Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
News

TCP/MS, We'll Cure What Ails You 478

Cringely can string some words together from time to time, and this week's installment is a pretty good one. He's been reading a little too much Gibson (raw sockets have nothing to do with the spread of MSTD [?] 's), but overall, he's probably right. When the time is ripe, I think we'll see a move exactly like this.
This discussion has been archived. No new comments can be posted.

TCP/MS, We'll Cure What Ails You

Comments Filter:
  • But it sounds to me like he wants MS to make a secure email product that would never, ever do something without the user's permission.
    I kinda found that funny, given MS's history.

    Besides, I severly doubt that the DOJ will look favorably upon this move, or even if ms will have the fortitude and the gonads to even propose such a thing.
    Yes, it would be cool, but I honestly think the folks in redmond don't have the ability to carry out something like this, on such a large scale and have it work properly from day one.

    I'm actually not sure who could design the protocol - perhaps a think tank of the best programmers around the world hired by several governments for actually good money?

    And yes, I read the last paragraph, and I still think XP's only redeeming feature is allowing us to write our own IP headers.
  • Old Days (Score:2, Insightful)

    by aoeuid ( 250239 )
    What ever happened to the good old days when virii were a thing to be admired, were hand crafted in assembler to use the fewest instructions, and took talent? It seems nowadays everything requires the user to click an attachment in their outlook program. Theres nothing creative about that!
  • by WasterDave ( 20047 ) <davep AT zedkep DOT com> on Thursday August 02, 2001 @11:24PM (#2112895)
    Look, raw sockets in windows are not the end of the world: they're available already, open source (http://netgroup-serv.polito.it/winpcap/), and you can run them as a non-privaleged user. In as much as MS have a concept of privaleged users.

    Even if they weren't, there are SO MANY possible security exploits you can run using a small army of 0wn3d windows boxes. Including (but not limited to) just packeting the crap out of Steve "Bloody" Gibson's webserver. For instance, has anyone considered using something to script the IE network libraries (COM objects, I would imagine) in the background and launch a 'many millions of perfectly valid requests, complete with cookies and everything' attack?

    How would you defend against that?

    This whole raw socket thing has been blown out of all proportion. Can we please stop fretting and find a way of PREVENTING these big attacks from being spread. Or possible. Or something.

    Dave >:(
    • Look, raw sockets in windows are not the end of the world: they're available already, open source (http://netgroup-serv.polito.it/winpcap/), and you can run them as a non-privaleged user. In as much as MS have a concept of privaleged users.

      Even if they weren't, there are SO MANY possible security exploits you can run using a small army of 0wn3d windows boxes. Including (but not limited to) just packeting the crap out of Steve "Bloody" Gibson's webserver.


      The point is not that raw sockets provides new exploit opportunities. The point is that raw sockets are required to spoof ip headers. With raw sockets Gibson would have not have been able to put in place the filters that he did because the attackers would constantly vary the source IP addresses using packet spoofing.

      Yes, winpcap exists. But Gibson's point is that without raw sockets in the core OS, it is hard to spoof packets. An attacker currently has to install a whole new network driver if they want to install a packet-spoofing exploit on a Win 9x/ME machine. Compared to the ease of writing simple trojans in VBS, this is very complex, and not something that we're seeing happening much (if at all) at the moment.

      Anyway, the existance of winpcap hardly reduces the power of Cringely's conspiracy theory that MS is intentionally making TCP into a broken protocol. You see, winpcap was developed with the assistance of the kind folks at MS Research...

      For instance, has anyone considered using something to script the IE network libraries (COM objects, I would imagine) in the background and launch a 'many millions of perfectly valid requests, complete with cookies and everything' attack.

      Sorry? I fail to see how using the InternetExplorer COM object introduces the opportunity for new exploits... It's hardly rocket-science to generate a well-formed HTTP request ('including cookies'--"wow I managed to include the text 'Set cookie:' in my HTTP header without even using MS's COM interface!")
  • by namespan ( 225296 ) <namespan.elitemail@org> on Friday August 03, 2001 @01:51AM (#2113142) Journal
    Someone needs to write some viruses that do the following things:

    1) educates -- infects your computer and gives you
    a multimedia presentation on flaws within "Hi! I'm Victor Virus!
    I'm an Outlook Virus. How did I get in your machine?"

    2) secures -- "Would you like me to install a Zone Management
    package?"

    3) explains alternatives -- "Did you know there are other alternatives
    to Microsoft?"

    4) Highlights Microsoft abuses...

    • While I can't help with 2-4, I wrote 2 things that help with #1. My web site offers to ability to Test Your E-mail Defenses [jasons-toolbox.com] by e-mailing you a harmless VBScript file. (It reads your registry, but doesn't change anything or send any info out.)

      I also wrote Script Sentry [jasons-toolbox.com] which traps those VBS scripts (as well as DOC, XLS, SHS, SHB, REG, HTA, and more), shows you details as to what it would do if run, and lets you decide whether or not you really want to run it. So if a user opens up that new Love Letter they just got in the mail and sees a "This will change your registry" message, hopefully they will be scared/wise enough to cancel the action.
  • by PureFiction ( 10256 ) on Thursday August 02, 2001 @11:31PM (#2113483)
    There seems to be a lot of confusion about this.

    Raw Sockets allow someone to send forged IP packets (spoofing) that appear to come from any IP address the sender chooses.

    This makes filtering a DoS attack harder, because you can no longer filter the traffic by IP or domain.

    So, right now the limited defense in the DDoS zombie attacks from Windoze is the fact that the IP packets have valid source addresses. These can be filtered at backbone or ISP provider routers.

    If these attacks used spoofed IP packets, there would be no easy defense.
    • Also (to my knowledge), *nix OSes restrict raw socket use to root. Guess what - XP Home edition has no such concept. Everyone is effectively root.
    • So, right now the limited defense in the DDoS zombie attacks from Windoze is the fact that the IP packets have valid source addresses. These can be filtered at backbone or ISP provider routers.

      ???!

      So says gibson. Why does that make things easier? Have you ever set up a screening router? You can filter out whatever you want...

      • It makes things easier on the target machine. Filters themselves require a fair amount of bandwidth and CPU to process incoming packets.

        If you are running web services on a limited bandwidth connection (T1/etc) a filter at your ISP (i.e. before your gateway router and you) prevents all the bogus traffic from reaching your machine and wasting bandwidth (and CPU).
    • by marm ( 144733 ) on Friday August 03, 2001 @01:06AM (#2154262)

      If these attacks used spoofed IP packets, there would be no easy defense.

      Except for if every damn net admin would WAKE UP and SMELL THE COFFEE and IMPLEMENT EGRESS FILTERING or SOURCE ROUTE VERIFICATION or whatever your router calls it.

      If you have a router built within the last 5 years, I can pretty much guarantee you it supports it. So turn it on already!

      If every border router on the internet used it, we could stamp out IP address spoofing overnight. No magic about it. All the border router has to do is check that the source address of the packet is within the range of addresses that it 'owns'. If it isn't, drop it, and log the MAC address so that it can be traced.

      Easy huh? Any router worth its salt can do it, so...

