Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Security Bug Operating Systems Software Windows

Sasser Worm Takes Down UK's Coastguard 733

jonman_d writes "The Sasser worm has recently disabled the computer systems of Britain's Coastguard. Naturally, this event raises even more doubts over the reliability of Microsoft software in critical systems. Moreover, it raises questions of responsibility: if the worm writer is caught, can he be held at least partially responsible for any deaths that occured during this outage?"
This discussion has been archived. No new comments can be posted.

Sasser Worm Takes Down UK's Coastguard

Comments Filter:
  • by greppling ( 601175 ) on Wednesday May 05, 2004 @05:34AM (#9061364)
    ..., whose mistake caused the security hole, gets identified, can he be held at least partially responsible for any deaths that occurred during this outage?
  • Re:He should be (Score:3, Interesting)

    by Willeh ( 768540 ) <rwillem@xs4all.nl> on Wednesday May 05, 2004 @05:36AM (#9061374)
    I think it would be a lot better for companies to persue options that would help prevent these kinds of things, not a short term asskicking to some scriptkiddy, when you know thousands more are willing to jump into his shoes for some "internet notoriety" or other BS.
  • Patches (Score:5, Interesting)

    by Amiga Lover ( 708890 ) on Wednesday May 05, 2004 @05:39AM (#9061386)
    OK I know there's going to be a million comments about how we should all patch vulnerabilities and there'd be no problems... and then the inevitable responses from admins who haven't done so because testing hasn't been complete and the patches are causing more problems after doing them...

    But...

    Why aren't MS patches single discrete objects? One patch for One vulnerability? That way IMHO clears the problem of a "patch" that comes up, is huge, and attempts to fix ten documented vulnerabilities (but knowing the code used in huge projects, it's possibly many dozen fixes at once).

    This kind of fine grained control is what works WELL in debian for example. To update an error in ssh, download it's patch. to update an error in an x library, update that one library. Not bundled in with loads of extra crap

    I suspect this is a marketing thing. MS can truthfully say they only had 4 patches in a year, when the patches in linux systems number "in the hundreds", when the reality is far different.

    Even MacOS seems to be partway to the debian like approach, where there may be a dozen security updates in a year fixing a small number of vulnerabilities each. It's a consistent line of updates, instead of happening in large steps over which an admin has no control.
  • by Meijer ( 237978 ) on Wednesday May 05, 2004 @05:44AM (#9061416)
    On Monday, thousands of people tried to access the banking services of Deutsche Post.
    Due to stricter securities setting (because of Sasser) this was not possible for hours.
  • Re:He should be (Score:1, Interesting)

    by Anonymous Coward on Wednesday May 05, 2004 @05:49AM (#9061435)
    If this was a car company and they produced products that could lead to accidents (we've seen this before) they'd have been taken to the cleaners by now.

    Yes virus writer are wrong, wrong, wrong to keep creating this crap BUT ultimate responsibility lies with Microsoft, they allow this to happen by producing third rate crap, avoiding the real issues and putting all their efforts it seems into political manouverings and doggy business practices. They are not fixing the problems, I suggest Bill gets his house in order.
  • Proximate cause (Score:3, Interesting)

    by ArsenneLupin ( 766289 ) on Wednesday May 05, 2004 @05:57AM (#9061469)
    Quoting from your link, second paragraph:

    Responsibility for injury lies with the
    last negligent act that produces the injury (after the ball rolls down the hill, a stranger picks it up, throws it through a window which breaks the glass, causing the glass to shatter and strike a person who was sitting next to the window, cutting her arm and requiring her to obtain medical treatment). In this example, although you caused the ball to roll down the hill, your act is not the proximate cause of the injury to the lady sitting next to the window, the stranger's act is the proximate cause of the lady's injury and the stranger, not you, should be held responsible for the injury that she suffered.
    I think this would put responsibility squarely on the "virus" side of the chain of events. Indeed, although some initial malfunction may have put the person at sea in danger in the first place, it was only the crippling of the coast guard that caused the sea accident to become fatal.

    Ok, would that make the virus writer responsible? Again, no. The virus writer just tossed a ball which somebody else picked up.

    Who is this somebody else? Microsoft? No, again. Although, Microsoft did pick up the ball, they didn't throw it at the victim's window themselves. They only threw it to the next "player".

    That next player would be coast guard management who decided to run their system on Windows instead of the more secure Linux or OpenBSD. Would they be guilty of manslaugher? Again, no. They just tossed the ball to the next player.

    The next player would be the sysadmin who failed to run windows update on his known vulnerable system (A windows system is always deemed vulnerable. Thus, "not having heard of" the worm is no defense). And he would be the final player who tossed that ball through the window.

  • Re:He should be (Score:2, Interesting)

    by bnet41 ( 591930 ) * on Wednesday May 05, 2004 @05:59AM (#9061484)
    actually a better analogy would the gun makers. Should we put gun makers in jail b/c their products are used to kill people? The fault here lies with the malicious person, not the maker of the item. Sure, faults do exist in the product, but not anything that can cause problems usually without someone with malicious intent putting things into motion. With car makers, they usually get nailed b/c they ignore a defect that gets people killed in the normal day to day operation of the vehicle. For this to apply here, the software would have to crash on its own, and cause the breakdown, which is not what happened, an outside malicious force had to act first.
  • Re:Sasser FUn! (Score:3, Interesting)

    by harikiri ( 211017 ) on Wednesday May 05, 2004 @06:01AM (#9061497)
    I almost can't blame the customers for doing this. Ever try just updating windows xp over broadband? Takes forever.

    What's even worse is the fact that most internet users are still stuck on dialup! According to this recent article [cbsnews.com] at CBS, 3 out of 5 internet users don't have broadband.

    The very issue of security patches, their sizes, and the problems for dialup users trying to download them was covered here [securityfocus.com] as well.

  • Re:Oh, for fuck sake (Score:5, Interesting)

    by Unique2 ( 325687 ) on Wednesday May 05, 2004 @06:03AM (#9061516)
    Hook, line and sinker but...

    According to Wikipedia [wikipedia.org] Elk Cloner [wikipedia.org] was the first virus to be caught "in the wild" i.e. outside of a research lab. It ran on Apple II systems, more than likely because MS-DOS was barely capable of running programs at the time.

    Also, lets keep things in context, Sasser can install and execute itself remotely without any user interaction -- there is a big difference between that and booting from a random floppy disk or logging in as root, downloading, chmod +x virus, and executing ./virus.
  • by erik_norgaard ( 692400 ) on Wednesday May 05, 2004 @06:11AM (#9061556) Homepage

    The danish newspaper Ingeniøren [www.ing.dk] reports that the Sasser virus attack affected the danihs hospital, Herlev Sygehus. The hospital had to cancle scheduled CT-scannings because the scanners crashed. Also MR-scanners were affected, though no scannings were canceled.

    "We do actually have a firewall, but aparently it hasn't been updated enough" sais radiographer Jan Bovin. "It was the scanners running Windows 2000 and XP that were affected, the MR-scanners running Linux had no problems," he sais.

    The original story is here [www.ing.dk] (in danish).

    It appears that the consequences of the Microsoft monopoly are getting worse. Are there any linux-run hospitals?

  • by OlivierB ( 709839 ) on Wednesday May 05, 2004 @06:14AM (#9061568)
    Heathrow hasn't been spared yesterday

    http://tinyurl.com/3h7fb

    If I were a Linux vendor I would be all over BA and other victims pitching my stuff.... I know this is a bit wrong but hey Business is business and I am sure I would get these guys attention FAST!
  • Sasser Frazzed (Score:4, Interesting)

    by zenmojodaddy ( 754377 ) on Wednesday May 05, 2004 @06:17AM (#9061585)
    I work in a small insurance brokers without its own internal IT department, and as token geek I get the job of patching workstations since our external IT support guys can't find their own collective arse with both hands and a map.

    As soon as the last batch of updates were released - starting about half an hour after I read about the updates on /. - I patched twenty odd workstations individually, manually, over two days. (Manually, because our IT experts have set up our system in such a way that the automatic update service doesn't work.)

    Which is why it's f*cking galling that I checked our server's update history this morning and there are sixteen critical updates still waiting to be loaded, because the IT guys say we don't need them and, y'know, we shouldn't worry about it.

    Aaagh!
  • Re:He should be (Score:2, Interesting)

    by Donny Smith ( 567043 ) on Wednesday May 05, 2004 @06:19AM (#9061592)
    >which twit thought it would be a good idea to have ports open by default with services listening to whatever crap other computers might send

    oh pleeze are you saying Microsoft opened secret ports about which they didn't know? the organization didn't have a security policy that mandated closing unnecessary services or they did not follow the policy (if it's really "unneccessary services" that screwed them up).

    until a year ago Linux would ship with a bunch of services running by default, which woudn't usually matter (just remember sendmail's default - open relay). but any reasonable sysadmin (or organization) would either stop those services or block them on the firewall level.

  • by BiggerIsBetter ( 682164 ) on Wednesday May 05, 2004 @06:21AM (#9061597)
    Damn straight. Somebody needs their ass kicked over this one. Hopefully nobody dies as a result.

    When your systems are that important, it's madness to run them unsecured. There should be strong firewalls on the networks and virus scanners on every machine. If the virus finds a way in (say a managers laptop) there's no way it should be able to spread. And vulnerable systems (*cough* Windows *cough*) should be kept to a minimum.

    I know some folks say if it's behind the firewall it's safe, but as we see again and again, that's rarely the case. It's my policy to ensure *every* machine is updated as required, and the servers and Windows machines run AV software.
  • Re:Bad Admins (Score:3, Interesting)

    by clare-ents ( 153285 ) on Wednesday May 05, 2004 @06:26AM (#9061619) Homepage
    How about :-

    Don't have any services running on any ports unless the computer owner has explicitly asked for them.

    Here's a question. Suppose I buy a new computer and I want to connect it to the internet over dialup to activate my copy of Windows XP. I now have to hunt around a bunch of menus to turn on the inbuilt firewall before I can do this. Then I have to download some megabytes of patches to make it safe. At a per bit cost that's ridiculous.

    That's just not acceptable.
  • Re:Wrong (Score:3, Interesting)

    by dexterpexter ( 733748 ) on Wednesday May 05, 2004 @06:27AM (#9061627) Journal
    Interesting. I didn't consider the not clicking on some EULA. However, wouldn't the liability still only be manslaughter. If a car directly runs over someone, but the intent was not to kill, then isn't it still manslaughter, not murder? In this case, I doubt that the virus was intended to kill. So, perhaps limited liability might not apply here. However, I have been toying with the idea of also being able to get the virus writer with the DMCA.

    The idea of the admin being responsible intrigues me. What if they don't have a system administrator? Can one still argue legally that since the average user is not technologically savvy and that they bought a product with the idea that it performed its function (especially in the case that the company claims it is secure), then could they argue that it is not their responsibility to make sure that the internal workings of the system work? I mean, you and I know better, but can an ignorant user rightfully claim that it is the software writer's responsibility to provide the service they paid for, without requiring the end user to pay for experts to monitor their system?

    You and I know that is bunk, but I wonder how that would hold up legally...
  • Delta Airlines (Score:5, Interesting)

    by DeanFox ( 729620 ) * <spam,myname&gmail,com> on Wednesday May 05, 2004 @06:34AM (#9061659)

    Although I think they've denied it in public, Delta Airlines was also brought down over the weekend by this worm. I have a friend who came to Church panting, out of breath because he was late and had to rush. He works at Delta and said he had been there since Saturday patching and cleaning machines. Right after services he was going back.

    The system effected was one that calculates passenger and cargo weight so it can be distribuited evenly through out the aircraft. It's one of those systems that's easy to forget. It's not like air traffic control or reservations or something people would consider "critical".

    It's scary but ironic that a small forgotten local sub-system can bring down a billion dollar corporation and inconvience tens of thousands of people. It was local to Atlanta, used at the ticket counter and for flights leaving Atlanta but, bring down the hub and the entire operation is effected.

  • by dexterpexter ( 733748 ) on Wednesday May 05, 2004 @06:39AM (#9061676) Journal
    I agree that it isn't appropriate, but we in the U.S. have seen the application of the DMCA extend beyond its original intentions to be used to prosecute anyone who violates not only copy protection, but basically any sort of protection scheme. The DMCA has grown beyond simple copyright legislation, unfortunately, and that is why I suggested it.

    I don't believe that it should be used in such as way, but if it is used to go after the "good" guys, then why not the bad as well?

    Lately, it seems, the DMCA is trying to become the all-encompasing way to prosecute anyone who peeks somewhere they "shouldn't." This wouldn't work if someone explicitly opened the virus and it infected the system. However, if the virus sat there and hammered at holes in the software until it wormed its way in, then I don't see why they couldn't use the DMCA against that, as well.

    I wasn't really suggesting it so much as putting it out there as a thought open for discussion...
  • by The Cookie Monster ( 129545 ) on Wednesday May 05, 2004 @06:40AM (#9061678)
    Slow Down the Security Patch Cycle? [slashdot.org]

    This case would seem to support the reasons made in the computerworld article about slowing down the security patch release cycle.
  • Re:He should be (Score:3, Interesting)

    by ottawanker ( 597020 ) on Wednesday May 05, 2004 @06:52AM (#9061724) Homepage
    If your gun exploded in your hand you'd sue the manufacturer.

    Actually, there'd probably be people pointing fingers at everyone else. Was the problem with the gun, or the bullet? Maybe the problem was caused because you didn't keep the gun in proper care. Maybe the gun was old and out of date.
  • Re:He should be (Score:5, Interesting)

    by fucksl4shd0t ( 630000 ) on Wednesday May 05, 2004 @07:02AM (#9061768) Homepage Journal

    if the gun exploded in someones hand then that would be a result of a defect, and something that is not caused by a malicious user. Slam Microsoft all you want, nothing wrong with that, but realize this specific incident would not have happened with out a malicious user.

    The analogy is still wrong.

    Say a gun manufacturer manufactures a gun that will work for most people most of the time, and failures only involve reloading, no actual damages. This same gun, through poor engineering, has a weakness in the barrel that can only be affected by a certain type of ammunition. The manufacturer doesn't consider this important because nobody manufactures that type of ammunition, it's worthless ammo.

    So someone handcrafts the ammunition that will exploit the flaw, sneaks into your house and loads your gun with it, then escapes without leaving any trace other than the ammo in the gun.

    Now the gun blows up in your hand. Who's at fault?

    Even stretched to the limits as the analogy is, there's one primary difference between this analogy and the actual topic. For guns there aren't thousands of individuals building ammunition specifically designed to ruin the guns and possibly hurt the people firing them. For computers, there are. If this were to happen for real with a gun manufacturer, the manufacturer would be acquitted of all charges, because he had a reasonable expectation that what became an engineering flaw through exploit would not ever be a problem. Not so with the OS producer. They have a reasonable expectation that their OS will be attacked, and the more market share they have, the more this expectation resembles waiting for the sun to rise, i.e. you *know* it'll happen.

    The OS producer must bear some responsibility for it, for the same reason a car manufacturer must bear some responsibility for injuries sustained in a car accident due to safety systems not well-engineered. Even then, we tend to forgive the car manufacturer, because accidents aren't supposed to happen, and there's usually some idiot at fault.

    I'm all for pointing at Windows and saying it sucks any day of the week, but I'm not so sanguine to blame microsoft for the script kiddie that wrote the virus. It's grey area, there. And let's not forget that our beloved GPL disclaims all warranties as well...

  • Re:He should be (Score:4, Interesting)

    by richie2000 ( 159732 ) <rickard.olsson@gmail.com> on Wednesday May 05, 2004 @07:10AM (#9061795) Homepage Journal
    And, if they tout complete security as a feature, then they are taking on that part of the business.

    "Amid increasingly frequent and sophisticated network attacks, users expect their systems to remain resilient, and for system and data confidentiality, integrity, and availability to be maintained. (...)As a leader in the computing industry, Microsoft carries a substantial responsibility."

    Microsoft [microsoft.com]

    If someone breaks into my house, I am not suing the person who built my house.

    Even if the lock and indeed the whole of the front door is pathetic, has known vulnerabilities and the maker still touts it as secure with the well-known chairman of the company that built the house (door, lock and all) having announced a big push for increased security almost two years ago? How is the buyer of that house supposed to know that his front door is made of a material that looks like steel and feels like steel but offer about as much protection from burglars as Aerogel?

    Microsoft claims Windows is secure. It isn't.

  • Re:He should be (Score:3, Interesting)

    by Faluzeer ( 583626 ) on Wednesday May 05, 2004 @07:12AM (#9061808)
    "but also some responsibility on the retards who didn't get a secure system - MS is officially unsuitable for this sort of thing."

    Hmmm

    How about any unpatched operating system is officially unsuitable for this sort of thing.

    Yes blame can and should be placed on MS for the design and security features of their software however a large portion of blame should go to the individuals and organisations that do not regularly update their systems.

    As linux takes off in the corporate world I expect there will be an increase in worms targetting that operating system, let's just hope that individuals and organisations learn the lessons and keep the systems patched or the problems will keep occurring regardless of the operating system being used.

  • On the train (Score:2, Interesting)

    by cazzazullu ( 645423 ) on Wednesday May 05, 2004 @07:25AM (#9061849)
    On the train this morning, with some guy I know:

    Me: phew, almost our entire university network down, just by one stupid virus. Luckily I'm using Linux.

    The other guy: What the hell is Linux???

    ...

  • Network security? (Score:3, Interesting)

    by JWSmythe ( 446288 ) <jwsmytheNO@SPAMjwsmythe.com> on Wednesday May 05, 2004 @07:25AM (#9061851) Homepage Journal
    Not to skip the M$ Bashing, but....

    Shouldn't there be a bit better security in an essential service such as that? Why are people allowed to bring insecure machines in, and plug them into the network? Shouldn't they have 24/7 administration? Shouldn't someone have seen a report about Sasser, and patched their machines? We're not talking about Mom & Pop ISP here, we're talking about a branch of a nations military. Why are people coming in with laptops from home, and being allowed on the same network with an essential infrastructure? Haven't their admins read any books on secure networking? What about firewalls between the essential infrastructure machines, and the compromisable network? The way the story sounds, people take their laptops home, browse the Internet, and come to work and plug in pretty much anywhere. I suppose there's more than one CCSP on staff saying "hey boss, told you so" err, maybe "Sir, remember those security recommendations I made last year? May we implement those now?"

  • by johnw ( 3725 ) on Wednesday May 05, 2004 @07:27AM (#9061859)
    > Helicopter rescues for example, don't involve
    > the RNLI.

    Helicopter rescues quite often involve the RNLI. The RNLI however do not (AFAIK) have any helicopters. Helicopters from the coastguard or RAF frequently cooperate with the RNLI in effecting rescues.

    John
  • monoculture problems (Score:3, Interesting)

    by martin ( 1336 ) <<maxsec> <at> <gmail.com>> on Wednesday May 05, 2004 @07:31AM (#9061871) Journal
    Usual problems with sys admins having to patch thousands of machines (yes there are tools out there to help).

    But also caused with the massive MS Windows monoculture (cf market dominance).

    It's times like this that running 3 O/S's at work for the users desktop helps. But then i get stuffed by patching and trying to find tools that cover all my bases....(or run three tools!).
  • by Cooper_007 ( 688308 ) on Wednesday May 05, 2004 @07:42AM (#9061912)
    Does that mean if I leave my bicycle unchained, and a person takes advantage of the situation it's my fault?

    According to the insurance company, HELL YEAH!

    Cooper
    --
    This truth probably doesn't come as shocking news to any of you,
    and if it does then you're stupid and I hate you.
    - Everything Can Be Beaten -

  • by gruhnj ( 195230 ) on Wednesday May 05, 2004 @07:48AM (#9061939)
    From Microsofts Website,

    Microsoft has verified that the worm exploits the Local Security Authority Subsystem Service (LSASS) issue that was addressed by the security update released on April 13

    I work for the US Army. We knew about this way before the patch came out just by monitoring bugtrack. Less than 72 hours from the bug being confirmed by our service CERT, we firewalled access to this kind of thing. The patch was confirmed for deployment almost 48 hours after the patch became available. If it was not deployed 96 hours after the order, we shut the node down until we can confirm its patched and ready to rejoin the network. The impact of Sasser on our networks? Almost ZERO.

    All of our responce is coordinated by the US Army CERT (ACERT). Where did the British Coast Guard equivelent do? Is there such a thing? This is preventable, especially given the time from patch to exploit. Its not like this sprang up overnight. Even then, dont they have a team that monitors this stuff and has authority to order massive disconnet? It seems that MS is not at fault, the British CG CERT failed them here. If they did try to prevent this, what failed them? Anitvirus? Admins who failed to patch? Lack of informing them downrange?

    SPC Gruhn
    TNOSC-K, Systems Management Branch
    1st SIG BDE
    "First to Communicate!"
  • by ajs318 ( 655362 ) <sd_resp2@earthsh ... .co.uk minus bsd> on Wednesday May 05, 2004 @08:15AM (#9062116)
    Don't blame the script kiddies for this. They are just kids, after all ..... kids are by nature explorers and experimentalists, and this is pretty much hard-coded into the human firmware.

    It's like placing a coin on a railway track to see what happens to the Queen's face when a train runs over it, and ending up derailing the train ..... an unfortunate consequence, not one that could reasonably have been foreseen by the "perpetrators" {all manner of crap already gets blown around railway lines, what difference does anyone suppose a coin will make?} but one that should have been taken into account by the implementors of the system. If the train makers can't be sure that a coin on the tracks won't derail their trains, then the trains are no good. What if a bird eats a berry, then shits the seed out and it lands on the track and that derails a train? Do you blame the bird? Blame the owner of the hedge the berry was growing on? Or do you blame the person who designed a train so badly that an object on the track would throw it off altogether?


    This is an excellent opportunity to sow seeds of change. Open people's minds to the possibility that there might be an alternative to Windows. Ask questions. Did they know there were vulnerabilities? Well, did they not look at the source code? [the what?] The source code -- you know, the human-readable form of the code that can be examined and modified. What scrutiny did you subject the source code to? [but that's a secret!] What -- you bought a locked box that you knew you weren't going to be allowed to look inside, and you didn't get even the tiniest little bit suspicious that somebody might be trying to hide something from you?

    Every piece of food you buy is clearly labelled with a list of the ingredients. {this was actually used in an anti-drug propaganda advertisement in the mid-1990s, till some bright spark suggested that surely legal drugs would be properly labelled and the problems caused by not knowing what was in pills and powders were merely a side-effect of prohibition}. The analogy between Microsoft and Tom Lehrer's Old Dope Peddler [aol.com] is a strong one. Give out free samples {educational licence discount}, get people hooked {file format lock-in}, watch the little puppets dance to your tune.

    For my part, I have pledged never again to work with Windows, ever. At all. The only repair I will ever again do to a Windows box is to install Linux on it -- barring that, I will simply unplug the power cable, leave it unplugged and consider that an improvement. The time has already come when I would sooner forego a computer altogether than touch Windows.
  • by robsky ( 28877 ) <robsky @ x s 4 a l l . nl> on Wednesday May 05, 2004 @08:20AM (#9062139)
    Microsoft.nl can't cope. This is the error message I just got when I tried to get to their website. Perhaps they haven't patched?

    Server Error in '/' Application.
    -

    Procedure or function TrafficInsert has too many arguments specified.
    Description: An unhandled exception occurred during the execution of the current web request. Please review the stack trace for more information about the error and where it originated in the code.

    Exception Details: System.Data.SqlClient.SqlException: Procedure or function TrafficInsert has too many arguments specified.

    Source Error:

    An unhandled exception was generated during the execution of the current web request. Information regarding the origin and location of the exception can be identified using the exception stack trace below.

    Stack Trace:

    [SqlException: Procedure or function TrafficInsert has too many arguments specified.]
    System.Data.SqlClient.SqlCommand.ExecuteReader(Com mandBehavior cmdBehavior, RunBehavior runBehavior, Boolean returnStream) +723
    System.Data.SqlClient.SqlCommand.ExecuteNonQuery() +194
    Microsoft.Nl.Redirect.RedirectHttpHandler.LogTraff ic(Int32 siteID, Int32 redirectID) in c:\data\project\ms-cmo\redirect\redirecthome\redir ecthttphandler.cs:225
    Microsoft.Nl.Redirect.RedirectHttpHandler.ProcessR equest(HttpContext context) in c:\data\project\ms-cmo\redirect\redirecthome\redir ecthttphandler.cs:158
    System.Web.CallHandlerExecutionStep.System.Web.Htt pApplication+IExecutionStep.Execute() +179
    System.Web.HttpApplication.ExecuteStep(IExecutionS tep step, Boolean& completedSynchronously) +87

    -
    Version Information: Microsoft .NET Framework Version:1.1.4322.573; ASP.NET Version:1.1.4322.969
  • by reality-bytes ( 119275 ) on Wednesday May 05, 2004 @08:25AM (#9062169) Homepage
    Weight and Balance is an extremely critical factor for flight safety. Even the largest airliners must have carefully controlled weight-distribution to avoid the CofG going 'out of bounds' during various stages of flight (including different trim and fuel states).

    Some examples from the British AAIB archives:

    12 Jan 1999: Fokker F27-600 crash nr Guernsey. [dft.gov.uk](load moved)

    18 Sep 1996 Boeing 737-4Q8, G-BSNW [dft.gov.uk] (Uncommanded roll due to incorrect fuel balance).

    18 June 1972 Trident G-ARPI crash after takeoff at Heathrow [dft.gov.uk] (Weight and Balance as a contributory factor).
  • Re:He should be (Score:2, Interesting)

    by jadenyk ( 764614 ) on Wednesday May 05, 2004 @08:38AM (#9062245)
    I think that MS should be held accountable, but only by the consumer. To use your door example, if I buy a door and I have to constantly monitor the thousands of locks on this door to make sure they don't open by themselves or fall out of the door, etc., then, when I finally turn my back to go down to the store and grab a dew, I come home to find my house empty and my door wide open, even though all of the locks are still locked. (The manufacturer calls it a "feature.") I don't know about you, but I wouldn't buy that door again. I'd go buy a different door.

    Too many people get hit with these worms, have their systems fall completely, just to recover, update Windows and carry on as normal. Then, in another year or so, the next major worm comes out and they have to do it all over again.

    There's too many people who use 'doze simply because it's "easy" and, probably mostly, "because everyone else is doing it..." I mean, if seeing these virus warnings on the news isn't enough to make people think "hmmm, when's the last *nix/Mac virus I heard about" and maybe actually look into it, I don't know what will work.

    Maybe when Bill Gates finally grows the horns and starts talking in toungues [tinet.ie], people will get the hint.

  • Re:we should be (Score:3, Interesting)

    by Phragmen-Lindelof ( 246056 ) on Wednesday May 05, 2004 @08:40AM (#9062263)
    This sounds like the argument "Well, our tires do tend to blow-out at high speeds but why should we be held responsible? The EULA which comes with our tires specifically says that we are not liable for any damages and you agreed to our EULA by using our tires."
  • by TheMESMERIC ( 766636 ) on Wednesday May 05, 2004 @08:45AM (#9062307)
    I posted a comment on BBC website - maybe its bad luck, but they *never* post my comments :(

    Nevertheless some guy wrote this:
    "Anyone that thinks Linux or Apple Macs are invunerable to viruses and worms really need to wake up and smell the binary. There are just as many flaws in Linux systems as Windows, and there are many Mac based viruses. There are also java-based attacks that can affect many different types of system. The only real answer is to get a firewall and antivirus system, and learn how to use it!"
    Steve Lake, Reading, UK
    My reply to that (unposted) was that it would be very difficult for a worm/virus to propagate under Linux. Specially if all "servers" are switched off. Simply because Linux is the opposite of Windows - there is no homogeneity .
    With Linux we have:
    • Different Kernel versions (2.2,2.4,2.6), patched versions, hardened versions
    • Different commercial and free distributions (Red Hat, Mandrake, Gentoo, Debian, Slackware).
    • Different packaging managers (rpm,apt,yum,portage,or none build from source code)
    • Different set of libraries (XFree w/wo Nvidia acceleration,gcc, all with different versions)
    • Different Window-Managers (none just console,fvwm,FluxBox,Gnome,KDE,Enlightenment)
    • Different mail-client - if we are assuming a mail-enabled virus here - (mutt,pine,sylpheed,evolution,kmail,web browser-clients)
    And that is a small list of the differences between my Linux and someone else's. Soon we might have even different alternatives [y-windows.org] to X-window itself. Of course most seem to have Mozilla, so some common denominator is emerging. But I think most people don't use the email client (and address book).
    Any biologist would reinstate that if you have a species which is highly homogeneous (and the analogy here is Windows-XP) it is in great danger of being wiped out to extiction by some common plague (worm/viruses). The thing most people hate about Linux - is what protects it from widespread attack (dependencies,lack of homogeneity)

    Linux makes you more security-aware anyway. It endorses/teaches that practice instead of you just setting your (often innefectual) "Windows-Update" on auto. Ok there is no such thing as a 100% secure system, but there is something at least 10x more secure than Windows: Linux

    For how much longer are you Window users going to put up with all this?
  • by arivanov ( 12034 ) on Wednesday May 05, 2004 @09:04AM (#9062450) Homepage
    Err... Who told you that the UK coast guard is a safety critical system? Who actually told you that they do anything besides wasting public money?

    All the real work is done either by RAF or by volunteer lifeboats which do not get a single penny of government money. Frankly, I find it shamefull and disgusting that a country in the big 8 wich is also an island is incapable of even financing its lifeboat crews.

    So frankly, if someone will wipe off the coast guard completely noone will notice. Emergency services have direct lines to the RAF anyway, and most of the lifeboat crewes are listening on the SOS frequencies as well.
  • personally (Score:2, Interesting)

    by stewwy ( 687854 ) on Wednesday May 05, 2004 @11:11AM (#9063839)
    As someone who might at some time need the coastguard ( I boat a lot ) I say hang 'em high, both the virus writter and the idiot who didn't patch, and while your at it, the moron who specced the system.
    Its not the fact that MS is any worse than linux software for bugs etc. BUT it is more at risk from virus attack so, all things being equal, the lower risk strategy is to pick Linux or similar in such a mission critical application.


    A bit off topic, but a week or so ago there was a reality tv prog showing the coastguard/RNLI (RNLI is our volunteer rescue service for those not in the UK ) and some stupid moronic woman was hogging the rescue and calling channel 'for a laugh' these people should be removed from the gene pool too. ****RANT OVER****
  • Re:we should be (Score:4, Interesting)

    by Jim_Maryland ( 718224 ) on Wednesday May 05, 2004 @12:45PM (#9064956)
    I wasn't meaning to imply that MS shouldn't be blamed for the problem. Just trying to point out that even with a good patching solution, even the best ones will fail if the system admin doesn't apply them.

    MS should bear the blunt of the blame. For as much revenue that is generated by their products you would expect them to have a better product by investing into it. By no means though is MS the sole bearer of the blame. The organization that chooses to use the OS and the administrators that don't keep up with the OS maintenance also share some of this responsibility.
  • Re:Sasser FUn! (Score:2, Interesting)

    by DrDebug ( 10230 ) on Wednesday May 05, 2004 @01:10PM (#9065230) Journal
    Why does Microsoft ship OS software with so many ports open in the first place? Most people who buy computers are not all that computer savvy, and have no idea what a port is. But the security people want these same computer-halfliterates to close those ports.

    If you know what a port is, then it is just as easy to open a closed one then to close an opened one.

    What we need is an on-computer port-monitor service that scans every port on the machine while it is not otherwise busy. It should report to the user any opening of any non-solicited port, and identify the source program that asked for that port to be opened. Of course, the port-monitor should be configurable by the savvy user to skip over ports that the user may want to use.

    Just my 2 cents.
  • Re:we should be (Score:2, Interesting)

    by Lobster Cowboy ( 605052 ) on Wednesday May 05, 2004 @01:11PM (#9065243)

    no no no...

    this isn't microsoft's fault. they aren't purposely trying to create an insecure platform. WHY would a company that wants to make money even consider that? why don't you try building a product the scope of windows, and make sure its 100% airtight?

    it also isn't the fault of system admins. despite the grumblings of many /. users, microsoft makes legitimate server software, and using it is not necessarily a bad thing. it has its strengths and weakness just like *nix and linux.

    how 'bout we blame the real culprit, THE VIRUS WRITER. you make it seems as if microsoft was paying this pimple-faced kid to make this thing. this guy/gal created this worm of their own volition. it was their CHOICE. to blame MS and sys admins is like giving this person a free pass. place the blame where it belongs--on the malicious little shit who wrote and distributed it. when they sat down to make sasser, they weren't doing it for noble reasons, they were doing it to be dicks.

  • www.if.se (Score:3, Interesting)

    by haeger ( 85819 ) on Wednesday May 05, 2004 @02:42PM (#9066200)
    That's another company that was struck by Sasser. Nothing worked for a little over a day there. I wonder if these things are counted in the TCO of owning windows...

    The company is one of Swedens largest insurance companies, it's called "IF" [www.if.se] and I think I'll change to a company that has their shit more in order.

    .haeger

"May your future be limited only by your dreams." -- Christa McAuliffe

Working...