Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Portables Businesses Security Apple Hardware

MacBook Air First To Be Compromised In Hacking Contest 493

Multiple readers have written to let us know that the MacBook Air was the first laptop to fall in the CanSecWest hacking contest. The successful hijacking took place only two minutes into the second day of the competition, after the rules had been relaxed to allow the visiting of websites and opening of emails. The TippingPoint blog reveals that the vulnerability was located within Safari, but they won't release specific details until Apple has had a chance to correct the problem. The winner, Charlie Miller, gets to keep the laptop and $10,000. We covered the contest last year, and the results were similar.
This discussion has been archived. No new comments can be posted.

MacBook Air First To Be Compromised In Hacking Contest

Comments Filter:
  • Identical articles (Score:3, Insightful)

    by Robert1 ( 513674 ) on Friday March 28, 2008 @12:11AM (#22890096) Homepage
    They're nearly perfect mirrors of one another. Really the only difference between this year and lasts was the word "Air."
  • by Anonymous Coward on Friday March 28, 2008 @12:13AM (#22890108)
    There goes their geek cred. Hey, at least they still sell a metric crap load of iPods!
  • by Anonymous Coward on Friday March 28, 2008 @12:14AM (#22890116)
    No, this year Vista and Ubuntu were in the contest as well. But the mac got hacked in two minutes and the Vista and Ubuntu machines resisted every hack. Big difference there. Oh, and I'd like to say, HA HA /nelson - now tell us again how absense of mac malware is not because of small market share.
  • by chubs730 ( 1095151 ) on Friday March 28, 2008 @12:18AM (#22890134)
    Pretty much says that a laptop widely meant for home users was only compromised when allowed access to some of the most widely used applications? I'm not sure what you're trying to say (or not, rather) but a hole in safari is a bit of an issue; unless of course you're just concerned with that server running on your Air ;).
  • by ashridah ( 72567 ) on Friday March 28, 2008 @12:19AM (#22890140)
    Well. Big shock there. These days, most vulnerabilities require the user to be at the helm.

    Good to see that social engineering is still all it requires to compromise something.
  • by chrome ( 3506 ) <chrome AT stupendous DOT net> on Friday March 28, 2008 @12:19AM (#22890142) Homepage Journal
    Depends if it was a "view this page and you're 0wned" exploit or a "view this page, click accept through some requests, etc" exploit as to how dangerous it is.

    But as a mac user .. will be using FF for a while until apple patch ;)
  • Re:Keep the laptop (Score:5, Insightful)

    by MobileTatsu-NJG ( 946591 ) on Friday March 28, 2008 @12:27AM (#22890188)

    You mean like when your airplane flight is cancelled and the airline offers you a free ticket. Or when the food at a restaurant is crappy and they give you a coupon to eat there again.
    Well.. sorta. It's more like when a company loans you a laptop to hack, then they let ya keep it, then they give ya ten thousand dollars on top of that.
  • by Immerial ( 1093103 ) on Friday March 28, 2008 @12:36AM (#22890242) Homepage
    But the mac got hacked in two minutes and the Vista and Ubuntu machines resisted every hack.

    You aren't totally correct on that. The article says "He was the first contestant to attempt an attack on any of the systems." (on the second day). None of the systems fell on the remote only side but when it came to test user interaction the Mac was the first one tested. I'm still waiting for the result on the other machines. It is what a lot of us suspected... because of Apple's rep., people would be eager to take on the Mac first. It is still not to say it isn't bad... oh, it is. But the contest isn't over yet.

    Now if Vista and Ubutunu machines are tested by folks and hold up, then that news is more interesting to me.

    My bet is on the Vista machine having an exploit but not Ubuntu.
  • Re:right (Score:5, Insightful)

    by recoiledsnake ( 879048 ) on Friday March 28, 2008 @12:37AM (#22890248)
    And the karma-whoring RDF sets in.

    anyone who either has physical access to the computer being attacked or can convince the user running the machine to install/download anything is capable of breaking pretty much any OS they want.
    So no one wanted 20k of cash and expensive windows and linux laptops? Why weren't anyone able to hack the Windows and Linux laptops? They did not have physical access to the machine. Nothing was downloaded or installed manually. Only a website hosted by the attacker was just visited by the organizers on the browsers and mails were opened(attachemnts were not) and read.

