
Linux Blamed for DDoS Attacks 585
jd writes "In this article, Linux and Solaris were blamed for the DoS attacks. The claim was that rogue code could be inserted onto these systems, causing them to attack other machines. The article also claims that this cannot happen with Windows machines.
Microsoft is trying to turn this entire DoS affair into one gigantic media coup. Is it possible it orchestrated the entire thing?
" Update: 02/11 07:36 by CT : the article has been pulled due to 'flagrant inaccuracies.'
Re:No (Score:1)
He's just using statements appealing to the majority of this crowd.
Let's face it (Score:1)
MODERATE THIS UP, PLEASE (Score:1)
--synaptik
If you want to flame me, do so here [slashdot.org].
Well, it makes sense.. (Score:1)
Of course, in the Windows world, I know that people send each other
--
Ski-U-Mah!
Stop the MPAA [opendvd.org]
Re:Well, it makes sense.. (Score:1)
The anti-virus companies in particular have a vested interest in keeping Windows the dominant platform -- viruses are far less common on Linux and other Unix-like OSes.
Of course, I still say that the distributors of Linux should really work harder to make the administration of various services easier to do and understand. CAEN Linux is one good option, plus I see that Bastile Linux (a script for hardening a default RedHat 6.0/6.1 install) is being actively maintained.
--
Ski-U-Mah!
Stop the MPAA [opendvd.org]
Why? (Score:1)
And I don't think it was funded by Microsoft. They are smart enough to actually find *real* flaws (however small) in the targets of their propaganda and then write about them with a reasonable level of grammar. This article looked more like a five-year-old got ahold of a computer on a bad day. (Actually, I guess that's being a little harsh on five-year-olds...)
My favorite part was the bit about "as many as one million" users of Solaris and Linux, put together. *giggle*
Speaking of DoS... (Score:1)
Something to think about...
Re:UPDATE: Story Pulled due to "Flagrant" Inaccura (Score:1)
Yes and no (Score:1)
Of course, even if it did require kernel access, windows will happily grant such access to anyone who sits down in front of it. Write your own "third party" device driver that does DoS, and bobsyouruncle, you're DDoS'ing.
So just because it seems unlikely that windows was involved in this case doesn't mean it couldn't be in this, future, or other attacks. And while we're at it, how about the proliferation of "wingates" behind which conservatively 100% of the world's skript kiddiez hide when performing their various oh-so-1337 activites? On operating systems with access control, setting up such a thing would require root access and some clues. The lack of such measures makes it easy for anyone to do it on any old dos box.
So microsoft is distorting the truth to try and make themselves look good. Bully for them. Probably because we don't even read about the hundreds of NT/IIS sites that get 0wn3d every day any more. Everybody enjoys not being the culprit at some point. When the tables are turned, we'll be doing the same thing.
Bottom line: misconfigured systems, of any type, can easily be cracked and used for nefarious purposes. Regardless of what specific type happened to be prevalent in the latest well-publicized attacks.
Bunch of money grubbing garbage (Score:1)
Oh well, this is just a "consultant" screwing over gullible CIO's. I guess it's no different than a televangelist screwing over old ladies. Except that good operating systems don't get smeared by televangelists...
It's tempting (Score:1)
Any takers
Who is to say that? (Score:1)
And in some code was slipped into Linux, I'm sure Alan or Linus, or some other coder, would find it quite quickly, and it would be removed quicker than it went in.
T.
Re:READ THE ARTICLE (Score:1)
First, it's quite possible to embed your own malicious code into proprietary software without having access to the source code. happy99.exe inserted malicious code into WINSOCK.DLL to propagate itself, for example. You just have to be handy with a hex editor and understand the calling conventions of your platform.
Worse, it's extremely unlikely that anyone will detect the modification, except possibly through its effects. Detecting such a modification (without observing its effects) in a proprietary application is much, much more difficult than inserting it. (After all, you only have to insert it in one place; you have to look for it everywhere. Looking everywhere means you have to understand what the whole application should be doing. Without source code. Inserting it only requires that you understand what the application actually does do.)
Analogous attacks on free software are typically detected within hours or days.
Second, you can run Purify on applications you don't have the source code to, as long as Purify can find and redirect malloc() and free(). Purify doesn't find all buffer overflows, though; in particular, it doesn't find the most interesting kind, where you overflow a buffer into something you're not supposed to be able to overwrite.
Third, these attacks are not related to inserting "malicious/foreign" code into an operating system. They're related to breaking into a system, running some user code on it, and sending out packets from it.
You got the gist across... (Score:1)
Another way of phrasing it is: education
- an educated free thinking consumer is a better consumer than an ignorant one.
- an educated and free thinking market is better than an ignorant one.
Article is Flaimbait (Score:1)
That is asking "Is it possible [MS] orchastrated the entire thing?" is flame bait.
MS is so good at FUD that they don't need to orchestrate something like this to create it. It's just their FUD machine capitalizing on an opportunity.
-Peace
Dave
MYCIO Scan (Score:1)
Re:UPDATE: Story Pulled due to "Flagrant" Inaccura (Score:1)
This is just bad reporting. Even if the facts were correct, the article itself is of very poor quality. Sources we're not identified, grammer was poor, and very little justification is given for any of the claims. I'm betting upper level editorial people took it down the minute they saw it.
I'm betting that someone owed someone a favor and this was some sort of free promotion for myCIO.com or something..
(Not that my grammer and spelling are wonderful, but I'm not "publishing" this...)
A conspiracy theory ... (Score:2)
Summary of events as I've read about them:
In two days, major Web site hosts get nailed with a lot of high bandwith, bogus traffic (at one point, one site gets nailed with more traffic in one day than they get in a month or something...).
The next day, the Attorney General, Janet Reno issues a statement to the effect of the government will respond to these "cyberwarfare attacks". A day after that, the FBI says, oh, looky here, we have code we want to give you to help you "combat" these DDoS attacks.
1.) The Internet comes from the ARPAnet, a government research project at one point in history. There are military networks on the modern Internet to this day. (.mil ,
2.) The government has a lot of technical resources at it's disposal; lots of bandwidith. The NSA, for example, has a lot of computers and networks. Military installations do too.
3.) There's been a lot of talk by the government about "combatting cyber-crime, "cyberwarfare", "the information infrastructure". Heck the President made a statement last March targeting "criminal" hackers. (See 2600, 16:1)
4.) The military loves field exercises. The military is in to cordinated groups and group tactics. Why not have one big cordinated field exercise in "cyberspace" to "test the information infrastructure" to see what happens when e-commerce is disrupted?
5. The government is about retaining order through control; laws, rules, censorship, taxation, etc. These things help keep the government running and society maintains a peaceful status quo. The government likes the status quo.
Now, as far as I know, the government isn't making a dime off e-commerce (i.e. sales taxes). Why should they care if Amazon or eBay lose money? It's not their money; of course, they'd like to be making lots of money, to fund more projects, pay debts, etc. Hmmm.
Now say, TWO DAYS LATER when the virtual smoke clears on the electronic battlefield, a politician sidles up to the e-commerce sites and say, "Well, dang, sorry you guys lost all that dough, but look here, we have this nifty code at your disposal. Feel free to use it to patch that dang problem to improve yer site security fellas, don't worry, you can trust us
Now that's awfully quick, with a modern government that sometimes takes months to even pass a bill into law. How the heck did they get that code out there so fast(Now I suppose that they might have been working on solutions to getting their Web sites from getting defaced less often...)?
What you don't see in the media(and this is the fun part of the conspiracy) is the part where the good ole boy politician checks back with e-commerce companies in a few months and says, "Glad that code is working for you; mighty glad.
Incidently, we have an even better solution than that code. What we gave you was just a beta version.
Did we mention that now that we understand how to do these DDoS attacks, we'll be doing them against your site to test the intergrity of our code for you. We'll be doing this at random, so you don't have to worry about testing it yourself. In fact, you might not even know it's us doing it, to "simulate" a reall attack.
Now, if you agree, for a small fee, say, oh, just a few tax dollars off your gross sales each year for the next 20 years, we'll go ahead and install this improved version of our code that will allow you to distinguish between us and them, and it'll protect your sites even better than the beta. Honest, you can trust us
6. Headlines in March of this year start to read: "Government and e-commerce do business" "Government passes bill into law; taxation of e-commerce to begin next financial quarter" "Offshore corporate banking increases" "Dot.Companies focus on Carribean and Mediterranean investments" "Data havens appear in international waters aboard new dot.company cruise ships"
Okay, where are Mulder, Scully, and the Lone Gunmen when I need them?
END OF RANT
Re:Send them mail! (Score:2)
----------------------------
Letter from the editor in chief of newsbytes (Score:2)
I just received this letter in response to previous correspondance with the editor in chief of newsbytes, including discussion of publishing a correction instead of pulling the original article.
We are not publishing that follow-up report, since it would not be ethical to publish remarks that could be, or are suspected of being erroneous. We have also removed the original story from our Web site and have requested that Computer Currents do so too, which they have done. The next time this issue comes up we will do a more complete story with all sides represented.
Thanks very much to everyone for their comments and insight.
Sincerely,
editor in chief
----------------------------
Gross incompetence is to blame. (Score:2)
Sometimes it's not just the users who need a few beatings with the clue stick.
- A.P.
--
"One World, one Web, one Program" - Microsoft promotional ad
Re:Buy a clue (Score:2)
However, lots of times you need an OS that allows for low level manipulation of the IP stack. IIRC, you can't do this in Win95 so spoofing packets like a worm on crack just won't work in win95.
False. One doesn't need any special interface in the IP stack implementation to send bogus packets -- he needs an access to the network interface at the IP level or anywhere below it. MS-DOS with Ethernet or PPP driver is enough to do that -- hell, PalmPilot with a modem is enough to do that.
Re: NO BO on NT (Score:2)
Cablemodems?
...phil
CISCO.... (Score:2)
Cisco has a document [cisco.com] up on their website that might interest everyone.
Here's a quote:
In order to facilitate DDoS, the attackers need to have several hundred to several thousand compromised hosts. The hosts are usually Linux and SUN computers; however, the tools can be ported to other platforms as well.
5 day wait period & bkgrnd checks for linux users! (Score:2)
Ponderings.. (Score:2)
Oh, what to do with ethics..
Re:Who is to say that? (Score:2)
If they can be fooled by an nmap decoy, they can be fooled by a fake OS fingerprint. It's not that hard to do, but it seems that it's hard to think of.
And if, as some have said, I'm paranoid, that's possibly true. But just because I'm paranoid doesn't mean MS isn't out to get people.
Oh, and would MS -really- care about an outcry? I seem to remember fake letters being sent to newspapers, in support of them, in one trial. I also remember a faked video tape, an OS "patch" which deliberately broke Felton's IE de-installer, attempting to tamper with evidence (eg: getting their German HQ to burn all evidence), the destruction of all source code for Win 3.x in the Caldera trial, the breaking of APIs in Win 3.11 to prevent OS/2 working, the current API court case in Europe, the reneging on licences with companies developing Windows emulators for Unix, the reneging on the EULA when it became expensive for them, the attempt to control the media via ZDNet and MSNBC, the attempt to control the satellite phone industry via an aborted attempt to launch 1,000 low-level satellites...
Can anyone seriously both acknowledge Microsoft's wrong-doings AND ignore the possibility of yet another?
Doesn't it seem a little coincidental that there's a massive publicity boost for Microsoft, immediately prior to the President of the European Union raking them over the coals? And at the same time as surveys are showing that a major threat to them in the server & embedded markets (Linux) is on the verge of overtaking them?
If Microsoft needed scare-tactics, they'd need them right now. I don't believe in luck, and I won't believe that Microsoft "just happened" to receive a whole plateful at EXACTLY the right time, at a very critical point in their history.
Sorry. If it's a choice between being a paranoid, hyper-suspicious global village idiot, or a gullible, mega-trusting sheep, I don't look good in mint sauce.
Re:Micrsoft's Fault? (Score:2)
King Monkey, Great Sage, Equal of Heaven: Oh, for heaven's sake, Pigsy, I want to take over the world this week! Why should the master always have the fun?
The Master: Hmmmm. Do I know you?
(Agent) Monkey: Chchchchchchchch!
Dexter: This is getting seriously silly, and is taking me away from my greatest creation!
Brain: And what, pray tell, is more important than taking over the world?
Pinky: Daffodils in chocolate syrup! Wahahahahahahaha! NNnnorg!
