lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <3F974405.7060606@jmu.edu>
From: flynngn at jmu.edu (Gary Flynn)
Subject: Linux (in)security (Was: Re: Re: No Subject)

Bruce Ediger wrote:

>The real questions go something like:
>
>"Source code for Unix viruses has been available for years, from sources
>almost too numerous to mention.  Why haven't Unix viruses become epidemic
>the way that Windows viruses have?"
>
Not sure the source has anything to do with viruses. But your statement 
certainly says
something about the concept that publishing source magically makes 
software that is
secure. ;)

>"Security problems of the same magnitude as .ida buffer overflows, or
>MSRPC buffer overflows exist in unix programs like Sendmail and others.
>Why hasn't a worm materialized for this problem?"
>
>"The scalper worm didn't effect nearly as many hosts as msblast did.
>Why not?  Why did the scalper worm seem to die out, yet wormwatch.org
>still records many hits from much older worms like SQLSpida and Nimda?"
>
>And I guess you can generalize and ask why the Windows "culture" generates
>so many problems of such a magnitude, that last so long?  My home office
>web server got a Code Red hit on Sept 19th 2003, for example.  Other computing
>cultures (Unix, Mac, etc) don't seem to exhibit this.  Why not?  Shouldn't
>we focus our efforts on figuring out what aspects of Linux or Mac cultures
>keep epidemics from occuring?  It's certainly a waste of breath to point out
>that OS X has horrendous security flaws when none of them turn into grotesque
>epidemics like Sobig.f.
>
>To extend your "wooden house" analogy a bit:
>In a city made entirely of wooden houses, a single house fire is way more
>likely to level the city than a in a city where a mix of wooden, brick
>and vinly-sided houses.  Having the occasional brick house mixed in with
>the wooden houses provides a lot of resistance to a whole-city conflagration.
>It doesn't provide absolute immunity from fires for every house in the
>city.
>
Three things come immediately to my mind:

1) Make up of user base. Generally not understanding the nature and 
aspects of a programmable,
     general  purpose computer connected to a world-wide network.
2) Size of target. If you're going to cause havoc, why not cause havoc 
in the largest population?
    If you're going to study how to break into safes, why not study the 
ones in most common use?
    I don't buy  the monoculture argument. Sure, it has some validity 
but can you imagine explaining
    to users of 40 different platforms and applications how to secure 
their systems? While we might
    not have worms, we'll  have worse...silent parasites. Besides, there 
are very strong advantages
    to a standard platform. TCP/IP is a monoculture. HTTP/HTML  is a 
monoculture. i86 is a
    monoculture. We had the BSD/SystemV/POSIX wars. We're having the BSD 
and linux wars.
   Do you  really want to live in a world with completely fragmented 
platforms...one without the
   common APIs we've been trying for decades to achieve?
3) Microsoft's steadfast refusal to ship systems in a "NO listening 
ports configuration"
    by default. Cripe, now we've got anonymous, distributed file storage 
on how many
    Windows XP Shared Documents folders all over the Internet available 
to anyone
    that wants it not to mention a hack or infection in waiting with 
every new install of 2000
    or XP because netbios/RPC is shipped in the open state. This isn't a 
problem of not having
    a firewall. Its a problem of shipping a system in a state presenting 
unnecessary risk for the
    vast population of users of that system. Bad, nay, irresponsible, 
business decision IMHO.

>  
>




Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