Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Microsoft Security

WindowsUpdate.com Secured, Permanently 766

Precisely nineteen months ago, Bill Gates sent out a memo to employees (and the press) announcing that security was Microsoft's number-one priority. Today, about a hundred readers have submitted the news that Microsoft.com went down last night. And now, the company has "extinguished" WindowsUpdate.com (future updates will come from a different domain). All this because of some Microsoft worm that triggers at midnight. Related news: Windows Update says you're protected, but maybe you're not; WU.com briefly ran Linux, heh; worm variant with clever "anatomical term."
This discussion has been archived. No new comments can be posted.

WindowsUpdate.com Secured, Permanently

Comments Filter:
  • Next Week.. (Score:5, Funny)

    by msblaster.exe ( 698549 ) on Friday August 15, 2003 @01:23PM (#6706835)
    Don't worry next week there will be another memo with the URL for the new update
    • by Ledskof ( 169553 ) on Friday August 15, 2003 @01:23PM (#6706838)
      secured permanently? So they unplugged it from the network to finally get that C2 security level eh?
    • by cravey ( 414235 ) on Friday August 15, 2003 @01:33PM (#6706931)
      I wonder why they didn't just point DNS for the website to 127.0.0.1.

      Let the infected servers work it out amongst themselves. :)
      • Re:Next Week.. (Score:5, Interesting)

        by kilgore_47 ( 262118 ) <kilgore_47 AT yahoo DOT com> on Friday August 15, 2003 @02:21PM (#6707338) Homepage Journal
        I wonder why they didn't just point DNS for the website to 127.0.0.1.

        Better still, why not put 30 or 40 round robin DNS entries in? Symantec says there's about 228,000 infected boxes; with 40 different IPs on windowsupdate.com's DNS record, each server would be hit by less than 6,000 attackers. Surely, with the time they've had to prepare, they should have been able to handle this.. I'm really surprised that they actually took windowsupdate offline. I think any competent sysadmin with the financial resources of MS behind them should have been able to weather this storm without any loss of service.

        I've been kind of wondering if there might not be some other exploit that some researcher is waiting to release, after everyone's auto update is broken...
        • Re:Next Week.. (Score:5, Informative)

          by AngryRodent ( 519420 ) on Friday August 15, 2003 @06:32PM (#6708916)
          Windows update is already massively load balanced across multiple server farms. They use both a DNS based load balancer (F5 3DNS) and local area load balancers (F5 BIGIP). The server farms are in a number of locations. Early, and not so early in the implementation of this, a number of people were concerned that Microsoft was attacking them because the 3-DNS's would create probes from each datacenter to the end-users system. I'm not sure if that is still being used. I have no knowledge of how they Akamized so quickly since I haven't been involved with this project in years. However, it should be pointed out that the BIG-IP's make Akamizing content a very simple matter. I'm not shilling for F5- I no longer own any of the stock, haven't been an employee for years, and I'm now just a reasonably-satisfied customer.
      • Re:Next Week.. (Score:5, Informative)

        by gclef ( 96311 ) on Friday August 15, 2003 @04:07PM (#6708023)
        Because the worm spoofs traffic from it's local subnet to the windowsupdate address. What this means is that any infected machine would spoof traffic to itself from its local subnet, and then flood the local lan with RSTs, presuming it wasn't actually running a webserver, in which case it would flood the local lan with ACKs. Either way, bad.

        The worm doesn't sanity check the DNS result, though, so if the name doesn't exist, gethostbyname() returns -1, which translates to an IP of 255.255.255.255. The reports I'm reading say that the windows stack won't allow you to send traffic to that IP, so the machine will just drop it. (that could be wrong, though. We'll find out soon.)
    • by grozzie2 ( 698656 ) on Friday August 15, 2003 @08:03PM (#6709598)
      I think everybody is missing the point on this whole issue. Fact :- Blaster is a worm, who's payload was intended to dos windowsupdate.com, rendering it unavailable to the folks using it. Fact :- windowsupdate.com is 100% unavailable. Conclusion :- Blaster is the most successful virus/trojan to date. It didn't just cause a few hours of unavailability, it wiped the domain from existence. Not just any domain, but a prominent microsoft domain (high profile, big budget website) totally obliterated off the internet. Folks can say what they want, and argue about the politics of it all, bicker about who is responsible to update what, and whatever, but you cannot deny the facts. Blaster is head and shoulders above the crowd as a denial of service worm, the first to achieve a 100% success even prior to actually triggering. Say what you want folks, but this has got to go down in history as the most successful worm ever.
  • by Interesting Username ( 697410 ) on Friday August 15, 2003 @01:23PM (#6706837)
    It seems the power in one of the most populated areas of North America was out around the same time Micrsoft was making these fixes? Coincidence? I think not. For those of you in the power outage area, expect it to happen again tomorrow as the DoS is about to begin.
    • by Wingnut64 ( 446382 ) on Friday August 15, 2003 @03:42PM (#6707874)
      "Is there any way this 'DoS' can be stopped?"
      "Impossibly, there's too many compromised machines. You'd need to turn off every computer on the East Coast..."
  • by Tirel ( 692085 ) on Friday August 15, 2003 @01:25PM (#6706847)
    Did they point windowsupdate.com to 127.0.0.1 ? I hope not, there was a mail on FD explaining that such an action would cause it to DOS the local network.. Also, wtf is up with the site running lunix?
    • Re:What did they do? (Score:5, Informative)

      by lucifuge31337 ( 529072 ) * <(daryl) (at) (introspect.net)> on Friday August 15, 2003 @01:32PM (#6706918) Homepage
      Did they point windowsupdate.com to 127.0.0.1 ? I hope not, there was a mail on FD explaining that such an action would cause it to DOS the local network.. Also, wtf is up with the site running lunix?

      No, they took the A record out completely. It's not Akami-ized. That's the linux box you see.
    • Re:What did they do? (Score:5, Informative)

      by Tirel ( 692085 ) on Friday August 15, 2003 @01:36PM (#6706956)
      here it is:
      Date: Fri, 15 Aug 2003 08:33:57 +0200
      From: Carsten.Truckenbrodt@Bertelsmann.de
      Subject: AW: [Full-Disclosure] MS should point windowsupdate.com to 127.0.0.1
      To: full-disclosure@lists.netsys.com
      Cc: security@microsoft.com

      Hi,

      This might be a bad idea. If you let windowsupdate.com resolve to 127.0.0.1
      the following will happen: The worm uses spoofed IPs from the local /16
      subnet as source address. Pointing all the syn packets to 127.0.0.1 will
      generate a RST packet from the local host to the spoofed IPs and spread
      traffic over the complete internal network.
      Even blocking or routing the normally resolved IP to Null0 will be a lot
      work because this domain is loadbalanced through the world. That means you
      get a different resolution depending on your ISP or place in the world.

      If you manipulate your DNS, you should give no A-Record back to the worm.
      With this the worm will not start attacking anything. So setting up a
      nameserver zone with only a SOA record will do the job for Saturday 0:00.

      Best Regards,

      Carsten Truckenbrodt
      Arvato systems Taco Network SnotIing Security

      -----Ursprungliche Nachricht-----
      Von: Tobias Oetiker [mailto:oetiker@ee.ethz.ch]
      Gesendet: Freitag, 15. August 2003 00:15
      An: full-disclosure@lists.netsys.com
      Cc: security@microsoft.com
      Betreff: [Full-Disclosure] MS should point windowsupdate.com to 127.0.0.1

      Folks,

      How about MS standing up for the mess, and changing their own DNS to point
      all request for windowsupdate.com and whatnot to 127.0.01 ?

      This will null the effect of the syn flood very effectively. Only proxies
      will be affected.

      As far as I see it, they will not be able to use these names productively
      for the foreseeable future anyways ...

      So they will have to issue an update for windows-updater thourgh other
      channels (like their homepage for example) to point it to a different
      web-site .. that should not be all that much of a problem.

      If MS does NOT make this change to their DNS, I can see many routers who are
      trying to track connections toppling over in interesting ways.

      Because the local techs have no clue, it will
      take the affected companies ages to get back on the net.

      tobi
    • by golgotha007 ( 62687 ) on Friday August 15, 2003 @02:31PM (#6707417)
      why would i want to help allievate the situation? hell, i get to have all my computers attack microsoft for free! and legally! wohoo! sick 'em!
      • Uhhhh, No (Score:5, Insightful)

        by DesScorp ( 410532 ) on Friday August 15, 2003 @05:21PM (#6708447) Journal
        "why would i want to help allievate the situation? hell, i get to have all my computers attack microsoft for free! and legally! wohoo! sick 'em!"

        I know (think) you're joking, but while we can moan all we want about how Microsoft should design software that's more secure, we can't do anything about existing systems. And windowsupdate was the fastest, easiest way for the non-tech public to protect and repair themselves. Those of you out there that view this impending attack and the shutting down of windowsupdate as a good thing are very shortsighted.

