![]() |
Freethought & Rationalism ArchiveThe archives are read only. |
![]() |
#21 |
Veteran Member
Join Date: Nov 2001
Location: South Africa
Posts: 2,194
|
![]()
Both Windows any any other operating system you can put on your system has it's source code in plain view, you just have to know how to read it in binary format. So having open source or not will not affect the security of the OS (but may make hacking easier). I don't think having open source decreases the reparing time any. Microsoft usually spends a few months before a patch is released, but during this time, they look at the flawed code, patch that, and look for new flaws that were created. But Microsoft is now taking on a new approach, one for secuirty in their new Longhorn version of Windows.
In the "Halloween" strategy memos that were floated on the Internet and later acknowledged as the real thing by Microsoft, a top MS manager stated that Linux is a major threat because, among other things, problems are identified and rectified very quickly. Read all about it here. It stands to reason. The open source community is way, way bigger than Microsoft's pool of developers and is likely to be that way for the forseeable future, simply because a commercial company can't employ an equivalent number of developers without breaking the bank. The speed of Window's development was in large part responsible for a lot of vulnerability. To stay ahead of the game and keep selling boxes, MS has consistently rushed stuff to the market, effectively getting their customers to beta-test products . But if they slow down their product development cycle, their business model becomes increasingly unsustainable, which is why they've become more creative with their licensing models and attempted to create chains of dependency with other chargeable products. Why would someone who is writing a virus want to attack a unpopular OS? They want to go for the popularity, and Windows is currently the popular target. Once Linux becomes more and more popular, they will be targeted and exploits will be found. There will probably never be a time when there is any secure OS, since the possibilities of flaws and the time required (for both open and closed source) to patch these flaws is too great. Fair enough. I think at least some worms/virii are ideologically motivated. i.e. They are specific attacks on MS credibility. |
![]() |
![]() |
#22 | |||
Veteran Member
Join Date: Jun 2000
Location: Montreal, Canada
Posts: 3,832
|
![]() Quote:
The state of open source security is similar to the UI design and documentation problems prevalent to free softwares: because most developers don't care about it, it is generally done as an afterthought. Success such as OpenBDS are the exception, not the norm. Quote:
On a design standpoint, Windows is ahead in security than Linux. Security on Unix has been an afterthought, not a original feature. Windows security problems mainly come from programming errors, not design problems. Linux is full of holes. The only reason we don't see many worms for it is because their still way more Windows machines deployed. Quote:
|
|||
![]() |
![]() |
#23 | ||||||
Veteran Member
Join Date: Feb 2001
Location: Hiding from Julian ;)
Posts: 5,368
|
![]() Quote:
Quote:
Quote:
Quote:
Quote:
Quote:
|
||||||
![]() |
![]() |
#24 | |||
Veteran Member
Join Date: Jun 2000
Location: Montreal, Canada
Posts: 3,832
|
![]() Quote:
Quote:
Try to read a bit about UNIX history. The original UNIX goal was to create a multi-user, OPEN OS. Not a "secure" one. I say it again, security was an afterthought in the UNIX world. I can dig the source of my claim if you want. I'm not saying that right now, I consider Windows to be more secure than Unix. I'm just saying that on a design standpoint, Microsoft made a lot of sound decisions. I know it's not politicaly correct to say it, but contrairy to popular beliefs, Microsoft programmers aren't specially dumb or bad. Finaly, the number one reason why Windows don't have a clean multi-user interface �_ la Unix is that Microsoft knows that their leading OS is mainly used by single person, rarely in a multi-users environments. This tendancy is changing (look at how XP handle multiple users), but from an user interface perspective I can understand Microsoft to keep it very simple. Quote:
Yes, I agree that today, for OSes, you probably can't get away of C and C++. But I don't know if this situation will be forever (I'm a strong believer that speed is generaly overated when considering different programming languages). Keep also in mind that some OSes also try to protect themselves against buffer overflow exploits through low-level means (I know that OpenBSD does it, as well as a future version of Windows). |
|||
![]() |
![]() |
#25 | ||||||||
Veteran Member
Join Date: Feb 2001
Location: Hiding from Julian ;)
Posts: 5,368
|
![]() Quote:
Quote:
Quote:
Quote:
Quote:
Quote:
Quote:
Quote:
![]() |
||||||||
![]() |
![]() |
#26 |
Veteran Member
Join Date: Nov 2001
Location: South Africa
Posts: 2,194
|
![]()
Originally posted by ZouPrime
I understand that the possibility is there. But the problem is that in the actual real world, this possibility is not exploited. There's no use in open sourcing code if nobody actually look at it. Zou, I have to disagree. Half my childhood friends are Internet security gurus, some of whom set up the country's largest ISP. They do modify holes when they find them and they share the fruits of their labour. MS clients have to wait around for MS to send them a patch. My own brother is a networking guru who ended up Technical Director: Western Europe for a medium sized UK company providing top-flight security systems. There are a LOT more of the kind of people I'm describing than MS engineers. My evidence is anecdotal but its anecdotes from the heart of the industry, from the people that eat, sleep and shit this stuff. I'm sorry, I must disagree with you outright. Try to read a bit about UNIX history. The original UNIX goal was to create a multi-user, OPEN OS. Not a "secure" one. I say it again, security was an afterthought in the UNIX world. I can dig the source of my claim if you want. The point is, UNIX was old when Windows was new and lots of stuff had been thought of already. When I first looked at Linux (XWindows shells were nowhere to be seen), the inherent security was self-evidently way, way way beyond the inherent security of the DOS platform Windows still relied on. I mean everything had security privileges by individual, group and public access. If you typed "ls" at the prompt you got a whole lot of gobbledygook next to each file specifying security privileges. "Dir" in dos gave you filename and date. DOS didn't come close. I'm no Linux guru (haven't looked at it for four years) but its evident that Windows was hopelessly insecure when Linux security was already relatively mature. I'm not saying that right now, I consider Windows to be more secure than Unix. I'm just saying that on a design standpoint, Microsoft made a lot of sound decisions. I know it's not politicaly correct to say it, but contrairy to popular beliefs, Microsoft programmers aren't specially dumb or bad. Fair enough. I don't think MS programmers are responsible for MS's business practice of rushing products out as fast as possible and basically beta-testing on customers. MS only really started paying attention to sound architecture, though, from NT onwards, after they'd secured a huge market share and a secure financial future by basically favouring marketing over quality until that point. |
![]() |
![]() |
#27 |
Veteran Member
Join Date: Jun 2000
Location: Montreal, Canada
Posts: 3,832
|
![]()
Ok, I read back some of the posts and my owns, and I'll put some water in my wine. I think I got stucked up on the "design" point when, like Corona688 said, implementation is generaly the security "weakest link" and not the design.
I would also say that the guy administring the actual box is also probably more important than the implementation, i.e. it's better to have an excellent Windows sysop over a moronic Linux admin. I checked around the office (I actually work for a computer security company, and we have a few people specialized in intrusion detection) and for what I could gather, they all seems to agree that open source have definitively its advantages on a security standpoint. I'm not a proponent of security throught obscurity crap. But on the other hand (and this refers back to the OP), they also all agree that Linux WILL suffer from more worm outbreaks if its market share grows significantly. As for if it will be worst of better than the current situation with Windows... personally, my feeling is that Linux will suffer a similar fate. I also asked about Linux worms, and it seems they exist, but most of them target specific distro (Redhat). |
![]() |
![]() |
#28 |
Veteran Member
Join Date: Nov 2001
Location: South Africa
Posts: 2,194
|
![]()
The thing is, the existence of different distributions goes back to the OP. The cheetahs population is extremely vulnerable to virii et al because their low genetic diversity ensures that a most of them will be affected equally severely by the same virus. Siamese cats, on the other hand aren't nearly as vulnerable
A lot of the holes I've heard of are fairly high level, like in the GUI. Now with Linux you have all of these GUI flavours. With Windows you have ... Windows. So Windows is a lot like the cheetah and Linux a bit more like siamese cats in terms of vulnerability. BTW Thanks for being gracious ![]() |
![]() |
![]() |
#29 | ||||
Veteran Member
Join Date: Feb 2001
Location: Hiding from Julian ;)
Posts: 5,368
|
![]() Quote:
![]() Quote:
Quote:
Quote:
![]() Linux can run on many different architectures(ARM, x86, amd64, sparc, etc, etc, etc), so tiny machine-code virii are out of the question... There are tons of different kernel versions, so any exploits depending on the kernel will likely fail on many machines. Not to mention that every individual kernel is 100% customizable; exploits that work for one compile of kernel 2.4.1 might not even EXIST for someone who leaves out that particular driver or compiles it as a module. |
||||
![]() |
![]() |
#30 | ||||
Senior Member
Join Date: Mar 2003
Location: Canada
Posts: 792
|
![]() Quote:
But I can't run applications off of a design document. The real Windows NT, like all of the Windows that came before and after, is a horrible mess of design compromises, unclear direction, and incredible complexity. A lot of stuff that should run in user space gets run in privileged space in order to improve the end user experience. A lot of processes that shouldn't be able to talk to each other do talk to each other, in the name of convenience. These may not have been part of the original idea behind NT, but they are part of the design and they are part of the operating system. ACLs and NTFS are only two parts of NT. And they are problematic because the security model is extremely complex; it is often very difficult to know what a particular user does and doesn't have access to, and it is way too easy to accidentally give way too many permissions when trying to get access to a particular file or service. The ACL/NTFS permission scheme is not suitable for most server applications and is definitiely not suitable for any kind of desktop environment or any other situation where the person operating the machine is not a trained administrator. By contrast, Unix security is transparent makes it easy to set appropriate permissions without accidentally giving away the keys to the kingdom, and its owner/group/everyone read/write/execute/setuid permission scheme manages to incoroporate a lot of flexibility despite its simplicity. For most applications, Unix group-level permissions are all that is needed. Anything more is needles complexity, and complexity breeds insecurity. That is not to say that NTFS and ACLs are useless in all situations, but they are overkill in most cases and therefore worse than useless. Moreover, the rest of the system works hard to defeat these basic security measures by introducing easy-to-abuse features that make them irrelevant. Unlike Unix, which is not married to a particular interface, few people would consider Windows to be Windows without the win32 API and GUI. It is not realistic to strip away the whole top half of the system and then claim that Windows is secure; the insecure top end is required for anything resembling normal Windows operation. Quote:
Quote:
Quote:
|
||||
![]() |
Thread Tools | Search this Thread |
|