Re:Let's face it (Score:2)
We're watching a sea change... (Score:2)
Used to be, linux was only run by those that really, really knew how to run it. So what if the default installer installed apache and turned it on. So what if it installed telnet/rpc/nfs/and other services and left them running. It was all OK, as most linux systems were servers of some sort, so they needed these things and those of us that ran linux boxes knew how to shut down what we didn't need and how to install a proper firewall if we needed to do so.
The market is changing.
There are now a number of Joe D. linux users out there that haven't the foggiest idea what tcp or anything else that is not clickable is. Remember that battle cry "World Domination"? Well, here it comes folks. If linux succeeds in its self appointed "goal", there will be far more Joe D. idiot users out there than those of us that do have some comprehension of what is going on under the hood and what we are doing.
What baffles me today is why do the distros STILL install all of this stuff, leave it all enabled, and fail to also install a proper firewall that, if you want to make sense or at least be consistent, doesn't allow access to anything except for those services that are specifically enabled?
Huh? Why leave the whole machine wide open?
Personally, I'd much rather have an initial installation that started up closed, locked, sealed up tight as a drum, and totally inaccessable to anything that probes eth0, ppp0, or whatever so that I can then turn on only those things that *I* want to be on. As it is, since most installations today are NOT servers, most new installations these days take a whole series of operations to secure properly rather than a few simple steps to turn on those services that really do need to be enabled on Joe Dimwit's workstation.
Re:MS can't be subverted eh? (Score:2)
No, my bet is that they have heard of BO/BO2K/Netbus, as have most ITs working in the NT field. College campuses (which the FBI is concentrating heavily on right now) regularly do scans for BO and Netbus. It was publicized so heavily that most people knew about it and at least had the knowledge that they should be checking for it. I remember when I worked for our campus network checking for BO and cleaning off people's systems. But they don't scan their systems for these Unix vulnerabilities because the Unix community does such a good job of saying, "Oh, our systems are super-secure." That's true, if they're set up properly, but most aren't (especially when it comes to college kids running Linux), and that's what's being exploited. At least when Microsoft gets a bug, it's heavily publicized. When Unix gets a bug, unless the admin is on bugtraq (of which many aren't), no one will hear about it. Our network admin at my current school doesn't know too much about Unix or admining, but he gets a lot of help from the press when it comes to running his NT network.
Basically, there are enough stupid people admining Linux and other Unix systems that those networks are probably much more vulnerable than your average NT network. Maybe instead of saying, "This is such FUD!" Linux advocates should do a lot more education about how to make systems secure, starting at the company level (Redhat and Corel) and working down to the level of the user (LDP).
Re:READ THE FUCKING ARTICLE (Score:2)
So, either we're reading different articles, you didn't read the article, or I skipped an entire paragraph or something (hey, I'm not perfect).
Re:Shoddy Reporting (Score:2)
If Slashdot is truly to be respected as media source, it's going to need to get it's act together. It rails against FUD from Microsoft, but it turns around and spews the same type of FUD back out against Linux. I'd rather hold Slashdot to a higher standard than my typical news service, and to do that, the editors are going to have maintain a higher standard. That means cutting out some of the sensationalism and making sure that they verify their stories.
So yes, the blame for this post falls squarely on Taco's shoulders. He should never have posted it for general discussion without first making sure that those ridiculously (and wrongly) anti-Microsoft comments were either toned down or removed altogether. That's his job as editor. If he's not going to maintain at least some journalistic ethics, then I may as well read CNN for my Linux news.
Re:Send them mail! (Score:2)
If someone wants to find a NewsBytes editorial email, I'll send the same email to them.
The main thing is to respond. And I don't think we should only let the big guns of the community respond (though of course their help will be very important).
Send mail yourselves. It doesn't really even matter if it's to the right guys -- CompCurr has an obligation to report the news correctly, and if NewsBytes is giving them bad wire feeds, perhaps they should junk the service. News companies need to stand up behind the stories they report.
This one was about the dumbest I've read in a long time
...
Oh, and M$ isn't behind this. Don't be absurd.
I got the editor's email (Score:2)
Her name is Wendy Woods, wendy@newsbytes.com [mailto]
I don't enjoy poster her personal email here, but she's an editor; she needs to take responsibility.
