Survival Time for Unpatched Systems Cut by Half 460
UnderAttack writes "The Internet Storm Center published a graph
showing historic trends for the "Survival Time" of unpatched, unprotected (windows) computers connected to the internet.
Turns out, this number dropped from about 40 minutes last year, to 20 minutes this year.
The survival time is calculated as the average time between reports for an average target IP address. If you are assuming that most of these reports are generated by worms that attempt to propagate, an unpatched system would be infected by such a probe.
The data is collected from a large number of networks with different types of upstream protection. So if you are on an unprotected cable/DSL line, you may see probes much more frequently. Either way, 20 minutes is not long
enough to download patches.
The Honeynet Project did publish a paper
with some stats back in 2001."
Patch CDs (Score:5, Insightful)
Re:Patch CDs (Score:5, Informative)
Re:Patch CDs (Score:3, Informative)
A standard router [ic.ac.uk] is "A device which forwards packets between networks. The forwarding decision is based on network layer information and routing tables, often constructed by routing protocols."
Nothing about stopping incoming worms there.
Looks like you're really talking about a "NAT router/firewall", which sometimes has reduced routing capabilites. I recently went to PC World (not hoping for much success) looking for a router, since I h
Re:Patch CDs (Score:5, Funny)
which means it'll never happen
-nB
Re:Patch CDs (Score:5, Informative)
hmm...or rather, they did. [microsoft.com]
Re:Patch CDs (Score:2)
Windows Update Catalog (Score:5, Informative)
Figure out what the latest service pack for the OS is, and apply that. That should let you get on long enough to use windows update to scan and get a list of the other KB-patches you need. Disconnect, patch, rescan. Repeat. If you want to learn how to use QChain [microsoft.com], it can be faster, but that doesn't work on Win 98/ME.
For the truly paranoid, keep a list of what order you need to apply the patches in. Then wipe and reinstall the OS from scratch, and apply the needed patches in order without connecting to the net first.
However, it's a lot easier to use the Update CDs. It would be nice if there was a reliable torrent of the ISO somewhere....
Re:Patch CDs (Score:5, Interesting)
not trying to start a flame/OS/holy war, but I would deffinatly see this as a problem
Re:Patch CDs (Score:3, Insightful)
On a more serious note though, the firewall option isn't available on all MS operating systems by default and isn't configured "on" by default. While locking down the system prior to connecting to the Internet should be the standard practice, most PC owners really don't have the technical skills to do this, even with the MS GUI's.
Re:Patch CDs (Score:3, Funny)
WinXP SP2 slipstreamed CD for the win! (Score:5, Informative)
Re:WinXP SP2 slipstreamed CD for the win! (Score:3, Informative)
1) Burn a CD with XP SP2 on it at work, a friend's place or wherever
2) Install XP fresh without being connected to the net
3) Install SP2 from the CD next
4) Install everything else
Re:WinXP SP2 slipstreamed CD for the win! (Score:3, Informative)
Re:WinXP SP2 slipstreamed CD for the win! (Score:3, Insightful)
Automatically downloads all current patches for WinXP, Win2000 or 2003 Server installations, slipstreams them and creates an ISO image. Fully configurable, including unattended install scripts through winnt.sif and first-boot application installs and regtweaks through cmdlines.txt. You can pick and choose which hotfixes and add-ons you want to apply.
Although the "current hotfix" list on the website doesn't yet reflect it, WindowsXP-KB835
Re:WinXP SP2 slipstreamed CD for the win! (Score:2)
Also I think they wait until all translations are done, at least for europe. Don't want to have situation where they have US/UK XP+SP2 and (for example) Finnish XP+SP1. Once the different language versions are translated, they'll move over.
Of course if you buy your computer preinstalled from a good store that b
20 minutes?? (Score:5, Interesting)
No, not joking. At work, somewhere, there is an infected computer and while rebuilding a computer I plugged it in to run the updates for 2K and antivirus. Less than a minute after pluging it in, I was crashing and burning.
Had to go to a patched computer, download the needed updates and burn them to CD and update the computer that way first before plugging it onto the network.
REALLY anoying.. and when I find the user with the infected computer.. well, lets say I'll have a new storage location for this dead notebnook hard drive...
Ditto (Score:5, Interesting)
Re:Ditto (Score:5, Informative)
" If you prefer to use a different Web browser, updates to Windows may be downloaded from the Microsoft Download Center."
With a link within the text "Microsoft Download Center." I'm guessing you can at least get some necessary patches from there (SP's, some critical patches) before letting your machine full-bore on the 'net without a firewall.
I know there are some home users out there that still aren't natting or using some sort of stateful firewall, but come on - you have 2 linux boxes there and can't get a nat to work? Hell, I'll buy you a linksys, they're getting darn cheap after rebates nowadays.
Nope (Score:3, Informative)
Re:Ditto (Score:3, Informative)
Thank you for your interest in Windows Update
Windows Update is the online extension of Windows that helps you get the most out of your computer.
You must be running a Microsoft Windows operating system in order to use Windows Update.
Re:Ditto (Score:3, Informative)
http://www.microsoft.com/windowsxp/downloads/upda
Same is true for SP2...
Network Cable? (Score:5, Informative)
Then once you are certain that everything is hunky dory, plug it into the network or internet with a firewall (for both incoming and outgoing).
And this isn't an issue with Windows or Linux or FreeBSD for all the fanboys out there. This applies to all OS's. Windows is targeted more because there are more people using it. There are plenty of exploitable vulnerabilities in any OS. It's a matter of work / payoff ratio.
Re:Network Cable? (Score:4, Insightful)
Did you ever learn anything about end users?
It's all well and good to say don't connect it to the network before patching, but end users don't know that. Nor should they have to know that. It is totally unreasonable to think that the first thought through Joe User's head should be "Right, I bought this brand new machine, but I shouldn't connect it to the network since it might be compromised."
End users are only very recently learning about service packs and patching, etc. Remember, prior to Windows XP, service packs were for business operating systems. How many end users did you see running NT 4? Even those folks running 2K at home were clueful folks - home PCs sold at CompUSA and the like shipped with 98SE or ME. You can't expect them to gain all this knowledge overnight.
have all relevant patches available on removeable media - that has been verified authentic - and install sans network.
And you obtain them how? In an IT environment, sure, it's trivial, beacuse you have N different computers, and probably N different platforms to use to create this media. Most folks still only have one PC. Sure, some people can burn CDs at work (but many workplaces severely limit what users can do on their machines, and lots of places prevent CD burning on work machines for corporate espionage reasons), and others might have friends with CD burners, but that's still a lot of effort, and it doesn't cover everyone.
It's totally unreasonable to expect a consumer to jump through all these hoops. (I'm not saying they shouldn't take these steps, just that they shouldn't *have* to take these steps in order to make a consumer electronics device work) Several changes need to be made. MS should produce a crapload of service pack CDs and give them to OEMs and every new computer should come with a current one. (They did this with NT4 SP3 and haven't done it since to my knowledge). They should also ship them to large stores (BestBuy, CompUSA, etc) and sell them for a low price (ie: $0.99) enough to prevent people from taking more than they need, but not terribly expensive. MS is notoriously tight-fisted when it comes to stuff like this, despite the fact it's their fault the product is insecure. Carmakers wouldn't get away with charging for recalled parts. For example, MS refuses to ship CDs to colleges. They'll ship one for every 50 or 100 students, but that's it, and that's ONLY if you have a Select license. Given that in that quantity the CDs cost fractions of a cent each, there's no reason for this. I can understand them being reluctant to make a CD with hotfixes, since those come out so frequently, but once a service pack is out, it's out, there's no reason not to make a CD except to penny-pinch.
Re:Network Cable? (Score:3, Interesting)
The answer... yes, actually. My father is probably the best example of an end user that I can think of. He used to write code for his psychology tests, purchased his first computer the year I was born (1981) and has been using computers very successfully for nearly 25 years. The problem is that he has never had the need to understand them more as a means to an end, a tool. And in that sense, he is to me the quintessential computer user.
Most people I hav
Re:20 minutes?? (Score:4, Informative)
Re:20 minutes?? (Score:3, Interesting)
Re:20 minutes?? (Score:5, Informative)
Re:20 minutes?? (Score:4, Interesting)
No, not joking. At work, somewhere, there is an infected computer and while rebuilding a computer I plugged it in to run the updates for 2K and antivirus. Less than a minute after pluging it in, I was crashing and burning.
I think there is a major difference between network and internet time frames. A friend of mine works for a huge corporation, 5000+ desktops at one location, and their LAN team noticed a significant increase in rate of infection when they changed the workstations from 10mbit to 100mbit.
Also, worms are programmed to infect their own subnet before branching out.
Re:20 minutes?? (Score:3, Funny)
I mean, they litterally plug in, said "fuck", unplugged, and they were already infected with something.
They want an iBook...
Re:20 minutes?? (Score:3, Insightful)
Re:It's called an AVERAGE (Score:2)
However, in this case the average is a completely and utterly useless figure and you'd be much better off expressing a range of times.
Is anyone else... (Score:5, Interesting)
In the end I had to swap some CD burners around, download+burn the patch, and then unplug the box from the internet while booting.
Re:Is anyone else... (Score:3, Interesting)
I opted for making the service restart the service rather than restart the machine. Funnily enough, it gave me hours of uptime to get the patch installed, then restore the RPC component to it's rather panicky restart state.
It helps knowing something about an operating system you dislike.
Dodgy assumptions (Score:5, Insightful)
It would be much more interesting to see average compromise times for a vanilla install of various different OS versions (with no ISP protection, of course). In the mean time, the name should be changed, in my view.
Re:Dodgy assumptions (Score:3, Interesting)
Worms target my Linux machine via port 80 about every 35 seconds (at least in the past two days, I don't feel like looking further back). I have blocked most of the local Comcast customers in my area through *A LOT* of
Re:Dodgy assumptions (Score:2)
I'm planning on doing a clean install of Panther today, if I have some free time I'll test it out and get back the results.
I predict that I will get bored of wating well before anything remotely interesting happens. Mac OS X comes with a software firewall already on with nearly every port blocked to begin with. In addition to the lack of prolific Mac related viruses I think I'll leave it up for maybe 2 hours or so, see how it did, and then report.
Update during Install (Score:5, Insightful)
Re:Update during Install (Score:2)
Re:Update during Install (Score:2)
Re:Update during Install (Score:5, Informative)
the trick is easy tho
1) unplug network
2) install xp
3) install firewall or activate build-in FW
4) plug and config network
5) patch the system
there 5 easy steps for a "safe" install
Re:Update during Install (Score:3, Funny)
C'mon now! The patch is out! (Score:3, Interesting)
Put an old red-hat system up and see how long it takes before you're r00t3d!
Or watch an OS-9 system crash!
Re:C'mon now! The patch is out! (Score:2)
Huh? You didn't even need to plug into the network for that to happen. And most of the time it was Nutscrape 4's fault anyhow.
Re:C'mon now! The patch is out! (Score:2)
Re:C'mon now! The patch is out! (Score:4, Insightful)
I don't know how often Mac users reinstall, but if they had to, and their hardware was good enough, I'm sure that they'd upgrade to the latest version at the same time. You simply can't do that with Windows, you have your 3 year old install CD. Of course, you didn't have to pay $120 each year since like with MacOS X, although you did get extra features with that as well as bug fixes.
I doubt that many people would burn a specialised SP2 CD and do it right. Human nature - their current system has it installed via Windows Update, why download it again as a whole? They probably wouldn't even know about it.
Re:C'mon now! The patch is out! (Score:2)
What do they mean by survival time? (Score:3, Interesting)
Time before worm infection?
Time before the computer is brought down?
Re:What do they mean by survival time? (Score:3, Interesting)
Which means they assume all of those are from worms, and all worms are successful, etc.
It's still a bloody short time, though.
Re:What do they mean by survival time? (Score:4, Insightful)
I'm guessing here, but time between when machine is first brought online and when it's first discovered/probed/found alive by a worm or hax0r scanners - in other words, time before worm infection or other kind of intrusion, because after it dawns to the world that there's an unpatched system right before their noses, there sure isn't much time left before that system is owned.
Broadband hardware... (Score:2, Interesting)
ISP hardware (Score:2)
Either that or Microsoft installs should not enable any ports for incoming connections after an install until the latest patches are installed.
yes, but... (Score:3, Informative)
the time it takes for an exploit to be crafted has usually been sufficient to allow sysadmins to patch- 1 to 2 months usually.
doesn't mean it happens, obviously. and the time it takes for an exploit to be created is shrinking, too.
at this point, the clue should be received: firewalls. updates. secure systems.
(and microsoft, please fix your stuff pro-actively.)
Tutorials with new computers (Score:3, Interesting)
Two cents (Score:3, Interesting)
2. I note that despite increased awareness and MS's increased focus on security the average survival time shows a downward trend, with slight peaks shortly after high profile worm events. How come? Is the average user slacking off? Or are the worms/viruses/trojans/whathaveyou getting smarter? Or are there ever more on the loose, resulting in an ever increasing number of probes? Looking at my firewall, the number of probes I receive remains more or less constant (although I had a few more than usual on port 8000 today) so maybe that is not a good explanation (for the Netherlands at least). Anyone?
Hardware firewall (Score:5, Informative)
Re:Hardware firewall (Score:4, Insightful)
I've almost begun purchasing Linksys routers for my friends and family. At $40 a piece it's just ignorant not to have one. The basic firewalling that they do is pretty handy. And there are models that include client software controled firewalls. It's also nice to have a switch already at their house for when someone comes over with a laptop or such. Home networks, though still geeky, are becoming a nice thing to have with more networkable devices like game consoles (XBox, PS2) and media devices like a ReplayTV or TiVo. Also, if there are more than two people in the house you can almost be garounteed that there will be more than one computer.
Re:Hardware firewall (Score:3)
ISPs' profit margins are razor thin as it is. This is an added configuration and support cost which does not directly add anything to the bottom line.
The logical argument would be that it should be a selling point but the fact is that the clueless people don't get it and the cluefull people already have firewalls.
Not to mention when the clueless person clicks on that spam email with the new trojan URL the ISP i
Re:Hardware firewall (Score:3, Interesting)
When I worked for a large cable company, those of us in the technology organization wanted to make it polic
But there is a secure microsoft system! (Score:4, Funny)
Further, we are offended by all the FUD spread about our products by the open source community. Our security features include and expanded install size, which severly limits the space available on disk available to anyone who co-opts your computer for use as an illicit server.
Also, the times recorded by this survey are non-relevant and obviously flawed. They claim that their machines were only compromised after more than 15 minutes of CONTINUOUS uptime. This simply does not occur on our new ME+ varient. We cannot accept responsibility for those who remove our essential security features by removing 'buggy' components, or running a 'stable' GUI.
End Sarcasm;
Low survival time (Score:5, Interesting)
That's not enough time to engage your software firewall pre-SP2. I'm not sure of the condition post-SP2.
Re:Low survival time (Score:5, Insightful)
IIRC Sasser and Blaster chose their target IP's at random, starting with IP addresses in the same subnet then moving to random IP's. So if a machine gets infected four seconds after it's plugged in, that's not just a product of how poorly secured windows is, it's also a product of U of Alberta having a network chock full of RPC 'sploiting goodness. Now, if they'd have plugged in the same in an environment that had been properly patched, firewalled, etc. The box would've been fine for hours, days, or maybe it would've never been comprimised at all.
Firewall and Snort logs can give you the true tale of the tape. Some days my home firewall (SBC residential DSL) is turning away worm attempts like a goalie on speed. Other days I go 10-12 hours without so much as a nibble or a port scan.
But it is so much fun to talk about how "WIUNDOWS IS TEH GHEY! IT GOTS PWN3D IN TEH SECONZ!!LOL!!!11ONE@!!!@!
Re:Low survival time (Score:5, Interesting)
Fundamentally, I'm not sure what they could do differently. There's no doubt that it is a hostile environment, but the only alternative seems to be to simply shut down network access, something that just isn't reasonable at a university.
I should point out, of course, that the 4-seconds-to-0wn time is from the results of testing they did. None of the system administrators there would ever plug in a unpatched machine they weren't planning on immediately wiping.
Crap. (Score:2)
Fucking harsh.
side note; would using something like outpoast firewall make any difference?
Re:Crap. (Score:3, Funny)
This includes dialup (Score:2)
10 minutes? Pfft. (Score:3, Interesting)
I generally install Windows with the box disconnected from the network, install all the latest updates of a CD, then attempt to connect to the network. Most of the time, that works...
How about the foolproof way I use? (Score:4, Funny)
That's all there is to it, I've installed my fair share of XP machines and never ever had any problems with getting patched before getting pwned.
No big deal - just install behind a firewall (Score:5, Insightful)
If you just throw a cheap hardware router/NAT/firewall in front of your box when you build, this isn't really big deal I've found.
Re:No big deal - just install behind a firewall (Score:5, Insightful)
Maybe they are not proof against all hacks, and a determined and skilled cracker might be able to get around it with ease, but the boxes will protect you against worms. Problem solved.
This again? (Score:5, Insightful)
Perhaps a "TURN THE GODDAMN FIREWALL ON BEFORE YOU CONNECT TO THE NETWORK!" notice somewhere on the front page would get the point across? I've done exactly two Windows installs in my life and I know how how to safely set up a new XP system.
Re:This again? (Score:2)
Much better than my company (Score:3, Informative)
If this happens in an enterprise environment, I pity all those clueless web users.
Hardly Surprising (Score:2)
Put a Redhat 5.1 Server up, see how it does... (Score:3, Interesting)
False Analogy (Score:4, Insightful)
We're talking about people who want to install from the absolute latest Windows CD, and they have to take severe steps to avoid getting 0wned.
20 Sounds Generous To Me! (Score:2)
Opinion: It's always a good idea to run a strong firewall in front of your home network.
Fact: If you're running Windows you MUST run a strong firewall in front of your home network.
How significant? (Score:4, Interesting)
Nick...
Untrue (Score:3, Funny)
I have a bone-stock winXP system here, and have been running online for almost an hou*(&^@ SD#&7*$^)_*( #$%@#&*() #
NO CARRIER
Beating the probers (Score:3, Informative)
1. Unplug your network connection before you install the OS.
2. Install the OS
3. Before you connect to the network, shut down every service you can shut down and make sure they don't start automatically.
4. Connect the computer to the network.
5. Run windows update until you're fully patched
6. Set up the firewall
7. Start enabling any service you might want to run.
This approach will hopefully keep you safe from harm - and it will definitely reduce your exposure!
But which versions (Score:3, Interesting)
- Win95/98/Me
- WinNT4/2K/XP
- Win3.1 (with Trumpet Winsock)
- Mac OS (whatever the first version with a TCP/IP stack)
- Linux (various distros)
ALL unpatched.
Paradoxically, I reckon the newer Windows systems would go first (more services open to the world), along with older Linux distros (same problem).
Re:But which versions (Score:2)
Re:But which versions (Score:3, Interesting)
Re:But which versions (Score:3, Interesting)
Mac OS X/Jaguar/Panther
I suspect that OS will last the longest out of the box, but I'm biased I think.
20 minutes? you mean, more like 20 seconds? (Score:3, Insightful)
Windows Patch Process..it takes too long (Score:4, Insightful)
I went for the big updates first (like Service Packs and IE upgrades) - but most of those require that they be installed alone with no other updates until the machine is rebooted. So you have this long drawn out process of download a single patch, reboot, download another single patch, reboot, download another patch, reboot, repeat ad-nauseaum and finally download all the straglers. I not sure how many reboot cycles I had to go through, but the whole install and patch process (including partitioning and formating) took over an hour. And that was attended.
My point here is that during the patch process with the constant reboots, it would be easy for somebody to walk away from a machine while it is downloading or rebooting and thereby leave it open to attack while it is idling. Of course, you ought to download all the patches on a secure machine and then patch-up you new box while inside your own secure net before exposing the box, but most people (like me) are going to connect direct to the internet to get "windows update". Luckily, I am behind a firewall, but you can easily imagine how ugly it could get if somebody were doing this outside a firewall. The single downloads and constant reboots are not going to help.
20 minutes is a champion run time... (Score:2, Insightful)
20 minutes my arse. (Score:3, Informative)
The other day I was at my sister's house and installed her a fresh copy of w2k. For some reason I completely forgot to disconnect the network connection and not two minutes after Windows initially started, the machine had become infected with Nimda.
this stuff has been said in other posts, but... (Score:5, Insightful)
Second of all, if you're installing your own OS, you're taking on the responsibility to do things in a minimally competent way. That might mean a NAT router, a slipstream installed CD, or just a CD with the service pack burned on it, so you can install it before you plug into the net.
Third of all, you should be using a hardware firewall anyway.
People should learn how to patch windows systems (Score:4, Insightful)
Firewall
Firewall
XP has a built in firewall, did you know this? When it it turned on, even an unpatched system is protected from attempts at remote intrusion. You are still vulnerable to IE exploits, but if you're using IE on an unpatched system you need to be smacked. Actually if you're using IE at all you deserve to be smacked, just not as hard.
So, the next time you do a clean install of XP and need to download patches, turn on the firewall BEFORE you connect it to the network. Then immediately begin installing patches from windows update. Each time you need to reboot during this process, yank the network cable until the system has finished booting. The reason is that an unpatched and partially-patched Windows system is vulnerable during boot-up. It seems that the windows firewall is one of the last things to be turned on during boot up instead of the first, which creates a window of opportunity for attacks to succeed.
Once the system has installed all of the patches that are available, LEAVE THE FIREWALL ON unless you have a very good reason not to and know what the fsck you are doing.
If you'll follow this simple proceedure, patching your windows system is safe and easy.
I'm sick and tired of reading slashdot headlines that claim there are all kinds of problems patching a windows system. Windows may suck, but that is no excuse for lying about it. Propaganda and FUD are best left to the professionals in Redmond.
Lee
Wnidows XP: Surviving the First Day (Score:3, Informative)
Good read and should be a mandatory inclusion with every Smith's Club, Wally-World, Shack de Radio, Dell, HP/Compaq, ET-ware, Gamer's Hack Shack or any other end user PC appliance sold.
http://www.sans.org/rr/papers/index.php?id=1298 [sans.org]
SANS server is amazingly slow today - here's an alternate:
http://www.cablemodemhelp.com/xpsurvivalguide.pdf [cablemodemhelp.com]
Maybe the real problem is... (Score:5, Funny)
Get a router, or ZoneAlarm (Score:5, Informative)
If you don't have a router, have the free version of ZoneAlarm handy, and a list of the services you can shut down on Windows (everything you don't need that uses ports or acts as a server.) Shut down these services and install ZoneAlarm before you plug the machine back into the internet. When you do connect to the web, no one will even know you're there.
Between my router, ZoneAlarm, Ad-Aware, and some good anti-virus software, I haven't been touched by anthing out there for 10 years, even when installing and patching.
Re:Get a router, or ZoneAlarm (Score:3, Insightful)
Violated when reinstalling XP SP1 (Score:3, Interesting)
Surviving first day checklist from PDF (Score:5, Informative)
To verify: Start -> Control Panel -> Internet and Network
Connections -> Network Connection -> select your network
connection
verify using the same dialog as 'Client for Microsoft
Networks'
same dialog as 'Client for Microsoft Networks'. Select
'Advanced' tab.
Connect Network
Start -> Control Panel -> Windows Update -> Scan for
Updates
PS: If I remember correctly turning on the firewall (Pre SP2) will prevent you from communicating with other computers on your LAN. But you definitely want to turn it on until you get patched or download/buy another firewall.
Internet Weather (Score:3, Funny)
Nice, I can see the evening news getting an extra report then.
"In North America we have some nasty worms raging across the Net spreading all the way to Europe, better close up those ports. Asian PC's may want to wear an extra layer of firewall as we got some heavy probes coming in. South-Afrika meanwhile has some lovely patchy weather."
What I'd like to see (Score:3, Interesting)
Now, either I'm just not logging enough (entirely possible), or I'm sat on a very, very quiet part of the net. I have to wonder how much one's country of residence influences this sort of thing, given that I'm in the UK and I'm guessing most people here are in the US.
Re:Dial up (Score:2)
And even on dialup, 98SE tends to become virus/spyware farm if a normal clueles (l)user uses it to browse the net. Old unpatched IE5, old unpatched outlook. GREAT COMBO
Re:I really don't know what all the fuss is about. (Score:3, Insightful)
Point still holds (Score:4, Insightful)
If you noticed, I didn't start with the Windows user completely re-installing the OS. Here's a typical after-install security sequence for Windows:
And two months later, you'll repeat the process yet again. It seems you forgot to apply the latest patches while on vacation, and some internet worm has taken over your machine....
Is this really any worse than installing Linux, once?