Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Is Linux security a myth?
The Register ^ | 16 February 2005 | Tony Locke

Posted on 02/16/2005 10:13:59 AM PST by ShadowAce

Comment There are rare occasions in IT when a particular architecture reaches a point where it stops being purely IT driven and takes on a life of its own.

The last year has seen the open source movement reach such a cult status; and at the vanguard of open source fashion can be found the Linux operating system. While the platform appeals at several levels for potential users, some of a philosophical nature and others far more concrete, it is noticeable that a couple of its qualities have recently been called into question.

Microsoft, a supplier of operating systems with which Linux competes, has recently taken to the press to question two of the pillars upon which Linux and Open Source have made their names - cost of ownership and security. Now questions concerned with the cost of ownership of any system, Linux, Windows or otherwise, are incredibly complex to resolve and, frankly, very few organisations have any idea regarding how much they spend on IT ownership at a system, application or platform level.

However, when it comes to the question of security regarding Linux as a platform, Nick McGrath, head of platform strategy for Microsoft in the UK, has been quoted as saying: "The biggest challenge we need to face centres on the myth and reality. There are lots of myths out there as to what Linux can do. One myth we see is that Linux is more secure than Windows. Another is that there are no viruses for Linux."

In one respect, McGrath is correct and this concerns the lack of malicious code threats to Linux. Over the last few months, several instances of malicious code have been discovered that target Linux explicitly. However, the number is extremely small compared to the number of attacks launched against Microsoft Windows, and indeed against several other operating systems.

There are several factors behind there being a far smaller number of attacks against Linux. Not the least of these is the fact that the platform, whilst it is gaining traction fast, is still relatively small in the world of business critical production systems. It will be interesting to see how the attack threat develops as Linux continues to move into everyday business use, although the open availability of the code base on which Linux is built should help to minimise the number of security holes that exist in the code.

However, some people are also questioning whether the open source model itself can provide organisations with both the security and the comfort that they require to run Linux in vital operations. Once again, McGrath asked the question: "Who is accountable for the security of the Linux kernel? Does Red Hat, for example, take responsibility? It cannot, as it does not produce the Linux kernel. It produces one distribution of Linux."

Missing the point

In this area McGrath is completely missing the point. In the vast majority of circumstances, when a customer builds a solution on the Linux operating system, they do so using a distribution of the operating system, not the kernel alone. And when a mission critical system is deployed, it is almost unknown for the organisation concerned not to take out support cover for the operating platform. With major IT vendors such as IBM, HP, Novell (SuSE) and Red Hat offering to support Linux, there is no shortage of suppliers willing to provide as good a security guarantee, in terms of patch management, as that provided for any other operating system, including Windows and the leading Unix platforms.

Using Linux is itself no guarantee of "security". The same is true for all operating systems. Each platform needs to be managed actively. Bugs, viruses and other malicious threats to a system will occur. This is why it is vital that every IT system be supported with excellent management procedures to ensure its long term availability and security. Technology alone is never "secure".

However, there are no obvious security issues visible today to indicate that Linux is not ready for enterprise deployment. The code base is managed by all of the distributors and enjoys the active backing of many of the largest IT vendors. Security and Linux may be a myth, but no more so than for any other operating system. A Linux platform needs to be managed in the same way as any other. However, at the moment, the number of threat notices that the operating system attracts every day is relatively small.

Linux does have an active role to play in business and the platform continues to mature rapidly on all levels, including security. Is it perfect today? No. Is it perfectly secure? No. But then no operating system available today is perfectly secure, although zOS on the IBM mainframe gets pretty close. Is Linux "Security" A Myth? Yes, but then all "security" is a myth; people and processes secure systems, not technology alone. However, Linux is usable, relatively secure and enjoys support enough to allow its use in mainstream business where appropriate. Oh, and it is being used.


TOPICS: Business/Economy; Technical
KEYWORDS: linux; lowqualitycrap; microsoft; security
Navigation: use the links below to view more comments.
first 1-2021-4041-6061-80 ... 161-175 next last

1 posted on 02/16/2005 10:14:01 AM PST by ShadowAce
[ Post Reply | Private Reply | View Replies]

To: rdb3; chance33_98; Calvinist_Dark_Lord; Bush2000; PenguinWry; GodGunsandGuts; CyberCowboy777; ...

Linux Security ping!


2 posted on 02/16/2005 10:14:40 AM PST by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

Wow! An entire arcticle that says nothing.


3 posted on 02/16/2005 10:18:18 AM PST by dagar
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

Yes, it is. There's very few people looking for holes in the code to launch malware upon because the payoff of potential victims is so small. Also the code is wide open for anyone who may decide to one day begin looking for holes in Linux, and that includes the malware authors.

Open source proponents claim the number of "good eyes" will exceed the number of "bad eyes", but that's only their hope, they have no way of quantifying their claim. In fact, attempts to show that ANY good eyes were reviewing open source code for security issues have failed, such as this:

http://www.securityfocus.com/news/7947


4 posted on 02/16/2005 10:19:29 AM PST by Golden Eagle
[ Post Reply | Private Reply | To 2 | View Replies]

To: dagar
Not necessarily. Many people on this forum have expressed the opinion that Linux proponents claim that Linux is bullet-proof, etc.

I posted this partially as a discussion point, but also as a refutation of that myth.

5 posted on 02/16/2005 10:24:35 AM PST by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 3 | View Replies]

To: Golden Eagle
Also the code is wide open for anyone who may decide to one day begin looking for holes in Linux, and that includes the malware authors.

And, of course, hiding the code has proven to work wonders, hasn't it?

6 posted on 02/16/2005 10:25:40 AM PST by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 4 | View Replies]

To: ShadowAce


I believe this is so, same with Macintosh security. The simple reason is that there installed base of Windows dwarfs the rest combined.

Now, open source MIGHT have an advantage because of the "good eyes", but that remains to be seen.

Don't bust my chops either, I have a Mandrake 10.1 installation at home, and am in the process of justifying me a miniMac purchase!


7 posted on 02/16/2005 10:26:20 AM PST by Paradox (Occam was probably right.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

This does not address the end-user security issues, which involve millions of ignorant users running Windows on the desktop and connecting to the internet.

They would almost certainly be helped by running Linux instead, because they would be running under a user account and not as root. If you're a desktop, you don't have to offer any network services, so they'd be as close to completely secure as you can be.


8 posted on 02/16/2005 10:27:38 AM PST by proxy_user
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

Eh. Linux and Windows fanboys aside there are no absolutes in IT -- esp when programmers are involved. Linux core most likely is more secure. But like anything else, who runs 'kernel' as their enterprise service(s). Lump on the IIS, Apache, PHP, .Net, SQL, CGI, then get ready to get hacked ;)


9 posted on 02/16/2005 10:28:08 AM PST by dagar
[ Post Reply | Private Reply | To 5 | View Replies]

To: ShadowAce
Microsoft, a supplier of operating systems with which Linux competes, has recently taken to the press to question...

MS FUD ALERT!!!

10 posted on 02/16/2005 10:32:34 AM PST by E. Pluribus Unum (Drug prohibition laws help fund terrorism.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce
"Many people on this forum have expressed the opinion that Linux proponents claim that Linux is bullet-proof, etc."

Not only that, they also think that Firefox/Mozilla, Opera, Lindows, Apple, (anything but Microsoft) is the world's savior and can do no wrong, never get a virus, never get spyware and never crash. And all the problems with all internet connections is the result of the villians knows as Microsoft.

11 posted on 02/16/2005 10:34:32 AM PST by TommyDale
[ Post Reply | Private Reply | To 5 | View Replies]

To: ShadowAce
I run a small lab of mixed Windows, RedHat and Suse platforms.
Used to be we only had to apply Windows security updates - in fact we ran most of our servers on Linux to avoid the down time that updates required.
Now we're getting slammed by corporate to apply fixes for Linux platforms as well. RedHat and Suse.
Are they real exposures? Are they covering their a$$es?

Who knows... all I know is I'm spending too much time applying "fixes" to about 70 machines.
Going behind a secure, disconnected LAN next week. One gateway/firewall to the world. I'm fed up.

12 posted on 02/16/2005 10:37:34 AM PST by grobdriver (Let the embeds check the bodies!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Golden Eagle

Err...there IS a group working at getting Linux (or at least one distribution thereof) formall certified as being military-level secure, something Windows can't claim.

(Don't have the details handy, but they're out there nonetheless.)


13 posted on 02/16/2005 10:38:04 AM PST by ctdonath2
[ Post Reply | Private Reply | To 4 | View Replies]

To: ShadowAce

Linux is definately not bullet proof, but out of the box it blows Windows away, and configured by a competent security person, it makes Windows, even if configured by a competent security person look very poor.

As software becomes commodity, opensource will continue to dominate. Commercial software will be left with niche specialty verticle markets.


14 posted on 02/16/2005 10:38:09 AM PST by HamiltonJay
[ Post Reply | Private Reply | To 5 | View Replies]

To: proxy_user
In question to your suggestion that millions of ignorant users would be helped by running Linux.... Where would they get support? Please do not suggest that the end user could fetch the latest rpm, install into the proper source code tree, build and debug, install and reboot.
15 posted on 02/16/2005 10:38:36 AM PST by rit
[ Post Reply | Private Reply | To 8 | View Replies]

To: ShadowAce
Closed source code is an additional step that malware authors must contend with.

Linux has other problems like immature ACL permissions (if at all), immature single sign on (if at all), a kernel that gives device drivers complete control, and a slowly evolving security hole reporting process. There was a big bruhahah just a month or so about it, should be something over on LWN.NET.
16 posted on 02/16/2005 10:39:36 AM PST by Golden Eagle
[ Post Reply | Private Reply | To 6 | View Replies]

To: dagar
Lump on the IIS, Apache, PHP, .Net, SQL, CGI, then get ready to get hacked

Not to be a stickler, but if you run Linux and then want to run IIS on it, let alone .NET you probably have issues above and beyond your security plans.

17 posted on 02/16/2005 10:39:55 AM PST by HamiltonJay
[ Post Reply | Private Reply | To 9 | View Replies]

To: ctdonath2
Err...there IS a group working at getting Linux (or at least one distribution thereof) formall certified as being military-level secure, something Windows can't claim.

Err...I work for the DoD and our Windows sytems have overall higher classification ratings than any version of Linux.

18 posted on 02/16/2005 10:41:21 AM PST by Golden Eagle
[ Post Reply | Private Reply | To 13 | View Replies]

To: HamiltonJay

Zone-h has taken over for attrition.org in maintiaing realtime stats for overtly compromised websites. Today, like most any other, Linux is taking a beating...

196 single IP
267 mass defacements

Linux (78.4%)
Win 2000 (14.7%)
FreeBSD (3.0%)
MacOS (1.5%)
Win 2003 (0.9%)
Win NT9x (0.4%)
SolarisSunOS (0.2%)


19 posted on 02/16/2005 10:43:06 AM PST by Golden Eagle
[ Post Reply | Private Reply | To 17 | View Replies]

To: ctdonath2

Before you ask, I'm at home on my lunch break. Heading back now. OUT.


20 posted on 02/16/2005 10:44:11 AM PST by Golden Eagle
[ Post Reply | Private Reply | To 13 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-4041-6061-80 ... 161-175 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson