Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

IIS 5 Web Server Compromises
US-CERT ^ | 24JUN04 | US Government, Cert

Posted on 06/25/2004 1:53:54 PM PDT by familyop

click here to read article


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-65 next last
To: familyop
If by "white hat," you mean friendly testers who look for vulnerabilities so developers can plug them, that's the one most important key (no pun intended) to good security, I think

Agreed, but only if those processes are kept in confidence until the vendor or original author has a chance to release a tested patch. These supposed "white hats" in Europe and China who release newfound vulnerabilities and corresponding exploit code in open source form before patches are available should be treated as hackers who actually utilized the exploit. Not much difference really, if someone released the US nuclear codes I guarantee you we'd be looking for that person, it's a release of priveledged information either way.

41 posted on 06/25/2004 9:06:05 PM PDT by Golden Eagle
[ Post Reply | Private Reply | To 39 | View Replies]

To: Golden Eagle

"These supposed "white hats" in Europe and China who release newfound vulnerabilities and corresponding exploit code in open source form before patches are available should be treated as hackers who actually utilized the exploit."

Ah, so they're the bad guys! I was clueless on that phrase.

Yes, MS should employ more people and/or seek volunteers to try exploits for the sake of software security (with agreements to keep secrets, of course). If MS is already doing so (probably is), it should do so with more frequency and intensity. As far as I know, that and having thousands of users and developers doing so is the major edge that some open source systems currently have. MS might try a reward system if it can't pay them full time or get enough trustworthy volunteers.


42 posted on 06/25/2004 9:25:11 PM PDT by familyop (Essayons)
[ Post Reply | Private Reply | To 41 | View Replies]

To: familyop
"White Hats" is an industry term for benign, or friendly, hackers. "Black Hats" is an industry term for crackers, or bad guys.

GE, though, uses the terms interchangeably to mean whatever it is he wants it to mean at the time. He's pretty good at confusing non-tech people because he throws all these terms out in order to overload the reader with jargon.

Don't pay much attention to him. Most people on the tech forums treat him as the class clown.

In order to explain what he was talking about, I'll add that the people who do release code and exploit information, usually do so after the vendor has ignored them for a certain amount of time (days or weeks, sometimes). They release their information to the public for two reasons: to make the public aware they are not running a secure system, and to force the vendor's hand to actually fix the vulnerability. The reasoning behind this is that if they discovered this vulnerability, it's a virtual certainty that other people with not-so-good intentions have also found it and are trying to use it.

True, sometimes, the hacker may release the exploit without giving the vendor time to react, but those instances are rare. They are getting more common as MS is building a nice little reputation of just sitting on the information without doing anything about it.

One of the strengths of Free and Open Source Software (FOSS) is that software vendors want people to examine and test their code so that they may fix whatever vulnerabilities are in there. Hence, most FOSS exploits are fixed and patches are released literally hours after an exploit is found.

As a result of this, many Linux and FOSS exploits are reported on various web sites, giving the impression that FOSS is much more buggy that Windows and other CSS (Closed Source Software). The reality is that most (if not all) of those reported bugs are already fixed by the time you read about them.

If the sysadmin has his systems working properly, they can even patch themselves before he arrives the next morning--without rebooting the entire machine.

43 posted on 06/25/2004 11:13:06 PM PDT by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 42 | View Replies]

To: familyop

As you can see, guys like "shadowace" and "shadowman" don't like it when I start talking about security and/or property rights, and immediately resort to personal insults as you so clearly just witnessed. You're free to believe whoever you like of course, but I've been doing this work for over 20 years and currently pull a six figure salary based on my expertise. I'm white hat through and through, but keep your eyes out for black hatters. They're everywhere, and their specialty is bluring the lines between the two.


44 posted on 06/26/2004 6:02:09 AM PDT by Golden Eagle
[ Post Reply | Private Reply | To 42 | View Replies]

To: Golden Eagle

I don't mind at all when you start talking about security. But you really need to explain the whole situation--not just those parts that suit your current needs.


45 posted on 06/26/2004 8:46:18 AM PDT by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 44 | View Replies]

To: ShadowAce

And you need to quit calling names when someone doesn't agree with your philosophy. I'm no clown when it comes to these subjects, bub, as your countless string of decimated posts has shown.


46 posted on 06/26/2004 8:50:23 AM PDT by Golden Eagle
[ Post Reply | Private Reply | To 45 | View Replies]

To: ShadowAce
They are getting more common as MS is building a nice little reputation of just sitting on the information without doing anything about it.

Not according to professional analysis that's on record. If you'll follow the link ScuzzyTerminator tried to hide in the parent article, you'd see the report from Forrester Research showing Microsoft leads the industry in that regard.

Fast Response by Microsoft...findings show that Microsoft, on average, released a fix for all 128 security flaws during the period within 25 days of a vulnerability's disclosure. That compares with 57 days for Red Hat with 229 flaws and Debian with 286, 82 days for MandrakeSoft with 199 flaws and 74 days for SuSE with 176 flaws.

One of the strengths of Free and Open Source Software (FOSS) is that software vendors want people to examine and test their code so that they may fix whatever vulnerabilities are in there.

But so far there's no proof anyone but bad guys are looking at it. The US government even tried to put up a website so the claimed white hatters could post security problems found in the open source. Thing is, nobody did.

Two years after its hopeful launch, a U.S.-backed research project aimed at drawing skilled eyeballs to the thankless task of open-source security auditing is prepared to throw in the towel. Cowan hoped that the system would produce the same cocktail of goodwill and computer-judged competition that fuels other successful geeky endeavors, from the distributed computing effort that recognizes top producers in the search for new prime numbers, to the "karma" points awarded highly-rated posters on the news-for-nerds site Slashdot. In the end, though, nobody showed up.

47 posted on 06/26/2004 9:12:07 AM PDT by Golden Eagle
[ Post Reply | Private Reply | To 43 | View Replies]

To: ShadowAce

Actually here's ScuzzyTerminator's thread, you guys push so much bull around here it's hard to keep up.

http://www.freerepublic.com/focus/f-news/1159038/posts


48 posted on 06/26/2004 9:14:16 AM PDT by Golden Eagle
[ Post Reply | Private Reply | To 45 | View Replies]

To: Golden Eagle

I did not call you a clown. Nor did I use any other names.


49 posted on 06/26/2004 9:24:36 AM PDT by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 46 | View Replies]

To: ShadowAce
It's obvious who the real clown is.

See I didn't directly call you one either.

50 posted on 06/26/2004 9:44:09 AM PDT by Golden Eagle
[ Post Reply | Private Reply | To 49 | View Replies]

To: Golden Eagle; All

About firefox0.9, my wife has been unable to open a game page using this browser, any idea why that might be?


51 posted on 06/26/2004 9:48:22 AM PDT by eastforker (All those in favor of abortion have already been born. Ronald Reagan)
[ Post Reply | Private Reply | To 48 | View Replies]

To: eastforker
About firefox0.9, my wife has been unable to open a game page using this browser, any idea why that might be?

Sounds like Firefox, if other browsers open it fine. I'd recommend IE or Opera, closed source options.

52 posted on 06/26/2004 9:50:57 AM PDT by Golden Eagle
[ Post Reply | Private Reply | To 51 | View Replies]

To: eastforker

What's the URL? Perhaps I can assist.


53 posted on 06/26/2004 9:53:49 AM PDT by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 51 | View Replies]

To: Golden Eagle

Closed source options?


54 posted on 06/26/2004 9:53:56 AM PDT by eastforker (All those in favor of abortion have already been born. Ronald Reagan)
[ Post Reply | Private Reply | To 52 | View Replies]

To: eastforker

MS IE
Opera
Possibly Netscape, if it's market hasn't already been stolen by one of the duplicate open source clones.


55 posted on 06/26/2004 10:12:25 AM PDT by Golden Eagle
[ Post Reply | Private Reply | To 54 | View Replies]

To: Golden Eagle; ScuzzyTerminator
If you'll follow the link ScuzzyTerminator tried to hide in the parent article,...

See, this is why people don't take you seriously. If you would discuss the issues without assigning motive to how an article is posted, perhaps you would get a better response.

I see no evidence of him "trying to hide" anything. The link is there for all who care to follow it. Your problem is that unless a person is as fanatical as you are, then they are "zealots" who troll against the US economy.

Believe it or not, most readers of these threads can spot idiots without said idiocy being overtly pointed out at every turn. Try actually discussing issues on technical merits rather than emotional ones, and you may start to gain some respect.

BTW--agreement != respect. Respect can exist without agreement on every issue.

56 posted on 06/26/2004 10:19:31 AM PDT by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 47 | View Replies]

To: ShadowAce
The link is there for all who care to follow it.

There is a problem with it, blurs into another one just like you like to blur white hat and black hat.

Your problem is that unless a person is as fanatical as you are, then they are "zealots" who troll against the US economy.

This conversation was fine, going quite well as a matter of fact until you entered the discussion and starting throwing names like "class clown" in your very first post. Go back and see for yourself, everyone else already does.

57 posted on 06/26/2004 10:27:16 AM PDT by Golden Eagle
[ Post Reply | Private Reply | To 56 | View Replies]

To: ShadowAce

"He's pretty good at confusing non-tech people because he throws all these terms out in order to overload the reader with jargon."

That's funny. I haven't seen those phrases on the most technical of OS fora at all. ...thought it might be MS or Mac terminology. Are the new Euro-Linux hordes using spacey descriptions like that now?


58 posted on 06/26/2004 1:28:01 PM PDT by familyop (Essayons)
[ Post Reply | Private Reply | To 43 | View Replies]

To: Golden Eagle

"These supposed "white hats" in Europe and China who release newfound vulnerabilities and corresponding exploit code in open source form before patches are available should be treated as hackers."

Okay, so they're bad guys.

"I'm white hat through and through, but keep your eyes out for black hatters."

Oh! So they're good guys! I'm confused.

Okay...not really. I get it now. It's funny, though. We who spend time learning about non-SysV UNIX systems don't keep up with the language of lawyers and marketing management babes much. We don't even read People Magazine.


59 posted on 06/26/2004 1:44:05 PM PDT by familyop (Essayons)
[ Post Reply | Private Reply | To 41 | View Replies]

To: Golden Eagle
"Is MS putting much effort into trying cracks against its own systems to catch problems before they come from crackers?"

"Absolutely is my understanding. At one time this may have been the only way much security was being done, rather than designing from a intial secure state."

...you mean code auditing? Yes, that's a good way to go. It keeps the multitudes of port scanners from exploiting holes in the system in front of me. My neighbors, on the other hand, don't access the Internet much, any more, regarding their system as their enemy and all.
60 posted on 06/26/2004 1:50:18 PM PDT by familyop (Essayons)
[ Post Reply | Private Reply | To 40 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-65 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson