Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Bug

White Hats Take NASDAQ Through MS IIS Hole 184

stomv writes: "A hacker found exploits in NASDAQ server, could have changed market info and admin passwds. Server: IIS. Hacker did ethical job of providing info to fix. Also, mentions BugTraq and how MS didn't fix the hole when it was posted July 17. "
This discussion has been archived. No new comments can be posted.

White Hats Take NASDAQThrough MS IIS hole

Comments Filter:
  • You can't trade on the Dow, DJIA is just an index. Microsoft is part of the Dow, but the stock is traded on NASDAQ.

    As an aside, I believe MSFT was the first stock on the Dow not traded on the NYSE.

    Devil Ducky
  • While microsoft tries again and again to secure their OS, high profile cases like this one make me think that they are in deep doo doo. The biggest advantage to me about Open Source is not that it's free, but that thousands of people are hacking away at it daily. This caeses security problems to come to the surface very quickly, and solutions are almost equally as quick to arrive.

    The origianl eye-eye exploit took almost 5 months for a patch. That's scary as it gave total control of the file system to any remote user. 5 months is too long for somone sitting in a production environment to wait for a solution.

    Score one for the "ethical hackers", Score one for the anti MS side, Score 2 for those that DON'T run IIS.

  • Ok, I'm certainly a newbie to slashdot, at least from the posting standpoint, but this whole Karma thing has me dusted. With a little imagination I can kinda see where it was, and what's going on with it. But having read some of Sig11's rants I think he/she takes this all way to seriously.

    I look to slashdot from an informational/entertainment perspective. If I see something that catches my interest I may wait around to see what other posters have to say, and some are truly excellent, but I'll often go dig for myself to satisfy my need for details.

    Sig11 overlooks the fact that people are here because they choose to be, rather than forced to experience some utopia. Not perfect, as Taco says, but it has an audience. Seems a "good fit", as we say in the IT biz.


    --
    Chief Frog Inspector
  • This all has nothing to do with Microsoft's design. In fact quite the opposite. NT/2000, like most modern operating systems, have a pervasive operating system that imposes security everywhere. Every registry key, every file, every service, every mutex, every object. Everything has an ACL (Access Control List) that allows massive granularity of security configurations. Of course by default most objects are configured as "Everyone" but using some standard utilities and a good admin that's quickly fixed.

    That pervasive security model carries through to lots of other applications as well. In SQL Server I define which of the NT users have rights to access the database server, then the databases individually, then the individual objects. Actually you can configure specific columns with ACLs. However that is all lost the moment a project is done in too tight of a timeline and security takes a backseat : In that case you end up with "Domain Users" configured as db_owners and sysadmins. That is rampant and it has absolutely nothing to do with the operating system.

    Microsoft gets slammed a lot for things which are the exact opposite of their intent. There is nothing inherently wrong with the OS model, there's something wrong with the priorities of some developers and some organizations.

  • Wow! Musta made some lucky trades, eh?
  • by brad.hill ( 21936 ) on Wednesday October 04, 2000 @10:55AM (#732004)
    Sun also provides "end to end" solutions for Web apps. Compare Solaris + iPlanet + Servlets to the Microsoft solution.

    iPlanet administrative server must run on a different port from the user server. There is almost no access to Web app level configuration from this menu. (just servlet properties, which you'd have to restart the server to take effect, which requires a password)

    iPlanet runs as an app in user space. When installing iPlanet, it warns you that the server should run under an id that has extremely limited permissions at the OS level. "nobody:nobody" is the default setting for this userid.

    Because of this partition between Solaris and the Web server, it is nearly impossible for code attacking the webserver to root the box. Even getting a shell as nobody is not too useful.

    On the web app side, servlets run in a security sandbox that can be custom tailored to limit access to outside resources. The default settings in iPlanet do not allow file or OS level access from servlets. In fact, the setting to turn this on isn't even in the default config file or admin interface. You have to look it up, know what it is and how and where to add the parameter by hand.

    Automatic memory management and array bounds checking in Java prevent the most common form of attacks from being effective. (the app may crash, but it won't compromise your server)

    There is still room (there's always room) for poor configuration and insecure apps to cause havoc, but in comparision to the Microsoft toolset, there is much more attention paid to security, segregation of control, and default settings that put security above ease of use.

    While the average end user may prefer the ease of use to security, critical civilian sites like NASDAQ and other financial institutions just shouldn't be using products with that philosophy. To market and sell these products to these types of end users (even a company as huge as MS knows when somebody like NASDAQ is using their software) is irresponsible. To allow an application configuration like that is even more irresponsible. (you can bet that NASDAQ had MSCE's or an MSCSP build this, not somebody's 16 year old nephew) Sun, in contrast, sends auditors/admins to important customer sites like eBay to make sure they're using the software correctly.

    I agree that the folks who built this must shoulder a lot of responsibility, but I cannot absolve Microsoft of culpability. Security is an afterthought in their products, rather than a fundamental design principle, and it shows.

  • doh, no points left.

    really good point about the COM object. It seems a little "hacky" just to hid the passwords. and even then It would be clear text in the .DLL, but a whole shitload better then just having it in the global.asa file.

    anyone know that orginally ASP was going to be called Active Server Scripts? of course the .ASS exention made some PM's change there mind. but it's funny anyway.

    -Jon
  • Something like global.asa, which for you non-IIS types out there, is a file run on webserver startup, which contains all sorts of interesting information. It is a repository for most developers using IIS to put in information like database usernames and passwords, so the webserver can talk to it.

    What I believe is a better solution than to leave usernames and PW in the global.asa file, is to instantiate a COM object from global.asa. Then, either put the usernames/PW in there, or have the COM object read them from somewhere like the registry. Then, even if someone gets at the global.asa file, they don't know the important stuff going on there, no matter what their intentions. If NASDAQ had done this, their information wouldn't have been exposed.

  • You make an excellent point about the file extensions, especially for a developer (that wan't a dig, most developers get scared when I make changes to the system... they always thing it will break their app...). I don't think that the comment about hotfixes was off base, it happens fairly often. This is, of course, a result of people being human again. Sorry I'm answering your comments randomly... I never said you should ASSUME that the patch doesn't work, I just said you souldn't ASSUME that it does. I quote Paul Leach... "We deliberately and cynically make the smallest band-aid fixes we can, just enough to convince customers that the problem is fixed when it really isn't". - I admit that's taken out of context so he may have meant it as sarcasm, but Microsoft has many times shown this to be true in their actions. I agree about the global.asa file, but I'm so tired of fighting that war I finally just gave up. The last thing I'll say is that Microsoft should put those fixes (smart administration, such as removing the rouge file extensions) into the MCSE cirriculum(sp?). Right now they have a bunch of worthless hacks running around with no idea, but who have a certificate from Microsoft saying they know their shit. (I tech review guys constantly... 99% of MCSEs don't know the difference between regedit.exe and regedt32.exe).

    the other last thing I'll say is thanks for replying. That is much more important to me than being modded up or down. Sorry again for the random replies, I'm in a hurry.

  • Read the article!

    It mentions(veracity aside) that the hacker did not use the July 17th exploit. Regardless of M$ or IIS, the hole was something the hacker had found and exploited.

    The article also mentions that the hole was fixed and patched promptly; it never mentions if M$ fixed it, if M$ knew about it, or if M$ tried to hide it. All you are doing is spreading misinformation.

    This is not about a crack reported in July. M$'s track record is not at issue, regardless of it's purity or lack therof, and M$'s press tactics are not the issue.

    Hate M$, but this article is *not* about M$!

    If you like the details... read the article.

    The nick is a joke! Really!
  • by OpperNerd ( 16084 ) on Wednesday October 04, 2000 @07:37AM (#732009) Homepage
    Non-Dutch readers might be interested in the fact that the person Gerrie Mansur is not taken seriously in The Netherlands. He's a 'media hacker', despised both by hackers, crackers and security people.
  • It still doesn't make it acceptable to leave a security hole unfixed so long, though.

    He's supposed to be a white hat, yet refuses to disclose this "other" hole... while there was already a known hole to exploit? Maybe it's just me but that doesn't sound quite right.
    ---
    Where can the word be found, where can the word resound? Not here, there is not enough silence.
  • The problem is *not* the July 17th hole, allegedly. It's a different one, that the hacker has thoughtfully chosen not to disclose. Of course, it's his word, but he says it isn't the +htr hole...

    The nick is a joke! Really!
  • by Nonesuch ( 90847 ) on Wednesday October 04, 2000 @07:42AM (#732012) Homepage Journal
    An article in Linux Weekly News [lwn.net] has details on Standard & Poors security breach from this spring.

    A followup article on Technology Evaluation at (Slash may mangle this URL) http://www.technologyevaluation.com/research/resea rch highlights/security/2000/06/news_analysis/na_st_lp t_06_21_00_1.asp [technologyevaluation.com] explains some of the implications of weaknesses in stock data services.

    What is ignored are the secondary effects- when these weaknessses are exploited to manipulate the market, the long term result will be loss of trust in news feeds and stock information services.

    It seems that all of the major financial news services have had serious security problems this year- Comstock, Bloomberg, etc.

    Who can you trust to supply good data?

  • I hope this is early enough to beat all the M$ bashers et al...

    The hacker denies using a known security hole. It's still M$'s bad for not *fixing* said hole, but unless the hacker is lying, that problem is not the issue.

    Nor is the fact that M$ has a vulnerability-any software of sufficient complexity will have issues, bugs, and vulnerabilities.

    It doesn't truly matter that M$ was involved, nor that IIS was in use. In this case, NASDAQ has someone they can talk to, debug, and fix, ultimately, and it was M$. It could have been Sun, IBM, VALinux, whatever. It isn't a bash against M$ that their server had this problem.



    The nick is a joke! Really!
  • I think the importance is that MS was notified of the hole in july but still have not produced a fix.
    ---
    Where can the word be found, where can the word resound? Not here, there is not enough silence.
  • Why is CNN (or the person they quoted) claiming it was the July 17 exploit when it apparently wasn't?

    Because accuracy or quality in reporting is no longer what's most important. What is most important is being the first to report it.

  • Your logic follows that of "If everyone cleaned up their own yard, the world would be a much prettier place."

    While this is true, some people just won't clean up their own yard without the intervention of external forces. That's why entities such as homeowners associations have prolifersted.

    I guess we can consider White Hat hackers as being the HOA's of the internet.
  • Why is CNN (or the person they quoted) claiming it was the July 17 exploit when it apparently wasn't?

    Possible answer one:
    To give karma whores something to post about?

    Possible answer two:
    Because that's what their area expert thinks the guy used and they decided to post both explanations instead of launching a probably futile attempt to find out which it was by deadline time?

  • I'm sure they will have some PR twist or it just wouldn't be fun.

    M$ can't devote any of their programming recources to security, or bugs. If they did, then they wouldn't have anyone to develop the latest Talking Barney. And that would be a tragedy.

    Devil Ducky
  • I highly doubt that the computers which track trades are directly connected to the web servers. He might have been able to fool a few people into making bad trades because they think a stock is doing something its not, but it didn't sound like he ever had the power to change a stocks price.

    Not to mention this information is backed up just a few times I'm sure. I don't think its as simple as changing one file to reflect the value you want the stock to have.
  • is that this is a prime, well exposed example of how hackers are beneficial to business and society, rather than the parasites media typically portrays them as.
  • most developers get scared when I make changes to the system... they always thing it will break their app...

    If you're a sysadmin, you should know you're in trouble when developers act like this. It's an indication they have no idea how their application works, or what it's security-requirements are; the application will most likely not have been designed with security in mind.

    I have made this mistake myself a few times (I develop and admin systems nowadays)

  • Microsoft is at it's 52-week low, as are Dell and @Home. Your point is?
  • by Anonymous Coward
    You slept your way to a +5, so your last point is the only interesting one.

    Signal11 came to /. at a time when there were few people. He did not grow as Slashdot did; he was immersed in the "great conversations." Great conversations do not scale.

    Or at least not without a change in perspective. The new crop of us fools see moderation as tools to find the interesting points that lie in the sea of noise. Upon finding an interesting point, I personally drill down to read its responses at -1. That means I lose all the original, interesting posts that weren't responses to someone else? Certainly. I am assuming that the great majority of unmodded good posts were some impassioned response to someone else. Not perfect, but moderation is a tool to find as much good information as possible, as a computer is a tool to filter through noise to find the waveform underneath.

    To tell the truth, I don't care for Signal11's posts or whatever else people are doing to prove that Slashdot is a system with entertaining flaws. I know that. Chris Johnson is one of the regulars with something interesting to say; so probably is Fascdot/Olympic Sponsor. The rest can write whaterver they want; I just may not notice.
  • Insightful would perhaps talk about what the merits and demerits the M$ OS has, and the alternative OSes have. Or perhaps about their fitness for purpose, rather than vaguely commenting on their fitness.

    My own comment is supposed to be insightful. It's supposed to engender insight in people reading on what an insightful comment is supposed to be. Moderate it up, if you moderators want people to read it and note "Gee, he's right. An insightful comment would make me stop and consider something I would not ordinarily consider. Bashing groupthink or M$ is not insightful, because everyone already does that... This is really overrated, or something."

    Oh well. That's my rant ^^

    The nick is a joke! Really!
  • I love you more than I love Hemos.
  • It doesn't truly matter that M$ was involved, nor that IIS was in use. In this case, NASDAQ has someone they can talk to, debug, and fix, ultimately, and it was M$.

    Beg pardon? Louis, are you implying here that Open Source people have nobody to talk to?

    On Tuesday, I found a bug in Mandrake's recent compilation of a Linux kernel (which neutered ide-scsi CD burners). Within 15 minutes of telling them this, it was attended to, diagnosed, and fixed. Less than 15 minutes after seeing their email, the fix was on Mandrake's FTP server (which is impressive, given that we're dealing with four different kernel compiles here, plus modules).

    Try getting any response out of Microsoft within 15 minutes, even by telephone, I dare you! Now try getting it for free. Finally, if the response starts with ``have you tried rebooting your computer?'', scream into the handset and hang up. (-:

    I can't even get a straight answer about pricing out of Microsoft, never mind useful tech support. My experience with Sun and IBM is that their turnaround is likely to be a couple of days rather than minutes, but that their response is generally quite helpful. I haven't tried VALinux, but have heard good things about them.

    I hope this is early enough to beat all the M$ bashers et al...

    Forlorn hope, M$ is busy making more of them as we type. (-:
  • Does it make much of a difference that the server was IIS? It's still a crack.
  • 'You can't stop Lazy and inexperienced users from using your product.'

    Where did I say you could? I said that if you make a point of marketing to such users you'll have more of them.

    'Who is working to prevent lazy and inexperienced people from using Linux?'

    Who needs to? You don't seem to get the point. Here it is. Microsoft sites are run by less experienced people because they are sold as being runnable by less experienced (and expensive) people. When Microsoft tells you Linux has a higher TCO because you need more expensive people to run it, this kind of story about the Nasdaq is the hidden cost of believing them.

    It's amazing how powerful market speak is. If you call something easy to use and self-maintaining people smile. When you say that it was designed to be marketed to those who *need* easy and self-maintaining, tempers fly. But it's true. Microsoft sacrificed an awful lot of functionality and reliability so that it would be.

    I never said that everyone who uses Microsoft was lazy and inexperienced, that is just as stupid and false as saying that everyone who uses Linux isn't. But saying that Microsoft has created their own problem userbase thru clever marketing not backed up by a sufficiently clever product is not a generalization and I believe it to be true.
  • Um, there is no online trading going on at the nasdaq.com website. Its a pure information source.

    Right, but people go there to check their stocks. If they see inaccurate numbers, they will act on them, thus producing whatever effect the person who supplied the incorrect information wanted.

    Remember the old saying, "Possession in nine tenths of the law" ?

    Well, here's a new one for you:

    "Perception is nine tenths of reality."

    Think about it... If a stock (or whatever) is seen as uncertain or shaky, then it really doesn't matter how well it actually is doing, it becomes uncertain and shaky...

    NecroPuppy
    ---
    Godot called. He said he'd be late.
  • Stuff like this cracks me up. TEN YEAR OLD SECURITY FLAW REDISCOVERED BY ME -- EVIL VENDOR WON'T FIX BECAUSE OF BACKWARD COMPATIBLITY.

    I suppose it's good to remind people that NetBIOS is an ancient insecure system that was designed for isolated 30 computer LANs, but the fact that someone has written an 'exploit' is not news at all. (Though, it would be nice if MS/Vendors shipped this stuff disabled by default on machines targetted to home markets.)
  • I use both qmail and djbdns at work and at home.

    This really doesn't change my original statement.

    The original author point was "...thousands of people are hacking away at it daily. This caeses security problems to come to the surface very quickly", which is just a reiteration of ESR's statement that all bugs are shallow with enough eyeballs.

    If this was true, the BIND and Sendmail should be the most bug free software out there since they have been around the longest. This is simply not true.

    Also, zealots don't like qmail and djbdns because the author refuses to GPL the software, and those two packages also don't meet the Open Source definition.
  • I hope MS learns their lesson on this one

    www.buymeaferrari.com [buymeaferrari.com]
  • There is nothing inherently wrong with the OS model, there's something wrong with the priorities of some developers and some organizations.

    One of those developers being Microsoft, of course. Look at any of their pre-2000 desktop software which did not work right in secured configurations. Or, the terrible "Exploit Air" sample site they shipped with IIS4.
  • thankfully i'm not at his team, Hit2000 isnt really a team. Me and Nohican are with RooT66 (http://root66.student.utwente.nl [utwente.nl]). Hardbeat (with who I did apache.org) aren't with Hit2000 either. Gerrie Mansur used a way to view server side scripts, meaning he knew the passwords the server used to LOCAL connect to the database. Well that was his great hack, lets spoof 127.0.0.1 from your home cable modem? (no way i work at his cablemodem company :)
  • *scratches head* Why hasn't this modded as funny?

    New mod category sugg: Irony

    Assume for a second they were less than ethical...something like the WTO protester fervor:

    Bill: It dropped HOW many points!?!?!?

    It would be somewhat interesting to see Bill applying for a job at Sun or HP...


    --
    Chief Frog Inspector
  • by Mynn ( 209621 ) on Wednesday October 04, 2000 @05:47AM (#732036)
    Guess online trading is buggy.

    Microsoft trades on the Dow, right?

    There is no Light Side without a Dark Side.
  • The article left out the part about NASDAQ's lawyers. I'm sure that by now their lawyers have given this hacker that "helped" them so much hell already. NASDAQ Lawyer: "If we even catch your bits, two hops away from our closest server, your ass is going to jail." I'm sure they consider him a threat right now and they're wondering, "what else does he know about our systems." Really though, I wonder what heat he got from them.
  • It's just a matter of caring enough to make sure the moderation system works. If it works for me, it should work for everyone.

    If it works well, then I'm happy. If it doesn't work, then it makes /. useless to me, and prolly useless to others.

    The nick is a joke! Really!
  • by brad.hill ( 21936 ) on Wednesday October 04, 2000 @07:51AM (#732039)
    This is not just a problem with one little exploit, it is with Microsoft's whole web app model.

    Why doesn't anybody realize that for a Web application, the following things shouldn't be the case:

    1) Database passwords, admin passwords, ANY passwords shouldn't be stored on the Web server in plaintext.

    2) If an application management interface exists at all on the Web server (which I have some problems with), it should always run on a different port than the application itself and that port should be firewalled such that it can only be accessed from trusted (internal) IPs. The content directory structures for the application and application management should also be segregated.

    An architecture that stores permissions and passwords and allows access to change these things and modify the application through the same channels that the application is provided is INHERENTLY INSECURE BY DESIGN.

    Sorry if I'm ranting here, but as a professional developer working on a financial site this really tweaks my sense of professional ethics. Who designed this crap? Who audited it and said it was OK? Why do people think that Microsoft's architecture aimed at Joe Idiot who wants to put up a web page about his schnauzer fan club without having to learn anything is suitable for use by NASDAQ for cripessake!?!?

  • Wow.. is all that crap real?

    Heh.. *shrugs*

    Jeremy
  • ...I think they use Compaq Tandem systems. When there's that much money at stake, you don't rely on Microsoft/Intel to make your software/processors.
  • Why? Are you looking to patent it?
    A method for finding security vulnerabilities in system-critical servers running Microsoft software, U.S. Patent # 124984545.
    That would be something I'd like ot see :)
  • So could this guy have altered graphs and quotes, triggering massive sell-offs or buying sprees?

    /me shudders while thinking of script kiddies sending Wall Street into a tailspin.

    But I have to say that I wouldn't mind getting ahold of such an exploit--I could pay off my credit card
    and set up a nice retirement nest egg in a few minutes in all likelihood. :)

  • Nobody trades on the Dow. The Dow Jones Industrial average is an average of some of the largest companies in the US. The intention of this is to give an idea of how the stock market as a whole is doing. As it happens, Microsoft has been a member of this average for about a year now, but that is entirely separate from where people go to trade MSFT stocks. The place where people go to trade these stocks is the NASDAQ.
    ________________
    They're - They are
    Their - Belonging to them
  • The point is that there are many people out there who take advantage of exploits like this for nefarious purposes.

    If it weren't for 'good crackers' like this person, we would be much more vulnerable overall. Crackers and Hackers like this person are the people for discovering and fixing security holes in our software. I think they should be applauded for working towards good rather than evil.

    Of course, I forgot that in the utopian society you describe, there would be no need for security...
  • No, I don't believe M$ is very good, either...

    I wasn't implying that in the OS world there was no contacts or reps. I was implying that NASDAQ's vendor/software/implementor was M$, out of anyone that they could have used: IBM, Sun, VALinux, etc.

    My point was that there was an exploit, in a system, that a hacker found. It wasn't really an issue that it was a M$ problem, other than the implicit acknowledgement that there is the image that M$ code is buggy and unreliable.

    The nick is a joke! Really!
  • Read the article. The bug mentioned in the blurb had a patch released on July 17. The bug mentioned in the blurb was not the one that was exploited.
    • Black Hats vs White Hats: Why is it relevent to the issue? How is it measureable or documented?

    You're quite right, it is not easily measured, but it is widely accepted that security holes are often discovered through the act of careless exploits.

    • About the number of security holes: No one can know about security holes that 'no one' knows about. This is true of all OS/webserver combos. I guess it's relevent that M$ isn't disclosing it's source-but that only means that we cannot fix holes we find.

    It is infinately more difficult to reverse engineer a product than it is to look at the source and study it for weaknesses. At the very least, the source code acts as a guide to explore potential vulnerabilities.

    • As fer incentive: Apache provides no incentive to investigate the holes. It is only the case that hackers, white or black, tend to investigate holes for their own reasons, independent of the vendor. NASDAQ is a big enough site that people will try to hack it even if it's running an Open Source package.

    While both IIS and Apache provide people with ample kudos for finding security holes, the attitudes are different. You can't even own a copy of IIS without shelling out for NT server, and then when you do, reverse-engineering puts you in violation of your license agreement. If you were to approach MS with a hole, and somehow convince them that it is a serious issue, you'll be lucky if you're not arrested. If not for piracy, for violation of your License... or you could report it, just give MS a short time to act on the bug, exploit it, make a name for yourself in the news and maybe let a few tools slip.

    Hidden developers, lack of source, and potential legal consequences are all disincentive. The only reason to do them the favour when you just spent weeks hacking through a bug, is in fear of their applications failing.

    Apache is so much easier. Just post the bug to the developers and be laughed at or be thanked. It's like debugging code written by your own company.

    • Open Source projects doesn't inhibit people from *fixing* security holes. Finding the hole is as easy as exploiting it, and people are always trying to find holes to exploit.

    Finding the hole is nowhere near as easy as exploiting it. Not having the source is a major inhibitor to studying the security of an application. Reverse-engineering bugs is a pain in the butt...

  • Erm, the bug (in IIS4 and IIS5) was patched on July 17th, and if I interpret the text correctly, that's THE SAME...

    Yes. You did interpret the text correctly. Your failing, however, it to assume that MSPatch==ProblemFixed. I am an MCSE and a security consultant. I have been doing this since 1997. Right now I'm managing the security on about 200 NT 4 servers. My experience would lead me to guess that either one of two things happened: A) The fix was a "band-aid" that defeated the given exploit code but ignored root cause B) The patch was merged into the wrong source tree and was subsequently broken by the next patch.
    Both of these are very common occurences. I have had to back many hot fixes out because of regression errors. I have also seen many cases (especially in the last few months) where Microsoft has released a patch only to release a second patch a few days later because the first one was inadiquate. I'm not saying that the Nasdaq admins didn't drop the ball, I don't know the specifics of their environment. Making OS updates that often is a pain, even Microsoft has trouble keepi ng up [attrition.org]. I find this whole thing funny simply because Microsoft has spent the last two years holding the Nasdaq up as one of their big success stories. I hope lots of CIO's see that article so that we can start to bring sanity to the server room and shed the Microsoft shackles.

  • by Rurik ( 113882 ) on Wednesday October 04, 2000 @08:04AM (#732058)
    The company uses all Microsoft applications. I used to work at the above company that hosts nasdaq/amex/nasdaq-amex/americanstocks/etc... Financial Insight Systems. They were a Microsoft Certified Solutions Provider, and trying hard to become an MS Partner. Nasdaq had a good dozen-plus IIS Webservers, and we were discouraged from using anything BUT Microsoft software, because of the company's position with MS.

    Had it not been for the fact that we were trying so hard to become an MS Partner (by getting all employees certified at least to MCP, and getting sponsors), maybe there would have been some choice as to what software to install on what boxes. But there wasn't, so it was Microsoft all the way.

    Right before I left the company, they had just hired on a security specialist, at an exhorbant salary, who had no clue how to install NT, or how to install patches. But the fact that the IT team was less than 10 people, we were all overworked, and any extra person was a working person. That plus the fact that the company hired many low-salary low-experience techies to replace high-salary high-experience techies didn't help, but that is too much of a common business practice now to complain.

    The two guys in charge of the servers, getting the big bucks, were being worked to the bone, and I admire them for that. But there's only so far you can go before the IT staff has no say in the matter, and the company pushes them into roll-outs and upgrades that are beyond common sense. Then you end up with a lot of burn-outs, stuck in a job they hate, but have some unknown loyalty to.
  • (Read Cliff Stoll's Cuckoo's Egg to see what he had to go through for this to happen)
    It's sitting on my desk right now, and I've tried to persuade colleagues to read it.
    The reason black hats are often caught is through months (sometimes years) of systematic research and tracking their activities
    Sure, I agree with you, but do the lawmakers know this and want to establish a precedent for "cracking" being ok? I concede the point, but we need to make sure that the lawmakers know the difference. I don't think it's going to wash.

  • You wrote:

    The new crop of us fools see moderation as tools to find the interesting points that lie in the sea of noise. Upon finding an interesting point, I personally drill down to read its responses at -1. That means I lose all the original, interesting posts that weren't responses to someone else? Certainly. I am assuming that the great majority of unmodded good posts were some impassioned response to someone else. Not perfect, but moderation is a tool to find as much good information as possible, as a computer is a tool to filter through noise to find the waveform underneath.

    Of course, I also use the moderation system because this is better than having no filtering at all, given the current traffic (FYI, I browse at +2 and I expand some of the comments that could be interesting, that's how I saw yours).

    However, Signal11 was pointing out several flaws of this system: the most annoying one is that it encourages people to think and behave like sheep. Any comment that criticizes Microsoft and claims that Linux or open source software will solve most problems is almost guaranteed to get moderated up. On the other hand, an insightful comment that praises commercial software has a much lower chance of being moderated up. Also, the moderation is often done on the first 100 or so comments, and the following ones are ignored unless they are attached to a comment that is already moderated up.

    Think about how Slashdot would be with the following changes (I am not suggesting that all of them should be implemented, but this is some food for thought):

    • No comments could be posted in the first hour after the article is published. This would give people more time to read the article and think before they post, instead of being encouraged to say something before someone else does it.
    • The threshold for getting a +1 bonus would not be based on the total number of Karma points, but on the Karma divided by the number of comments posted (maybe with an exponent lower than 1). It would then be better to post some interesting comments than to post as many comments as possible.
    • Karma points could expire after a few weeks, so you could not accumulate them and keep your +1 bonus when posting.
    • Give a +1 bonus to the users who are certified (this requires a certification system like the one used on Advogato [advogato.org] or one based on digital signatures). This would encourage accountability.
    • Each registered used could set up a filter that would give a permanent +1 (or -1) to some users, so that their comments would appear more (or less) frequently. This would only be a local filter and would have no influence on what the other users are reading.
    • The system could encourage moderators to look at all comments, not only the ones that already appear near the top of the page.

    Anyway, as you wrote, Slashdot is a system with entertaining flaws. There will always be some way to abuse it...

  • NT/2000 users : Stupid.

    Yes, but Microsoft's marketing for NT/2000 over the years has constantly told PHBs that they don't need expensive smart admins, only Unix/Linux does. And there are in fact PHBs that believe it - I worked for a company where management tried to set up and admin a NT file/print server themselves. They made it nearly 3 months before the whole thing imploded and we had to hire actual admins. At least with Linux nobody's (yet?) making that claim.
  • Redhat (RHAT) posted a new stock high today. Geeks
    throughout the world celebrated. Meanwhile,
    Microsoft stocks today were mysteriously slumping.
    One company spokeswoman was overheard saying "we
    just don't know what happened"..

    (sneakers anyone?)
    I would try to be funnier but don't have the time..
  • by LAI ( 166400 ) on Wednesday October 04, 2000 @06:05AM (#732069) Homepage
    ... stock in a small Dutch startup peaked at $256 per share today. Analysts are surprised, not least of all at the fact that the stock did not exist yesterday, and there has been no record of an IPO. All attempts at contact with the CEO, Gerrie Mansur, have failed.

    LAI

  • by TheReverand ( 95620 ) on Wednesday October 04, 2000 @06:07AM (#732071) Homepage
    Funny you say that, because if you actually bothered to read the article...

    "I did not use the Source Fragment Disclosure Vulnerability, but used an exploit I wrote myself," he said. The exploit is software tool that Mansur developed and then used to gain access to the servers.

    and

    Dan Schindler, director of technical client service at CBSMarketWatch.com, responded, "Many thanks for bringing this to our attention. We have installed a patch and deployed it to all our data centers.

    yup, typical IIS users.

    Will you stop with the damn zealotry and fud already? Go back to crying about how there are no bugs in RedHat.

  • by digitalboi ( 240039 ) on Wednesday October 04, 2000 @06:11AM (#732074)
    the United Loan Gunmenfirst did it over a year ago: http://www.attrition.org/mirror/attrition/1999/09/ 15/www.nasdaq-amex.com/ -digitialboi
  • by EXTomar ( 78739 ) on Wednesday October 04, 2000 @06:13AM (#732075)
    People who frown on White Hat Hacking would have you believe that keeping people blissfully ignorant of problems like this is a good thing. He allowed his target to get stuff fixed before releasing what he knew. How ethical is it to sit on this information if it can benifit other sites? What is good about having this around for someone with far less scruples to come along and exploit? What is good about having Microsoft not fixing bugs that they may not know about? What is good about customers believing the software they bought is properly configured or as secure as they believe it to be?

    A simple proverb goes something like this...

    "A man isn't foolish if one admits there is a problem. Instead a man is foolish when they refuse too."
  • I wouldn not necessarily critcize Microsoft's web app model. I would critcize the development team with being stupid enough to put db connection strings and passwords in the global.asa. Use a COM object for pete's sake!!!

    Additionally, Microsoft gets more crap from the /. crowd when things go wrong than [I think] they should. People here need to realize that MS software is not necessarily flawed [yes, it might be]. The big key here is how it is implemented. People do stupid things. Apparantly, people do more stupid things with MS software than with non-MS software. These people need to shoulder the the responsibility for implementation. I really don't see a whole lot of flames here for a 'stupid developer' or a 'stupid admin', but the software publisher gets trashed at the drop of a hat. As a developer working with MS technologies, I put up with a good share of their quirks, foibles, and bugs; nonetheless, I need to be held responsible if I implement something stupid.

  • The problem with that is that traders, day traders and most on-line stock quote web sites don't get their data from the nasdaq.com web site, they get it from the NASDAQ data feed. So even if you put phoney stock quotes on nasdaq.com, people would see the real quotes once they logged into etrade or ameritrade or dljdirect to do the trade.

    And like I said before, you're not going to get to the source of the quotes (the NASDAQ feed) through the internet - you're going to have to tap into a leased line to one of the Service Delivery Points and impersonate a Market Maker trader.
  • by Raphael ( 18701 ) on Wednesday October 04, 2000 @06:14AM (#732087) Homepage Journal

    This /. story and the corresponding CNN article contain some vague or incorrect statements...

    • The Nasdaq.com web site was vulnerable, not the whole Nasdaq computer system. This is still a major risk as many investors rely on that web site for their online transaction, but hacking the web site is not the same thing as changing the stock values at the source.
    • The hacker states that he has not used the July 17 exploit that is mentioned on BugTraq. Maybe he used the same security hole with a different exploit, maybe not. I suspect that he has just written his own version of the exploit for the same bug, but it is hard to know.
    • The hacker did not release enough information about the security hole, so I would not call him a "white hat" because he could still use his exploit against other sites if they are vulnerable. So I would only call him "half-ethical".
    • (off-topic) Everyone should read this [kuro5hin.org] and this [kuro5hin.org] and think about how /. has evolved since the introduction of the moderation system. I tend to agree with Signal11 [slashdot.org] (not for everything and not for some of his past actions, but he is mostly right in his description of the Slashdot problems).
  • by Anonymous Coward
    "The hacker did not release enough information about the security hole, so I would not call him a "white hat" because he could still use his exploit against other sites if they are vulnerable. So I would only call him "half-ethical"." Excuse me, but he did no damage and contacted the websites and informed them of thier vulnerability. So he doesn't want to release info about the bug. So what? Let's look at the past to predict what will happen if he does... He releases info, 24 hours later half a dozen scripts/utilities show up around the globe that exploit that bug. 24 hours after that, little asses with barely enough sentience to run a script, are making life difficult for site operators around the world. I think this guy has every right to keep to himself information which he discovered for himself. He didn't have to contact the site operators and in fact, he could have done some serious damage, but he didn't. I don't see what's unethical about not wanting to share your discovery. There's always someone out there who feels obligated to piss on someone elses good deed. Whatever. Try doing some good of your own if you're not happy with the good done by your fellow man, the world doesn't need any more nitpickers.
  • by Otis_INF ( 130595 ) on Wednesday October 04, 2000 @06:49AM (#732093) Homepage
    Hacker did ethical job of providing info to fix. Also, mentions BugTraq and how MS didn't fix the hole when it was posted July 17. Erm, the bug (in IIS4 and IIS5) was patched on July 17th, and if I interpret the text correctly, that's THE SAME DAY as the bug was posted on bugtraq. If you look up the vulnerability on bugtraq you'll see the patches are already available. Check also:

    ht tp: //www.microsoft.com/NTWorkstation/downloads/Critic al/q267559/default.asp [microsoft.com]

    or bugtraq's page on this bug and the solutions:

    http: //w ww.securityfocus.com/frames/?content=/vdb/bottom.h tml%3Fvid%3D1488 [securityfocus.com]

    Now.. slashdot.. tell me... do you have a problem with a certain company or something? because the 'news' seem to get a little shakey in the 'correctness' area. :)
    --

  • Being able to change a web page is enough, especially if you use it in conjunction with fradulent posts as "An Expert" or "An Ex-Employeee" or even as a representative of the company itself. I've seen several stories where fraudulent posts alone have been enough to cause a stock to tank or soar.

    So post on the web that IBM or Sun are going to tank, then cut their prices on the web site by half. The ensuing panic selling would allow you to clean up.

    Of course, the FTC seems to be damn good at spotting this sort of thing and nailing people to the wall for it.


  • and they are still late dammit! Talking Barney 2.0 was supose to be out 2 weeks ago!!! and where is it!! dammit, Microsoft needs to get it act togehter and get the final rev of talking Barney to market.

    Um for my little brothers birthday, yea that is the ticket, it is for my brother, not me. He is 9 err 6 years old.

    I love slashdot, cause slashdot loves me!


  • How many black-hats knew of the security hole before the one white-hat found it?

    How many more security holes are there in the OS/Webserver which we don't know about?

    What incentive does Microsoft provide for people to investigate the holes? They don't even provide the source.

    Open source projects at least don't inhibit people from finding security holes.

    Oh wait... inhibiting somebody from finding a security hole might be part of the NT security model.

  • by Ergo2000 ( 203269 ) on Wednesday October 04, 2000 @06:53AM (#732100) Homepage

    Having been responsible for the creation of a number of websites using IIS I can say that I have NEVER put a password in any web page or asa's source. I either use an account with proper authentication for anonymous access (i.e. configuring the database to allow access from IWEB_), or I use a database guest account. These are absolute no brainers. If using a database system that doesn't integrate with NT Authentication I use the appropriate database guest account for anonymous access (and we are talking about anonymous access here).

    Additionally security, as it always should be, should be very pervasive and built in many layers of the system. There should be a firewall eliminating anything but the appropriate access (obviously) so even if someone did have the database passwords there would be nothing they can do without getting past the firewall (note that this also requires locking down or removing RDS : Look in IIS for the virtual directory "msadc". If you don't need or use RDS get rid of it. It's potentially a backdoor into your DB). However the database should be running on a completely separate machine/domain trusting only the appropriate account from the IIS machine for severely restricted "public viewing" access. The database should be configured with appropriate permissions on every table (usually zero access for anyone), stored procedure, etc. Anonymous web access doesn't need to see the whole DB, and they definitely should never have write access, etc.

    It's sad seeing so many house of cards systems being put up and security is a one layer design : If you get past that one layer you own the system.

    BTW: If you run an IIS system go into Application Mappings and remove anything that you don't need. In the vast majority of cases all you need are ASP and ASA (and also enable "Check that File Exists" for these). There are lots of "opt-out" esoteric parsers that IIS bundles that 99.999% of the population never ever needs, and the problem is that because they're not scrutinized they often harbour gross security holes. If you don't need it, it shouldn't be in there. If a website reads from a database it should be using an account that has appropriate permissions, etc. These are all basics and they are true regardless of the operating system or web serving software.

    Anyways have a good day all.

  • I like how he was just clarifying information, and you had to spew this mindless drivel about how great linux is. Yes. We all know that. Moderators, can't you notice this karma whoring when you see it? You're getting played!

    Uh are you being serious? My posting was a sarcastic play on the standard Slashdot-esque "open source is the solution to all mankinds ills" claims (i.e. read it again : I was actually saying quite the opposite of claiming the greatness of Linux). I think you have an ISAPI filter (;-p) that is parsing postings in a rather nasty way, totally obliterating the original intent.

    In any case I find your comment that I am karma whoring interesting. To be honest I expected quite the opposite (i.e. to find that baby at a -1). I am getting to really respect the moderation of Slashdot because it is no longer "anything-pro-Linux=+++++++", "anything-not-pro-Linux=---------".

  • This would be a lot funnier if Red Hat weren't at it's all time lowest price right now.
  • by astroboy ( 1125 ) <ljdursi@gmail.com> on Wednesday October 04, 2000 @06:24AM (#732111) Homepage
    Because accuracy or quality in reporting is no longer what's most important. What is most important is being the first to report it.
    I.e., CNN and other modern (especially internet) media outlets are tripping over themselves to be able to say `First Post'. Realizing this makes understanding the media a lot easier.
  • by nanotech ( 34819 ) on Wednesday October 04, 2000 @06:24AM (#732112)

    1) According the cracker himself, he did NOT use the July 17 exploit. This indicates that another problem exists with IIS. It also makes him a non-white hat since he still has the power to crack other servers.

    I'd like to give him the benefit of the doubt and assume that he's not releasing it before a patch is finished, to prevent all the kiddiez from going to town with their new 'leet trick before people can plug the holes.

  • Speaking as somebody who works for a company that writes software that connects to the NASDAQ servers, I can state categorically that the NASDAQ servers don't connect to the Internet. Period. Market Makers get their data feeds through a leased line from NASDAQ to a Service Delivery Point (SDP) which they lease from NASD.

    I don't rule out the possibility that some of the market makers might have their NWII (Nasdaq Workstation II) or similar systems running on Internet connected boxen, but they're not supposed to.
  • by grammar fascist ( 239789 ) on Wednesday October 04, 2000 @06:30AM (#732117) Homepage
    So I would only call him "half-ethical".

    He said he wouldn't disclose it because it could be used to gain access to other sites. Now, if he shares the information with Microsoft first, that makes him more ethical than if he had published it to the world - he gives the people with the problem time to fix it before someone else discovers it.

    Now, if Microsoft did nothing about it, then the only ethical thing to do would be to publish it to speed up the fixing process, and thus be fair to Microsoft's customers.

    Of course, my last point could be very hotly debated, but that's how I see it.
  • They will only learn when their customers start to feel the same way you do.

    How true. Unfortuneately their real target customer is large businesses. It's easy for them to convince some dweeby IT pruchasing manager to buy into the M$ propaganda by simply passing out free lunches and cheesy swag. I know, I've been there... I've seen some very devoted anti-microsoft types come back from Redmond with a leather jacket and a frontal lobotamy. It's scary, I tell you.
  • If NASDAQ were using Apache, there would likely have been a fix (realize that MS knew about this exploit for months now and hasn't even bothered to fix it...) and if their admins were worth their salt, they'd have certified the fixes against their system and would have already deployed. IIS people are still waiting for a fix and many wouldn't bother with updating until the next SP was released.
  • I'm sure MICROS~1 will have some PR twist on this, blah blah blah. Although I think this story was VERY worthwhile of inclusion on /., I'm almost getting tired of hearing about Microsofts security flaws, and their inability to deal with them. Microsoft has more hardware, software and programmer resources than probably any other company today. They have NO excuse (IMO) to not address something like this immediately,
  • Uhh... what?

    Linux is not RedHat.

    I don't recall saying that.

    I believe I was referring to this article [slashdot.org]

    Of course any post that pushes your agenda is a good post isn't it?

  • by levik ( 52444 ) on Wednesday October 04, 2000 @05:50AM (#732130) Homepage
    Ok, so the guy who found the flaw came forward and described it... How are we to know he was the first though?

    Is there a chance that people have been secretly exploiting this for some time? Can it be used to gain unfair advantage in trading?

  • by Weirdling ( 147741 ) on Wednesday October 04, 2000 @05:52AM (#732135)
    It doesn't really matter. People keep assuming that administration wants to know or cares if their pet server OS is secure. They don't decide on technical merits or fitness for purpose; they decide on what the salesmen tell them and what everyone is doing. They're just going to think, 'well, everyone gets hacked', and forget about it. This doesn't change any thought process at all because everyone in the server rooms knows whats going on and everyone out of it doesn't care.
  • by pH-j ( 99606 ) on Wednesday October 04, 2000 @06:38AM (#732144)
    Not to say that ms is always on time with patches, but a couple of clicks through the links above lead to a patch released on 14th of July - in response to an earlier exploit using the same basic method.
  • by Fross ( 83754 ) on Wednesday October 04, 2000 @06:43AM (#732145)
    This exploit allows someone to view files that would otherwise be run natively on the server, without being preprocessed. In their entirety.

    Something like global.asa, which for you non-IIS types out there, is a file run on webserver startup, which contains all sorts of interesting information. It is a repository for most developers using IIS to put in information like database usernames and passwords, so the webserver can talk to it.

    _This_ is where the problem is. I'm not sure that exploit as reported on Bugtraq gives write-access to anything (except by revealing another port of entry), but it does allow someone to get access to databases and any sort of thing they choose to store anywhere within the webserver space, in any file.

    Evil. and credit to the white-hat for reporting that. It builds more media coverage, with the hackers looking good, the sites looking good (for patching it quickly), the only ones who look bad are Microsoft for not fixing the bug in the forst place.

    Fross
  • by Ergo2000 ( 203269 ) on Wednesday October 04, 2000 @07:07AM (#732146) Homepage

    Apparently you haven't learned the lesson so many on Slashdot are trying continually to teach : All open source software is immune to holes, bugs, exploits, etc., because there are millions of industrious, highly skilled, hard working, always looking out for everyone else people hard at work code reviewing all of the code continuously. Microsoft, on the other hand, spits out scary trojan horse code that's easily cracked. At least that's the lesson I've `learned' here. If it's a negative story about Linux (i.e. hundreds of Linux machines have been exploited and are poised to be DDOS clients) it's FUD. If it's a negative story about Microsoft it needs to be yelled from the highest towers and if it isn't the top story on CNN for a week straight then it's a conspiracy.

    It's getting intriguing because watching my firewall logs I am getting a TONNE of checks on ports (such as portmapper) that are known Linux exploits, and some that are known exploits (i.e. scans on certain UNIX services yet there are no issued warnings about those services). Apart from the thousands of Linux boxen 0Wn3D already because of the known issues (oh wait doesn't open source magically make the administrator/user a better person therefore they read bugtraq and carefully secure their machine? That's at least the story that I get from Slashdot. NT/2000 users : Stupid. Linux users : Super smart super geniuses!), there appear to be some people in the know about exploits that are yet to become public.

    Security is everyone's concern regardless of OS, WWW server, etc.

