Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Security Windows Linux

6 Months On, Vista Security Still Besting Linux 478

Martin writes "Great report on security vulnerabilities for MS/Linux/OS X. This is a revised version of the one Jeff Jones did back on March 21: Windows Vista — 90 Day Vulnerability Report. This time he did what the Linux community had asked. Everyone complained that he did the report based on a full Linux distro including optional components, not on just a base OS install. So this time he did both; Vista still came out on top. I was shocked that Apple was even on the list as I believed all those Mac commercials!"
This discussion has been archived. No new comments can be posted.

6 Months On, Vista Security Still Besting Linux

Comments Filter:
  • by s31523 ( 926314 ) on Wednesday June 27, 2007 @08:05AM (#19661361)
    Sure, if EVERY action you do prompts a "You are clicking your mouse, cancel or allow", or some other message, sure that is security, but then you are left with a crappy user experience. I think Linux and Mac have got a better balance between allowing actions in user mode without authorization and actions requiring authorization.
  • Re:Fine... (Score:5, Insightful)

    by gravos ( 912628 ) on Wednesday June 27, 2007 @08:08AM (#19661379) Homepage
    So what are you waiting for exactly? You could fix them today and then prove the author wrong. Oh wait, maybe you couldn't...
  • Of course it will (Score:5, Insightful)

    by oztiks ( 921504 ) on Wednesday June 27, 2007 @08:09AM (#19661391)
    This is stupid, Linux as a distro is a complete solution from A-Z ... Vista is a bit of a solution as its just an operating system with limited services. Why did he do it to Vista anyway? shouldn't he be doing it to a server edition of Windows?

    When i see a windows system and linux system that do exactly the same things have the same purpose software installed on them i can see the viability of the test.

    Further, malware runs rampet in Windows, nearly 50% of Vista's vulns were not patched, where regardless of how many Linux has they get fixed when found. More secure? You tell me is a nightclub more secure when the bouncer only kicks out half the troublemakers whole a tougher and meaner club down the street deals with all of them?
  • by Anonymous Coward on Wednesday June 27, 2007 @08:09AM (#19661395)
    Article seems to be slashdotted already. I think the real security test will be outside the lab in the hands of the common user. If one of the major factors in determining the security of Vista was based on Microsoft's allow/deny pop ups, then just how secure will Vista be in a year or less when the common user is tired of seeing those boxes and just starts clicking 'Allow' and lets everything through? The OS is as secure as its user is vigilant and when the user becomes apathetic to security concerns the OS loses whatever edge it had against trojans, root kits, backdoors, viruses, etc.
  • Look! (Score:5, Insightful)

    by Eddi3 ( 1046882 ) on Wednesday June 27, 2007 @08:09AM (#19661397) Homepage Journal
    Look, Everybody! A company is trying to use statistics to make themselves look good, when that's not necessarily the case!

    Nothing to see here, please move along...
  • by QX-Mat ( 460729 ) on Wednesday June 27, 2007 @08:12AM (#19661411)
    On the back of recent news that less than half of Vista "issues" have been patched, yet alone publicly announced, we get another article touting the merits of two things that can't be directly compared.

    Sometimes I see Open Source kicking itself in the face with all the transparency it offers, yet I'm overwhelmed with a sense of pride and happiness that communities can develop such a transparent process in the public eye.

    Discovering problems and exploiting them in a closed source product is quite a daunting task - I'd say almost 4 times as much work as exploiting a system where you can compile debug symbols into the binary, and nothing short of 1000 times harder than if you had the source code. What these "reports" and discoveries show is that layers of obfuscation act to confuse people as to the actual level of vulnerability you're exposed to.

    There are many vulnerability hunters out there, now, employed by governments across the world simply to "dive in" at a deepend of closed applications looking for exploitable code - closed source simply means that only wealthy, bigger teams will be successful. Open Source means that anyone can help thwart these hunters, makes vulnerability research fair game, and most importantly, accepts community involvement into the fixing and pre-emptive policy that makes OS software better software.

    Matt
  • by mgkimsal2 ( 200677 ) on Wednesday June 27, 2007 @08:12AM (#19661415) Homepage
    One canard trotted out by MS defenders *used* to be "Windows has more vulnerabilities discovered because it's so popular, everyone attacks it!". Watch for that line to be modified in the coming months as more MS proponents switch to "it's more secure by design". Keeping the "only more vulnerabilities discovered because it's so widely installed" would imply that Vista is not widely installed/used, which is not good PR.

    So, when Linux had fewer vulnerabilities, it was because it was obscure. When Vista has fewer vulnerabilities, it's because it's fundamentally more secure. I'm not trying to be sarcastic here - it may very well be *true*. It's just something to keep in mind as you watch the never-ending stream of these 'vulnerability/exploit' reports come out every few months.
  • Re:Fine... (Score:2, Insightful)

    by Effugas ( 2378 ) * on Wednesday June 27, 2007 @08:14AM (#19661435) Homepage
    Really? I can file bugs against you?

    I suspect you've fallen into the falacy that just because people can look at the source, people actually do. If you really want some stuff to fix, believe me, there's no end of stuff to throw your way.
  • by jhdevos ( 56359 ) on Wednesday June 27, 2007 @08:15AM (#19661437) Homepage
    There are still a lot of problems with this 'comparison'. For instance:

    - The 'reduced feature set' used for the comparison still contains a lot of software not include with windows
    - All information is based on what the company behind the software discloses. I believe that not all holes in Vista that MS knows about are disclosed. It is also not unlikely that what Microsoft calls 'critical' is not the same as what Canonical calls 'critical'. In any case, different measures are used for the different OS's, and you can't compare things that are measured in different ways.
    - The usual 'less known holes != safer' discussion...

    I personally don't know which OS is safer, but based on these numbers, I am not going to draw any conclusions.

    Jan
  • by buffer-overflowed ( 588867 ) on Wednesday June 27, 2007 @08:15AM (#19661439) Journal
    Why should I care whether or not people run Linux, or Windows, or *BSD, or Mac OSX, or Novell, or freakin' Amigas? At home.

    Run whatever the fuck you want.
  • by Anonymous Coward on Wednesday June 27, 2007 @08:21AM (#19661483)
    He's not comparing vulnerabilities - he's comparing vulnerability disclosures.

    It's not a measure of how secure the OSes are - it's a measure of how secretive the makers of the OSes are.
  • A few points (Score:3, Insightful)

    by gilesjuk ( 604902 ) <<giles.jones> <at> <zen.co.uk>> on Wednesday June 27, 2007 @08:24AM (#19661505)
    1. Vista isn't exactly in widespread use. The sort of people who poke holes in Windows and use it for spam bots etc will concentrate on XP for now as it is much easier. The anti-piracy and activation make pirating Vista a little harder, again this means the low life will not use it for a while.

    2. Linux is easily available to all. Plus people identifying security holes are helping out, they do it to improve the product. They would do this for Windows too, but they don't have access to the code.

    3. Mac OS uses a lot of open source tools, gcc, samba etc.. these have bugs and holes identified from time to time. So Apple naturally has to plug them.
  • by grimdawg ( 954902 ) on Wednesday June 27, 2007 @08:24AM (#19661507)
    Why in hell does this get modded up?

    It's LITERALLY a paraphrasing of a Mac advert. The article is about security, and they've done some work and found some evidence that Vista's not as evil as some people think.

    Now I'm an XP user, and will be until Vista is a lot older and more settled - that's if I ever install it. But just as I haven't jumped on the 'zomg it looks pretty I need it' bandwagon, I won't jump on the 'Vista is evil' bandwagon. I'll judge it on its merits.

    As for the 'cancel or allow' ads, I know I'd prefer to click 'allow' once in a while than 'allow' my system to be compromised. It might get annoying, but I'm a guy who likes to be safe and not sorry.
  • Re:Fine... (Score:5, Insightful)

    by kjart ( 941720 ) on Wednesday June 27, 2007 @08:26AM (#19661523)

    Wait, assuming both assumptions here are true (i.e. Windows has fewer vulnerabilities and you would fix all security problems brought to you in Linux), you would still rather _personally_ fix a lot of bugs over having a more secure platform (again, big assumption there)?

  • by WindBourne ( 631190 ) on Wednesday June 27, 2007 @08:38AM (#19661639) Journal
    THe problem is that he is like me; He does not know the enemies OS. So, what he did, was pick through the OS install and decided what sounds like it belongs and what does not.

    What is needed is for a Linux distro guy who has good knowledge of Windows (or perhaps somebody from wine) to re-do this report. And if it shows that MS did a better job on addressing security, I would suggest that the distro's need to get their act together. For the last 5 years, the windows fanboys have ran around saying that the # of windows is the attraction for security problems, while those in the know, say it has to do with ease of cracking. If this report is real, then Linux just went below MS and that will attract the vermin to us. IOW, we MUST remain above MS in terms of security to prevent having the security attacks that MS has.
  • I approach this as someone who does not know a tremendous amount about how to measure security flaws, or what various security flaws really mean...

    But the survey listed also shows Windows XP as the second most secure operating system of the ones surveyed.

    I can believe that Microsoft improved their security with Vista. But if they also tell me their security was great with Windows XP, I have to conclude that they're fudging the numbers.
  • Useless studies (Score:5, Insightful)

    by Vicegrip ( 82853 ) on Wednesday June 27, 2007 @08:41AM (#19661655) Journal
    Since Open Source rigorously discloses every flaw known in it, what is the value of comparisons of one Vendor's chosen disclosures versus that which is 100% transparent?

    None

    Microsoft only discloses what it has to and is often at odds with security researchers about problems only to be proven wrong later. One claim from a blog was that Vista shipped with 60,000 bugs. How many of those are documented for the public?

    I can say that on my test certified Vista machine, brand new from Dell, I've already seen the network card totally disappear from the system only to reappear again an hour later. The Broadcom diagnostic tool reported no hardware issues. The Explorer shell still crashes/stalls frequently. Files get locked with no way aside from a reboot to unlock them. Wifi fails to reconnect to the same network it was previously connected to when sspi broadcast for that network is disabled. I just tried restoring a hibernated laptop, previously connected to a domain. Black screen & hard reboot.

    Beyond that, on this brand new machine, specced for Vista. Vista is SLOW.

    MS, concentrate on making Vista better instead of having people do useless studies. kthnxbye
  • Re:Fine... (Score:5, Insightful)

    by b1ufox ( 987621 ) on Wednesday June 27, 2007 @08:44AM (#19661667) Homepage Journal
    Looks like Mr Jeff Jones works at Redmond.

    https://209.34.241.68/user/Profile.aspx?UserID=780 3 [209.34.241.68]

    No wonder Windows Vista is best in his review.

    I am not convinced, next please Mr Jones.

  • by Anonymous Coward on Wednesday June 27, 2007 @08:52AM (#19661739)
    Why should I care whether or not people run Linux, or Windows, or *BSD, or Mac OSX, or Novell, or freakin' Amigas? At home.

    Run whatever the fuck you want.


    Because the spambots that have pretty much ruined email are running on window machines.
  • Re:Wow (Score:2, Insightful)

    by wild_berry ( 448019 ) on Wednesday June 27, 2007 @08:52AM (#19661743) Journal
    The stuff at http://www.microsoft-watch.com/content/security/mi crosoft_is_counting_bugs_again.html [microsoft-watch.com] shows that the Microsoft count is per patch instead of per vulnerability. I don't think it is a fair comparison, and Jones should have admitted that.
  • by Dude McDude ( 938516 ) on Wednesday June 27, 2007 @08:53AM (#19661749)
    You'd have a point if that was true. You only get a UAC prompt if you're making system-wide changes, or if you're trying to run software that requires elevated privileges.
  • Re:Fine... (Score:3, Insightful)

    by SQLGuru ( 980662 ) on Wednesday June 27, 2007 @09:02AM (#19661837) Homepage Journal
    I think your version comparision is flawed. Windows XP has had service packs, that is more equivalent to your point releases of Linux than the jump from Win95 to WinXP. Can you take Linux 1.x.x apps and run them on Linux 2.x.x? Likely, but just as likely to work for Windows apps, too.....I do believe that many older Windows apps run in Windows XP in compatibility mode.

    Now, go the other way (XP -> 95 or 2.x.x -> 1.x.x). Neither will work very well. Something required will very likely be missing.

    Layne
  • by spyrochaete ( 707033 ) on Wednesday June 27, 2007 @09:14AM (#19661933) Homepage Journal
    From my limited experience with SuSE and Ubuntu, Linux is even less user-friendly in this manner. In the best case scenarios the OS prompts the user for a root password right in the GUI. Worst case scenario, the user has to figure out a sudo command line command. I don't know how these tasks are handled on Mac.

    Either the user is prompted about administrative tasks or he is not. Vista lets you toggle this option off if you desire, but I for one appreciate this burden. The average computer user doesn't get any smarter when important stuff is authorised clandestinely. It's important for people to be aware of and take action on things like spyware, trojans, and other unintended attempts to install software.
  • Re:Fine... (Score:5, Insightful)

    by walt-sjc ( 145127 ) on Wednesday June 27, 2007 @09:25AM (#19662009)
    I suspect you've fallen into the falacy that just because people can look at the source, people actually do.

    It's a fallacy? Shit. I guess that all these years that I have been working on open source software, fixing bugs, adding features, has actually been a big long dream. I'll wake up and finally see that I've been living in the Matrix, and finally see Bill G in his true Borg form hanging over me grinning...

    Of course not EVERYONE looks at the source for every app, but collectively there are a HUGE number of people looking at and working with the source for just about every app out there. Unfortunately, not everyone working on open source is a qualified professional, and we do see some horrible code out there, but it's no worse than a lot of the commercial code I've seen over the years.

    But back to the report. It's a shell game. Microsoft, having a closed development model, may have HUNDREDS of high threat level flaws that are UNDISCLOSED but may be known about by black-hat hackers. Open source by nature is ALWAYS disclosed. MS also has a habit of rating their flaws at a lower threat level than third party security researchers rated it. Yep, just goes to show that you can prove anything with statistics.

    Here is a statistic for you... 99%+ of all the probing I get on the external side of the corp network are from windows boxes according to fingerprint analysis. Since most probing is done via compromised machines (botnet), and that windows has less than a 99% market share, that leaves me with one conclusion. The numbers are similar for spam.

    How many vulnerabilities are known about and fixed in a certain time frame is meaningless. What would be meaningful, but an impossible statistic to gather, is exactly what percentage of installed Linux and Windows machines are currently compromised and being actively exploited (member of a botnet.) I've heard estimates that up to 50% of all windows machines are infected with serious malware of some sort or another...
  • Re:Fine... (Score:3, Insightful)

    by UbuntuDupe ( 970646 ) * on Wednesday June 27, 2007 @09:27AM (#19662043) Journal
    Whenever someone says, "I can't improve the code for open-source program X, because I don't know the computer language it's written in", I tell them, "well, then you're only slightly less qualified than someone who does know the language".

    Open source programs are typically not well-commented and searchable enough for a capable outsider to improve upon without significant investment of time.
  • Re:Fine... (Score:3, Insightful)

    by BosstonesOwn ( 794949 ) on Wednesday June 27, 2007 @09:30AM (#19662069)
    Well problem is most common users don't want to type out a command , they , I want to say are too lazy , but more commonly they are too computer illiterate to get the syntax right and/or the spelling of the package they want. Thats why tools like windows update and synaptics (spelling?) on ubuntu are good tools for common users. And why it makes ubuntu a good choice for folks.

    as far as source code. so many people want to pick a package install and use in minutes , thats why we have broadband and binaries. expecting a new user or even a semi experienced user to ./configure , then make clean (in case they tried and failed before with old packages) , then make and wait for it to compile (sometimes hours), heaven forbid you have them strip and pack the binariy when they are done. to create a small binary to save size. It is really to much to ask of even a common user.

    But power users are adept to it. With issues like the above I guess I can see why Linux would be less secure then Windows Vista. Vista took the idiot out of idiot users to the best of any ones ability. Hopefully we don't see this on Linux , I enjoy my freedom on it.
  • For those that only want the executive summary, here is a key chart that shows the publicly disclosed High severity vulnerabilities during the first 90 days of availability, broken down by vulns fixed and vulns unfixed. Note that this chart is showing the reduced Linux builds that exclude non-default and optional components without equivalents on WIndows. (clicking the chart also gets you to the full report.)
    (Emphasis added.)

    So, how does he account for all the silent patching that Microsoft is doing? [zdnet.com]. (Link complements of Groklaw.)
    More on Google [google.com].

    Honestly, how can one really compare Windows against Linux when Microsoft is patching things silently? It's not a fair comparison to any vendor because you don't know what got fixed; let alone what was actually problematic. When you have one community disclosing every bug, and another disclosing only those that become high-profile for them - or likely to become high-profile since they were disclosed by others or something like that - you will not get a fair comparison.

    So, if he really wants to do a fair comparison, he should get internal reports from Microsoft about their bugs, security and otherwise. Yes, CVE and similar hold the security vulnerability bugs; and you can do a comparison iff you get the security bugs that Microsoft found internally and didn't bother to report - then you would have a level set of reports.
  • by gambino21 ( 809810 ) on Wednesday June 27, 2007 @09:44AM (#19662225)

    Look, with Vista they have a vested interest in correcting the bugs. For those in Linux I cannot overcome I can only hope someone else sees it as important enough to warrant a fix.
    There are many vested interests in Linux as well. If you buy a support contract from Red Hat or Novell, you can do more than just hope that someone will fix it. You can tell the vendor to fix it, and cancel the contract if they don't. In this case you probably have more leverage than you would with Microsoft. And you have the ability to follow the status of the issue, possibly test a fix before it is released, and actually be involved in the process. Compare this to filling a bug with Microsoft and hoping that someday it will be included in an update.

    Saying "with Linux you can just change it" is akin to handing someone a bunch of parts and telling them if they don't like the car they can fix it.
    It's more like someone giving you a free car that is working pretty well for most requirements. And having the option to pay for upgrades, repairs, etc. Which you might have had to do if you had bought a non-free car anyway.
  • by walt-sjc ( 145127 ) on Wednesday June 27, 2007 @09:49AM (#19662279)
    The article is about security, and they've done some work and found some evidence that Vista's not as evil as some people think.

    Cluebat time. The "researcher" is a Microsoft employee. Is is basically PR from marketing. When you have a closed development model, you can't compare it with an open model like this. How many UNDISCLOSED flaws were there in Windows that have been silently fixed or are still waiting to be fixed? With statistics, I can "prove" that Windows causes brain damage and Erectile Dysfunction. Does that make it true?

    It is a meaningless report that the uninformed / gullible will use to say "See! See! Windows is more secure! Microsoft tells us so!"
  • by mgiuca ( 1040724 ) on Wednesday June 27, 2007 @09:49AM (#19662283)
    So... what you're saying is it's a measure of how closed off the codebase is? And Vista beat Linux? No way!
  • by rob_benson ( 698038 ) on Wednesday June 27, 2007 @10:05AM (#19662481) Homepage
    Kind of a funny story considering some security venders claim Vista is less secure than XP: http://www.zdnet.com.au/news/software/soa/Microsof t-partner-Vista-less-secure-than-XP/0,130061733,33 9274261,00.htm [zdnet.com.au] Based on my early experiences with Vista in our Beta roll out users are generally annoyed with Vista's security features and will likely turn them off once they are saavy enough to do so. The VPN compatability problems they are having with major vendors such as Juniper's VPN solutions also give me reason for pause. Some users will basically start taking files home with him and emailing them to co-workers since they cannot use the VPN. This is a major concern when it involves personal data. Vista may be an improvement on the home front, but it is plain not ready for business.
  • Re:Fine... (Score:5, Insightful)

    by WED Fan ( 911325 ) <akahige@NOspAm.trashmail.net> on Wednesday June 27, 2007 @10:05AM (#19662483) Homepage Journal

    Open source programs are typically not well-commented and searchable enough for a capable outsider to improve upon without significant investment of time.

    Goddammit, Sir, why did you have to post after I used all my mod points? You have provided, not only for the OSS world but developers in general, the single most important point when it comes to maintainability.

    I run several servers and desktop systems. Some open, some closed. I have tons of source code, some for open systems, some for closed systems where I participate as a maintainer, developer, or reviewer. Much of the OSS stuff is unusuable except by the team that developed it. Yes, an outsider can come in, look at the code and study it but he/she is going to spend a ton of time "getting up to speed". The only batches of code that I've been able to instantly access and work with are those from projects/developers who decided that they would rather take 3 months to turn out well commented and tested code rather than take 3 weeks to churn and burn crap code that is only marginally better than old BASIC spaghetti code.

    • We'll comment later.
    • We'll break that method up into smaller more logical chunks later.
    • O.k. I realize "DoIt" is a bad function name, but I was stuck at that time. I'll rename it later.
    • Yes, I realize the code we are leveraging is less commented than ours, formatted even worse, and half Chinese, a third Korean, but, we have a plan to fix that in a future roll.
  • Re:Fine... (Score:2, Insightful)

    by gEvil (beta) ( 945888 ) on Wednesday June 27, 2007 @10:15AM (#19662593)
    I've spotted many security issues, and the fact that we see more reported every week is proof enough that people do look at the source. If nobody looked we'd have no new reports, right?

    Using your logic, it's impossible for an enduser to find a security hole in Windows.
  • by mpapet ( 761907 ) on Wednesday June 27, 2007 @10:20AM (#19662665) Homepage
    The fundamental failure with the phrase "Vista is still more secure..." starts with the incontrovertible fact that Windows is shipped as a black box.

    The temporary absence of security issues with Vista means nothing because neither the scope nor the scale of exploits is known. That is commonly described by the phrase "security through obscurity."

    History has shown that Microsoft's approach to security is to talk a good game. Period. While I do not doubt Microsoft has hired excellent security programmers, their contributions don't make it through the management gauntlet.

    Another way to highlight my point:

    When you buy a windows-equipped box will you:
    1: Use email on win32 without an antivirus application?
    2. Go on the internet on win32 without a firewall?
    3. Run win32 without a NAT?

    I propose the following experiment instead:
    Computer 1: Linux desktop distro immediately after install with no firewall script.
    Computer 2: Vista equipped PC straight out of the box with the windows supplied firewall disabled.
    Computer 3: Mac OSX straight out of the box.
    Run tripwire on all three machines and put them directly on the internet. (aka no NAT)

    That might be a better way to compare default security of OS's.
  • Re:Fine... (Score:5, Insightful)

    by mattcasters ( 67972 ) on Wednesday June 27, 2007 @10:20AM (#19662673) Homepage
    I believe that was mainly the point, yes.
    Most end-users wouldn't recognise a security issue if it was walking in the middle of the street, naked, waving a huge vlag that had "Security Issue" printed in bold on it.
  • Re:Fine... (Score:3, Insightful)

    by Anonymous Coward on Wednesday June 27, 2007 @10:23AM (#19662713)
    I inherited a whole pile of complicated PHP code recently. Not only is it uncommented, the errors it spits out are few and far between (most exceptions are uncaught and failures that are caught are merely ignored because the test is encapsulated in an if( ) statement with no corresponding else ), and when there are errors, they're merely echo statements that don't say WHAT happened, only WHERE it happened (even in those cases when the horribly designed PHP language bothers to actually have a function that returns a meaningful error).

    Most of this is primarily the result of belligerent users who continually demanded unjustifiable changes or refused to provide a complete set of specifications from the outset. Fortunately, this particular way of thinking is changing and future projects will not be held captive by ego-maniacal users with unrealistic or constantly changing demands.

    However, to the point, I highly doubt that any sort of management or user pressure is the reason behind the terrible state of so many open source code bases, so I have to wonder if the amateur hacking that is the nature of so many of the bit players and niche pieces of the third party support system isn't a bigger problem than the commercial issues it attempts to solve. Does adding more people really make a difference when most of those people are not even remotely close to being skilled enough to understand what role they're needed in?

    I like me some BSD and OpenOffice and PostgreSQL, but those are all major projects that are designed following a very structured, traditional development paradigm. I have to seriously doubt the efficacy of designing outside of those constraints and, thus, have to seriously question just what value open source development really adds. Is it really a way to develop a better system, or is it just a "nice thing" on the side after the more traditional development processes have created a stable product that the more traditional development processes will continue to provide the bulk of support for?

    I'm going to have to go with the latter. Open source is nice, open source is not really better. I think the notion that "more eyes" are on it is dubious at best, given that only a very tiny number of those eyes are going to be truly skilled and dedicated enough to actually understand what they're looking at.
  • Re:Fine... (Score:3, Insightful)

    by PPH ( 736903 ) on Wednesday June 27, 2007 @11:06AM (#19663285)
    Fine. Most bug fixes are written by pros involved with companies that have an interest in distributing Linux. Still, the licenses under which open S/W is distributed seems to make the likelyhood that the pros will contribute their time and efforts much higher.

    Find, publish, and fix a bug in Linux or an O/S app. Fine, thank you very much. Find and publish the existance of a bug in Windows (particularly if you are bound by any sort of source code NDA) and you risk getting sued. Forget about fixing it. Only Microsoft can do that. If they choose not to, its not possible for disgruntled users to fork a distro and do it themselves.

  • Agreed, but... (Score:3, Insightful)

    by bjk002 ( 757977 ) on Wednesday June 27, 2007 @11:06AM (#19663297)
    You seem to be pointing the finger squarely at the developer. Most often that is not where the blame should reside.

    I would point out that if you are on a deadline for delivery, things get cut. Its just business. Managers fully support good documentation, well planned naming conventions, well structured code, etc... Just so long as it doesn't interfere with getting the product out the door on time.

    And... FWIW... I also have tons of source (both open and closed source) to maintain, modify, w/e...
  • Count the botnets? (Score:3, Insightful)

    by gr8_phk ( 621180 ) on Wednesday June 27, 2007 @11:12AM (#19663365)
    Could someone count the botnets out there per operating system? I don't care so much about vulnerabilities so much as all the spam I get from compromised machines. Or put another way, it's not the holes but the number of active exploits that we should be counting.
  • Re:Fine... (Score:2, Insightful)

    by NSIM ( 953498 ) on Wednesday June 27, 2007 @11:15AM (#19663427)

    I wish that was true. Good luck installing a random piece of software on Vista. It probably won't work.


    Strange, I've been running Vista for about 18 months now, and I've had very little trouble in getting random bits of software to install. Generally, what problems I do run into can be fixed by running the initial install with admin privileges. Granted, I don't run a lot of games which is probably where most of the problems will lie. But graphics, multimedia, office and general productivity apps (both commercial and open source) have all worked without problems.

  • Comment removed (Score:3, Insightful)

    by account_deleted ( 4530225 ) on Wednesday June 27, 2007 @11:16AM (#19663449)
    Comment removed based on user account deletion
  • Re:Fine... (Score:3, Insightful)

    by korekrash ( 853240 ) on Wednesday June 27, 2007 @11:32AM (#19663697)
    And if he was a Linux guy and said Linux was more secure? Let me guess, you wouldn't question it a bit.....I love how all people do is gripe about how vulnerable XP is. Well MS listened (for once) and came out with a decently secure OS. Why does the programming community insist on acting like spoiled children at every turn. Fix the bugs and stop griping! Windows guy, "My OS is better than your OS." Linux guy, "No, My OS is better!" Windows guy, "No, it's not! I have a new one and it's better!" Linux guy, "Mommy! That Windows guy said his OS is better!"
  • Flaw in argument (Score:5, Insightful)

    by erik_norgaard ( 692400 ) on Wednesday June 27, 2007 @11:53AM (#19664023) Homepage
    There are several fundamental flaws in the arguments in this article:

    - He compares OS vulnerabilities of the first 90 days since first release. This doesn't tell us which OS is the most secure at this moment. Merely, it tells that more recent OS's have undergone more testing prior to release.

    - He notes 125 known issues with RHEL prior to release compared to 0 for Windows Vista, but of course no vulnerabilities are known prior to release as Vista is closed source and has not been available for public scrutiny, while RHEL is built on available open source code.

    But that's not all, differences in how bugs are classified may make some OS's appear more secure - it is known that Microsoft has classified vulnerabilities as bugs thus reducing the "official vulnerability number". Without a strictly uniform and independent classification scheme for bugs, there is simply no data to compare.

    A reasonable comparison would compare the OS's vulnerability issues the past 90 days, that is with fully patched systems. Known issues that have not yet been patched should not be included as this simply is caused by the longer time for scrutiny of older OS's. Secondly, bugs must be classified in a coherent manner: Remote root, remote user, local root, local user, DOS etc...

    This document is useless in the discussion of which OS is the most secure to run as of today. There is no way that a conclusion can me made in favour of any OS on the list.

    It appears that OpenBSD remains the most secure system, and I bet FreeBSD is a strong contender.
  • by secPM_MS ( 1081961 ) on Wednesday June 27, 2007 @11:56AM (#19664079)
    XP RTM and XP SP1 predated the security push and had security issues. XP SP2 was a major release (and caused compatability issues) that greatly improved the security status. At roughly the same time Microsoft hardened Windows 2003 with the SP1 release. Microsoft STRONGLY encouraged customer's moving to XP SP2 and W2K3 SP1. Unless they specifically refer to XP RTM or SP1, when Microsoft people refer to XP, they are referring to SP2.

    Too many of these comparisons are apples and oranges things. If you run you Ubuntu box as root, you are heading for trouble. Running Windows as an administrator also exposes the user to significantly enhanced risk. If you are concerned with this risk, run as a normal user. I do. Your risk will be much lower. Vista makes it much easier to run as a normal user. My wife and kids have normal user accounts on our modern machine. I will be trying to "upgrade" my old XP box (an older Win ME box I upgraded to XP with an additional 512 MB of RAM 3 years ago) to Vista home basic for the improved security support.

  • Re:Fine... (Score:3, Insightful)

    by xaositects ( 786749 ) * <xaos.xaositects@com> on Wednesday June 27, 2007 @12:39PM (#19664655) Homepage
    Luckily, those are not the people who are relied upon to fix problems. Being able to look at the source code means that the people with the know-how to look for and fix the problems can find and fix them. One of the problems with a closed-source OS or program is that you rely on the developer of that OS or program to find and fix the problems and that means this research is going to be constrained by budget, ego, and a number of other factors.

    I'd be willing to bet that OSS has a lot more competent eyes looking for issues in the code than any closed-source software, regardless of whether Joe User can read the source or not.
  • Re:Fine... (Score:4, Insightful)

    by Mister Whirly ( 964219 ) on Wednesday June 27, 2007 @01:00PM (#19664923) Homepage
    Why? That argument never flew with Macs on Slashdot, so why should it now?? Oh wait. Now it's Microsoft. How could I forget...
  • by weicco ( 645927 ) on Wednesday June 27, 2007 @01:14PM (#19665175)

    Vista still encourages users to run with higher privileges than necessary

    What the heck are you smoking? I'm running Vista with normal user rights (before Vista I did same with XP) and last time when I needed elevated rights was when I installed SQL Server 2005 Express some month ago. UAC prompted for administrator password, I entered it, installer continued and so on. In no way I was using higher privileges that I needed. Or do you have some magical way to install system wide components with normal user rights?

    If Vista is asking admin password every other minute then you are doing some seriously wrong! There's no need for after initial configurations to elevate to admin privileges unless you are doing some system wide stuff. And if you turned off UAC go back to your Linux or whatever you like and have a nice day.

  • by badboy_tw2002 ( 524611 ) on Wednesday June 27, 2007 @01:15PM (#19665181)
    How would this be any different if Linux was top dog? I'm a bot net guy, I want to make a bot net, I'm going to cast the widest net possible. You think if Joe Sizpack was running Linux he _wouldn't_ click that file promising him "free smileys" or constantly keep his stuff up to date? And if the "bug" in question doesn't have admin privledges on a home system, who does? Try explaining the idea of "admin" and "user privledges" to someone who thinks a cd tray is a drink holder. Good luck!
  • by alexfromspace ( 876144 ) on Wednesday June 27, 2007 @01:20PM (#19665265) Homepage Journal
    This report is seriously misleading. The conclusions made do not follow from facts presented without employing logical fallacies. The data presented in the report measures amount of fixes made. The basic fallacy involves the assumption that just because a fix is not made, there no critical need for one. As a matter fact, a lesser number of fixes may indicate failure to find, report, and fix problems rather than absence of problems.

    Since the Linux effort is open, all issues are reported and fixed in the open, with an effort made to report and fix as much as possible, which ensures software quality. Since proprietary systems are not open, their issues are not reported and fixed in the open. As a matter fact, a fewer number of fixes does not in itself indicate a lesser number of problems, or better software quality. On the contrary, a lesser number of fixes may indicate a lesser percent of problems being found, reported and fixed, which implies a lesser quality of software. A fewer number of fixes can be as much due to failing to fix vulnerabilities due to not finding them, or not having them reported.

    Therefore, data presented in this report indirectly suggests that the open-source process is better at ensuring software quality.
  • by Technician ( 215283 ) on Wednesday June 27, 2007 @01:26PM (#19665361)
    it's not the holes but the number of active exploits that we should be counting.

    I agree. The trouble is nobody wants to point fingers because they might get slapped. Read any of the news articles regarding the millions of bots in botnets. Every one of them I could find said "PCs". Not one article mentioned an operating system or version that was compromised. I searched Google, Yahoo, and anyplace else I could to find out if the bots had something in common such as Firefox, AIM, Flash 9, or a paticular OS. The details were sparse. If anything was mentioned it was Internet Explorer exploits and compromised websites. A search on the compromised websites gave the same generic results. About the only commonality was SQL with no mention of what flavor such as My-SQL or MS-SQL There was no mention of OS, web server or anything else. I hate thin articles when I am trying to avoid common exploits. If I can't use one SQL, can I use the other and which is which?

    From the articles, I get the feeling I can't use a PC as a client with IM and I can't use an SQL enabled webserver. Other than that, there is very little hard data on botnets in the news.
  • by HiThere ( 15173 ) <charleshixsn@@@earthlink...net> on Wednesday June 27, 2007 @04:19PM (#19667793)
    Perhaps a part of the problem is:
    When you are attacked by a bot-net, all you know is the packets you have received. Any application or OS information that these contain could easily be forged.

    It *would* be nice to know. This doesn't mean that reliable knowledge is available.
  • by blueskies ( 525815 ) on Wednesday June 27, 2007 @04:50PM (#19668199) Journal
    How would this be any different if Linux was top dog? I'm a bot net guy, I want to make a bot net, I'm going to cast the widest net possible.

    That doesn't explain why web server exploits hit IIS much more then apache which STILL has more installations. The widest net possible idea is less important then building your OS' security foundation on shifting sand. Windows has had terrible security because it was built on a foundation of sand. It has taken them years and years to go back and build a secure foundation that the OS can rest on.

UNIX was not designed to stop you from doing stupid things, because that would also stop you from doing clever things. -- Doug Gwyn

Working...