Virus Costs Dell Millions in Ireland 149
ruggerbugger writes "Dell's production plant in Limerick, Ireland was [temporarily] shut down due to a funlove virus causing the recall of 12,000 computers... For full story see the Irish Times."
How did the virus get there? (Score:2)
Electronic Warfare Is Fake? (Score:1)
Virii, whether intended to be amusing or destructive, can cost companies or countries millions of dollars when they strike networks. This is an obvious form of electronic "munition", and intentional or not, virii have damaged a number of corporations economically. Most companies have recovered from these virus attacks, but it is clear that virii and other threats are still quite a problem.
It's amusing that this story and the China story came so near each other. Maybe it's the Chinese
A timely warning? (Score:1)
Who knows how many virii there are out there that lie dormant until 1/1/00, who knows how many hackers there are, or indeed even bombs out there with detonators set for 00:01 1/1/2000
I might be paranoid, I might not be, all I know is that humans are a strange breed in general and do some very silly things.
Still, I don't much care, I'll be hungover
Interesting... (Score:1)
I know I've heard of it a few times in the last few years.
But I can't remember who was effected or when.
Anyone have a better memory then me?
Partial result! (Score:2)
Another one in the eye for Billy G! Excellent PR for Microsoft (not!)- this will surely make the financial pages of international media. PHB's don't really understand stuff like "inherently weak security model", they just believe the Redmond spin doctors advice. But £14 Million, now that's something that will get their attention. Hear that mindshare slowly deflating in your bosses brain...
OTOH, it's bad news for Dell - they were doing well, last time I saw an article posted on
Security (Score:3)
Either way, no amount of virus protection will stop all virii. This should not be seen as a setback for Dell, but be a time for rejoicing. Dell actually admitted that there was a problem, has attempted to correct it, and not tried to hide any of this from the public. All at great cost to themselves.
Many other computer companies would simply hush up a problem of this magnitude, but Dell deserves our praise for coming forward and correcting a problem publicly.
Re:How did the virus get there? (Score:2)
Thanks a bunch (Score:2)
On a lighter note, last year I took a train from Dublin to Limerick for a job interview with Dell. The two techies told me I more or less had the job, but the HR guy equivocated. I got another train home, and never heard from them again. Not as much as a PFO (does that term enjoy currency outside Ireland?).
Anyway: I can't condone the use of viruses (or viri, but not virii), but I did laugh. Hard.
Well done (Score:1)
Other companies would probably only offer a service pack several month later...
Could have been worse... (Score:1)
I wonder how long time the virus had gone undetected? They recalled 12,000 units so if anybody knows approximately how many they make per day I guess we could figure it out. My guess would be 4-6 days?
It really leaves you wondering what they were doing. The issue does not, to me, seem to be one of current virus software. No virus software is current: there are always new, undetected viruses out there. Rather the issue seems to be that Dell had failed to isolate their production computers from the network the administrators used for surfing the web and installing unknown games (or whatever) on.
It could be a lot worse. Somebody could have installed a backdoor program and used this to change the configuration of all new Dell PCs such that they fail to work on Jan 1, 2000.
Oh. Maybe they have :-)
Re:Security (Score:1)
At the first sign of tampering, it sends a masive electrical current through the body of the car - if anyone happens to be grounding it...
Automatic delivery? (Score:1)
Eric
Installing AV software afterwards (Score:3)
Antivirus procedures in most companies is a joke.
I went round upgrading Win95/98/NT for Y2K compliance (another joke) in a very important company in N. Ireland over the summer, and everytime we did a computer we ahd to copy a Word document to the hard drive and fill it in, date, time etc. Then we copied it to a floppy. When we finally got all the disks back there were 4 different boot sector viruses on them, and numerous Macro viruses. All the computers were running virus checkers, so the PHB's all thought they were safe from viruses. The only problem was that the checkers were 4 years out of date.
BubbleBoy? (Score:1)
Given the ease of its transmission and the number of users who will not upgrade their email it appears the potential for infection is enormouse.
But how big? Will it be big enough to make a dent in internet bandwidth (a la the internet worm). Or will the fact that it is a virus and not a worm prevent such widespread network clogging?
Impressive response. (Score:2)
Somatizer
A Limerick! (Score:3)
Whose computere truly were swell
And he said,
as the computers were recalled
Whoever did this is gonna catch Hell!
Re:Automatic delivery? (Score:1)
Re:Impressive response. [sort of ot] (Score:1)
Here in the states several machines I ordered were delayed over three weeks.
And everytime *I* called to see when I would be getting them I got a different anwser.
All of which amounted to about the same thing "We couldn't care less."
I've started to notice this is true. That out of alot of other countries I have talked to people from.
Here in the US we seem to get the worst customer service. Do they treat the employees bettter other places, or is it something cultural?
Re:A Limerick! (Score:2)
There once was a man from Stab City
Who was feeling remarkably shitty
For the swing-shifting sap
Caught the digital clap
So they shut down the plant, more's the pity.
Note for tourists: if you're in Limerick, don't refer too it as stab city. You'll be stabbed.
Re:Security (Score:1)
Insulation is cheaper.
Re:A Limerick! (Score:2)
How about:
There once was a man named Dell
Whose computers truly were swell
But he said, appalled,
as they all were recalled
Whoever did this is gonna catch Hell!
Hey, Open source poetry!
Linux not virus-proof (Score:2)
--
Re:A Limerick! (Score:3)
There once were computers in Limerick
And funlove had been making them sick
Dell recalled them for free
Without any glee
So they wouldn't get sued by some prick
Re:Electronic Warfare Is Fake? (Score:2)
ROTFL (Score:1)
Any company pre-installing that looser OS deserves to be mass infected.
Re:Thanks a bunch (Score:1)
Yeah; please. It's a term I've heard from a whole bunch of people, none of whom knows the others, and I've never met anyone who didn't know what it was. Until now.
Dell strange to deal with (vengeful rant) (Score:1)
I ordered an Inspiron 7500 with the new cool 1400x1050 15" LCD 11 days ago over the Internet, and it took them from that Tuesday until the following Monday to debit my credit card.
While I was trying to use their order tracking page, it threw up Visual Basic (hmmm) exceptions, variously Out Of Memory and some other ones I forget, returned to the browser in HTML by their server. I called and waited out the queue for 6 minutes, only to be told by the customer service muppet that the problem must be at my end, ''because no-one else has reported any problems''.
They are quoting delivery expected on 13 Decemeber, but I find it hard to have much faith. The worst thing is Dell running TV ads in the UK at the moment where the sleek, rich Michael Dell oozes on about how customer service is so important to him.
In short, bad vibes, frustration, and poor service, and that's before they even debited my card!
Dell Installations (Score:2)
The deal was this: we took shipment of a whole bunch of Dell PCs with their supposedly useful auto-install Win95 thingy on, so you could turn them on, agree to the license and it would install Win95 from a CD image on the hard disc. Only, because of the massive amounts of custom hardware on the mobo, it didn't work, and in quite a major way. The machines firstly died during initial installation, requiring a reboot. They then just about made it to the Win95 desktop, but didn't autodetect any hardware, so you had to restart the machines again, which crashed them. Rebooting into safe mode, shutting down, and restarting finally persuaded them to autodetect the onboard hardware, and then a final reboot bought them up in a 'useable' state.
I repeat, these machines were *straight* out of the box, with no weird setups or anything. My feeling is that if Dell quality control is lax enough to let this kind of thing slip through, I'm not at all surprised a virus made it onto their machines...
Great! (Score:1)
---
Re:A Limerick! (Score:2)
I will apply your patches, generate a new tarball, sprinke it with holy penguin pee, and put it on freshmeat right away. 8)
Thanks for the fix.
Linux is not a petri dish like Windows (Score:2)
Now I hear people say virus can infect anything regardless of what operating system I have, no matter how secure I think I am. Well, I haven't learned how to do scripting in Pine and I can see non text funny stuff from spammers and friends like a trojan. Things between the mailers like pagers, routers, copper wire, and your modem, etc., just really are not designed to host a virus. But when you run it on a Windows system that takes security as a joke, be prepared.
Re:Partial result! (Score:1)
Re:Security (Score:3)
Either way, no amount of virus protection will stop all virii.
From the davie is a Pedantic Weasel Department:
Found this interesting tidbit yesterday. The plural form of virus is "viruses". viri is the nominative plural form of the Latin vir , which means man. See: http://doriath.perl.com/misc/virus.html [perl.com]
From the referenced URL:
FWIW, maybe Dell should consider using Linux or BSD boxes to do their installs from now on. No guarantee against transporting infected files, but at least there's a smaller chance (near-zero?) of infection of the actual host machines.
Re:Great! (Score:1)
Re:A Limerick! (Score:1)
Let's try it this way:
There once were computers in Limerick
And funlove was making them sick
Dell recalled them for free
Without any glee
So they wouldn't get sued by some prick
Now it scans. ;-)
- Robin
Re:A Limerick! (Score:1)
Last time I was there I spent an hour in the univerity car park waiting for a taxi, getting very cold.
Sorry, I'm just bitter.
Re:Linux not virus-proof (Score:2)
--
Re:Installing AV software afterwards (Score:1)
Then when he gets a few years and certs under his belt, they refuse to keep him because he's too expensive. Oh, and that systems management software he wants so badly to run silent updates? We don't need that!
On another note: MS actually has no AV whatsoever. Somehow, they've completely missed buying up that market...
Re:Automatic delivery? (Score:1)
Re:Linux is not a petri dish like Windows (Score:1)
--
Re:Linux is not a petri dish like Windows (Score:2)
We could be doing "what if..." all day. The point is now that Linux is not designed that way.
Re:Linux not virus-proof (Score:2)
The Evil Perl Script described ('though I guess it is more of a trojan horse) sounds plausible to me.
What about linux is actually supposed to stop it from being infected?
And remember, before Melissa came along, the most famous evil nasty program was the Internet Worm, which lived squarely in *nix camp. (Although it predated Linux, does anyone know if the security flaws it exploited ever existed in the linux sources?)
Dana
Re:Linux is not a petri dish like Windows (Score:2)
Re:Linux is not a petri dish like Windows (Score:1)
Here's a secret you might need to hear: Most people don't use their machines as glass teletypes anymore. Frightening as it may seem to you, most people have moved beyond the 1970's computing paradigms. As (I should really say if) Linux becomes more popular, the viruses will proliferate. Unless you can convince people to get all nostalgic and embrace the TTY non-GUI.
Basic OS? (Score:1)
I wonder what kind of OS Windows would be? Certainly not "basic." Yi!
bradley
Luck of the irish... (Score:1)
---
It's about the permissions, stupid. (Score:2)
It's not about the GUI, it's about the security permissions. You can run any damn window manager/GUI you want, but if you routinely login as root, you're an idiot who deserves whatever happens. If you're not root, you shouldn't have permission to access any files you don't need, and then only with the minimal permissions you need. That, in fact, is pretty much the point of a multi-user system.
Of course, it's awfully difficult to explain to a windoze luser why they can't delete the system files, and why they're not allowed to edit
Any operating system is vulnerable to a virus. Period. Linux has very few viruses. There are none that I know of that can hose your system unless you're running as root (idiot). While I concede it may be possible to integrate a root security breach into a virus, so that it could do what it damn well pleased, I don't think any like this exist yet. And even so, once the security hole would be patched (quickly), that virus would no longer proliferate well.
---
No big deal... ? (Score:1)
This doesn't seem to be something we can blame Dell for.
Re:Thanks a bunch (Score:2)
Re:A Limerick Revisited (Score:1)
Whose computers all truly were swell
But he said, quite appalled,
as the 'putes were recalled
The prankster is gonna catch Hell!
Scans even better now...
--
This is my cubicle. There are many like it, but this one is mine.
Re:Well done (Score:1)
They would deny it and then when it is proven, call it a "feature"
We have begun to like, or atleast except, the Microsoft "features" have we not? If nothing else, they give us something to joke about...
Re:Thanks a bunch (Score:1)
Re:Linux not virus-proof (Score:1)
> Windoze is insecure is because a user,
> or user process, has access to the
> entire file-system
Not true for NT (despite the flamebait earlier on this thread about an 'inherently weak security model', the /model/ is actually pretty damn good (where are the Access Control Lists in Linux ?) Mind you, the actual implementation of the model has been repeatedly demonstrated to be weak. That's where the open Source 'engineering' argument kicks in.
I agree with everything else you say :)
--
Fair moderation (Score:1)
Myself, I find it silly to discuss wether Linux is virusproof or not, in the manner it is usually done on public boards. Nothing is by definition. But that doesn't mean Linux isn't *MUCH* more secure than any MS Windows version regarding viruses. There are lots of obvious reasons for this, including extreme hate for Windows from potential virus-writers. Linux is also a bit more vulnerable to _effective_ viruses than Windows, due to lack of anti-virus software. But as long as no viruses are detected, noones complaining. In their post, however, some Linux-fans are indeed too confident in their favourite OS.
About the perl script, a good idea, but not all Linux machines got perl. A meta-shell script may be better, but the real problem lie in how to spread this thing. First generation offspring would infect the very few who downloaded it from your site. That's fine, a good virus will spread anyways, possibly destroying the host after a long incubation time. But Linux lacks efficient ways for distributing the offspring viruses, without resorting to security holes. I really doubt you could make a really effective virus. The diversity of Linux and unix is just too great, and responsible users don't/shouldn't run as root very much.
- Steeltoe
Antivirus procedures in most companies is a joke (Score:1)
On most maschines, we have a more or less up to date virus checker running. When installs a virus on his PC and complains about it, by policy, we reinstall the machine from scratch and delete all infected files. The user gets the standard lecture on how to treat data from foreign sources and to read warnings on the screen with graphic analogies (Would you eat a cookie with green and black patches offered to you on a subway by a hobo? So why are you opening everything spammer send you?).
With lot of begging and cajoling, we may save a few crucial files. Usually less than ten.
Most user get, after the first or second time, really careful, and the number of virus infections have been rapidely decreasing around here since we started this policy.
Terror and pain are real good teachers sometimes.
It's about communication, stupid. (Score:1)
Found this interesting tidbit yesterday. The plural form of virus is "viruses". viri is the nominative plural form of the Latin vir, which means man. See: http://doriath.perl.com/misc/virus.html
Okay, firstly, that URL is wrong. It should be http://language.perl.com/misc/virus.html [perl.com]
Secondly, while I think Tom Christensen is a genius, I must say that in this case, he's just being annoying.
Thirdly, anyone who corrects my speech in front of me generally loses a tooth. I don't stand for that crap from grown adults.
Language is a flexible, growing, evolving entity. It's not static. It's not about "correctness". It's about communicating your thoughts from one person to another. If I say the word "virii" and the other person understands me, then to hell with the OED.
Frankly, I find that people who care about the correctness of a certain word (I find "ain't" to be a damn useful word), *generally* don't have the intelligence to understand much of anything else anyway. Especially those bastards that try to correct your pronounciation of a word. Oooh, those guys piss me off.
FWIW, Dell should do what everyone else does. Create a base install, virus scan the hell out of it, then ghost the sucker onto every machine needed. If they're actually installing software in the normal fashion, I'd be awfully surprised.
---
Re:Fair moderation (OT) (Score:1)
Dana
Re:Thanks a bunch (Score:1)
I picked up the term "PFO letter" in university (while applying to grad schools
(The "P" is for "please" and the term refers to a terse rejection form letter, i.e. no attempt to say "it was a hard decision" or "many highly qualified people applied"... just "we don't want you, go away")
To bring this back on topic, did you get any idea, while you were there, how software in preinstalled and how the machine doing the installing might get a virus?
-
<SIG>
"I am not trying to prove that I am right... I am only trying to find out whether." -Bertolt Brecht
Re:Linux is not a petri dish like Windows (Score:1)
--
Re:Thanks a bunch (Score:2)
Virus, well, wasn't.
Some sources report it as being an irregular 2nd declension neuter, like pelagus and vulgus. Other sources report that it was a 4th declension neuter, like status, impetus, or hiatus. None report that it declined as though it were a 2nd declension masculine, like dominus and abacus.
Check out the rest of the story [perl.com]. It contains links to the wonderful Perseus Project [tufts.edu], which is devoted to on-line access to the Classics, including word searches and definitions. I think you'll like it. Here's my favorite entry point [tufts.edu] to them.
Every time I read the malformation *virii, my brain pronounces it as it does viri, which in English sounds pretty much just like "weary", which also describes my sentiment. :-)
Re:A Limerick Revisited (Score:2)
Re:Impressive response. [sort of ot] (Score:1)
Virii vs. Viruses. (Score:1)
Only, viruses is more commonly used in the States while virii is more common in Europe.
I use Virii personally. I despise using the 'es' suffix on a word that ends with s. Icky.
~FnkyAlien
Re:Linux is not a petri dish like Windows (Score:2)
Re:Linux is not a petri dish like Windows (Score:1)
--
why its flaimbait (Score:2)
No, unless I am reading a different post than you. He suggested Dell should push Linux boxes harder. I supose you could interpret what the first poster said might suggest that Linux was a an alternative, but he did not state any facts about Linux dealing with viruses.
why dont they use a virus free os? (Score:1)
Would n't that saved them a lot?
Re:Dell Installations (Score:1)
However, I wouldn't want their default config anyway as I hate all the crap they load. So I wipe them clean afterwards (after I make diskette images for the drivers which is why I allow the OS to load).
Re:A Limerick! (Score:1)
Another Limerick? (Score:1)
Whose system was stable and crasched not
'til he made a reboot
and logged in as root
now his system is known as a crash-bot
Re:A timely warning? (Score:2)
"Virii" isn't a word: true
"Virii" is used by script kiddies: true
"Virii" was coined by script kiddies: false
The usage of "virii" as the plural of virus is older than the script kiddie phenominon. It is an instance of standard hacker word play, like the usage of "boxen" as the plural of "box", unices as the plural of unix, etc...
For more info, see the Jargon file [ccil.org].
Here in Texas where Dell is hq at... (Score:1)
Around my way, the names "Compaq" and "Dell" are never spoken unless followed by the phrases: "sucks", "really sucks" and the all time favorite, "really sucks big donkey balls."
Even though we cannot "blame" Dell for the recall (under my breath: "suckass r&d, suckass tech..."), you folks seem so surprise. Dell does not make anything. Micron makes their own memory and a couple years ago came out with their own chipset. IBM can make everything they want.
Dell is no better than your local mom & pop computer shop. They put together parts to make computers and that is it. The only Dell labeled product is on the faceplate of the case.
Now do we see the importance of the Dell/IBM partnership. Dell had to merge not only to succeed but just to survive.
In defense for Dell, they do have the option of shipping their servers with RH Linux install. This is definitely something I cannot get Micron to do
ChozSun [e-mail] [mailto]
Re:Linux not virus-proof (Score:1)
I cannot read Sanity's mind and cannot tell you his intentions. However, everything he said is true and the attack he envisions possible, plausible and devastating.
--
Re:Partial result! (Score:1)
Uhm.. ever heard of su? Yes, there's a version of su for Windows NT. It's in the resource kit.
Re:why its flaimbait (Score:1)
This line of conversation is rapidly beginning to bore me.
--
Re:Partial result! (Score:1)
crap
Re:why its flaimbait (Score:2)
True, he may have implied such and he did not state anything, but you stated a tirade about Linux viruses, not him. You are the one bringing up the FUD and now you claim you are bored. If you have a point to make with Linux being prone to catch viruses, why don't you simply email me one?
If you are so tired about people complaining about Linux being immune, imagine yourself complaining about something theoretical (and difficult) that is not an issue. Its interesting for a moment, but arguably offtopic and flamebait.
Re:Linux not virus-proof (Score:1)
Actually, if we're comparing apples and apples, let's throw Windows 9x out the window right now and talk about Windows NT. (Win 9x was designed to have no security, and to even defeat certain NT network security features. -- MS's answer to customers who want desktop security was to run NT, which predates 95 by a couple years.)
And while there are many "incredibly stupid" NT users that run everything as local Administrator, many shops do not, and the model is certainly no worse that Unix's.
Implying otherwise is either
a) ignorant or
b) trolling or FUDing
--
Re:Installing AV software afterwards (Score:1)
MS-DOS 6 had a bundled AV scanner with a Win3.1 front end. One of the few products Microsoft ever dropped, rather than building up and taking over the market.
--
Re:UNFAIR MODERATION! (Score:2)
That includes the idea that Linux is just as vulnerable. It isn't; no remotely-decent truly multi-user system with permissions is.
A clued Windows 9X user is functioning as root 100% of the time. A clued Linux user, perhaps a couple % at most, if they're still testing their hardware configuration or installing additional system-wide software. Read up on permissions, and you'll see that there's a fundamental difference.
Re:Linux not virus-proof (Score:2)
Not to mention that chroot jails are an option, and that there's often little reason for using a script when the binaries can be copied separately and there's no centralized registry that must be edited in oh-so-special ways...
Re:Great! (Score:2)
It's certainly reasonable for either MS or an OEM to include some documentation that drops the hysteria (along the lines that "Viruses are mysterious things that can destroy all your files, anytime, anywhere... so you'd better buy our AV product!") in favor of some sanity (like "Be aware of the risks when getting files from untrusted sources, but if you just do WWW browsing, no explicit sharing, and don't use a let's-try-to-do-everything-under-the-sun mail client, you're pretty safe...").
Re:A Limerick Revisited (Score:1)
So your limerick (in morse) goes
dit dit dah dit dit dah dit dit dah
dit dit dah dit dit dah dit dit dah
dit dit dah dit dit dah
dit dit dah dit dit dah
dit dit dah dit dit dah dit dit dah
That's something I'd never have typed in using Windows; the old highlight/middle click makes things a lot easier.
Of course, this is a rigid definition, unstressed syllables can be added or removed more or less at will an still maintain an aesthetic aspect. IMHO.
Security at Dell. (Score:4)
Re:Dumb Question (offtopic) (Score:2)
Smarter people? (Score:1)
Unix Viruses and Culture Clashes (Score:5)
You are correct that it is no mean trick to write a program that can damage the system it runs on, largely irrespective of what kind of system we're talking about. And so long as you can hoodwink some unwitting user into executing that program on their system, that program can, of course, cause damages commensurate with the privileges and capabilities of that user.
What you've failed to consider is how the dramatic cultural differences between Unix and the much-maligned consumerist toys serve to affect the issue to our benefit and their detriment.
Probably the most important of these cultural differences is that Unix has historically been a source-only world. Programs are distributed in the form of source code, code which shall be configured, built, and ultimately installed on the target machine. Programs solely accessible in machine language form fall immediately under a taint of mistrust.
Think back to the last time you read a notice from someone whom you've never heard of before that was asking you to go fetch some random binary program from some random place on the net and then to run that program under full sysadmin privileges? I can already see the incredulous Unix sysadmin reading that and bursting out in uncontrollable guffaws. Because the de facto standard for program interchange in Unix is as source code, a Unix programmer will be far less likely to fall for your ploy than would your average Prisoner of Bill, who has been lulled into gullibility by a binary-only culture.
But for the sake of the argument, let's say that you've found a way to effect this trick. Suppose you're an employee of some reasonably respected company that happens to produce a binary-only distribution of their commercial software, and you decide to sneak something wicked into the binary image. You manage to replace the standard, clean copy on your company's ftp or http server, or even floppies or CDs, with your own naughty version. People are accustomed to downloading from your company, or using your company's floppies, so they do as they've always done, run the installation as the superuser, and you thereby have your way with their system.
If this scenario were to play out, just how dangerous--how destructive--could it really prove? Whom could you harm, and who would be immune to your ploy? The answer is that you could only hurt those folks running the exact platform for which your binary had been compiled, and everybody is unassailable. By platform, I mean the whole feature vector that includes processor chip (eg Sparc vs Intel), operating system (e.g. SGI vs BSD), shared libraries (e.g. libc vs glibc), and site-specific configuration (e.g. shadowed vs non-shadowed password files.
Let's not get too full of ourselves and pretend that the Unix culture's predilection for source-only program distribution derives only, or even mainly, from altruism. We have no choice in this matter. Consumer-targetted systems from Microsoft or Apple are two instances are a static monoculture, as vulnerable to mayhap as a field of cloned sweet corn. It only takes one genetically engineered virus to bring down the whole field. Unix is different.
In his acclaimed essay, In The Beginning [cryptonomicon.com] , Neal Stephenson writes:
There is no one thing called Unix. Instead, Unix comprises a diverse set of subtly (and often not so subtly) variant platforms. A nefarious binary laced with exquisitely designed evil bullets hidden inside it can hurt only a few of us. When Apple and Microsoft laugh at our diversity, be sure to remind them that is it their lack of the same that contributes to their incredible vulnerability--and to our strength. Hybrid vigor ultimately wins out over a monoculture, for the latter is too in-bred and fragile to prove long viable.
Let me now return to your particular suggestion, that of a malignant Perl program activated by a Makefile rule at installation time. Because you're talking source code, and because Perl tries rather hard to attain a high level cross-platform intercompatibility, this form of subterfuge would appear exempt from the inherent protections stemming from diversity in variant Unix platforms. So, could your trick be done? How much of a problem could this really be? What might happen?
The answer is that of course, it could be done. And in point of fact, a demonstration model is already available [deja.com], courtesy of Abigail. Guess what? There's no reason to run around like a chicken with its head cut off: the sky isn't falling. This sort of approach stands little chance of making a big splash, because you aren't going to insinuate it into a place that can affect a lot of people. Sure, you might catch a few folks, but just how long to you think this kind of thing will go unnoticed? Remember, it's in source code. That means anybody who wonders what happened can just look at it. There's a very low barrier to entry. And even if the naughtiness removes itself from your copy once its dirty deeds are done, that naughtiness is still sitting there in plain view for easy inspection back wherever you got your copy from.
Is there a way around this? Well, yes, if you're as clever as Ken Thompson. Fortunately, you aren't, and neither are the crackers. If they were, they'd doubtless receive more Turing Awards for their vaunted efforts. :-)
The only way you're going to get good propagation is if your nastiness into a copy that a lot of people will download and install. There's a very fine reason why so many archives contain a checksum of the image. It's to help with this problem. Security of course depends on several matters, including the strength of the algorithm and the integrity of the authenticating agent. But better that than nothing.
Let's talk about propagation some more. I assume that the goal is to have a notable impact, which means you need to spread your bad code as widely as possible. A hacked up install script, even if all goes to your liking, just doesn't have a very high rate of reproduction. First of all, how often do how many people install this software? Secondly, how do you plan to trick them into doing so? It's not really much of a challenge to get one person to this, especially if they trust. If that's your goal, maybe you'll succeed. But the risk of being traced and apprehended is high.
So how come this stuff can spread like wildfire amongst the OS-challenged? Can't whatever mechanism that's used there be used to get at the rest of us, too?
Over the last few years, a frighteningly frequent conduit of contagion for viral infection on toy systems has been the implicit, automatic execution of code with little or not manual intervention on the part of the box's owner. DOWN THIS PATH LIES MADNESS!. That this can ever, ever happen is as a plain a symptom of complete and total cretinization in the toybox world as you are ever going to see. It's stupid, it's crazy, and it's dangerous. Any programmer who even suggests it needs to go back to flipping hamburgers. Any user who asks for this feature needs to be quietly taken into the back room by the doleful men in long trenchcoats, where he will be told in no uncertain terms that his request is not only in the best interest of no one but criminals, but that he also now has a permanent record even for asking about it.
No, I don't care that a customer asked for it. Customers are idiots, just like any other user. So what if they pay you? They're still idiots, and it's your professional responsibility to act responsibly, to refuse to go along with their madnesses. The customer is not always right. In fact, they're very often wrong. A physician or a lawyer doesn't do whatever the customer requests, and neither do you. They, meaning the customers or users, simply don't have the background and training; they don't have the experience of seeing why automatic execution from untrustable source is the work of the Devil.
It's not as though we in Unix have never seen this issue before. In fact, we've seen it time and time again. And guess what? We recognized the problem and we addressed it. And we don't cater to that kind of lunacy anymore.
Here are a few concrete examples.
Remember when vi would--or at least, could--automatically execute macro commands embedded in a file in a specific way? That was a dubious feature called modelines. On my OpenBSD systems, if I type :set modeline, the program comes back and says set: the modeline option may never be turned on.
Another example of learning from our mistakes is the issue of shell archives. Instead of automatically running the sharfile through /bin/sh, there are specially made unshar programs that will do the common things, safely, and nothing else.
When CGI was first getting big, owners of toy systems would blindly install compilers and interpreters in such a way that these would easily execute arbitrary content coming in off the wire. Despite my pleas, both Netscape and Microsoft were actually advocating this! After a year of warning admins not to do this, and sending mail to the companies who were saying to just go ahead, nothing changed. So I released latro [perl.com]. Then and only then did various companies retract their suggestions, even though they'd been aware of the nature of the problem for a long, long time. Sure, you could be equally stupid on Unix, but for some reason, we weren't. History counts.
Implicit execution of untrusted material is simply stupid beyond words. And for some reason, the toybox people keep falling for the same chump moves, from MIME attachments to word processor and spreadsheet macros to embedded active scripting controls. I don't know quite why they just keep doing this crap. My hunch, and it's only a hunch, is that this is happening because Microsoft and their moronic minions simply cannot for the all the tea in China ever manage to think outside of their quaint but completely fictional little single-user universe. Maybe they don't hire people who come from a background in multiuser and/or networked computing systems. Maybe they don't hire people with real experience at all, just script-kiddies trying to make a buck legitimately but with no true understanding. Maybe the software makers simply can't say no to a customer request, no matter how suicidal they know that request to be. I don't know.
Whatever the cause, decades of history are completely and repeatedly ignored. They keep making the same mistakes, and they don't fix the underlying causes. Sure, there are things that are hard. Denial of service attacks are hard. People who know exactly all the ramifications of IP who go sending maliciously hand-crafted packets aren't much fun either.
But these highly technical ploys aren't why most folks on their toyboxes are being screwed up, down, left, right, and sideways. They're being screwed because of very simple matters. They don't have the notion of a protected execution mode. They don't have file permissions or memory protections. They automatically execute content willy-nilly, often with complete access to the whole machine. They expect a program to show up in binary not source form. They don't compare robust checksums from a strongly authenticated sources. They live in an infinitely vulnerable monoculture. They expect things to just magically happen for them without a thought or a care, and guess what? Their wishes are duly granted, much to their eventual dismay.
It is possible that mass-market factors may someday end up plaguing Unix systems in ways not so far removed from the stupidities that the toy boxes are riddled with. We just have to tell them no, and to condemn in the strongest and loudest possible terms any backsliding into insecurities that if we ever had, long ago banished. Looking at the Winix phenomenon, in which a dozen different vendors put together and ship their own Linux operating systems, all specifically constructed to be user-obsequious and Unix-hostile all in order to appease the lowered expectations of a hundred million Windows idiots, who, despite their numbers, really can still be wrong. The stupidity of the masses must never be underestimated.
PS: Congratulations for reading this far. :-)
Re:Well done (me too) (Score:1)
Dell does an up-front attack on the problem first, PR later. This way, the world see's that they *HAD* a problem, but it's fixed now.
I find a "fix first, spin later" approach to increase my faith in a computer company.
Re:A timely warning? (Score:2)
But it still begs the question of what a "virius" is, eh? :-(
Re:Electronic Warfare Is Fake? (Score:2)
Re:Virii vs. Viruses. (Score:2)
It's not like it's all the same, though. In English (assuming you deem England to be part of Europe :-), you have viruses, but in German, you have viren. Most curious of all, you in the Romance tongues have an invariant virus even in the plural, as in French les virus or Italian i virus. Given the historical provenance of the Romance tongues, I'd say that this invariance lends credibility to those scholars who opt for a 4th declension [perl.com] explanation of events.
Linux For LIFE (Score:1)
Y2K viruses (Score:1)
Re:Unix Viruses and Culture Clashes [errata] (Score:2)
The first erratum is that when I said " everybody is unassailable", I of course meant that "everybody else is unassailable".
The other is that immediately prior to the sentence beginning "Consumer-targetted systems", you should insert this:
Somehow this slipped by in the posted copy, and it's an important point.Finally, I fixed the latro [perl.com] links at the bottom, so you'll be able to see the real program. And yes, it works. Like nmap and other, um, security tools, this should of course only be used to verify the security of those systems that you yourself directly administer and have responsibility for. Not that it's apt to be sufficiently well logged to know what's really going on. It seems that POSTs never get their content logged. Play nice, and don't pick on the WinVictims. :-)
Re:UNFAIR MODERATION! (Score:2)
"Flamebait" is the deliberate provocation of a flamewar. Sanity's did not seem to me to be that, and if I get the chance the metamoderate, I'll make the "unfair" call. It raised a point that was worth raising, if for nothing else, because of the response it engendered.
Unfortunately, some seem to take the moderation system as a way to dock people for unpopular opinions. This is not the first time I've seen a post moderated down because it said something negative about Linux or postive about Microsoft. That is not good, and only serves to inspire the kind of group think that would make a site such as this worthless. There is a reason that are no "wrong" or "stupid" or "bothers me" moderation options. We should only be preventing abuses. Abuses like offtopic posts or intentional flamebait.
Believe me, if a post rated '1' is followed up by a contradicting post rated '5', the message is there. Docking people who have good intent is just spiteful.
(I also find it very sad that someone felt compelled to moderate down Mawbid's objection to the moderation. I suppose I'll be next...)
Re:A Limerick! (Score:2)
As he sat down to write in his diary.
He had happened to read
That unsavory screed:
"The Plural of Virus is Virii."
--
Terrific, thanks Tom (Score:2)
I dualboot LinuxPPC (not terribly often, but I insist on being able to do it). This means that there are some Linux software packages that I can't, actually run, because anything that's binary-only or depends on PC hardware is something I can't run. For instance, anything that expects a parallel port is likewise something I can't use.
Contrariwise, if someone makes a Linux binary that is a x86 virus, I can't run it either (nor would I want to). There's a level of inconvenience that is also protection. Add to this the fact that I like to not run a desktop such as KDE or Gnome, and mostly hack around with console apps and play with Window Maker when I _do_ boot into Linux, and it becomes extremely awkward for someone to make a generic Linux virus that can function under those conditions. I end up making a relentlessly nonstandard environment for myself, simply because Linux does _not_ deliver a very well realised and completed user environment, and because it encourages my active involvement in the building of this user environment.
This diversity is a strength, not a weakness: it makes it appallingly difficult for a commercial vendor to target the average Linux system (they will have to pick RH or something and support only that), but it also makes it appallingly difficult for a virus writer to target the average Linux system (again, they will have to pick the RH or something and 'support' only that...)
The most significant effects of this are as follows:
When Linux virii _do_ become a significant force, the commercial Linux distributions will be the ones taking the hit, and such attacks will be specific to individual releases of commercial distributions.
Re:Unix Viruses and Culture Clashes (Score:1)
It's nvi. Blame (or thank) Keith Bostic.
BSD/OS says "The modeline(s) option may never be set.". NetBSD says "set: the modeline option may never be turned on". (If you're curious, NetBSD is using nvi 1.66, BSD/OS is using 1.43.)
The comment in the code is particularly beautiful. Reproduced without permission; please don't kill me, Keith:
/*
* f_modeline --
* This has been documented in historical systems as both "modeline"
* and as "modelines". Regardless of the name, this option represents
* a security problem of mammoth proportions, not to mention a stunning
* example of what your intro CS professor referred to as the perils of
* mixing code and data. Don't add it, or I will kill you.
*/
You go, Keith.
Re:Security (Score:2)
Re:why its flaimbait (Score:2)
I wasn't actually trying to imply anything about Linux's security, viral susceptability or anything along those lines!
I was just trying to look at the situation from a business rather than holy war perspective. It's all about perception at the PHB level, not truth. Linux doesn't really have too much budget for marketing, by comparison to some (geez, I even saw a TV ad for Cisco last night!). All I was trying to do was show that here's a chance to capitalise on this, much the same as MS, Apple, Sun, Oracle etc would. Because like it or not, Linux must make more inroads into business to become really good. And I'm not thinking of a commercial hijack, just that the more people use Linux, then that's more coders, testers and documentors who can contribute. And that will translate into more freedom of choice. And isn't that what it's all about?
BTW, this virus at Dell made the front page of the London Financial Times this morning. Oh yes.