Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Microsoft

Slammer Worm Slams Microsofts Own 528

MondoMor writes "Microsoft's forgot to patch some of its own servers to protect it from the months-old vulnerability exploited by the Slammer Worm, reports C|Net. Oops. Apparently Redmond's network was hit pretty hard. Just goes to show that no matter who you are, you'd better keep your apps patched." Update: 01/29 01:59 GMT by T : And if you're running systems which might be affected, take note: whitehorse writes "The Microsoft KB article for the Slammer patch found here has an incorrect URL for 'Download the patch' referring to KB Q316333 which is only a handle leak fix. The real patch may be found later in the article."
This discussion has been archived. No new comments can be posted.

Slammer Worm Slams Microsofts Own

Comments Filter:
  • Zoiks! (Score:5, Insightful)

    by Anonymous Coward on Tuesday January 28, 2003 @12:32PM (#5174987)
    Relying on a vendors automatic update feature is no substitute for solid system administration.
  • Big Surprise? (Score:4, Insightful)

    by Dr Caleb ( 121505 ) on Tuesday January 28, 2003 @12:33PM (#5175001) Homepage Journal
    Why does it suprise anyone that Microsoft has bad admins, the same as anyone else. Bad admins are bad admins, no matter which company they work for.

    I'm glad to say that my servers were unaffected. Slapper does not affect AS/400 nor Linux.

  • by ruiner13 ( 527499 ) on Tuesday January 28, 2003 @12:34PM (#5175012) Homepage
    As one of the articles I read on the issue stated, it really does show that their policy of blaming the users for not patching their systems perhaps isn't the best approach to take. It is in fact blaming the victim for the software's flaws. Maybe this will turn microsoft more towards making sure their products are more secure from the start if this info gets around enough. Yes, I know Billg's "Trusted Computing" plan is rather new, but they sure seem to get caught with their pants down often.
  • Say what? (Score:2, Insightful)

    by Kenja ( 541830 ) on Tuesday January 28, 2003 @12:37PM (#5175041)
    Who the hell has their SQL server in the public side of their firewall? These things shouldn't be directly accessable to any worm.
  • by tuxlove ( 316502 ) on Tuesday January 28, 2003 @12:38PM (#5175045)
    This story supposes that Microsoft should somehow be a paragon of network infrastructure. It's clear from past events that MS is among the lamer of companies when it comes to infrastructure/security. Take, for example, the time DNS for just about the entire collection of MS domains, such as msdn.com and microsoft.com, were completely disabled by an attacker. They had all four of their nameservers on the same subnet, and all running Microsoft DNS software. An easy target to say the least. Calling this sophomoric is being kind. It didn't take them long to fix it, and I believe that now they contract out their DNS to get maximum diversity (and they even utilize Unix nameservers!).

    I fully expect to see more entertaining stories like this for a long time to come.
  • by Dan Guisinger ( 15506 ) on Tuesday January 28, 2003 @12:38PM (#5175052) Homepage
    In reality, admins running enterprise systems must remember to check what the patch fixes and weigh it against known issues it may cause. In Microsoft's case, their admins would be sure to know the service release is out. My guess is compatability testing indicated they should wait for a future patch, or until they changed something in their setup that would make any problems from the patch a non-issue.
  • Tired of patching? (Score:5, Insightful)

    by smnolde ( 209197 ) on Tuesday January 28, 2003 @12:38PM (#5175053) Homepage
    How many times have you, on a Win2k server clicked the check box labeled "Remind me in four hours" and waited for the next shift to patch the box?

    Oh joy, the pleasures of having an automated "Patch-me-now" daemon.

    Lazy admin, none the less.
  • Re:Big Surprise? (Score:2, Insightful)

    by WIAKywbfatw ( 307557 ) on Tuesday January 28, 2003 @12:41PM (#5175086) Journal
    It surprises people because zealots are usually the first to jump over a cliff, run into a burning building or drink poisoned kool-aid just because their God says it must be so.
  • by n3rd ( 111397 ) on Tuesday January 28, 2003 @12:44PM (#5175107)
    With the exploits going around recently I've realized a couple of things when it comes to security.

    First and foremost is secure code. Right now, almost everyone and their grandmother has a firewall. They do a good job of protecting ports a user can't shutdown totally (some NetBIOS ports) and protecting insecure applications a user or organization wants to run internally but doesn't want the world to access (NFS, NIS, etc). The majority of these exploits target applications that firewalls will usually let past such as HTTP, FTP and e-mail.

    Frankly I'm not sure how coders should go about writing secure applications, but it needs to be done. Perhaps at large organizations there should be a dedicated person or term in charge of verifying code is clear of buffer overflows and other nasties. Either way, the code itself needs to be secure or because a firewall won't do a thing. Without it even the most secure configurations will continue to be cracked.

    Second is firewall configuration. Many firewall administrators tend to forget about outbund packets. Obviously there are some they need to let out (HTTP, FTP) but when it comes to things like SQL and outbound portmap, there's really no reason. Depending on the organizations needs they can more than likely block all outgoing UDP. By doing this they can help slow the spread of worms (such as this one) and reduce liability when it comes to crackers using their systems as a point to attack other systems.

    Firewalls that block incoming packets just don't cut it, and never have. We need to have secure code and need to block unnecessary outbound packets as well.
  • by painehope ( 580569 ) on Tuesday January 28, 2003 @12:47PM (#5175125)
    another place where Unices have MS beat?
    Yep.
    I love the way the article makes security + patching seem such a burden on system administrators. It's one of the main functions of a sysadmin's job. Any sysadmin who thinks security patches are optional, regardless of how shitty your OS's package management + patch integration is, deserves to have their network taken down and their ass fired.
    Though I do get a kick out of thinking of the nightmare the Windows admins have keeping up to date with patches, whereas a few hundred lines of perl, and I have my own automated patching system, and RPM keeps track of it ( no rpm vs. deb flames, thank you ).
  • Re:Say what? (Score:5, Insightful)

    by Des Herriott ( 6508 ) on Tuesday January 28, 2003 @12:48PM (#5175137)
    Who the hell has their SQL server in the public side of their firewall?

    They probably don't. What's more likely is that one or more employees took their laptops home and hooked them up to their own Internet connection without any personal firewalling active. If those laptops happened to be running SQL Server, they become carriers. All it takes then is for them to be plugged back into Microsoft's LAN, and game over.

  • by Vicegrip ( 82853 ) on Tuesday January 28, 2003 @12:52PM (#5175166) Journal
    Clearly Microsoft has a serious problem communicating the need to apply certain patches.

    Of course, it's the customers fault.

    When the original story came out I couldn't count the number of posts pointing out that the patch was released a while ago for this problem while totally discounting the fact that most of the world fell prey to it.

    Redhat, for instance, boldly displays all the security problems AND patches on a single page for its products.

    Want to find a list of needed patches for a Microsoft product? Hope you have a few days for searching the endless volumes of technet or msdn-- hope you find everything.

    Want to know the patch level for your Microsoft software? Have fun, it's randomly displayed somewhere in the product... maybe in the about box... maybe just a file version ... a company serious about security would have a consistent and documented way for finding the version information of their software.
  • by pVoid ( 607584 ) on Tuesday January 28, 2003 @12:52PM (#5175171)
    "This shows that the notion of patching doesn't work," said Bruce Schneier, chief technology officer for network protection firm Counterpane Internet Security.

    Now here's my gripe... Microsoft's being vulnerable to this is only an indication of some lazy sysadmins. It doesn't involve anyone else.

    These are typical 14 year old essay arguments, where you can prove the world by altering seemingly unessential facts: while Linux is seen as the OSS giant, and there are thousands of 'independant' people working on it, Microsoft is actually just one person... Bill. Bill has actually cloned himself 40.000 bodies, and attached a wireless receptor in each of their brains, and is brandishing every single one of those people...

    Microsoft, just like any other company, is thousands of individual people... this security vulnerability does not undermine the effectiveness of patches.

    It's like having a Canada be declared an enemy of the United States because a drunken canadian had a fist fight with some alaskan in some fucking bar. WTF??!?

    Come on people, be vigilant.

  • by JiMbOb_ka ( 232846 ) on Tuesday January 28, 2003 @12:54PM (#5175184) Homepage
    I agree, I am sure MS had policies in place to keep all public-facing servers fairly up2date. One thing that I found to be true is when the article mentioned that alot of the developers internally had installed SQL or MSDE on their workstations. I know that when our comapny got Code Red / Nimda, it was the developers workstations with IIS that were propagating it to the rest of the network.

    Just goes to show that people who are paid to be technically apt can be just as much of a crutch and regular users.
  • Re:Big Surprise? (Score:5, Insightful)

    by ajs ( 35943 ) <{ajs} {at} {ajs.com}> on Tuesday January 28, 2003 @12:56PM (#5175201) Homepage Journal
    It was likely not "bad admins" so much as bueracracy. Most large companies make it very hard to make any kind of change, which leads to a situation where only the scariest, hairiest bugs get patched. This one may simply have seemed too complex for the average person to exploit until it was too late.

    This problem is actually a very interesting one that I've been looking at for years. It happens in everything from 300-person companies to giant mega-corps. It's not because people are stupid, but because large systems only can only avoid tripping on themselves by imposing arbitrary controls.

    I think that the right solution is staged anarchy, which is sort of what many large companies (e.g. Microsoft, AT&T, IBM, etc) do with their research divisions or via acquisitions or both. The idea is that you let smart people go nuts and create the unsupportable. You then get more, but different smart people to turn THAT into the supportable. You then get more average corportate drones to convert the supportable into the existing production framework. You then present the existing production framework to the first group of smart people and let them start over again.

    You get about a 6-month cycle if you do it right, and you keep reaping the benefits of wild-eyed hacking as well as stability.

    Microsoft takes a lot of flack for their technology, but they do this one thing well. You may not like such things as NT, C#, etc, but they are fairly large and complex beasts that most companies would not be capable of cranking out on their own (hence the benefits of open source development so that they don't have to). MS was able to draw on (and some would say corrupt) the smart work of their research folks and of technologies that they acquired and "MS all over it" until it fit their sales and support model, which is one of the reasons that they could do something like go from "Internet-illiterate" to winning the browser war, practically overnight.

    IBM does this quite a lot as well (all of their hard drive advances come from this sort of process).

    Interesting stuff.
  • 4 Things (Score:5, Insightful)

    by 4of12 ( 97621 ) on Tuesday January 28, 2003 @12:58PM (#5175214) Homepage Journal

    1. Everyone can gleefully gloat over them eating their own dogfood; enjoy it while it lasts.
    2. Microsoft did release a patch long ago, and I give them credit for that.
    3. But by not installing their own patches, the credibility of the argument that lazy sysadmins are to blame for Slammer is weakened. MS gives credence to other arguments: either their patches hose up other things unnecessarily, or else take too much time and effort to install properly.
    4. In the end, this whole episode will be spun to promomte TCPA.
  • by haggar ( 72771 ) on Tuesday January 28, 2003 @12:59PM (#5175215) Homepage Journal
    Just goes to show that no matter who you are, you'd better keep your apps patched.
    No, it shows rather that no matter who you are, you should not use Microsoft's server and database solutions.
  • by (H)elix1 ( 231155 ) <slashdot.helix@nOSPaM.gmail.com> on Tuesday January 28, 2003 @01:05PM (#5175267) Homepage Journal
    I know, I know... there are going to be tons of posts lambasting admins for not updating their boxes. Sometimes the cure is worse than the disease. Hell, last week a live update caused a catastrophic failure to the email systems. The IS boys were not lazy, did what they should, and lost 36 hours of their lives rebuilding the boxes from tape because of a bad patch.

