Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Security Software Linux

UNIX Security: Don't Believe the Truth? 520

OSNews has an interesting editorial about security on UNIX-like systems. "One of the biggest reasons for many people to switch to a UNIX desktop, away from Windows, is security. It is fairly common knowledge that UNIX-like systems are more secure than Windows. Whether this is true or not will not be up for debate in this short editorial; I will simply assume UNIX-like systems are more secure, for the sake of argument. However, how much is that increased security really worth for an average home user, when you break it down? According to me, fairly little"
This discussion has been archived. No new comments can be posted.

UNIX Security: Don't Believe the Truth?

Comments Filter:
  • Re:Pointless (Score:3, Informative)

    by Dashing Leech ( 688077 ) on Monday February 06, 2006 @01:12PM (#14651629)
    And yes, I note that the article mentions Linux and OSX, but as I mention in the parent post, I would argue security isn't a big reason why people switch. It's just a bonus.
  • by TheRaven64 ( 641858 ) on Monday February 06, 2006 @01:21PM (#14651723) Journal
    While I agree with most of your arguments, I think that describing Oasis as a 'one-hit wonder' is a bit far from the truth [wikipedia.org]. Even I've heard of them, and it takes a lot for pop culture to penetrate my little reality-bubble.
  • He's just a kid (Score:4, Informative)

    by BlueQuark ( 104215 ) on Monday February 06, 2006 @01:26PM (#14651785)
    Thomas Halwedra is a young'in with very little real world experience and any practical experience. They kid is in college and has a bunch of machines at home. I think he takes an extremely simplistic view of windows and unix security.

    His 'OSNEWS' bio: http://www.osnews.com/editor.php?editors_id=11 [osnews.com]

    I was doing systems programming on UNIX BSD 4.2 Tahoe when he was born. :-)

    I am surprised that his article was even published/posted, I can't really even see his argument or what point is he trying to make. Oh that's right he's a 'managing editor' WTF?

    Back to work.

  • by CockMonster ( 886033 ) on Monday February 06, 2006 @01:27PM (#14651801)
    There's more to security than buffer overflows, and as for compilers, they can only do so much as buffers can be dynamically sized.
  • Re:Backup (Score:5, Informative)

    by arkanes ( 521690 ) <arkanes@NoSPam.gmail.com> on Monday February 06, 2006 @01:48PM (#14652040) Homepage
    The article, and most of the posters here, are missing an even more important point. There are very few viruses that just delete all your files anymore. The two major threats the PCs these days are spyware (a threat Linux has greater resistance to, because modifying plugins and such usually requires root permissions (with some exceptions, such as Firefox plugins - you're down to app level security there, on both platforms) and zombies to add your PC to a botnet, which Linux is more resistant to, again, because of not running as root. Yes, you have roughly the same level of resistance to "delete all your files" viruses, which are rare these days relative to the amount of "take over your machine as a botnet" viruses.

    All that, of course, is ignoring practical differences in the security history of the platforms and common applications, as well as the lower profile of Linux in terms of automated threats. Direct attacks (ie, someone is specifically attacking you) are just as much of a threat, and many distros are vulnerable to attacks in an unpatched state. Linux is *not* a panacea against threats (and only idiots portray it as such), but it is a very different threat profile than a Windows machine.

  • by dangermen ( 248354 ) on Monday February 06, 2006 @01:48PM (#14652047) Homepage
    Yes, it is a pompous headline but it's friggn true. I just spent two days on vacation at a relatives house cleaning spyware. 3 AV scanners, 4 spyware cleaners and there is still crap happening. Unix doesn't let you hide crap like that. Worst case I could boot a CD and do a scan as to eliminate kernel-based root kits. That same kind of effort is friggin prohibitive. There is something to be said for YUM and apt-get. I can very quickly assess the basic patch level of a box and ALL of its applications. Windows = Good Luck
  • reply to the author (Score:2, Informative)

    by paperdiesel ( 809538 ) on Monday February 06, 2006 @01:50PM (#14652081)
    I just sent this to the author of the article (slakje@osnews.com):

    I'm sure you're probably getting a ton of these emails, so I'll keep this (relatively) short:

    It's incredibly naive of you to say that because *nix users have full access to their user space, they are no more secure than on a windows box. Consider, for a second, how malicious software propagates itself on a user's system: The most popular methods include memory resident programs, overwriting system files and libraries, and the unwanted installation of software invisible to the user.

    On a standard windows box, those methods are trivial because the user runs in "root" space. On a standard *nix system, however, the user has no admin privileges whatsoever. So a malicious piece of software has much, much fewer options and means-of-entry in to the system to do its dirty work. Now, is a *nix box bulletproof? Certainly not. No one ever said it was. But by default, it's much harder to do real damage. The removal of the users coveted pictures, documents, etc has to be prompted by some piece of code. If it's much harder to implement that code on to the users machine, then yes, that machine is more secure. You're missing the bigger picture.

    Not to mention "security by obscurity", which simply points to the fact that windows users make up 80%-90% of the market, so the authors of the malware tend to target windows machines because they're a more target-rich environment.

    My point is, to simply say something like "acutally, no, unix is no more secure than windows" and not go in to any real, tangible detail borders on FUDD, and is exactly the type of press that potential coverts soak in.

    Thanks for nothing,
    Tim
  • by autopr0n ( 534291 ) on Monday February 06, 2006 @01:53PM (#14652114) Homepage Journal
    Windows does have a fairly intricate permission system, and you can setup non-administrative users just like you can in Linux. The only difference is, lots of old software expects to be run with administrative privileges, so if you want to run those things, you need to run as admin. The main reason people use windows is for backwards compatibility, but these days you can do most of your work in windows with a non-admin account if you want.
  • Re:Backup (Score:5, Informative)

    by pmjordan ( 745016 ) on Monday February 06, 2006 @01:56PM (#14652158)
    What I continually fail to understand is why everyone I know logs in as an Administrator under Windows, even after falling victim to a virus, spyware, etc. I don't necessarily mean the account with that name, having a personal user in that group amounts to the same thing.

    I'm a fulltime Linux user (4 years on the desktop, 7 years otherwise, so no veteran, and no newbie either) and I'd never even consider using logging in as root for any activities that aren't associated with system administration. (guess where "Administrator" comes from) Typing in the root password to install software isn't something I'd call a nuisance or even mildly irritating.

    The same thing is of course possible under Windows: Make your main login a 'Power User', or if you feel that's not safe enough, put it in a group with the same policies as the 'Users' group and slowly increase its permissions until you can work productively. (there are problems with debugging code and other niggles by default) Recent versions of Windows will prompt you for an Admin password for stuff your user isn't allowed to touch, although in some cases you have to explicitly right-click the link/executable and select 'run as'. I think there even are some utilities around to make the process even less painful.

    If you're doing extensive admin stuff, you can also log in as an Admin explicitly of course, and since XP you can switch between users quite easily without logging out.

    It always astounds me how incredibly adverse peoples' reactions are to this suggestion. Sure, it doesn't provide absolute security (ActiveX springs to mind) but that, together with frequent Windows Updates, an enabled WinXP SP2 firewall, and not using IE, I can't imagine you'll have a problem. You might be able to lose some data if you catch a virus, but you're very, very unlikely to bone your system. I do occasionally boot into Windows to play games (Cedega doesn't really work on ATI graphics cards) and I've never caught a virus or spyware, and I don't have an antivirus program installed, as they slow the system down to an infuriating degree IMO.

    ~phil
  • by tomcres ( 925786 ) on Monday February 06, 2006 @01:58PM (#14652185)
    Windows NT borrows and builds upon a lot of things that were in VMS. Microsoft hired the lead VMS engineer from DEC to head up Windows NT development. It seems kind of weird to allege that VMS is technically superior to Windows NT, when Windows NT was largely based on VMS and improvements that could be made upon VMS.
  • by slavemowgli ( 585321 ) on Monday February 06, 2006 @02:12PM (#14652342) Homepage
    Yes, still laughing, simply because "RAID" stands for "redundant array of independent disks". In other words, when you talk about a "redundant RAID array", you're talking about a "redundant redundant array of independent disks array", and that *is* redundant (doubly so, even), even though the "redundant" part of "RAID" is not always actually true.
  • by Greyfox ( 87712 ) on Monday February 06, 2006 @02:23PM (#14652461) Homepage Journal
    He does have a point, but it's an easy problem to address. Currently it's pretty easy to run potentially untrusted programs (Web browser, email clients, etc) as another user. Sure you still need to give them access to X, but they won't have direct access to your home files. I'd like to see this process made easy enough for a newbie user to be able to do it, and possibly even the default method of invocation of untrusted applications for the desktop distributions of Linux. If a distribution was doing it, the users who need it the most would never even know it was happening.
  • Re:Backup (Score:2, Informative)

    by Ultra64 ( 318705 ) on Monday February 06, 2006 @02:24PM (#14652476)
    Who has executable images?

