, or turn on myself. It's secure by default, services on demand, not unadministered services by default. The latter is insanity in today's networks.
  • Re:we should be (Score:2, Insightful)

    by It'sYerMam ( 762418 ) <[thefishface] [at] [gmail.com]> on Wednesday May 05, 2004 @12:27PM (#9064757) Homepage
    Having said that, if an admin followed the instructions on a Linux install (not Linspire, mind), then they would have been running as an unprivileged user.
    Therefore, the damage would've been quite limited - sure it could've hosed the guy's home directory and stuff he'd been working on, his preferences, etc. But it wouldn't have taken out vital operating system stuff.
  • Solutions (Score:5, Insightful)

    by poptones ( 653660 ) on Wednesday May 05, 2004 @12:35PM (#9064840) Journal
    As another poster in this thread so proudly pointed out, there have been seven exploits for Apache in the wild. Is this accurate? I don't keep track of such numbers, but I'll point out that if true this points out exactly what I said: fewer exploits, fewer attacks.

    MS has a "windows update" feature. It doesn't take a genius to enable it. Now, granted this feature can cause headaches if you have a large number of systems to update, but you can also perform similar processes under your own control (if you are an admin) and yet this wasn't done. Turn off all those ports? It doesn't take a genius to download the shavlik lockdown tool linked to by MS itself that will "audit" your system and close any unused ports. It also doesn't take a genius to click to e-eye for an external audit.

    There are so many ways to fix these systems it's nuts. Yeah, they require a tiny bit of effort - one would think that's why the British taxpayers pay these administrator's salaries.

    I'm no shill. I run both windows and linux, although I've been using windows a LOT longer and am, therefore, more able to exploit it. So are a lot of people, which makes it that much more vulnerable. And yet my own linux firewall was hacked one time because... tada... I was running a version of Smoothwall, didn't know the distro or what I was doing, and in the setup config the SSL port was left open and the service running and no explanation was made of the significance of this. As a result my "firewall" was owned within days, zone alarm disabled on one of my (unpatched) windows boxen, and (in short) the entire network became owned. I migrated to IPCOP then reloaded and patched the windows box, just a little wiser and smarter.

    Just as so many here are fond of saying "slashdot doesn't have just one mind" I'll remind others who are dumping on MS over this there have been and are plenty of linux distros, and not all of them uniformly secure or stable "out of the box."

    Holding the software maker responsible for something like this is as stupid as holding the coca-cola company responsible when some idiot pulls one of their vending machines over onto himself. Would you be so quick to call for heads on a stake if this were a network of Redhat boxes? How about a few dozen Suse desktops? It doesn't matter what OS you are using, problems like this almost always come down to one thing: PEBKAC.

  • Re:we should be (Score:2, Insightful)

    by sjgm ( 769067 ) on Wednesday May 05, 2004 @01:11PM (#9065251)

    No, it's like the argument "Well, if you don't make sure you check your tire pressures regularly and they go flat, you might end up with a blowout".

    It's not hard to install patches (perhaps by using SUS or similar), or to get a firewall.

  • Re:we should be (Score:3, Insightful)

    by default luser ( 529332 ) on Wednesday May 05, 2004 @02:26PM (#9066049) Journal
    This sounds like the argument "Well, our tires do tend to blow-out at high speeds but why should we be held responsible?"

    If by "tires" you mean H-rated radials, and by "high speed" you mean over 130MPH, then that's all your fault. Most passenger cars ship with H-rated radials, and most car makers try to pervent such situations by providing 130MPH or less spedometers (the psychological barrier), or installing 130MPH speed governors (the physical barrier).

    Still, with all this, you could potentially push your car over 130MPH and have a blowout, and it would most certainly be your fault. Now, if you had a blowout at 125MPH on the other hand...
  • Re:Solutions (Score:3, Insightful)

    by SillyNickName4me ( 760022 ) <dotslash@bartsplace.net> on Wednesday May 05, 2004 @02:49PM (#9066282) Homepage
    Turn off all those ports? It doesn't take a genius to download the shavlik lockdown tool linked to by MS itself that will "audit" your system and close any unused ports. It also doesn't take a genius to click to e-eye for an external audit.

    If that is all so easy, and MS is aware of it, why don't they solve the problem by locking it down before selling it?

    The problem is that anyone who is selling a product that is claimed to be internet ready, and didn't properly lock it down, is simply lying, their product is NOT internet ready.

    MS has known this for a decade now, and ignored it. During the same time they tried buying their way into the server market with the low cost administration argument, based on needing lower skilled administrators and it all being made 'easier'.

    Don't get me wrong btw, it is good to make things easier and to try to reduce the cost and time aspects of administration. It is utterly wrong to say you did so, give every impression you did so to the casual viewer, and then turn out to have made things more expensive and time consuming, and also having ensured companies no longer employ people skilled enough to deal with it.

    Its simple, security requires people skilled in securing things. Requirements for the average home user are relatively low, and can often be provided for by standard solutions (door/window locks, alarm systems and so on for physical security of the house, a limited set of security features for the computer) and there exists no level of security that will prevent every possible problem.

    IF MS would stop today with giving the impression that administratign and securing a corporate network or large network of small users (like the average isp) is simple, I'd stop putting that large a part of the blame on them. Of course they'll also need to cange their policy to a disable everything by default unless the user asks for it and has been informed about the security consequences.

    As you sated correctly, not every OSS product is immune from this either, and I'm personally not very fond of smoothwall, or any of the linux based firewall packages for that matter. When I want a firewall I want either OpenBSD's pf or FreeBSD's ipfw2. On top of that, I want NO gui management or remote management of such a firewall product by default, and untill I go delve into the system to change things, no management ever using the outside port. That means no listening services whatsoever, and to get services listening on the outside port should require sufficient knowledge of the system first.

    You amke me wonder btw.. WHAT ssl port was left open? SSL is usually used to encrypt/decrypt and sign the trafic for another service such as a http server. I assume in your case there was a webserver with ssl listening on the outside port?

    At any rate, for a home user, get yourself a simple firewall box that simply doesn't do anything more then that, and in most cases it should be enough. It wont listen to the outside world, and it also wont allow too much flexibility that usually just results in messing up stuff

    If you want the flexibility, go get the knowledge to use it or don't expect security.

    as stupid as holding the coca-cola company responsible when some idiot pulls one of their vending machines over onto himself.

    No, it compares to Coca-cola putting vending machines out there of which they know then when not maintaining them for 2 hours/week, they'll blow up on random customers, or spray them with cola, or cause any other random effect.

    I'd understand your comparison if this was a matter of MS making casual mistakes while having a generally healthy design. They don't have a healthy design, and have known so for at least a decade and didn't fix it. You really think Coca-cola would even be in business if they ignored such problems with their products for a decade causing comparable damage?

  • Re:we should be (Score:3, Insightful)

    by SillyNickName4me ( 760022 ) <dotslash@bartsplace.net> on Wednesday May 05, 2004 @03:02PM (#9066445) Homepage
    Lets see... I think you are the one who got it almost all wrong..

    Blame the writer for writing the virus, agreed, and you are right on that one.

    Blame MS for unknowingly creating a system that makes it so easy to infect thousands of computers over a shared network and then for over a decade knowingly not fixing it and yet selling it as being secure, why do you have such trouble with that?

    It is not the first worm/virus that happens to them, not the last either I'd bet, and they still take years to address simple and very clear problems in their design that causes this.

    Blame system admins for not being knowledgable in what should be their area of expertise, what is wrong with that?

    When a burgler enters my house because the lock in the door didn't prove a problem at all while the company that sold it guaranteed it to be upto all modern standards concerning its security... Sure I'll blame the burgler and hope he'll get caught and such. I'll however also blame the lock manufacteror for 1. providing me with a lousy product, and 2. lying about their product specifications. I may even blame the maintenance guy for not installign and maintaining it properly.

  • Re:He should be (Score:3, Insightful)

    by TiggsPanther ( 611974 ) <[tiggs] [at] [m-void.co.uk]> on Wednesday May 05, 2004 @03:43PM (#9066825) Journal
    until a year ago Linux would ship with a bunch of services running by default, which woudn't usually matter (just remember sendmail's default - open relay). but any reasonable sysadmin (or organization) would either stop those services or block them on the firewall level.

    Even a year ago and before, distros (certainly Mandrake) would often end the installation process by telling you what services would be active at boot-time, and were you sure you wanted them to be?
    That was often where I'd turn off anything (insecure or otherwise) that I didn't want running.

    Why can't Windows do something similar?

    Tiggs
  • Re:He should be (Score:3, Insightful)

    by fucksl4shd0t ( 630000 ) on Wednesday May 05, 2004 @04:27PM (#9067184) Homepage Journal

    Well, it is grey area. ;) I was responding more to the "I hate Micro$oft, they must be hung from the highest tree!" mentality than anything else.

    There's plenty of blame to spread around, here. As other posters have mentioned, the sysadmin who installed Windows on these machines without taking preventive maintenance steps is to blame, as well as the person who made the purchasing decision to put Microsoft Windows in this installation, and also the virus writer himself.

    I like some of the other analogies given, actually. The situation is more like a car manufacturer who makes a car with doors that appear to lock, but in reality don't lock. In that case, this situation is analogous to such a car that has been widely reported on not working, no consumer groups rising to defend consumer rights, so the car continues to be produced with its flaw. A buyer, probably not being able to avoid the news, still buys the car. POssibly not being aware of a recall being issued, he continues to depend on it for his business, and then whammo. The virus writer comes along and opens the door and sets fire to the interior.

    It's too easy to just blame Microsoft, but I'm not saying they don't get any blame. Just make sure it gets spread around to all accountable parties, that's all. ;)

  • Gun Companies (Score:3, Insightful)

    by MonkeyCookie ( 657433 ) on Wednesday May 05, 2004 @05:25PM (#9067693)

    How the gun companies have managed to, ahem, dodge the bullet in this regard so long is beyond me.

    Lots of $$$$$, which buys them plenty of puppet congressmen. Just look at the power of the NRA.

Those who can, do; those who can't, write. Those who can't write work for the Bell Labs Record.

Working...