Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Security IT

Is Your OS Tough Enough? 597

LE UI Guy writes "A Denver Post article examines the Internet 'horrors' Windows, Mac and Linux users face simply being connected to the Internet with only an out-of-box configuration. Over the course of a single week the machines were scanned 46,255 times. The test didn't look into additional security threats caused by surfing the web or reading e-mail, just the connection itself."
This discussion has been archived. No new comments can be posted.

Is Your OS Tough Enough?

Comments Filter:
  • Yet again... (Score:5, Insightful)

    by rpbailey1642 ( 766298 ) <<moc.liamg> <ta> <ttarp.b.trebor>> on Tuesday March 01, 2005 @12:47AM (#11809878)
    I'm not that surprised, but Windows was the least secure. It should be noted that XP SP2 was installed and then the updates were applied "automatically" while none of the UNIX-ish systems had updates installed, just what came on the CDs. I know, competent admins can make any machine secure, but I wonder how MS can sleep at night knowing that their users are at such a high risk, even if they don't DO anything.
  • by Ars-Fartsica ( 166957 ) on Tuesday March 01, 2005 @12:48AM (#11809880)
    Look at all of the software and services running on a modern linux distro - FC3 for example. I have spent a great deal of time shutting off everything I really don't need and erasing piles of useless rpms installed by the distro (its 2005 - I don't need talk). Any software you don't use or services you do not need are just potential security holes.
  • Lame article. (Score:5, Insightful)

    by Seumas ( 6865 ) on Tuesday March 01, 2005 @12:48AM (#11809882)
    Just because people can knock on every door doesn't mean that every door is as insecure as the next. You can knock on every door in a neighborhood, but some will be better constructed and have more secure locks. Still, none prevent one from knocking.

    If they're only tracking ping/scan attempts, there is no reason to even include mac/linux in this.
  • Yeah (Score:5, Insightful)

    by elid ( 672471 ) <eli.ipod@[ ]il.com ['gma' in gap]> on Tuesday March 01, 2005 @12:49AM (#11809886)
    I don't think end users can be trusted to protect their computers. At a minimum, providers of Cable and DSL should make customers use modems with built-in NAT/firewall.
  • RTFA (Score:3, Insightful)

    by jleq ( 766550 ) <[jleq96] [at] [gmail.com]> on Tuesday March 01, 2005 @12:51AM (#11809899)
    And I quote:

    Windows XP Service Pack 2
    Attacks: 16
    Results: Survived all attacks

    Windows is *obviously* attacked more, simply because it is the most popular operating system. If I was a malicious coder, why would I want to spend time writing code that would only attack the 10% of computer users not running windows in the first place? It's simply more logical for those evil people to write software that attacks Windows... secure or not secure, it's going to be the primary target until it loses it's market dominance.
  • Comment removed (Score:5, Insightful)

    by account_deleted ( 4530225 ) on Tuesday March 01, 2005 @12:53AM (#11809910)
    Comment removed based on user account deletion
  • by chrisbtoo ( 41029 ) on Tuesday March 01, 2005 @12:58AM (#11809940) Journal
    "SP 1 is not a current operating system," said Sundwall. "It doesn't surprise me that it only took 18 minutes to get infected."

    Ah, but would it have surprised him when it was still current? ISTR that back then, the time was a far more robust 20 minutes.
  • by Anonymous Coward on Tuesday March 01, 2005 @01:00AM (#11809950)
    They claim that they used a computer right out-of-the-box, right? When did they do this little test? It says near the bottom they used Mac OS X Jaguar! Apple hasn't sold a Mac with Jaguar installed for over a year! Not saying that Jaguar was insecure, but doesn't it seem odd that they'd use SP2, (which came out only a couple of months ago) and use an older release of a Mac OS?

    Just seems a little unfair, that's all... (bahaha! Jaguar less secure than SP2!?! What am I thinking!)
  • SP1 Earns a pass? (Score:5, Insightful)

    by salemlb ( 857652 ) on Tuesday March 01, 2005 @01:04AM (#11809965)
    According the article, no one was all that surprised Win XP SP 1 went down in 18 minutes. After all, it is not up to date... it is essentially an old OS, right? So this is expected, right? Old OSs should be broken into, right? And then we have OS X 10.2, aka, Jaguar. No successful attacks. Older OS, check. Not up to date with all the latest security features that are in Panther, check. And not one successful attack. One company makes on OS that still stands after two and a half years... one company makes an OS that only stands after a major major major patch and constant updates that sometimes break software. Now, which company's OS would I choose to build a secure network? Sure, it's a flawed argument, but still I think worth noting.
  • Ixna (Score:2, Insightful)

    by WindBourne ( 631190 ) on Tuesday March 01, 2005 @01:06AM (#11809977) Journal
    First, comcast (with qwest be the 2'nd to last) is one of the last companies that I would trust. 2'nd, I do not use a NAT/firewall from the outside. I have several exposed boxes that do great jobs year after year. The last thing that I need is for a bunch of screw-ups to tell me how to run a secured system. As to all the insecured boxes out there, they can switch to Apple, Linux, or BSD. They do not have to be running windows.
  • firewall.. (Score:5, Insightful)

    by Cryptnotic ( 154382 ) * on Tuesday March 01, 2005 @01:06AM (#11809980)
    First of all, you should be behind a firewall that disallows incoming connections to almost everything. Even if you're not, FC3 has a kernel firewall enabled that blocks just about everything.

    As for the packages, who cares if they're just sitting on your HD taking up space?

    For a server machine "outside the wall" it's important to keep things as lean as possible. But for your desktop machine, who cares?

  • Re:RTFA (Score:5, Insightful)

    by geminidomino ( 614729 ) * on Tuesday March 01, 2005 @01:19AM (#11810031) Journal
    If I was a malicious coder, why would I want to spend time writing code that would only attack the 10% of computer users not running windows in the first place?

    IIS vs. Apache seems to deny this conclusion.
  • Re:RTFA (Score:2, Insightful)

    by pixelgeek ( 676892 ) on Tuesday March 01, 2005 @01:19AM (#11810032)
    -- If I was a malicious coder, why would I want to spend time writing code that would only attack the 10% of computer users not running windows in the first place?

    Well if Windows was secure then you would.

    It doesn't matter how popular an OS is. If it is riddled with holes that scammer can exploit to create DDoS or spam zombies then they will.

    Regardless of the marketshare. 15 million Mac boxes would still be a tempting target for these people if there was a known security hole they could exploit. The same with Linux, Redhat or any other OS you care to mention.

    Windows gets hit with these worms and virii simply because of the inability (or lack of concern on the part) of Microsoft to patch their OS...not because of any market share numbers
  • Re:Yet again... (Score:3, Insightful)

    by megarich ( 773968 ) on Tuesday March 01, 2005 @01:21AM (#11810039)
    What bothers me with windows is home use. You know how many home users are out there WITHOUT the latest patches becaue they don't know any better.

    My friend had to reinstall his parents computer because it was too infested with virus/spyware and I had to yell at him to put on sp2 which he still didnt do because it wasn't showing up on windows update or something like that.

    People with older dell systems pre sp2 just don't know and that scares me.

  • Re:RTFA (Score:3, Insightful)

    by azav ( 469988 ) on Tuesday March 01, 2005 @01:25AM (#11810051) Homepage Journal
    The article does mention how the vulnerable the mac was out of the box.

    3 attacks, no compromises, right out of the box.
  • by The Master Control P ( 655590 ) <ejkeeverNO@SPAMnerdshack.com> on Tuesday March 01, 2005 @01:25AM (#11810052)
    If you're gonna put your system on a direct connection to the internet, you should use a secure operating system. And implicitly, if you want that operating system to go more than 2 months between r007ings, you should lock it down.

    Nothing us geeks don't already know. Anyway, I can belive 6 systems got attacked 40 thousand times in one week. I check my own system logs often enough, and there's usually some inbound packet on a disallowed port dropped every 10 to 40 minutes. Usually two or more attempts or blocks of attempts to login via ssh every day. Probably 10+ malformed GETs a day in the Apache logs. And this is my little residential gateway that gets about 4 legitimate hits to it's Apache server (which I'm not supposed to run) per day. That's about 250 attacks per week per server, or close to 1500 for 6. Take a website with non-trivial traffic, and it's easy to reach 40K/week. Since I'm pretty sure that DenverPost.com gets more than 25x my traffic, I'm suprised it was only 40K.

    Other than saying that a lot of shit flies around the internet, the article was very skimpy on details. Not suprising, since an article that explains what a 'worm' and a 'virus' is is obviously not aimed at 1337 geeks. But it would have been nice to know what's installed on them.

    For example, was it a full server install of Linux? (CUPS, httpd, ftpd, ntp, ssh, sendmail, etc?) Or just a minimal install with no server software installed a la home Windows? Quite a difference. How long would either of the Windows machines have lasted if they'd had Microsoft's server software installed too? Check secunia.com for Windows XP home, IIS 6 [secunia.com], or SQL Server [secunia.com] - It seems that ~1/4 of the known security holes in Microsoft's software are always unpatched. Contrast that with Apache, proftpd, Mysql 4, cups, OpenSSH, and Sendmail, which on Secunia currently share 10 vunerabilities between them all (9 of them 1/ or 2/5 for severity, and one 3). Of the 3 tested Linux OSes, Red Hat 9 has one not-critical vunerability listed.

    It is certainly possible to make a Windows server or desktop reasonably secure, but compared to comparably securing a Linux server or desktop, would seem to require a monumental effort. And it's not just that Linux is more configurable - The FOSS community (judging by open holes) has done a far better job patching their software than MS.

    Well, off to overdose on the Numa Numa Dance...
  • by Anonymous Coward on Tuesday March 01, 2005 @01:25AM (#11810054)
    NO ONE stops to think that there's just millions more Windows computers out there? Windows got the most attacks because there's MILLIONS more potential sources of attack. Those millions more units mean it's more worthwhile to hack Windows, because there's tons more systems at stake. So, a majority of hackers on the web are working on a base of computers whose OS absolutely dominates the marketplace.

    I wonder why it tends to be "less secure" in the end... GET A CLUE! This test barely reflects anything other than Microsoft's market share, no matter how hard you want to tilt it in your own direction.

    Not to mention the line "The good news is that none of the up-to-date, patched operating systems succumbed to a single attack." That. Includes. The up-to-date. Windows box. Too. Which suffered LOTS more attacks (again, more units, more at stake) and withstood them all- meaning it was technically MORE secure because it withstood harsher testing and came out unscathed.
  • Re:Lame article. (Score:3, Insightful)

    by Ridgelift ( 228977 ) on Tuesday March 01, 2005 @01:25AM (#11810056)
    Just because people can knock on every door doesn't mean that every door is as insecure as the next. You can knock on every door in a neighborhood, but some will be better constructed and have more secure locks. Still, none prevent one from knocking.

    You're right, but it's a fluffy piece targeted at your mom and her friends, not you and me. The fact that this sort of stuff is getting into the news is a good thing. I'd say more than 90% of all Windows users are not protected properly, and they don't really care. Keeping your computer up-to-date is about as high priority as is changing the filter on your furnace.

    It's a computer - it should be the job of the operating system to protect itself. It isn't, but it should be.
  • Re:Lame article. (Score:3, Insightful)

    by Jedi Alec ( 258881 ) on Tuesday March 01, 2005 @01:29AM (#11810072)
    Just because people can knock on every door doesn't mean that every door is as insecure as the next. You can knock on every door in a neighborhood, but some will be better constructed and have more secure locks. Still, none prevent one from knocking.

    Well, I could think of a *few* things...how about a gate to prevent access to the premises itself? (it's not like a little 4 port NAT/router/firewall is expensive these days). Especially for Joe User who doesn't need all sorts of ports open since he's only browsing and emailing anyway it should work fine, things get a little more complicated if you want to get into gaming, but then again, the kids will likely know which ports to reroute.
  • Life on the edge (Score:3, Insightful)

    by erwin ( 8773 ) on Tuesday March 01, 2005 @01:31AM (#11810084)
    first, I didn't RTFA, but I wanted to relate our exprience at a recent technology conference my employer hosted. The names of the guilty/innocent have been scrubed to keep this post from being moderated into Flamebait.

    Part of the conference was a series of hands-on labs that we were hosting using loaner equipment from major manufactures. The network was provided my a major ISP through a national hotel (where this part of the conference was being held).

    The labs were assembled by volunteers, and were pretty much infected beyond use with spyware and viruses within about 10 minutes of coming online. It was the worst thing I'd ever seen. We had 20+ people scrubbing the machines off-line for literally HOURS, only to have them reinfected once they came back online (now behind a firewall).

    To compound the issue, we couldn't feasibly reimage the machines because the vendor donating them gave us at least 10 different models with 2-3 variations on each model.

    In the end we threw in the towel, refunded people's money, and let the Mac lab (which remained unaffected) continue their presentations.

    just my $.023233432322
  • Outdated Mac OS X (Score:1, Insightful)

    by HitByASquirrel ( 710289 ) on Tuesday March 01, 2005 @01:40AM (#11810129)
    If you notice, Jaguar (Mac OS X 10.2) was used in this test. This is an operating system that was phased out in late 2003.

    There's something to be said about that VS a windows PC with SP1 installed.
  • Re:Yet again... (Score:1, Insightful)

    by Anonymous Coward on Tuesday March 01, 2005 @01:51AM (#11810181)

    What bothers me with windows is home use. You know how many home users are out there WITHOUT the latest patches becaue they don't know any better.

    My friend had to reinstall his parents computer because it was too infested with virus/spyware and I had to yell at him to put on sp2 which he still didnt do because it wasn't showing up on windows update or something like that.

    People with older dell systems pre sp2 just don't know and that scares me.

    While users not knowing is part of the problem there's another aspect: Those that know but refuse to do. You friend is a prime example. It's not just ignorance that's the problem.
  • Re:Of course (Score:5, Insightful)

    by Mistlefoot ( 636417 ) on Tuesday March 01, 2005 @02:01AM (#11810224)
    The fact is.......

    that anyone selling a box online without putting the most recent patches on the operating system provided should be shot. At a bare minimum making certain that reasonable measures are taken like some sort of firewall and an OS updater running OR a caveat to the buyer should be required.

    Putting a box with almost 4 year old unpatched OS is stupid and should not have been included in the test. To include the original XP and not lets say RedHat 7 for example shows a bit of a skewed results.

    Windows is already more prone to attacks. There really is no need to offer the original XP in the story EXCEPT to show users how imnportant it is to patch after a format or system recovery.
  • by Spoing ( 152917 ) on Tuesday March 01, 2005 @02:03AM (#11810229) Homepage
    1. Look at all of the software and services running on a modern linux distro - FC3 for example. I have spent a great deal of time shutting off everything I really don't need and erasing piles of useless rpms installed by the distro (its 2005 - I don't need talk). Any software you don't use or services you do not need are just potential security holes.

    While I agree, I was stunned looking at the results of a Nessus scan (default) after completing a default install of Solaris on Sparc (E450). Wow. 9 known security holes and a bunch of services on by default and listening on open ports.

    Sure, it's not Windows-bad, though it wasn't what I expected in the latest revision of Solaris (I've used a previous version of SunOS and have installed Solaris 8 & 9 on both x86 and Sparc hardware). Fedora Core does a much better job by default -- though I agree FC3 needs to be purged to make it clean and fully trustworthy.

  • um, it seems like gentoo has shielded you from the world of actually compiling software yourself... if a program can use alsa, but you don't have it, chances are, there is a --disable-alsa switch in the ./configure script. It's not all that difficult to throw commands... Sure, emerge something sounds nice and all, but what do you really learn? A lot of gentoo folk claim that they 'learn' a lot about linux during the install... I think that this is more along the lines of "they learn about gentoo" more than anything else.

    With fedora, it should take less than two minutes to disable the services that you don't need either through the System Services gui, or through the chkconfig command. Why the above poster even bothers removing packages (unless he has drive space constraints) is beyond me. And I have found that You will spend alot more time fixing a redhat system. is pure B.S. Care to elaborate on that a little bit, back it up with some real-world situations? up2date... with a good mirror, I have all the latest and greatest security patches in 1/50th the time it takes you to recompile all of your packages. Wanna upgrade my distro? Point yum to the new repository... 1/2 hour, done. Over the course of a year, it is obvious that gentoo requires a lot more work than a package based distro.
  • Riiiiiiiiiight.... (Score:4, Insightful)

    by theantix ( 466036 ) on Tuesday March 01, 2005 @02:08AM (#11810250) Journal
    Microsoft's leadership position means that more viruses are written for Windows, said Silver, who estimates that 96 percent of all desktops and laptops worldwide used Windows at the end of 2004.

    So Microsoft get's a pass on viruses because it is popular and has a lot of software written for it? And then those same people use the amount of software available for MS Windows as a reason why Windows is superior. You can't have it both ways: if you think Windows has an advantage because of a larger application base you have to include the malware applications like viruses and spyware as well.

    You could wrongly argue that when Linux has a larger installed base it will have the same problems as MS Windows. But even if that were true, it's new popularity would mean that more commercial applications like Photoshop would be written for it also. The blade turns both ways for better and for worse, yet MS Windows apologists try to claim the best of both worlds.
  • Re:RTFA (Score:3, Insightful)

    by jrockway ( 229604 ) * <jon-nospam@jrock.us> on Tuesday March 01, 2005 @02:10AM (#11810256) Homepage Journal
    I think that makes the numbers MORE meaningful, not less! If the big sites are all using Apache and not getting hacked (even though the incentive is high), then that means Apache is doing pretty well!

    Compare that to joe-average user who's unknowingly running IIS and getting hacked even there's no incentive for a hacker to 0wn him.
  • by billatq ( 544019 ) on Tuesday March 01, 2005 @02:32AM (#11810339)

    There should always be a router between any personal system and the Internet. Not a kludgy firewall/filter, mind you, but a simple NAT-translation router that puts your machine in a private address space. Hackers can't hack what they can't get to.

    Actually, that's not quite correct; take a peek at rfc2663: http://www.faqs.org/rfcs/rfc2663.html [faqs.org]. In a somewhat roundabout way in the security section (Section 9), it says not to use it as a "Firewall", but rather in conjunction with a firewall.

    The reason for this is that if someone spoofs an address in your nat range, it pass through unfiltered. Bottom line is to not rely on NAT alone for a firewall; always use it in conjunction with real filtering. Thankfully most consumer boxes will do this already, so it's practically a moot point.

  • Re:RTFA (Score:3, Insightful)

    by geminidomino ( 614729 ) * on Tuesday March 01, 2005 @02:32AM (#11810340) Journal
    It doesn't matter if Apache runs on things "other than Linux" (Thanks for pointing that out, BTW. Here I thought my Apache server running on FreeBSD was some kind of mutation). The point is that Apache is deployed wider than IIS, and yet is exploited less often, short circuiting the myth that the only reason MSFT software is owned so widely is because of greater deployment.
  • Re:Not News (Score:5, Insightful)

    by KevMar ( 471257 ) on Tuesday March 01, 2005 @02:34AM (#11810348) Homepage Journal
    Exactly, This does not tell us anything we did not know before. How many honeypot papers have told us this already.

    It is sad that the internet has become so hostile. At work I connected one of our servers to a connection on the outside of our firewall for some remote support (didn't have the VPN papers signed yet). The moment that I enabled the nic, the server informed me that the RPC Service has failed and the computer will shut down.

    I was foolish for not checking the patch levels. I assumed that someone else was on top of that. A mistake I will not make again. But home users have problems of their own. They don't know they have to keep it up patched. If I had my grandma running Linux, I would be the one patching it. What about converting all my friends and family to Linux. I would be so overwhelmed keeping each one current.

    As it stands, I format, install XP /w SP2, change their user accounts to limited access, install spyware detection, antivirus, leave the firewall and automatic updates on, and finally put firefox on the desktop.

    At the same time, I have to explain why XP is better than the 98 or ME that came with the computer, what SP2 is and why it takes so long, what a firewall is, what firefox is, why I created a special admin account for them to install stuff with and why the should never surf the web while logged into admin with the red background.

    And if you are a slashdot regular, I am not telling you anything new. I should release this as a news story, but as we all know, this is not news. Its just the way it is.

    --
    Kevin Marquette [blogspot.com]
    antispyware [blogspot.com]
  • Re:Lame article. (Score:4, Insightful)

    by Meetch ( 756616 ) on Tuesday March 01, 2005 @02:35AM (#11810349)
    Still, none prevent one from knocking.

    Mmmm... sentry guns.

    But seriously (just a little OT), the response to a knock can be tuned easily enough:

    • Firewall. Your bouncer only lets in whoever he's been taught to trust. Or you can give it a guest list. Many broadband interfaces can also present a "false" front door thanks to IP Masquerading. Neither is 100% foolproof, but they do make life harder, especially for bulk tools used by script kiddies.
    • Silently DROP incoming SYN packets on unused ports. Like having a trapdoor under the doormat - what knock?
    • Something I liken to Neighbourhood Watch - at the first sign of a port scanner, broadcast to your friends and concerned neighbours of the attempt so they'll be wary of the stranger.
    • Use your own bot army to DoS the attempted intruder. Something like a Claymore on the doorstep?
    Then there's antivirus, groupware... the difference as I see it is the tools to do these are freely available with basically anything *n[iu]x*, while you tend to have to pay for a decent solution that runs on your favourite monopolistic vendor's OS. Not always, mind, but typically. Since I payed for XP (keeping it up to date), no software but games have cost me anything - AVG/OpenOffice/Mozilla + extensions/software that comes with purchased hardware... etc etc... it's pretty easy to meet license terms when you're not putting things to commercial use. This also means I'm not running any networked services publicly, so this box never accepts an incoming connection from the cloud.

    As for the stuff that does matter - web, database etc services... I leave that to my Linux box, running just what it needs to, and I take a little time semi-regularly to ensure it stays close enough to up-to-date. It hasn't let me down as yet (neither did FreeBSD while I was running that too), and this is year 13...

    Disclaimer: I don't know everything, but I know what ideas I like. And just because I like the idea, doesn't necessarily mean I implement it.

  • Re:RTFA (Score:4, Insightful)

    by innosent ( 618233 ) <jmdorityNO@SPAMgmail.com> on Tuesday March 01, 2005 @02:35AM (#11810350)
    You're almost right. XP SP2 may not have services available out of the box, but take the average user, and it will have services available. Most people with more than one computer will share a printer or files within their house. XP would recommend that they disable the protections for the SMB ports, which would open up virtually the entire system, since MS tends to use the services that listen on ports such as 135, 137-139, and 445 to do a lot of things, not just share files. Also, you're forgetting about what happens when people actually USE a system, like browsing the web or checking email. At that point, the security model of Windows simply cannot compete. Regardless of software issues (any software app can and will have security bugs), the OS should not allow a normal user to have system level access. IE is a system process, it has access to everything, so an IE bug expliot can do anything it wants. A bug in a UN*X app can only gain the priviledges of the person running it.

    So yes, for useless systems, Windows XP SP2 is right at the top, but if you're going to just install an OS and let the computer just sit there, never to be used, why pay $100 to license the OS?
  • Re:Not News (Score:3, Insightful)

    by Dizzle ( 781717 ) on Tuesday March 01, 2005 @02:35AM (#11810353) Journal
    My head asplode.
  • by spacecowboy420 ( 450426 ) * <rcasteen@NOsPam.gmail.com> on Tuesday March 01, 2005 @02:41AM (#11810371)
    Reread the post.

    Only windows propagates the viruses, and only windows gets them.

    No propagating virus etc has been written for *nix. Yet.

    No matter your level of objectivity, the FACTS speak loudest.
  • by CrackerJack9 ( 819843 ) on Tuesday March 01, 2005 @03:07AM (#11810444) Journal
    I'd recommend Snort or an IDS of some type. Sorting through the logs (pretty easy with some knowledge of them and sql commands) you could easy generate a count of a specific alert (port scans). I have a catch-all rule that looks for SYN packets and specify some specific ports as well.
  • by jd ( 1658 ) <imipak@yahoGINSBERGo.com minus poet> on Tuesday March 01, 2005 @03:11AM (#11810457) Homepage Journal
    This reminds me of the fuss over the Internet Auditing Project, six or seven years ago, in which it was revealed that something like 1:3 Unix systems was vulnerable to attack, across the entire visible realm of the Internet.


    The data collected was interesting, in that it did show that admins were way too lazy and complacent. However, the resolution of the information presented was too low to actually do anything useful.


    This is much the same. It is interesting, it does show the perils of negligence, but there are way too many variables and unknowns for this to be actually useful in preventing attacks.


    Did attacks vary with time? Did attackers fingerprint the OS' and then target Windows (explaining why there were fewer attacks on other systems) or did they target all machines equally but with attacks assuming a Windows OS?


    How were attacks counted? By what measure was something deemed an attack, as opposed to something accidental or incidental? (Broadcasts happen, guys, especially on something like cable where you've a shared line.)


    For that matter, was this using a shared line or something dedicated? What was the bandwidth used? Would the stats have differed, if there had been a greater capacity to handle the traffic?


    Although we're told this just dealt with machines "connected to the Internet" and not going to websites, that is not strictly the case. The Windows boxes did auto-updates, which means that they had transmitted data. If it was a shared line, or if there was a hacked machine en-route, the Windows boxes would have been visible and identifiable as Windows machines. The Linux boxes, transmitting nothing, would be much stealthier and therefore only prone to genuinely random scans.


    In consequence, what can we really conclude from this test? I would say nothing, unless it was re-run with Linux simulating calls to the Windows update system at Microsoft.


    If we saw an explosion of attacks, as a result, then we can argue that it is not Windows that attracts the assaults but the patching mechanism.


    There is a lot that COULD be learned, through rigorous controlled tests, but as this was neither rigorous nor controlled, I don't see that we learn anything other than the world isn't 100% safe. If the researchers didn't know that beforehand, I pity the researchers.

  • by Marran Gray ( 722447 ) on Tuesday March 01, 2005 @03:22AM (#11810504) Journal
    While I agree that it might have been instructive to include, say, RedHat 7 in the lineup, security of original XP is still an important consideration. First, to hear MS at the time, XP-SP1 should have been more solid then and should be more solid now. But far more importantly, we see how vital it is to fully patch your XP system before connecting it to the internet. And where do I get those patches from? Oops...

    The catch-22 is that time-to-infection is much shorter than time-to-patch for Windows XP, even with a contemporary internet connection. If you don't have SP2 media, and don't have some other means of (manually) acquiring the latest patches, you're dead in the water. Yes, there are workarounds; you can install some ice of your own before you connect, for that matter, but that obviates all the really neat security features of SP2 with a 3rd-party solution. "Not the solution he had in mind..."

    Admittedly, part of this is due to the fact that Windows is "productized", i.e. you have a box containing Windows and you can add patches. With Linux operating systems I think there's a lot more sensitivity to versioning and awareness of granularity; you aren't working on this monolithic thing in need of repair but on a collection of components which can be individually upgraded. Partly psychological, yes, but you also have the advantage of simply leaving out "risky" components until you can get everything up to date. You can run a Linux OS with no services, nothing particularly visible except the interface you're downloading updates through. That's not an option with Windows.
  • by martinoforum ( 841942 ) on Tuesday March 01, 2005 @03:37AM (#11810566)
    Oh, be quiet. I use Gentoo, but there's no sensible reason to think that Average Joe Gentoo is going to know more about linux security than Average Redhat Employee.

    Gentoo is not more secure, it just gives you the ability not to build stuff you don't want. That's entirely possible with other systems too, and the difference is that some of those (Fedora, for example) will set up a nice firewall etc before you get around to doing it yourself.
  • Re:Yeah (Score:3, Insightful)

    by vijayiyer ( 728590 ) on Tuesday March 01, 2005 @03:41AM (#11810577)
    Why should those of us who are responsible, don't use windows, and don't want NAT or a firewall be forced to use one? Thankfully, I have a provider who doesn't handhold me, block ports, or tell me that I can't use my connection for business. They give me my IP, and I pay for my bandwidth, they way it shoudl be. A better solution would be to cut off access to those who are perpetrating or supporting attacks. That includes people whose machines become zombies used in DDOS attacks, worms, etc. That would have the effect of only punishing hackers and people who are part of the problem (usually through stupidity).
  • Re:Of course (Score:4, Insightful)

    by RenatoRam ( 446720 ) on Tuesday March 01, 2005 @03:57AM (#11810646)
    What a silly question... most of the world is still on modem dial-up, and most of the people who have DSL (at least in italy) have USB ADSL modems, and a such they are directly on the internet just as well.

    Only tech savvy people know that there is a reason to spend double (but still as low as 40EUR AFAIR) to buy an ethernet modem/router. The other 95% will simply buy the cheapest (and crappiest) USB modem on the market. Or worse, they'll take the leased one from the telco: they specifically seem to choose the worst models :-)
  • by MrEcho.net ( 632313 ) on Tuesday March 01, 2005 @04:42AM (#11810766)
    1: Most windows users think its some kind of toy or fancy game console. no joke. Security to them is locking the front door if you know what I mean.
    Some of these people time to time MIGHT see something on TV about viruses, but other then that, they have no idea about patches.
    The flip side to that is the people the see the AOL tv ad's. I feel really sorry form them, and for us that have to fix there computer afterwords.

    2: Most of the "UNIX" community respects one another, and doesn't want to trash someone else's box "just for the fun of it".
    That and its a lot harder to "hack" it because there is a lot more of a diverse range of programs and version of those programs.
    The attack might only work for one version, but there is only a small percentage of computers out there that even run that version.
  • by Lisandro ( 799651 ) on Tuesday March 01, 2005 @06:07AM (#11811014)
    That's the sweetnes of the notorious USE flags in Gentoo. If you want Alsa support on your programs, add it to the USE flags; if it's not there, packages compiled that don't require Alsa functionality (i.e, have it as an option), won't have it - it might be, just like you describe it, with a proper switch at compile time. It's simple, sleek design, and it works wonderfuly. The guys who designed Portage deserve a lot of recognition, it's one of it's many treats.

    Also, the very nature of Gentoo (building packages from source) implies that you'll end up installing pretty much what you need, and what you need alone. I've found a lot of other distributions end up installing a lot of unneeded services on a default install - which is what the article discussed. My first Linux experience (early RedHat) was awful because of this - the default install had everything running, including Apache IIRC. My PII crawled.

    So, before the flaming begins. Yes, i like Gentoo. No, i don't think it's the ultimate Linux distro, and i don't think it's for everyone - for example, i wouldn't really trust Gentoo on a server. But what it does, it does damn well. It's not a popular distro only because you compile packages from source - there's a couple others that do the same.
    And yes, i've learned a lot from Gentoo. I learned a damn lot from Slackware as well - not because you compile, but because they force you to have atleast a slight idea of what you're doing. OTOH, you can install a modern release of, say, Mandrake, and use it pretty much as a Windows machine, zero issues. Not better, not worst. Just different.
  • by geordie_loz ( 624942 ) on Tuesday March 01, 2005 @06:20AM (#11811055) Homepage
    I agree that this is a secure thing. The problem is, nowhere does it tell a novice user that you should enable the firewall, connect to the net then, download patches, then you're secure

    The problem with the security is not that the machine can never be made secure, but that it starts out as a terribly insecure product. This is a problem. Most users are out of the box users. They have no understanding, so they don't know about the firewal etc.. They're told by MS that for security they need to patch using windows update. The point above is that this isn't actually that secure, and while this is happening a compromise can take place.

    The main issue here is the slack standards Microsoft use to get their products out the door, and their trade off of complexity to security. They are scared of treating their customers with intelligence, and educating them correctly about the actual process of securing and methods of attack (not necessarily at too technical a level) so good practices are used. For fear of confusing the users the XP SP1 firewall is off, and it's not the only software that has all the security off by default.

    If normal users understood that direct connections to the net were bad, they'd all buy routers, they'd consider firewalls, probably ones configured to block all but MSN, E-mail and web access, and we'd live in a considerably more worm free world.

    The OS may be securable, but it is not secure by default!. That is the problem, because most users don't do anything but the default (hence Explorer's 90% market share)
  • Re:Of course (Score:3, Insightful)

    by bdsesq ( 515351 ) on Tuesday March 01, 2005 @07:40AM (#11811228)
    And according to the Microsoft quote in the article SP1 is an out of date OS.
    After all the last one was sold at Xmas.

    How in the world can Microsoft say something they were selling two months ago is "out of date"?

    Of course the purchaser could turn the firewall on or get a hardware firewall. But they are helpless guppies who don't know any better. If they knew any better they wouldn't have been buying SP1 then.
  • by Anonymous Coward on Tuesday March 01, 2005 @07:59AM (#11811286)
    "One could make the case, in fact, that security holes are found in Windows more often because, as the bigger target, there are more people out looking for them"

    Perhaps it's not that Windows is a bigger target, just an easier one? Strange, that with full source code and documentation available, nobody has

    "...you stand to compromise a lot more Windows machines than Mac OS X machines, or Linux machines"

    Given the disproportionate number of Linux boxen hosting web sites & FTP servers (ref. netcraft) compared to market penetration, and the fact that most servers operate 24/7, wouldn't it actually be more efficient to use Linux machines to attack Windows?

    "Using Mac OS X (or any other OS) because it's attacked less often is another form of security by obscurity, and it's no security at all."

    Many of the attack vectors that exist in Windows simply do not exist in OS X or Linux. Those exploits are mostly due to poor decisions on MS's part (rushing to develop ActiveX rather than just sucking it up and using Java, for one example).

    "You are only (reasonably) secure if you run a patched box, regardless of OS."

    One of the major changes in SP 2 is closing unused ports by default; in other words, mirroring the default state of the Unixs. If the Unix security model is so poor, why is MS using it as their reference?
  • Re:Of course (Score:3, Insightful)

    by FireFury03 ( 653718 ) <slashdot&nexusuk,org> on Tuesday March 01, 2005 @08:07AM (#11811323) Homepage
    Putting a box with almost 4 year old unpatched OS is stupid and should not have been included in the test.

    I don't think it's stupid to do this, but it should only be done if you're doing the same with other systems. I find a lot of these honeypot test reports do not test comparable operating systems. What they should be including in the test is:

    1. Fully patched up Windows against fully patched up Linux
    2. Windows against linux, both patched to the latest patches that were around 3 months ago.
    3. Windows vs. Linux patched up to 6 month old patch level.
    4. 1 year old
    5. 2 years old
    6. 4 years old
    7. 8 years old

    By doing this you are comparing systems from identical eras (and yes, I think you do need to go to 8 years old, like it or not there are some morons who are using 8 year old unpatched systems... and also it'll be kinda interesting to see if they're actually still getting attacked).

    I do still think, however, that Linux will come out way less vulnerable than the windows from the same era for 2 reasons: 1. the userbase (or maybe the number of clueless users) is larger on Windows, so it attracts more cracks, especially (semi)automated ones. 2. Open systems tend to get patches released reasonably soon after an exploit is found whereas microsoft have a habit of leaving it until it's actually being exploited in the wild before releasing a patch - again, not much point in writing a worm for linux systems if 99% of them are already patched anyway.
  • Re:Of course (Score:4, Insightful)

    by FireFury03 ( 653718 ) <slashdot&nexusuk,org> on Tuesday March 01, 2005 @08:10AM (#11811335) Homepage
    How in the world can Microsoft say something they were selling two months ago is "out of date"?

    Yeah, I would say that the comments from MS themselves are pretty damning there - that they would expect an OS they were selling 2 months ago to be completely riddled with holes to the point that it's cracked within 18 minutes of being connected.
  • Re:I do it (Score:3, Insightful)

    by FireFury03 ( 653718 ) <slashdot&nexusuk,org> on Tuesday March 01, 2005 @08:18AM (#11811367) Homepage
    I can just tell you that having seen how many services are listening for connections from anywhere by default on a Win2k box, *I* would never want to plug one into the internet directly. And yeah, I know you can disable those services, but it would take a degree in rocket science to figure out which you need or don't need within a sane amount of time. (Turn off the wrong service and your box stops working right)

    The other thing is, I don't use any Microsoft products other than Windows itself, really. Third-party chat, Eudora for e-mail, Firefox and Opera for browsing, WordPerfect and OpenOffice for all the office-style needs, etc etc.

    I'm not seeing anything here that can't be done as well or better under Linux - why use Windows at all?
  • by gelfling ( 6534 ) on Tuesday March 01, 2005 @10:21AM (#11811988) Homepage Journal
    The article stated that MS will go on the offencive to 'get the facts out'.

    Hey Steve Ballmer - why don't you get a good fucking product out the door then you wouldn't have to spend a coupla hundred million bucks spinning shit into gold, now would you?

    Don't 'give me the facts' I know what the damn facts are. Just make Windows more secure. And here's a tip, Microsoft, just a thought....

    Instead of carrying on about the animated 3D Video crushing interface in Longhorn THAT IS ALREADY 2 YEARS LATE....Why don't you spend that effort on making Windows more secure?

    Or isn't that sexy enough for your PR guys. I swear you MS morons must go to sleep every night dreaming of new ways to be useless.

Kleeneness is next to Godelness.

Working...