PC Mag - Mac OS X Insecure 991
Suki writes "In this recent story a PC Mag writer concludes that "Panther and Jaguar were not better at outrunning vulnerabilities than Windows" and as my personal fav. ends by asking "How cocky are you feeling now, Mac elite? Hmm. Suddenly it's gotten pretty quiet around here." The article discusses many previous Windows security holes against a recent Mac OS X security flaw."
Good points... (Score:4, Insightful)
Until this is fixed, the same attacks will be much more effective against Windows users just because of the rights the current user has on the box.
Quick, someone mod parent down! (Score:5, Funny)
Re:Good points... (Score:5, Insightful)
It's almost root.
W/o some extra frobbing of permissions, all the Applications (in /Applications) are world writeable by users in the 'admin' group.
The first user in macosx is in the 'admin' group. Unless you make a 2nd user for yourself, you can basically overwrite anything in the Applications folder.
files /System/Library is root:wheel; 755, so that mitigates an OS-level attack... but still.
Re:Good points... (Score:5, Insightful)
Mac OSX is not perfect
To bash Macs... it's paragraph after paragraph of "See? I told you so."
I own a mac, but I use PC's at work and home, I barely notice a difference between the two when I move between them because most of the apps that I use, like Office and Mozilla are fairly close in appearance and functionality.
BUT... the absolute, positive, no questions asked fact, is that last time my office of 300+ people had some worm running around, my mac was NOT infected and I was not required to jump through IT-hoops for hours to get rid of it or prevent it from happening.
Whether or not it has flaws or not is a stupid question, of course it does... but so far they haven't proven to be anywhere near as disasterous as the bullsh*t that we have to deal with from Windows.
Re:Good points... (Score:4, Informative)
Re:Good points... (Score:4, Insightful)
Re:Good points... (Score:4, Insightful)
Re:Good points... (Score:4, Insightful)
Yes, Mac has a lesser market share. So you're 100% sure that's the reason viruses don't exist?
Don't you think SOMEONE would like to brag about the writing the first Mac virus?
Re:Good points... (Score:5, Insightful)
This in and of itself is another 50 pounds of "bite my shiny metal ass, Micro Soft apologist" to hand to the author of this article (i RTFA as well - he carped on a LONG time about this one quite obscure vulnerability, and didn't bother to name a single Mac virus or mail.app worm.. i wonder why?)
Until Microsoft changes their ways on having every useless network service turned on by defualt and making it easy (read: not requireing use of Regedit) to turn off and on services (read: Sharing System Preference Panel - checkboxes for all services), Macs will continue to be far less vulnerable to attacks than Windows is.
Re:Good points... (Score:5, Insightful)
Then how come... (Score:5, Insightful)
Re:Good points... (Score:4, Informative)
Sure, unless you happen to turn off the RPC service, in which case the services panel will no longer work! Classic MS incestuous garbage; in order to use the GUI to enable/disable services you must have the (formerly horribly insecure) Remote Procedure Call service running!
Re:Good points... (Score:5, Funny)
Because of the hundreds of holes in Windows some attacker can compromise a Windows server in the local subnet and then use it to spoof the DHCP servers to gain access to the Mac.
Re:Good points... (Score:4, Interesting)
Just checked Start -> Control Panels -> --------
i have no Service control panel.
If this mythical beast is not located in the Control panels where mere mortals live - wherefore art those average users who could find it?
(after 3 minutes of looking around, and because i (conned) the guys at work to give me Admin privs on this machine (99% users here do not) - i found the gizmo under the Administrative Tools applications folder under the start menu.. AFTER i "turned on" that folder in my start menu - for clarity)
if that's "easy to use, checkbox for all services" i'm Paris Hilton.
Re:Good points... (Score:5, Interesting)
12.10.2003
Internet Explorer Spoofing Vulnerability Found
12.10.2003
Security Experts Warn of New Way to Attack Windows
This same "exploit" Apple claims is normal [slashdot.org]. One "exploit" will not make Mac users eat crow. Let's see some real OS X viruses and Apple having to release so many patches that it moves to a monthly bug release program first.
Re:Good points... (Score:5, Insightful)
The point, however, is that it's extrememly difficult and/or impossible to write an autonomously propogating virus or worm for OSX that doesn't require active user intervention. Contrast with Windows...
Not really (Score:4, Insightful)
The real problem is that Mac OSX (and most other systems) have a fundementally sound architecture, while none of the the current Windows do. I suspect that Longhorn is taking a long time to get around these huge design holes, but the current ones have them and there is nothing that can really stop these. In fact, MS has confirmed it numerous times in gov. and court hearings.
So yes, the *nix based system will continue to have holes (in fact what system does not), but they have a much more sound design from the ground up. Hopefully, Longhorn will as well.
Re:Not really (Score:4, Interesting)
Not quite.
In the NT kernel, most (all?) objects have ACLs associated with them which allows much finer granularity than under a traditional UNIX-y kernel.
Imagine UNIX with finer-grained security. Now run many network-enabled services without the end-user's knowledge. Add automatic execution of downloaded code in the form of ActiveX controls, and remove the ability of those running the binaries to examine the source code.
Now revise everything in the system several times, adding new APIs while keeping existing ones more or less intact. Don't worry about establishing system-wide conventions among development teams -- they have better things to do.
Add the need to throw in nifty technologies to dethrone competitors.(1)
Now stop and think about how you've gained your acceptance. Realize that what people like to use at home will carry across to work. Realize further that people don't want to deal with permissions, or ACLs, not having administrative access, and not being able to play the latest-greatest game.
To gain home acceptance, ship a home edition of your operating system which allows the default user to do damned near anything on the machine. Make auditing of running services difficult and obscure. Above all else, don't confuse the user, or ask them to slow down even enough to realize that certain actions may compromise system security more than others.
Now stop and think about how little having finer-grained security really did to make the OS more secure overall.
The problem isn't that Windows lacks a "fundamentally sound architecture." The problem is all of the extra crap that gets thrown on top without really thinking things through.
1) I'll see your Java sandbox and raise you an ActiveX control!
Re:Good points... (Score:5, Interesting)
For the record, I'm not a Mac user and my few attempts at using it ended in annoyance and frustration. It does not, however, take a genius to recognize the logical leaps inherent in the author's petulant outburst.
To wit:
1) A single flaw does not compare to the egregious history of security problems on Windows.
2) The conjecture that if Mac OS were more used than Windows, it would have the same vulnerability rate is just that, conjecture, and it is unsupported in the article.
3) The iTunes/iPod "hack" is not comparable to an operating system comprimise. It is a comprimise of a digital restrictions management (DRM) system. DRM systems are known to be inherently vulnerable and practically insecurable. Nobody but deluded content industry executives expect DRM systems to have any more than brief protection. Also, once broken, they can't be fixed.
4) The swipes at Mac "zealots" are irrelevant ad hominems
5) The complaint about the complexity of MacOS X is silly. All software is complex. Some is just done worse than other.
There's nothing here to see.
Re:Good points... (Score:5, Interesting)
Actually on the 12/02/03 episode of the linux show, Eric Raymond made a very good point that pretty much debunks this particular piece of FUD spread by Microsoft and Windows apologists. He said that if the number of bugs/vernerabilities of a piece of software were merely a function of the number of deployments of the software, then we would see far more bugs and vernerabilities in Apache, which currently has 67% of webserver deployments, than in Microsoft IIS, which only has 20%. Instead we see the exact opposite with far more bugs and vernerabilies in IIS. So, unless MS or Mr. Ulanoff can provide proof for their claims, then they are just spreading FUD!
Re:Good points... (Score:4, Interesting)
Ok, no OS is immune (not even the beloved linux) to security flaws. To compare one hole in OS X to thousands upon thousands in windows is stupid. I've heard the windows is more popular so thats why it has more viruses argument before and it's BS! Windows is insecure by design.
I use linux and Mac OS X exclusively. I haven't had a problem with either of them. It's kindof like locking your car door... can someone break in? Sure they can, so maybe you have the club or an alarm (or both)... can they still break in? Yes, it just takes a little more time and effort. Windows is like leaving your car unlocked and the windows rolled down. Linux and OS X at least lock the doors and set the alarm.
Re:Good points... (Score:5, Insightful)
Re:Good points... (Score:5, Informative)
As others have noted, yes, you do. The main user you are asked to create when you setup a machine is an admin, and that is the account that most home users use.
Re:Good points... (Score:5, Interesting)
You may not think that's a big deal, but I've seen some good hacking done via console usurption -
root is installing software and gets phone call (or goes to the can - I've seen both happen). As soon as root user walks away, the guy at the terminal next to him suspends the install, adds his name to a
On the other hand, a hacked mac admin account where the password is known gives full access on macs and probably won't on UNIX unless the user was root (hacking a sudoer probably won't give you full access). Essentially, OSX relies more on passwords for security and Unix relies more on a specific user (root) for security and both have their advantages and disadvantages.
On Windows, though, an admin user is an admin user and has full permissions to do anything they want, including create more admin users or wipe the entire OS. The only good thing about Windows in this respect is that it is more difficult to remotely control the machine because of its single user origins.
I love using my XP Pro box for games - it dual boots linux, and has been amazingly stable for a MS OS, but I keep it safely behind a UNIX firewall for a reason - I don't like patching daily, I don't like the endless stream of worms I see trying to get in, and I don't want to give easy access to the script kiddie hackers that hit my firewall 100s of times every day (yes, they're logged and their IP automatically blocked after 50 failed attempts [hey, I'm generous - and I've screwed up login at least 5 times in a session myself]... now if only I could ban DHCP so they'd permanently go away...)
Re:Good points... (Score:5, Informative)
Re:Good points... (Score:5, Insightful)
XP Home sets up the administrator account with a password and a local account with administrator rights without a password AND without inbound network access. (Important part there)
Re:Good points... (Score:5, Interesting)
Well, that's a little cocky :-). Here's a story - I had a Win2k machine that I used for ICS a year or so ago. It got hacked because I hadn't installed a firewall on it.
Learning my lesson, I vaped the machine, then installed Win2k from a CD. Then I installed the ADSL modem drivers, and went to ZoneAlarm's website and installed Zone Alarm. Then I ran Windows Update, and got all the latest patches.
Finally I installed Norton Anti-Virus. It told me I had already been infected by a trojan (a different one to the one I had previously been hit by).
Basically, if you aint got all the patches on CD/HD, you can be hit quite easily during an install. It depends on the network you're using - on BT ADSL I used to get scanned all the time - I've moved to another provider, and I don't get anything like the number of attacks. My Dad is on dial-up, and he gets port-scanned about once every 30 seconds, sometimes more often.
Yes, this is 2k, not XP, but I believe it's not beyond the bounds of possibility that a similar thing could happen with XP. It's good news that MS is (thinking of) enabling the firewall by default in XP SP2 - but again, that's a service pack, that you have to download :)
And yes, you can have it downloaded, but by God, MS usually manage to make it as difficult as possible to just download the whole patch as one file that you can install later/on other PCs. Grr.
Re:Better way: (Score:5, Insightful)
Some people tell me I should set up an old PC to run Linux and configure that as a router, but they don't seem to understand that:
* That requires significant effort on my part
* My router is small (paperback book size)
* It doesn't make loads of noise and consume loads of power.
* When I occasionally get problems with my connection (about once every 2 months), whatever the problem, it's usually solved by toggling the router power switch, and takes a few seconds.
But you can't tell some people...
Re:Good points... (Score:5, Informative)
so, there's a hole (Score:5, Insightful)
was it worth the rant, or has he just been waiting a long time to make it?
Not much of a comparison (Score:5, Insightful)
Mind you, I'm not too overwhelmed with his research; if he'd been paying attention, he'd have caught the SSH vulnerability the other month. It's not like Macs have been immune, and nobody with any clue claims they are.
What you can claim accurately is that Apple fixes holes promptly and fairly quickly, and that the MacOS X architecture does not have flaws which result in two or three active IE holes in the wild right now.
Apple isn't perfect, they're just pretty good. Microsoft isn't evil, they're just not as good as they should be. It's perfectly reasonable to use those two facts in making one's security decisions.
Re:Not much of a comparison (Score:5, Interesting)
The other thing that you can claim is that Apple appears to perform more thorough testing of their security patches. I have been using OS X since beta and I have yet to have applied a patch that has caused any real pain. Windows on the other hand......Well, I cannot count the wasted hours I have spent either rolling back an update or scrubbing the hard drive clean and doing a reinstall due to Windows either seriously corrupting things or even worse, outright killing a machine. In fact, at our lab it was a W2k security update that killed a machine dead that was responsible for us replacing all of our W2k systems with 17in iMacs running OS X. I simply got tired of the grief associated with maintaining a Windows computer. We use our systems to get work done, not to goof around with maintaining Windows.
Re:MOD THIS DOWN (Score:4, Funny)
Those BASTARDS! How can you get any work done in Jaguar without this critical feature. I just can't believe that somebody inside Apple decided not to backport this.
*cough*
Jesus Christ.
Please also keep us posted on the progress of the bug whereby a 20" iMac cooled to nearly absolute zero incorrectly reports a temperature value of MAXINT. That one's really slowing me down at work and if they don't fix it soon I'm gonna have no choice but to switch back to Windows.
Re:Not much of a comparison (Score:5, Insightful)
Lance writes: I know this is wrong, but in one respect I was happy to learn earlier this month about the discovery of a significant security hole in the Jaguar and Panther versions (10.2 and 10.3, respectively) of the Apple operating system (OS).
Lance, let me tell you. It's not wrong for you to feel this way
Get a grip on yourself, man! Stand up straight, take the panties off your head and start acting like you've got a pair! Repeat after me, I am not the products I buy. Sometimes the products I buy work out, sometimes they don't meet my expectations. When they fall short, it is not a reflection of who I am, my intelligence or the size of my magic wand. If the product fails, it is a reflection of the manufacturer.
Now go out there and do something useful with your life like kicking the butt of the manufacturers who sold you inferior products!
What a bunch of crap (Score:5, Insightful)
Personally I would not have made that choice, but at least there was check box to turn off the default DNS trust. If only windows came with checkboxes to remove its bugs. And I dont mean like checkboxes that say "turn off scripting and cripple my browser please".
In fact mac has not even fixed the so-called hole because its not neccessarily a mistake.
In any case the SSH vulnerability, and the screen-locker vulnerability were in fact true holes created by mistakes. These are what should be scrutinized. But these did not lead to widesperead network worms at least. they did not arrise out of a insecure by desing attitude that pervades all the Active-X philosopy, the power-user-by-default philosophy, the standards crushing embrace-and-extend, the optional log-in password philosophy, or the add features rather than fix bugs philosophy that rightfully inspires all the anti-windows zealotry.
firmware password unsecure: Horrors!!! heavens!!!! (Score:4, Insightful)
This means anyone can walk up to your machine and boot it into single user mode and completely root you.
oh my god you mean someone with physical access could also somehow DNS spoof net info and get root access. Oh my alert the media.
The point is where one draw the line between ease of intergration versus security becomes cloudy once one gets to the point of requiring physical access to engage in a hack. The ONLY thing that I see distinguishing these analogous root attacks is that most people are aware of the single-user boot attack and though it was well documented the DNS attack was not well known and thus could have surprised a lot of people.
Fixing this now presents apple with a dilema. Consider that happens if they were to issue a security update that went around and turned off this feature. Suddenly all networks that had actually been using it suddenly stop working and some sysadmin has to figure out why then reconfigure every machine to turn it back on.
Thus you can see why they have not rushed to change the default. But one assumes that they will ship NEW os's and new computers with it turned off in the future.
this choice for easy configuration assuming the local network can be trusted dates back to the time of NFS. And NFS is still presents almost exactly the same potential security hole (if you remote NFS mount your home directory you just pulled your pants down, grabbed your ankles, and said "ah" if I can jack onto your network. ). NFS has not fixed this problem yet either cause doing so would break a lot of networks.
Got quiet, eh? (Score:5, Funny)
Can someone tell him that HIS WEBSITE IS NOT A BLOG, OTHERWISE HE WOULD BE INUNDATED WITH REPLIES!!!!
Thank you. ;-)
Go to the PC Mag URL instead (Score:5, Insightful)
Then you can go here [pcmag.com] to discuss what a steaming load this "commentary" is. Oh, my gosh. Someone who already has access to your network can put a malicious machine on it that will lead to your Mac being owned when it reboots. That's so freakin' simple. Not like those astonishingly difficult Windows attacks of sending emails, setting up websites and/or having users download spyware. The sky is obviously falling. AAAAAHHHHHHH!
sad... (Score:5, Insightful)
Mac elite! (Score:5, Funny)
Re:sad... (Score:5, Funny)
If you were a Linux user, this type of thing would be an old hat who was beaten to death.
I remember in the days of Win98. With every single Linux security story, the WinNuts would cry: "See! See! Linux is just as insecure as Windows!" They would even do this on stories about local compromises, yet Win98 has no local security whatsoever. No permissions. Nothing. It doesn't even keep track of which users own a file. And they'd still insist it overshadows all the Windows holes, which were in effect root level remote compromises.
I especially love when they'd play numbers games. They'd say Linux has twice as many vulnerabilities as Windows this month/year, yet if one would actually look at the reports, one would see the Linux ones weren't nearly as serious. Nearly all Windows ones would say something like "one packet from the internet will cause arbitrary code execution with admin rights." Yet the Linux "vulnerablilties" would be mostly obscure crap from packages almost no one uses. "Video game Boogerman3D will allow any user to change the high score list." Oh no! Some user might give himself a billion point high score...what do I do???
Welcome to the real world. Where a bunch of lusers try to point out the "inferiority" of your OS by claiming your relatively obscure and unimportant security flaws are much worse than glaring and suicidal ones.
Re:sad... (Score:5, Funny)
Umm... you are aware that this is Slashdot, right?
Re:sad... (Score:5, Funny)
Re:sad... (Score:5, Insightful)
I was tired of the "We use Macs because they don't get attacked by viruses and hackers" refrain from Mac nuts.
So what? I'm not a mac nut. If anything, I'm more partial to Linux, but I say the same thing. Is this guy trying to imply that anyone who cites this perfectly valid reason to prefer macs to PCs is a nut? Real mature.
I generally counter with what is apparently a secret carefully hidden from Mac zealots: "That's because only a fraction of the world uses Macs. What's the point of attacking a niche market? No one will notice!"
Actually, he's wrong. There are reasons beyond marketshare why macs are more secure than PCs, but frankly, who cares? When I go home at night, the last thing I want to do is spend my evening reinstalling my OS because my girlfriend clicked on a "see my vacation pictures" email. Fortunately, that's not something I've ever had to do. Whether that's because macs are more secure by design or because no one bothers to write virii for them really doesn't matter to me. All that does matter is that running my computer is a lot less of a pain in the ass.
So I am by no means a Windows apologist or Microsoft partisan.
So what? If your arguments were solid, it wouldn't matter if you were. If not, it also doesn't matter.
Ultimately, those on the Mac fringe have to face facts: Panther and Jaguar were not better at outrunning vulnerabilities than Windows.
Really? Got any evidence to back that up, mister
ulanoff? Or is just this your expert opinion? Because I just read your bio, and I didn't see a damn thing that indicates you know architecture or the security implications of design choices from a goatse.cx post.
Bill O'Reilly just called, and he wants his credibility back.
Next Month... (Score:5, Insightful)
Whatever. All OSes have their inherent problems, but next month, when Microsoft racks up another suit of deathly insecure vulnerabilities, OS X will probably be fixed and free from defects for another couple of months.
I'm not a Mac fanatic, but it's because OS X is based on Unix, and Unix is more elegant in its design that gives OS X its better security.
It's not just that (Score:5, Insightful)
And anyway, if XP is so secure, why are they scrapping it for a complete new rewrite - again? It's because it can't be fixed and it has more security leaks than a seive. Microsoft has tried and tried to reshape the Internet into what they want it to be and, thank god, it's failing. And in a way so stupendous that now those that get sacked regularly gotta go off and complain about it. Well boo hoo to them. I've never experienced a virus or worm on OS X or Linux/Unix and I don't suppose I will be anytime soon. There's a reason for that and m$ still doesn't get it.
Re:Next Month... (Score:5, Interesting)
Unix is a 35 year-old design that has stood the test of time _because_ of its elegance. It's based on 6 commands (open, close, read, write, fork and exec), takes an "everything's a file" approach, and relies heavily on small, reusable componets that are easier to fix and isolate than large monolitic code. The complexity if Unix likes in the mixing of those simple pieces.
Think of it as the difference between Playdough (Windows) and Lego (Unix). Windows is like a big lump of playdough. Sure it's pliable in the beginning, but over time it hardens into a big, unusable clump that needs to be tossed (reloaded). Unix on the other hand is like legos. Its modular design lends itself to be mixed and matched into unlimited configurations.
When it comes to security, it's easier for coders to get their brains around smaller, more manageable code. Windows is so big and unwieldly, they're going to have to do a fourth rewrite if they ever hope to build something that's even close to being secure. Why else has Microsoft been promising security for almost two years since they announce "Trustworthy Computing" and yet they're worse off than they've ever been.
Like I said in the original post, next month we'll see a whole slew of major new problems with Windows, and Mac and the other Unix variants will probably be free from any major known flaws. Just like we have for years.
One flaw (Score:4, Insightful)
Re:If Mac OS X were REAL unix... (Score:5, Informative)
then, apparently, you don't know jack. you absolutely cannot write to / unless you (and follow this carefully):
1) open up a terminal
2) type sudo
3) then type say: cat
4) type password
you my friend, are full of shit. now, if like me, you create another user, which i always run at, then i have to open the term, su to an admin user, then sudo. osx turns off root by default. to enable it, you have to go into net info, and specifically enable root, THEN, you have to change it's terminal from
Uh (Score:4, Informative)
OS X doesn't use
You might as well call Linux unfit for production because you can do some potentially nasty security-related things in some versions of Lilo.
Oh yawn.. (Score:3, Insightful)
.. This article was nothing more than +1 Flamebait. The author sounds like a little boy who finally gets to say "I told you so! I told you so!" when there really isn't anything to be told. All OSs have undiscovered holes and problems. The key is how fast the vendor deals with the problem.
It's all about the scope... (Score:5, Interesting)
The attacker must:
Be on your local network
Already have control of your DHCP server
If both of the above are true, you already have much more serious problems.
While I agree that remote root/admin is bad juju, in this case it's hardly equivalent to the Windows remote admin exploits to which he's comparing it.
Re:It's all about the scope... (Score:5, Insightful)
You forgot one important thing - you must also reboot. If you don't reboot your Netinfo daemon doesn 't pick up the new information supplied by the poisoned DHCP server. So the attacker must also trick you into restarting your computer.
In short, yes this is a potential exploit but an extremely unlikely one. By the time the attacker does all of these things he probably would have been better off just walking over to your computer and stealing it from you.
The author is an idiot (Score:4, Insightful)
How can this idiot compare that to the hundreds of millions of computers ACTUALLY INFECTED by Windows vulnerabilities like Nimda, Code Red, Melissa, Klez, Sobig.f, and thousands of others? Using Windows is like buying random illegal drugs on the street to treat a headache.
The MacOS is not without its flaws, but Windows is the swiss cheese of the secure computing world. It's very telling that the author didn't allow for any feedback or provide his email address.
Re:The author is an idiot (Score:5, Informative)
If you don't use a DHCP / LDAP server then its recommended that you turn it off.
This is from the apple site:
You don't use a directory service
unix vs windows security (Score:4, Insightful)
Re:unix vs windows security (Score:5, Insightful)
Sorry, but this is nonsense. UNIX *is* more secure than Windows, but Windows was *designed* with more security in mind. UNIX comes from an academic background where loose and free access is the norm (or was in the 70s). All of the security trappings are post-hoc.
Now if you want to say that UNIX's technical excellence is demonstrated by the fact that even security being a crude add-on, it's still superior to Windows' baked-in attempts, then you would of course be right. But UNIX was never designed for security from the ground up...
Re:unix vs windows security (Score:4, Insightful)
Unix was designed with security in mind. As they've added things (such as networking, which wasn't there initially) they've designed them with security in mind. Yes, sometimes they had to go back and add things or tweak things, but they designed it with security in mind.
Whereas I can't see that Windows was designed with security in mind. Maybe it was, maybe it wasn't. I'm not willing to take MS's word for it - they've lied to me far too many times.
Seems pretty cocky (Score:3, Insightful)
Typical Mac User: Stupid virus, my computer is fine, but my ISP is down. Stupid popups, oops forgot to check the option in Safari, okay better now. Stupid spyware, it made me hit cancel when it tried to install itself.
Now understand I'm talking about the standard consumer, of course there are many of us that can keep the windows problems at bay.
How many recent flaws? (Score:5, Insightful)
> a recent OS X security flaw
That's the significant word, I think. A single one
Same DHCP "Flaw" (Score:3, Informative)
This is just some guy on a soapbox blabering on about how this "flaw" proves that OSX is just as bad as any Microsoft product. Hopefully others can see past this guy's rhetoric.
Re:Same DHCP "Flaw" (Score:5, Informative)
Dave Schroeder writes, "This isn't so much of a root vulnerability as a default configuration that trusts the integrity of the local network services. This functionality has been around since NeXTSTEP, and is designed to allow for auto-configuration of new servers/machines brought into the network."
it's quiet because you're such a pussy.... (Score:5, Informative)
Lance_Ulanoff@ziffdavis.com
Share and enjoy!
Re:it's quiet because you're such a pussy.... (Score:5, Funny)
An e-mail address! Quick, send him an Outlook virus!
Quick! (Score:5, Funny)
I think I already did.
Re:Grow up (Score:4, Interesting)
Heehee, (giggle), that was a good one.
Get real. This guy's job is to generate ad revenue by bringing in eyeballs. Writing an inflammatory article does just that. Having done so, he goes home. He doesn't give a shit whether he's right or wrong, and he certainly won't be following up the "community's" response. He will laugh all the way to the bank, however.
Is this really the same? (Score:5, Interesting)
So, a guy has to get on my network, set up another machine as a trusted server, wait for me to reboot, and then...? Is this a fair comparison to email viruses, etc...?
My cube's been up for 90 days. I plan to take it down and upgrade it eventually. Does this mean I'm going to be vulnerable?
Whatever.
I'll second that... (Score:5, Funny)
It's about time Apple did something about the POS security in OS X!
And this guy is an editor? (Score:5, Funny)
That's the sound of no one caring what you think, Lance.
A series of what ifs, followed by the reaction of imaginary mac fields that exist only in Lance's head.
And the whole "Macs don't suffer viruses because there's so few" myth was dead and buried long ago. Sheesh. Who cares? If Lance is happy with his bloated, cheerless, abominable bugfest of an OS, more power to him.
And now, Obligatory Car Analogy: it's like Lance is sitting by the side of the road with his Chevy Vega that just flew to pieces for the fifth time that week, and he's pointing at the Lexus that just sped by because it had a defective radio knob that just fell off.
Re:And this guy is an editor? (Score:5, Insightful)
Claiming that OS X sufers fewer hacks because it's a smaller market is a post hoc fallacy.
His reply to an e-mail I send him earlier today (Score:5, Interesting)
http://discuss.pcmag.com/pcmag/start/?msg=32413 [pcmag.com]
-----Original Message-----
From: ***
Sent: Thursday, December 11, 2003 10:24 AM
To: Ulanoff, Lance
Subject: Eureka
Hello.
in your piece at http://www.pcmag.com/article2/0,4149,1408953,00.a
you have this to say in conclusion:
Ultimately, those on the Mac fringe have to face facts: Panther and Jaguar were not better at outrunning vulnerabilities than Windows. I expect other gaps will emerge, and while the Mac OS may still draw far fewer attacks, this discovery might suck a little wind (or is it Windows?) out of Mac radicals' sails. They can scarcely claim this was a minor hole. OS root access is serious stuff. How cocky are you feeling now, Mac elite? Hmm. Suddenly it's gotten pretty quiet around here.
So, that's all it takes for you? One potentially serious loophole in an
OS to declare it "no better at outrunning vulnerabilities than
windows"?
Have you recently counted the number of Cert advisory reports that have
come out for XP? Last I checked, more than a month ago, it was in the
40-some range. For XP alone. This year only. For the past few weeks,
those reports have come in bundles of 3-to-5 at a time. Nearly every
other week.
While gaining root access is serious on a Unix machine, you also need
to point out the fact that to be able to gain access to this loophole,
you absolutely need to be on the same subnet as the compromised
computer. Therefore shielding 60%-some percent of home Mac installation
(as those connect to the interner through some phone connection like
PPP) and a great deal (don't have numbers) of the remaining 40% still
not at risk, provided their Cable or ISDN, [A]DSL ISPs have done their
work properly.
It's not like one could attack the entire machine simply by sending an
email containing some VBL script. Right?
Of course I'm a Mac head. And I'm still as cocky as I've been since
roughly 1988. Because every time I see those IT folks around here
struggling to keep the company running when the next wave of Win
trouble appears, I'll be smiling at my desk, uninterrupted, and
occasionally offering to help (okay... I'm just pointing them to some
Linux site or Apple.com... but hey... I seriously believe that would
help
them).
Keep us entertained.
Have a good day.
yeah punk, I'm feeling lucky (Score:5, Insightful)
Re:yeah punk, I'm feeling lucky (Score:5, Insightful)
Most of them speak of the millions of emails caused by viruses self-propagating by emailing to all contacts in address books, or of millions of dollars being cost companies by viruses, etc.
It took me about 5 minutes to check your link, and yet at time of posting this, you're at +5, Insightful. Yet more proof, as if any were needed, that most "moderators" round here just see that a post is anti-"M$" and mod it up.
If you have some hard data to back up your claim that millions of Windows PCs have been cracked by recent vulnerabilities, I'd love to see it. Otherwise, quit trolling for easy karma.
Re:yeah punk, I'm feeling lucky (Score:4, Insightful)
I love my G5.
Mac Elite? (Score:5, Insightful)
I feel bad for anyone who feels the need to put a group of users down simply due to their choice in tools. That goes for the "Mac elite" that Mr. Ulanoff has to deal with as well.
WSJ Article vs. PC Magazine (Score:5, Interesting)
I have never been able to shake my perception of PC Magazine/ZD as just a shill for their biggest advertisers. Just ask yourself: Who butters their bread?
The new variant of "Apple's dying" (Score:5, Insightful)
PC Mag proves once again its writers are inept (Score:5, Insightful)
Security (Score:5, Interesting)
Building A has one broken window, that is kind of small and can only be breached if you can get passed the outer gate (with its own security), and have the right (specialized) equipment.
Building B has many broken windows, and windows breaks as fast as they fix them. Many of the broken windows can be breached from down the street. The latest broken window could allow anyone to imitate building C, and only when you have entered the building do you realize that you have been duped into entering Goat's house of cx.
Which building is more secure?
The issue is that security is offered in LEVELS. No place is 100% secure, however some places offer much higher levels of security, providing a safer place to be.
So which building is more secure?
iTunes (Score:5, Informative)
Meanwhile, we can already see what happens when Apple has a broadly popular product that cuts across platforms. The Apple iPod is the number one MP3 player, and now that its companion computer utility, iTunes, is available for both the Mac and the PC, it has become a hack target. In fact, Jon Lech Johansen, the same Norwegian who cracked the DVD security code, recently circumvented the iTunes music protection scheme.
An event like that occurring makes sense to me, since iTunes' popularity makes it a target worth hacking -- and whatever mystical Mac mojo there may be, it didn't go far in protecting a popular Apple product.Steve Jobs stated when the iTunes music store was announced that the DRM would be hacked. The point was to provide a DRM solution that was not restrictive to honest users. That was delivered.
The author also says: DRM is NOT Evil (Score:5, Informative)
His email address: Lance_Ulanoff@ziffdavis.com
His brief bio here [pcmag.com]
Re:The author also says: DRM is NOT Evil (Score:5, Insightful)
If we suddenly had a way to make perfect copies of objects as big as, say, cars, I imagine that thousands of shiny red Mustang convertible clones would instantly appear on the road. Most of us would find that wrong.
What? What? What? Being able to make perfect copies of objects the size of cars would, I think, be the greatest moment in the history of humanity! Hello!?! The end of hunger? The end of want? The end of shortages of essential, life-saving medicines? Barrels of clean water for the third world? Bueller? Bueller?
If we were in a position to do this (and how would it be *stealing* anything, anyway? The original is still in possession of the owner, so - guh! - it's copyright infringement at best ;), then I think IP rights would be the last thing on anybody's mind, because *the capitalist system would be instantly destroyed*! Frankly, I'd welcome that. Capitalism may be the best of a bad bunch of socio-economic systems right now, but if something demonstrably better shows up, most people would take it in an instant.
Although maybe it's possible that he just really, *really* hates Mustangs.
The guy's an idiot. Even ignoring a ridiculous brain-dead analogy like replicated Mustangs, the fact he can compare OS X's few security holes (and I don't even *use* OS X - I'm no fan) to the gaping net that is Windows shows he must be blowing somebody to keep writing this garbage...
He's Right! (Score:5, Funny)
Overheard whispers: "He's not going do it" "Yes, he is - you didn't see last months rant against one button mice?" "I dare you" "I bet his ethernet cables not plugged in" "It's been a pleasure working with you" "I knew he was an idiot, but nobody's that dumb" "Didn't his last article get taken out by the Melissa virus?"
Insecure? (Score:5, Funny)
I think you can add Lance Ulanoff to the list of things that are "insecure".
The default configuration is insecure. (Score:4, Insightful)
The rationale for configuring the system this way is that it's easier to administer - you just plug it in and it starts working. This is why Microsoft used to configure the system insecure by default. This is why Apple is still configuring the system insecure by default. But part of what you're plugging in, with no authentication at all, is your authentication system. So if the thing that tells you what authentication system to use lies, you're hosed.
This is less severe than the recent Microsoft bugs because the attack is hard to do from the outside of a firewall. So probably Apple is not going to get the kind of bad publicity for this security hole that Microsoft has gotten for, e.g., the Blaster worm. But this is actually a much worse security hole, in a sense, because there is no Software Update coming down the pike that fixes it - Apple has, so far, taken the position that this is a feature, not a bug.
Because the number of people who run software update automatically is much higher than the number of people who pay attention to security alerts and do what is recommended in them, this particular security hole is going to remain on pretty much every MacOS X install in existence. So I can see why the guy from the PC magazine is acting all smug.
The right thing would be for Apple to fix this, but I don't see them doing it - there's no way to secure the DHCP transaction, and there's no way to secure the LDAP transactions either. I hope there's someone in a back room at Apple working on closing this gap, but they've been silent on the issue so far, other than maintaining that because it's a configuration thing, it's not a problem.
another funny thing. (Score:5, Informative)
Anyone notice this?
Please, please, tell me that he's not trying to convince us of his "Apple cred" by noting that the last time he used a Mac in a serious capacity was ten years ago?
Rebuttal by The Mac Observer (Score:4, Informative)
One interesting point made is that those who say that Mac OS X suffers fewer security and virus problems than Windows only because there are fewer Mac users just don't have a leg to stand on.
two things to say (Score:5, Interesting)
1. These aren't exactly easily exploitable remote root's like windows has had 50 of. There really is no comparison.
2. Installing XP yesterday, I was r00ted before I could get to Windows Update. This is just. plain. ridiculous.
I don't know about you guys, but there really is no question of what OS to use if you really want it to work right, be stable, and be secure. NO QUESTION. "usability" is close enough in Linux for me. AND ISN'T A VIRUS EVERY FIFTEEN MINUTES SOME SORT OF USABILITY PROBLEM?>??
Same bug in most Windows versions (Score:4, Funny)
The attack goes like this:
He sets up a DHCP server
Feeeds computers booting with fake IPs for DNS and WINS servers.
Redirects the NETLOGON server shares to a share under his control. Makes sure the login script runs his software.
It is thus recommended that all Windows users, especially coorporate users, disables DHCP in the TCP/IP settings, until Microsoft starts shippign support for DHCPS - which is DHCP over SSL/TLS.
It is important to do this, since if only some users does it, it might be difficult for thew machines to connect to each other.
To summarize the article ... (Score:5, Informative)
Is this guy for real? How does a vulnerability which involves an attacker having to break into your home network (much less a corporate one), take over a machine and then set it up as a rogue DHCP server anywhere near equivalent to something like Blaster, which spread automatically, with no machine spoofing required? Honestly, if your network is so utterly open to attack that it's a trivial task to spoof a DHCP server, there are bigger problems than OS X's security flaw there.
The claim that Mac OS X would have more viruses if it was more popular holds some merit, but it says nothing about the lethality of those viruses. OS X has all sharing network services off by default, unlike Windows, shutting down a large avenue for virus propagation. Mail shows the entire file name of an attachment, preventing attackers from hiding extensions. Mail also does not automatically execute attachments. Furthermore, any application wishing to do anything as administrator has to ask for a password by default, and root is disabled by default. This is not the case in Windows, where tales of administrator accounts with blank passwords abound. While there may be more attempts at writing viruses for OS X if it was more popular, far fewer of them would actually reach the scale of damage that things like Blaster did. Windows is an ideal virus propagation platform not just because it's popular, but more importantly, because it's default setup is insecure as well.
Flawed Arguments... (Score:5, Insightful)
I did find a few problems with the article (beside the fact that the author was bashing mac users who bash windows users...circular logic, anyone?). The author claimed that due to the fact that DVD Jon cracked quicktime encryption of ACC streams (used by the iTunes Music Store) doesn't mean it's going to bring either the MacOS or Windows to its knees. It's a f**king MP3 player for Chrissakes. Sure, vulnerability that could circumvent OS security might exist within iTunes, but the specific nature of DVD Jon's crack has nothing to do with OS security.
The author made this claim about the cross-platform iTunes "exploit" while failing to mention anything at all about Macros, and the possible for viruses that accompany them. To me, it seems that the author was grasping at straws without having any concrete evidence to back up his claims.
Whenever I read an article from one side of the OS wars bashing the other side, I tend to think that the author was in danger of missing his deadline and needed to come up with something in a hurry. Why does this issue never get old? Perhaps we should think about ways to make our OS of choice more secure rather than bashing others' flaws.
AgentOJ
My Favorite Part (Score:5, Funny)
That's the Mac's problem! He has nailed it! Apple develops new and vastly improved features (in the range of 150+ [apple.com]) - basically an overhaul of the operating system - every 18 months. Rather than this whole OS X thing, they should have just created a new theme for OS 9 (oooh, maybe with Green highlights) and changed its name every so often...
If you can't taste the sarcasm, just smile and nod...
OS X is, by and large, more secure than Windows (Score:4, Insightful)
How many ActiveX-related security problems have you seen on OS X?
How many scripting, or RPC, or buffer overrun-related problems have you seen on OS X?
Have you ever seen any AppleScript-related security problems like the VB-related ones on Windows? (you can call it macros, Windows Scripting Host,
Most of the problems I've seen on OS X thus far are problems in the open source pieces that affect that product across the industry, including distros in Linux. This is one of the few security flaws that is _native_ to OS X - I can't even remember the last one I've seen. And it does require you to go through plenty of hoops - having control over the local DHCP server, for instance.
Yes - we're going to see security problems with OS X. But not ridiculously stupid ones that could have easily been prevented like we've seen on Windows... I think it's silly to even put them in the same league with each other.
That's exactly why... (Score:5, Funny)
Re:That's exactly why... (Score:5, Funny)
i hate the lameness filter. ti code is all caps so i need to put a lot of non caps in here to balance it out. this is not capatilized. take that you worthless filter. the above wasn't yelling, but now i think i just night start.
Re:Mac isn't more secure, BUT: (Score:5, Funny)
Re:Hum... (Score:5, Funny)
Pro-MACs on my left, pro-PCs on my right.
I think Rush Limbaugh might take offense at being placed on the Left [macnn.com].
Re:Hum... (Score:5, Funny)
Pro-MACs on my left, pro-PCs on my right.
I'm Stuck in the Middle with you.
Yes I'm stuck in the middle with Linux.
Re:Hum... (Score:5, Funny)
Shouldn't that be:
Stuck in the middle with GNU..?
reaping and sowing. (Score:5, Insightful)
Wrong. There is something to be said for how security is considered in the design of an OS. For Windows, it wasn't much of a consideration, which contributed heavily to why there have been so many systemic vulnerabilities.
The system was designed to be user-friendly, not secure. They got their market-share because of that fact. I think it is much easier to make a secure system user-friendly than to make a user-friendly system secure. Microsoft is finding that out as well. You reap what you sow.