Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Linux security strong as ever
ZDNet Tech Update ^ | Jan 2, 2003 | Con Zymaris

Posted on 01/03/2003 11:22:08 AM PST by Schnucki

Linux security is as strong as ever, despite recent statistics that say otherwise.

Perhaps in response to the excessive publicity given to the strong security associated with Linux and open source software, it's no surprise that a number of commentators are making a high-profile argument that Linux, just like every other platform, does indeed have security issues. Members of the open source community have always known that Linux is not immune from security threats, so there is no argument there. What is in question is the final conclusion that these commentators are drawing, which is that Linux is less secure than Microsoft Windows.

Fighting for security for the past 20 years
Almost all Linux professionals are also Unix professionals, many of whom have been dealing with online security threats for over 20 years. Remember, the Unix community (and subsequently the Linux community) is the group that first created and still forms the backbone of the Internet. This community was dealing with serious security threats, like the Internet (i.e., Morris) Worm, before Windows NT even existed. Unix users know network and host security inside and out and were the first to implement almost all the intrusion-detection, perimeter-defense, and security-analysis technologies that our industry uses today. Linux/Unix is not invincible from security threats, it's true; but this group has spent the last 20-plus years ensuring that Linux/Unix is more secure than any other system.

Yet the pundits who have raised their voices in recent months, including people who should know better, like Paul Thurrott (of WinInformant), are questioning this generally accepted notion among IT professionals that Linux is more inherently secure than Microsoft's professional operating system platforms. For instance, Thurrott has stated: "In Friday's WinInfo Daily Update newsletter, I mentioned a set of statistics from BugTraq, a reputable security/information provider, that shows how various OSs compare security-wise. The statistics show a surprising trend: When you aggregate all the Linux distributions, Linux, not Windows, has had the most security vulnerabilities, year after year."

The Linux way
As I said earlier, there is no shame in conceding that there are no truly secure operating systems. There is only the ongoing process of trying to keep a host or network secure. Security is like a treadmill. If you don't move forward with security patches, security tools, and revamped system security processes, you'll be flung off the end of it. Oh, and by the way, the crackers have access to the treadmill's speed control knob, and they keep increasing the speed. Needless to say, security is a difficult and continuing effort.

The open source community has worked diligently to fight the good fight against security vulnerabilities. One of this community's basic security philosophies is, "With enough eyeballs, all bugs are shallow." This Linux axiom points to the fact that when a bug becomes an issue, many people have the source code, and it can be quickly resolved without the help of a vendor.

Windows Bugs are worse

It does, of course, help that most of the security issues that Linux faces are relatively benign, general bugs, and not the exploitable security bugs that wreak such havoc on Windows systems and networks. This point matters greatly when you are looking at the statistics of each security record, because five general bug issues are not in any way the same as five exploitable security bug issues.

A general bug that hits an individual user or site gets reported and resolved. Generally, it doesn't have the same impact as a security bug, particularly one that could exploit remote systems. A general bug (if catastrophic enough) can cause loss of data or system unavailability, but a security bug can cause your system to become "owned" by a cracker. A security bug can mean that you lose data through deletion, have data sent to your competitors or leaked to the trade press, have invalid data inserted into your records, or have customer credit cards stolen and so on.

Further, once vulnerabilities become known, they can spread on backroom IRC channels like wildfire. While you and a few others may encounter a general bug, a remotely exploitable vulnerability has the attribute of attracting penetrative tests against tens of thousands of hosts in a matter of hours, causing far more damage than a general bug.

Finally, catastrophic bugs that affect a large number of systems are few and far between. Most people do not tread the bleeding edge of operating system releases, and widely-used system and subsystem software don't usually harbor catastrophic, general bugs for long. Security bugs, however, can arise in code or in a subsystem, which is widespread and very well entrenched, further accentuating the possible spread of damage.

Because the general bugs can and do affect all operating systems, including Linux, it is clear that even the "with enough eyeballs, all bugs are shallow" idiom isn't perfect. But we do know that the security problem in Linux will be resolved at the source level, a surety we don't have with commercial closed-source or orphaned software.

Perhaps the most important advantage that open source software can provide is that widely used code subsystems that are shown to have security vulnerabilities are fixed and reissued quickly. Microsoft and many closed-source vendors have a woeful history of tardy or nonexistent vulnerability-resolution of their code. This has, thankfully, changed in the past year or two, more than likely due to the torrents of negative publicity poured on these vendors after each security threat announcement.

The numbers lie

Now, on to a rebuttal of Paul Thurrott's argument, and a hint to others who have tried to run the vulnerability numbers through the analysis wringer.

Thurrott claims that through the sheer, raw number of vulnerabilities calculated by BugTraq, Linux is less secure than Windows. Thurrott states:

"If you break down those numbers by Linux distribution (despite the fact that Windows 2000 and Windows NT are lumped together), Win2K/NT had 42 vulnerabilities in 2001 (data is through August only), and the leading Linux distribution, Red Hat, had 54. In 2000, Win2K/NT had 97 and Red Hat Linux had 95."

These numbers may, in total, be accurate. I don't dispute them. They appear to be slightly in Windows' favor. However, to my utter amazement, none of these industry observers has taken into account the substantial disparity in system functionality that is shipped on each platform and forms the software basis from which vulnerabilities arise.

I reviewed the broadly categorized functionality packages that ship with Windows 2000 Server, presuming it be a reasonable superset of a generally available Microsoft platform. I counted approximately 120 subsystems in Windows 2000 Server. These include Internet Information Services Web server, Active Server Pages (ASP) Programming Environment, XML Parser, and so on. Now, to compare, I quickly researched a list of subsystems that are shipped with a modern Linux distribution. SuSe had just such a list available for its 7.3 Professional release, so I used it to represent the Linux side of the equation.

The weigh-in? The Linux system had just under 2,600 packages. This means that, based on just this simple analysis, a modern Linux distribution ships with approximately 20 times more functionality in the box than what Microsoft ships with Windows 2000 Server. This is just a count of approximate functionality. With the hundreds of millions of lines of source code shipping for these platforms, a much deeper analysis would be untenable. When one does a quick and dirty calculation based on this new information, Linux, on a per-atomic-functionality basis, can be viewed as being 20 times more secure than Windows. This means that while Linux ships with 20 times as much material, it releases approximately the same number of security alerts as Windows.

Despite playing my own numbers game, the point here isn't to bicker about the statistics behind the research. What our industry needs is for security to be elevated to the front and center of design and coding practices. Any organization, community, or vendor that credibly attempts to achieve this is worth supporting. What should not, however, be condoned are instances where an organization or vendor touts this approach primarily as a cynical marketing exercise, without procuring end results.


TOPICS: Technical
KEYWORDS: linux; windows

1 posted on 01/03/2003 11:22:08 AM PST by Schnucki
[ Post Reply | Private Reply | View Replies]

To: Schnucki
The Linux system had just under 2,600 packages. This means that, based on just this simple analysis, a modern Linux distribution ships with approximately 20 times more functionality in the box than what Microsoft ships with Windows 2000 Server. This is just a count of approximate functionality. With the hundreds of millions of lines of source code shipping for these platforms, a much deeper analysis would be untenable. When one does a quick and dirty calculation based on this new information, Linux, on a per-atomic-functionality basis, can be viewed as being 20 times more secure than Windows. This means that while Linux ships with 20 times as much material, it releases approximately the same number of security alerts as Windows.

This has to be one of the most specious and ridiculous "analyses" I've ever read. Thank God this crap wasn't committed to paper. Trees deserve better treatment than that.
2 posted on 01/03/2003 11:55:29 AM PST by Bush2000
[ Post Reply | Private Reply | To 1 | View Replies]

To: Bush2000
Hey, careful there: maybe Microsoft is following this logic too. That would explain the extra gazillion lines of bloat in their products.

In fact, there might be a marketing slant here that MS hasn't tried yet:

"When you consider our source code, statistically speaking, we don't have any security alerts at all. (+/- 3%)"
;)
3 posted on 01/03/2003 12:17:03 PM PST by Schnucki
[ Post Reply | Private Reply | To 2 | View Replies]

To: Schnucki
Hey, careful there: maybe Microsoft is following this logic too. That would explain the extra gazillion lines of bloat in their products.

The problem isn't with trying to correlate volume of source code with bug reports. Rather, it's the fact that this lame "article" is comparing apples and oranges. Windows isn't organized in packages. Trying to make any comparison of the number of packages in Linux to Windows setup is therefore inane and irrelevant.
4 posted on 01/03/2003 12:36:25 PM PST by Bush2000
[ Post Reply | Private Reply | To 3 | View Replies]

To: Bush2000
Great points as always Bush 2000, I've never heard you say a bad thing about Windows. Nevertheles, screw Microsoft. I have half my servers on Linux or FreeBSD and I ain't going back. I've canned IIS (using Apache), canned SQL Server (using MYSQL), canned asp (using PHP), not even using Flight Simulator (using FlightGear). And my peace of mind and wallet are both mucho happier.
5 posted on 01/03/2003 12:47:50 PM PST by FastCoyote
[ Post Reply | Private Reply | To 4 | View Replies]

To: FastCoyote
If it works for you, great. Enjoy.
6 posted on 01/03/2003 1:02:29 PM PST by Bush2000
[ Post Reply | Private Reply | To 5 | View Replies]

To: Bush2000
The problem isn't with trying to correlate volume of source code with bug reports. Rather, it's the fact that this lame "article" is comparing apples and oranges. Windows isn't organized in packages. Trying to make any comparison of the number of packages in Linux to Windows setup is therefore inane and irrelevant.

I was having fun, ya wiener. :P

His "functionality" apologetics made me cringe too, at first, but he was responding to the same kind of apples & oranges you so despise. If you and I are reading the same article, he adds a disclaimer that this is just his own numbers game.

Sounds to me like you've had a crotchety day. You could do with a few fingers of whiskey and a little more time around Mrs. Bush2000 when the night draws nigh, me thinks. ;)

7 posted on 01/03/2003 1:11:45 PM PST by Schnucki
[ Post Reply | Private Reply | To 4 | View Replies]

To: Bush2000
... lame "article" ... .

Well, round 2:
With a little more time to think about it, it seems to me that you have latched onto an argument here and changed its meaning. Then, after having taken the author's poor, defenseless statements (by ripping them out of their cozy and intended context with a pair of rusty tongs), you try emotionally to use them in a new way that will negate the entire article and somehow shame anyone who might have agreed with it.

This sounds like a classic liberal approach. ;)

8 posted on 01/03/2003 1:34:52 PM PST by Schnucki
[ Post Reply | Private Reply | To 4 | View Replies]

To: Schnucki
If the author's arguments are truly without merit or basis in reality, why make them? It's pointless.
9 posted on 01/03/2003 3:23:55 PM PST by Bush2000
[ Post Reply | Private Reply | To 8 | View Replies]

To: Schnucki
What we have in this article are bogus statistics. While it is true that RedHat comes with more than 2000 packages, it is difficult if not impossible to compare this with the way that MS bundles their software.

The fact is, a the RH distro comes with tons more stuff than windows does. THere are multiple databases, irc/IM clients, webservers, media servers, various shells and other tools to ease automation, browsers, offfice applications, and even multile desktops so you can set up the system however you want with almost infinite customization available if you want to avail yourself of them. A direct apples to apples comparison to windows is pretty much impossible because you would have to go to several other vendors other than just microsoft to come close to what comes available, stock, with RH.

A better comparison would be to look at bugs and/or security fixes with some kind of reference MS system, like, say, an XP install with IIS, MSOffice, SQL server, Access, whatever their current media server is, and probably some other stuff I'm forgetting. The RedHat software being considered in this would be comparable. You'd have to make decisions such as the window manager, which Database server and webserver you use and similar things. You'd leave out all the user-based applications other than, say OpenOffice, and then compare the number and severity of remote exploits. Local exploits should probably be considered separately as I'd generally consider the thing a general purpose server rather than a desktop. Even if one does think of it as a desktop, many alerts and exploits can be fairly safely discounted. For example, if there is a bug announced in 'lpd' which is a Linux printer daemon that can only be exploited by local users, that is not much of an issue to me and can be patched at my convienience, as I rarely find myself wanting to hack my own box in a malicious manner.

I'm sure such a thing could be done by whatever organizations that care about such things. People would inevitably quibble over the results because of arbitrary decisions made of which database, desktop or browser to install, but overall, such things wouldn't really matter in the long run.

Overall, I'm confident that any major distribution of Linux will stack up very favorably with any Microsoft product on the security front, as I have worked on all kinds of different computers from IBM mainframes, various minis and PCs and I pretty much think I can recognise quality when I see it.

10 posted on 01/03/2003 5:15:17 PM PST by zeugma
[ Post Reply | Private Reply | To 1 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson