Ironworks Gaming Forum

Ironworks Gaming Forum (http://www.ironworksforum.com/forum/index.php)
-   General Conversation Archives (11/2000 - 01/2005) (http://www.ironworksforum.com/forum/forumdisplay.php?f=28)
-   -   Interesting Article on XP SP2 (http://www.ironworksforum.com/forum/showthread.php?t=92706)

LennonCook 01-08-2005 11:15 PM

WinXP SP2 = security placebo?

<span style="color: lightblue">I hope for MS's sake that this isn't what their security model for Longhorn will be like... smoke and mirrors just won't cut it.

[ 01-08-2005, 11:20 PM: Message edited by: LennonCook ]

Seraph 01-08-2005 11:36 PM

Short of disconnecting your computer from the internet, all computer security is smoke and mirrors, it's just a matter of how many mirrors there are, and how dense the somke is.

LennonCook 01-08-2005 11:50 PM

<span style="color: lightblue">Not realy. It isn't possible to elminate the viruses and the spyware, but it's definately possible to reduce the effect it can have. Just look at Linux: most security vulernabilities in it require someone to be physically sitting at your computer, and be logged in. It's not perfect by any means (and in this day and age, it can't realy be), but it's certainly better than Windows.

Ziroc 01-09-2005 12:02 AM

Yawn.. Lennon......... (clears throat) [img]smile.gif[/img]

Blunderbuss 01-09-2005 07:22 AM

I like you Lennon. It's good to see not everyone will give up the fight against Micrsoft so easily. :D [img]tongue.gif[/img]

Some news on Longhorn, though. It has been delayed for longer, there is now talk of a second XP. Not service pack 2, just a second version of the whole system. This could mean it would include features from Longhorn. Perhaps, threatening the existence of Longhorn altogether. Clearly, Microsoft have realised the many flaws in SP2 and are trying to make up for this by coming up with this idea.

Azeral 01-09-2005 07:24 AM

Can we have a sub forum just for lennon to put Windows faults in... ( so then i can avoid it totaly [img]smile.gif[/img] )

Variol (Farseer) Elmwood 01-09-2005 08:30 AM

I don't know jack about programming, but the way I look at, there's no reason for the types of errors I still get with XP Pro, loading issues etc. We are way too advanced to have these problems.

I can't download my pics from my HP camera on my new PC. I have plug it into my old one, which is 4.5-5 years old, which has the same OS. I don't know how to fix it, but it should know by itself.

I still think it's excellent though.

Seraph 01-09-2005 04:54 PM

Quote:

Originally posted by LennonCook:
<span style="color: lightblue">Not realy. It isn't possible to elminate the viruses and the spyware, but it's definately possible to reduce the effect it can have. Just look at Linux: most security vulernabilities in it require someone to be physically sitting at your computer, and be logged in.
The slapper worm back in 2002 showed just how solid linux systems are.

From the standpoint of remote buffer-overruns, all operating systems are
vulnerable to sloppy programming. From the standpoint of social engineering
e-mail worms, all systems are vulnerable to stupid users.

If you can explain why any software that is going to bind to a port 1-1024 needs to be started as root then I might start to belive in some of the mythical security that Linux has. Other then crapy design there is no good reason why something like Apache needs to be started as root, and it provides a nice window of vulnerability that defeats the whole privliges system that Linux security is usually based on.

LennonCook 01-09-2005 05:18 PM

Quote:

Originally posted by Seraph:
</font><blockquote>quote:</font><hr />Originally posted by LennonCook:
<span style="color: lightblue">Not realy. It isn't possible to elminate the viruses and the spyware, but it's definately possible to reduce the effect it can have. Just look at Linux: most security vulernabilities in it require someone to be physically sitting at your computer, and be logged in.

The slapper worm back in 2002 showed just how solid linux systems are.</font>[/QUOTE]<span style="color: lightblue">One worm. Three years ago. Nothing prior, nothing since. Compare to... how many for Windows?

Quote:

From the standpoint of remote buffer-overruns, all operating systems are
vulnerable to sloppy programming.
<span style="color: lightblue">Remote buffer overruns are more than sloppy coding. They need bad design for them to be able to be executed remotely, relying only on a computer to be logged in.

Quote:

From the standpoint of social engineering
e-mail worms, all systems are vulnerable to stupid users.
<span style="color: lightblue">OK, now, why are there stupid users? Mainly because when something goes wrong, Windows says "Something went bang! Go tell Microsoft".
Linux gives you some idea of what went wrong, and possible ways to fix it yourself. Linux teaches you to be able to fix simple problems, Windows encourages stupid users.

Quote:

If you can explain why any software that is going to bind to a port 1-1024 needs to be started as root then I might start to belive in some of the mythical security that Linux has.
<span style="color: lightblue">If that were true, you would need to start a web browser as root since they bind to port 80. FTP clients, mail clients, GAIM and its kin. They all connect to ports, inbound and outbound, and yet they can be started by anyone who can access the executable. I run aMSN, Thunderbird, Firefox, xChat, ncFTP, and GAIM regularly as me. Check your facts.

Quote:

Other then crapy design there is no good reason why something like Apache needs to be started as root,
<span style="color: lightblue">How about, it is designed specifically to allow other people to connect directly to your computer? That makes it an admin level function. And this is Windows mistake - it not only allows anyone to start something like Apache, it has other servers running by default which most people should not need to care or know about. And yet, if they don't disable them, it can cause major problems. Ever wondered why things like trojan droppers can exist?

Quote:

and it provides a nice window of vulnerability that defeats the whole privliges system that Linux security is usually based on.
<span style="color: lightblue">If anyone could start Apache, that obvious little problem (Apache by it's very nature allows other people to connect to you without necesarily having your permission) could be opened by anyone. As it stands, it can only be started by root, and - except for home users - the only people with the root password are expected to know this stuff anyway. It is encouraging you to understand what you are doing, and to realise that it isn't necesarily safe.
Having things being only startable by root doesn't undermine the priveledge system. It enforces it. To allow anyone to start anything on the other hand would make root almost redundant, and this would undermine the priviledges, as much as people can at the moment by encouraging people to be root all the time. This is the primary mistake Windows makes, and if it fixed this, it would improve alot of things.

LennonCook 01-09-2005 05:22 PM

Quote:

Originally posted by Variol (Farseer) Elmwood:
I don't know jack about programming, but the way I look at, there's no reason for the types of errors I still get with XP Pro, loading issues etc. We are way too advanced to have these problems.
<span style="color: lightblue">Exactly. Windows is insecure because of bad decisions MS has made. It can, and should, be better than this.

dplax 01-09-2005 05:25 PM

Quote:

Originally posted by LennonCook:
One worm. Three years ago. Nothing prior, nothing since. Compare to... how many for Windows?
I'm sure if Linux were the most used OS and Windows was only second there would be much more Linux exploits than Windows ones.

Sigmar 01-09-2005 05:31 PM

ROFLMAO

Lennon, your threads crack me up! [img]graemlins/biggrin.gif[/img]

I'm sure I'd appriciate them a lot more if I knew what the hell was going on inside them. :D Your crusade against Microsoft is always good reading.

But Longhorn, sp2, wha?

Forgive my ignorance, and let this humble yokel laugh at all them funny words.

LennonCook 01-09-2005 05:35 PM

<span style="color: lightblue">Dplax: Not so. The Slapper worm was to do with Apache more than Linux (although it only affected Apache on Linux, not Apache on Win32 AFAIK). It is the only major worm Apache has had in it's lifetime, compare to MS IIS which has had many.
Now, which is more popular? On major commerical servers, Apache has around 70% and rising. In other words, Apache is far more popular than IIS, and yet it has had far fewer exploits.