        Maybe you don't give a shit about all of those other users out there that use Windows. Maybe you're happy this is happening. Fine. But rest assured, it's not going to cause people to rebel against Microsoft, like many of you are hoping. There will be no enlightenment and mass exodus to Linux or BSD or OSX. This is going to get blaimed on "hackers". And we all know hackers hate God, hate America, root for Saddam, get pentagram tattoos on their foreheads....and use Linux. Pretty soon it'll be "yeah, I saw those Linux guys bragging on slashdot.org that they took windowsupdate down!"

        IBM's reps will be going "yeah, thanks heaps for the positive image, slashdotters.........fuckers".

        Make fun of people that run Windows all you want, but don't assist in, or support the disabling of one of their few effective means of defense.
  • always took you to http://windowsupdate.microsoft.com so whats the big deal about cancelling windowsupdate.com? do you think anyone will notice, or care for that matter?
    • by h0tblack ( 575548 ) on Friday August 15, 2003 @01:31PM (#6706907)
      They're obviously worried that something is in the wild that is hard-coded to attack WindowsUpdate.com, else there would be no point in abandoning that domain and moving to another.
    • by druske ( 550305 ) on Friday August 15, 2003 @01:34PM (#6706937)
      "...whats the big deal about cancelling windowsupdate.com? do you think anyone will notice, or care for that matter?"
      The virus writers will care. I'd be surprised if a version with a New Improved attack address hadn't already been launched, probably ignoring the semaphore which normally kept the worm from reinstalling itself on an infected machine. If this happens, Microsoft's initial countermeasure won't be worth much for long. Still, it was a necessary and sensible first step.
    • by Pharmboy ( 216950 ) on Friday August 15, 2003 @01:54PM (#6707119) Journal
      I installed and ran the Microsoft BSA utility that scans your computer for updates (windowsupdate looks in registry only) per the link above. It found 4 problems that WindowsUpdate can't find, so I followed the links, to read about them.

      Problem is, when you click on the link to DOWNLOAD the actual patch for XP, it just redirects you to www.microsoft.com, so even their security tool is useless if you cant get to the files to manually install them. Fucking rediculous.
    • Going to 'tools, windows update' in internet explorer takes you to a redir site on microsoft.com, which attempts to forward you to windowsupdate.com NOT windowsupdate.microsoft.com .. even still (~3PM EST). you'd think they'd at least fix that if they were fuckin with the dns..
  • Not just WU... (Score:3, Interesting)

    by angst7 ( 62954 ) on Friday August 15, 2003 @01:25PM (#6706853) Homepage
    but Microsoft was seen on Linux today also http://uptime.netcraft.com/up/graph/?host=www.micr osoft.com [netcraft.com].

    Quoth Billy G: "Linux sucks, it's worthless, not usable for real . . . What? A worm? Aaaiiiieee! Tux Save Me!!!"

    ---
    Jedimom.com [jedimom.com], that not-so-fresh feeling.
    • not quite (Score:5, Informative)

      by joe_bruin ( 266648 ) on Friday August 15, 2003 @01:34PM (#6706938) Homepage Journal
      OS: Linux
      Server: Microsoft-IIS/6.0
      Last changed: 15-Aug-2003
      IP address: 213.161.82.33
      Netblock Owner: Akamai

      they did not switch their servers to linux, they used akamai's caching services to handle their massive bandwidth requirements. notice the server is still iis. this is an akamai box (linux) serving a cached copy of microsoft.com (windows/iis)

      $ host www.microsoft.com
      www.microsoft.com is an alias for www.microsoft.com.edgesuite.net.
      www.microsoft.co m.edgesuite.net is an alias for a562.cd.akamai.net.
      a562.cd.akamai.net has address 63.236.1.163
      a562.cd.akamai.net has address 63.236.1.160
      a562.cd.akamai.net has address 63.236.1.153
      a562.cd.akamai.net has address 63.236.1.139
      a562.cd.akamai.net has address 63.236.1.168
      a562.cd.akamai.net has address 63.236.1.147
      a562.cd.akamai.net has address 63.236.1.138
      • Re:not quite (Score:3, Interesting)

        by angst7 ( 62954 )
        Of course, your right. But it's so much more fun to take the fact that microsoft.com was reported running linux by netcraft at face value. Besides, technically they are making use of linux within the chain of information delivery, and doing so of their own volition. I still kinda think thats worth giggling about.
      • Re:not quite (Score:3, Interesting)

        by terrymr ( 316118 )
        Yes but by doing so they're protecting their Windows box from attack by putting it behind a linux proxy. I doubt microsoft had a problem with bandwidth.
  • by grub ( 11606 ) <slashdot@grub.net> on Friday August 15, 2003 @01:27PM (#6706866) Homepage Journal

    Change the update machines, new names, etc etc. MS is resorting to smoke and mirror tricks. It will only fool the current worms, not future ones that will have the new machine names in them.
  • NetCraft stats (Score:5, Informative)

    by xrayspx ( 13127 ) on Friday August 15, 2003 @01:29PM (#6706894) Homepage
    Take NetCraft stats with a Big Grain of Salt (big grains of salt, heh). If a site is "Akamized", as this one was, or is otherwise distributed, you'll see the OS of the front end, not what the site actually runs. You'll note that NetCraft lists "linux" for the Akamai site.

  • by GillBates0 ( 664202 ) on Friday August 15, 2003 @01:30PM (#6706900) Homepage Journal
    Computing is more important than any other part of our work. If we don't do this, people simply won't be willing--or able--to take advantage of all the other great work we do.

    Breathing is more important to us than any other activity. If we don't breathe, we will die.

  • by Froze ( 398171 ) on Friday August 15, 2003 @01:30PM (#6706902)
    1) Disconnect box from all external cords
    2) Encase box in several hundred cubic meters of concrete
    3) Surround concrete with meter thick lead lining
    4) Bury under radioactive waste in a geologically stable region
    5) Saturate the surface with nuclear land mines
    6) Curse MicrSoft, becase you still get hacked!
    • by stwrtpj ( 518864 ) on Friday August 15, 2003 @02:17PM (#6707308) Journal
      1) Disconnect box from all external cords
      2) Encase box in several hundred cubic meters of concrete
      3) Surround concrete with meter thick lead lining
      4) Bury under radioactive waste in a geologically stable region
      5) Saturate the surface with nuclear land mines
      6) Curse MicrSoft, becase you still get hacked!

      7) Profit?

  • by Hamster Lover ( 558288 ) on Friday August 15, 2003 @01:31PM (#6706905) Journal
    Went to check for updates today, just for the hell of it and the speed was a huge improvement over the old URL.

  • Sensationalism? (Score:3, Informative)

    by blincoln ( 592401 ) on Friday August 15, 2003 @01:31PM (#6706908) Homepage Journal
    Where in any of those articles does it say that MS is taking down windowsupdate.com? It's always redirected me to windowsupdate.microsoft.com.
  • by anotherone ( 132088 ) on Friday August 15, 2003 @01:31PM (#6706910)
    Not a huge deal, since the official URL is windowsupdate.microsoft.com . The start menu, Tools in IE, and Windows Help all have that address. The worm author was kinda stupid, he should have pointed it to microsoft.com or windowsupdate.microsoft.com.
    • by Polo ( 30659 ) * on Friday August 15, 2003 @03:00PM (#6707610) Homepage
      Not a huge deal, since the official URL is windowsupdate.microsoft.com . The start menu, Tools in IE, and Windows Help all have that address. The worm author was kinda stupid, he should have pointed it to microsoft.com or windowsupdate.microsoft.com.

      darn...

      cvs co msworm.asm
      click. tap. clack. click.
      cvs commit -m 'fix url'
      make;make install

      ok, done. Thanks!
  • by Matrix272 ( 581458 ) on Friday August 15, 2003 @01:32PM (#6706919)
    So "Permanently Secured" now basically means "Permanently Offline"? Why didn't they just let the worm eat the domain? What's the difference, really? Whether they pull the plug, or the worm does it for them, it still means windowsupdate.com won't work...
    • by Speare ( 84249 ) on Friday August 15, 2003 @02:35PM (#6707437) Homepage Journal

      Reminds me of the old military joke,

      • The reason the Air Force, Army, Navy and Marines bicker amongst themselves is that they don't speak the same language. For instance, take the simple phrase
      • "secure the building".

        The Army will post guards around the place.

        The Navy will turn out the lights and lock the doors.

        The Marines will kill everybody inside and set up a headquarters

        The Air Force will take out a 5 year lease with an option to buy.

  • by djh101010 ( 656795 ) on Friday August 15, 2003 @01:33PM (#6706927) Homepage Journal
    They've given the windowsupdate.com site to Akamai to serve for them. Not a bad idea, actually, since Akamai has something like 15,000 webservers distributed around the world, to share the load.

    Of course, it's extremely amusing that they're paying to have their content served by a flock of 15,000 penguins. I'm a bit concerned for our own site this weekend, as we use akamai for our static content. It'll be interesting to see how my pageloadtimes are affected (if they are).

    Akamai is a great resource for dealing with huge spikes in webserver load - I guess you could say this qualifies as that.
  • Saved? (Score:5, Funny)

    by PovRayMan ( 31900 ) on Friday August 15, 2003 @01:33PM (#6706928) Homepage
    Last night I finally went to go upgrade from Windows Media Player 6.4 to 9.0 so I can test out those high definition WMP9 videos for once. I couldn't figure out why microsoft.com wasn't loading but now I find out it was because of a DOS attack.

    Now I'm thinking, was this intervention from a higher force to protect me from installing WMP9 or just odd luck?
  • by Anonymous Coward on Friday August 15, 2003 @01:34PM (#6706948)
    Shit, now I've gotto think of something clever/insulting to say about Microsoft....it's 2:30 in the afternoon....and my great mind isn't too active either, after a heavy lunch.

    /. editors should give us some advance warning before posting demeaning stuff about microsoft/RIAA/SCO, so I have enough time to think about rude stuff to write up, before 300+ posts are posted.

  • So... (Score:4, Interesting)

    by Flabby Boohoo ( 606425 ) on Friday August 15, 2003 @01:36PM (#6706961) Journal
    the Army, or any large organization with a large install base of MS boxes, does not use SUS?

    I started using it here about 6 months ago, it is the only way to go. I cannot imagine using Windows Update as an enterprise solution. One or two PCs at home sure, but SUS is free dammit.
  • by TopShelf ( 92521 ) * on Friday August 15, 2003 @01:37PM (#6706968) Homepage Journal
    At least we know where the DDOS attack didn't come from: New York, Detroit, Cleveland, Toronto, et al.
  • by linuxislandsucks ( 461335 ) on Friday August 15, 2003 @01:37PM (#6706974) Homepage Journal
    A question ..

    Assuming that all old windows systems are unsecure or badly written..

    Would it not make sense to take 75% fo $45 billion and offere to replace hardware and update to winXp or longhorn to every MS custoemr worldwide?

    It would be the PR stunt of the century..
  • by javatips ( 66293 ) on Friday August 15, 2003 @01:40PM (#6706995) Homepage
    I predict (maybe this post will help a little :-( ) that the next iteration of the worm (or another one) will google up "windows update" [google.com] and will attack the 3-5 bests results.

    Let's see what happen then... Microsoft is going to pressure Google to remove www.google.com from their DNS Servers ;-)
  • cool title (Score:5, Funny)

    by pyros ( 61399 ) on Friday August 15, 2003 @01:41PM (#6707000) Journal
    Marc Maiffret, chief hacking officer for security software maker eEye Digital Security


    That is the coolest job title. I'd have to negotiate a gold plated machette as a hiring bonus for a title like that. And anyone working for me would be officially titled a Hacking Minion!

  • Ironic? (Score:5, Funny)

    by Bandman ( 86149 ) <bandman@gm a i l .com> on Friday August 15, 2003 @01:43PM (#6707026) Homepage
    Today, in the developed world, we do not worry about electricity and water services being available.

    Maybe he didn't get the memo?
  • by tds67 ( 670584 ) on Friday August 15, 2003 @01:44PM (#6707031)
    Quote the Gates:

    So now, when we face a choice between adding features and resolving security issues, we need to choose security.

    Apparently he changed his mind.

    Our products should emphasize security right out of the box, and we must constantly refine and improve that security as threats evolve.

    After it's too late, that is.

    A good example of this is the changes we made in Outlook to avoid email borne viruses.

    I must've been absent when that came true.

    If we discover a risk that a feature could compromise someone's privacy, that problem gets solved first.

    Since when are bugs called "features"?

    If there is any way we can better protect important data and minimize downtime, we should focus on this.

    Lip + service = $$$

  • by elinenbe ( 25195 ) on Friday August 15, 2003 @01:49PM (#6707072)
    From the memo:

    "Today, in the developed world, we do not worry about electricity and water services being available"

    Well, at least some people don't have to worry about electricity...
  • by babbage ( 61057 ) <cdeversNO@SPAMcis.usouthal.edu> on Friday August 15, 2003 @01:51PM (#6707094) Homepage Journal
    Of course, this leaves them open to alternative attacks.

    For example, if someone hijacks or otherwise poisons some DNS servers, then all the traffic to windowsupdate.com will make it through to windowsupdate.microsoft.com anyway.

    Or, a future worm could be written to target & attack a variety of Microsoft servers.

    Or a future fowm could be written in such a way that the target is not part of the worm's code, but rather can be directed remotely somehow. This way, even if Microsoft tries to switch addresses, the person[s] directing the attack can just change the target.

    The real solution isn't to keep trying to dodge the bullet.
    The solution to become bulletproof.

    Even after all this time, Microsoft still doesn't seem to get that.

    Part of the reason Microsoft is such a prominent target is of course because it is so, well, prominent. Taking down (say) an FSF server doesn't raise nearly as many headlines (as this week's headlines will attest to). But I don't think that all of the problem here can be traced to how widespread Windows is -- while the Internet's clients are nearly all running Windows, a large fraction of the server architecture is running some Unix variant, and while there is of course some malware that targets *nix (Linux, Solaris, MacOSX, BSD, etc), the results never seem to be as catastrophic as the typical Windows outbreak

    To rip of Bruce Schneier's analogy from his security article in Atlantic Monthly [theatlantic.com] a year ago, it seems to me that the what security mechanisms Windows has tend to be brittle, while those that the *nix etc world have tend to be pliable. That is to say, when a problem comes up with (say) Apache, the damage tends to be isolated. This is partly because each installation will be configured differently, with different features enabled or disabled, and partly because the server runs on a variety of systems, each of which may have different mechanisms for providing underlying security protections. On the other hand, IIS installations tend to be pretty homogeneous, and a flaw with one very well could be a flaw with all.

    That's not to say that IIS couldn't be just as secure as Apache, if not much more so. But part of Apache (etc)'s strength is it's heterogeneous nature -- people are able to tinker, adapt, mix & match components to suit their needs, and in the process this will also tend to protect them from catastrophic failure. Microsoft has actively resisted this kind of diversity -- witness their howls about having to come up with "thousands of versions of Windows" if some of the firmer antitrust penalties were put into force. Those thousands of permutations are, arguably, exactly what is needed: this will give their users greater choice, and it will make emergencies like this more rare.

    I don't get why they're so opposed to the idea.

    Maybe they've got cleverer plans than anything I can think of. I certainly wouldn't claim to be any kind of security expert. But if the best they can come up with is a change of address card, I can't help but wonder if they're fumbling in the dark here...

  • by rgmoore ( 133276 ) * <glandauer@charter.net> on Friday August 15, 2003 @01:51PM (#6707096) Homepage

    This strikes me as being a really bad thing:

    Windows Update works by adding an entry into the system registry every time it installs a patch. When users log on to the update tool, it scans their registry and offers them list of patches that have not yet been installed. Cooper said that this mechanism was found to be flawed.

    "We found that people had got the registry key for the patch, but not the file," he said, explaining that the error could be triggered by a number of reasons -- from an incomplete installation to a lack of system resources.

    They're missing a really big flaw, here, which is that this is horribly vulnerable to malicious behavior. There are already plenty of viruses and worms out there that make registry entries for one purpose or another. It seems to me that if you were exploiting a vulnerability for which a patch already existed it would be very easy to automatically modify the registry to make it appear that the patch had already been applied. This would make tracking which systems were vulnerable much, much more difficult. This would work particularly well if you were trying to make a stealth worm.

  • DOS or real traffic? (Score:4, Interesting)

    by nolife ( 233813 ) on Friday August 15, 2003 @01:59PM (#6707166) Homepage Journal
    I wonder if this "DOS" they claim to be suffering is really too many users actually trying to get updates for once. After all, the code in this virus is not set to DOS MS until the 16th so they can not blame it on that. I doubt they would ever admit to not being able to handle the load. I use MS update at least a few times a day and have been for the last year on various client machines. Sometimes I need 10's of updates from a fresh install, sometimes just a few driver updates or the recently released. I don;t have any specific stats but I have noticed a definate slowing of the update site when the blaster worm was announced and it is getting slower as the days go on, today it took over 5 minutes to get a sound card update that for the previous year, only took 10 seconds. Another time today it took about 60 seconds. DOS causing this? Maybe, but I would guess they are having a hard time providing the update service for everyone and do not want to admit it. I bet hundreds of thousands of people are running the update service for the first time ever and they need a lot of updates. This move of names and connectivity is probably a hidden attempt to get the stuff hosted somewhere else or split up the load more then what they are currently doing and make it appear it is for security reasons. Reading bewteen the lines here but the amount of work involved with name change of this nature is massive compared to the relative ease a virus writer can simply point to the new site. Does MS honestly think a name change will stop a DOS? I doubt it, but it fits into thier FUD compaign of increased security and that they are under attack.

  • Who cares (Score:3, Interesting)

    by bogie ( 31020 ) on Friday August 15, 2003 @02:02PM (#6707186) Journal
    More importantly when will MS abid by their settlement and allow alternative browsers to be used with WindowsUpdate?(In my eyes that should be implied)

    Doesn't seem right that they are allowed to throw up a button for "Program Access and Defaults" while at the same time making sure you actually can't live without the products your trying not to use.

    btw, waiting and hoping that the automatics updates works is NOT an alternative. Except for those who never use non-critical updates(IE WMovMaker, WMP9 etc) or love being alpha testers for a company known to CONSTANTLY screw up their patches.
  • by Eric Damron ( 553630 ) on Friday August 15, 2003 @02:05PM (#6707202)
    the Linux community needs to concentrate on not becoming the next big security joke. Okay, it's fun to laugh at Microsoft's pathetic record.... Just a second... Muhahahahahah. I feel better now. But as Linux becomes more and more popular blackhats will put more and more attention into breaking our OS.

    We need to all make good design and operational decisions. Bad decisions like the one made by Lindows to run as root be default can lead to Linux having as bad a reputation as Microsoft.

    The Linux community is positioned to demonstrate to the world that Linux, not Windows, should be used anywhere that security is an issue. Let's not blow it.
    • by MicroBerto ( 91055 ) on Friday August 15, 2003 @03:17PM (#6707706)
      Many people are probably thinking about the kernel, but those guys are doing a relatively good job.

      What we really can't overlook are the popular distributions. They can't be putting in ridiculous defaults at startup. They shouldn't use too much beta software that's going to be running a lot. They need to keep pushing updates, and make it easy. And for the most part, I think we're doing pretty good. Learn from Microsoft's mistakes while you laugh at them.

  • Package Management (Score:3, Interesting)

    by plankers ( 27660 ) on Friday August 15, 2003 @02:07PM (#6707220) Homepage
    Two thoughts here. First, package management

    Operating system version control has been a problem for Microsoft Windows for a long time. Especially with runtime software bundled with third-party applications (think DirectX), you need a clear way to identify what is installed on a machine, upgrade it while tracking dependencies, and easily remove it. InstallShield does this sort of thing -- why isn't it built into the operating system?

    Furthermore, most package managers provide a facility to verify the files that are running on the machine. While it isn't as conclusive as something like Tripwire, a simple "rpm --verify --all" will give you some insight into whether a system file has been replaced.

    Package management on AIX (and probably other UN*Xes, but I haven't used them) gives you the ability to roll back out of a patch that went wrong, too. While that is possible to some extent in Windows, a package management solution could make that very easy.

    And while we're at it, why isn't there a framework built into Windows to centralize patching of ALL products, not just Microsoft ones? Certainly the "Microsoft Update" that they are proposing is a good step, but why not build something that can check other vendors' web sites for patches? Couldn't such a framework be built so that when an application is installed it registers with the OS, and tells the OS where to look for updates for that specific product? Then when you run this "update console" or whatever, your local machine goes out to Microsoft, Symantec, Adobe, whoever, and checks to see if there are updates for EVERYTHING that is installed?

    The system could also be similar to Red Hat's update mirrors/satellite up2date server, where a corporate customer could set up a central update server, tell it where to get updates for all the products in use in their company, and then that server mirrors it. Then updating the client workstations (and servers) is something that happens in-house. Maybe it could even be smart enough to tell if a client machine hasn't been updated yet, and then when that machine is powered on it could update itself and reboot if necessary, all before the user is able to log in.

    These two things together could really put a dent in management for Windows machines. Sorry if this is sort of a ramble, I've been thinking about it for a while and it all just spilled out.
  • by kevlar ( 13509 ) on Friday August 15, 2003 @02:32PM (#6707423)

    WindowsUpdate.com did not, I REPEAT: DID NOT EVER Run Linux. The scan from Netcraft only shows that during a particular scan the DNS resolved to Akamai's web caching servers. So Puh-LEASE don't try to start misinformed rumors.

    Linux AkamaiGHost 15-Aug-2003 213.161.82.37 Akamai
  • by Tired_Blood ( 582679 ) on Friday August 15, 2003 @02:39PM (#6707466)
    While Windows was getting all the attention from their common creator Microsoft, DOS has secretly been waiting for its opportunity to strike at both.

    From the infoworld article:
    The company is cooperating with federal law enforcement officials to investigate the attack, which is the second successful DOS attack against Microsoft.com this month.

    Two successful DOS attacks this month. And what a sense of irony: revolt against the creator by manipulating "the favorite" to do its bidding.

    What's so hard about using a lower-case 'o'?
  • by Anonymous Coward on Friday August 15, 2003 @03:06PM (#6707647)
    Notably, Microsoft refused to give permission to ISPs to burn CD's or make floppies with the Blaster patch on them. I heard of one outfit that had their lawyer contact MSFT to make sure that they were kosher before giving them to customers. Microsoft refused. As it turns out, stating that the users could easily download the patches directly, even if they had the shutdown bug and were dialing in to download a 1.2 MB patch.

    I have no sympathy for MSFT getting DOS-ed. The fuckers deserve it, and they were hoist by their own petard. Sure, there is some nitwit out there that acted on as explout that was known for at least a month, but WTF? What is the problem with letting ISPs distribute the patch to fix this thing?

    The ISPs are burning time and support lines over it, bandwidth is getting hosed by the packets on the affected ports, filtering ports helps (but doesn't eliminate the problem). Essentially, third-party companies (ISPs) asked for permission to help put out this fire, and Microsoft gave them a big "fuck you" and I am somewhat gratified by the whole thing.

    Fuck you, Microsoft. Here's hoping you get more of the same.

    I might post the emails discussing the attempt to get authority to help spread the patches somewhere, but I'm not anxious to cause a slashdotting of my own weenie ISP's servers.
  • by KE1LR ( 206175 ) <.ken.hoover. .at. .gmail.com.> on Friday August 15, 2003 @03:15PM (#6707690) Homepage
    Microsoft has a free tool called " SUS [microsoft.com] " which is a localized version of Windows Update - you run it on a W2K server in your enterprise and then redirect your clients to get their automagic updates from the local server instead of going to MS directly.

    The SUS server is supposed to synchronize itself (manually or automatically) with Microsoft's servers to get the latest updates, and you get a chance to approve them for distribution to clients. Not a bad idea, and it seems to work OK.

    However, the URL that's coded into SUS to synchronize with updates is -- wait for it -- a windowsupdate.com URL!

    Error Message:
    "Failed to download from URL 'http://www.msus.windowsupdate.com/msus/v1/aucatal og1.cab'. (Error 0x80072EFD: Unable to connect to the server.)"

    Anyone using SUS to update their client machines is now stuck with their current update set until Microsoft sets up a new site to sync with and documents how to change the URL that SUS uses to whatever one they come up with.

    Lame.

  • by Valiss ( 463641 ) on Friday August 15, 2003 @03:29PM (#6707780) Homepage
    I don't know why this became a big deal. Ok, I lied. It became a big deal because of users who did not patch their systems (for whatever reason). But it isn't like this patch is new. It was originally posted on July 16, 2003. They just revised the bulletin because of the outbreak.

    From MS's site:

    Why have you revised this bulletin?

    Subsequent to the release of this bulletin Microsoft has been made aware that additional ports involving RPC can be used to exploit this vulnerability. Information regarding these additional ports has been added to the mitigating factors and the Workaround section of the bulletin.

    If I have installed the patch provided with the original bulletin, am I still protected?

    Yes. There has been no update to the patch itself, and the patch will still correct the vulnerability. This additional information is being provided to those customers who may require a temporary workaround until they can apply the patch.


    I wish I could make my friends, family, people I know read these security reports on their own, but they never do.

  • Eeh, excuse me? (Score:4, Informative)

    by Jugalator ( 259273 ) on Friday August 15, 2003 @05:48PM (#6708550) Journal
    And now, the company has "extinguished" WindowsUpdate.com (future updates will come from a different domain). All this because of some Microsoft worm that triggers at midnight.

    If you're going to submit a biased article, at least get the facts straight. WindowsUpdate.com was never the primary WU domain, windowsupdate.microsoft.com was. They're just disabling the extra one that was never linked from the Windows OS.

"Why should we subsidize intellectual curiosity?" -Ronald Reagan

Working...