PCWeek Summarizes hackpcweek.com Test 174
Banraeth writes "This week's PC Week contains a story about the results from their hackpcweek.com security test site. They explain the object of the test, how many attempts they got, the structure of the attempts and the way someone finally got in. The article reads really well and very clearly explains the anatomy of a break-in for those of us who aren't Linux security gurus.
"
Re:What I Want to Know ... (Score:1)
I also think it's appropriate for them to re-run the test on fairer ground, in light of claims that installing these 21 security patches is not a whole lot different from installing NT service pack 5.
Not to suggest that this test is all that useful as any sort of security benchmark. High-profile anecdotal evidence is still anecdotal evidence - if a famous person's Audi blows up that doesn't mean it's more prone to explosion than Joe Blow's Pinto.
Patch Repository (Score:1)
I have also spent the last two days trying to download Service Pack 5 for NT. Sure Microsoft has a "central repository", but you are stuck with a 25-75mb file to download and Microsoft's site by itself is slow without having to try to download from Conxion. The farthest I've gotten is 10mb before the connection hung and I cancelled. We have 6 channels of a T1 here, and I'm only getting 3.2kb to Microsoft and on the download.
I think it it pretty obvious from the last two-three weeks that PC Week has done little or no research on anything they are trying to do or write about. It is my personal opinion that we should just ignore them. If they aren't going to take the time to research their articles and statements (think Journalistic Integrity) I'm not going to take the time to read their magazine.
Matt
...and she wouldn't give it to me! (Score:1)
Anyway, ZDnet blew it on this "test" of Linux vs. NT Particularly amusing was the quote "...21 security fixes published by RedHat that have only been out a couple of months..."
A couple of months? Come on give me a break! I check the RedHat Errata page at least once a week, and I'm not even running a contest.
Re:Response to Criticisms? (Score:1)
So, what about getting updates from RedHat, your vendor.
So, how is any other OS different. I go to Microsoft for WinNT updates (good luck finding them though). I don't go to MS looking for updates for third party utilities.
Linux is only the core kernel, most system utilities are from the GNU project and all other software is from third parties.
So how is this different again?
PC Week bias (Score:1)
Mark "Young Turk" Willey
BTW, if you're concerned about Linux security and Free Software in general and want to help do something about it, drop me a line. I've decided to dedicate the next part of life to this endeavor.
What amazes me... (Score:1)
Re:What I Want to Know ... (Score:1)
Even, back in the day, Novell Netware 3.x had patch lists several pages long.
How much you want to bet there's quite a few of these PC Week editors and "IT Managers" with an old Novell CNE tie-tack somewhere in their desk drawer. They know the routine - they've just forgotten.
Re:A Centralized Linux Bug Database. (Score:1)
Re:Applying the security fixes... (Score:1)
Re:zdnet is aiming at linux (Score:1)
Re:Applying the security fixes... (Score:1)
Re:Just plain wrong (Score:2)
You missed the last page where they have the "PC Week Labs recommends ..." chart. The second to last recommendation is "Install all vendor-recommended updates: Assign this task to a specific person within the organization. Allocate budget for it. Also subscribe to hacker magazines such as '2600' and patrol hacker Web sites. Read all CERT advisories."
After saying that a corporation wouldn't want to install patches as they were released, they certainly have a funny recommendation for NT adminstrators. Allocate budget? Subscribe to hacker magazines? All that, and all we asked for was 21 measly patches.
Sorry, PC Week. Get your act together, or step aside. I've got work to do...
-Brent--
System Administration (Score:1)
21 patches? Come on, I'm not even a systems administrator and check Red Hat's errata section all the time. I run one box. It's at my house. I am the only one that uses it. I STILL check apply security updates. If ZD doesn't think a normal sysadmin would apply "21 security updates available for Red Hat 6.0, which had been out for only (My note: only a couple of months? Damn. I check the RH errata site once a week, and I am not even a sysadmin) a couple of months" then that is not a sysadmin I want even breathing on my box. Just my $.02.
Charlie
-- .sig files go when they die?
Child: Mommy, where do
Mother: HELL! Straight to hell!
I've never been the same since.
Believe it or not, this is *good* for Linux (Score:3)
So why don't people do it? Because none of the bugs are "well-known", i.e., they don't get news coverage on ZDNet, with headlines screaming "Sky Is Falling, LINUX Insecure!"
But Microsoft tends to get that. Partially because they write shitty software (let's be honest), and partially because it's a name that people recognize and will relate to. It makes for good sensationalism.
My solution, offered with tongue firmly implanted in cheek, is to sensationalize every exploit for Linux. "crond Found Insecure at 8:00 AM, Bob Young Not Answering Phone at Lunch Time!"
Seriously, though, maybe we need to put just a little more emphasis on getting the updates. Now we have an example-- "Hey, Joe, did you download the RH updates? They say that if PC Week had done that, they wouldn't have been cracked!"
Damn, but they're clueless... (Score:2)
They complain about how hard it is to remember "secure" passwords such as "[Athl!g" and how they had to keep a list (in cleartext I suppose) on a laptop. Try something like "TcIoOtLtWeD" which is nice and easy to remember.*
And of course, as everyone has mentioned, first they say that Red Hat had 21 security updates available, and turn around and lament that there's no place to go to see which security updates are available... durr....
Overall, they just sound clueless and/or heavily influenced.
*"This contest Is one Of the Lamest things We've ever Done."
Re:Inconsistancies in the article. (Score:2)
I will go further and say that it is obvious that this whole test was simply a horse and pony show to prove that Linux is just inheirently insecure.
One can only wonder at the motivations of a company that runs a security test without installing Linux security patches and goes to the length of installing unauditted CGI scripts.
I believe that this test was paid for and ran by Microsoft. Any objective tester for an operating system would have gone to the trouble to install the security patches and report how difficult the task is.
That PC Labs is still claiming that "Linux" doesn't have a central site for its security updates is clearly FUD directed towards those who do not read forums like these.
Linux does have a kernel site that is a central repository for all fixes. But it wasn't a kernel security problem that we are talking about here.
The security hole that allowed a breakin was three fold. An insecure cgi script allowed a person to try to write a file. Wrong directory permissions allowed a file to be overwritten. A know security hole was exploited.
Audit all scripts before you put them on your box. Use the -T flag and use strict option even though they make programming a real pain. Get all updates from your software company and install them. Ensure proper directory permissions for all directories and files. Go to your distribution vendor and download all security patches.
PC Labs only had to goto one place on the whole net to get updates for their Redhat software. All the software. The site is http://redhat.com/support
That's right, not only do you get hundreds of software packages, but you only have to go to one place to get updates on all of those fixes.
Imagine how many sites you would have to visit to upgrade all the software on a Windows box that has an equal amount of software as a Linux box. It wouldn't be one site, that's for sure.
Sounds to me like Linux would be much easier to maintain.
Turn The Tables (Score:1)
Yeah. Ok.
So, why isn't this obvious? If it weren't for the Ars Technica NT Tweak site, I wouldn't have known that SP5 was out. Hell, I wouldn't have known about any of the hotfixes currently available. Go centralization.
Speaking of which, MS's "patches" are a joke. The warnings on those things remind me more of quantum mechanics jokes than installation warnings: "Due to an effect called 'tunneling' your computer may blow up after you install this patch, and if it does, that's the will of the cosmos, not any problem on our part."
Makes me feel all warm n fuzzy, like. Especially the fact that I have to reboot after each one, which means 3 patches = 30 minutes.
I have friends who use Debian, and they just slap a key, wait a few minutes, maybe restart a service, and they're done.
Me? I, uh... wait until the fact that I'm using obsolete and insecure software becomes painfully obvious and I have to avoid public shunning by seeking out the latest patches.
I think it's interesting that they point out percieved "flaws" in Linux out while comfortably ignoring similar flaws in NT.
God, I love objective journalism...
Wot do you mean no central repository (Score:1)
Which is just plain silly. The hack could've been prevented if they'd just checked Red Hat's web pages sometime, or the updates ftp directory, or been on the proper mailing list. Or configured autorpm to deal with this for them. Exactly what is a company required to do to get heard by PCWeek's system administrators, perhaps sending out a fripping press release would help? Hmm, makes me wonder if they have found the repository for Microsoft Hotfixes yet. Maybe they just stick to Service Packs?
a little something (Score:2)
Doesn't say much for Axent's...... (Score:1)
Response to Criticisms? (Score:1)
A Centralized Linux Bug Database. (Score:3)
ftp://updates.redhat.com
They can't make it easier then that, and unlike Microsoft's update site you don't need to click through gobs of advertisements.
Response from Home Office Online? (Score:1)
I don't begrudge a company for releasing buggy software, rather how they handle buggy (especially security related) releases.
Legal liability is another interesting issue. If I was running hoffice's software, and lost millions of dollars because of a hacker, how liable would hoffice be, shrinkwrap licenses notwithstanding? Would PC Week be liable at all? jfs?
Re:Response to Criticisms? (Score:1)
Re:A Centralized Linux Bug Database. (Score:1)
Uh. (Score:1)
I feel I should also point out that "The hacker bypassed the firewall..." is a horribly ambiguous statement. Was his passing by the firewall authorized, or not? I honestly can read that sentence either way. If I bypass the security of a museum to steal the Jewels, that doesn't mean that I chose to steal the Jewels INSTEAD of attacking the security, does it?
Both (Score:1)
Re:Response to Criticisms? (Score:2)
No central infrastructure, as in you *have* to get patches to Microsoft OS's from Microsoft, and you can get patches for Red Hat's product from, none other then, Red Hat!
Of course, you can *also* follow freshmeat.net, or other freely available "portals" to also keep Linux up to date. Then again, NTBugtraq is just as good a resource for keeping up on Microsoft issues as anything.
Microsoft has a "central infrastructure? Yeah right! How many times have you heard of a security problem from Microsoft first? The difference is not the infrastructure, it's that with MS OS's you have to *wait* until Microsoft responses before *you* can do anything about it.
-Brent--
Re:chroot? (Score:1)
BFD (Score:1)
The impression I got from the story was that if someone as knowledgable as Ziff Davis can be hacked, so can anyone. Whereas the 'hackable anywhere' bit is true, it's simply ass-covering on the part of ZD.
What did this test prove? That Linux is less secure? That ZD haven't a clue?
"The bottom line is daunting: don't let your guard down. Ever." And don't ever trust ZD.
Re:zdnet is aiming at linux (Score:1)
Re:zdnet is aiming at linux (Score:1)
ridiculous
"...these feascos(big sp), point..."
fiascos
other than that, PR would be a great think for Linux to have. But your other point, that where they say Linux, they should be saying Redhat, applies to that point as well. Redhat should be pumping out some of those IPO dollar signs to push some PR. At least some. A good press release, perhaps. The quiet period is over, isn't it?
Re:Uh. (Score:2)
Re:What I Want to Know ... (Score:2)
~luge
Re:No central repository of Linux patches... so wh (Score:3)
I don't think so. For any operating system it is impossible to track all of the patches for every single program for that one operating system in one place, but a good place to start would be:
http://www.securityfocus.com/ (aka: BUGTRAQ)
ZDnet has a point here. I have they same problem they have when keeping my boxen secure. (Of course nothing is more secure than off (Hey, it would be left on if I wasn't on dialup.)) BUGTRAQ is very good, but what they (and I) would like to have would be a freshmeat of security patches. (Call it rancidmeat (it all about bugs, get it? Oh I crack myself up sometimes (but not this time).).) It could be run just like freshmeat, nothing actually there, just links to the patches. Have it summerize BUGTRAQ and several other official and "unoffical" security sites, and provide links to the patches. Sure it's work (so is freshmeat), but certainly it's doable. (Disclaimer: I'm not saying this ficitional site would be perfect, but it would be better than what we have now which is a hodgepodge of several different sites. I ceratainly would like to take part in something like this.)
M$ Propaganda^H^H^H^H^H^H^H^H^H^H^H^HZDnet writes:
The hackpcweek.com site also showed us that some simple security
measures, such as complex passwords, are great in theory but nearly impossible in practice. The hackpcweek site comprised six servers. Imagine how difficult it was to remember passwords such as [Athl!g. We couldn't...
Ahh geez, and they wonder why they had security problems. I"m sorry but this is just stupidity on their part. I have a minimum of 12 different passwords each as arcane as theirs and I have no problem. (For "added security" none of them are based on any sort of mneumonic phrase). Of course if they actually used the passwords on a daily basis, then they would remember them and wouldn't have to have them written down. (Eventually you'll "forget" the password when typing them in becomes automatic. ("What's your password?" "Uhhh... *goes to a keyboard and types* apparently Ghj3$/f
Re:a little something (Score:1)
(off the "PC Week Recommends" [zdnet.com] image...)
"- Install all vendor-recommended updates: .."
A little hypocracy?
Re:Why can't I copy article text? (Score:1)
Design For Security (Score:1)
locust
Re:Response to Criticisms? (Score:2)
Clueless as usual, they didn't do the research, but assumed (probably based on the feedback they got) that the *only* way to patch Linux was to use autorpm and that the process went something like this:
Checking current installed packages....
Downloading new packages....
Installing packages....
Done...
Your server is now secure.
Please do this at least once a day.
Please note that this will *not* run from cron.
#
Of course, a few minutes on Red Hat's site would have shown that they could download the patch manually and verify what it did. *Then* they could use autorpm to automate the process of getting the patches on all the servers
So, how does running "setup.exe" to install a service pack provide you with any more ability to see what's being done the the server then PC Week's idea of AutoRPM?
-Brent--
Re:They dance around the explanation (Score:1)
And what's this BS about not installing the updates from RedHat? It would have taken them 10-15 minutes, compared to ~45 minutes installing NT service packs. Administrator stupidity does not make one O/S inherently less secure than another. It's that simple.
-- Kameron Gasso (kgasso@blort.org)
--
Yada Yada Yada (Score:1)
Compare these "hot fixes" to RH "updates" and its the same thing.
