Microsoft's IIS is Twice as Likely to Host Malware? 163
eldavojohn writes "According to Google, Microsoft's server software is at least twice as likely to host viruses or malware. The reason why? 'Google reports that IIS is likely used to distribute malware more often than Apache because many IIS installs are on pirated Windows versions which aren't configured to automatically download patches. (Even pirated Windows versions can automatically receive security fixes, however.) Our analysis demonstrates how important it is to keep web servers patched to the latest patch level,' Google notes."
Help me out (Score:5, Insightful)
Re: (Score:1, Redundant)
Re: (Score:2, Insightful)
So in other words, it's the inattentive sysadmins that are at fault. Why do you blame Windows and IIS then?
Re: (Score:2)
Re: (Score:2)
Because inattentive sysadmins is not the common factor, windows isn't even the common factor; IIS is. There are plenty of apache installs on windows but those servers aren't being exploited. There are inattentive sysadmins using every system, if there are more in the windows webserver market (despite the fact that windows and IIS aren't dominant players in that market) then there is a flaw in these systems that attracts them. That flaw might be a design methodology th
Re: (Score:2)
Re: (Score:2, Funny)
Recently one of them was trying to connect to the VPN at his job, which is part of a windows domain, and it wouldn't work because he hadn't authenticated against the schools wireless login yet and obviously wouldn't be able to connect to anything. The wireless auth system basically just grabs users
Re: (Score:2)
Since they go for less money, that's hardly surprising
Re: (Score:2)
Re: (Score:3, Insightful)
Yes, it's probably due to unpatched Windows. They use the term web server, which is ambiguous in that it can mean both the server software and the machine it runs on. In this case they most likely mean the machine. After all, isn't it common knowledge that it's important to keep all your software updated and patched, not least the OS?
Re: (Score:1, Troll)
Bravo.
Re: (Score:3, Informative)
Re: (Score:2)
My irritation with the article and how it is presented in the summary here is that it seems to show that apache is somehow more secure
Re: (Score:3, Funny)
Wait...
What was I saying again?
Free as in beer? (Score:1)
Re: (Score:2, Informative)
Re: (Score:2, Insightful)
Share and share alike. Otherwise one bad apple spoils the freedom for everyone.
Re: (Score:2)
Re: (Score:2)
from your previous:
You might want to ask for a dictionary for your birthday. These two statements are mutually exclusive.
Re: (Score:2, Insightful)
Re: (Score:2)
Actually, it was a good one.
Well... At least if was not incorrect. And... It was amusing.
What else can you ask for?
Re: (Score:2)
Despite the fact that a discussion of the GPL licence in relation to a story about IIS being more likely to host malware is pretty offtopic anyway.
Re: (Score:2)
Actually, he can still use BSD code. Microsoft did (and still does, AFAIK)
Re: (Score:2)
Oh, sorry. I was supposed to give the standard Slashdot response, wasn't I? Ok...
*WHOOOOSH!*
Re: (Score:1, Informative)
yes [eeye.com]
Re: (Score:3, Insightful)
Re: (Score:2, Informative)
Since, definition 1: "from then till now (often prec. by ever): He was elected in 1978 and has been president ever since." Dictionary.com FTW! [reference.com]
Perhaps you should learn to speak English before you criticize mine. I answered the question asked.
The word you people want is "after", not "since". As my friend Tom says, correct me if I'm wrong, but be damned sure I'm wrong.
Thank you, please drive through.
Re: (Score:2)
No, actually, you are inserting words that aren't there. Normally, if you were going to use the word to convey the meaning you intend, it would be written as "since after" this-and-such. I am simply failing to insert words you think should be there.
At best you could say that the meaning was up to interpretation, since it certainly was not made cle
Re: (Score:2)
Does it hurt to be so anal rententive? Do you get clogged up, or does the shit you spew here on /. help keep it flowing?
Re: (Score:2)
Re: (Score:2, Informative)
Re: (Score:2)
You're fast with the graphic homosexual imagery. Copy and pasted from the article:
I repeat, learn to read.
Re: (Score:2)
Re: (Score:2)
Re: (Score:3, Informative)
At least one in version 6:
http://secunia.com/advisories/21006/ [secunia.com]
Which is actually fairly impressive, but then again you'd really only need one remote vulnerability if you are trying to compromise completely unpatched systems.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
What about the WebDAV issue that was used to break into DoD systems just before the Iraq war?
Re: (Score:2)
Re: (Score:2)
If they wanted the apps to remain separate and sandboxed, they should have done so to begin with. Slap on the hand and one in the face to Microsoft for not doing so.
Re: (Score:2)
Who knows? All I know is how many of the remotely exploitable holes Microsoft has managed to patch since version 5. As far as I can tell they haven't managed to patch any and based upon the real world results it looks like IIS is being remotely exploited left and right.
Re: (Score:2)
This means that
Re: (Score:2)
This is like blaming Apache for problems in Java Server Pages.
Re: (Score:2)
Did you even read the summary?
It says the malware is because of pirated versions of windows that don't get updated with security fixes.
Without reading the article you can use logic to assume the following 2 reasons:
1. You can't run IIS on anything but Windows OS
2. Windows OS isn't free so the users resort to piracy
Now in that respect, you could in theory have a pirated Windows Advanced Server 2003 running Apache if you
Security through obscurity (Score:2)
Re: (Score:2)
No kidding /sarc (Score:4, Insightful)
Linus once said of Gnome that when you design assuming you're users are idiots in the end thats all the users your going to have. Find an experienced competent admin who has cut his teeth in the real world and not in a MCSE bootcamp and you should be ok.
Re:No kidding /sarc (Score:5, Interesting)
Your quote at the end really rings true. I have yet to meet an IIS admin whom understands the HTTP standards at all, let alone something as complex as debugging chunked encoding issues. If you can't telnet to port 80 and get usable output, you have no business being a web server administrator. However, the windows culture encourages quite the opposite. If you can't solve a problem with a wizard, does the problem actually exist?
So you blame the user again. (Score:3, Insightful)
It's amazing how M$ security problems are always the user's fault when you ask a M$ person. Case in point, you blame the problem on ignorant, lazy and stupid users:
I'm
Re: (Score:2)
Firstly I am not an MS person I am a Unix admin but in a previous job I did both (and hated every minute I had to support windows). Secondly I am not blaming users I am blaming *ADMINS* how need to be held to a much higher standard.
I'm going to leave alone how you just called most M$ customers idiots. Why would consider someone lazy because t
Re: (Score:2)
Maybe that's because he didn't. Oh, wait. I see what you did there. That's very clever!!
Re: (Score:2)
So let me see if I get this right. If I have a "Windoze" server I fail to patch and it gets p0wn'd then "M$" is to blame, correct?
Well, considering that Microsoft has been denying many users the right to patch, yes.
But if I'm running Linux and I have an OpenSSH exploit that I fail to patch, then... who is at fault? Me? Yours? The easter bunny?
Well, your distribution should make it easy to update, and most fasttrack security updates, so either you or your distributor.
Re: (Score:2)
The "study" simply theorizes that pirated versions of Windows are to blame but offers no proof of that whatsoever. In any event, you can still patch pirated versions of Windows XP, AFAIK. Though I fail to see why Microsoft should be forced to provide updates to people who pirate their software.
A
Re: (Score:2)
The "study" simply theorizes that pirated versions of Windows are to blame but offers no proof of that whatsoever. In any event, you can still patch pirated versions of Windows XP, AFAIK. Though I fail to see why Microsoft should be forced to provide updates to people who pirate their software.
Well, because spreading viruses is a security risk to nonpirated versions of Windows too? Also: Windows Genuine Advantage makes it much harder to get updates if you're pirated.
As opposed to Windows Update, for example?
It takes the average FOSS program less than a day--at the very longest, a week--to patch its critical programs, because of the many eyes thing. Microsoft takes up to a month, because of things like Patch Tuesday.
Re: (Score:2)
This is true my point was the proclivity of people to think click and forget is, in and of itself, not negligent by folks in the MS sphere.
Pirates (Score:1)
Well, the ones who either patched or didn't download the WGA fix, anyway.
Uh oh.. (Score:1)
Re: (Score:2)
Personally I thought it'd be much worse than just "twice" as bad. Maybe I've been buried under too much anti-MS FUD from reading Slashdot...
Big Surprise (Score:5, Interesting)
It could be that IIS is more likely to become infected than Apache and then be used to distribute malware, or it could be that malware purveyors are more likely to host their malware on IIS. Or it could be a combination of both.
They also fail to mention what versions of IIS we're talking about, as that makes a huge difference. IIS 5.x had more holes than a cubic mile of swiss cheese. IIS 6, on the other hand, appears to be rock solid [secunia.com] and actually has fewer vulnerabilities than Apache.
Second, the fact that Google is a direct competitor to Microsoft is an obvious reason to find their conclusions dubious, at best. They have plenty of reasons to bash Microsoft at every possible opportunity.
Re: (Score:2)
Re: (Score:2)
Re: (Score:3, Insightful)
I don't question their results, although I'd suspect there are also a high number of Cpanel hosts slammed full of malware, too.
Re: (Score:2)
Re: (Score:2)
It'll be interesting to look at IIS vs. Apache vs. Other servers once they reach the same general level of maturity/usage.
Re: (Score:2)
A more fair comparison would be to compare two versions that were released at around the same time and have about the same overall usage.
I'm not sure there is quite a perfect match in this respect between IIS and Apache.
That said, it's hard to deny that Microsoft has completely turned around on security, at least with respects to some of their newer products. IIS 6, ISA Server, and Vista have all (at least so far) shown to be far more resilient to attacks than anything Microsoft has done before.
Oh no. (Score:2)
Genuine question (Score:3, Insightful)
Re: (Score:3, Interesting)
Re: (Score:2)
Unlike much of Windows, Linux systems are extremely modular. Apache has literally dozens if not hundreds of modules which can be enabled or disabled more or less at the will of the sysadmin.
A security hole in a specific module which is part of the core Apache distribution will be described as a hole in Apache - but that's a bit disengenous because it only affects systems which have that module loaded. If it's distributed in a separate package to the main program by the Linux di
Re: (Score:2)
That said, I like the way Debian-derived distros install their apache servers and find them very easy and even pleasant to configure.
And, as a bonus, they seem to be quite secure by default, requiring, at most, some very simple tweaks.
An
FUD (Score:1)
What are the motivations behind Google even doing this survey/report? Some will say because Google does no wrong and that they are doing it for the betterment of the web, but I smell a few ulterior motives. Hell, even the author of the article smells that same stench when he says, and I quote:
While I can't quibble with the data per se, I find it interesting that Google used this survey to promote Apache over an Internet product made by its chief competitor.
IIS is good stuff. (Score:2)
Comment removed (Score:5, Insightful)
Slashdot sucks? (Score:2, Insightful)
Notice I placed a question mark after each one of my phrases so I cannot be held responsible for them. You know, just asking questions, like Fox News and their "Hillary Clinton turns tricks?" headlines.
Speaking of that, there's a hilarious Jon Stewart skit on YouTube abo
Re: (Score:2)
I'm running a macro when I visit slashdot that replaces "?" with "(of course this is total bullshit and we know it)."
Original source link (Score:3, Informative)
http://googleonlinesecurity.blogspot.com/2007/06/
Missing marketing move - (Score:1)
Envision this pop up with appropriatly named guilty parties.
---
Alert: WebServer: MosaicC64 running on AmigaOS_1.5.6 is attempting to infect your computer !!
Anti-Viris-Firewall: Bad Application (XXPdeleteAllYourStuff) found in web stream from site
all.bad.stuff.com: Bl
Probably XP Pro (Score:3, Insightful)
Once someone has control, they can pretty easily start the service and stick malicious files in the default root in IIS.
You don't need a remote hole to get numbers like this.
49/49 (Score:4, Informative)
Pie Graph [blogger.com]
Re:49/49 (Score:5, Insightful)
Re: (Score:2)
Ummm, no. Basic conditional probability, people. (Score:2)
Yay, someone who actually read the article and noticed that yet another Slashdot story is deliberately misleading. No big surprise there. If anyone cares to look of the 70,000 domains distributing malware 49% were IIS and 49% were Apache. The "twice as likely" is pure spin based on overall market share and presumably designed to hide the fact that Apache is being used to push out just as much malware as IIS.
It's not deliberately misleading unless you have a rather strange misunderstanding about statistics. Of course market share matters.
Basic Conditional probability [wikipedia.org]:
Probability of {Malware given that running IIS} = P{Malware and running IIS} / P{Running IIS}.
So the Slashdot summary was correct: P{Malware given that you're running IIS} is twice as big as P{Malware given that you're running Apache}.
Pirates believe in usability, not deactivation (Score:2)
However when said user is frustrated because of inability to use a specific feature of the pirated IIS software then they go looking for patches, service packs and
Who would of thought? (Score:2, Interesting)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Version of IIS? (Score:2, Interesting)
With the release of IIS 6, security was significantly improved & according to various stats out there, IIS 6 is actually stronger than Apache in a lot of areas. We are running IIS & have had several intrusion attempts but our systems have been pretty solid; Humble admission, we did get hacked once but it was our negligence more than anything else.
Having admin'ed both Apache and IIS servers, I
Re: (Score:2)
I would agree with you. Our only intrusion breach was a zero-day apache.
Admin or the machine, who is the weak link? (Score:2)
Pirated? (Score:2)
This is slashdot isn't it? (Score:2, Insightful)
Re: (Score:2)
Shouldn't be a surprise but for other reasons (Score:3, Interesting)
Maybe they'll come around like they did on Win2K. They said they stopped supporting updates and I noticed no nags on my laptop for a really long time...lately I've noticed M$ is pushing security updates to it again. This is a computer I almost pulled from the "on line" array when it got infected twice by MySpace and YouTube....but I got it cleaned up through a few programs and a couple hours...
Don't need to prove legit to get security updates (Score:2)
Re: (Score:2)
Why is this surprising (Score:2)
Libel and Slander.... (Score:2)
Re:It made be hard to get patches for pirated wind (Score:2)