    Anyone who has a computer.

    For Windows, .EXEs and .COMs are executable images. (Image does not always mean "picture").
  • Re:Backup (Score:5, Informative)

    by Scoth ( 879800 ) on Monday February 06, 2006 @02:25PM (#14652488)
    I recently had to flatten a friend's box and do a restore as it had a similar situation to a previous post - literally every executable on the system was infected with something. I set him up with all the usual security software, got it running, and then switched his user to Limited, made sure his business software still worked properly, and let him run. A week later he calls me back and tells me he's having more problems, and when I go back I find out he's put a virus'd exe attachment on the desktop from his e-mail and used the Run As to run it as the Admin.

    My point about all this is no amount of security or proper setup will prevent stupidity. Although this is a case where Linux/UNIX would suffer from the same problem. Social Engineering is still the greatest exploit out there, for any OS.
  • Re:Backup (Score:3, Informative)

    by Theatetus ( 521747 ) on Monday February 06, 2006 @02:31PM (#14652557) Journal
    Who has executable images?

    Users of software suites called "operating systems" and "filesystems". An "executable image" is a file (generally on disk) that is (more or less) an image of the program's initial state when it is loaded into memory. Users who are less careful with wording than GP often call them "executable files" (even though not all executable files are executable images), .exe's (even though not all operating systems do magic by file extension), or just "programs".

  • by khasim ( 1285 ) <brandioch.conner@gmail.com> on Monday February 06, 2006 @02:51PM (#14652772)
    http://www.windowsnetworking.com/articles_tutorial s/Running-Windows-Under-Non-Admin-Accounts.html [windowsnetworking.com]

    That starts you off on shares and setting the time/date.

    Do you want to know one of the coding practices lead to this problem?
    http://blogs.msdn.com/aaron_margosis/ [msdn.com]
    A common example is when an application saves its runtime settings to a registry key under HKEY_LOCAL_MACHINE (which is read-only to LUA users), instead of to HKEY_CURRENT_USER.


    You might want to spend some time looking up Powerpoint 2003, too.
  • by Hatta ( 162192 ) on Monday February 06, 2006 @02:59PM (#14652853) Journal
    If you had to choose between having a virus that both destroys your personal files and compromises your system or a virus that only destroys your personal files, which would you pick? He's making light of a very significant thing for most home users--a full wipe and reinstall of the operating system and applications. That's a day's work for your typical user, more if you have a bunch of programs you need to go hunting for.

    If you get hacked you need to reinstall your OS, no matter what. There's no way to know that the hacker didn't compromise the OS and leave a backdoor for him to get in again later. Unless you've properly configured an intrusion detection system.
  • by bloo9298 ( 258454 ) on Monday February 06, 2006 @03:15PM (#14653015)

    Ask and ye shall receive: Keith Brown's Hall of Shame [pluralsight.com].

  • by HermanAB ( 661181 ) on Monday February 06, 2006 @03:17PM (#14653031)
    if your time is worth nothing...

    I repair many of desktop and notebook machines. Three last week - this is Monday and I already have two machines waiting for this week. This is not my main business - people only bring me machines after other people already tried and failed to fix them.

    To fix a borked notebook PC and remove all spyware crap, takes 3 to 10 hours. Repairing a desktop takes 2 to 3 hours. The problem being that notebook PCs are slooooowwww, so the repeated scans take forever and Spyaxe and similar crapware requires multiple passes and multiple reboots with multiple scanners to remove. Consequently, I spend 10 to 20 hours per week removing crapware from Windows PCs.

    In contrast, I never have to remove crapware from Linux PCs and notebooks - they just keep working - chalk up zero hours to Linux repairs. This means that in practice, Linux is infinitely more secure than Windows.

    Nuff sed.
  • by carnifex0 ( 120168 ) <carnifex AT gmail DOT com> on Monday February 06, 2006 @03:18PM (#14653052) Homepage
    Windows:
    1. Click 'Start'.
    2. Go to Settings > Control Panel (or click on 'Control Panel' if using the XP menu)
    3. Double-click on 'User Accounts' and wait for applet to load.
    4. Click on account name.
    5. Click on 'Change Password' (or 'Create Password' if none is set)
    6. Type in current password (only if 'Change Password' was selected), new password, and again to confirm. Also type in a hint.
    7. It may ask if you want to make folders private. Choose yes or no.
    8. Close window. Done.


    See, that's strange, because all I do is hit CTRL + ALT + DEL, then click "Change Password". Enter the old, then the new twice and click "OK"

    No need to complicate things overly. And no need to compare the O/S's. each has it's place.

    I feel fairly comfortable with admining Windows.

    Maybe we've just discovered why so many Windows systems have problems.
  • Comment removed (Score:3, Informative)

    by account_deleted ( 4530225 ) on Monday February 06, 2006 @03:24PM (#14653117)
    Comment removed based on user account deletion
  • by mosel-saar-ruwer ( 732341 ) on Monday February 06, 2006 @04:06PM (#14653547)

    The article, and most of the posters here, are missing an even more important point. There are very few viruses that just delete all your files anymore. The two major threats the PCs these days are spyware (a threat Linux has greater resistance to, because modifying plugins and such usually requires root permissions (with some exceptions, such as Firefox plugins - you're down to app level security there, on both platforms) and zombies to add your PC to a botnet, which Linux is more resistant to, again, because of not running as root. Yes, you have roughly the same level of resistance to "delete all your files" viruses, which are rare these days relative to the amount of "take over your machine as a botnet" viruses.

    All that, of course, is ignoring practical differences in the security history of the platforms and common applications, as well as the lower profile of Linux in terms of automated threats. Direct attacks (ie, someone is specifically attacking you) are just as much of a threat, and many distros are vulnerable to attacks in an unpatched state. Linux is *not* a panacea against threats (and only idiots portray it as such), but it is a very different threat profile than a Windows machine.

    [PARENTHETICALLY: I'm giving up Mod Points to reply to you because no one else seems to want to make this point...]

    Every single thing you wrote would be true if you were to exchange the word "Windows" for the word "Linux" [and vice-versa].

    In fact, Windows has a vastly, almost prohibitively more elegant security infrastructure than "Linux": File rights of "Full Control, Modify, Read & Execute, Read, Write," file attributes of "Read-Only, Archive, System, Hidden," very finely-grained ACL-based system security "Policies", a global Kerberos-based directory authentication scheme in Active Directory, etc etc etc.

    "Linux" has rwx-rwx-rwx. That's it. [Now Linux combined with Novell Directory Services and a Novell File System would be an entirely different cup of tea, but that's a whole 'nother discussion. Although, I'd ask: Does Novell even have a "Policies" ACL-based security infrastructure for KDE or GNOME yet? Are they working on such a thing?]

    The reason that "people" [the great unwashed masses of the bell curve ten or twenty or thirty IQ points below geniuses like yourself] don't use Windows security is because SECURE SYSTEMS ARE A PAIN IN THE ASS and no one wants to be bothered.

    If Linux had 95% market share and you had retards surfing the web as "root" [just like the Windows retards surf the web as "Administrator"], then you'd be seeing the same damned thing with Linux that you see now with Windows.

    Maybe even worse.

  • by Floody ( 153869 ) on Monday February 06, 2006 @04:28PM (#14653784)
    In fact, Windows has a vastly, almost prohibitively more elegant security infrastructure than "Linux": File rights of "Full Control, Modify, Read & Execute, Read, Write," file attributes of "Read-Only, Archive, System, Hidden," very finely-grained ACL-based system security "Policies", a global Kerberos-based directory authentication scheme in Active Directory, etc etc etc.


    Complexity does not equal elegance. If you find yourself uttering something as foolish as "prohibitively more elegant", you've stumbled into that territory.

    "Linux" has rwx-rwx-rwx. That's it. [Now Linux combined with Novell Directory Services and a Novell File System would be an entirely different cup of tea, but that's a whole 'nother discussion. Although, I'd ask: Does Novell even have a "Policies" ACL-based security infrastructure for KDE or GNOME yet? Are they working on such a thing?]
    Indeed. It would appear that the world has moved on since you last looked at "Linux" in the 90s. POSIX 1003.1e/1003.2c access control lists: http://www.suse.de/~agruen/acl/linux-acls/online/ [www.suse.de].
  • by Anonymous Coward on Monday February 06, 2006 @04:36PM (#14653858)
    The author of the post was talking about c as a language that is responsible for alot of the buffer overlows. NT was designed with a vms like kernel but with the gui from os/2.

    Cutler quit a year or two later when it was still in alpha and called OS2/NT. A full operating sytem supposed to be integrated and have more than just a kernel. It needs a shell, libraries, user mood access, and applications. WindowsNT had neither and is poor.

    Scripting is a nightmare and its still not as terminal friendly as Unix or VMS. It was just a kernel with other things ported on top of it from single and cooperative multitasking environments klundged on.

  • by Proteus ( 1926 ) on Monday February 06, 2006 @07:14PM (#14655318) Homepage Journal
    "Linux" has rwx-rwx-rwx. That's it.

    That's simply false, unless for some stupid reason you're using an antiquated filesystem. There is full support for file-system level ACLs in Linux. For example, XFS [sgi.com] supports POSIX ACLs, and the SuSE folks include instructions on implementing POSIX ACLs in Linux (pdf) [www.suse.de] on a couple of different filesystems in their administration guide.

    It's not like this is particularly new, either. It's just that you aren't forced to use ACLs, and by default they are configured to be overridden by the traditional mode bits (which, by the way, are surprisingly more powerful in the hands of an expert than many people realize).

    Let's try to discuss actual shortfalls in Linux, rather than making them up out of ignorance, hm?
  • by Anti-Trend ( 857000 ) on Tuesday February 07, 2006 @01:33AM (#14657663) Homepage Journal
    "Define "haphazard". What filesystem and Registry permissions do you find strange from the perspective of running as a regular user?"

    Well, let me begin by saying I am not just some random UNIX nut, but that I was actually an NT admin for years (although I am not one currently). But one point is that the NTFS permission and security concepts in NT5+ are sufficiently complicated that I am unable to explain them adequately here in a single post; I for one could spend a few thousand words just on the topic of standard permission groups, let alone dynamic permission inheritance. So that's at least part of it, permissions in NT are complicated, and can seemingly overlap or contradict each other at times. That makes it tricky at best to get a grasp on in the short run and a real handful to keep track of in the long run, especially to the uninitiated, and therefore ultimately difficult to implement properly. Another thing that works against the security and integrity of the system is the registry. It is a veritable snake pit of often inter-dependant, unintelligible and/or misleading values, much of it hashed or in hex. However, many popular programs require that a user have write access to the registry in order to store their settings. That opens up the question of whether the admin (assuming there is even an IT dept and we're not talking about typical home or SOHO users) will take the time to properly tune fine-grained registry permissions to allow the program(s) in question to function properly, or simply elevate the user's privileges to a higher level, therefore giving them R/W access to the entire registry. Usually the local permissions simply get elevated. In the home, people don't even think twice about giving themselves admin rights. "It's my computer, so I'm the administrator!" and all that.

    With Unices, it's simply a given that users don't run as root. On most distros, attempting to log into X Windows as root you are greeted with a bright red screen and a warning message to the effect of "WTF do you think you are doing? You can break the system this way!" And software is written in a complimentary manner. User-specific settings are stored in the user's home, not in a registry or other obscure code dungeon. System wide settings are typically kept in /etc in the system's root, and are not editable by Joe or Jane Q. User. Once the system is up and going very little ever needs to be changed in a system wide manner anyway. If the situation should arise where a user needs to do something fairly often which requires elevated privileges, the user can be given sudo privs for that specific task, which typically requires the user to type their own password to execute. [I hope I'm making sense here, as I've had a very long day and quite a few distractions as I write this. ;-)] Also there is the fact that privileges are much more straight-forward in concept on a UNIX system, being simply read, write and execute. There are also only three categories of ownership in a UNIX system: owner, group, and everyone else. So while some security scenarios work out better (or at least easier, not involving the creation of special-purpose groups) with NTFS permissions, the vast, overwhelming majority are much simpler and more managable on Unices. As I think history shows, this makes for a much tighter ship.

    -AT

There are two ways to write error-free programs; only the third one works.

Working...