    Patches that fix something specific are fine. Patches that add new features or change API behavior can really make a mess. I've seen plenty of kit that requires xx service pack and the latest yy version breaks it.

    As a side note, make sure you get the patch if you are running the MSDE on any of your boxes.... Same problem as SQL server - way to many vendors will fold that one into a dev version of a product. I know I almost found out the hard way...
  • by Anonymous Coward on Tuesday January 28, 2003 @01:05PM (#5175270)
    There are quite a few "porous" holes that get into Microsofts internal networks. None of them are direct and without something like this worm that uses their own software, none are likely to allow much in.

    I've worked in some of the Microsoft data centers and done design work... I know how hard they (just like many of my other non-microsoft customer) try to keep people "out" of these networks. But I've seen development projects go on the "soft" network and then get forgotten about. Its machines like these that probably provided the bridge back into MS.

    It happens. Regardless of the company. Just some get more publicity than others. You think BofA didn't have firewalls? And yet they went offline for what... half a day or more?
  • by Dr Caleb ( 121505 ) on Tuesday January 28, 2003 @01:06PM (#5175279) Homepage Journal
    Or the time they let the hotmail.com domain name expire [slashdot.org].

  • Re:Zoiks! (Score:5, Insightful)

    by stinky wizzleteats ( 552063 ) on Tuesday January 28, 2003 @01:06PM (#5175286) Homepage Journal

    Relying on a vendors automatic update feature is no substitute for solid system administration.

    Solid system administration is no substitute for solid systems.

  • by NineNine ( 235196 ) on Tuesday January 28, 2003 @01:18PM (#5175355)
    Good troll, but you're 100% wrong. [microsoft.com]. One command will do it.

    Another clueless jackass spouting off about things he has no idea about...
  • Re:Zoiks! (Score:4, Insightful)

    by Silvers ( 196372 ) on Tuesday January 28, 2003 @01:20PM (#5175377)
    There's no excuse. Just because it is harder to install than a simple windows update package isn't any kind of reason not to update. What are you doing having a SQL server out in the wild unprotected with a *known* exploit?
  • Re:SQL Server (Score:4, Insightful)

    by jsse ( 254124 ) on Tuesday January 28, 2003 @01:24PM (#5175402) Homepage Journal
    Basically, the idea is that by running "ancient" versions of software products, the script kiddies are completely thrown for a loop--their collections of 'sploits only work on more recent versions of code.

    It doesn't work, at least not for Microsoft's products. You and grandparent post forgot the Microsoft Support Life Cycle [microsoft.com], say Windows 98 and NT 4.x will be entering "Non-supported phase" after June this year, Windows 2K even earlier, March.

    Granted, SQL server 7.0 is still under the coverage of normal support til March, 2004, and if you happened to be a premium customer, they the period can be extended to 2006.

    However, do not forget when a product is desupported, Microsoft will not take care of new problem found in it. No service patch, no enquiry. No MS reseller would dare take up the maintenance. They'd only offer you one option thereafter: upgrade.

    Keep using the desupported products? Sure you can, but can you bet your career on a desupported product? You're welcome to do so as they can have a convenient target to blame when shit happens. :)
  • Re:Big Surprise? (Score:3, Insightful)

    by malfunct ( 120790 ) on Tuesday January 28, 2003 @01:30PM (#5175445) Homepage
    From the sounds of it the problem is the boxes that got hit weren't run by admins. It sounds like all the developers boxes with SQL on them were unpatched.
  • by malfunct ( 120790 ) on Tuesday January 28, 2003 @01:33PM (#5175465) Homepage
    On the other hand, bugs happen, and so people need to be proactive in finding the fix's. I agree that software needs to be better to start but when something goes wrong people have to install the fix.

    The article says "patches don't work" but fails to give any alternative. Saying "software needs to be perfect" is about as useful as telling us that patches don't work.

    I don't se OSS as a solution to this either because unless you install the bugfixes you are still screwed.

  • not a bigot. (Score:3, Insightful)

    by Erris ( 531066 ) on Tuesday January 28, 2003 @01:39PM (#5175512) Homepage Journal
    Dissmising something because you know its flaws is not bigoted, it's reason. I can reasonably dismiss Microsoft Software from consideration based on their faulty development, distribution and security models. The process is so cumbersome and inferior that they themselves suffer. Why should I expect anyone else to do any better? Due to other problems, ultimately rooted in philisophical issues, I do not expect M$ to get any better any time soon. In fact, I expect things to get worse. Why would I ever trust their software with my data, time and effort? There's nothing M$ does that I can't do with free software, and there's much I can't do with M$ junk that free software does with ease. This is not a biggoted view, it's an application of experience and reason.
  • by Idou ( 572394 ) on Tuesday January 28, 2003 @01:39PM (#5175519) Journal
    If it is not cost effective for MS, which faces the highest damages from such incidents (think PR), to patch its own software, how can they argue it is cost effective for ANYONE to insure that everything gets patched?

    It seems to me if one were to include the costs of patching, insuring everything gets patched, and the expected losses (I assume probality is inherently high in then non-Unix world) from the inevitable missed patch (or, nonexistent patch/late patch), MS TCO would go through the roof. Then again, maybe the entire concept of TCO doesn't matter when the most significant costs can be hidden from ignorant managers who act as the software purchasing agents of the company.
  • by wobblie ( 191824 ) on Tuesday January 28, 2003 @01:40PM (#5175523)
    No linux vendor does anything like this; it's absolute insanity, and it's half the problem with MS admins (not) patching their software - they know better.

    For years I was forced to run an IIS server which was outdated, unpatched, and very vulnerable. I couldn't update it because the service packs would break the software running on it - and the reason was that the service packs, while they fixed the vulnerabilities, also introduced all sorts of new features I did not need or want. So I was reduced to keeping a very watchful eye on it.

    The entire infrastructure of Microsoft software distribution method is simply broken, and stupid.
  • by spells ( 203251 ) on Tuesday January 28, 2003 @01:51PM (#5175608)
    Although I respect Bruce Schneier (like he cares), I think it's pretty stupid to be quoted saying "This shows that the notion of patching doesn't work," without providing an alternative solution. I would love not to patch my servers, but perfect software just doesn't exist. What options do I have?
  • by Blkdeath ( 530393 ) on Tuesday January 28, 2003 @02:01PM (#5175681) Homepage
    I am so happy Microsoft got a taste of the problems that their own buggy software has...I wonder how many times this will have to happen to them until they get the picture.

    You don't suppose this will convince them to finally switch to OSS, do you? I haven't seen my MySQL boxes taking down the Internet lately!

    (Ok, ok, that was low.. ;) )

  • Re:Big Surprise? (Score:3, Insightful)

    by ajs ( 35943 ) <{ajs} {at} {ajs.com}> on Tuesday January 28, 2003 @02:04PM (#5175702) Homepage Journal
    Exactly. As I said, MS is very good at this sort of "acquire good technology -> productize -> sell" model. It's not something that a lot of companies can do well, and if you've ever seen it done badly, you'll begin to get a sense for how hard it was for MS to do this.
  • by MisterSquid ( 231834 ) on Tuesday January 28, 2003 @02:48PM (#5176018)

    Let's make this quick:

    MS is a collective. All of the things that individuals do within MS are actions taken by MS. You said it yourself: Microsoft, just like any other company, is thousands of individual people.

    MS cannot implement its own patching system coherently. The effectiveness of the MS patch protocol is ZERO as practiced by MS, and I mean ZERO.

    This is MS's problem precisely because members of their collective have proven that their system of patches has zero real-world effectiveness.

    If you want to apologize for MS, go ahead. Just don't say that they still might be right (about the effectiveness of patching) when they've proven themselves that patching doesn't work, even if because no one bothers to patch.

  • Re:Big Surprise? (Score:3, Insightful)

    by TrentC ( 11023 ) on Tuesday January 28, 2003 @03:18PM (#5176211) Homepage
    Explains why they dislike the GPL. It puts a damper on their research and innovation.

    No, it puts a damper on their ability to exploit the freely-offered code and sell it back to people.

    You can innovate on GPL'ed code, you just can't keep your innovations to yourself.

    Jay (=
  • by NineNine ( 235196 ) on Tuesday January 28, 2003 @03:20PM (#5176233)
    Yeah, it can be automated. I don't know why more people don't use it. I've been using it for 1+ years without a hitch. Run one command, it gets a block of XML from a MS server, compares versions of various files, then tells you what you may need, or what you should at least be aware of.

    Still, I'd be concerned about automating any patches. Heck, just a few weeks ago, Mozilla came out with a "patch" that broke a good bit of DHTML rendering. Not serious, really, but the same could happen to important software. For example, I know of a particular version of a particular OLE DB provider for Oracle that has a couple of parameters backwards for one of their main functions (I think this was an Oracle version of the driver). If somebody auto-patched a server, and it fixed this problem, it would've broken my app completely, and would've needed a bit of a re-write and re-compile. Not good on a live system.
  • by Anonymous Coward on Tuesday January 28, 2003 @03:32PM (#5176309)
    Okay, yea, I laugh when I read this true - but really, isn't just sad. So many network/SQL admins are just falling down on the job. I mean the patch is over six months old. The damn FBI is look for the worm authors, I think the real cause is the lazy, stupid (or perhaps just disspirired) so-called professionals who are not doing their job with basic security procedures.

  • Gadzooks! (Score:5, Insightful)

    by doorbot.com ( 184378 ) on Tuesday January 28, 2003 @03:38PM (#5176366) Journal
    There's no excuse. Just because it is harder to install than a simple windows update package isn't any kind of reason not to update.

    I agree, however...

    Microsoft has argued for a long time that Windows is easier to administer (than UNIX/Linux), and that you don't need to hire an expensive, trained admin (which I assume they are referring to UNIX admins, but aren't MCSE expensive, trained admins, all jokes about the quality of MCSEs aside?).

    So here we are with MS SQL Server, which is supposed to be an enterprise quality database system... but it has no intuitive interface for installing patches. So either we have a real DBA, who should know how to do these patches, or we have a power user to manage the database through a better interface to keep up to date on patches.

    Either it's easy and you don't need an admin, or it's difficult and you do need a trained admin. SQL Server updates can't be as "complex" as they currently are if Microsoft is going to claim that anyone can admin a Microsoft server product.

    Granted, they may not be making the claim that SQL Server is easy to administer, but what are the customers going to think? If Windows is "easy" (or so says the advertising), then SQL Server must be easy too! They both have little wizards to automate tasks, they both have a graphic interface for management...
  • Re: Big Surprise? (Score:2, Insightful)

    by Black Parrot ( 19622 ) on Tuesday January 28, 2003 @03:41PM (#5176382)


    > > Explains why they dislike the GPL. It puts a damper on their research and innovation.

    > No, it puts a damper on their ability to exploit the freely-offered code and sell it back to people.

    I think you missed the sarcasm.

    > You can innovate on GPL'ed code, you just can't keep your innovations to yourself.

    In lots of contexts, yes you can.

  • by Daniel Phillips ( 238627 ) on Tuesday January 28, 2003 @03:57PM (#5176480)
    Would you rather have a system where you have to manually implement every patch, or would you rather have a system where you didn't have any choices which patches were implemented?

    That argument is an example of a logical fallacy called "bifurcation" - presenting two alternatives as if they were the only two alternatives, when in fact more may exist.

    Somehow I keep my Debian system updated with the latest security patches without much effort, and without being forced to accept patches I don't want.
  • by ceeam ( 39911 ) on Tuesday January 28, 2003 @04:45PM (#5176766)
    ... is that oopses like this one have exactly zero impact on their market share, companies' acceptance of MS "solutions" etc... This is not a free market as known for ages, definitely.
  • by Master of Transhuman ( 597628 ) on Tuesday January 28, 2003 @05:44PM (#5177126) Homepage

    1) Went to a news site (MSNBC? I forget...) - decided to try running a video - told me it needed the Microsoft plugin, sent me to Microsoft site to download Media Player 9.

    2) Said okay, what the hell, I'll get it, EULA or no, downloaded, installed.

    3) Broke my wallpaper changer - began giving me divide by zero errors when I changed wallpaper. Why? Who knows?

    4) PowerPro began to crash on reboot for the wallpaper thingy... Why? Who knows?

    5) Uninstalled Media Player 9.

    10)Uninstalled WallMaster, reinstalled WallMaster.

    11)WallMaster and PowerPro problem go away.

    12)Irony - Even after I installed Media Player 9, the fuckin' news site STILL SAID I NEEDED THE PLUGIN!

    Fucking morons...

    Within the next six months, I intend to go Linux only and wipe fraggin' Microcrap off the disk...

  • by Vicegrip ( 82853 ) on Tuesday January 28, 2003 @05:50PM (#5177157) Journal
    You know, I'm having a good laugh here..

    "They make too much stuff to bother standardizing versionning info" ... hey, if you can't drive the bus, get off the road.

    Linux: rpm -qa /apt-get etc....

    Microsoft: "sorry we can't do that it's too hard"

    rofl

    And you didn't even address my original post.

    The entire internet went down on Saturday but it seems Microsoft bears no blame in your eyes. If that isn't a pure unadulterated example of the arrogance displayed by Microsoft I don't know what is.

    If I wrote shit that barfed all over the internet like that, I'd be begging on my knees for forgiveness from my customers-- not giving them the "you're all morons speech". Actually I'd be outta a job.

    I think you're the troll here. You should be proud. It's not too often a troll gets +5.

  • by smash ( 1351 ) on Tuesday January 28, 2003 @08:48PM (#5178327) Homepage Journal
    To those going on about patching, etc... that whole way of thinking is completely flawed.

    You have to assume there *are* holes in application software such as SQL server due to its complexity.

    Taking a reactive approach, and simply installing hotfixes are they're available will simply not work - patches are often not available until a number of days/weeks/months until after the vulnerability is known. Even if it hasn't been fully disclosed, the blackhats may well know about it, or be prompted to scrutinize that particular product more and find it before the full announcement.

    The correct way to deploy such products is to design your network with this in mind, and firewall them off from the rest of the world.

    That does NOT give you the security to not worry about patching (single layer security is bad) - keep your servers patched - but it does buy you a little time, and is an extra layer of defense in case there is a server that doesn't patch properly for some reason (file couldn't be overwritten for example), or is accidentally forgotten about.

    I can think of *no reason* why an SQL server must be accessible to the world. You have a webserver that uses it as a back-end? Give the public access to port 80/443 of that ONLY, and disallow connections from anywhere but localhost to the SQL software. Even better (and the approach I always take - I don't trust Win-X to be visible to the internet, period), install it on a seperate physical machine, firewall that machine more tightly (ie, allow SQL connections ONLY from machines that require them, such as your webserver).

    If you have client machines that need to access the database from the internet, thats what VPNs are for.

    Since I've had enough sense to firewall my servers correctly (yes, I was a clueless idiot before as well ;), I have not had a single security breach.

    I'm not saying that I'm definately immune to a concentrated attack, but you can definately stack the odds in your favour.

    Yes, it is an investment in time, and probably money - but if you want a secure network, its simply the price you have to pay these days... how much is your data/uptime worth?

    smash.

"I've seen it. It's rubbish." -- Marvin the Paranoid Android

Working...