Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Apple: Finding the Root of the Problem
Yahoo! Business Week ^ | 3/9/2006 | By Arik Hesseldahl

Posted on 03/09/2006 8:10:56 AM PST by Swordmaker

To maintain public confidence in its operating system, Jobs & Co. should consider hiring a security czar The second potentially major Mac security incident in as many weeks has thankfully been debunked. Earlier this week I wrote a blog entry about a Mac Mini owner in Sweden who configured his machine as a server and challenged hackers to gain access to it. The Mini was -- as hackers like to say -- "owned" only 30 minutes after the challenge started. By "owned," I mean rooted. An outside attacker, through a remote Internet connection, was able to get "root" access -- the highest and most powerful level of administrative access on a Unix-based computer (which Macs running OS X happen to be).

Root access gives the bearer free reign on a machine, no questions asked. Files can be altered or deleted. Accounts assigned to other users can be changed or deleted altogether. The potential for misuse of the privilege has caused Apple to ship its machines with root access disabled by default. Root can be re-enabled only through a series of technical contortions understood by advanced users. Even so, the Swedish attacker said he succeeded with an "unpublished" exploit -- a method that hasn't been publicly documented. If your Mac is connected to the Internet all day, as mine is, you can see the fright such news might generate. It's like knowing a criminal gang has a master key to your home and thousands of others, and that the only defense you really have so far is that they haven't found you yet.

BIASED STUDY. That is, if it were true. . .

(Excerpt) Read more at yahoo.businessweek.com ...


TOPICS: Computers/Internet
KEYWORDS: macintosh; osx; security

1 posted on 03/09/2006 8:11:06 AM PST by Swordmaker
[ Post Reply | Private Reply | View Replies]

To: 1234; 6SJ7; Action-America; af_vet_rr; afnamvet; Alexander Rubin; anonymous_user; ...
Business Week weighs in on the hacked Mac Mini story and gets it right... its FUD. PING!

Thanks to Tubebender for the find!

If you want on or off the Mac Ping List, Freepmail me.


2 posted on 03/09/2006 8:12:55 AM PST by Swordmaker (Beware of Geeks bearing GIFs.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker
Jobs & Co. should consider hiring a security czar

Say what?
3 posted on 03/09/2006 8:14:26 AM PST by Terpfen (72-25: The Democrats mounted a failibuster!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

There's nothing new here that wasn't discussed on the original thread.

Any computer that is going to be part of a business network has to have user accounts that cannot be escalated.


4 posted on 03/09/2006 8:15:42 AM PST by js1138
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker
All this FUD about Mac and security.

This can only mean in my mind that
the folks in Redmond are planning to
re-release NT with a new GUI and
charge big dollars for Vista

I understand it will require
800 Megabytes to load Vista.

b'shem Y'shua

5 posted on 03/09/2006 8:23:30 AM PST by Uri’el-2012 (Trust in YHvH forever, for the LORD, YHvH is the Rock eternal. (Isaiah 26:4))
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

While much of this is bunk, and I hate the word "czar" (makes me think of the US drug czar), Apple should, if they don't already, have a position of head of code audit and security.


6 posted on 03/09/2006 8:25:19 AM PST by antiRepublicrat
[ Post Reply | Private Reply | To 1 | View Replies]

To: Terpfen
Jobs & Co. should consider hiring a security czar

Say what?

The author is suggesting that Steve Jobs create a Department of Macintosh Security, and assign it a Public Relations budget to head off the fear, uncertainty, and doubt (FUD).

With authors like this on their side, such a position might be redundant. Just as our White House has an impossible time correcting the FUD that's out there, even though accurate and up to date information is available to all the reporters, average reporters are typically not interested in accurate. Accurate but unremarkable stories don't sell or draw readership. Finding remarkable stories is a lot of work, and usually dangerous.

And then there's the question of agenda.

7 posted on 03/09/2006 8:26:31 AM PST by coconutt2000 (NO MORE PEACE FOR OIL!!! DOWN WITH TYRANTS, TERRORISTS, AND TIMIDCRATS!!!! (3-T's For World Peace))
[ Post Reply | Private Reply | To 3 | View Replies]

To: Swordmaker
Business Week weighs in on the hacked Mac Mini story and gets it right... its FUD.

Well... it isn't complete FUD... the machine was still rooted through priveledge escalation.

These kinds of "privilege escalation" vulnerabilities have cropped up on the Mac over the years and date back decades to FreeBSD, the variant of Unix on which Mac OS X is based.

I don't call that FUD at all do you?

8 posted on 03/09/2006 8:27:51 AM PST by trashcanbred (Anti-social and anti-socialist)
[ Post Reply | Private Reply | To 2 | View Replies]

To: trashcanbred
Well... it isn't complete FUD... the machine was still rooted through priveledge escalation.

True. But in the security biz, there's a big difference between a "local" and a "remote" vulnerability. A local vulnerability can only be exploited by a user with login privileges--i.e., the computer's owner, or someone authorised by the owner to use the machine. A remote vulnerability, on the other hand, can be exploited by any random shmoe in Chechnya.

When people say Windows is "vulnerable", they mean that within a minute of connecting a new machine to the Internet, you're probably already infested with viruses and pwned by a Russian spammer. Nothing like that is remotely true of a Mac; you can connect an out-of-the-box Mac to the internet with essentially no fear.

9 posted on 03/09/2006 9:46:35 AM PST by Shalom Israel (There's a reason cows ain't extinct.)
[ Post Reply | Private Reply | To 8 | View Replies]

To: coconutt2000
The author is suggesting that Steve Jobs create a Department of Macintosh Security, and assign it a Public Relations budget to head off the fear, uncertainty, and doubt (FUD).

Yes, I know that. I'm questioning the logic and reasoning--assuming any exists--behind making that statement. A handful of stories overblown by antivirus companies and biased tech media means Apple should hire a security overlord? Whatever.
10 posted on 03/09/2006 9:48:04 AM PST by Terpfen (72-25: The Democrats mounted a failibuster!)
[ Post Reply | Private Reply | To 7 | View Replies]

To: Shalom Israel
When people say Windows is "vulnerable", they mean that within a minute of connecting a new machine to the Internet, you're probably already infested with viruses and pwned by a Russian spammer. Nothing like that is remotely true of a Mac; you can connect an out-of-the-box Mac to the internet with essentially no fear.

It isn't as bad as it used to be. MSFT used to leave tcp Ports 139 for Netbios and 135 for RPC wide open by default. My dog could get admin access. On the older versions of NT there was no way to even plug the ports. Even disabling Netbios would blow NT up.

People like J. Allard(he was MSFT TCPIP "guru", now he shaved his head and pushes Xbox's) used to claim there were no holes and that Netbios was secure... as far as I am concerned he is a putz and a friggin liar but that was the MSFT way. It cost them and everyone else a lot.

The OS's (2003 and XP-SP2) have come a long way in terms of being secure but... I think that the MSFT product groups still leave too many holes open. Outlook was just plain evil... basically it was a Hacker's VM.

11 posted on 03/09/2006 10:06:14 AM PST by trashcanbred (Anti-social and anti-socialist)
[ Post Reply | Private Reply | To 9 | View Replies]

To: Swordmaker
The Wisconsin Mac Mini held off the hordes of hackers. A Windows PC would probably have been broken into within hours. That speaks to the security and stablity of OS X. The server features are turned off by default and Apple ships their computers with root disabled. In the real world, you can't hack into a Mac unless its running root and you've given permission. So this story is misplaced panic and no one has yet written a successful Mac virus. On my Mac Mini all I run is an Intego NetBarrier firewall. Its pretty secure and stable.OS X doesn't need constant patching like Windows since it was designed with security before everything else went into it. The problem isn't Apple; its whether Microsoft has learned anything in its upcoming Windows Vista release.
12 posted on 03/09/2006 10:06:24 AM PST by goldstategop (In Memory Of A Dearly Beloved Friend Who Lives On In My Heart Forever)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Terpfen

The rest of my post to you addressed exactly your concerns as to whether it would be worth it.

Apple's response to the proposal was that there was no need for a security czar to oversee the actual response of coders to fix security issues.

But I also covered the fact that it doesn't matter how much accurate information Apple puts out regarding a FUD attack by the media. The media knows that FUD sells better than accurate, but unremarkable stories.

And then there is the fact that some in the media will have an agenda.

I also drew attention to the similar situation the White House has with the media and FUD. Lots of FUD, and the media ignores the accurate and factual information that would dispel the FUD. Agenda coupled with laziness. Easier to print FUD that sells than go out and get accurate facts that don't sell.


13 posted on 03/09/2006 1:18:18 PM PST by coconutt2000 (NO MORE PEACE FOR OIL!!! DOWN WITH TYRANTS, TERRORISTS, AND TIMIDCRATS!!!! (3-T's For World Peace))
[ Post Reply | Private Reply | To 10 | View Replies]

To: Terpfen

So yeah... Apple doesn't want a security czar, and it wouldn't change anything about how the media responds to FUD.

Sucks, but true.


14 posted on 03/09/2006 1:19:26 PM PST by coconutt2000 (NO MORE PEACE FOR OIL!!! DOWN WITH TYRANTS, TERRORISTS, AND TIMIDCRATS!!!! (3-T's For World Peace))
[ Post Reply | Private Reply | To 10 | View Replies]

To: coconutt2000

Which is why I'm dumbfounded at the idea. Maybe the writer just wanted traffic.


15 posted on 03/09/2006 1:20:14 PM PST by Terpfen (72-25: The Democrats mounted a failibuster!)
[ Post Reply | Private Reply | To 14 | View Replies]

To: js1138
Any computer that is going to be part of a business network has to have user accounts that cannot be escalated.

I agree... but there is more and more doubt arising as to whether this event ever happened. No proof has been offered. No explanation of how it was done... and many people extremely familiar with OS X are doubting the claims of Gwerdna andf the host's owner. It is looking more and more that this may be a hoax.

16 posted on 03/09/2006 5:49:06 PM PST by Swordmaker (Beware of Geeks bearing GIFs.)
[ Post Reply | Private Reply | To 4 | View Replies]

To: trashcanbred
Well... it isn't complete FUD... the machine was still rooted through priveledge escalation.

Was it? Where is the proof. Nothing has been posted that proves this ever happened. We have two guys who claim it... but both are unwilling to provide either proof or methodology.

17 posted on 03/09/2006 5:52:20 PM PST by Swordmaker (Beware of Geeks bearing GIFs.)
[ Post Reply | Private Reply | To 8 | View Replies]

To: trashcanbred
Well... it isn't complete FUD... the machine was still rooted through priveledge escalation.

With a local account and SSH access. So they put the keys on the table and left the front door open and there is shock SHOCK! that someone |-|4XX0r3d the system. Please. I'm sure there are security vulns in OS X, but this was not a real test.
18 posted on 03/09/2006 5:53:22 PM PST by dyed_in_the_wool ("O you who believe! do not take the Jews and the Christians for friends" - Koran 5.51)
[ Post Reply | Private Reply | To 8 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson