Interview With Microsoft's Chief of Security 245
Paul Coe Clark III writes: "I interviewed Howard Schmidt, Microsoft's head of security, questioning him about, among other things, cyberterrorism and Redmond's responsibility for insecure features in the wake of many virus attacks.
/. readers might find it interesting. They can find it here."
Insecurity (Score:3, Funny)
I wonder. (Score:1)
Damning with faint praise (Score:5, Insightful)
>
> A: I think any time we find any security vulnerability, we're one of the best in the industry to notify people of the details of them and give them the details to get it fixed.
Conspicuously absent is any description of Microsoft's response when someone else finds the security vulnerability in their products.
Re:Damning with faint praise (Score:5, Insightful)
99.5% of [insert open source app here] users cannot 'fix it themselves' either, because they don't have the technical knowledge of every package in a system, or they don't have time to fix it. The more likely a person is to be able to fix a security exploit on a production machine, the more it would cost for their time.
I agree in theory that open source wins here, but in practice the vast majority of people are reliant on patches supplied by distributors.
Re:Damning with faint praise (Score:5, Insightful)
However with Open Source software there tends to be more than one distributor.
If the author of ProgramX doesn't fix a security hole, then debian might, or redhat might, or suse might, and as soon as one does the others can grab their fix and incorporate in their distribution.
So if the individual user doesn't have the time/ability to patch a hole, at least there is a reasonably large number of distributions competing to fix it (after all consistantly being first to release security patches is one way to win customers to your distribution). Rather than the one and only source not bothering for a few days/weeks/months since they know no one else can patch it first and win over their customers.
Capitalism sucks. But it sucks less than all the other systems we've tried over all of history. Open source leverages capatilism in a way that makes it humourous that people often label it as 'communist'...
Re:Damning with faint praise (Score:5, Interesting)
Absolutely. I remember when a recent (not too serious) hole was found *by* SuSE's security team (I don't remember the package, sorry). One of the primary reasons I run SuSE is because of their awesome security team [suse.com]. They borrow a ton of stuff from OpenBSD, and that's a good thing. I also highly recommend their security mailing list no matter what distro you use, and their security scripts are deliberately distro-blind (I've installed them on critical Red Hat servers at work, and they work beautifully).
I ran YOU (YaST Online Update) manually and I looked through all of the updates. They submitted the patch to the original developers before sticking new packages on their servers. The new version of that package from the original developers (ie: they applied SuSE's patch) was released three days later.
But that's not the most important thing. Am I screwed if SuSE dies? Hell, no. My number one reason for preferring open source is that I can get *anybody* to do the work for me, including myself.
I've said it many times before: price is not the issue, control is. Sure, I can get SuSE for free all I want, but I pay for it just so their packagers and bug-fixers get to stay on board.
Contrary to popular belief (Score:5, Interesting)
Microsoft does focus a lot of effort towards securing their products. Unfortunately the effort is more reactive than proactive. It's a basic flaw in the capitalist model that allows the Marketing and Accounting people to determine release dates--instead of the Developers. The attitude can be paraphrased like this: "As long as the app fires up, it can be released. We'll let the customers be beta testers."
If they were in the car business insted of the O/S business, a lot of people would be dead or mangled.
Re:Contrary to popular belief (Score:5, Interesting)
That's ultimately the only thing that can change the corporate machine... Death. Either the death of members of the machine or members of the public.
Look at the recent Ford/Firestone screwover: Sure, there have been reports about how unsafe SUV's were for years, but Ford was able to rationalize those deaths away as just part of the 'acceptable highway fatality level' that Americans seem to be comfortable with.
It wasn't until people were able to say with proof positive that Ford SUV's and/or Firestone tire were directly responsible for human deaths that Ford was forced to change its practices.
Microsoft is in the same boat. It won't be until the Blue Screen of Death is really, provably responsible for human fatalities (Think saftey control at a power plant, or a crash aboard a military vehicle of some kind) that Microsoft will start being more responsible about their security and program design.
Re:Contrary to popular belief (Score:3, Insightful)
More likely, when there are human fatalities as a result of MS bugs, thats when MS lawyers will remind the grieving families (and anyone else who complains) that they are not responsible for damages caused by their software. They'll insist it was someone else's fault (maybe sacrifice the MCSE who installed the deadly setup), and not change their wats one little bit.
As much as I hate Microsoft, I'd be rooting for them in such a case. The reason is because a ruling against them would set the precedent that software companies are legally liable for misuse of their products. The resulting frivolous lawsuits (certainly people would figure out how to hurt themselves with other software products) would be overwhelming.
Re:Contrary to popular belief (Score:3, Informative)
I find the USS Yorktown [sciam.com] still a pretty good example when people start thinking about using Windows in a mission-critical application.
Re:Contrary to popular belief (Score:2)
Re:Contrary to popular belief (Score:2)
All arguments aside about building a mission-critical system to control naval ships.
What do you think is the more likely scenerio--the naval brass saying "Oh gee-whiz, we screwed up and are using a consumer-grade operating system in our command and control systems. We have no idea how to build a fail-safe system to run our ships..."
or
"We did everything right, someone mis-calibrated the damn thing"
Give me a break, "m'kay". I spent time in the military myself, and have worked as an engineer for a governemt contractor. The only kind of "fail-over" most brass understand is how to switch to CYA mode after a screw-up.
I think it's a mistake to use any "one-size-fits-most" OS in this kind of application, and I think most engineers would agree with me.
Re:Contrary to popular belief (Score:2)
Re-read the Microsoft EULA [google.com] (in fact, the EULA for just about any off-the-shelf software). It specifically forbids use of their software in power plants, aircraft, and other systems that may endanger human lives.
"See, it's not our fault -- they were evil pirates."
Re:Contrary to popular belief (Score:2)
Software, the only people that can certify it are real-live humans. Testing software (except for games) is a tedious, boring job that nobody wants to do, therefore there's a huge gap between the QA management (who get paid big $$ to be the gatekeepers) and the peons (who get paid squat because "all they do is follow instructions"). Such an arrangement is not conducive to true quality.
There's a reason why everything from lumber to condoms is tested by a machine - because it sucks to test it yourself (except for the condoms, but wait, what if they fail?)
Re:Contrary to popular belief (Score:4, Informative)
Ironically, you can find a lot of good information about this in a Microsoft Press book: Writing Solid Code by Steve Maguire. As Maguire points out, leaving your bugfinding to the testers is folly.
Re:GIGO (Score:2)
With software, testing starts at the requirements stage. When you have captured the requirements you then force the customer to review them. You don't just get them to sign off documents, because they will happily do that without reading them. You get them to sit through a presentation. The same applies after the functional specs and you cross check the functional specs against the requirments.
All this before you have written one line of code!!!
As regards exploits if you code defensively against exploits, you will produce better code. You should never trust data that hasn't come out of a checked process and only through a failure-free path.
I also agree that Writing Solid Code by Steve Maguire is a good book. It is a pity that Microsoft seems to regard the practices described in these books as a luxury!!!!
Re:GIGO (Score:2)
It's interesting to read in Writing Solid Code that before the practices in the book were made standard across MS, they had products cancelled because of runaway buglists. The book was published a few years ago now, so all current products were theoretically built using those methods, yet there are still some pretty fundamental mistakes being unearthed - use of a good libc would expose a lot of the buffer overrun problems that IIS has had, for example.
RIGHT ON! (Score:2)
I'll probably be quoting that somewhere, if you don't mind.
Re:Contrary to popular belief (Score:2, Interesting)
There's a huge difference, though, between games and operating systems. Letting the end users "beta test" an OS is by far, the most insane excuse for laziness I've ever heard, and its actually one of my biggest complaints against microsoft.
You can pay people to test an OS, but I can guarantee you that's even LESS exciting than testing a game. An idea comes to mind, though.. get a bunch of young *hackers* together and *PAY* them well, to build programs that test the vulnerabilities of the OS.. or heck, get some seasoned hackers that are trustworthy for such a thing and pay them even better... I dunno.. just an idea...
Re:Contrary to popular belief (Score:2)
See this paper [nasa.gov] on software metrics and reliability, and John Musa [aol.com]'s work on software reliability engineering.
Software reliability can be measured and reliability goals can be set and met with current technology. Management has to make a specified level of reliability a requirement and support a software development and testing process that can meet that requirement.
Re:Contrary to popular belief (Score:2, Interesting)
about the marketing, (Score:2)
1. Marketing != PR
2. Marketing != advertising
3. Marketing != reactive
Marketing is about Product, Price, and Position. It proactive and its scientific, what Microsoft confuses with Marketing is like confusing Socialogy with sleazy used cars salesmanship.
What they need to do, like the vast majority of corperations is completely seperate Marketing from advertising, and accounting. Real Marketing is much closer to R & D and should have a closer relationship to product developement than any other department.
1. Product needs work I think the real market has slipped out from under them.
Security, Stability, Speed in that order is where the market seems to be heading. Less consern with feature creap and more attention to make basic functionality rock solid and easy to use.
2. Price, who can beat free? that's what the consumer pays; after all it comes on the machine, very few people write a seperate check. Businesses on the other hand are kicking and screeming over liciensing costs lately. I guess they are tired of subsidising the consumer grade product. I chuckle when some suit says "open software is worth the price you pay for it." when their company is running 2K oem M$ licienses.
3. M$ has position down pat; they're everywhere.
Re:about the marketing, (Score:2)
I suspect the reason why what is now called Marketing is called Marketing, is because "Advertising" is considered a dirty word in comparison.
Re:Contrary to popular belief (Score:2)
I'm pretty sure the number of bugs discovered in Linux will rise dramatically for the same reason once it replaces Windows as the most popular OS (I'd wager one or two price hikes for WinXP 2 and 3 would do the trick
Of course I won't deny MS does make braindead marketing vs. security decisions as well (active scripting in an *e-mail client*? geez).
Re:Contrary to popular belief (Score:2)
Another thing to consider is that since Windows' code base is being so heavily tested, there would come a time when there wouldn't *be* security bugs in them.
Or at least not that many.
Of course, some of the *design* decision in MS are at fault here, not the implementation itself.
For example, I don't know off hand of any security flaw in NT itself (the OS, not the services like IIS), but putting services as SYSTEM is a big mistake.
In essense, you take NT's wonderful security features, and eliminate them!
IIS shouldn't be a running as SYSTEM, that is a start that would make owning boxes via unpatched IIS *much* harder, and shouldn't have big ill affects. (Except having to consider what rights IIS should get by default, and those should be minimized, not maximized.)
