More Attacks on Linux than Windows 412
the special sauce writes "This vnunet.com article discusses the trend of attacks this year as compared to last. Over all, according to mi2g, attacks are on the rise. However, though attacks on Linux systems are up, attacks on Windows based systems have actually dropped dramatically when compared to last year. If the trend continues, by the end of the year, attacks on Linux systems may surpass attacks on Windows systems."
Which are more successful? (Score:5, Interesting)
Which are more successful? The attacks on Windows machines, or the attacks on Linux machines?
Maybe the attacks on Windows are falling off, because there's enough back doors already. Between Microsoft and Kazaa, I'd say things are good-to-go, from a back-door point of view.
Re:Which are more successful? (Score:2, Insightful)
More attacks on linux could be occuring because it's more likely to succeed?
Re:Which are more successful? (Score:5, Insightful)
Anything is possible, even if not it's not probable. It could also be a result of Linux displacing windows in the server space. If there's 100 attacks/second, and windows' market share falls by 2% at the same time the Linux market share increases by 2%, then there will be a decrease in the number of attacks on Windows, and an increase in the number of attacks on Linux.
If this trend continues, then it logically follows that there will be no more Windows servers at some point in the future.
Re:Which are more successful? (Score:2)
Re:Which are more successful? (Score:2)
Re:Which are more successful? (Score:3, Funny)
Also if current trends continue, the number of transistors in a microprocessor will exceed the number of subatomic particles in the universe in 360 years.
Re:Which are more successful? (Score:5, Interesting)
Re:Which are more successful? (Score:5, Funny)
Contrast that to.....IIRC Extremetech [extremetech.com], which set up a Win2k and IIS server, and had it infected with Code Red Twice within like 26 minutes of connecting it to the web and downloading updates from Microsoft.
Re:Which are more successful? (Score:2)
Re:Which are more successful? (Score:2)
Is this still correct now? I've first heard these stories last August/September, and at that time, they were probably true due to the enormous stock of already infected systems. However, is this 25 minute figure still true nowadays? Obviously, a box gets rooted much quicker if there are hundreds of thousands of instances of Code Red out there trying to stumble upon its IP, than if there are only a handful infected machines left. Of course, even with only a handful Code Red machines left, one of them will eventually "find" the newly installed box, but I'd guess this would takes days, rather than minutes.
Re:Which are more successful? (Score:2, Informative)
Is this still correct now?
It is indeed correct. Anyone who stays on top of their web server logs will see plenty of code red attacks every day. The fact that a default windows 2000 install is susceptable to it doesn't help. Personally, I don't want to keep up with all of the patches that IIS needs. Apache out of the box is secure enough. However, if you absolutely have to use IIS, make sure you burn SP2 along with the other updates to a cd beforehand and install them onto the machine before connecting it to the internet.
Re:Which are more successful? (Score:3, Informative)
Just grepped for <tt>../..</tt> in my <tt>httpd/error_log</tt>.<p>
292 matches.<p>
But that log goes back to April 30th. Last year in August, I had that many probes in <em>one day</em>. So, I'd say, CodeRed/Nimbda activity did indeed decrease...
Re:Which are more successful? (Score:2)
Re:Which are more successful? (Score:2)
Re:Which are more successful? (Score:2)
win2k/IIS vs apache (Score:2)
Admin skill (Score:2)
IMHO, Mandrake has a good idea for their install. At the end of the install, before any servers are turned on, it prompts you to update if you have an internet connection. This feature adds security relatively painlessly.
Re:Which are more successful? (Score:5, Insightful)
Turn off all services except ssh.
Please stop pointing to buqtraq and saying:
Windows has less security issues than Linux, therefore Windows is more secure than Linux.
Re:Which are more successful? (Score:2, Informative)
How this reached +5 is beyond me.
Re:Which are more successful? (Score:2)
The Linux kernel has more issues? No. Applications that run on Linux? Possibly. Now compare the number of apps on each platform. Linux is more secure than Windows if you:
a. do not install tons of server programs that you are not going to run
b. use tcpwrappers to initiate programs that can use it and use hosts.[allow/deny] to control access to those programs.
c. use Bastille [bastille-linux.org] to harden the box
d. use ipchains/tables to control access to your PC or network - don't feed me crap about a personal firewall; this is an actual firewall.
just my $.02
OT: Personal Firewalls (Score:2)
My laptop is equiped with a winmodem. As such, I have a choice between no internet access, purchacing an external modem, using win32 unfirewalled, or using a win32 firewall. My choice, based mostly on convenience, is to use Norton Firewall. It detects and logs a lot of attacks. All the attacks are sorted and identified by the port that was probed. It even tries to identify the attack that is associated with that port.
For a non-technical user, it is a great program. It has charts, graphs, and logs that are easy to understand. It will even provide nonintrusive popups for attacks in real time. I think that, from a desktop POV, linux developers could learn a lot from taking a look at it.
Re:Which are more successful? (Score:2)
Comment removed (Score:4, Interesting)
Are you running Apache 1.3.26 or newer? (Score:2)
Re:Which are more successful? (Score:2)
The Difference... (Score:2, Insightful)
- Jester
Don't be fucking stupid (Score:2, Insightful)
Think about the hacker mindset for a minute. Most of these attackers are using Linux, because that's what their scripts were written for, and because they think Windows is lame - to use, and to hack. Even most of the ultra-successful defacers out there will only attack Unix systems and network devices/appliances these days, because bragging about hacking into a Windows system isn't elite in the eyes of their peers; they will catch shit from their buddies for attacking such an easy target.
If anybody out there is as clueless as this troll, please e-mail me [mailto] your questions. I'm in the trenches with these kiddies 24/7 and can give you a better idea of what's going on than most nerdy bugtraq subscribers who think they know shit because they read some mitnick autobiography and they run an unstable kernel.
Re:The Difference... (Score:2)
Re:The Difference... (Score:2)
Is this sentient attacks, or attacks in general? (Score:2, Interesting)
If it's only sentient attacks, then it makes sense. Windows isn't a challenge, Linux is.
Otherwise, I beg to difer. There are countless sites out there dedicated to shameless display of nimda/code red, and script-kiddie attacks in their logs.
-Sara
Re:Is this sentient attacks, or attacks in general (Score:2)
And yet... (Score:3, Funny)
But one point to this... (Score:4, Insightful)
And, as someone already pointed out...who had more successful attacks...Windows, I'm sure...
Re:But one point to this... (Score:3, Insightful)
Re:But one point to this... (Score:2)
Not in the server market, it isn't.
And MS isn't worried about going out of business. If there's a viable alternative to their product, they have *much* less leverage to squeeze companies. So even a few percent of marketshare hurts, and Linux has a good chunk of the server market.
OTOH, while I'm sure there are folks at MS responsible for dealing with desktop threats from Linux, countering desktop Linux can't possibly be a priority at the minute.
Re:But one point to this... (Score:2)
Re:But one point to this... (Score:2)
They clearly don't - I get many automated IIS exploits against my public facing box.
If it were me doing the cracking I'd first fingerprint the machine so I could narrow down attacks that were sensible and only apply those. (eg. Unix -> ssh exploit, Solaris rpc.statd exploit, windows IIS/SQL exploit).
Clearly either the script kiddies are clueless - or, worse, are actually exploiting so many machines clandestinely that they don't need to worry about wasted failed attempts..
Yay!! (Score:5, Funny)
How many from Redmond? (Score:3, Funny)
The real question to ask is, "how many of these attacks are successful as compare to attacks on Windows?"
Re:How many from Redmond? (Score:5, Interesting)
Microsoft is not nearly as "one-mind" and Borg-like as many would like to believe. That makes it harder to spread your flavour of hatred. Hate the company's practices, sure. But don't believe that the majority of people there really give a fsck enough to care one way or the other. It's a job. Just like clearcutting, oildrilling, and running a slaughterhouse.
Re:How many from Redmond? (Score:2)
Are there actually any coders that *like* Windows at MS?
Re:How many from Redmond? (Score:3, Insightful)
Re:You forgot!!!! (Score:2)
http://www.theregister.co.uk/content/archive/7715
Re:You forgot!!!! (Score:2)
It wasn't just the beta version...Novell (they had bought Digital Research by this point) sent me a couple of floppies (5.25" DD) with an update to DR DOS 6 to deal with issues in the final version of Win3.1 (not that I needed them since I used DESQview). I still have them around here someplace...
This is a fine example... (Score:5, Insightful)
You know, watching a puppy grow, you could say, "And if this trend continues, this will soon be a super-dog the size of Godzilla, and will devour Tokyo."
Funny, that never seems to happen.
Re:This is a fine example... (Score:4, Funny)
Re:This is a fine example... (Score:2)
Yeah... (Score:2)
That's an important (and perhaps incorrect) assumption to make.
Where the hell do they get these numbers? (Score:2)
TWW
Re:Where the hell do they get these numbers? (Score:3, Insightful)
They also don't define what constitutes a "box" in this context. Even if it were servers only, the numbers are incredibly low. My little development web server got several thousand code red attacks last fall. Luckily, I was running Apache on Linux, so all it did was fill up my logs.
If they are talking about pure number of attacks, as they appear to be, this is actually pretty good news. Apache webservers outnumber IIS webservers approximately 2 to 1 according to Netcraft (and by the way, has anyone noticed that Apache has been gaining the past couple of months). Assuming on a small percentage of people run Apache on Windows, we could assume that the attacks on Linux servers should be twice that of attacks on Windows servers, but the numbers are not that far apart.
So this article appears to be pretty fluff piece with no real meaning. Like most news stories.
Does this include handhelds? (Score:2)
Yea, and about CodeRed? (Score:5, Informative)
Re:Yea, and about CodeRed? (Score:2)
This makes me wonder even more about those statistics. Many people already have noticed that the stat only talks about attacks, not successful attacks. But it doesn't even speak about properly targeted attacks either... Could it be that our statistician apprentices were counting those Code Red probes as attacks against Linux if they happened to show up in a Linux boxes logs? Even if these "attacks" have no chance of succeeding against such target?
Re:Yea, and about CodeRed? (Score:2)
Or from another point of view (Score:2)
I wouldn't be at all surprised (Score:2)
I don't care. (Score:2, Insightful)
I don't really care about the number of attacks (unless it escalates to DOS), it's the number of successful attacks that is important.
And since Linux is much more heterogenous than Windows, a "linux" attack directed at me is less likely to succeed since it is less likely I have the exact hole that is being exploited.
Propaganda (Score:5, Insightful)
Here's some critical questions of this study:
1. How was this data taken? What was the sampling method? What was considered an attack?
2. Of those attacks on Linux, how many were successful? What's important isn't the number of attacks attempted -- that is irrelevant -- but ratio of the number of attacks that succeeded over the number that were attempted: in other words, the probability that an attack will be successful. I bet on Linux, that number is way below 50% and on Windows -- '95, '98, 'ME, 2000, and XP -- its way above 50%.
3. Of the attacks that were successful, how many of them were because of Linux itself, and how many because of some poor application? Same question to Windows. This is a minor point. The OS should have control and prevent security lapses, despite how crappily third parties code.
4. What kind of attacks were these? Attacks is a very general word; there may be many successful minor attacks (i.e., crashing a system), but that's not as bad as a few successful major ones (i.e., wiping the entire hard drive of a system, stealing a credit card number, etc etc). In other words, how far into the OS did the attacks go. For Linux, a relevant question is "did the attack just breach a user's account, or did it penetrate to the root?"
5. There's a lot of different "brands" or "flavors" of Linux. This matters. You'd expect Corel Linux to have much weaker security than the NSA's release of Linux, or than (for example) RT Linux. Different releases of Linux ship with different security by default, and different extra security features.
6. What is being done about the problems?
Relating to 6, we can rest somewhat assured in terms of security for Linux, as its Free Software and/or Open Sourced Software. Well-known bugs will be fixed by someone, and if they aren't, an annoyed individual could always take the initiative.
What separates Linux from MS isn't just that its more secure, its also that bugs, security flaws, stability flaws, performance pitfalls, etc, are usually fixed much more rapidly than they are in MS.
Also, no one has mentioned the attacks on other stable OSS/FS software, such as OpenBSD. Somehow, I doubt there's been much success in attacking OpenBSD.
Re:Propaganda (Score:2, Interesting)
Princeton Review, a college prep company that has SAT classes and provides college information and rankings, questioned students at various campuses as to what is the number one party school. They decided to come to Albany on the day of Kegs and Eggs (a rather large bar opens at 8am one Saturday morning and kids get drunk and pour beer all over each other.). They polled the drunked students as they were leaving the bar and naturally, they voted for U at Albany. This, however, is not the main contributing factor to Albany's dubious ranking... A few representitives of Princeton Review had come down to the campus and began soliciting Princeton Review prep classes for graduate exams (MCAT, LSAT, GMAT, etc). Well, the university, having an affiliation with Princeton Review's rival, Kaplan, kicked them off campus. It is a strong belief among administration, that we were given this ranking out of spite.
As with anything in the media, you must take information with a grain of salt and look deeper into the true meaning, sources and objectives of the survey, artiles, etc. It is our responsibilty to question companys or groups that put forth this information, because it could very well be jaded by propaganda.
Re:Propaganda (Score:2)
Typical response of someone who's been blinded by propaganda. We know nothing about how this study was done, and little about the organization that did it, although they appear to be corporate (already a hint that they're unfairly biased).
Its only bad knews if you are shallow and don't consider anything beyond what was presented, as you have obviously done. Gee, there's twice as many attacks against Linux, that must be bad. That's like saying, "Gee, Allen Iverson shoots twice as much as anyone else, that must be good". Its not. The number of attempts are IRRELEVANT. The only thing that is relevant is the percentage of successes and the net number of successes.
Re:Propaganda (Score:2)
What a crock of shit. I'm biased because I don't blindly believe that whatever is told to me is completely representative of the truth? I'm biased because I'm asking the important questions that are relevant to security, not just the superficial ones?
It seems more like your the one who's biased, as you've completely ignored the valid point I made: the number of attacks against a system is irrelevant. Its only the percentage of successes and total number of successes.
Makes sense -- more Linux systems than a year ago (Score:5, Insightful)
These statistics make sense. More and more people are adopting Linux now. There are two main drivers for this trend: People hear that Linux is better and organizations don't want to pay Microsoft's draconian licence fees.
The real question is whether these attacks are successful. Unfortunately, while the number of Linux servers is going up, so is the number of people who own or administer these systems and who aren't security-aware.
I think it's in the best interest of our community to assist the newbies when they have questions about setting up their systems, particularly when it comes to security. I've seen too many newbies laughed at in the IRC #security channels or the newsgroups. We should welcome them and try to help them; otherwise, The Forces of Evil will start using the statistics of all the h4x0red and 0wned systems (due to ignorance on the part of the users) as FUD.
There is no doubt that Linux is now a mainstream alternative. Remember, though, that the hard part is not to arrive, but to maintain a leadership position. That's the difference between the Rolling Stones and the one-hit wonders. In order to maintain our leadership, we should work together toward making the community aware of the pitfalls, and the distro vendors should probably come up with a policy of "all services closed" and forcing the users to open them, not the other way around. Other people will probably add better ideas to these suggestions.
The real measure is not whether the attacks are on the rise; it's the number of successful attacks that we should be concerned with.
Cheers!
ERe: (Score:2)
First of all, a lot of comments in this thread comes from people who seem to assume that is some kind of viscious attack on their favorite OS instead of an announcement of a simple fact: there are more attacks on Linux now than before. Nobody said anything about this suggesting that Linux is less secure than it used to be.
The Forces of Evil will start using the statistics of all the h4x0red and 0wned systems (due to ignorance on the part of the users) as FUD.
It's true, so how, exactly, could it be FUD? Oh, you mean that MS would start saying things like: "look how many hax0red boxes you have, this must mean that Linux is rotten when it comes to security!" But isn't this exactly what the Linux community has been doing for years? Why do we always hear "Windows/Outlook/both suck because a gazillion boxes were infected by the ILoveYou virus" instead of "Windows users suck when it comes to security related issues, as a gazillion of them opened unknown attachments and got infected?"
Doublespeak, I say. And I'm no troll.
Re: (Score:3, Insightful)
Saying "There are more attacks on linux systems" becomes FUD when you imply that this is bad. More attacks doesn mean more successful breakins. Truth can be FUD in the right context.
Re: (Score:2)
The combination of Windows and Outlook is riddled with issues. Attachments shouldn't appear to be one data type but actually be malicious executable code (due to Outlook's desire to hide file extensions and how it handles conflicts with MIME types and extensions). But say our users treat all attachments as plague-infested rats and refused to touch them. Past vulnerabilities have meant that simply READING a malicious email (and/or having it displayed in the preview panel) executed malicious code. Yes - the age-old joke about "don't read email called 'fun time'" became reality. Outlook, and its incorporation with Windows, has created a very virus/trojan friendly environment. If it weren't for the excellent scheduling features of an Outlook/Exchange combination, it would likely be dropped from any security-conscious corporate desktop.
Windows systems themselves are an interesting challenge. We'll ignore the fatally flawed Win9x architecture and focus on the industry favorite NT/2k/XP. The very tools that should help an administrator keep his/her system safe has gained a certain degree of fear over the years - service packs and hotfixes have been known to cause more trouble than they fix. WinNT administrators tend to delay rollout of new service packs until they feel comfortable all bugs have been discovered by early adopters. Any system configuration (adding or removing system software components) often reverse changes by service packs, hotfixes, and administrator configurations and requires re-application of those changes. The infosec standard of hardening a host by removing all unnecessary components is foreign to the Windows environment. Windows system components are rarely designed to be removed and attempting to remove them means traversing a minefield of illogical dependencies - thankfully there are a few good minefield maps in the form of hardening guides. Of course, keep the guide close at hand. Any addition or removal of system components, hotfixes, or service packs will mean re-applying the hardening process.
In short, Windows was not designed with good security principles in mind - and it shows. It IS possible to configure a secure Windows host (assuming vulnerabilities are patched in an expedient manner). But its a pain.
Only attacks that are noticed can be recorded (Score:3, Insightful)
11,828 attacks for windows last year (Score:5, Insightful)
What counts as an attack? So worms don't count, or the number would be in the millins. Reported attacks? Those shouldn't count much because there is "little incentive for a company to report computer attacks [usatoday.com].
Here's another story [mi2g.com] by the supposed source, but again, they don't at all define what they mean by "attack".
Re:11,828 attacks for windows last year (Score:2)
Not a single one was succesful, of course :-)
Re:11,828 attacks for windows last year (Score:2)
Re:11,828 attacks for windows last year (Score:3, Funny)
joker@thefarm 126% grep 'winnt\/system32\/cmd.exe' www-error_log | wc -l
10209
Wow...I wonder who the other 1,619 attacks were against? Anybody here willing to own up?
well if you believe alldas.org (Score:2)
not from our perspective (Score:5, Informative)
Snort and logsurfer snippets from our firewall logs go off all the time. Though I would say that we have seen more attacks targeting linux services (we're a linux shop, btw) than we've seen in the past, the majority of our attacks do seem to be against windows-based services.
From an overall security point-of-view, the last three to six months have not been great ones from a linux vulnerability point-of-view: zlib, BIND, ssh, apache, Tomcat (not that some of these problems haven't affected Windows boxen also). It's kept us hopping patching our servers. We've been lucky, so far - no successful intrusions (that we're aware of, of course!).
In general, it seems much easier to social engineer one's way into a Windows network via email attachments than directly attack it.
Wouldn't Doub It (Score:2, Informative)
Check out Alldas.org [alldas.org] ffor some numbers.
And another question: (Score:2)
For instance compare some of the Win2k boxes to a RedHat 7.2 box I had compromised.
The Win2k box (not mine, un?/fortunately) had been caught by nimda or some other vulnerability and after being formatted was *again* bit by nimda/code red when trying to get the updates.
(a cd or local machine with the patches never crossed the dude's mind until the second time around).
My box was compromised by a user running a trojaned IRC bot (eggdrop? was the trojan).
I know, I know, that was my fault for slacking off/being caught up in other things, but the next go around was wipe, install the data, kill services that are not needed (chkconfig, nice tool) and edit the hosts allow/deny to hell and back.
I was *P.O'ed*. FTP/SSH/HTTP is the only thing running currently with large ranges of IP's blocked if I see even *one* probe I don't like.
(no complaints, yet).
The large difference was the "state" of the admin.
The win2k dude thought it was the "cost of doing business", mine was "those fscking tools + idiot user I'll do everything I can to keep it from happening again.
Sigh vs GRRRRRR, is what I call it.
That reminds me, it has been a day or so since I grepped the logs...
Gotta go.
I remember the day that Code Red hit (Score:2)
Could be more interesting (Score:2, Insightful)
Don't Bother: vnunet author Middleton is a Moron (Score:3, Informative)
I went there just long enough to see his byline (being careful not to download images, hence no ad revenues), then came back here.
I've never seen Middleton write anything about Open Source that wasn't complete bullshit. This guy is either totally bought and paid for by Micorsoft, or is seriously stupd.
Re:Don't Bother: vnunet author Middleton is a Moro (Score:2)
There have been 2 other cases where articles by this guy on VNUNET were clearly wrong, too far wrong for casual error. One of them sprang from the (ill-considered) statistics posted at securityfoucs.com that compared the counts of windows and linux vulnerabilities. But the linux vulnerabilities included applications and the windows numbers did not. securityfocus.com clearly stated that fact. Also, each linux vulnerability was counted each time it occurred in any distribution, causing multiple counting of many of them. Middleton did not mention either of these facts, simply using the raw numbers to imply that windows security is better than linux.
The other case was equally egregious. Its headline was "Hackers turn on open source", with a lead paragraph saying the same, but with no clear data backing it up. In fact, the article referenced an increase in website defacements, then noted that 'virtual websites' where many sites are on one machine, were involved, thereby rendering the statistic fairly useless.
This guy is hack, or worse. He's already had too much benefit of the doubt.
Re:Don't Bother: vnunet author Middleton is a Moro (Score:2)
Re:Don't Bother: vnunet author Middleton is a Moro (Score:3, Interesting)
mi2g (Score:5, Informative)
The source of the data is supposed to be the "mi2g SIPS database", about which they say:
(Do you need me to toss in some editorializing about how this is evidentally a company that specializes in publishing alarmist press releases to encourage people to buy their products? Oh, and take a look at key clients [mi2g.com]... yup, includes Microsoft).
Missing key word: DETECTED (Score:5, Interesting)
Also, nimda and code red scans are attacks. If those got counted, allong with every virus email, the story would be very different.
If you were given the IP address or a vulnerable WinXP box, a vulnerable Linux box, and a vulnerable OpenBSD box and your life depended on owning one of the boxes without getting detected, which one would you chose given no other information? Only the suicidal would pick OpenBSD... the probability of there being another OpenBSD dedicated IDS box nearby is pretty high.
Let's not forget that a Linux shop can do a minimal install on a retired PII (or maybe even a 486) server and use it as a dedicated IDS box... no MS liscence fee. MS isstill goingto charge you for every running x86 box, regardless of OS, if you have an MS site liscence, so no negligible-cost dedicated IDS boxes for Windows shops.
I'm biased. I sure am... but it's mostly due to experience... I was a residet computer consultant for my fraternity for 3 years. Sure we had the one guy that talked another guy into trying out Mandrake and didn't bother to tell him to keep it up to date, but for the vast majority of the Brothers, the Linux guys could hold thier own. Several of the Windows guys were accidently running "Are you sure? What is IIS? Why is that bad?". And then there were the windows alerts popping up once per minute on all of the Win32 boxes in the house because one guy decided to test his UPS. These are very smart guys, but they gave me a vey bad impression of Windows users. I doubt the general populace can do better than my fraternity.
(Yes, the house GPA was in the 75th percentile fr fraternities and the average fraternity GPA is above the on-campus GPA at MIT. Even the management and bio majors could kick your ass in diferential equations, so no "stupid drunk frat boys" comments. They get tiring... very very tiring... especially comming from people that can't integrate thier way out of a paper bag.)
In summery, let's not forget that Linux and Windows often get deployed in very different environments.
Re:Missing key word: DETECTED (Score:2)
The actual "stupid drunk frat boys" will probably end up being your boss somewhere, I hate to say it.
This "discussion" is a sad commentary (Score:2, Interesting)
No matter how disgusting MS's business practices are, they are still not the evil side in this story. The script kiddies are. So why are we spending so much time blaming MS for this story? I could care less if MS financed this story. I could care less if I am still getting Code Red attempts daily on my machines. What I do care about is that everyone on the internet, even those people running MS products, is secure.
The biggest problem we have on the internet from a security standpoint is ignorant users. The fact that we still get code red attempts shows that this is a huge problem.
MS seems to be a bit more ahead on the curve when it comes to this (somewhat...I'll say more about this in a minute). In Windows XP, the OS will check for critical updates automatically, and will either download and install it by itself, or let you know that it is available. (This depends on how you set it up. You can also have it not do this behavior, and are given the choice to decide when you get on the internet for the first time.) I personally think that the default behavior should be to autocheck and notify, with options to turn it off buried somewhere. This would help protect the ignorant, while giving the choice to those of us who know more and are willing to do more with our OS to make our own choice.
Of course, MS is also very slow at putting out security patches, and there is NO excuse for that.
We will see more problems like this in the future. No matter what anyone says, Linux is not exactly as user friendly to the average Joe as Windows is. So while it may be more secure OOTB, as new exploits are discovered we will run into more and more problems because average Joe will not know that there is a new security hole on his Linux box. I can imagine quite a few of you will try and blame this coming problem on the average Joe, but remember....the customer is always right. If average Joe doesn't feel like subscribing to a security mailing list and sifting through a tone of email a day, he shouldn't have to. And we shouldn't expect him to want to do that, anymore then average Joe should expect us to like Celion Dion.
So we should do something about this now, before it gets out of hand. Make the default action for a desktop Linux setup check for security patches and notify, with a dire warning that will scare the bejeebus out of average Joe. Make it pretty easy to turn off for those of us with a bit of knowledge. Keep pumping out patches. But make sure your average mouth breathing computer user can install the patch, without worrying about dependencies and without having to type anything. Point and click is their friend, even if it isn't necessarily ours.
That is what we should be doing. Let's clean our own side of the street first, and worry about blaming MS for another thing later.
BTW, I still see attempts by rootkits from Linux boxes daily, and these are (like the Code Red attempts) caused by boxes that are unpatched against security holes that have been fixed for a very looong time.
1) Stupid, stupid article. 2) Slashdot owns you? (Score:2)
Stupid, stupid article. No one knows how many attacks there are. The numbers are entirely nonsense. My guess is that whoever wrote that saw some way to make money by saying it.
mi2g [mi2g.com] is a company that makes more money if you think the sky is falling.
Many more stories like that, and Slashdot will stop being popular.
The article says, "But attacks on Windows/IIS systems have already dropped by 20 per cent on last year's figures, from 11,828 to 9,404."
My guess is that attacks occur about 20 times per hour for each IP address. That's how computers are rooted within 25 minutes of connecting to the Internet; there are continuous attacks to find weaknesses. That's how many I see, anyway.
That number cannot be the number of successful attacks, either. Most people who are rooted do not report that fact to anyone. Many Windows users would not even know they have been successfully attacked. How could they report it?
Change in subject: At the top of every article, it says, "The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way."
This sounds like you own your comments, doesn't it? However, the OSDN Terms of Service [osdn.com] says at section "4. CONTENT", paragraph 6,
"In each such case, the submitting user grants OSDN the royalty-free, perpetual, irrevocable, non-exclusive and fully sublicensable right and license to use, reproduce, modify, adapt, publish, translate, create derivative works from, distribute, perform and display such Content (in whole or part) worldwide and/or to incorporate it in other works in any form, media, or technology now known or later developed, all subject to the terms of any applicable Open Source Initiative-approved license."
The contract is written in such a way as to appear that it has been made intentionally confusing. However, it looks like "comments are owned by whoever posted them" means that, yes, you own the intellectual property you created, but VA Software Corporation owns it too.
This appears similar to owning a car, but under the condition that someone else can use it at any time, and without notifying you. In any case, The Fine Print is misleading; it is not all of the fine print, although that line at the top of each story certainly encourages you to believe it is.
I don't know about Internet attacks, but we are seeing a rise in the number of sneaky contracts. This seems due to the presence of people with no technical knowledge at technically oriented companies. These people cannot contribute to the real work of the companies; all they can do is invent ways to abuse the customer.
EULA: I've been studying their methods, and I have a sneaky contract of my own. I agree to VA Software Corporation's sneaky contract if they agree to mine: At any time of my choosing, VA Software Corporation will give all managerial and financial control of the company to me.
A Pox on Both Your Houses (Score:3, Insightful)
We have two operating systems, and their associated applications, implemented in unsafe languages, with broken and/or archaic security models, competing for how many weeks they can run before getting rooted by a new exploit.
How pathetic.
This is a Good Thing (Score:2)
Unfortunately this puts Linux in the security spotlight. More exploits will be found and patched (which is a good thing), and the public nature of linux security information may be exploited and used against the Linux community.
Misleading topic? Improvement please! (Score:3, Insightful)
Content: "If the trend continues, by the end of the year, attacks on Linux systems may surpass attacks on Windows systems".
Anyone more than me that thought that Linux had more atacks than Windows?
Damn those HP attacks! (Score:2)
Sorry, but this report is so lacking in facts or sources that it might as well have been a conversation overheard in a pub. In my server logs here, the number of IIS exploit attempts is absolutely overwhelming! In other server's I've administered this is also the case. Sorry, I smell FUD...
So what there are more Linux attacks than MVS too (Score:2)
So what?
How many are successful?
Sticking up for M$... (Score:5, Insightful)
A) Linux use is growing
B) How many of these were really successful attacks?
C) What counts as an attack?
D) Studies from the group which conducted this one are questionable.
Clearly people are neglecting to give MS credit for some of it's accomplishments over the last year. One of the largest changes was the speed at which updates were made available and most of these through the windows update site. Now when new holes in their products were found, MS responded for the most part almost immediatly and patched up their code within hours/days and posted it up on for everyone to download. Also, they're working on making these updates even easier than before, anyone with windows 2000 who keeps on top of patches will notice that the interface has changed, you can set it to automatically apply security patches. Also another point is that people are finally realising that their computer will be far more secure if they just apply the latest patches.
Holes in Linux are not always patched up right away and lets face it, Linux code warriors can't always respond to a patch for each distro when ones found like MS can or distribute it as easily. Because they're a single entitiy, they have quite the advantage when it comes to communication and distrobution.
In the last year Microsofts efforts to patch up their software were far and beyond anything they have done in the past, and that is something Linux buffs won't easily admit to. Now, Palladium is a whole nother ball game mind you =)
Never been hacked... (Score:2, Interesting)
Without a doubt, MS has a lot to learn about security, but tools such as URLScan and the like have made it much easier to lock down an IIS server.
It's also worth remembering, that as an application server, IIS has the ability to do a LOT out of the box (COM, ASP, ISAPI (and outdated vulnerable technologies using HTR). In any case, can not compare IIS with Apache -- you must compare it with Apache + Tomcat + Turbine, etc.
No MS Boxes left to attack? (Score:2, Insightful)
So my thought is could the increase of attacks on linux box be beacuse most(all?) the MS boxes are infected drones, all attacking every IP they see?
and thus more linux boxes get attacked.
I know it an extreme view, but a Nimda drone attacking an apache box, although pointless, is still adds to the statistic of more linux boxes being attacked
Are you kidding me? (Score:2)
Think about what happened last year....Code Red abused IIS servers to death and sysadmins started realizing that Linux/Apache was a viable alternative, what with the kernel networking code improvements it got in 2.4.x, (or was that 2 year ago?) not to mention the publicity Linux has been getting increases every year.
Not exactly a profound leap of logic to make this deduction.
Correct subject lines...? (Score:2, Insightful)
AND
If the trend continues, by the end of the year, attacks on Linux systems may surpass attacks on Windows systems.
is FALSE
I can't see the correctness of the subject line. It should say "More Attacs on Linux than Windows... um, maybe... in the future.."
Re:Scriptkidiots (Score:5, Funny)
No, that would be "getting laid".
Re:Macs? (Score:2)
Re:No shit there's more attacks on Linux (Score:2, Informative)
the ironic thing about your comment is that c#'s original name was c-- (you have to type cminusminus to google it properly, I think), which was, in part, a non gpl'd alternative to gcc's intermediate code system (ie. the way the GNU Compiler Collection uses one comiler for all the languages it supports, and they all compile to the same intermediate code). c-- was designed to be a better core language to use as a base language to code ontop of- ie. a non gpl'd version of gcc.
Microsoft changed c--'s name to c# for marketing reasons.
Is this FUD == mi2g ? (Score:2, Informative)
Go to http://www.vmyths.com and search for mi2g under RANTINGS.
Credibility is not their strong point.
Linux Admins vs Nt (Score:3, Insightful)
Perhaps the reason Linux gets more attacks reported is that Unix has very good logging and nix admins actually read their logs and report attacks. I knew some Nt administrators even in very big operations that never read their log files. Personally I thing the the script kiddies just scan and hit whatever they can. A linux box might be more useful once the it is compromised, but that is another issue.
Could Jesus microwave a burrito so hot, that he himself could not eat it....HS