      Please!?!? What does it take to convince you?

      • If you're trusting the network without doing any proper checks, that's your problem. Somebody could plug in his own PC and start spoofing IP packets _today_. The release of WinXP doesn't change that.

        What about the 'only root can use ports 1024' feature of Unixes, which Windows doesn't implement? Does that mean that Windows is a security threat? No. If you're being so stupid as to trust the originating port number, you deserve everything you get.

        Egress and, er, ingress filtering around the edge of your network may be good enough most of the time; it doesn't protect you against PCs inside the network starting to spoof things, but you may feel you can trust your own employees (and don't let them run Outlook).
  • Stealth viruses (Score:2, Interesting)

    by shimmin ( 469139 )
    I have to disagree with Cringeley's comment that virii programmed to spread slowly and lie dormant for months would be more likely to go undetected until "deployment day" than the current generation of balls-out, spread-like-mad worms.

    Once a virus is detected, software can be written to clean it and possibly prevent its further transmission. These days, the delay between first detection and anti-virus software is usually a few days.

    The more time a virus spends lying dormant or slowly spreading, the more time there is for someone to find it and spread the word. There are a small number of highly secure systems run by highly paranoid sysadmins who do things like compare all files to known good copies on a regular basis and log all network traffic. Even a quiet virus will be detected if it attempts to spread to one of these systems. If the virus attempts to infect something like a Honeypot, it will be detected. And then, the game is up.

    These virii are only effective against the uninformed. The slower it moves, the more time it gives information to spread.

  • I'm fed up of the press reporting on this. There has been no real blame pointed at microsoft in the UK national press. So to do my part towards redressing the balance I wrote to the good old BBC. If you're pissed off about this, then why not put some pressure on the media to point the finger of blame (which they usually love to do). Here's what I wrote:

    There have been many news stories recently about "e-mail viruses" and the threat from the "code red" worm. I am concerned that little or no mention has been made of the fact that most of these threats rely on security holes in Microsoft software.

    I am a programmer. I also have an interest in security. Allowing e-mail attachments to execute any code is a ridiculous security threat which was just begging to be exploited (by, for example, the I LOVE YOU virus). The enormous threat of the code red worm has been due to the astonishing lack of security in IIS.

    Please make it clear that these threats are due to virus/worm writers, hackers who break the law to disrupt our own computers. But please also make it clear that it is because of secutiry problems in Microsoft software that these people can threaten our computer systems.

    I personally use Linux, a far more secure and stable operating system.

    Please re-dress the balance of your reporting. Hopefully the bad publicity will encourage MS to sort themselves out and that will promote a safer internet for us all.

    Cheers,
    j

  • In particular, to make program not do something that it shouldn't one doesn't need to rely on the protocol that is security-neutral anyway (the other end can be malicious even if you aren't) but should place restrictions on the processes on the host.

    Capabilities system, that now can be used to manipulate processes' abilitites to use raw sockets without making them run as root at the same time, is one of the examples how it's done in the kernel. While I am sure, neither RXC, nor Microsoft engineers looked a it, Linux already implements it and even had a sendmail security bug related to improper implementation of that.

  • by Lumpish Scholar ( 17107 ) on Thursday August 02, 2001 @11:39PM (#2120111) Homepage Journal
    "Cringely" and Dvorak keep saying, "No, seriously, shutdown the Internet and replace it with something secure."

    They're missing the first law of complex systems. I can't remember the exact quote, but it goes something like:

    All complex systems that work began as simple systems that worked.

    You can't replace today's Internet, the result of decades of evolution, with something purpose-built from scratch to do as much. The attempt will suffer from the second-system effect [tuxedo.org], and just plain won't work.

    It's easy for a columnist to ask for something drastic. Too easy. But it sells papers (or click-thrus, or whatever we're selling today).
  • But as consumers, guess what -- we won't even get a choice. Microsoft will require the PC makers to install XP in the factory. It will come on your PC, and you won't have the choice or option to pick something different. When Microsoft issues a new OS, it is forced into the market.

    I don't know about you guys (and gals), but last time I was at this tiny web site for a tiny computer manufacturer [dell.com], I had the choice of Win98 SE, WinME, Win2K or Win2K with an upgrade to WinXP. That doesn't sound like manufacturers are limiting my choice of viable Microsoft operating systems to me.

    People wouldn't be forced to participate, but if they remain anonymous, I might choose to block them. I certainly wouldn't accept file attachments from them. I know you hate this idea, but I think the Internet needs a fingerprint.

    Hmm... And who would control this "fingerprint"? Our beloved government, who is trustworthy? A large computer corporation like, say, Microsoft? And how would something like this work internationally? Who is forcing you to accept attachments now? I run Win98, WinME, Win2K and WinXP all on different machines. Over the last week, I've been sent about 10 emails with both SirCam and Badtrans, and none of my machines are infected. Why? First off, I didn't open the attachments right away. Second, I tested the attachments by saving them and then scanning them first. This is not a difficult concept! If someone puts a big package in your mailbox at home, and it's ticking, do you just open it up if the return address says it's from someone you trust?

    You can choose not to have a fingerprint, but then your ability to communicate with others may be limited -- a price many people may choose to pay.

    This is endorsed by the same crowd that bitches about MS Passports [slashdot.org]?

    If kids want to install an Internet game, the game's IP port would be registered and permitted to operate, hopefully by the parent.

    Why can I not see this happening in the general population? The average users I know bitch about having to confirm Internet activity when Zone Alarm or other personal firewalls pop up and ask.

    Programmers who ought to be familiar with Microsoft's plans have suggested that the real motive for raw socket support is for Microsoft to use Windows XP to exploit a bad situation, to deliberately make things worse.

    Jesus, what a conspiracy theory. This guy gets paid for this?

    Move along, Cringley. Common sense tells us that you're just spreading FUD. Meanwhile, I'll get modded down for criticizing you, I'm sure.

    --SC

  • by Compulawyer ( 318018 ) on Thursday August 02, 2001 @11:11PM (#2124581)
    Cringely makes a very astute observation: How did MS manage to avoid having all those VBS viruses tagged as MS Windows viruses or MS Outlook viruses instead of "email" viruses?
    • The local news programs that dispense opinions to the average folks have a tendency to simplify technological reports WAY past the point of inaccuracy. These news shows are aimed at the kind of user who doesn't know that there IS anything beyond what they do, and they don't really have a clue exactly what it is they're doing, anyway. They just do it, and most of the time, it works well enough for them.

      Back to my point, the majority of reports are not going to point out that these email virii only work through MS Outlook - because the news perceives that web-based mail and Outlook make up the totality of their target audience's concept of 'email'. And why should they take the time to be accurate? They might piss off Microsoft, they might alienate some viewers from their "friendly" news service, and it's close enough anyway.

    • by gmhowell ( 26755 ) <gmhowell@gmail.com> on Friday August 03, 2001 @12:21AM (#2134829) Homepage Journal
      There are probably a few convenient factors that prevent them from being called "Outlook viruses".

      First (as others say) is that the slobs in the media don't know of the existence of Mutt, Pine, Eudora, etc. They know Outlook, Notes, and AOL client.

      Second, they don't know the subject that they talk about. Here in Washington, there used to be some smart TV reporters. But they weren't photogenic enough, so they were fired, or offered bad jobs/pay cuts. So now, WUSA has a bunch of young, attractive morons on the payroll. What does this have to do about anything? Like many media outlets, they have no experience with anything. It's not just computers. It's local politics, health science, world events... Most (not the modifier) reporters are just dumb. Reminds me of a college roommate. Okay guy, but not the sharpest tack in the drawer.

      But, at least some of them interview people with half a clue. Which brings me to point three: the people they ask are either M$ users, MCSE's, or in some way involved heavily with Microsoft. To them, Outlook IS email. So they describe it that way.

      The next reason I see is simple: MSNBC. Yeah, yeah, yeah, separate editorial staff, independent reporters, yadda, yadda, yadda.

      Now, take all of these (which individually might be minor) but remember how much news comes over an AP wire (or Bloomberg, or whomever). Listen to your local news. Much of it is a rehash of some simple wire-service article. Reporting with an emphasis on the 're'. And these folks don't know tech.

      I doubt that any of these alone could cause the problems. But taken as a whole, we have this situation. Basically, the blind leading the blind.

    • by ink ( 4325 ) on Thursday August 02, 2001 @11:37PM (#2137991) Homepage
      Some IT consultant was talking on the radio the other day about Code Red, and she was actually apologizing for Microsoft. I couldn't believe it! She said (paraprased), "Microsoft has thousands of employees, and keeping track of everything they do is almost impossible. They have quality assurance tests, but as we all know, these aren't perfect." I was dumbfounded by her slobbering backpeddling, and she wasn't even an employee of Microsoft!

      The only way I can explain it is that most people use Microsoft software, and what we use must be the best, right? I mean, how often does someone buy a new car and then complain about all the problems that it undoubtedly has? Hardly ever. It must be the same with computers; the Windows users have an emotional investment in the product and they want everything to be just fine, so they apologize for shoddy software; "Oh Windows crashed, I bet the next version is better, this one is getting quite old", "Oh I got a virus, I wish those evil hackers would be put to death". See my point? They never think to blame Microsoft because they are Microsoft to a certain extent; they belong to a huge fanclub of a massive group of people. That's gotta feel good.

      And it makes it tough for us non-Microsoft users to get along with. Like the abused wife that toddles on back to her jerk of a husband, so the users return to Outlook, because "this time it will be better" and "I don't know how I could possibly function if my calendar and e-mail client were two separate programs."

      • by Polo ( 30659 ) on Friday August 03, 2001 @01:38AM (#2119644) Homepage
        You know, I thought the same thing as she did in the past. I'd worked for large companies and I knew how incompatibilities cropped up and it was just from engineers being distanced from their customers.

        Well, I was chatting with an ex-microsoft employee who had moved over to the white-side and he put things in perspective. Microsoft has strategic meetings where they sit around a table and say "how can we own this?"

        That put a different light on all those subtle incompatibilities I had always had to deal with.

        Backslash instead of slash in paths... / for options instead of - (remember switchchar? ..someone took it out) CR/LF instead of NL. ^Z as EOF. blah, blah. I wonder how many of these are deliberate?
        • Microsoft has strategic meetings where they sit around a table and say "how can we own this?"

          So does any and every company that is run by good strategists (i.e. any business that wants to stay in business for the long haul). That's the basic business process: Find a niche, find a way to enter it and then find a way to dominate it. That's just being competitive in the marketplace.

          Where it becomes a problem (and illegal, in many countries) is when a company (ab)uses its monopoly in one niche to dominate another niche, rather than trying to gain dominance through making a better product, doing a better job of marketing, setting a lower price, etc.

      • by Anonymous Coward
        I keep going back to Microsoft because he's kind and gentle and loving. He cuddles after sex and he's always complimenting my figure. He's never attacked me. Ever. Not like that last jerk I dated. Linux was a bastard and he beat me nightly. Me and Microsoft were just good friends at the time and he was dependable. Linux never quite liked Microsoft. He was always saying, 'D00d, dat Micro$oft sux0rs. Free software rules! He ain't nothing but a buggy BSOD-loving freak.' I couldn't stand him and his arrogance. Thankfully, we broke up. Microsoft and I got together and things were good. Occasionally we get together with BeOS for a threesome. She's a real nice number and she's able to do everything for me Microsoft couldn't.

        I'm happy now.
      • by bikepunk ( 223490 ) on Friday August 03, 2001 @12:15AM (#2139490) Homepage
        The whole "monetary investment" concept is hitting the nail on the head.

        Scenerio one:
        -- Arthritis is, by nature, a waxing and waning problem for people who experience it. This means that half the time it hurts and half the time it doesn't on average. The medications for it aren't always that good, and barely affect the 50/50 chance of improvment.
        -- Let's say a filthy-rich golfer buys a copper bracelet for 100 dollars to cure his arthritis, and he experiences a decrease in pain! Note that this decrease in pain is likely to be a naturally-occuring decrease. Nonetheless, he attributes this decrease in pain to the copper bracelet.
        -- Now, another filthy-rich golfer also bought a copper braqcelet for 100 dollars to cure her arthritis, and she experiences an increase in pain. In other words, the bracelet appears to have done nothing for her arthritis. She paid 100 dollars for it, so she doesn't really feel like admitting her foolishness for buying the bracelet, of course!
        -- In summary, about 50% of the people who buy copper bracelets go on to recommend them to friends, and 50% of them are too embarassed to say anything bad about them.

        Now, go next door, and talk to your neighbor about their computer's operating system and computer that they just put down a few month's salary on. Are they going to say anything bad about the super-duper Wintel machine they just drained their wallets for? I doubt it. Also, what are they going to compare it to?

        People feel a lot better having to pay for a product and seeing a smooth interface and knowing that their company endorses it. This seems to be a fact of capitalism. I really hope this fact becomes fiction...

        Footnote: The copper-bracelet example is from some medical/doctor journal/magazine article. Sorry, but I can't remember the issue number or title. Anybody know the article I'm thinking of? I hate using nifty ideas and not giving due credit :)
    • by IronChef ( 164482 ) on Friday August 03, 2001 @01:00AM (#2154310)

      It's simple. 95% of the computer-using public doesn't know that there is anything besides Microsoft out there. I have had people tell me crazy things like "of course Macs run Windows."

      So, naturally they'll call this an "email virus" or "computer virus" instead of "a shoddy security flaw particular to one operating system." The level of analysis in the latter description is far, far over the head of most computer users. And MS doesn't have any competition to make security a big deal in their OS advertisements.

      (I love Apple, but we Apple users just don't count. There are not enough of us. Like it or not, we are the lunatic fringe. Long live the fringe though!)

      To most folks, Microsoft is a benevolent, Barney- like giant without which there wouldn't be computers at all. "How can you blame such a wonderful company for what some misceant hackers do? It certainly isn't Microsoft's fault that computers have these fundamental flaws, or that there are people that exploit them. Ooh! Someone emailed me a magic elf animation!"