    The fact that they had to relax the rules so that the Mac could be broken into illustrates this nicely.
    The fact that inspite of the relaxed rules, the Windows and Linux laptops were not broken into, illustrates totally something else. I will let you guess it. They are going to further relax the rules tomorrow to include third party applications to make it even easier to hack. Unfortunately, the Mac won't be there because it didn't make it to the third day.
  • by reiisi ( 1211052 ) on Friday March 28, 2008 @12:40AM (#22890266) Homepage

    Miller, best known as one of the researchers who first hacked Apple's iPhone last year, didn't take much time. Within 2 minutes, he directed the contest's organizers to visit a Web site that contained his exploit code, which then allowed him to seize control of the computer, as about 20 onlookers cheered him on.

    He was the first contestant to attempt an attack on any of the systems.

    But the issue is really not which is more vulnerable, it is that you can't run a secure browser and a convenient browser unless they are two separate browsers.

    It's time to abandon the general purpose browser. It's also time to quit surfing as your log-in user. You need a browser for surfing that you run (sudo or something) as a strictly limited privilege user without log-in capabilities.

  • by Anonymous Coward on Friday March 28, 2008 @12:41AM (#22890268)
    or safari is just a buggy piece of shit
  • by recoiledsnake ( 879048 ) on Friday March 28, 2008 @12:43AM (#22890284)

    Good to see that social engineering is still all it requires to compromise something.
    So why weren't the Windows and Linux machines be able to be hacked inspite of the social engineering and users being at the helm all day?
  • by jht ( 5006 ) on Friday March 28, 2008 @12:45AM (#22890296) Homepage Journal
    To me, a web hack to worry about (on any platform/browser) is one that can just be triggered by viewing a compromised page (like happens to most unpatched Windows machines that get nailed by drive-bys). I'm not nearly as worried about ones that require user intervention - clicking on a link, button, or something of the sort.

    So if the Mac was tagged by just loading a page that delivered the hack, that's bad. Quite bad. If he had to click and download something (and perhaps defeat the auto-quarantine they use), that's not so much a big deal, though still a hole that needs patching.

    One of the things about vulnerabilities on all platforms is that a significant part of the magnitude depends on how difficult it is to exploit. Remote connections to a system that avoid/defeat a firewall are really dangerous. Attacks that require the user to do something stupid are inevitable, but far less dangerous.

    Thus far most of the Mac vulnerabilities have been the second type. Luckily.
  • Contest rules... (Score:0, Insightful)

    by Anonymous Coward on Friday March 28, 2008 @12:50AM (#22890336)
    Its important to remember that the contest rules stated that only hitherto unknown expolits could be used to hack into the computers...Thats like letting microsoft start at the 50m line in a 100m dash. That rule makes no sense. Well, it does make the contest fair, but the results say nothing about which is truly the most secure system.
  • by calebt3 ( 1098475 ) on Friday March 28, 2008 @01:00AM (#22890402)
    It's Twitter imitating Macthorpe.
  • by Whiney Mac Fanboy ( 963289 ) * <whineymacfanboy@gmail.com> on Friday March 28, 2008 @01:01AM (#22890416) Homepage Journal
    because of Apple's rep., people would be eager to take on the Mac first.

    Hold on - are you saying that Mac's have a better reputation for security than linux?

    Congratulations sir. Apple fanboy's capacity for self-delusion never ceases to amaze me.
  • by EraserMouseMan ( 847479 ) on Friday March 28, 2008 @01:03AM (#22890432)
    The Mac was hacked 2 minutes into day 2. After day 2 was over no other OSs or browsers had been hacked. Period. Give it up. Safari sucks. The web is a jungle. Tame it by not using Safari on your Mac.
  • I say well done. (Score:5, Insightful)

    by catwh0re ( 540371 ) on Friday March 28, 2008 @01:07AM (#22890446)
    In the past I've written replies which effectively defended the mac platform, not due to some loyalty, but because most of the feedback people write is pure b/s. I prefer factual arguments, not near-random fear mongering.

    I haven't RTFA but from the surface it sounds like a fair exploit test, and sure it only fell over with user interaction, but it still fell first. So good on them, they'll enjoy their prize of a macbook air and a sweet $10k.

  • by nmb3000 ( 741169 ) on Friday March 28, 2008 @01:09AM (#22890454) Journal

    Nobody was able to hack into the systems on the first day of the contest when contestants were only allowed to attack the computers over the network, but on Thursday the rules were relaxed so that attackers could direct contest organizers using the computers to do things like visit Web sites or open e-mail messages.

    Pretty much says it all.

    Wow, at +4 already for just quoting the summary and tossing in a vague and meaningless sentence.

    So anyway, what exactly is it saying? The only thing I see there is that a completely passive attack (that is, absolutely no user interaction, like many well-known worms worked) failed. Once this part of the test was passed they allowed interactive attacks (where the user must assist the attacker in some way). Since this is how nearly all malware and malicious software spreads these days, I don't see anything wrong with this. Aside from just attaching hardware to the network, a web browser and email client are the two applications with the most Internet "surface area". As all major operating systems come bundled with a primary browser (IE, Safari, Firefox) a flaw in the browser essentially amounts to a flaw in the OS. It seems natural and obvious to put them to the test.
  • by ashridah ( 72567 ) on Friday March 28, 2008 @01:13AM (#22890472)
    Bigger hoops to jump through? Linux has fairly high levels of user/admin separation, and windows has been burned enough times that the sandbox that IE runs with is effective enough to slow people down, far more than it was back in the ie6 or ie5.5 days.

    I doubt it'll take much longer for all three to get taken over. There'll be some office bug, or a local service vulnerability that hasn't been patched yet, and it'll be game over, sooner rather than later.

    There's a lot to be said for being exposed, it does give you the benefit of a lot more hindsight.
  • Re:right (Score:3, Insightful)

    by recoiledsnake ( 879048 ) on Friday March 28, 2008 @01:17AM (#22890500)

    considering who is doing the attacking I'd bet that physical access would make these comps 100% breakable. all that needs to be done is reset the bios and pop in a live cd and it's game over.
    So why was a unpatched security vulnerability in Safari needed if it were so simple? There was no physical access provided. Give some credit to the organizers, they're not dumbasses to give $10k in cash and a expensive laptop to the first contestant that jogs into the competition.

    I know... it shocked me that installing software often didn't require any sort of authentication what so ever...
    Because the code ran under Safari's privileges, i.e not root but user.

    you could look at it this way: cracking anything Windows is pretty much nothing special, it's being done on a massive scale botnets and zombies considered- what is perhaps a ncier target is a 2,000 dolalr macbook that claims to have a lot higher security than windows. motivation being the biggest security danger of them all.
    The Sony VAIO TZ37CN Ubuntu laptop costs $2300+ You mean no one wanted that and 10k in cash when "all that needs to be done is reset the bios and pop in a live cd and it's game over."?
  • by recoiledsnake ( 879048 ) on Friday March 28, 2008 @01:24AM (#22890524)

    All Apple products cause herpes.
    Maybe the articles are just pointing out that the Apple products you worship are not without their faults?

    Come on guys the Mac/Apple bashing articles are really getting silly.
    Yea lets bury this news article then just because it's anti-Apple? You're the one blaming the messenger(Slashdot) for posting news. Maybe you should blame reality for all the 'Mac bashing'.
  • by zizdodrian ( 987577 ) on Friday March 28, 2008 @01:37AM (#22890582) Homepage
    There's no conceivable way that the exploit was discovered and attack code written in two minutes. Hell, I could barely write a slightly sophisticated 'hello world' app in that time (maybe I'm just a slow typist, or he's an android.)

    From what I've seen, (correct me if I'm wrong) the rules stated that no previously disclosed vulnerabilities could be used. So, if this guy kept quiet for a few weeks, he could have used exploit code he had already developed.
  • Good. (Score:5, Insightful)

    by brainfsck ( 1078697 ) on Friday March 28, 2008 @01:54AM (#22890682)
    I'm typing this on a Macbook Pro running Safari, and I'm happy about the results of this competition. As Apple computers (slowly?) gain market share, they will eventually be forced to significantly adjust their terrible attitude in terms of security.

    I would rather have Apple "shamed" into providing me (and other OS X users) a more secure web browser/operating system than gain some pathetic "my system is more secure than yours" bragging rights.
  • by Cairnarvon ( 901868 ) on Friday March 28, 2008 @02:00AM (#22890700) Homepage
    There needs to be a "-1, Divorced From Reality" mod. That's a powerful persecution complex you have going there.
  • Re:misleading (Score:3, Insightful)

    by recoiledsnake ( 879048 ) on Friday March 28, 2008 @02:03AM (#22890716)
    Are you for real? Did you bother reading that article and seeing the fine print? The laptops were tested in parallel all day and Mac fell first, the other two were tested for the rest of the day and weren't hacked so they go to the next round with relaxed rules(3rd party s/w installed). It's extremely funny that you did exactly what you're accusing others of doing. Nice self-pwnage.
  • Re:Owning Beauty (Score:4, Insightful)

    by recoiledsnake ( 879048 ) on Friday March 28, 2008 @02:05AM (#22890732)
    You forgot to factor in the $10,000 cash prize.
  • by vux984 ( 928602 ) on Friday March 28, 2008 @02:12AM (#22890766)
    In other words, the first to hack it gets it! Who wants a Vaio or a Fujitsu anyway? Given a choice between the three, I'm sure everybody wanted the MacBook Air. Naturally, the only machine getting the pounding is going to be the first to crack.

    Yes, that sounds logical, if your genitals are hooked up to a car battery.

    The winner got to keep the unit AND 10,000. So OBVIOUSLY they should crack the easiest unit, flip it on ebay, and then buy whatever they actually want, while pocketing the remaining 8-9 grand...

    So... the moral of this story? Never underestimate the ability of an Apple fan to rationalize how the Mac could be the first to fail, yet still be the finest computer in the competition. d(^_~) [Thumbs up!]

    I ... Zzzzzzzap.... couldn't.... Zzzzzzzzzap. ... agree... Zzzzzzzzzzap.... more. ;)
  • Re:right (Score:4, Insightful)

    by moderatorrater ( 1095745 ) on Friday March 28, 2008 @02:32AM (#22890892)

    people simplify the problem to "Mac suxorz" when it really isn't that simple.
    Really? Because I see the Mac having come out as the clear loser in a head to head contest on a level playing field against the two biggest competitors it has in the laptop market. Seems pretty simple to me.
  • by ashridah ( 72567 ) on Friday March 28, 2008 @02:40AM (#22890938)
    That's the thing. It wasn't unix that they broke, It was the relatively new code. OSX may look like a unix from the outside in, but it's not one from the desktop down. It may resemble it, but it's not complete. Unix may be convenient for Apple, but it's not a mantra.

    That said, ubuntu (and linux in general) are heading that way too, just not quite with the same fevered pitch.

    It's the same basic premise that windows was based on: The user is in control. OSX and linux both have fairly strong boundaries between admin and user, but things are slowly wearing down, in the name of convenience. The difference being that things started out far more secure, and there's a bit more separation at the display itself, whereas win9x was not designed with this security in mind, and while NT was, it also inherited parts from win9x's shell and there were compromises at the display, etc.

    Microsoft gets this now though. SQL Server's a great example of that. Hundreds of thousands of man-hours have gone into making that thing far more secure than the slammer days, just compare critical vulnerability counts from SQL-server to Oracle. Microsoft's biggest curse is legacy code now, plus a fair amount of ongoing training, and they will only shrink with time. This is mainly shifting market pressure, of course, it costs money to have negative press regarding security nowadays. It didn't in the past, and it will only increasingly have negative press for the next couple of decades at least. It's surprising that Oracle is now doing what Microsoft used to do: treat security as a marketing buzz word (Unbreakable on linux took how long to break?)

    But who knows how many holes were in the old X11R6. But you didn't run that on servers, for a good reason. Guess what, there are probably lots of applications that don't handle the Windows messaging system securely and buffer-over/underrun free either.

    These days, things like IE operate in Limited user mode. This goes even further than ordinary users (far more than a "power" user, and lightyears away from Administrator or SYSTEM). It's restricted to \users\%USER%\AppData\LocalLow\ and one or two other locations, and that's it (Favorites spring to mind. It gets to be a pain if those accidentally wind up back with normal ACLs, as I mentioned here [mycronite.net].)
    So you need to work harder to break out of internet explorer, and IIRC, it takes permission from a privileged application to do it. Outlook's probably a juicier target, but it's been subject to the fabled crucible for a long long time, so again, it's harder.

    OSX hasn't been subject to it for long at all. Safari's new. *Really* new, and you know what, it wasn't even webkit that broke, but the url bar (if memory of the bugtraq post serves.) Where did webkit come from? Oooh. that's right. KDE.

    We're all in for it if apple really do gain significant market share (we being administrators, not we being "the general populace"). It may or may not be as big a problem as windows has been, but I'm willing to bet that the effects will be as dire, and apple doesn't really have a fantastic track record here, as other articles have pointed out. The momentum of not having security as a primary goal is one that takes a *long* time to turn around.

  • by SpeedyG5 ( 762403 ) on Friday March 28, 2008 @02:44AM (#22890966) Homepage
    I am an apple fan and enjoy a lot of their products.

    There is no way any system can be perfectly secure, but this is a significant hole. While they probably won't get me to click that stupid link, they might get my mom or any number of the other avg everyday users.

    At least now we can get beyond the macs can't be hacked BS and move on to securing my favorite OS and keeping it that way.

    Now lets see how long it takes for apple to post a patch, that is really where the rubber meets the road.

  • Re:Owning Beauty (Score:5, Insightful)

    by recoiledsnake ( 879048 ) on Friday March 28, 2008 @02:58AM (#22891016)
    You first said:

    instead you got a beauty contest. Which apple apparently won.
    Any contestant with half a brain knows that he can get 4+ Macbook Airs for the $10,000 cash prize and then ebay or install hackintosh on the "non-beautiful" laptops if they really hate Ubuntu or Vista that much. Seriously, if it was easier to compromise Ubuntu or Vista why not do that instead of going to the trouble of hacking the more secure(your implied claim) Apple laptop?

    And you forgot the prospect for employment. Hack a mac and you put it on your resume, hack a PC and no one cares or worse thinks your are a script kiddie.
    If the company really thinks in that way, I don't think you want to be working there in the first place. And what about Linux? Why wasn't it hacked?

    More to the point, what you can't measure here is the real world vulnerability. I cringe at keeping my Linux machines up-to-date and protected. I rely on firewalls not themachines. With the machines, which are production machines, it's huge roll of the dice to try to apply a patch and descend into dependency hell and discover over the next week which parts of your production got broken and which need compat libs and so on. With my fleet of macs, I don't hesistate to software update (well actually, unless the vulnerability is rampant I wait a week cause even apple screws the pooch. But just a week, and then you know it's safe.) SO in the real world macs are highly patched. MS can be and it's only a wee bit harder. (And when they fuck up (SP1) they go big, but it's mainly a function of your hardware.) Linux requires real expertise and knowledge of how your specific magic mixture of packages will be affected.
    That's more besides the point than to the point. All the Apple patches in the world won't save you from this exploit, since they don't have a patch for it out, yet. Besides, are you comparing updating production servers on Linux to Mac desktops? That's not a fair comparison at all. Desktop Ubuntu can also be updated without a hitch. Also, I've never seen a Windows Server 2003 production server have any problems with any of Microsoft's updates. And if you're using Debian stable on your server, you will be pretty stable with installing all the security fixes and updates because they do a really good job of testing the fixes.
  • by recoiledsnake ( 879048 ) on Friday March 28, 2008 @03:15AM (#22891064)

    Let's face it: if the prize is the laptop you hack then everyone would be trying to hack the Mac: who the fuck wants the shame of walking away with a Dell under their arm?
    Uhh? Can't they ditch the Dell in the nearest trashcan and run to the Apple store with the $10,000 in cash? Or did you miss reading about the cash prize under the influence of some kind of field.
  • Re:right (Score:3, Insightful)

    by jerw134 ( 409531 ) on Friday March 28, 2008 @03:15AM (#22891066)

    It seems that Safari is Mac's equivalent of Internet explorer in that it can be a major security problem.
    Except for the fact that IE7 on Vista has proven that it's not a security problem. Safari is the equivalent of IE5.5, meaning Apple is 8 years behind as far as browser security goes. Microsoft spent those 8 years learning some very tough lessons, while Apple just sat around laughing at Microsoft. Then when Apple decided to make their own browser, they made all of the same mistakes Microsoft did years ago.
  • I don't get it (Score:5, Insightful)

    by CannonballHead ( 842625 ) on Friday March 28, 2008 @03:34AM (#22891136)

    Can't we admit that, for whatever reason, the Air/Safari was easier hacked than Vista/IE7? I know this is an unpopular bandwagon to be on, especially on Slashdot, but it seems there's no two ways about it. I refuse to believe that it was a conspiracy and that every hacker was actually just trying to hack the Air and make Ubuntu and Vista pass, that's stupid. If I were a hacker, I'd totally hack the EASIEST one simply to get the $10k and the laptop. And if there were known or open vulnerabilities, it should have fallen in what, 30 seconds?

    Seriously, it's not a huge deal. If we, like good open source cronies, admit that there was a problem with *gasp* part of the Apple software/laptop combo (whether it was Safari or the OS or whatever), then maybe it will be fixed. Isn't that the main idea here? I thought the point of these things were to discover vulnerabilities so that they could be fixed, not to place bets on Microsoft falling and go up in arms if it doesn't.

    Unless, of course, we really aren't interested in open source software or good software at all, but are more about claiming a company name as our own.

  • by Katatsumuri ( 1137173 ) on Friday March 28, 2008 @05:47AM (#22891578)

    Many people in this thread keep praising privileges restriction (be it UNIX user management, IE7 sandboxing, virtual machines, or anything else) as the ultimate solution to desktop security.

    While this can reduce the chance of being "totally r00ted", you can still get "pwned" pretty badly. As long as you use your sandboxed browser daily, and have any kind of permanent storage for bookmarks / cache / saved files / etc, you still risk to become a botnet zombie, spam machine, DDOS node, pr0n/warez share, whatever. Who cares if that all works under restricted privileges.

    So, by all means, manage your privileges, but beware the fake safety feeling that gives you.

  • by The Evil Couch ( 621105 ) on Friday March 28, 2008 @05:54AM (#22891606) Homepage
    Yes, the walk of shame with a $3,000 laptop that's highly ebay-able and $10,000 in prize money. I wish someone shamed me like that.
  • Re:A real hero (Score:3, Insightful)

    by Weedlekin ( 836313 ) on Friday March 28, 2008 @06:51AM (#22891862)
    "In other words this guy most likely found a security bug in Safari, but instead of reporting it directly, made an exploit and waited for a hacking contest to get a monetary benefit out of it."

    So what if he did? As somebody who uses a Mac (and Linux, and Windows XP), I'm much happier with him having taken this route to gaining from the exploit than the one so many Windows hackers use of putting it up for auction to the highest bidder, or the Month Of Apple Bugs tactic of making exploits public before giving the people or companies whose code was at fault a chance to fix them. Nobody was directly harmed by his actions, and Apple get to close this particular hole before before its details are published, so this is a net benefit to all Mac users except rabid Apple fans who are being forced to eat crow.

    Modern OS distros are a vast web of complex interactions between modules, APIs, drivers, and applications, many of which were written by different people at different times who had widely differing goals. The best programmers in the world can and do make mistakes, so even if a design is flawless (and none of the currently available offerings can claim this), and every programmer is the very best example of his or her craft (the vast majority aren't), there will still be bugs, and some of those bugs will turn out to be exploitable by malicious people. Expecting things to be otherwise is even more naive than expecting those who've found an exploit to report it instead of using it for personal gain.
  • by shatfield ( 199969 ) on Friday March 28, 2008 @06:57AM (#22891890)
    I am worried that Apple is assuming too much about the security of the Mac OS X operating system. I am a long time user (since first beta) and it has been an incredible ride, but I'd really like for Apple to "step up" and take this bull by the horns and let the world know that they are very serious about security and eliminating *any* means of intrusion, either automated or user driven... and not just rely on the FOSS community to remedy the security problems in the software that they have incorporated into the OS.

    Just as long as they don't implement some Vista like "Allow or Deny?" crap... God that would drive me *nuts*!
  • Re:Owning Beauty (Score:4, Insightful)

    by Anonymous Coward on Friday March 28, 2008 @06:59AM (#22891904)

    Oh sweet jesus... Apple owners... spinning a truly piss-poor performance into a plus.

  • by DECS ( 891519 ) on Friday March 28, 2008 @07:36AM (#22892086) Homepage Journal
    While the quick win makes for a perfect headline and reflects the Hollywood image of "hackers" that twiddle on a keyboard and almost instantly "access the mainframe" while a counter runs in the background, a more intelligent question is: why did the Mac get hacked first, and why was the attack so quick?

    CanSecWest and Swiss Federal Institute of Tech Deliver Attacks on the Reality of Mac Security [roughlydrafted.com]
  • Ho-hum (Score:3, Insightful)

    by Anonymous Coward on Friday March 28, 2008 @09:23AM (#22892764)
    The thing I enjoy most about the responses to this article is the rather predictable "Ha, so Apple DOES suck!!! Take that fanbois!" responses. It's certainly true that this is an important find and that an exploit in the wild is something to be concerned about. But the point of this is really that there's no such thing as a secure OS yet (and there probably never will be). Not unless you've removed the power source from your system, encased it in concrete and sunk it to the bottom of the sea.

    The perceived general level of security in a system can be directly correlated to the most recent compromise of that system. The fact that the Linux and Windows systems involved in this contest have not yet been compromised does not indicate that they are more or less secure in a general sense than the Mac. It does indicate that no one has found the vulnerability that inevitably lurks within the kernal or a piece of installed software on those system. But rest assured, the exploits are there.

    "FireFox is more secure than IE", you say on Monday. Then Slashdot posts "HUGE FRIGGING HOLE FOUND IN FIREFOX: DOOM!!!" on Tuesday. And suddenly the absolute statement you've made sounds silly.

    If you don't believe this is true, try this: get hold of a system exactly like the ones currently considered "unhackable" in the contest and disable any automatic updates (and don't install any manually). Wait three months and then compare that system against one with the most recent updates. You're sure to find that your unhackable system is now full of known exploits and security holes.

    The systems we rely on today are very complex and in a very real sense cannot be completely understood. There are techniques that can make them generally more secure and all of the OS developers are working to bring these features online every day. Some are better than this than others (or so it seems), but they all do it. Even Microsoft. But the thing about security is this: the bad guys only need one hole and the good guys have to cover all the bases.

    The only real security in a system comes from user practices, not software. If you don't install updates on your system, it will be vulnerable. If you don't consider HOW and where you use your system, it will be vulnerable. In other words, the core component in a secure system is YOU.

    It's probably true that there is a "most" secure OS and a "least" secure OS right at this moment. Take a guess which is which and you might even be correct. But there's no absolute answer that will be true tomorrow. We need to stop with the absolutes and "MY FLAVA ROCKS YER FLAVA" hyperbole and start to think more like real security experts do. The next big hack for your favorite OS is just around the corner. And there's no doubt about that.
  • Re:Owning Beauty (Score:3, Insightful)

    by zootm ( 850416 ) on Friday March 28, 2008 @09:54AM (#22893078)

    To be completely fair, though, the Vista and Ubuntu machines are, according to all sources I've found, still up and still unhacked. If you can still win those (which I think you can?) even though there's no longer a cash prize there's at least incentive for someone to hack them. If it were a case of people coming prepared with vulnerabilities on all three machines you'd expect one of the other two would have been brought down by now.

    I do agree, though. The bottom line is that no OS is completely secure and this is essentially just a race to use a vulnerability. I've not found a good source on whether the other two machines are still uncompromised, though, which I think is the most interesting part of this.

  • Re:Owning Beauty (Score:4, Insightful)

    by Cyberax ( 705495 ) on Friday March 28, 2008 @11:52AM (#22894352)

    I cringe at keeping my Linux machines up-to-date and protected
    What's so hard in it?

    "apt-get update; apt-get upgrade;" on a Debian Stable works like a charm (because they push ONLY security and major bugfixes). I manage a farm of 30 servers for about 2 years and Debian update ALWAYS worked without any problem.
  • by __aagmrb7289 ( 652113 ) on Friday March 28, 2008 @01:20PM (#22895500) Journal
    Paraphrased: "I don't care what the verifiable FACTS are - I only care about my unverified anecdotal stories." (a) Please don't ever consider going into science as a career field; (b) Hopefully it's clear (at least to the majority of readers out there), that personal, unverifiable anecdotal "evidence" is not a valid counterargument to factual data. That ISN'T to say that there aren't problems with the facts in this case - just saying that this "evidence" isn't worth anything in response to those facts.
  • Re:A real hero (Score:3, Insightful)

    by quacking duck ( 607555 ) on Friday March 28, 2008 @01:23PM (#22895562)

    All bugs should be reported immediately to the developer. Period.


    (Giving up my spent mod points to reply to this)

    I agree, in principle.

    From a practical POV though, who's to say this guy would even bother finding obscure (one hopes) security holes anyway, without the financial and other incentives offered by this contest?

    Black hats are often funded by criminals. May as well offer a carrot to the White/gray hats so they don't get tempted by the dark side.
  • by Mister Whirly ( 964219 ) on Friday March 28, 2008 @01:30PM (#22895704) Homepage
    I can summarize your post -

    "I have no idea why some of my boxes fall prey to security holes, so I am just going to blindly assume that X operating system is more secure than Y operating system."

    There is no such thing as a "secure OS". Security is a process that is ongoing and the principles of securing a system apply to ALL operating systems. If you want a real explanation as to why your Windows machines are attacked more often than your Macs or Linux machines, try the concept of "marketshare" out. Remember a few years ago when Mac only owned a percent or two of the desktop marketshare, and there were almost no exploits being written for them? Now fast forward to triple that market share and suddenly we are seeing Mac exploits. If you think this is merely a coincidence, you need to re-think your entire security strategy. Macs aren't magical, they are just computers. A poorly configured Mac or Linux box is more vulnerable than a properly configured Windows box, and vice-versa.

    And to prove that an anecdote is not the best thing to judge by, I have 2 Windows boxes at home that have been connected to the internet continuously for over 3 years. They are running XP and the built-in Windows firewall. Never been compromised, never had a virus or a rootkit. And I do occasionally surf some questionable web sites and such, but have my browsers locked down pretty good as well.
  • Re:A real hero (Score:3, Insightful)

    by quacking duck ( 607555 ) on Saturday March 29, 2008 @01:16AM (#22902820)

    Personally I have been toying around with the idea of government enforced requirement of 3rd party audits for comercial software. Not only would this create a new software auditing business, but also improve software quality and not only in security.


    The government should have no part in regulating software. The government is utterly incompetent when it comes to tech issues, and they can't even fund their patent system with sufficiently technical people to reject frivolous patents. A specific software audit agency would do no better.

    Nor should the government task a third party with such a task--who is going to vet *them*, make sure they're not taking bribes?

    Then we get into the "who's fault is it, really?" with hundreds of interacting components--is it the hardware's fault, the OS's fault, or the third party software's fault? I've read about the fun people had trying to get tech support for Windows PCs, where they keep passing the buck on for more obscure problems.

    No, I think government regulation for software should remain restricted to critical, life-or-death systems like airplanes, nuclear power plant systems, hospital systems, etc; anything directly affecting the principles of government (e.g. voting systems); and of course any project directly initiated by government (but any organization should do this with outsourced work anyway).

    Governments should be able to impose fines on, or make it easier for injured parties to sue, large commercial entities with shoddy quality. This would take care of those who developed the banking system you mentioned. Smaller outfits and non-commercial software should be immune, or have liability limited on some sliding scale, based on how many declared projects use it, how many actual users of the derived project use it, etc.

    (Incidentally, if I'm not mistaken this would work out great for GPL projects--if a commercial project is not a registered, declared "user" of a GPL project, it reduces the GPL project's liability. If they then try suing for damages, they admit to using code without providing source as mandated by GPL.)

    Even then there are practical and jurisdiction issues--e.g. if it's coded and hosted in a European country, how's the US government going to prevent its use in software other than their own? And at what point in a project is it considered "auditable?" Make it version 1, and it'll remain in beta forever.

    Subjecting small organizations to the same rigour as large ones only prevents innovative startups from happening, and ensures that only the lumbering megacorps will survive. They're the ones who could afford all the lawyers, "quality" coders, and necessary kickbacks. The last thing we need is for the software world to be turned into the fiasco that is the telecom industry; software patents are already making the software field a landmine.

    The most audited, vetted software in the world is probably that which runs the space shuttle. Overall it's probably cost tens or hundreds of millions to program/audit, uses hardware components over ten years old (all of which underwent their own audits), and all told is probably small enough to fit on a 16 MB thumb drive.

    There is no need to hold most software to the same degree of reliability. Does losing an hour's work because PowerPoint crash suck? Yes. Is it life-and-death? No (under normal circumstances). Is it worth having more government pork to audit Microsoft for security issues? No. And I despise Microsoft with a raging passion.

8 Catfish = 1 Octo-puss

Working...