  • it sounds like they didn't even rebuild the server after it was cracked. they just installed patches and took the hacker's word for it that he didn't do anything else (install backdoors or whatever). very trusting of them.
  • Most hackers who are hacking into a box for the purpose of providing Admins with the exploit details and how to fix it will most likely not be caught red-handed at the keyboard. The reason black hats are often caught is through months (sometimes years) of systematic research and tracking their activities. It is a long an arduous process to get to the point where the FBI is breaking down some guys door and ripping his RJ45 out of the wall. (Read Cliff Stoll's Cuckoo's Egg to see what he had to go through for this to happen)

    I suspect a white hat would exploit a system and then go to work on a fix. He would not repeatedly go back and exploit the same box over and over. That is a evidence of a black hat. Black hats keep their exploits secret and repeatedly exploit the same hole over and over. A white hat is also not angling for an account on that box from from where he'd set up a base of operations. He just exploits and leaves, leaving little trace of even being there.

    I would be less concerned with a white hat getting caught, and more concerned with black hats post-facto claiming they were planning to go public all along. (Apparently the legal system takes this view as well)

    Regards...
  • > try convincing some PHB... They're like mentally handicapped children...

    Please - a bit more respect for the mentally handicapped!

    --
  • by quonsar ( 61695 ) on Wednesday October 04, 2000 @07:13AM (#732154) Homepage
    ...defaced seven sites i host a year ago in july. he got in through a poorly written PHP script which accepted user input but did not check it. a few hours later i was reading his hit2000 newsgroup posts (courtesy of a dutch-fluent friend) in which he bragged about it and mentioning some of the domains by name.

    "I will gladly pay you today, sir, and eat up

  • by cloudscout ( 104011 ) on Wednesday October 04, 2000 @05:53AM (#732156) Homepage
    The media jumps all over the "Bad Guys" on the Internet. Defaced websites (especially high-profile ones) get plenty of coverage. I'm curious how the media is going to treat this one. If more public praise is given to these White Hats, maybe the trend can be reversed. A disobedient kid is often looking for attention. If the good guys gain as much notoriety as the bad guys... you get the idea.
  • I didn't see the story as one about a Microsoft security flaw, but as one about a hacker. Read it on CNN - they fall just short of calling him a hero.

    That's good.
  • Whoa! That's another quality hack by a Dutchman. First slashdot, now Nasdaq. Holland Hackers vs Site Admins: 2-0 :-) Bram
  • If he did that he would be rooming with John Gotti in supermax at Levenworth
  • You are talking about Application architecture issues.

    I could make the same exact mistakes with a Unix solution... they wouldn't be the fault of Unix, they would be the fault of my mistakes.
  • You can't stop Lazy and inexperienced users from using your product.

    Look at slashdot.org, it's a prime example of lazy and iexperienced people using Linux to host a website, as evidenced by the hacked site last week from a clear text password stored in code.

    Who is working to prevent lazy and inexperienced people from using Linux?
  • 1) Database passwords, admin passwords, ANY passwords shouldn't be stored on the Web server in plaintext.

    How should authentication credentials be stored on the web server? If you own the server or are exploiting a part of it, you are accessing as the web server process. If the web server process can legitimately access the database, why can't the exploit? How do you propose storing the credentials, encryption? Then the key must be stored to decrypt to use the credentials. Attacker gets key instead of the credential, what's the difference. Store them hashed? If hashed credentials are sufficient for access, then obtaining the hash is just like obtaining credentials. Even storing credentials in a tamperproof device is useless if the web server process is performing the access.

    It's not as dramatic as an architecture flaw of IIS. It's an implementation flaw. Credentials that are stored should have minimal access.

    2) If an application management interface exists at all on the Web server (which I have some problems with), it should always run on a different port than the application itself and that port should be firewalled such that it can only be accessed from trusted (internal) IPs. The content directory structures for the application and application management should also be segregated.

    What in-band application management interface exists inherently in the IIS architecture? Most exploits along these lines involve optional interfaces such as RDS, FrontPage Extensions, RAD tools, etc.

    Again the dramatic rant is just glorifying yet another bad implementation of tools. The article and details do not give enough information as to how much of this exploit was due to bad choices of options, configuration, or strictly a software bug. If it's a bug, software has bugs and should be fixed and damage minimized. Damage could have been minimized or could have been rampant in this case regardless of the tools (IIS, Apache, etc.)

    Again, regarding all the access control design you mention, I don't see how most of that relates to the architecture of IIS.

    I'm no lover of IIS or any other web server at that. Any of the tools can be used correctly and minimize risk or incorrectly and hang your ass out. I also believe that IIS is conducive to bad administration due to its point and click mentality. I have to speak up however when people rant about inherent flaws, vulnerabilities, etc.

    Stephen
  • I never brought those points into play; I don't disagree with them, but I don't think they are relevent either...

    Black Hats vs White Hats: Why is it relevent to the issue? How is it measureable or documented?

    About the number of security holes: No one can know about security holes that 'no one' knows about. This is true of all OS/webserver combos. I guess it's relevent that M$ isn't disclosing it's source-but that only means that we cannot fix holes we find.

    As fer incentive: Apache provides no incentive to investigate the holes. It is only the case that hackers, white or black, tend to investigate holes for their own reasons, independent of the vendor. NASDAQ is a big enough site that people will try to hack it even if it's running an Open Source package.

    Open Source projects doesn't inhibit people from *fixing* security holes. Finding the hole is as easy as exploiting it, and people are always trying to find holes to exploit.

    The nick is a joke! Really!
  • Damn...I forgot to tag my text. Sorry all.

    A number of replacements based on the acronym IIS could include:

    It Is Sh*TTY
    I Is Smart! (Refering to the people who chose to use MS/IIS)
    It Isn't Seaworthy
    I Imagined Stability
    It Isn't Stable
    Impression? It SUCKS!
    Impotent Internet Server
    Invokes I.T. Shame
    Imbecile Inside Server

    Anymore that I missed?

    In God we trust...all others must submit a valid X.509 certificate.
  • They were still looking at the NASDAQ web server. They were still hunting for holes. Why? Obviously, because they coveted root. But, as the Bible says, "Thou shalt not covet." This applies here.

    If everybody would just leave everybody else alone, the 'net would be a better place. Instead, scum like this have to go out and hunt for holes on the NASDAQ web server. Why, back in the day, nobody would ever look for holes like that. People peacefully on the mainframes. And, for the record, I did not shoot that person who was using up CPU time playing trek. Not me.

  • The next thing you know he'll be arrested for violating some law regarding vaguely worded "breaking and entering" clauses into computer equipment.

    Such as this Michigan State statute: MCL 767.39; MSA 28.979 reads:

    Every person concerned in the commission of an offense, whether he directly commits the act constituting the offense or procures, counsels, aids, or abets in its commission may hereafter be prosecuted, indicted, tried and on conviction shall be punished as if he had directly committed such offense.

It was kinda like stuffing the wrong card in a computer, when you're stickin' those artificial stimulants in your arm. -- Dion, noted computer scientist

Working...