      Like ex-Pres Clinton, Microsoft has a teflon coating. Fascinating, and disturbing.
    • Because they not MS's fault despite what the open source community would have you believe. I used to believe the same thing, but think about it:
      • Viruses must be targetted at the most prevalent software - a virus written for mutt isn't going to spread anywhere as it will be mailed to 9 Outlooks, 2 NS messengers, and a pine.
      • Security priviledges don't make you any more secure for these. So the attachment you ran isn't running root, so what - it still has access to your address list file, it can still send email, and it can still delete the files you actually care about (as opposed to the ones that come with the distro).
      • Unix poeple are normally computer savvy so are a less likely target for social manipulation, but if the answer was to switch to linux then all the people who have to work with computers but don't care for them or know much about them (non IT businesses) would be using linux. If these people got an email from a coworker asking them to run the attachment, they would.
      • Social manipulation asside. There have been the odd viruses taking advantage of MS security flaws - ones where you don't even have to open the attachment to get infected, granted. Any software written in C running on windows or linux is vulernable to things like this - NS Messenger for instance (runs on many platforms) had a buffer overrun bug meaning you could run arbitrary code on someones machine just by sending them a message. pine and mutt etc might have many but since they aren't popular it doesn't matter.
      Sure, Microsoft haven't doen nearly as much to prevent this stuff as they should have, but I think that if every man and his dog was running your 'safe' email client on your 'safe' OS, you would find it wasn't very safe at all.

      Rather than everyone switch from outlook, the solution is probably for everyone to be a little less inbred with which email clients they use.
  • All right, consarnit, I've had just about enough. I've been listening to you geeks fight with each other about this Intranet for a while now, and I'm just about fed up. Some of my boys have been telling me to just let you guys fight it out, but I really don't see any progress. It's inferurating! I didn't stand for this kind of crap at my former job, and I'm sure not gonna stand for it now.

    So here's what we're gonna do. We're gonna split the Intranet right down the middle. That's right, the whole dang Intranet, from Wahoo to The Amazon's, right straight down the middle. And don't you be like some of my guys around here, telling me that it's "impractical" or "impossible", or that "I have no clue how the Intranet works", cause I don't really want to hear it. I've had enough, and it's time to take action.

    So like I said, straight down the middle. One half goes to that Billy Gates guy up there in Seattle, the other goes to you Linucks guys. Now, I understand that there's not one guy in charge of Linucks, so I'd suggest you form a committee to handle it. If you need some help with that, well, drop me a line, and come on up for some help: if there's one thing I know about, it's committee's.

    So anyway, one half to Billy, one half to Linucks. Both parties will be able to run the Intranet however they want, and we'll let the American People decide. The American People deserve the best, most great Intranet they deserve, and it's high time we let The American People decide the future of the Intranet. It's simple economics people, like you learned in college, the Law of Diminishing Returns! Adam Schiff himself would be proud!

    Signed, George W. Bush
  • by Polo ( 30659 ) on Thursday August 02, 2001 @11:20PM (#2126441) Homepage
    Hasn't microsoft already brok^H^H^H^H embraced-and-extended TCP/IP lots of times before?

    There was a time when Sun servers responded "slowly" to windows HTTP requests because microsoft changed the behavior of TCP slowstart, etc...

    I'm sure there are other examples.
    • I'm pretty sure that was an accident -- it was an old BSD bug that they inherited, and their million-monkey QA process would never find a minor performance regression, would it?
      Btw, it wasn't just HTTP requests that were slow, it was any TCP connection establishment.
  • Is this guy nuts? (Score:5, Insightful)

    by Carbonate ( 13973 ) on Thursday August 02, 2001 @11:20PM (#2127043)
    I used to respect this person but now I have to wonder what kind of technical background he has and if that background is backed up by ay sound reasoning ability. I remember watching conspiracy theory in the theaters (You know with Mel Gipson). That had some pretty crazy ideas but this is just nuts. At one point in this article he suggests that everyone loose his or her anonymity. Then at another point in the article he criticizes Microsoft for their supposed protocol, which will remove anonymity. This article seems more like a rant by a frustrated Windows user than an actual intelligent discussion on the security problems of Windows.
    • by wiredog ( 43288 )
      I have to wonder what kind of technical background he has

      Well, he was a hacker before he went into journalism. Worked for Apple in the garage days. Read about his DSL/802.11 link. He has some technical expertise and he knows who to talk to at MS, Apple, and other places. I think the MS plan he talks about (TCP/MS) is interesting (not neccessarily good, just interesting). He does have good sources.

  • Wrong Premise (Score:5, Insightful)

    by PureFiction ( 10256 ) on Thursday August 02, 2001 @11:23PM (#2129265)
    The two main points of this article are based on flawed assumptions.

    1. Raw sockets in windoze is not the end of the world. *nix systems have them, even vxworks. A number of ISP's filter forged packets. If this type of spoofing is such a harm, it is trivial for ISPs to implement this. Cripling stack interfaces in OS'es is rediculous.

    2. Passport will not authenticate every connection made on the net. Sorry, this is a pipe dream M$ sold you on somehow. And second, priority net traffic based on M$ passport is even more impossible.

  • Somehow I doubt it (Score:3, Insightful)

    by strags ( 209606 ) on Thursday August 02, 2001 @11:24PM (#2129267)
    Although most end-users are running a MS-based operating system, there is simply too much non-MS underlying internet infrastructure for such a radical change in protocol. TCP/IP is going to be around for a very long time.

    Furthermore, how is it exactly that TCP/MS would prevent things like Code Red from happening? An application is vulnerable to stack overflow exploits because of the application code itself, not because of the protocol through which it receives data. Registering the ports that an application listens on won't help if the app contains a vulnerability.

    Cringely goes on to suggest that all connections be traceable - well, that's fine, except that it doesn't solve the problem of people launching viruses from public terminals, or obtaining free trial dialup accounts using fictitious information. Digitally signing specific applicaitons with an Active-X control style GUID, and only granting access to validly signed applications might help, but I can't see developers embracing that idea. Even if they did, it only takes one compromised certificate to release any number of malicious programs.

    And did Gibson actually write Zone Alarm? Cringely seems to think so, but it's marketed by Zone Labs, not GRC.COM. Anyone know for sure?

    Strags
    • Cringely goes on to suggest that all connections be traceable - well, that's fine, except that it doesn't solve the problem of people launching viruses from public terminals, or obtaining free trial dialup accounts using fictitious information.

      This somewhat misses the point of traceable TCP. It doesn't matter whether we catch the bad guy, what matters is that we can stop the flow of traffic to our overloaded site. Untraceable traffic cannot be effectively firewalled against.

  • by Anonymous Coward
    I want some of whatever Cringely is smoking. He seems to having some really wild hallucinations.
  • I took a look... and it looks like Cringley summarized items from other sources, including Gibson, PC Mag, and more.

    That, and we normal folk already knew them anyway.... well, for odd values of "normal", anyway.

  • by Dancin_Santa ( 265275 ) <DancinSanta@gmail.com> on Thursday August 02, 2001 @11:13PM (#2132599) Journal
    We could implement a secure user identity system precisely like telephone Caller ID. It would be essentially an Internet ID. All Internet transactions could be based on it. Anyone who sends me e-mail can be identified. Anything I send can be traced to me. People wouldn't be forced to participate, but if they remain anonymous, I might choose to block them. I certainly wouldn't accept file attachments from them.

    You can already do this. You can trace email. You can block email from those you don't know. And this system won't work to block email worms because usually they come from people who you know.

    Get with it, man!

    Dancin Santa
    • We could implement a secure user identity system precisely like telephone Caller ID. It would be essentially an Internet ID. All Internet transactions could be based on it. Anyone who sends me e-mail can be identified. Anything I send can be traced to me. People wouldn't be forced to participate, but if they remain anonymous, I might choose to block them. I certainly wouldn't accept file attachments from them.

      You can already do this. You can trace email. You can block email from those you don't know. And this system won't work to block email worms because usually they come from people who you know.

      Caller ID, like rdns mapping of incomming ip addresses (cumbersome) etc. You can do this sort of strategy on so many levels... Of course someone who says that Linux is safer than Windows on one hand and that raw sockets are dangerous evidently is simply paroting what he has read and not actually studied the matter. Has he heard of any sort of authentication service or tactic? That is what these are about and of course many people do block people without the proper credentials from access to their networks ;)

      Raw sockets exist in Windows 2000, and I assume that it has a bit to do with the FreeBSD code in the TCP/IP stack... This code has helped to make Win 2k far more stable on a network than its predicessor, IMO. If they are such of a problem, why not acuse Linux or FreeBSD of the same problem...

      He also states:

      And what's with those file attachments, anyway? Replace mail clients and APIs with secure models. The new model will not run attachments as they do today. E-mail attachments should not have access to the e-mail client, APIs, etc. Attachments should not have access to the operating system by default. The user should approve the use of some APIs, like having to give permission before device drivers are updated.

      This guy is out to lunch. It is simply sufficient to limit user privilages and require them to export the attatchments before they can be run.

      The only e-mail activity on my PC should be initiated by me, personally. Nothing else should access my address book or send out messages without my express permission. Microsoft will of course reject the idea, mostly because it will fail the "increase market share litmus test." My answer is, "Microsoft, if you do not take responsibility for locking down your APIs, it will become obvious to the public and become a detriment to your market share."

      Which Office XP does quite nicely. Of course SirCam bypasses these controls and sets up its own smtp server... YOu cannot get around it totally. I am no more a Microsoft fan than the next guy, but this buy is a bit over the top...

  • by ellem ( 147712 ) <ellem52.gmail@com> on Thursday August 02, 2001 @11:50PM (#2133038) Homepage Journal
    --News Flash Y2K was a hoax.

    --News Flash The internet is not going to be "shut down" by any stupid virus.

    --Any half decent FW comes with its own proprietary TCP/IP stack... Yeah MS might think about changing over to something else.

    --It is time for "technologists" to cut it out and stop trying to scare the Hell out of everyone with this MS is evil and the internet is falling shit.

    --Bottom line if MS was as bad as WE all think it is it WOULD disappear. Truth is it isn't that horrible. For 90 minutes at a time it's a great gaming platform.
  • I think cringely needs to quit posting while stoned.
    After reading his rant, which admittedly does bring up a couple of interesting points (although the idea of M$ trying an Embrace and Extinguish on TCP/IP strikes me as one which, if attempted, would be laughable in its arrogance and stupidity), I think overall Cringely contradicts himself. First he talks like setting a GUID for everyone on the internet is a Good Idea, and then later on in the article, he attributes the same idea to the Evil Software branch of Microsoft. So, which is it?
    On one point I totally agree, however. The current rash of email worms are entirely due to a business decision on the part of Microsoft, and they are culpable. The best, simplest, and most obvious way to fix a good part of this would indeed be to prevent email software promiscuous access to attachments embedded in email messages. No amount of restating the obvious, it seems, is able to either convince institutions to quit sending these (which are often, most unneccessarily and foolishly, in Word format), or to convince mom and pop users to not open them, or at least scan them for viruses before opening. And I'm sorry, but if you open a file sent from someone you've never heard of promising to display a naked celebrity, you get what's coming.
  • by mjh ( 57755 ) <(moc.nalcnroh) (ta) (kram)> on Friday August 03, 2001 @10:27AM (#2133082) Homepage Journal
    The deal with raw sockets seems to be more complex than any of the posts that I've read here.

    The deal is that w/out raw sockets, in order to send large ammounts of data, you have to send UDP packets with the data. When creating a datagram socket (i.e. for sending UDP packets), you don't have to get a succesful return from connect() prior to sending data. Thus you can just start sending huge packets.

    But with stream socket (i.e. for sending TCP packets), you have to get a successful return from connect() before you can start sending data. Which means that before you can send any data to a server, you have to send a SYN packet, get a SYN-ACK packet back, and then send an ACK packet. Only then will connect() return with a success, and then you can start bombing away at the server with huge packets. But even then if you don't send them in a form that is recognizable by the application, the server will just issue a RST and close down the connection. For example, if your stream doesn't include HELO foobar, when you connect to an email server, the server will just disconnect.

    Non-raw sockets make it easier to filter out attacks at the upstream provider because they are usually UDP packets which your web application does *not* need. So you just filter them and then you're done with it.

    With raw sockets, it becomes *much* harder to filter upstream. WIth a raw socket, you can create a SYN packet from a random IP address to a web server on PORT 80. That SYN packet can be 9k long if you want it to be. And it will be to a port that you can't easily filter out . Basically, it makes the DDoS attack much easier and harder to prevent. The attack could come from any IP address , and it will be destined for your web server, which (presumably) you want to keep running. How do you filter out a packet destined to port 80 from possibly anywhere without also filtering out the legitimate connections?

    Of course, even without raw sockets, you can still initiate a DDoS attack against a TCP port. If there were fewer script kiddies and more programers, it would not be that difficult to write a simple program that uses a stream socket, and DDoS's with a well formed HTTP POST that posts 18MB of data. If the DDoS kiddies were able to program, then that's what they'd do, and they wouldn't need raw sockets to accomplish it.

    So while I agree that the addition of raw sockets really isn't that big of a deal, it seems to me that it's a little bit more complex than what I've seen so far.

    $.02

  • Somewhat Flawed... (Score:3, Interesting)

    by kstumpf ( 218897 ) on Thursday August 02, 2001 @11:37PM (#2137200)
    Here is my preferred solution for Internet security. We could implement a secure user identity system precisely like telephone Caller ID. It would be essentially an Internet ID. All Internet transactions could be based on it. Anyone who sends me e-mail can be identified.

    This seems like a nice idea, but I'm not for it, and I'm not sure if it even feasible. An IP address is already like caller ID.

    Lets say you were assigned this new unique ID. Who's responsible for ensuring the identity of the payload remains unaltered? The software maker? That sounds familiar! Today, when you send mail, your message might sit at several relays. Is it up to the mail server to implement tracking of this ID? Could you not simply make a mail server that ignored this precedent and spoofed whatever it wanted? This seems the same as someone getting a shell on a box and running some kind of custom relay meant for delivering spam mail anonymously.

    I also can't imagine a business deciding to ignore mail based on the lack of this identification. If you have to favor security over a new customer, you have other problems.

    The funny thing about this article is that a PC implementing his ideas for security could easily exist now, but the fact is Microsoft isnt going to do that. If they can't follow measures to implement good security now, why would they under this new system?

    Personally, I hope the answer to all this DOS'ing does not involve me losing what anonymity I do have (which doesnt seem like much at this point anyway).

  • Sock_Raw (Score:5, Informative)

    by NitsujTPU ( 19263 ) on Thursday August 02, 2001 @11:24PM (#2137609)
    This is true, I have NO IDEA what Cringley is saying when he says that raw sockets allow for more viruses and such to be introduced to your system.

    For the uninitiated...

    Generally, when programming, you define a great many things when defining a socket, the layer of abstraction to tcp/ip defining a single connection.

    SOCK_RAW is a bit less abstract, you define more of the data that is being used by hand rather than allowing for the socket code to do it for you. Generally the you use SOCK_STREAM of SOCK_DGRAM, which define TCP and UDP sockets, respectively. SOCK_RAW writes directly to IP, so you must encode many of the headers manually rather than automatically, as the other 2 would do, and then write them to this socket.

    In other words, it has NOTHING to do with getting viruses! SOCK_RAW is just another socket, but you are writing to the IP protocol, rather than TCP or UDP (which sit on top of IP). It also has nothing to do with being DoS attacked. I have NO CLUE where he got that from.
    • Re:Sock_Raw (Score:3, Informative)

      by strags ( 209606 )
      SOCK_RAW access permits applications to spoof source IP addresses, thus disguising the source of a DoS attack.
  • In other news... (Score:4, Insightful)

    by LyNXeD ( 463123 ) on Friday August 03, 2001 @12:17AM (#2138082)
    Micro$oft (NASDAQ: M$FT) today realized that their new TCP/MS protocol will not function over the Internet's (mostly-non-M$) infrastructure. The TCP/MS protocol is designed to address some of the security issues involved with the industry-standard TCP/IP protocol. It allows for authentication and tracing, to allow large corporations to know who does what, when, where, and how.

    Micro$oft is not held back by this issue, however. They are currently working on developing a solution called "MS-over-IP" which will allow TCP/MS packets to travel over non-M$-compliant IP networks. This will be available as a patch to the upcoming Windows XP, for approximately $300. Micro$oft also notes that if your ISP refuses to conform to the new TCP/MS standard, and you do not wish to spend $300, you may switch to their M$N Internet $ervice, which will support native TCP/MS connections.

    Micro$oft did not return any calls to our reporters on this issue, and simply sent us an E-Mail saying: "All your packets are belong to us."
    • funny. although i don't think there is much value in controlling the underlying packet layer--it would be like Micro-Channel Architecture all over again. i think microsoft would be more concerned with content and .net.
  • Already been done... (Score:4, Interesting)

    by ckm ( 87462 ) on Thursday August 02, 2001 @11:34PM (#2142069) Homepage
    We already have a replacement for IP that does many of these things. It's already supported under Linux, and probably a couple of other OSs I don't know about.

    It's called IPv6, and it has QOS, guarenteed delivery, traceablity, and a whole host of other goodies. C'mon, do you really thing Cisco would let MS take away their bread and butter? IPv6 has been in the works for years and was designed specifically to solve all of the issues he mentions. I guess he thinks that only MS is smart enough to develop a new protocol...

    This whole article is a red herring, and Cringley's about a technically literate as a door knob.
    • This whole article is a red herring, and Cringley's about a technically literate as a door knob.
      I've stayed in hotels that have a computer in each door knob. I think you're overestimating Cringley's skills.
    • IPV6 will never replace IPV4. IPV6 is a designed-by-committee monstrosity that purports to do everything for everyone. Looking at the feature set, implementing a correct stack seems to be neigh on impossible. Look how many years its taken for the first fully-compliant IPV4 stack to be made [thanks to Linux], and then look at how much more compliated IPV6 is. Implementing all the features of IPV6, and having them work across all platforms and routers is going to be a chore in and of itself. Getting all backbone/ISP/OS/DLL providers and manufacturers to support it and all of it's features is going to be a political and technical hell.

      We're running IPV6 already with other universities over i2 and I don't see this happening on a large scale for at least another 10 years (and personally, I doubt it will ever happen without some intervening step like a IPV4b or MS/IP...)


    • One of the reasons that IPv6 is not very popular is because the MS version is proprietary as hell. MS is waiting for the big switch to IPv6 so incompatabilities between Unix and NT/winME could show up. At the time when the first MS-IPv6 stack was written, ms arrogantly assumed NT would own %80 of the server market by the time IPv6 became standard.

      With almost everything running on NT, MS could then easily convince IT managers to only run NT on all servers for full network compatibility. The good news is that Microsoft's server dream never came quite true. Unix is still king on the Internet and is surprising gaining marketshare. At only %35 of the server market, I believe the MS IPv6 will not be very standard even if the whole Internet switches to the standard IPv6. But due to the MS-IPv6 problem, IPv4 will never quite go away.

      • Slow down your shoveling boy... you might hurt yourself.

        So exactly how can Microsoft's IPv6 stack be proprietary, when they don't own the routers, switches, et al? You see, if they change the format of the packets, then the router needs to accept the new format. Since CISCO should be setting up their IPv6 stuff to the agreed standard, that leaves Microsoft little choice.

        Microsoft's network protocol implementations have always been fairly standard and able to interact with the world at large. I don't see that changing in the future.

        As for IPv6, I don't see that really rolling out until XP covers much of the marketplace. XP (and the Server 2002 editions) should have native IPv6 support.

        Stop spewing FUD. It isn't any more endearing than when Microsoft does it.
      • by ckm ( 87462 )

        Actually, I've heard that IPv6 is not popular because none of the current backbone equipment will switch it and no one wants to be responsible for conversion from v6 to legacy IP...

        If MS's implementation is buggy/not compatible, then it probably won't work through any switches or routers, and they will have to change it. IPv6 does have some provisions for vendor specific fields, ala Kerberos, but that'll go over about as well as MS's TNF email format (read 'not at all'), esp. in such a wide open environment as the 'net.

        After all, it's not called the INTERnet for nothing. However, I don't doubt that they will be able to push their proprietary extensions into corporate environments, but they really already have done that (SMB & MAPI).

        The reality is that TCP/IP is really too low level for MS to worry about. There is no added value to controlling packets, only the payload, which is why they are pushing .net...

        Chris.
    • IPv6 myths (Score:4, Informative)

      by Cato ( 8296 ) on Friday August 03, 2001 @04:43AM (#2149459)
      IPv6 does not have any more support for QoS than IPv4 (except for the flow label, only useful with RSVP, which is very rarely deployed). I work for a software company that enables people to deliver QoS today on IPv4, and quite a few are happily doing so.

      IPv6 does not have 'traceability' - there is an IETF RFC detailing how to have slowly changing IEEE identifiers (MAC addresses) so that your IPv6 address will not include a static ethernet card MAC address. No more traceable than IPv4, and better in some ways.

      IPv6 has no more guaranteed delivery than IPv4 - both of them can use TCP to ensure delivery of packets, but IPv6 has no special features in this area.

      IPv6 is all about larger address space, easier router/host configuration and auto-configuration, easier re-addressing, better mobile IP, reduced routing table sizes, simplified options processing, and simplified headers. Please read up on IPv6 at http://www.ipv6forum.com before making these misleading statements.
  • by Infonaut ( 96956 ) <infonaut@gmail.com> on Friday August 03, 2001 @02:27AM (#2142331) Homepage Journal
    Sure, Cringely is not a technical maven, and debating the finer points of TCP/IP is probably best left to people like.. well, like Slashdot members.

    But Cringely's real point is that Microsoft is a very powerful company with a long history of turning its own technical shortcomings into market strengths. Microsoft's PR machine is incredibly effective - witness the FUD that kicks into high gear any time MS announces anything.

    It's also instructional to remember a few Microsoft projects that didn't go off as planned. Ever wonder why journalists never bring up those failed efforts, or points to the millions of wasted dollars MS has spent over the years on vaporware?

    Remember how Microsoft Bob was going to "personalize" the computing experience? Well, it failed not once, but twice! [wired.com]. Remember how Chrome [cnet.com] was going to "revolutionize the industry," according to the drooling press?

    Because Microsoft is the 800-lb. gorilla of the software world, even when they fail, they get the benefit of the doubt. It comes with the territory. Also, because the Microsoft culture is fantatical about continuous improvement, they have a long history of sucking hard at v1, sucking at v2, becoming fairly usable at v3, and taking over the market by v4 and beyond.

    Microsoft has been doing this long enough to realize an opportunity when they see one. Cringely is reminding us that unlike all of you Slashdot readers out there, Microsoft is driven not by desire to build cool, useful technology, but by the desire to control marketshare. That's the be-all, end-all of their existence.

    So whether Cringely is correct about raw sockets or the demise of TCP/IP doesn't really matter. Almost every company that has gone toe-to-toe against Microsoft in a market segment has failed because they continually underestimate and miscalculate Microsoft's strengths (IBM, Novell, Apple, WordPerfect, Lotus).

    Microsoft has an overarching vision of the computer marketplace that is far more evolved than any of their competitors, with the possible exception of Sun.

    Microsoft remains unconcerned with business ethics, is unafraid of censure by the government, and wouldn't hesitate to use the ubiquitous of their own flawed products as an excuse to move the foundation of the Internet to a proprietary framework.

    Microsoft doesn't give a shit about the history of the Internet and the spirit in which it was created. They don't give a shit about letting everyone in.

    If Microsoft believes they can make the Internet a proprietary environment that they can control, they will work relentlessly toward that end.

    • Very well written and accurate portrayal of Microsoft and their vision of computing. While Cringly's idea of TCP/MS may seem far-fetched, you are right on the money regarding their desire for such a protocol. If Microsoft could embrace and extend the internet, it would in a heartbeat. If that ever did happen, it would be the end of the free internet as we know it.

      Unfortunately, only the free-thinkers would see it that way. The mindless herd of end users that follows Microsoft would know no different. They would continue to surf and enjoy their digital playground and carry with them the same illusion of freedom they have about the rest of America. These same people never knowing about the DMCA, Sklyarov, DeCSS, or fair-use, (because the media practices awareness control over the public) would just assume that's the way it's always been. The movie, "The Matrix," at least metaphorically speaking, is not far from the truth. In the future, I see a day when people are too "attached" to a system to let go. In this future, I see people who can't define their own reality or even define freedom because of the constraints that are placed upon them since birth. In other words, they will have lost the ability to step outside the box and question the facade they call "reality".

      Maybe I've read "Brave New World" one too many times, but the parent post and Cringly's article make for a great introduction to a new 1984esque type of novel. Ok, so I got a little carried away there. LOL.. Anyhow, what I meant convey was that the average user would probably not care since they use windows anyway. They would see all the neat new services that passport provides and consider it a "feature." As scary as this may sound to you, the average joe user knows no better. However, with IPv6 right around the corner, I don't see Microsoft embracing TCP/IP. But have no doubt, if Microsoft could change the very protocol of the internet in yet another attempt capture even more marketshare, I have no doubt that they would at least try. That is what scares me about this company - the complete and total disregard for the open standards that allowed them to become so big in the first place.
  • by GroundBounce ( 20126 ) on Friday August 03, 2001 @01:52AM (#2145418)
    I can see the part about TCP/MS as being a remote possibility, but the real problem with the theory is the part about Microsoft introducing something like raw sockets specifically to encourage abuses that they hope will subsequently be blamed only on hackers, UNIX, and TCP/IP itself.

    This would seem to be an extremely risky strategy due to the high potential that it could backfire from a public perception point of view. My experience is that despite the fact that some people are apologetic toward Microsoft as Cringley points out, there is a steadily growing public perception of the weakness of Microsoft products.

    Many Windows users that I know use it because they feel they have to, either for the applications they need, because their workplace demands it, or because they feel they are too non-technical to use an alternative like Linux (and believe me, many of them are). They are well aware of the instabilities and the susceptability to virii, and in fact many of the Windows users I know joke about it all the time even though they use Windows for various practical reasons.

    I think at this point in time, if Windows XP doesn't live up to the MS hype about it being a more stable and robust platform, and ends up in fact being less robust, they run a significant risk of damaging their public perception; probably not fatally, but noticably none the less. Given the fact that a wholesale migration to TCP/MS, while possible, is far from a sure thing, this would seem to be a rather risky strategy.
  • by ObligatoryUserName ( 126027 ) on Friday August 03, 2001 @01:58AM (#2147391) Journal
    What so far, most of what I've seen people post are Microsoft apologists, and predictions that it's all overblown, and confused people who think Cringly's confused because they can't follow all his threads.

    No he's not saying viruses spread over raw sockets. He's saying that many viruses/worms like Code Red have the end effect of creating a denial of service attack; denial of service attacks are very difficult to block when the addresses of the packets are spoofed. He's saying that in the future, when 90%+ of the world is running Windows XP (and Windows 95/98/ME/2000 has been discontinued by Microsoft- ever try to get Windows 3.1 anymore?), and 90% of those people haven't used third party tools to secure their computers, there will be a continuous series of distributed denial of service attacks, and viruses like Code Red which will effectivly bring the Internet to a halt. (Most servers aren't running Microsoft OSes, but most of the clients are- the fact that Apache is the most used server is completly unimportant in this matter. Code Red isn't as bad as predicted because most people don't run Windows 2000, but XP unifies the server and consumer OSes so it'll be running on a very large number of computers, making these future problems several orders of magnitute worse.) The end result (as predicted by Cringly) is that Microsoft will extend and embrace TCP to get the Internet (which will be rendered useless by script kiddies and/or attacking foreign governments) working again.

    Once implemented, if your web server doesn't speak MS/TCP then no one with Windows will be able to see your site. (And the only servers that will have bug free implementations of MS/TCP will be running a Microsoft OS.) Think that little ploy is hardly enough to overturn the Internet? Then why am I using IE right now? Their ploys have undone greater marketshares.

    Someone said that Cisco is working on a way to prevent spoofed IPs at the router, if this is true, then this speculation is for naught. However, the fact that this is plausible should be a wake up call. Microsoft owns all of us. This is the straw that broke the camel's back, I'll resign before I install Windows XP. Microsoft's abuse of their monopoly is an affront to freedom. Live free, or die.

  • by Safety Cap ( 253500 ) on Thursday August 02, 2001 @11:17PM (#2147723) Homepage Journal
    By default, under this scenario, your PC becomes a TCP/IP read-only device. By running applications like Gibson's Zone Alarm you can -- right now -- severely limit the use of TCP/IP by applications on your PC

    I didn't know Steve Gibson [grc.com] wrote Zone Alarm [zonelabs.com]. When did this happen? What happened to Zone Labs [zonelabs.com]?!

    • by jeremy f ( 48588 ) on Thursday August 02, 2001 @11:20PM (#2121676) Homepage
      Gibson constantly plugs Zone Alarm, so it's not suprising that people who don't read carefully would think that Zone Alarm is a GRC product, not a Zone Labs product.

      If Gibson wrote Zone Alarm, it'd look as ugly as hell, have lots of BIG and alternating fonts, but be less than 300k in size, written in ASM, and fast as hell.
      • Gibson constantly plugs Zone Alarm

        Seeing as how Zone Alarm is the only darn free/software firewall that appears to work [grc.com], then why run anything else? I'd like to see Microsoft's crack team of security "experts" come up with something comparable.

        Oh wait, they did [microsoft.com].

        Hahahahah

        • Actually ZoneAlarm [zonelabs.com] is an ok piece of software however Tiny Software [tinysoftware.com]'s Tiny Personal Firewall [tinysoftware.com] is a much much better piece of software. The firewall in addition to allowing applications access to the net allow you to setup specific permit and deny rules based on localport, remote port, local address, remote address, application, protocol, and much more. I look at it as a much improved version consisting of a hypothetical merge of ZoneAlarm [zonelabs.com] with Conseal PC firewall [consealfirewall.com] and like products. In addition Tiny Software [tinysoftware.com]'s product is in use by the US Airforce on 500,000 desktop machines. Oh ya it's also free for personal use.

          FEATURES AT A GLANCE

          Multi-layer security protection (NDIS & TDI) Since the DSE resides on each computer in the network, it communicates directly with the operating system and negotiates what applications are even allowed to transmit and/or receive data.

          MD5 Signature Support As the DSE mandates what applications can bind for communication, it can also check for an MD5 digital signature for permitted applications. This ensures that Trojan horse applications cannot gain access by using the name of a permitted application.

          Stateful filtering based on SRC/DST IP address, port & application The DSE maintains a record of all sent packets and can therefore compare incoming packets to the record table to determine if they were requested. Additionally, the DSE can restrict applications to certain ports or destination IP addresses.

          Remote access to logs and statistics The DSE contains a separate statistic view that displays all active sessions and includes the status, port, remote IP, application or service and the time associated with each session. Logs may be viewed from the statistics view or sent directly to a syslog server for analysis and reporting.

          Suspicious activity monitoring and Intrusion detection The Tiny DSE contains a highly configurable reporting mechanism that can report specific intrusion attempts, or any other type of communication deemed suspicious, to a syslog server or to the CMDS server through an SSL connection.
      • But would it use raw sockets?
  • not to worry (Score:5, Insightful)

    by peccary ( 161168 ) on Thursday August 02, 2001 @11:19PM (#2147727)
    The bee in Gibson's bonnet (and therefore Cringely's, cuz we know where he gets his material) is IP source address spoofing. He thinks that Windows XP will somehow make this much easier.

    He's right.

    But it doesn't matter.

    There are already several easy technical fixes to prevent source spoofing [goldinc.com], and if Gibson and Cringely's phantasy comes true, they will all be deployed in various Internet routers in a matter of weeks. Some of them already are implemented in Cisco routers, but are not enabled by default. Long before things can come to sufficient head to justify Microsoft's appearance as an off-white knight to ostensibly save the day.

    See also this article [networkmagazine.com] from Network Magazine.
  • by weave ( 48069 ) on Friday August 03, 2001 @01:02AM (#2154285) Journal
    Most slashdot readers are young. One day you'll be cursed and promoted into management, then decision making jobs. Don't forget this kind of crap. Don't grow old and start buying default corporate lines, etc, etc...

    When *I* was a youngin, IBM could do no wrong with many decision makers. I swore I'd never have my head in my ass when I got into decision making positions.

    Now I'm 42 and one step away from making the decisions. I can INFLUENCE them now, and due to that, we run Apache for our web servers, I've stopped any thought of IIS from being implemented, and run Linux where possible and NT reluctuntly in some applications....

    So don't forget this stuff. Microsoft may gain that market share, but one day hopefully pointy-haired bosses will be a bit better educated and make better decisions and not get sucked in by marketing hype.

    Oh, I can dream, I can dream...

  • by gsfprez ( 27403 ) on Friday August 03, 2001 @03:44PM (#2159569)
    When i worked at a Air Force base - and we had perfectly good Sun Sparc20's running as our servers (mail, dns, SQL, etc)...

    my boss told me that because we were upgrading to Windows 95.. that it was time to ditch all those servers and get Windows servers with Exchange, et al...

    i asked him why should we get rid of our perfectly running servers which had given us no trouble at all just to move to Microsoft? "Because, we're getting in contractors now, and they only know Windows Nt 4.0."

    Later on, it was then decided that instead of bases having their own servers and their own email systems, that now that we'd all moved to Exchange, that we'd all put our GALs together (Global Address List - the list that Outlook/Exchange VBScripts use as their distro lists to replicate themselves), then we'd really kick ass.. no more joe.blow@otherairforcebase.af.mil...

    my reply was - um... LDAP servers? open Source? Hello? Anyone?

    well, skip ahead to today - the US Air Force (and soon all of DoD) is going to be moving from its now Air Force-wide GAL (why we just pull the plug now during virus scares and why we were down for weeks during Melisa) to Active Directory.

    back when i shut down all my Sun boxes.. i told my boss that this was just stupid.. why should we give up on what works just to buy what Microsoft is giving us? Their goal was not to give us good products, but to get us to buy their products... and things like Exchange, with its GAL, are just the first protocols that they are trying to hijack and take back on the internet... eventually, all the open ones would be overthrown by the new default MS proprietary ones that would ship someday with newer versions of Windows.

    I thought it might end with email.. but i see that i'm wrong.. i agree with Cringley... its going to go all the way.. and we have no way to stop it..

    MS will take over the internet.. they are already took over filesharing with SMB, they are taking over email with Exchange, they have taken over HTM L with Explorer, they are trying to take over java with .NET.. why should we think that they will stop there?

    sigh.. oh well..

The Tao is like a glob pattern: used but never used up. It is like the extern void: filled with infinite possibilities.

Working...