Re:Contrary to popular belief (Score:2)
Except that the Windows code base is a moving target; patches and service packs get rid of some old bugs and introduce new ones.
Spot on as far as IIS and other services are concerned, though
Re:Contrary to popular belief (Score:2)
If you consider Linux's usability by non technical people to be a bug - then you see a bug that would otherwise be hugely widespread, and in a corporation that relied on marketshare - this bug would be the FIRST thing that got addressed.
You're not going to see widespread use of Linux (and you're not going to discover the other bugs) until this very crucial "bug" is fixed.
Fire this man (Score:1, Insightful)
Microsoft's closed-source mode of development guarantees that customers will continue getting cracked and Microsoft will continue pointing the finger of blame everywhere except where it actually belongs.
Ok, but... (Score:1)
The obvious full disclosure question (Score:2, Offtopic)
Unfortunately for those who oppose full disclosure, the issue was discussed on Bugtraq, which finally led to the details of the vulnerability. This means that the Microsoft-supported way of disclosing bugs (Do issue an advisory but do not publish any details that could be used in creating exploits) apparently didn't work out. Ofcourse, there was a (small) delay, but eventually everybody knew about it before the patch was released.
My question regarding this issue is: how do you feel about this issue? Do you really think that not fully disclosing a vulnerability will prevent exploits to be made? One of the arguments for full disclosure is that sysadmins are able to reproduce the error so that they can test if their system is vulnerable, but with limited disclosure this will only be possible for a small (and probably malicious) public.
Mod me down please (Score:3, Offtopic)
Please mod me down before to many people notice my dumbness
Re:Mod me down please (Score:2, Offtopic)
*sigh*
Re:Mod me down please (Score:2, Troll)
Congratulations! (Score:2, Offtopic)
Splendid, man, splendid.
Re:The obvious full disclosure question (Score:2, Informative)
Re:The obvious full disclosure question (Score:3, Informative)
No need to discuss that point on bugtraq, everybody in the web industry knows about it.
I found that bug (or feature, according to MS), months ago (even years maybe), when trying to generate on-the-fly pdfs as part of the web application i was working on. I think that almost any engineer or prgrammer working on web sites should know it. This is not a problem of security by obscurity, but a problem of unsecurity by stupidity (from MS).
In fact, this is an argument to null the whole "security by obscurity" strategy. When every engineer or programmer knows about the bug, then there's no obscurity anymore. And with many of the security bugs found on MS OSes, it's what indeed happens, sooner or later. In fact, i think this is what happens with most software, not only MS', and that's why it's not responsible from them to use such a strategy.
Re:The obvious full disclosure question (Score:2, Informative)
How people *feel* about this issue is irrelevant. Full disclosure, for all its faults, has worked better than just telling the vendor or a select few. Generally what has happened when vulnerabilities were kept quiet was that the vendor sat on the problem or took care of it at its leisure, leaving systems open for crackers who could and did silently exploit the vulnerabilities. Full disclosure 1) lights a fire under the vendor so that it actually *does* something, and 2) allows others a chance to find ways of coping with the vulnerability until a fix comes.
This is not theory; it has been shown to work in practice.
USA Patriot Act (Score:3, Informative)
Full Bill:
http://www.politechbot.com/docs/usa.act.final.1
EFF Analysis:
http://www.eff.org/Privacy/Surveillance/Terrori
OS monoculture (Score:5, Insightful)
For this, as well as for many other reasons, it is essential that one operating system and one software company does not dominate the industry. The cost of dealing with cross-platform issues is the price we have to pay for a competitive market and a resilient infrastructure.
Suggestions that our salvation lies in uniformity, market dominance by one company, and bigness are more reminiscent of the central planning of the USSR than of what has made our society so successful. It's kind of funny to see that some of the most staunch conservatives and defenders of Microsoft-style laissez-faire economics seem to be falling into the same trap that the communists fell into.
Re:OS monoculture (Score:2)
It may have come out of thier mouths at various times as "when linux has our market share, linux will have a similar number of vulnerabilities".
When phrased that way, people often scoff.
However, if you accept that microsoft's installed base contributes to them being a common target of attacks (without considering the relative quality of the software), then it seems reasonable to presume that as the popularity of a system increases, the frequency of people looking for exploits on that system will also increase. If you beleive there are always more bugs and exploits to be found, then it also follows that more vulnerabilities will be discovered.
Summary ? Part of MSes high number of security holes has to do with installed base size. (*1)
As linux popularity increases, it seems reasonable that the number of linux vulnerabilities reported will increase as well.
Yet when MS says "if linux were as big as us, they'd be just as insecure", some people dismiss it outright.
You say yourself that for many reasons, one OS should not dominate the industry. I agree. How many "linux will rule the world" zealots would agree ? Are they who do not, as forward looking as you or I?
*1 - This is not an excuse, a bigger part of MSes high number of security holes has to do with assumptions made during product design, and default configuration choices.
Re:OS monoculture (Score:2)
It's called Java, I believe
And it doesn't look as if Java is going to be the environment of choice for every office suite/multimedia app/game out there for a long time to come (i.e. never).
Also, if you do get a situation where one programming standard dominates the market the same way Windows does now, you'll just shift the problem from MS to the new standard.
software versus terrorism (Score:4, Insightful)
- Just an AC
Real Threat (Score:3, Insightful)
Remember the Morris Worm? It brought the entire internet to its knees, and Robert Morris didn't mean to release it. What if a "virus" (more correctly, a worm or trojan) is created that destroys every MS-Windows installation? This means more than just Grandma Jane's computer-- I mean military, telecom, and hospital-controlling computer in the world.
The threat isn't that great. Although it wouldn't be expensive in the monetary sense, it would be hard to engineer. But as long as the threat *exists,* it must be considered a potential.
- Tony
Re:Real Threat (Score:2)
Re:software versus terrorism (Score:2)
Attacking M$ is analogus to Lex Luther shining Kryptonite on Superman, an attack on truth, justice and the american way.
It also alows microsoft to imply that any vulnerablities that were discovered before 9/11, isn't applicable to the present epoch. Not to mention that it lets Howard Schmidt put the interviewer, Paul Coe Clark III, on Microsoft's friendly interviewer list.
Typical responses? (Score:2, Insightful)
Anyone who knows that they're a market leader does have a responsability to see that their stuff isn't going to be the cause of the next great Internet collapse. MS is quickly becoming the leader in getting their bugs exploited, and with so much market penetration, we really could be facing quite a disaster when a better worm comes along.
Does anyone out there work for some other big company with lots of market share? What type of responsability do they assume for the security of their products?
Mac
Hard question dodging 101 (Score:5, Insightful)
A: If you look at the development process, and how long it takes to develop these things and get them out the door, this is not something that people started working on six months ago, and the developer community is saying this is a bad thing. This is stuff that has been in progress for years, which is why we've had to effectively retool the way we do things internally, to meet that new threat environment.
I don't know if the interviewer changed tapes in his recorder or what, but this is the single most important question he asked, and it was completely and totally unaddressed. This one question drives home the problem with Microsoft security, makes him aware that yes, we were all SCREAMING "Stop the madness" BEFORE it rolled out, and he waves his hands saying that hmm, we're meeting the new threat environment. What?
Is there any chance that anyone of importance will see or read this interview? That's the shame. I'd love it if the appropriate congresspeople and/or attorneys-general could see this nonsense made more public.
Not that I expect anyone in his position to actually answer all the questions asked, but it'd be nice if his lips moved in sync to his words, too.
John
What did you expect? (Score:2)
A: Well, yes. You're right about that. We were given the signal loud and clear, and completely ignored it. We here at Microsoft are terrible at making software. In fact, please don't ever again buy any of our products. We are very, very bad.
I mean, this guy is speaking on behalf of a multi-billion dollar software giant. He is not going to risk his job by embarrassing his whole company. That's why companies like MS (GM, American Airlines, Exxon) hire guys like this. For reference, consult any presidential press conference.
Re:Hard question dodging 101 (Score:2)
I think Howard Schmidt went to the Ari Fleischer school of question dodging and graduated with highest honors. Damn, there goes my karma--again!
What were you expecting? (Score:3, Insightful)
Every corporation has a culture. The culture MS has chosen to develop is one of lying, cheating and stealing.
Re:Hard question dodging 101 (Score:2)
Yeah, try again.
Re:SCREAMING (Score:2)
But is the world a better place because of Outlook? The answer was "no" when we saw HTML in email, and it's still "no" because of HTML in email. Nothing's changed, it's gotten worse as they have continually moved to support MORE crap in the client.
(*OK, so they didn't actually market this last point.)
All he says is that they're working on "meeting a threat". A threat that exists solely because they chose to install unneeded, unwanted, and ultimately insecure extensions to email. They chose to do so with plenty of forewarning that adding any automatic processing to email would create a viral breeding ground where none existed before. And that they did so simply to offer a free email reader to cut market share from competing email manufacturers just adds antitrust icing to the cake.
Yeah, I'm screaming. I'm screaming because I'm still pissed off. 8 years of this crap and it's only gotten worse.
John
Mistyping of what he _actually_ said... (Score:2, Funny)
A: Security?
Q: ... yeah, security ...
A: Oh... that......... Our policy is to blame the people who find the holes in our software...
Q: What about the people who put the holes in the software in the first place?
A: Yes, of course. We're currently trying to purge the Al Quida factions from our programming team.
They're trying (Score:4, Insightful)
Needless to say, sysadmins apparently don't read checklist, follow best practices, or pay attention to alerts. I have seen real movement from MS (on their site, in comments on NT BugTraq, and in other places) that they take this security stuff seriously now, and they are coming out with some good tools (they're even subcontracting them to get them faster and by security companies who have a better track record) to help automate patch downloading and installation, scanning of network resources for missing patches, remote deployment of patches (for those 500 web servers you have in your datacenter), and various checker tools which will basically verify the security checklists for you.
Apparently MS realizes they made a wrong decision in their approach to security (trusting the sysadmin's dilligence), and they are making strong strides to change this now, and in the future.
I know many of you dislike MS, but you must give them at least that.
Re:They're trying (Score:3, Troll)
trusting the sysadmin's dilligence
Yeah, thats why they have system files hidden and an explanation of what the Start Menu does on Windows 200 Advanced Server
The point of MS's software, pure and simple, is that the user doesn't have to even think to be able to use it... which is totally contradictory to a the idea of a productive yet secure system...
thoughts of desperation follow...
Re:They're trying (Score:5, Informative)
You think they are making strides to clean this up? Looks like patching the PR to me. Take a look at this...
MS rolls out security obscurity bribe program [theregister.co.uk]
[microsoft.com]
Code of Conduct:
Microsoft Gold Certified Security Solutions Partners are leaders in the security industry, not only in their products and solutions, but also in their standards of behavior. All Microsoft Gold Certified Security Solutions Partners shall follow a code of conduct regarding the responsible handling of security vulnerabilities. This code of conduct is intended to allow a product vendor to address any individual vulnerability and issue a patch, workaround or other response to the public. Microsoft Gold Certified Security Solutions Partners shall take reasonable steps to ensure that they do not publicly disclose details that would directly allow an outside party to develop or execute an attack exploiting the vulnerability.
Re:They're trying (Score:2, Interesting)
Microsoft's approach to security has/had nothing to do with trusting sysadmins and everything to do with gaining market share. The marketing department drives development plain and simple. You really should open your eyes when you are working on them NT servers, do they look like servers?
Microsoft's products should install out of the box as secure as possible, not with a blank SA password for SQL.
I am forced to work in an NT world and I hate it. I have worked with many other server OS's like Novell and Linux distros, and MS stuff sucks.
People who NT is easy are wrong, NT is high maintenance really high.
Speaking of high...I gotta go cough cough
The only good thing I can say about MS is that Windows 2000 works better then 95/98/ME every did, but that's it.
This Guy (Score:2, Insightful)
Tyops? (Score:2, Funny)
I Loved this bit... (Score:5, Interesting)
In some cases, it's tantamount to screaming "fire!" in a crowded movie theater.
Yeah, except there really IS a fire.
So when there is a fire in a movie theatre, he's suggesting the person who notice it just quietly go and tell the management (who will wait to see if it's really a big fire, and then assign some staff to attempt to put it out), instead of telling the people whose lives are in danger?
Yeah, GREAT analogy.
Re:I Loved this bit... (Score:2)
My take was that he was saying that EVERYONE vulnerable should be notified in the most efficient way possible, but no one else really needs to know. I think that is the theoretical goal from his point of view. ie: if everyone in an apartment building has a security issue, you tell them. You do not post it on fliers in front of the building, or broadcast it to criminals.
That being said, he, and Microsoft, are acting INCREDIBLY ignorant with respec to the way people use computers. People do not maintain computers, by and large. Paid administrators do, but home users work on it until something works, and then do not touch it out of fear that it will become a time sink. Eventually a bug is found, and they get remote rooted.I am still being attacked by computers on my subnet that have had IIS rooted and do not know about it. And that was puslished MONTHS ago.
ANY operating system serving ports on the Internet has to be watched and maintained. Until Microsoft realizes this, and actively provides for it, their products will continue to be the least secure around.
Re:I Loved this bit... (Score:2)
And if you go pull the fire alarm, these same people will panic in the same way.
What's the difference?
Did he really say that? (Score:5, Insightful)
(bold added by me)
Shouldn't a company with Microsoft's resources be able to identify security holes before the product is released?
Maybe this "release-and-then-check-for-bugs" strategy explains why there are so many MS explots?
Re:Did he really say that? (Score:2, Insightful)
..and 10+ years of software engineering have shown me that this does indeed appear to be true.
Re:Did he really say that? (Score:2)
would prevent a LOT of buffer overflows. Despite the following:
This nugget of easy-way-to-enhanced-security knowledge has been known for YEARS, yet C programmers blithely ignore it. I'm sure there's something equivalent in C++ too.
Leaving keys in the car is still stupid... (Score:5, Insightful)
If I leave my keys in my car because it's convenient for me, and somebody steals my car, is that my fault? Ten or 15 years ago, the likelihood of that happening was very, very low. But the threat picture has changed dramatically in most places.
I don't know where he was living 15 years ago, but where I grew up (granted I didn't have a car then), there's no way you'd leave your keys in your car and act surprised when it was gone in the morning.
If your car gets stolen because you left the keys in it, its not entirely your fault because it's illegal to steal the car regardless. But it was still bloody stupid.
If it was my friend who left my keys in the car, I'd be pissed as hell. And if the manufacturer put a spare key on every car in the exact same place so it was easy to find and my car got stolen, I'd join the class-action lawsuit that would surely result.
It's one thing to say that MS has good security, and non-disclosure is the right way to go, etc etc. He has to. But to dismiss this question as though it wasn't their fault, without even a "Yeah, we shouldn't have done that", I think is demonstrative of the thinking that led to the problem in the first place.
I know people who do that (Score:2)
Really, this parallels the whole trust on the Internet thing. I don't leave mail relays open anymore, I don't run ftp or telnet services; hell, I don't even let my computer respond to ping or finger.
Microsoft should have fixed their default settings problem a couple years ago. I wouldn't blame them for having it like that, though. Most Linux distributions come somewhat secure out of the box now, but a year ago most didn't.
Deny Deny Deny (Score:2)
AHA! (Score:4, Troll)
The software is developed in a suburb of Seattle Washington (state) and the company's security chief works in Washington (DC), nearly as far from the software department as you can get and still be in the continental US.
THAT explains the security problems in Microsoft products!
B-)
Screaming "fire!" in a crowded movie theater (Score:3, Interesting)
But there is a fire. Its only irresponsible to shout "fire!" in a crowded movie theater if there isn't on, just like it would be irresponsible to post non-existent exploits to bugtraq.
Mr. Schmidt is suggesting:
Geez... They must have cut their spin budget recently.
Logic fault (Score:3, Insightful)
A: I think that picture has changed. Once again, we've been developing stuff based on ease-of-use for the customer . . . it goes back to a physical analogy. If I leave my keys in my car because it's convenient for me, and somebody steals my car, is that my fault?
No, it's not. But if the Foo Car Company set all their remote locks to open when you clap your hands thrice, for "when your hands are filled with grocery bags, to save you from searching your pockets for the key", and only allowed this to be disabled by opening the hood and clipping the red wire with the blue tracer, I'd say they would be responsible for my aunt's CDs disappearing.
Opening the hood and clipping a wire is farther than most people want to go when it comes to modifications. I'd even wager that it is more than many drivers are capable of. Searching around in the "control panel" is further than your average MS-Outlook user is likey to feel comfortable with. They are afraid of "breaking" things.
The car keys are in the user interface portion of the car, I guess my point is. It's "easy" to remove them, put them in your pocket, to provent unauthorized use. How "easy" is it to disable the trojan propigation in Outlook?
Re:Logic fault (Score:2)
Re:Logic fault (Score:2, Interesting)
I never compared the two. I just made a simple anology, much akin to the one posted in the interview. I just happen to think mine is more correct.
But nevertheless, in terms of functionality, Linux is not very user friendly (you have to do lots of steps) in order to reduce the faults in the system (whether security or stability.)
Strictly speaking, your average Linux OOB(out of box) experience is safer than your average Windows OOB experience. I recieve daily trojan emails, but see nothing in my ftpd logs.
Microsoft on the other hand wants every user will be able to use a PC even though it is their first time to use one. In the process of doing that, if you disable all features (because of security) then nobody will buy their OS since I believe their support call center will be full 100% of the time.
Be able to, be forced to, what's the difference, right? There has to be a certain expectation of knowledge.
Also, there's a difference between useful and secure. M$ may have done a bad thing when they allowed
It's funny you mention that nobody would buy their OS if it were secure.
Standards, "Innovation", Best Practices (Score:3, Interesting)
Classic Microsoft... standards bad, embrace and extend good... we do it for security reasons, not because we're trying to leverage our monopoly power into yet-another market. I can almost understand the "don't tell anyone about the exploit until we have a chance to fix it" stance, but this makes me sick to my stomache.
I would be in favor of government standards of security. And not just because it would force more open standards, but because it's a good idea. Yes, it will probably not be easy to implement, and it might force MS to ship a product or two late, but at least it will enforce some needed checks from a company who's concept of security is identifying problems after product release.
New t-shirt slogan: (Score:2)
"My server got rooted, and all I got was assurance from Howard Schmidt that we have a special obligation to improve security"
number one priority? (Score:4, Funny)
I think security is recognized as the number-one priority across the company.
After the interview, Mr. Schmidt realized that the question was actually about Microsoft's software products, and not about locking the doors each night at MS HQ.
Interesting quote (Score:2)
I think security is recognized as the number-one priority across the company. That goes not only to operational security and securing our assets, but also to product development. (emphasis mine)
Anyone else find his priorities in terms of security, shall I say, interesting?
Re:Interesting quote (Score:2)
The security officer in most companies is primarily responsible for the security of the company, its assets and employees. Not its customers, and not the quality of its products.
The product managers should have primary responsibility for their products being secure and bug free, perhaps in consultation with the company security officer.
For instance, at my company, the security officer has a big interest in how good the locks on the server room door are. He has a high level contribution to make about firewall policy and employee RAS access. He has no concern with what solaris patches are currently installed at our customer's sites, any more than he cares what door locks are used at our customer sites.
Re:Interesting quote (Score:2)
Thanks for the insight! From the way the article was written, it really looked like Howard Schmidt was in charge of security matters in Microsoft products above everything else. Things are kinda clearer that way.
Quote of the day: (Score:2)
'Nuff said...
responsible reporting... (Score:2)
Bob, decided to be a responsible reporter, silently walk out of the movie theater when he found the toilet was on fire. He then dialed 911 across the street for somebody to fix the problem "Hi, are you sure you are the person in the best position to put the fire off? I wouldn't report until I get to this guy."
comparing Microsoft's performance over the years (Score:5, Informative)
The last 3 security vulnerabilities for XP relate to IE, Windows Media, and USB plug and play feature.
I should say that the products of Microsoft are just becoming mature right now. It is unfair for Linux and Unix since they I believe they have been ages before Microsoft introduced Windows. So it terms of maturity, Linux took years just as Microsoft is.
Like in service packs, the Windows 3.51 had around 13 (or more if I remember correctly.) Windows NT4.0 had 6 (the 7th was not released officially.) Windows 2000 now has 2 (and they are releasing SP3 Q1 2002.) There is WindowsXP although there is no SP around (I believe it may be in the alpha stages.) The number of service packs that is released actually decreases due to the maturity of their products. And most people even some *nix guys say that WindowsXP is actually more stable than ever.
It is also noteworthy to say that the base OS of Windows is getting more secure. It is just the apps integrated with the Internet that have most of the security threats like IE, Outlook, Office. For the servers in W2K, the services are the ones problematic and the user has the freedom to deactivate some and use an alternative. Like in Linux, the same thing applies where a server may use the services from different publishers.
I am not saying that Microsoft is good or anything but I say that comparing Windows (PRO/HOME) and Linux/Unix is like comparing apples and oranges. They are built for different purpose thus designed differently.
In the server arena, I think that it is only in Windows 2000 that they released their 1st server OS and not in Windows NT 4.0. Their Windows
Howard will run the nation security? OMG.... (Score:2)
A: Right.
Howard failed to see the sarcasm in Paul's response - he's being totally irrelevent in answering Paul's question. Paul asked you security in telecom not freaking capacity issue!!!
Talking about we ain't got enough clueless people to run the security....
What they are securing (Score:2)
We've all been saying that Microsoft should improve their security, but all the time Microsoft has! Here, have a look at what he says:
I added the emphasis, but look at it! They are securing their assets. He lists security in product development is an afterthought.
So now you know why they are so anti-piracy: they are securing their products.
Now there's a title... (Score:4, Funny)
Microsoft's head of security
Isn't that like the taliban having a minister of women's rights?
Re:Now there's a title... (Score:2)
More somthing like the first thing below the minister. It is like saying "this is the most important thing", then "I am in charge of it" , then "I am not the most important person at MS".
a non-MS bash (just this once) (Score:3, Interesting)
1) As Multics taught us, security with significant hardware support is significantly easier to do than without. A result of this is that we need to be asking Intel (etal) about help (like tagged memory blocks) in hardware. It really is time that we got away from just the stale VonNeuman ideas that Mr Cray graciously gave us in the 1960s and 1970s.
2) Once the hardware exists, then we can move to implement better O/Ses that are significantly more robust. Everyone will win, even MS.
-- Multics
Closed source can never be as secure (Score:4, Interesting)
For instance. Even with all the security patches Microsoft has provided with IIS, their FTP server is still insecure. How do I know this. Because some warez dudez managed to use my server, even though I had applied all the patches and set the FTP directory to be read only.
Now, if this ever happens to you, let me tell you, these guys play a dirty trick so you can't easily delete their directory. They name their folders with names that cannot be deleted the normal way, names like COM1 or DEL, names that are reserved somehow when you try to delete the files and folders.
The amusing thing about this is that the only way to get rid of these files is to install the posix utilities and use rm to get rid of them.
Now here's the kicker. If you use rm -r CO* to get rid of a directory called COM1 you might find out that this directory is really called "COM1\
Yes, I perform backups, so I proceeded to restore the files. But insidiously, SQL Server on the same machine refused to run, because it felt the installation had been corrupted. I basically had to figure out how to trick it into running again, because(another hideous design fault) you can't just uninstall SQL server and reinstall it and hope your data directory is OK. I had no way of doing an up to date backup of my data on this machine. So I had to trick it into believing it wasn't a corrupt installation, or I would have lost data.
Now, how many things can you count that would have never happened with an open source system. You certainly wouldn't have files with the latter part hidden. You can back up data directories to completely different servers by simply copying the directory. Its very easy to drop in other FTP servers without loss of functionality. And there is certainly nothing that will stop a program from running if all its files are there and the execute permission is set.
All, in all, I had a very frustrating experience that never would have happened with a Linux system. With Microsoft, its their way or the highway, and you can't change things or fix them when the design is bad. Rather than the user dictating what the software does, Microsoft dictates to you how their software will work. Because of that, closed source is less flexible and configureable, is less managable and nimble, and therefore cannot respond nearly as well to any number of problems, including security.
Keys left in the car? (Score:4, Insightful)
Q: Some of the security problems with Microsoft products are things like buffer overflows. That happens in programming, and you fix it. But others seem like boneheaded decisions based on marketing. Things like enabling Windows Scripting Host by default on millions of consumer machines and making e-mail attachments executable. In these big virus attacks, doesn't Microsoft bear some responsibility for those choices?
A: I think that picture has changed. Once again, we've been developing stuff based on ease-of-use for the customer and what the customer requirements are. I think what happens now is that we've seen the threat picture change. I think it goes back to a physical analogy. If I leave my keys in my car because it's convenient for me, and somebody steals my car, is that my fault?
Okay, but what if the manufacturer ships the car with the keys attached to the steering column with a chain,because THAT way I don't have to worry about losing the keys? Now I have to find out (from someone other than the manufacturer, since the manufacturer's customer support staff is clueless) how to detach them. NOW is the manufacturer responsible, in any way, when my car is stolen?
MS Security cannot be fixed quickly (Score:2, Insightful)
Number 1. Adding new product features
Number 2. Getting products on the shelves
Number 3. Security
The reason for this is that people can't tell whether a product is secure by looking at reviews or even trying it out (and they sure as hell can't tell by looking at a shrink wrapped box). So, there are very few dollars in it short-term.
Longer term, issues of reputation kick in - and Microsoft are finding that their poor reputation in this area is now biting them, especially as they move into net services.
Unfortunately, turning an entire corporate culture around on a dime is not possible. Even if it was, there's way too much legacy software around, requiring compatability. It will therefore be some time before their product security is all it should be.
Re:MS Security cannot be fixed quickly (Score:3, Insightful)
Your list is incomplete:
Seriously, though, Microsoft is a victim of it's own success in at least two ways. It is true, as they so defensively claim, that their position as the number one OS and applications vendor makes them a huge target for hackers. It is also true that their legacy of subordinating software design to world domination has resulted in architectures that are much harder to secure than those that have had less interference from marketing. They may or may not have finally woken up to this truth. But in any event, as you say, it will take many years to recover from the poor design decisions that have resulted in their current security troubles. In the meantime, while they (presumably) work at incorporating security awarness into their design and development processes, and struggle to find ways to patch the holes in their huge installed base, they must work to limit the damage these flaws can inflict on their reputation. Thus we see them trying to muzzle those who publish flaws on full-disclosure lists like bugtraq. (I know the full-disclosure debate is more complicated than that, and so is Microsoft's relationship to the various security communities.) It is helpful to their cause that software design is esoteric and incomprehensible to most folks not directly connected to the industry. However, that was true of the issues in the anti-trust trial, and that didn't save them from a conviction, ultimately.
Unfortunately, turning an entire corporate culture around on a dime is not possible.
Well, now, remember that this is the company that realized that they had missed the Internet phenomenon in 1995, turned on a dime, and crushed Netscape in four years. It doesn't work to underestimate these guys. Besides, getting this security mess cleaned up (or at least improved) will make the World a Better Place (tm). for all of us. (At least all of us sysadmins.)
Microsoft's new security inititive! (Score:2)
digital rights management operating system protects rights-managed data, such as downloaded content, from access by untrusted programs
To protect the rights-managed data resident in memory, the digital rights management operating system refuses to load an untrusted program into memory
If the untrusted program executes at the operating system level, such as a debugger, the digital rights management operating system renounces it's trusted identity (it lobotimizes itself)
To protect the rights-managed data on the page file, the digital rights management operating system prohibits raw access to the page file, or erases the data from the page file before allowing such access.
operating system also limits the functions the user can perform on the rights-managed data and the trusted application
provide a trusted clock used in place of the standard computer clock
It's good to see Microsoft finaly getting tough on security!
-
Ahem... (Score:2)
wu-ftpd
Open-SSH
TUX HTTPD
lpd
SYNcookies
Lion
Ramen
Torn
Adore
etc...
We get several attacks from compromised LINUX boxes every fucking day of the week!
gee, that Microsoft software sure does suck...
Some guy once said "Let him who is without sin cast the first stone."
Do you see what I'm getting at here?
BSOD Is pretty secure? (Score:2)
Nobody can access my computer then - pretty neat, eh?
Seriously, 2K is much better than NT was but I wonder whether Microsoft actually knows what computer security is? We were taught the initials C.I.A. That is Confidentiality, Integrity and Availability.
It doesn't matter how a product fits into these categories as long as the customer knows what it is being provided. If you are selling a system and application to a customer and telling them that they can bet their business on it, then it had better not go down every other day or let the whole world and their dog every time you connect to the Internet.
Re:Yeah...that makes sense (Score:2)
~/windows/source$ find . -name "*.c*" -exec grep -l gets {} \; > ~/msholes
Re:Yeah...that makes sense (Score:2)
True reason MS won't release the source code for a security audit:
~$ df
/home 200M free
~$ cd windows/source
~/windows/source$ find . -name "*.c*" -exec grep -l gets {} \; > ~/
volume
umm, that would match fgets(3) as well, which is much safer.
-BlueLines
Nail on the head. (Score:3, Informative)
So...who cares if there are problems. We'll find them eventually - as soon as someone exploits them and we hear about it.
Precicely.
If you want bug-free code you need to start at the architecture/design process (avoiding bug-prone choices), then debug as you go. It's like growing a perfect crystal - you push the impurities out as it solidifies, so only the boundary needs attention. The longer you wait, the larger your search space for each bug, and the bigger the hive of ofspring each bug has produced as new code was added to buggy code.
Security issues are a special case of "bugs", with more than the typical amount of effort needed at precoding stages to avoid building unfixable problems into the basic architecture.
I wonder if they release their code like that for QA as well. It's a matter of identifying bugs once the product is released.
My impression is that Schmidt is completely unaware that software QA, or any other pre-release potential for (securyty) bug suppression, exists. At a minimum his statement implies that Security as a department doesn't participate in architecture, design, code reviews, or QA, and that its leader either feels no need to do so, or is deliberately directing attention away from an inability to affect those stages.
That the head of security for Microsoft could emit such an answer is appalling. But it also goes a long way toward explaining the security problems in Microsoft products.
Re:Microsoft's Capability (Score:2)
>a long way to go, and I'll be recommending to all
>my collegues not to try out this so called
>operating system.
Hmmm. "swayed me back"..."so called operating system"...
"recommending to all my collegues"...
Hooom, hum.
Heck, who needs 'Lord of the Rings'. I think we got real live trolls right here.
Re:Microsoft's Capability (Score:2)
"We are Slashdot... you will be assimilated." Form your own opinions, people.
Re:Microsoft's Capability (Score:2)
Make an vague, content-free, 'fanboy'-type comment about Microsoft, and you are a martyr.
Suuuuurrrrreee.