Diebold ATMs hit by Nachi Worm 414
red floyd writes "The Register is reporting confirmation that Diebold ATMs were hit by the Nachi worm back in August. Apparently some Diebold ATMs run XP Embedded, and got hit with a variant of the RPC DCOM worm. Seems that they hadn't yet applied the available patch."
Diebold spins it. (Score:5, Insightful)
A patch for the critical RPC DCOM hole had been available from Microsoft for over a month at the time of the attack, but Diebold had neglected to install it in the infected machines.
Nice spin, Diebold. I highly doubt these were the only unpatched machines. It's likely more accurate to say "these unpatched machines, of which there are many more, weren't well protected on their respective VPNs". Think about it: the infection had to come from somewhere, right? Other unpatched machines are probably much better protected on their respective private networks.
Re:Diebold spins it. (Score:5, Insightful)
It was done from a laptop.
My guess is that an infected laptop managed to screw things up (but no-one would admit to that). If it were because of a network connection, it would have been an 'all or nothing' infection and would've spread like wildfire. I'm not sure how exactly ATMs are connected, but they have to be networked in the grander scale of things for the system to work properly.
Anyways, my bet is an unsecure laptop - that's how most RPC hole attacks I've seen have spread recently. Having said that, we'll see lots of posts of an anti-MS nature in response to this story, when in actual fact, it's down to user bad practise, patch deployment and the fact that some people get a kick out of writing this stuff in the first place...
Re:Diebold spins it. (Score:3)
Re:Diebold spins it. (Score:3, Interesting)
Heh! Although the picture of having a bunch of guys driving all over every Wednesday to patch a truckload of ATMs is kinda amusing...
Thinking about it that way, it'd be all to easy for them to not admit they made the wrong software choice, or to neglect patching altogether until
Re:Diebold spins it. (Score:3, Funny)
Stop it with the intellectual bukkake.
Re:Diebold spins it. (Score:3, Informative)
ATM Horror (Score:5, Interesting)
A few years ago when I was a naive young UNIX programmer I came to the cash machine and got the firght of my life. There, floating over the blocky PIN login screen was a windows Illegal Error box.
Up until that moment I had always assumed the cash machines were running some specially written firmware on specially made hardware. This was a massively important and widespread system after all.
Oh - how young I was.
Re:ATM Horror (Score:5, Interesting)
I had assumed they were 8-bit machines, probably packing a 6502 or a Z80, with an EEPROM containing all of the necessary code. I made this assumption because that should be enough to handle ATM operations, the actual computing hardware would be cheap and secure, and that block font most of them use is the same as the uppercase-only font on the early Apple II machines.
I walked up to an ATM this past weekend and saw an OS/2 error window floating over the simulated bitmap font. I was grateful it wasn't Windows, but still...
Re:ATM Horror (Score:3, Funny)
My bank, Purdue Employees Federal Credit Union [purdueefcu.com], has biometrics (i.e. finger scanner) ATMs in several locations. One day I came to make a deposit and BLAMO! Blue screen of death. NT Kernel Protection error. I bet windoze is more widespread than you think in the banking industry (unfortunately), and not always
Re:ATM Horror (Score:3, Informative)
Choice quote: The Navy selected NT 4.0 as the standard operating system aboard the Yorktown for its reliability, functionality, low cost and ease of integration, said Lt. Danny Bethel, Yorktown's electronics material officer. NT runs the Yorktown's integrated bridge, engineering, condition assessment and damage control systems.
Re:ATM Horror (Score:3, Informative)
It was a divide-by-zero error in the application which subsequently took down the entire operating system. At the time, MS pointed out that the divide-by-zero was the application's fault, not theirs. Smart people pointed out that any operating system that can't handle a common application fault like divide by zero is complete shit.
Re:ATM Horror (Score:3)
Way to go. You just e-mailed a technical question to a bunch of underpaid, overworked lackeys who had nothing to do with the decision and will probably never see anyone who did.
Bear in mind that, beyond that, the trend in Customer *cough*fuckright*cough* Service these days is to use canned responses for as long as possible in the naive hope that eventually the whiny customer goes away in frustration. You'll be lucky to get a response, much less one that makes any sense.
Re:ATM Horror (Score:3, Interesting)
Still wouldn't work in the long run, for lots of reasons. The banks have backups, and when ATMs have erroneously given money to customers, the banks have chased it down.
Re:Diebold spins it. (Score:5, Insightful)
The answer to this is to make a simple, purpose built program, which is INCAPABLE of running externally introduced code. You need to patch? Run the software off a CD/DVD, and when you need to change the code, change the CD. Nothing to get cracked, nothign to get corrupted, nothing but hardwired code. Burn an extended BIOS on a rom chip to run the physical end. Then lock the whole thing up in a metal box, and BAM its as secure as you can make it.
Diebold should go back to making safes and padlocks, because they sure as hell don't know crap about ATMs and Voting Machines.
Re:Diebold spins it. (Score:5, Insightful)
Because their executives are idiots and their engineers are sheep.
Re:Diebold spins it. (Score:3, Interesting)
Just a thought... how hard would it be to make an operating s
Re:Diebold spins it. (Score:3, Informative)
Trivial. You could modify the Linux ELF loader to do this right now.
The problem is in proving that the signed code is not flawed. For example, the Xbox was compromised despite only executing signed code because Goldeneye had an overflow bug. Also you might remember the ActiveX signing was ridiculed when somebody managed to get Microsoft's signature on a program that simply rebooted your machine.
And th
Comment removed (Score:5, Interesting)
False sense of security still in effect (Score:5, Insightful)
"The actual point of service terminal itself getting infected-- that's pretty crazy," said [Windows expert Marc] Maiffret. "But worms are always going to be able to infect a lot more interesting machines than individual intruders are." Moreover, before reaching an ATM network, a human attacker would likely encounter more alluring high-finance targets along the way. "They're going to have to go through a lot of juicer networks first."
Oh, yeah, that's crazy. As I recall, we discussed this very issue in a previous Slashdot story [slashdot.org], and all the experts told us mere geeks that we were ignorant and stupid to even worry about it. Some of the most choice comments came in reply to my own post [slashdot.org] on the subject.
Now, even *after* a worm has found its way into an ATM, the "Windows Experts" say there's *still* nothing to worry about.
Well, ok... I'm not going to worry about my own personal finances, because I'll just ask the bank to reverse any bogus transactions. But if/when some savvy hacker does figure out how to infiltrate an ATM and walks away with a few hundred bucks, someone's going to come up short on their books at the end of the day...
Someone's going to come up short... (Score:5, Insightful)
Re:False sense of security still in effect (Score:2)
I suppose that's the problem with writing something that can spread from some random user's desktop onto a couple ATMs.... (running Windows or a number of Linux services on an ATM.)
I mean, first of all... RPC on an ATM machine? Why? Oh, because Windows NEEDS it to be open. (I had a machine at a lan party the other day, and I was just like, "How do you turn off RPC?" and they laughed and said, "You can't.")
Re:False sense of security still in effect (Score:3, Insightful)
Can't always blame MS- blocking external RPC calls is something that can and should be done in a firewall. Granted, MS should ship a firewall with their OSes that does it...
Re:False sense of security still in effect (Score:3, Insightful)
I should be able to decide on what services I want to export to the world, and have them all OFF by default. Then, when I find I need something, the OS interface should prompt me that it's disabled, and that to enable it, I'll have to turn on XYZ service, and what that service provides, and exposes me to.
Re:False sense of security still in effect (Score:5, Insightful)
(1) A display driver; any text console is sufficient, but if the banks prefer to show logos and useless graphics, fine, make it a simple framebuffer device.
(2) A rudimentary keyboard controller; any 4x4 matrix will easily do the job. Make it 8x8 and you have more keys you'll ever need.
(3) Some additional hardware controls to perform currency selection and output, and receipt printing.
(4) A network driver to hook the ATM machine into the banking network plus the relevant service applications including mandatory security services. Shouldn't be much different from setting up credit card terminals, BTDT.
So why does anyone need anything like a striped down consumer OS, no matter if it is Windows Embedded or some embedded Linux for that?
But if I decide to use it, then I better hurry and apply any goddamn bugfix meant to close wide-open security holes. Plus, I keep my networks strictly separated and eventual gateway points heavily firewalled. How could Nachi enter the money transfer network anyway?
Somebody obviously did not make their homework, both on ATM and network infrastructure design.
Re:False sense of security still in effect (Score:5, Informative)
Because it is a lot easier to develop the software if it can be debugged on the developer's PC. Most embedded OS's have been based on POSIX or stripped down Win32 APIs for years now (QNX and Paradigm being two examples I've personally used over 5 years ago).
Re:False sense of security still in effect (Score:5, Informative)
IBM warned 'em (Score:5, Informative)
Well, now they're getting what they wanted, and I doubt that they'll learn from this. Large banks seem to have a monolithic mindset that's averse to anything new. They're also decidedly pro-Microsoft.
IBM offers some very effective solutions for integrating Linux-based ATMs with both UNIX and Windows-based back end systems. That companies like Diebold insist on going with insecure, unstable (I've seen an ATM stuck with a BSOD!) software for such sensitive systems is asinine.
-Cybrex
Re:False sense of security still in effect (Score:3, Interesting)
Jaysyn
Re:False sense of security still in effect (Score:3, Insightful)
At some point someone thought it would be really cool to have ATMs with 10" color screens and speakers, so it can show commercials while you wait for your mugger.
They also seem to be moving away from the keypad. I had the unfortunate experience of using a touch-screen ATM the other day. The touchscreen was horribly calibrated (probably due to the thickness of the glass, and it was
Used to be banks were concerned about image (Score:3, Funny)
Used to be that American money was real honest-to-God GREENBACKS, not some funny, furrin looking fruit color with corporate logos on it.
Use to be that banks were always built, well, like banks, heavy, solid, safe looking hulking stone fortesses.
That's what the 80's green mono monitor always said to me. "We're interested in what's known and safe and secure, not flashy video ads to sell you stam
Re:False sense of security still in effect (Score:3, Informative)
Where do you get that? The only people arguing that this is ok is Diebold. And we already knew they were unethical. What Windows Expert is saying there's nothing to worry about in regards to this story?
Re:False sense of security still in effect (Score:3, Interesting)
The level of infiltration here is nothing. Its vastly less penetration than, say, someone who finds your lost card and tries it in a machine. At least then, they have bypassed one level of account security. A virus like this bypas
Re:False sense of security still in effect (Score:5, Insightful)
What color is the sky in your world?
This worm was caught because it wasn't expecting to be on an ATM. It thought it was on just another XP box on some network and started scanning. Suppose the next worm is patient, stealthily looking for ATMs?
Malignant code could potentially monitor any device I/O it wanted. How about grabbing the bits on your ATM card swipe and saving them in an arrary with the PIN you just typed? No need to decipher anything, just send a day's worth in a batch and self-destruct.
The attacker can then recreate your ATM card from the bits on the stripe.
You're right, we're still safe.
Re:False sense of security still in effect (Score:3, Interesting)
Part of the issue is that if a random worm can get into the ATM, a worm carrying dangerous payload (like one that installs a driver to capture keypresses and data being printed to receipts) could also find its way in.
The other part is that we really don't know what goe
Ain't karma a bitch? (Score:3, Interesting)
Well ain't karma a bitch Diebold?
What I am concerned about is whether or not my bank that I use uses Embedded XP for their ATMs. If so then I might have to consider switching banks. Not just because of this but because MS based systems are so notoriously insecure. Yeah yeah mod me down if you must but I'd feel much better having embedded Linux (or some other proven secure system) watching my money thank you.
FYI if you're using Union Federal [diebold.com] you might want to start looking around now,... hehe
Re:Ain't karma a bitch? (Score:3, Funny)
Re:Ain't karma a bitch? (Score:3, Funny)
Have you forgotten where you posted this? Nobody gets modded down for picking Linux over MS.
Re:Ain't karma a bitch? (Score:4, Insightful)
I guess their system works a lot like las vegases in the sense that if someone steals a million bucks from a casino it leaves a paper trail. They then sick the bounty hunters on you; this system is effective. I remember awhile back someone stole 7 million from a casino in las vegas and 3 days later the car was found by the cops, still running, in the wrong direction facing las vegas.
Any hacker with sufficient knowledge of these systems isn't going to try to crash them because they will quickly realize that by destroying these systems they're screwing over and creating millions of desperate people, both people who can't access their accounts and companies who can't put out paychecks on time.
But, the main reason I'm guessing they chose windows was for the features. Windows has lots of features and useless crap and when you hire someone to fix the system you don't have to train them as much. Plus, you get good support from microsoft and nice salesman to walk off the cliff with you.
I'd feel a bit better if their security was better. When your bank doesn't give a shit if you loose a few hundred dollers, or next months rent, to a hack I think most people have a problem with that and they aren't going to be calling anyone accept the cops to try to catch the person who did it, especially if they continueously do it.
It's rediculous. (Score:4, Insightful)
The reason this is Slashdotworthy is that it is the same Diebold. The people who submit stories are hostile towards Diebold, and it's only to be expected that some of those hostile stories would make it through.
I'm sure a lot more vital-service machines than just those built by Diebold were hit. A story on the range of systems, maybe with ATMs as a highlight, would have been more appropriate.
Not ranting at you, just wasting karma, that's all.
Re:Ain't karma a bitch? (Score:2)
If these machines used XP and a non-standard internet protocol (read: not TCP/IP, UDP, IPX, whatever) that the worm didn't have access to, this may not have even affected them. Am I right? Or is windows too standardized as to allow anything to
Re:Ain't karma a bitch? (Score:2)
I think you're right. This is a fine example of a need for a proprietary system for security. I'm not saying that obfuscating it makes it more secure, but adding to the learning curve of such a system might discourage some cra
Diebold incompetence, not Windows (Score:5, Interesting)
Funny- I was just at the ATM today, and I glanced down and saw the Diebold tag. They're pieces of crap- barely a few years old, nobody cleans them, the screens are dim and usually require breaking your finger- and they're SLOW as molassis. Slow as in "I have only three or four things I can do but it still takes me a minute to give you cash"- and it can't all be explained away by network latency. Things like the machine sitting there locked up for 20 seconds or more after the last person leaves, before it will unlock the card slot. What is it doing, debating the meaning of life? It's a fucking ATM machine. It makes you wonder if the whole thing is written in really, really bad VB...or maybe Flash.
In any case- I agree with the parent. I could care less what the thing runs, as long as they're competent. The voting machines demonstrated that they're completely incompetent. This just goes to show that our suspicion that they're -also- probably incompetent at making secure ATMs.
Re:Diebold incompetence, not Windows (Score:3, Informative)
Re:Diebold incompetence, not Windows (Score:3, Insightful)
That doesn't make sense, seeing as I can walk into the bank and have them change my PIN to something mnemonic. Is this stripe getting overwritten each time? Because I know they don't give you a new card to change that PIN...
Proven secure? (Score:3, Insightful)
When you find a "proven secure" operating system, make sure you let everyone know about it. As of the 25th of November 2003, they are as common as the Unicorn and the Free Lunch. That is to say, they don't exist.
Just goes to show.. (Score:5, Insightful)
I'd think QNX or something else very simple and reliable would be a much better choice to rnu on ATM machines..
Re:Just goes to show.. (Score:2, Informative)
Re: QNX is the way to go (Score:3, Interesting)
Re:Just goes to show.. (Score:5, Funny)
-psy
And this company... (Score:4, Interesting)
Re:And this company... (Score:3, Insightful)
I wonder why they even bother using TCP/IP at all. It would make sense to have some kind of proprietary protocol in this matter, since we don't want to have all the security issues that are present on the net present in the ATM machine.
ATM machines shouldn't be connected to the internet, which means TCP/IP is optional. This would be security through obscurity at it's finest. Eliminate ports altogether.
Diebold with the voting machines (Score:4, Interesting)
The same people that build machines with no paper trail for vote auditing.
They also do not patch their ATMs.
This really gives me confidence for the upcoming elections.
Re:Diebold with the voting machines (Score:2)
Scary.
Re:Diebold with the voting machines (Score:3, Funny)
Possible Winners:
1) RPC DCOM
2) General Protection
3) MafiaBoy
Security through obscurity after all? (Score:2, Insightful)
think about the work you'd have to go through to get your hands on OS/2 code to figure out where holes might be.
then you have to write your own virus. it'll only be aimed specifically at ATM's etc.
just seems like there's a lot more legwork involved in hitting obscure OS'es.
instead, if they run XP, someone else grabs the code and distributes it. then
They need a new BIOS (Score:4, Funny)
A new, secure, manageable BIOS [slashdot.org]would fix their problem.
It's really Phoenix's fault.
Uh-huh... (Score:2, Insightful)
Seriously people, embedded proprietary operating software (neither XP or Unix or anything widely made public) is the best way to go with these sacred machines. Worms will have a difficult (tho dare I say impossible) time working their way in. So the problems will hopefully be mini
Why are ATMs unprotected on the Internet anyway? (Score:3, Interesting)
Re:Why are ATMs unprotected on the Internet anyway (Score:2, Informative)
I'm amazed that those ATMs were connected to the Internet
Maybe they weren't. You needn't be connected to the internet to catch a worm. Any LAN/WAN/VPN will do.
Re:Why are ATMs unprotected on the Internet anyway (Score:2)
Re:Why are ATMs unprotected on the Internet anyway (Score:3, Informative)
The ATMs are not connected to the Internet. They are on an intranet, most likely with other ATMs and their database server, hopefully nothing more.
Agreed there is no firewall. The original idea was probably only to allow trusted machines onto the intranet in the first place. This follows the same logic (or lack-thereof) of people that don't use firewalls because they're be
Re:Why are ATMs unprotected on the Internet anyway (Score:2, Informative)
As someone who works in a bank, I have seen a Diebold repair tech hook up his laptop directly to the ATM to do some work on it. So the laptop could have been the one that was infected.
Also you most of the program information comes from the Processing Center that is driving the ATMs which are all on a network. For example when we changed ATM Processors, the tech had to connect to the system and get a "load" from the new processing center to connect. These ATMs are connected over some form of leased lin
Re:Why are ATMs unprotected on the Internet anyway (Score:2)
A lot of infections happen like this. It's one reason why firewalls are not a complete solution.
Diebold ATM (in)Security (Score:5, Informative)
The old ones run OS/2 v3.0 and a vulnerable version of sendmail, the slightly newer ones run Windows NT 4.0, with almost no patches installed and a default username and password.
Once you gain access, it is possible to directly control the hardware using the utilities already on the system, including dumping the cash drawer
At this point Diebold has not patched ANY of the RPC vulnerabilities, let alone the Messenger or Workstation bugs. Each of these ATM's is connected to an ethernet segment somewhere waiting for someone to rob it.
During the Blaster peak, a friend of mine was talking about the XP ATM's in London constantly rebooting... They put these cmd-shell-waiting-to-happen boxes directly on the Internet. Thank god for companies like Diebold and Microsoft, their problems created a market and a community that is still picking up steam.
Unfortunatly, he's right... (Score:2, Informative)
*sigh*
Re:Diebold ATM (in)Security (Score:3, Funny)
1. Root a Diebold corporate server. Access their customer's VPNs for ATMs. If they don't patch their cash machines, you can bet their file-sharing is equally vulnerable.
2. Insert a worm into the ATMs.
3. Worm executes simultaneously worldwide. Diebold machines all dump their cash simultaneously.
4. Worm displays a message on the screen: This hack made possible by vulnerability X that MS patched on Y but Diebold didn't bother to apply. Think
Ripe for Conspiracy Theory aka 1,2, Profit.. (Score:2, Funny)
2) Diebold uses skimmed money to lobby for their electronic voting machines
3) Diebold uses code in voting machines to fix elections
4) Government by Diebold, Taxation by Diebold
5) PROFIT!
Funny banner ad to go with this article (Score:3, Funny)
RPC vulnerability (Score:5, Interesting)
Re:RPC vulnerability (Score:5, Informative)
I had to boot up in safe mode and do some registry hacking to get RPC back up and running, because everything from windows explorer to control panel, to msie would fail to load. After managed to turn RPC back on, the machine worked "perfectly". As perfect as a windows machine can operate, hah.
Re:RPC vulnerability (Score:2)
Not defending anyone here, but would you blame red hat if Diebold installed onto an ATM a stock off the shelf red hat distribution with none of the security holes patched? Would it be red hat's fault if someone used the ssh exploit and got their jollies off of rooting an ATM?
Re:RPC vulnerability (Score:2)
Re:RPC vulnerability (Score:2)
No, it's not. I'd suggest you stop getting your Windows information from a hippie on a bicycle
Re:RPC vulnerability (Score:3, Interesting)
Windows throws open and administrator share out of the box.
Why not? (Score:3, Insightful)
Hey, why not? Nachi wasn't tailored for ATMs, but it still got a few. Imagine a virus/worm that _was_ meant specificly for ATMs. I bet something like that could achieve a pretty big impact.
Ah well. Just my $.02
That explains it (Score:5, Funny)
Just lame (Score:5, Insightful)
Just the fact that ATM machines are reachable from the public Internet is a huge cause of concern to me. A VPN connection without an intervening firewall at the ATM machine itself (which they claim they are installing now) is plain ridiculous.
You are then just hoping that none of the insiders will try to sabotage the machines, either knowingly, or unknowingly because of an infected laptop etc. They have to realize that VPN is a VIRTUAL PRIVATE network, and NOT a dedicated line, and hence, security measures have to be MUCH more stronger than if it was a REAL private connection. Does it take rocket science to figure that out?
And then there's that quote from the " Windows expert and "chief hacking officer" that malocious hackers will probably not go for ATM machines, even though they are reachable/hackable, because of other "jucier targets", presumably the bank network itself. Most malicious hackers would do it just for the fun of making an ATM machine spew out cash, if they figure out they can make it do that. That is a very lame assumption from a security expert.
And finally, for your reading convenience, here's an earlier /. story [slashdot.org] which mentions that 65% of the ATMs will be running a stripped down version of Windows by 2005.
Re:Just lame (Score:2)
Yes, yessss, we'll get them to ignore the ATM machines by getting them to attack the whole network! We'll save the leaves by cutting down the whole tree! Yes, yes, brilliant!
DHCP errors (Score:5, Interesting)
Mashing the keypad didn't seem to help. I guess sooner or later they would have realised the ATM had disappeared and would have sent a tech out to press reset or something.
What impact to ATMs, other than going offline? (Score:5, Informative)
And Nachi [nai.com] basically makes the machine unusable.
Without specific code that target's ATMs, this is merely a generic nuisance that happened to hit what some consider a sensitive device.
Scary when you think what could happen, and frustrating when you think of the loss of trust in the security admins. But let's keep this in perspective. Nothing serious happened and it's a big step to get to where something serious will happen.
Hopefully those responsible have been sacked, and the new security llamas won't make the same mistakes.
How do we know? (Score:5, Insightful)
Scary when you think what could happen, and frustrating when you think of the loss of trust in the security admins. But let's keep this in perspective. Nothing serious happened and it's a big step to get to where something serious will happen
How do you know something serious didn't happen?
So the Nachi worm hit these machines, and its big and obvious, and it breaks the machines. But the Nachi worm moves by brute force; it hit these ATMs by accident. How do we know that during the time before the ATMs were hit, someone with actual, targetted, malicious intent didn't at some point hit a few of the ATMs using the same exploit Nachi did?
If someone doing it on purpose had hit the ATMs, they could have done something much more subtle. Something that wouldn't have been noticed the way the Nachi worm was, something that (given how unconcerned everyone seems about this) probably wouldn't be noticed at all, even after the Nachi incident. Something like a small patch to the ATM UI that quietly records the ATM card number, personal information, and PIN# of everyone who uses that ATM, then quietly dumps that somewhere on the internet later. It wouldn't be that difficult, and the Nachi thing simply proves its possible.
It's not a big step at all to get to the point where something serious could happen. It's barely even a step at all, as it's just a step of exactly the distance between a worm hitting an ATM at random and someone with a little bit of intent, knowledge, and time sitting down and deciding they're going to hack an ATM.
Why does an ATM need XP? (Score:5, Insightful)
The same criticism applies to Diebold's voting machines.