Microsoft releases a Service Pack every 6 (?) or so months, so in between, they release hot fixes. Any competent NT administrator would install these hot fixes, just like any competent Linux administrator would install RH updates.
PC Week have clearly contridicted themselves, - its just plain *stupid*.
As for "no central repository" - another contridiction, what makes an update from Microsoft more "trustworthy" than an update from RH? What makes a file downloaded from ftp.microsoft.com more "verified" then one from updates.redhat.com?
nyeah.
Re:No central repository of Linux patches... so wh (Score:1)
www.rancidmeat.org isn't. Any takers?
Chief Prosecutor
Advocacy Department
Re:not an MS employee.. you sh*thead... (Score:1)
"never argue with a fool, people might not know the difference"
So I won't bother arguing with you.
Re:Contradictory.... (Score:1)
Re:a little something (Score:1)
sounds about right to me
I have currently been on hold to M$oft tech support for thirty minutes ("We are sorry to keep you waiting, your call will be answered by the next available operator"). This was after ten minutes of tracking down MS Q document Q182671, following the link to Novell's site, following the link BACK to Q182671, finding the section marked "patch available, but not tested, contact MS pay-support for the patch". First guy cut me off after giving me a telephone number (after a mere 10 minutes on hold) which turned out to be for a Sales guy tasked to send out SP2 and nothing else. Got put back to first guy, who finally figured out that it might not be something I could download from the web (or else why would I be phoning?), gave me a "case id" and put me on hold. that was half an hour ago..........
now this is for a minor patch to a spreadsheet - what would it be like for a major security loophole in NT?
--
Sorry, Bill, but the rules have changed. (Score:1)
This was recognized by Microsoft itself in the infamous Halloween document - at least, some clueful person at MS recognized it. Not Bill, apparently. hehe. "Learn by doing". hehe. Go ahead, Bill, make our day. hehe. Hmm... I'll stop now - too many stupid jokes to write in this small space. The bottom line is: the attempting Fudding of Linux just turns into more free advertising. Hmmm. "Linux: even the advertising is free." hehe. OK, I promised to stop, I'll stop now
They dance around the explanation (Score:2)
They take two pages to describe how he painstakingly went through the process of scanning the Perl scripts, trying to squeeze in an executable under the exact right size, and ultimately gets to a dead end.
And then, in one line, they tell you he got an exploit off Bugtraq and got root access.
They're very quiet about that last bit... Yet it seems to me like it's the essential part of the exploit. Yes, accessing online resources and security websites is one of the main tools in the cracker's arsenal. Far from me to say that these sites should be banned! What I mean is, they should be read as much by the admins than they are by the crackers.
"There is no surer way to ruin a good discussion than to contaminate it with the facts."
Re:No central repository of Linux patches... so wh (Score:1)
How true... installing OpenBSD takes a few commands
UNIX people prefer to pay attention and take responsibility for their own security.
Then there's the continuing trend for Windows hot fixes and service packs - they install, without telling you what they do, or offering any version checking - I know a couple of NT admins who have "fixed" security problems by adding an older hotfix that may have kept the one bug they were worried about closed, but re-opened another one that was fixed later. There's a good reason that DLLs, etc. all have verion info. There's something to be said for proper revision control, and doing a little bit to prevent people from backtracking...
Just my $.015 (I always come up a little short)
Re:A Centralized Linux Bug Database. (Score:2)
Yes, but I figure if administrators don't want to take the time to read the README with the patch under Linux and check out the RPM, they probably don't bother with the effort of reading the txt file with the service pack under NT.
-Brent--
Re:Applying the security fixes... (Score:2)
From what I remember it was the Cron hole that allowed him to exploit the CGI scripts hole, so without the Cron hole he wouldn't have been able to do it, and yes there is a patch out for that.
Kintanon
AMEN to that! (Score:1)
Re:I think it's a good article.... (Score:1)
But - saying something like "it's too hard to remember secure passwords, so we stored them on a laptop, and if it had been cracked the whole network would have been vulnerable..."
I mean, come on. That doesn't make them sound terribly professional.
Re:A little bit defensive... (Score:2)
But is that the message the PHBs will hear? Is that what ZD wants them to hear?
The whole art of FUD or any other sort of propaganda, if you're good at it, is to say things that you can defend in their surface form, but which bear a between-the-lines message that twists the truth to your advantage.
If they had merely wanted to evaluate the difficulty of securing systems, they didn't need a shootout. A single system would have sufficed.
Printing such loaded messages is inexcusable, particularly from a rag that is subject to reasonable charges of conflict-of-interest.
BTW, but I'd be willing to wager that if you did a reader survey on this article, you'd find that more remembered the between-the-lines message than remembered the objective facts presented in the article. Such is the nature of the human mind (and that's why FUD and propaganda often works so well).
--
It's October 6th. Where's W2K? Over the horizon again, eh?
Re:Missing the point of peer-reviewed software (Score:2)
You were asking PC Week, right?
Personally, I would never use an OS where features are specifically added that allow you to do malicious things, and requires more software, not to "prevent" it, but to stop it ASAP after it happens.
NT Security model is the worst that I could ever imagine. At least security holes in Linux and other Unixes rely on bugs that can be fixed without breaking a lot of legitimate stuff
-Brent--
His geography knowledge also sucks. (Score:1)
(Yeah, so it's pretty impregnable, in military terms [or at least it was, back when fortifications still worked] -- but that is *because* it is a rock, not the other way around.)
What a nitwit, that Pankaj.
Christian R. Conrad
MY opinions, not my employer's - Hedengren, Finland.
Linux vs NT (Score:1)
Re:Two contradictory wrong statements (Score:1)
Unless we get the source?
---
Re:I think it's a good article.... (Score:1)
Sorry, SP5 isn't all there is to it. Remember that Microsoft comes out with hotfixes all the time. You still have to subscribe to a list or check the ftp site to get 'em. I bet they applied all the hotfixes as well.
This test had nothing to do with Linux vs. Microsoft. It was obviously about competence. Did anyone ever crack that linux PPC box? I don't think so.
Monty
Unqualified opinons = Fear, Uncertainty & Doubt (Score:1)
I've got an idea... If you're working heavily in "E-commerce," why don't you hire someone (or a team) to work security full-time. That way you can take your $1000/month and get almost $5,500/month worth of work. And if your sysadmins cannot type rpm -Uvh, but they can click on an icon, I suggest you get new sysadmins.
No one who is going to "do business" on the web should under-estimate security. That would be like doing business with a bank that had one of their tellers watching the door on a heavy-deposit day.
"I've learned that it takes years to build trust and only suspicion and doubt to destroy it."
Re:What I Want to Know ... (Score:1)
Re:Two contradictory wrong statements (Score:2)
You can get it from ftp://ftp.kaybee.org/pub/redhat/RPMS/noarch
Re:This was an NT vs. Linux shootout!!! NT WON! (Score:1)
--
It's October 6th. Where's W2K? Over the horizon again, eh?
Re:Why can't I copy article text? (Score:1)
I'm curious about why this happens.
The hacker was advanced... (Score:1)
ZD says that they are going to apply the 21 rpms sometime soon and do the whole thing over again to make the matter more fair. Sounds like a good idea to me.
emufreak
www.kontek.net/pp
Security? get OpenBSD (Score:1)
Re:A Centralized Linux Bug Database. (Score:2)
Help? (Score:2)
Re:I think it's a good article.... (Score:1)
Re:Believe it or not, this is *good* for Linux (Score:2)
Windows only looks better than Linux when someone cheats.
Micorsoft and its toadies (Mindcraft, ZDnet) still don't understand the internet. The rules of the FUD game have changed.
Gone are the days when you could publish an article like this with impunity. Ten years ago, mostly only Windows users would have seen it to start with (due to the venue), and that small fraction of the readership who did spot the b.s. would not have a ready channel of spreading the word.
But today, only one of the clueful has to see it. That reader posts it to
FUD relies on treating people like mushrooms. But with the internet, that only works for people who limit themselves to MS-sponsored sites. The public at large does have access to the facts.
Sorry, Bill, but the rules have changed. You can't kill Linux with FUD any more than you can buy it. You're going to be forced to innovate, however much you hate it.
--
It's October 6th. Where's W2K? Over the horizon again, eh?
Important point missed (Score:2)
#!/path/to/perl -T
and fix everything that breaks.
You will close off a lot of security holes that way...
Ben
Security? get OpenBSD (Score:1)
OpenBSD hasn't had a security patch in the last year after its rigorous auditing.
Hajo
PS: http://www.openbsd.org/
"Sending Kiddies to
It was a "gimmick" contest. (Score:2)
Apply SP-3 (no higher because sp4&5 are severly unstable) add 13 hotfixes and the Y2K hotfixes, patch I.E., patch Office, patch Outlook... That's a total of 23 things to do where most of these "patches" take 1-2 hours to download, force a fix to be applied because to fix what the fix broke.
This "contest" was a huge joke. PC mag has never EVER had any clout with me or anyone I know, 90% of the time they either do basic things like an article on "how to turn on your computer" or " the mouse really isnt a foot-pedal" basically a useless mag except for the inept that really shouldnt be using a computer to begin with.
This test proved one thing to me.... they wanted to scream "MEE TOO! MEE TOO!" with the ranks of other real mags.
Re:Response to Criticisms? (Score:1)
Okay, wait a moment
The (21) security fixes... (Score:2)
For example:
Two of the updates are Netscape fixes. Is their server running a copy of Netscape ? Not likely ! Therefore, we're down to (19) fixes.
Two more are updates for XFree86. Well, they probably are running X ! You know, they are used to pointy-clicky administration!
Another is an update for "mars-nwe". Isn't that a client type program for logging into Netware servers ? Again, probably doesn't apply to their setup.
A fix for KDE...okay, that can make Linux look like Windows, so, they probably are using it!
A fix for gnumeric, a Gnome spreadsheet program.
How many more of the RedHat updates don't apply?? If I don't have the RPM for "pump" installed, I certainly am not going to install the "fix" for it!
AutoRPM info incorrect (Score:4)
Re:read what he said (Score:2)
I, for one, had the cron patch installed. I'm not a security guru. I'm not a bona fide sysadmin. I'm just a desktop Linux user who likes to take care of the easy stuff.
And easy it was: I am subscribed to Red Hat's mailing list, and they send me a message whenever security updates are available. I read the message, and fetch the update if it applies to me. The elapsed time is usually about 30 seconds + download time.
Autorpm is not the "only" option.
--
It's October 6th. Where's W2K? Over the horizon again, eh?
Re:I think it's a good article.... (Score:2)
| haven't had time to apply the 21 patches on
| all of the redhat boxes, the various BSDI
| patches, updates to all the '98 boxes, etc.
This is a good point, though I don't personally believe that security should be as low of a priority as a lot of people seem to think it is.
For example, the ISP I use runs its systems on Redhat Linux. They provide shell accounts, which is good - and one of the reasons I chose them. However, I've noticed that they're quire far behind on security issues, and it'd be essentially trivial for someone to root their boxes, if it hasn't been done already. (Now I've done it
I also notice that they're behind on versions of sendmail *despite* having been warned about it several times. Thus, all the mailservers they run (and there are several) are wide-open relays just waiting for a malicious spammer to start spewing out junk mail.
As for the 21 patches, not all of them would be appropriate for a server machine - particularly if the service isn't installed (for example, if you have no FTP daemon, why do you need an FTP patch?).
Did you *see* all the stuff that they did to the NT server? Heck, even installing all 21 RPMs sure looked easier to me!
Re:Response to Criticisms? (Score:2)
What I Want to Know ... (Score:3)
Missing the point of peer-reviewed software (Score:3)
If you keep using the latest and greatest stuff then yeah, of course you're going to need someone on staff auditing your system's security all the time. The point they miss, though, is that code matures from people looking at it, fixing holes, and changing the packages to be distributed in a default tightly-locked state. (When was the last time you worried about a vulnerability in finger?)
Admins will always need to be aware of security. But it's getting more and more to the point that you can set it and forget it. Especially if you spend the ten minutes to keep up to date with the new patches on updates.redhat.com.
Two contradictory wrong statements (Score:4)
First they say there is no single place to get all the updates. Since they are running RedHat, that is wrong, because they could get them from ftp://updates.redhat.com/
Second they say that if you want to keep up with the security updates, your only choice is to run autorpm, but that's a bad idea because it installs software without you knowing what is going on. Leaving aside the fact that this contradicts the first statement, it's also dead wrong. If you set one configuration variable in autorpm, instead of installing the updates, it will just download them, and send you an email advising that they are downloaded. Then you can pick and choose which ones to install using "autorpm --apply", which will show you what the package is, where it got it from, all the rpm info, and let you choose to install, defer installation for now, or remove it from the queue. It doesn't get any simpler than that.
Would you rather get your security patches the day after they are available, or would you rather wait for Microsoft to bundle several security patches up into a Service Pack CD?
Inconsistancies in the article. (Score:5)
PC Week Labs went to great lengths to take the same security measures on the Linux and Windows NT servers running the site that any IT manager worth his or her salt would implement.
Well that is very interesting isn't it. Then why weren't the available security fixes for redhat applied. Bah. They went to the trouble of getting service packs for NT, but couldn't rpm -Uhv *
While any operating system needs patches and updates, there is no central repository for testing or approving patches to the Linux system.
Well isn't that special. http://www.redhat.com/corp/support/errata/rh60-err ata-general.html
Kernel patches can be obtained from a verified source such as kernel.org, but most other components have no central infrastructure.
Last I checked, no hole in the kernel was exploited. As for the other components, you buy from redhat to get the central infrastructure. You could roll your own distro if you wanted to worry about updating all of the individual packages. When you buy a distro, you pay a company money to package things for you, so when you need an update, you go to them.
The only option for Linux is to use a utility called autorpm, which polls a server for updates and automatically installs them
Again wrong. I don't use debian myself, but I believe they have a system for doing just that in a much more secure manner.
The bottom line is daunting: Don't let your guard down--ever.
Right. Basically like they did by not applying the fixes put out by redhat and using unaudited cgi scripts.
Re:A Centralized Linux Bug Database. (Score:2)
Redhat and Debian have upgrade facilities, of one sort or another. (Debian's is semi-automatic, I believe. Just run a script, and newer packages are fetched over the net.)
I'd say that bug reporting is more-or-less down pat, but could be done through bug-reporting scripts, to make it easier on newbies. Upgrades are almost sorted, but maybe need a bit of touching up for those same newbies.
IMHO, the facilities all exist, it's that they're either not known to the unwashed masses, or not simple enough for them.
Just plain wrong (Score:4)
If Pankaj was a network admin in charge of securing the system he'd be fired. 'Nuff said? No. To spread the FUD that Redhat is insecure because the patches are difficult to download is a disservice to anyone interested in an alternative to Microsoft. This definitely smells like another Mindcraft. I wouldn't be surprised if prominent members of the open source community refuse to even deal with ZDNet anymore because they recognize that whatever ZDNet is involved with is most likely a hatchet job.
A little bit defensive... (Score:4)
C'mon, this article is actually pretty good. ZD isn't bashing Linux, they are basically summarizing the hacking contest...saying what they did right, and what they did wrong. Notice in the "PCWeek Labs recommends" section they didn't say, "Don't use Linux. It's insecure." They give helpful recommendations to keep any system secure. Install all security patches, DUH!
They note that they didn't apply the patches RedHat had. They are admitting that they made a mistake here. They're saying, basically, "Don't DO that!"
They note that there is no central repository for verified Linux patches. Well, yeah...there isn't. There is one for Redhat's distribution...which of course is what they were using. Apparently they didn't know about the site. They do now, though, and are applying the patches to retest.
The point of the article can be summarized in the first sentance: "Security is hard." Not "Linux is Bad, NT is Good."
The only thing I can find wrong with the article is that they don't describe in enough detail what they did to the NT system (aside from disabling services)
-partap
Is This Author a Joke or What ? (Score:2)
Once again he talks about the Linux server needing 21 patches for the RedHat 6.0 release which had been out for only a couple of months. Is he for real? Is this some kind of excuse for not doing his job and performing an adequate security check on the box?
He goes on to say
Pankaj then goes on to disparage the autorpm utility because no administrators in their right minds would use this sort of utility because they would have no idea what was being installed on their server.
I would like to request that Pankaj release his testing methodology used to verify what was included on Microsoft's Service Packs and whether they a) fixed everything that was broken and b) did not introduce new avenues of exploitation into his system
I don't understand how this person was able to get this past his boss. But then I forget that his boss is John Taschek who has lost any ounce of credibility that he ever had in his handling of this any other "independent" comparisions of Microsoft and Linux products.
Keep up the good work Zdnet and Ziff-Davis. Just keep it up.
Missing a more subtle FUDding? (Score:2)
Alot of posts are focusing on the lack of patches applied to the RedHat box. While that is a big issue, nobody has touched on this yet:
They are attacking Open-Source/Free Software as well. And doing it with blatant but subtle lies, no less. They go to all the trouble to point out that it's an Open Source CGI ad app, when in fact it's NOT. It's source VIEWABLE, and editable. Very important distinction. You cannot contribute fixes back, and cannot share those fixes with your neighbor. The community cannot collectively pound out holes and bugs in this package.
As much as I appreciate OSI's work, the term Open Source is just a can of worms. How many people now have it in the back of their minds that Open Source is just less secure? Baseless FUD.
ZDNet sickens me more each day. Sigh.
I'm working on what you describe (Score:2)
I'm working on this. I registered linuxpatch.com (not hosted yet) last week. E-mail me if you'd like to help. I'm still in the very early stages, though.
Detailed explanation of the PCWeek hack (Score:2)
Nice article, but the guy who cracked the box wrote up a detailed account of *exactly* how he did it, complete with code:
http://hispahack.ccc.de/en/mi019en.htm [hispahack.ccc.de]
Very interesting reading.
-jason
http://www.kottke.org [kottke.org]
"home of fine hypertext products"
21 Monkeys err patches... (Score:2)
These guys are a bunch of bozos. Sigh.
Too late on that spam... (Score:2)
Interesting comment buried in the text (Score:3)
To quote the article:
Now, the interesting question is whether or not this should be considered to be an inevitable overhead cost of maintaining an internet presence?
In general, I think that security measures are becoming more powerful and easy to configure and administrate. Of course, as the de rigeur features of internet services change and evolve, the number of potential exploits increase.
Unfortunately, I think the "5% of hackers" the article mentioned will *always* be ahead of any automated security measures due to the nature of the security flaws being exploited - those which are due to new code that hasn't been "burn tested" in the real world. Thus, these costs seem to indeed be inevitable.
I think this is actually a corollary to Eric Raymond's apt observation, "Given enough eyes, all bugs are shallow." Consider: a company may have 5 or 6 people testing new code for security flaws before release. There may be over 1000 people trying to find the flaws (to exploit them!) after release. Who do you think is going to have better luck?
Re:A Centralized Linux Bug Database. (Score:2)
You must have missed a paragraph half way done the first page.
Now the problem isn't *testing* the patches. They've learned that that won't fly anymore. Now they've done a 180 and decided that you *can't* test the patches. Of course, number 1, the claim that you *have* to use autorpm which doesn't allow find out what you are installing is ludicrous. And 2, when you click on the executable to install an NT service pack, and it's grinding away for 30 minutes, you really don't know what exactly its installing, do you?I am sorry. I was willing to give PC Week a chance when they announced their project. But it's obvious that not only is it very biased toward who pays the bill, but they'll keep changing their "story" to keep Microsoft looking better.
-Brent--
Re:Missing the point of peer-reviewed software (Score:2)
It certainly does get tougher as your demands increase. The intricate the network services you're providing the harder it is to keep them secure.
Assuming that the site you are maintaining remains free of growth, things will become more solid. However no corproation wishes to even consider this possibility, and reasonably so.
Re:a little something (Score:2)
Contradictory.... (Score:2)
"PC Week Labs went to great lengths to take the same security measures on the Linux and Windows NT servers running the site that any IT manager worth his or her salt would implement."
and
"Also contributing to the hacker's success were incomplete security updates on our test site."
As other articles about this topic have pointed out, they deliberately only did half the job, but here PCWeek is trying convince us that they did a great job. Personally, I think "any IT manager worth his or her salt" would try to keep up with the latest patches on a weekly basis. This was not an objective test, this was using the buzzwords of the moment to sell magazines and generate page views. Considering how many PHBs read PCWeek, I can't see this article as being anything but damaging to efforts to convince managment that Linux is "as good or better" than NT.
Dirk
Re:Missing the point of peer-reviewed software (Score:2)
They don't miss this point because it doesn't exist. NT *never* matures. Everytime it gets a chance Microsoft tears it out and replaces it with newer, better code.
We see that though, because our code does mature. We see no need to replace code that works, just because it was written more then a year ago :)
Ah, I can just imagine PC Week debunking the "mature code" claim by saying that because Linux has thousands of developers working on it, the code must be being continually rewriteen and replaced for no need at all ;)
-Brent--
Re:a little something (Score:2)
I've known a lot of lazy & stupid admins, though. One place I've worked at STILL used Sendmail 8.6.12 - a version long-since stamped "Do Not Use - EVER!" by the people who made it. Their version of BIND was no more recent. SSH? Nah! RSH, with .rhost entries for every machine! They eventually set up a firewall, but deliberately left all the ports open. It was a security disaster waiting to happen. Given the company deals with classified and commercially sensitive information, it =had= to have been an out-take from a Geek's horror movie. (And, no, I won't say where it was.)
Admins like that would probably spit on those 21 security patches - if they had the energy and dexterity. They would likely neglect NT, too, though.
I agree that this stinks of picking the conclusion and fitting the data to it. Either they should run a fair test, or not run a test at all.
Re:BFD (Score:4)
If you look at this test as a contest between NT and Linux, then it proves nothing. Also, it's not an accurate test of ZD's abilities to secure a web server vs. another company.
It does provide a behind-the-scenes look at how both sides (for lack of a better word) work. Details were provided on how the system was secured and how it was compromised. An admin reading this article might see parallels to his own situation. A clueless newbie might find the details of the crack amusing.
I thought the article was well done. Both NT and Linux can be secured, but most aren't... at least not against a determined and skilled attacker.
Re:Response to Criticisms? (Score:2)
"At the time we began the tests, Red Hat Software Inc. had 21 security updates available for Red Hat 6.0, which had been out for only a couple of months."
and in the same parahraph
"...there is no central repository for testing or approving patches to the Linux system. Kernel patches can be obtained from a verified source such as kernel.org, but most other components have no central infrastructure."
Is that not just a little self-contradictory? They're running a redhat machine, redhat has 21 security updates available, but wait.. there's no central infrastructure! I guess going to the vendor, creator, and supporter of your operating system isn't the central place to get updates for said operating system.
Either they're totally clueless, or just a bunch of microFUD spin doctors.
No central infrastructure??? Maybe not across distros, but each distro has its own, unique infrastructure for realeasing fixes and updates to the users. They should have used the resources given to them BY REDHAT, and they know it. They just dont care, dont want to lose M$ advertising, and dont want to admit they fscked up.
Welcome to the wonderful world of online journalism.