Hack in the Box Meets Windows Vista 159
Strange_Brew writes "It appears Microsoft is really going all out to get Windows Vista secured before its release date in 2007. There's an article on PC World which talks about Microsoft's plan to give Asia's largest hackers conference an inside look at the new security features in Windows Vista this coming September." From the article: "The Hack In The Box conference will host two speakers from Microsoft. The first, Dave Tamasi, a lead security program manager at Microsoft, will give a presentation on security engineering in Vista. The talk will include a discussion about features suggested by hackers and other security conscious members of the computing community, in addition to security improvements made on Vista. The second speaker, Douglas MacIver, a penetration engineer at Microsoft, will review Vista's BitLocker Drive Encryption and the company's analysis of threats and attempts to penetrate the security feature."
Re:I have a feeling... (Score:4, Interesting)
OR
not
Vista still "protective" of keeping it's malware (Score:5, Interesting)
There is one major difference... Mac and Linux allow privileged processes to remove (and even replace) a file that still is in use. Vista continues to "protect" files that are in use from deletion.
That box you speak of... (Score:5, Interesting)
The box they built themselves into - or rather that they had to build around themselves - isn't so much the box that is the security model in Windows. I have no doubt whatsoever that Microsoft is entirely capable of locking down the system so badly that nobody but the most powerful ueber-god of a SysAdmin can open it back up to a casual user, let alone out to the internet for hackers to 'crack'.
But therein lies the problem as well. Windows users are -not- ueber-gods of SysAdmins, and this shows in the decisions that they feel are forced to make. I can't spot it in all the Slashdot story summaries on Vista right now, but there have been at least two stories in which there was a reference to Microsoft dropping a security feature or loosening a security setting -because- major clients of theirs told them that things were 'just too complex'. And this is in an operating system that guides you through reasonably easy-to-read GUIs with hint balloons and help files up the wazoo. You can well imagine what happens if you'd sit them down behind a screen that just shows a prompt and a one-liner telling them that security settings can be changed by editing the text file "omfglolwtfbbq.conf"
So yes, they're in a box that is difficult to get out of - but that's mostly because their clients make the walls so damn slippery after plating the bricks with titanium and burned down all but one of the ladders, then stationed several million angry users alongside it, hissing and whining at them whenever they try and scale it.
They are, well and truly, damned if they do - and damned if they don't. But at least they realize that they are a little less damned in the first case.
Good Idea? (Score:3, Interesting)
hacks are valuable... (Score:3, Interesting)
1. the money that can be made by selling the secrets to bad guys.
2. MS hatred goes deep in the hacking community...a lot of "hackers" would love to see vista hackable out of the box to hurt MS.
Perhaps they're looking at security the wrong way? (Score:1, Interesting)
Re:Vista still "protective" of keeping it's malwar (Score:3, Interesting)
If they have root access, they can hose the whole system. If they don't have root access (or refuse to supply the credentials), they can still hose their own user account. Either way, if you're looking to add another PC to your zombie botnet, the difference is immaterial, especially on single-user machines.
Even if there were absolutely no remotely exploitable holes, there will always be enough naive and incautious users to provide a rich hunting ground for malware.
Defects are Microsoft's fault... ALL of them! (Score:2, Interesting)
Re:fundamentally flawed (Score:3, Interesting)
Noncense, backward compatibility should not break security. Windows was sold as suitable for secure use in a networked environment. It was even given C2 [infoworld.com] security certification. The problem is the WinNT memory management unit running under the x86 processor. Something that was first tackled under Linux with Exec Shield [redhat.com]. The Windows version called NX [findarticles.com] can be bypassed as otherwise JIT bytecode won't work.
"inter-processes communication was flawed lacking any authentication method, kernel / userland seperation was virtually nonexistant,"
Wait a minute WinNT was touted as being more secure because of it's use of operating modes [osronline.com]. Ring 0 had full access while user apps were restricted to Ring 3, the highest restriction. At least that was the theory [securiteam.com].
"these issues persisted right up till XP when microsoft started to take security seriously with SP2."
Er, They still persist [secunia.com]. See here, much of this code is included in Windows Server 2003 and will be included in Longhorn [google.com]
"Microsoft just like the rest of us is new to the whole OS design thing."
When Microsoft hired on the Digital VAX/VMS [iiit.net] team they had an oppurtunity to design a secure OS. Most of the defects in the OS can be traced to managment decisions to favor features over security. Embedding Internet Explorer in the OS was one such decision.
"What needs to be done is
If by "We" you mean Microsoft, "We" haven't learned anything since 1988 [archive.org], 18 years ago. Why wait, why not upgrade to SuSE [desktoplinux.com], all the eye candy of Vista without the security vulnerabilities.
I see a lot of this kind of revisionist history on the Internet and in the media. Is there a whole department that does nothing all day but pollute the athmosphere with self serving distortions such as this. How anyone say this with a straight face is beyond me.
'the security kernel of the Windows NT server software was written before the Internet,
and the Windows Server 2003 software was written
before buffer overflows became a frequent target of recent attacks'
David Aucsmith [ossir.org], Security Architect, Microsoft.
Re:The never ending story (Score:3, Interesting)
I think I may be "that guy."
On my lil' 800MHz notebook with "only"(?) 256M RAM, Konqueror kicks Firefox's ass. I don't have time to wait for Firefox. Firefox is my choice on beefier machines, but as a "slimmed down Mozilla," it's a joke. There's nothing slimmed-down about it, and I'm amazed that they turned an I/O-bound application into a CPU-and-memory sucking experience.