This is why Linux would be such an ideal solution. No application of Linux has impressed me more than the (now sadly defunct) Linux Router Project [linuxrouter.org], simply because it demonstrated how for many tasks most of the operating system amounted to nothing more than ballast. They were able to boot a router from a floppy.
This is how I think an ATM--or a voting machine--should work. The amount of software should be kept to an absolute minimum if for no other reason than that it minimizes complexity, and in these kinds of applications, complexity is the mother of all evil.
And in the case of the voting machines, it would also greatly assist in auditing the code and making sure that what you think is executing is what's executing.
Embedded XP? What were they thinking? (Score:5, Interesting)
Windows' strength, pretty much its only strength, is legacy compatability. But an ATM doesn't need to run Excel or some 8-year-old custom Visual Basic application that an irresponsible manager got the company locked into. Really, it's ok to use decent software for embedded projects, nothing should hold you back.
Using Windows in an ATM, sounds like a classic application of the saying: "When the only tool you have is a hammer, every problem looks like a nail."
Re:Embedded XP? What were they thinking? (Score:3, Insightful)
Hell, they don't come easier than that:
phb to techie How quick can you get me a demo of the new embedded project?
techie to phb I can do you a really crap one in 1 hour with Visual Basic, but we will need to code the proper one in C, and that will take 3 months
phb to client The system will be ready tomorrow
Diebold voting machines... (Score:3, Informative)
For more see Jim March's comments to the CA Secretary of State here [equalccw.com]
This sounds familiar.... (Score:2)
Right.
Underrated movie, actually....
Oy! (Score:2)
Greer, Pfleeger, Schneier et. al. were right ... (Score:5, Insightful)
It is also very interesting to note that they only found the worm because the infected machines tripped the IDS with excessive network traffic. From this we can infer:
1. A worm that was less aggressive with it's scans would probably not have been detected and could possibly still be operating today.
2. They probably don't have any host-based intrusion detection systems in place. No automated file integrity checking, no authorized process lists.
It's a good thing for us that the worm and virus writers (thus far) have been gifted programmers, but otherwise dumber than a bag of hammers. A well-written subtle worm could probably cripple most of the developed world.
Windows Infected. Oops... I mean Embedded. (Score:3, Insightful)
diebold, diebold. (Score:3, Insightful)
2. Wait
3. World Domination.
Don't even need access to the machine, zero accountability, to the paper trail, to diebold, to the republican party, etc.
Fight it like the plague
I think it wasn't even two months ago... (Score:3, Interesting)
Re:Propogation (Score:5, Funny)
Re:Story posted today (Score:2)
Re:They wouldn't be allowed to patch it anyways (Score:5, Funny)
Re:They wouldn't be allowed to patch it anyways (Score:3, Insightful)
I'm with you on this one...which is not to say that I agree with Diebold's business practices. However, it's not Microsoft's fault if some butthead forgot to patch their system -- the same way it's not RedHat's fault if some butthead forgot to patch their system and got owned. How can Diebold be blamed here? It's the eu's responsibility to maintain their system.
Now I don't know anything about ATM machines and associated
OT: Sendmail (Score:3, Insightful)
Re:They wouldn't be allowed to patch it anyways (Score:2)
Which begs the question - how did they audit them? A full audit has to go all the way down to the metal, otherwise someone could have hidden a backdoor that allows them to alter the results and logs. Hopefully they have fully checked the source code of the compiler used to build OS and software as well, the rumoured backdoor in an early versi
Re:They wouldn't be allowed to patch it anyways (Score:2)
which is a crippling inherent flaw in the whole idea. If you allow patching then the system would be vulnerable to arbitrary patching. If you don't allow patching you can't fix any other security holes you might
Re:Microsoft excuse hierarchy (Score:3, Informative)
QNX runs aircraft, missiles, and satellites. I would dare say that security IS a design consideration.
Linux and BSD scale down to PDA's and data recorders. You just pick your flavor and go. And first you claim Linux is bloated, and then that SELinux has no apps.
As far as a microkernel OS, I'm not sure what you are talking about. Microkernel is design feature for future expansion and development. Performance and security are on par with everything else. I think Linux has do
Re:Ahh, yesss! (Score:3, Funny)
Yes: -35,002
No: 8,667,000,002
Cowboy Neal: Orangutan