Security comes with secure programs, not with smaller user bases.

[ 01-09-2005, 05:38 PM: Message edited by: LennonCook ]

andrewas 01-09-2005 05:40 PM

Quote:

Originally posted by LennonCook:


</font><blockquote>quote:</font><hr />If you can explain why any software that is going to bind to a port 1-1024 needs to be started as root then I might start to belive in some of the mythical security that Linux has.

<span style="color: lightblue">If that were true, you would need to start a web browser as root since they bind to port 80. FTP clients, mail clients, GAIM and its kin. They all connect to ports, inbound and outbound, and yet they can be started by anyone who can access the executable. I run aMSN, Thunderbird, Firefox, xChat, ncFTP, and GAIM regularly as me. Check your facts.
</font>[/QUOTE]Actualy, Seraph is right about this. You need root priviledges to bind to a port &lt1024. Run a ps -A with apache running and you should see the parent process is running as root, with a bunch of non-root children (assuming you actualy had some traffic other than your own testing, which you dont). Which neatly explains why this isn't a problem with apache - the processes doing all the work don't have root priviledge. Other programs get round this by dropping root priviledge after binding to the port.

I would have reservations about running anything that kept root priviledges on a process which was listening to a port, since an author that didnt think to work around that probably didn't secure the rest of it properly. But, this is it. Its up to the author to write a secure program, and the admin to choose a secure program. Linux dosent generaly make mistakes for you, and it won't do things like exposing file and print sharing to the internet by default. Or running a messenger service on every machine by default regardless of whether its needed. Or basing a large portion of its local infrastructure on a protocol intended for remote execution of code.

Bozos of Bones 01-09-2005 05:41 PM

Longhorn -The next sequel in the best-selling point-and-click adventure, the Windows franchise.
SP2 - an expansion pack for Windows XP. New missions, new levels, new enemies!
Debian - a Linux distribution(version)
Root - the very top of the hierarchy
Buffer overrun - a way to fool a security system into a continual loop. Like you mention the number thirteen to someone who can count up to ten.
Any more? [img]tongue.gif[/img]

LennonCook 01-09-2005 05:43 PM

Quote:

Originally posted by Sigmar:
But Longhorn, sp2, wha?
<span style="color: lightblue">SP2 = Windows XP Service Pack 2. A download of... somewhere around 700 MB I think, which MS say makes Windows more secure. The article I posted analyses just how it does this, and how well it works. And it turns out that that almost GIG of downloading is little more than fake smoke and mirrors that hardly reflect.

Longhorn = the next generation of Windows. It was originally going to debut this year (maybe last?), but MS have delayed it. Last I checked, it was going to be atleat 2007 before we even see a glimpse of BETAs. It has alot of security updates (supposedly), and some stuff about digital rights management. That is, preventing you from using CDs or play MPEGs unless you pay the author money and they pay MS money.

Bozos of Bones 01-09-2005 05:48 PM

You think wrong. It's 120 MB, 200 if you want the LAN professional edition for installation to other machines. And it actually does do something usefull, if you set it right.

LennonCook 01-09-2005 05:57 PM

Quote:

Originally posted by Bozos of Bones:
You think wrong. It's 120 MB, 200 if you want the LAN professional edition for installation to other machines.
<span style="color: lightblue">Ok, I was a little off... but 200 MB is still quite big for something that doesn't do a good job out of the box without fiddling. Moreso if you consider that alot of the world is still on dialup, and that would take close to a day to get...

dplax 01-09-2005 05:57 PM

Quote:

Originally posted by LennonCook:
<span style="color: lightblue">Dplax: Not so. The Slapper worm was to do with Apache more than Linux (although it only affected Apache on Linux, not Apache on Win32 AFAIK). It is the only major worm Apache has had in it's lifetime, compare to MS IIS which has had many
My point is that too few people use Linux for it to be a good hacker target. If more people were using it then more info could be stolen and it would be more worthwile for hackers to target Linux.

dplax 01-09-2005 05:59 PM

Quote:

Originally posted by LennonCook:
</font><blockquote>quote:</font><hr />Originally posted by Bozos of Bones:
You think wrong. It's 120 MB, 200 if you want the LAN professional edition for installation to other machines.

<span style="color: lightblue">Ok, I was a little off... but 200 MB is still quite big for something that doesn't do a good job out of the box without fiddling. Moreso if you consider that alot of the world is still on dialup, and that would take close to a day to get... </font>[/QUOTE]Windows Update downloads work in a way that they download slowly over time in the background and once downloaded install. That means that if you log on an hour each day only SP2 shall download only those times and can resume itself. You can do other work while doing all this. Then when it has finished downloading you can install.

Bozos of Bones 01-09-2005 06:00 PM

Few people... you wanna hear a funny story? There's this group of hackers, and they wanted to hack into Microsoft Complement Database in Redmond. So they got through level one, level two(there are, as the legend goes, 7 levels) and so on, untill level six. And what do they encounter there? A RedHat distro of Linux! So go figure [img]tongue.gif[/img]

LennonCook 01-09-2005 06:03 PM

Quote:

Originally posted by dplax:
My point is that too few people use Linux for it to be a good hacker target. If more people were using it then more info could be stolen and it would be more worthwile for hackers to target Linux.
<span style="color: lightblue">And my point holds. Why has MS IIS had more vulnerbilities in it's lifetime than the more popular Apache? If your logic was right, then wouldn't it be more worthwhile for hackers to target Apache? And yet, they don't seem to. Or atleast, they don't seem to be succesful. Whichever way you cut it, this can't be the only reason if it is a reason at all.

dplax 01-09-2005 06:08 PM

I wasn't talking about Apache, I was talking about Linux in general.

LennonCook 01-09-2005 06:08 PM

Quote:

Originally posted by dplax:
Windows Update downloads work in a way that they download slowly over time in the background and once downloaded install. That means that if you log on an hour each day only SP2 shall download only those times and can resume itself. You can do other work while doing all this. Then when it has finished downloading you can install.
<span style="color: lightblue">Segemented downloads != smaller downloads.

LennonCook 01-09-2005 06:12 PM

Quote:

Originally posted by dplax:
I wasn't talking about Apache, I was talking about Linux in general.
<span style="color: lightblue">I debate your logic, not your example. If Linux were only secure at the moment because it is less popular, we would have seen this phenominon before. Yet what we see, is just the opposite.

dplax 01-09-2005 06:22 PM

I don't know too much about Linux, what I am saying is that it is targeted less by hackers (meaning succesfull and unsuccesful attempts both) than Windows because less people use it.

andrewas 01-09-2005 06:36 PM

We understood that the first time. It just isn't true.

http://www.theregister.co.uk/securit...s_linux/#myth1

Thoran 01-09-2005 06:44 PM

We understood that the first time... we're just crusaders on a cause.

http://www.techweb.com/wire/security/56200327
http://www.informationweek.com/story...cleID=18700097

ON TO THE NEXT WINDMILL!

lol.

[ 01-09-2005, 06:52 PM: Message edited by: Thoran ]

dplax 01-09-2005 06:45 PM

My bad then, but let it be said in my defence that I am not very experienced with Linux and heard that argument used many times.

Thoran 01-09-2005 06:57 PM

Read the articles dplax. ;)

I tend to think that internet articles are like a$$holes, everyone can find one that says what they want it to, especially when you're... A CRUSADER!! bump badda bump bump bumm...

[ 01-09-2005, 07:00 PM: Message edited by: Thoran ]

dplax 01-09-2005 07:00 PM

I posted what I posted upon only having seen andrewas' link. I've now read your links too. I wasn't going to leave windows anyway. I've managed to securise it as much as possible for myself and as far as I can see nothing I don't want is getting past my protections.

LennonCook 01-09-2005 07:10 PM

Quote:

Originally posted by Thoran:
I tend to think that internet articles are like a$$holes, everyone can find one that says what they want it to, especially when you're... A CRUSADER!! bump badda bump bump bumm...
<span style="color: lightblue">Find me an article, not funded by M$, that says Windows is better without question.

Bozos of Bones 01-09-2005 07:18 PM

Find me an article, not funded by open source... wait... there's no funding in open-source... hmm... Something wrong here, they don't have any legal links, as they're not a company... Meaning all articles about Linux vs Windows that are free are subject to be under the influence of open-source, therefor biased to Linux... Unless they're an indepentend magazine, or a site like tom's Hardware, but for software... Hmm... I've just been to one, mind you it's Croatian, and it has some nice things about Linux, but also about Windows as well. And if I put my heart to it, I think I'm bound to find a few on english as well... but Frankly honey.. I don't give a damn.
This is one of the oldest debates known to man! It will never end, it will never find a conclusion. Why? Microsoft is too powerfull to kill, and open-source is too distributed to be fogotten. And if there is somehow going to be an end, it's not going to be on a forum that's main focus is roleplaying games. Guys, I really do respect the crusades and all, and I do believe that Microsoft has some issues it has to take care of, but this is like "My dad is better than your dad!"

Thoran 01-09-2005 07:38 PM

And for the Mac gang... here's a pro-MAC article that smacks around both Linux AND Windows.

http://www.mi2g.com/cgi/mi2g/framese...ess/051104.php

Pretty interesting article actually.

Lemmon I find/you find/he finds/she finds... ANYONE can find an article saying just about anything they want on the internet.

As I've said all along, I'm glad Linux (and the Mac too for that matter) is out there providing a viable alternative to Windows (A company I'm not overly fond of... very predatory). Just flagging the crusaders who have an agenda to point out every flaw in windows while ignoring the warts in their OS of love.

My standard disclaimer - Don't trust the prophets, do the research and come to your own conclusions.

For me (a person who doesn't have to pay out of pocket for my OS decisions) Windows is my general use OS, Linux is a toy, and hopefully soon I'll have a Mac to play with.

If I was personally paying for my software I'd be using Linux, although on the one system I'd really LIKE to use linux on I can't for lack of drivers (Dual Opteron workstation, of course there are 64 bit Windows drivers missing too) and I'd have to pay for the OS (SuSe 64-bit Enterprise... could not find any free distributions).

Seraph 01-09-2005 08:06 PM

Quote:

Originally posted by LennonCook:
</font><blockquote>quote:</font><hr />Originally posted by Seraph:
</font><blockquote>quote:</font><hr />Originally posted by LennonCook:
<span style="color: lightblue">Not realy. It isn't possible to elminate the viruses and the spyware, but it's definately possible to reduce the effect it can have. Just look at Linux: most security vulernabilities in it require someone to be physically sitting at your computer, and be logged in.

The slapper worm back in 2002 showed just how solid linux systems are.</font>[/QUOTE]<span style="color: lightblue">One worm. Three years ago. Nothing prior, nothing since. Compare to... how many for Windows?
</font>[/QUOTE]All I know are the virus and worms that I've been infected with.
Windows: 0
Linux: 1
I've been running windows as a home OS for 8 years, I ran Apache on Linux for 6 months and was compromised.

Quote:

</font><blockquote>quote:</font><hr />From the standpoint of remote buffer-overruns, all operating systems are
vulnerable to sloppy programming.
<span style="color: lightblue">Remote buffer overruns are more than sloppy coding. They need bad design for them to be able to be executed remotely, relying only on a computer to be logged in.

Quote:

From the standpoint of social engineering
e-mail worms, all systems are vulnerable to stupid users.
<span style="color: lightblue">OK, now, why are there stupid users? Mainly because when something goes wrong, Windows says "Something went bang! Go tell Microsoft".
Linux gives you some idea of what went wrong, and possible ways to fix it yourself. Linux teaches you to be able to fix simple problems, Windows encourages stupid users.

Quote:

If you can explain why any software that is going to bind to a port 1-1024 needs to be started as root then I might start to belive in some of the mythical security that Linux has.
<span style="color: lightblue">If that were true, you would need to start a web browser as root since they bind to port 80. FTP clients, mail clients, GAIM and its kin. They all connect to ports, inbound and outbound, and yet they can be started by anyone who can access the executable. I run aMSN, Thunderbird, Firefox, xChat, ncFTP, and GAIM regularly as me. Check your facts.</font>[/QUOTE]I don't know how you're system is setup, but if it is anything like 99.99% of the systems out there it will use a process that goes something like this:
Start some program with root privliges, the program binds the port(s), listens, and then calls setuid() and setgid() and friends to drop root privliges. At this point it should still be able to call accept() on the ports, but it will not still have root privliges. However everytime you start aMSN, Thunderbird, Firefox, xChat, et al. you are opening a hole that could in theory allow someone who has compromised that porgram to do all sorts of nasty things. I suspect that you're undergoing the same thing that you accuse windows users of doing, ignoring things because they are happening outside of plain sight.

Like I origionally said, security is all smoke and mirrors. The holes in Linux security are harder to get to, and difficult to exploite, but there are still holes, and I feel it is only a matter of time before someone comes up with a way to get at them.

Quote:

</font><blockquote>quote:</font><hr />Other then crapy design there is no good reason why something like Apache needs to be started as root,
<span style="color: lightblue">How about, it is designed specifically to allow other people to connect directly to your computer? That makes it an admin level function. And this is Windows mistake - it not only allows anyone to start something like Apache, it has other servers running by default which most people should not need to care or know about. And yet, if they don't disable them, it can cause major problems. Ever wondered why things like trojan droppers can exist?</font>[/QUOTE]If you're going to only allow admins to connect to the outside world then you've effectively isolated your computer from the net. It's a heck of a lot more then Apache that suffers from this problem, anything that uses a port below 1024 will need to be started as root. An awful lot can happen between the time that a program starts, and the time that it binds to a port.

Chewbacca 01-09-2005 09:09 PM

I just got a new PC and upgraded from W98 to XP w/SP2. Under 98 I never had a virus or suffered from an attack and only had one case of spyware due to user error

So how does a fellow like me who's programing expirience is Basic ( circa 1985) and Scripting for NWN plug these reported holes in Windows XP?


Does the firewall with my router and the software firewall I use do the job, in addition to being overly cautious about email attachments and using spyware killers like adaware and SBS&D, ect.?

What in reality and in lay-terms should I be worried about?

wellard 01-09-2005 09:17 PM

Regards the down load of SP2. Just ask Microsoft for a free copy of SP2 and they will send. Three days after asking a nice shiny CD arrived from Hong Kong :D (and I am sure that the CD has been given away free with PC mags before now.)

off topic.... It was funny to see a product from Microsoft telling you to distribute to everyone you know, instead of the usual copy this and we will shoot you [img]tongue.gif[/img]

I am about to install SP2 tomorrow, any tips on which (if any) options to choose while installing it would be nice.

And on a side note I find the articles you post Lenoncook intresting. Much better than the spam that some posters get away with.

LennonCook 01-09-2005 09:47 PM

Quote:

Originally posted by Chewbacca:
I just got a new PC and upgraded from W98 to XP w/SP2. Under 98 I never had a virus or suffered from an attack and only had one case of spyware due to user error

So how does a fellow like me who's programing expirience is Basic ( circa 1985) and Scripting for NWN plug these reported holes in Windows XP?


Does the firewall with my router and the software firewall I use do the job, in addition to being overly cautious about email attachments and using spyware killers like adaware and SBS&D, ect.?

What in reality and in lay-terms should I be worried about?

<span style="color: lightblue">Read the article I posted, and look at Spinrite's tools information and tools. Disable all the services that are listed as 'should be disabled' on the first article. Run a good firewall (Zonealarm, Kerio, etc), run a good antivirus (I recommend avast!). Don't be fooled into thinking that a firewal l is a replacement for your antivirus: they are complimentary. Don't use IE, don't use Outlook, don't use {Note|Word}pad, don't use the windows firewall. Get Service Pack 1 definately, consider Service Pack 2, armed with all the articles you can find about it. Run under a limited account where possible, logging in as admin only when you need to. Use one or two anti-spyware apps, update and run once/day to start with, slow down if (and only if) they regularly come up clean. Don't bother with anti-spyware resident things (things that stick in memory) unless you need to. Pay attention to what your tools tell you. Investigate anything suspicious you find on your machine. Consider using Open Office rather than MS Office. Don't blindly delete any problems, try to understand where they came from and future-proof yourself against the same happening again. Go through Add/Remove Windows Components and remove anything you don't or rarely use. Consider alternative file managers, consider alternative shells. Check for updates to your software regularly. Never let anything download or install software without your explicitly telling it to. This includes Windows itself. If any of your tools stops doing the job it's meant to, consider replacing it, or investigate what could be causing it. And never assume that you are completely safe.

[ 01-09-2005, 09:48 PM: Message edited by: LennonCook ]

LennonCook 01-10-2005 05:34 PM

Quote:

Originally posted by Seraph:
All I know are the virus and worms that I've been infected with.
Windows: 0
Linux: 1
I've been running windows as a home OS for 8 years, I ran Apache on Linux for 6 months and was compromised.

<span style="color: lightblue">You seem to forget that there is a difference between "worms one has been infected with over 8 years" and "worms that have been caught". ;) But also, your experiences do not necesarily reflect the actuality.


Quote:

I don't know how you're system is setup, but if it is anything like 99.99% of the systems out there it will use a process that goes something like this:
Start some program with root privliges, the program binds the port(s), listens, and then calls setuid() and setgid() and friends to drop root privliges. At this point it should still be able to call accept() on the ports, but it will not still have root privliges. However everytime you start aMSN, Thunderbird, Firefox, xChat, et al. you are opening a hole that could in theory allow someone who has compromised that porgram to do all sorts of nasty things. I suspect that you're undergoing the same thing that you accuse windows users of doing, ignoring things because they are happening outside of plain sight.
<span style="color: lightblue">So, when I open an xTerm logged in as me, and type 'firefox &' as me, it somehow has root privaledges?
When I jump to a virt term, and log in as me, then 'ncftp wherever', it is starting with root privaledges even though it is not bieng run as root?
Sorry, no.

Quote:

Like I origionally said, security is all smoke and mirrors. The holes in Linux security are harder to get to, and difficult to exploite, but there are still holes, and I feel it is only a matter of time before someone comes up with a way to get at them.
<span style="color: lightblue">Yes, there will always be holes. But the th ing with Linux is that it actually seems to fix them as they are discovered. I don't argue that Linux has fewer security flaws than Windows, but rather that it is more secure, and that it takes real steps to ensure that. Service Pack 2, for the most part, seems to simply remind you to put a firewall up. It doesn't close off any of the webservers which are active by default - which, as you point out yourself, in Linux require root access to instantiate, it doesn't make you less vulnerable to attack. It just... tells you to put up a firewall. Which is kindof useless when you realise that most of the people who will know about SP2 (ie, people who do a fair amount of stuff on their computer, or who have security-concious technicians lookin gafter them) will most likely already have a firewall anyway.

Quote:

If you're going to only allow admins to connect to the outside world then you've effectively isolated your computer from the net. It's a heck of a lot more then Apache that suffers from this problem, anything that uses a port below 1024 will need to be started as root.
<span style="color: lightblue">It isn't a matter of only allowing admins to connect to the outside world, it's a matter of allowing other systems to connect directly to you. As I pointed out above, it is illoigcal to assume that a program which i start in console as me is somehow started with privaledges I don't have. Because if they can do it, why can't I start apache as me? Why does apt-get exit with the question 'are you root'?
Certain things do require admin access. Openeing a service that, simply because of what it is rather than how well it has been designed, could potentially be used to take control of your system has to be among them.

Quote:

An awful lot can happen between the time that a program starts, and the time that it binds to a port.
<span style="color: lightblue">But, how likely is it that something will exploit that? Which is easier to exploit: "These people probably have this service running that will let me get in there, because it's on and always running on that system" , or "These people might be starting a service that they might not have, and I for a few seconds it has full root privaledge"?

A serious hacker will still get in to a Linux system, yes, but they aren't the most dangerous threat to the average user. The viruses, the worms, the trojans... that isn't the hallmark of someone who wants information. That isn't the behavior of someone who wants specific information from a specific machine. It represents someone who just wants to revel in the damage they can do.
The way to stop this is to
1) Limit the number of ways they can get in, and
2) Limit the amount of damage they can do if they achieve this.
(spyware is, ofcourse, a different beast)

Linux, by virtue of enforcing its multi-user privaledge system, is almost immune in this regard to everything except user error (error to the extent of doing everything as root). Windows, on the other hand, seems to be a script kiddy's dream: easy to get at, plenty of room for damage, and a large user base to boot. And Microsoft don't seem to be doing a thing about it, except reminding the user that they aren't safe.

Chewbacca 01-10-2005 06:46 PM

Quote:

Originally posted by LennonCook:
<span style="color: lightblue">Read the article I posted, and look at Spinrite's tools information and tools. Disable all the services that are listed as 'should be disabled' on the first article. Run a good firewall (Zonealarm, Kerio, etc), run a good antivirus (I recommend avast!). Don't be fooled into thinking that a firewal l is a replacement for your antivirus: they are complimentary. Don't use IE, don't use Outlook, don't use {Note|Word}pad, don't use the windows firewall. Get Service Pack 1 definately, consider Service Pack 2, armed with all the articles you can find about it. Run under a limited account where possible, logging in as admin only when you need to. Use one or two anti-spyware apps, update and run once/day to start with, slow down if (and only if) they regularly come up clean. Don't bother with anti-spyware resident things (things that stick in memory) unless you need to. Pay attention to what your tools tell you. Investigate anything suspicious you find on your machine. Consider using Open Office rather than MS Office. Don't blindly delete any problems, try to understand where they came from and future-proof yourself against the same happening again. Go through Add/Remove Windows Components and remove anything you don't or rarely use. Consider alternative file managers, consider alternative shells. Check for updates to your software regularly. Never let anything download or install software without your explicitly telling it to. This includes Windows itself. If any of your tools stops doing the job it's meant to, consider replacing it, or investigate what could be causing it. And never assume that you are completely safe.
Thanks! I already use many of the safegaurds and practices you have offered on our win 98 machines although Spinrite's tools are new to me. Before my new PC goes on the net I will certainly be checking those out and digging into windows to turnoff all the unneeded stuff.

I'm definitely going to check out Openoffice. Gotta love free stuff that is as good and versatile as the pay stuff! :D

We already use Avast, which is also free, quite excellent, and hasn't pulled any of NAV's stupid tricks that caused hours of work installing and reinstalling just for simple protection. Plus Norton actually tried to charge my wife to re-download software we had already paid for in order to jump through the re-install hoops! That's when I finally persuaded her to give it up for Avast.


All times are GMT -4. The time now is 09:21 PM.

Powered by vBulletin® Version 3.8.3
Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.
©2024 Ironworks Gaming & ©2024 The Great Escape Studios TM - All Rights Reserved