Jay Beale On Overcoming Linux Security Holes 30
alpinista writes "Sorry, Redmond; according to Jay Beale, it's not yet time to throw away all those pesky insecure Linux boxes. Newsforge interviewed Jay and got some pretty straight talk from a guy that knows more that his share about OS security. In a nutshell: 'Beale's take on how you can make your system more secure, on the Linux vs. Windows security debate, and on the Digital Millennium Copyright Act's impact on security testing.'"
hmm (Score:1)
Nice catch phrase.
A few facts about Microsoft's OS may help. (Score:3, Interesting)
Some facts about Microsoft's OS may be helpful here in making a comparison:
English: Windows XP Shows the Direction Microsoft is Going. [hevanet.com].
Spanish: Windows XP muestra la dirección que Microsoft está tomando. [hevanet.com]
Re:A few facts about Microsoft's OS may help. (Score:5, Informative)
Suggesting that Windows XP is awful because it is easy to change a user's password if you have physical access is absurd. Has the dope who wrote this every head of "single-user mode" in Unix?
Similarly is the statement criticizing MS for not supporting ghosted system images without sysprep. If you do not use sysprep, the ghosted systems will have the same SID, which opens you up to all sorts of security vulnerabilites.
Microsoft is a shitty company, which plenty of legimate practices to criticize. If you need to use FUD when knocking Windows XP, you need to pursue a new line of work.
Re: UNIX single user mode (Score:2)
Not to mention with encrypted filesystems, you can drastically reduce the risk of physical access allowing a user to take over a system. If a malicious user has physical access to a system that hasn't been physically secured, you have bigger problems than software security...
In summary, though, it's easy enough to put a complex password on every step of accessing the system (bios, lilo/grub, encrypted filesystem, login), and with access control lists, even knowing the root password might not get you full access.
Re: UNIX single user mode (Score:3, Insightful)
Encrypted filesystems are too slow to be usable in practice.. Encrypting only
Read the article more carefully. (Score:3, Interesting)
You seem not to have read the article carefully.
This is an amazing phenomenon. Someone takes a quick look at a 12,000 word article, finds one thing wrong, and says the whole article is terrible.
The article does seem to need some improvement, but it is mostly correct. I removed the section you complain about above, so that it can be re-written.
The point of the section about local security is to tell executives that they are getting less security than they think.
The free SysInternals.com SID changer works great.
Re:Read the article more carefully. (Score:2)
Just one example: the section on the limited resources in Windows 95, 98 and ME. True, this is the reason for lots of the crashes I experienced when I still used 98, but it's not like it's hidden: 'OUT OF RESOURCES' or something to that effect in big ugly letters is hard to miss. And, by the way, it's not a plan to make it crash more often than it would have otherwise, it's just bad design.
And about the virtual memory system: though I doubt it, it might be as bad as the article says it is. But I'm not going to believe it is as bad as the article makes it out to be without supporting evidence. And for the record, the 2.4 kernel series are not known for their superb virtual memory implementation.
All in all, there might be truth in the article, but it's written in such an overblown way that I don't even want to read it all and check all the facts.
Thanks for your comments. (Score:2)
Thanks for your comments.
I'm trying to improve the article. The reason I need the article is that I don't feel I can go to a customer and say bad things about Microsoft without casting doubt in a non-technical person's mind about my own competence. The article documents problems in a way that, hopefully, can be convincing.
For example, when a non-technical person goes to a U.S. government web site and discovers that the Federal Trade Commission told Microsoft to stop lying about their Passport service, they can become convinced that there may be a problem with abuse by Microsoft. Most people don't know Microsoft is abusive; they are far behind us.
It is a fact that non-technical customers experience crashes in Windows 98 SE that are caused by using more resources than the OS supports. To them, the reason for the crashes is hidden. There is no error message unless the computer is running the resource checker. (I can't remember the name, it's 1:20 AM.)
Re:Thanks for your comments. (Score:3, Insightful)
You make a sweeping claim... (Score:2)
There is a tendency to read the technical issues and not read the accompanying text.
Are you saying the government is wrong when it says it told Microsoft not to lie about the Passport service?
You make a sweeping claim that I am guessing you don't actually believe.
Re:You make a sweeping claim... (Score:3, Informative)
For example, you state that Windows 98 does not connect to MS computers where as XP can connect to MS computers in 18 ways. This is false. The most of the components you have listed as connecting under Windows XP ALSO can connect under Windows 98. But let's assume that you're correct and that these components don't connect under Windows 98. So what? How many components in DOS 6.22 had a TCP stack? Technologies change, and now that the internet is available (which was in limited scope in 1995-1997 when Win98 was first being built), you would think that they would adopt these components into their architecture. Wouldn't you?
Hidden downloads, etc are just FUD. There's little example of MS doing hidden downloads of any sort. And linking to 4 year old sites about people switching from Windows is great... if you want the story of one person moving. Generally, they have little credibility.
I am not saying anything about the government's case. I AM saying your conclusions are nearly universally wrong, misinformed and flamebait. Your article has little or no worth.
Greater and greater dependence on Microsoft (Score:2)
Re:Greater and greater dependence on Microsoft (Score:2)
Re:Greater and greater dependence on Microsoft (Score:2)
I think you are missing the point. The supplier of an operating system is in a position of trust. Microsoft did not publish the changes and ask for public comment. Instead, Microsoft invented a new protocol and designed numerous ways of connecting that are not documented. How do we know if there are vulnerabilities?
Microsoft has shown itself not to be a team player.
Re:A few facts about Microsoft's OS may help. (Score:2, Insightful)
single user mode require's root password...
Truth is... if *hacker* has access to physical box, you have no security. Nuff said.
The whole password protect grub etc might be useful to keep the uninitiated out of your box, but in so far as locking down your system, that's just silly.
With respect to Windows XP, 2000 et.al., When I look at companies developing server products and compare the companies with like products selling for the NT platform vs. the companies developing for Solaris/HPUX etc, it's very clear to me the distinction between the two. Sure, this is a generalization, but I've yet to see a scaleable multi-thousand user Exchange Server in production. Seems to me the NT crowd still doesn't get it, therefore it's a foregone conclusion that security is both misunderstood and not a significant concern.
Sam
Re:A few facts about Microsoft's OS may help. (Score:1)
single user mode require's root password...
Uhm...no it doesn't. You can boot in single user mode, mount the drive then "passwd root".
Re:A few facts about Microsoft's OS may help. (Score:2)
Not that the ROM checks the signature on the drive, so you can still get in if you can get to the drive, but having access to the console isn't necessarily access to the computer/drives.
Re:A few facts about Microsoft's OS may help. (Score:2)
I"ve also done the same with NeXt's and older SGIs (haven't used IRIX for a while, so I can't vouch for current systems). I'm betting that I could do it on a Mac, too, if I really had to.
Bastille Linux (Score:5, Informative)
you can get it here [bastille-linux.org]
Correctness (Score:4, Insightful)
Correctness will make security holes be very few and far in between.
Also the more eyes the better because someone can spot one problem somewhere that another would not spot.
I think for the linux kernel 2.8, correctness should be a priority. Also for glibc 2.4, and all other project's next version which should include Mozilla.
another expert on OS security (Score:4, Informative)
Favourite quote: "Windows is awful, but well, so is Linux."
b.
OpenBSD (Score:1)
Give me ONE REASON....
Re:OpenBSD (Score:1)
I haven't tried it yet, been working my way through various flavors of this or that until I decide on a favorite. But I like the philosophy of turned off until you turn it on, that open bsd espouses.
Hmmm - talk to the distro's (Score:1)
However, after reading that article, and following a link or two, I realise a number of the articles I selected to be installed are a) of absolutely no use to me, b) are wasting disk space and c) open holes in my security.
Mind you until I run the winmodem rpm from http://www.heby.de/ltmodem
I won't have any linux internet security problem.
If the distro's (at least Mandrake in this case) took a little more care and asked a few pointed questions with yes no answers - eg
Will your isp or other host be providing a mail account or do you want this machine acting as a mail server? If you do not understand cancel the install or select web based mail.
Then no mail server would loaded unless you really needed it. And no sendmail holes. Same for Apache and a good whack of what ever else I clicked on because it looked like it might be fun to play with one day.
Perhaps a better question would be - I was in the idiots setup script - Do you plan to use this machine to just surf the net or host a web service?
Dumping sendmail, apache and whatever else would also make the install go faster and stop my girlfriend being so toey about me being on the computer "all night".