Send them mail! (Score:2)
Be polite, but set them straight.
Source code to exploits? (Score:2)
Not FUD, just plain LIE!!! (Score:2)
i'm not surprised... (Score:2)
however to say that windows systems are immune is a complete lie. anyone remember melissa? virus writers to date haven't really played with the net, but the ability to write up a virus that attacks people you don't like seems rather simple (to the virus crowd).
all one would do is write up a virus that would check a set of web pages - there are hundreds of free hosting sites - and snarf a list of ip addresses once a day or so. then it would do a DoS attack on one of those hosts at random.
it got withdrawn! (Score:2)
10: they did research
01: linux users wrote in to explain their mistake
00: sun's lawyers called them and gave them the definition of libel and defamation
gee, i wonder which?
Re:i'm not surprised... (Score:2)
Gee, I was going to blame Intel... (Score:2)
Oh yeah, they're used in all the Windows systems too. Never mind.
How stupid can they get?
- -Josh Turiel
Use Linux (Score:2)
With Linux, you're able to turn on and off services, masquerade behind a firewall, turn off response to pings even (which I think ZoneAlarm does). Basically, you have all the features of ZoneAlarm plus more, but without the user friendliness.
The lack of user-friendliness is a good thing, IMO. With ZoneAlarm, you can't really tell exactly what it's doing. With ipchains and a homebrew script you know what's going on under the hood. With security, it always pays to be more careful. Knowing more about the internal processes helps you be more careful.
And if you really want the nice GUI, there are a number of apps available on freshmeat.net to help you.
-Dave
Its just one big network associates add (Score:2)
It continous to talk about how you don't have to download the government tools, but can rather use thiers stright from thier web site. And so on. It plugs at least one other Network Associates tool before finally blowing its self out. Of course no details which vulernability is being exploited is mentioned... But they claim they can find it.
I wish someone had seen the site before this story was posted, and the Jihad was declared.
--locust
MS can't be subverted eh? (Score:2)
Of course it's all a media relations exercise.
Personally I've been acting the doomsayer for a long time regarding DDoS and the introduction of thousands of windows PC's on DSL technology. Windows NT and 2k at least make an attempt to be secure on the network, but the lose95/98 machines have had little of those considerations.
Personally - I think that people should get computer licenses - you should have to demonstrate your ability to admin and secure a machine on the internet. This should be needed to get hardware and connections, and users could be licensed to different levels.
Imagine your Pride as you show the modem plebs your license to gigabit networking
need root to launch spoofed packets (Score:2)
--
Some points (Score:2)
B: Naaaa. Microsoft is not behind this. Neither the Greys, the Shadow Governemnt, the KGB/FSB/MOSSAD/BOSS/Hezbollah/CIA/FBI/NASA. It's a smart and nasty kids play. Or some stupid jerks doing "Morrison experiments" on the net. Or some guys who think that is time to "revive" the anti-worm/virus/exploit market...
C: Don't trust these "we'll check the stuff for you". There is always the risk that such offers carry some stuff "behind the scenes". Or that tempatation will not be hold on a possible future. On this point I had already found several "do all jobs for you" stuff, from very serious companies, where VERY SERIOUS information suddenly travels from your net right into their offices...
D: It is sad that such thing is happening and seems to still happening after so many days. This rather strange passivity does not offer anything good in the future. If FBI is readying for another "super-operation" that ends in a mess, then what will be the "next day"? These kinds of DoS are not the worst of te worst. In fact, presently, any Internet Wargame is rather stupid, because it still is enough to pull a few plugs and "KABUUM", everything ends in a simple and calm silence... So building things as if this is Waterloo could lead to some sad consequences.
Re:READ THE FUCKING ARTICLE (Score:2)
In particular, the fact that you say it "didn't mention anything about source code" is telling.
Try doing a Find on it for "source code", then read that paragraph and the ones before and after it.
Possible Source (Score:2)
Re:READ THE FUCKING ARTICLE (Score:2)
I don't know, why this writer, doesn't have an editor, who could remove, all the extra commas, and replace, the adjective, "easy," with the adverb, "easily".
Re:Shoddy Reporting (Score:2)
> What I see is that a lot of Linux/Solaris systems are vulnerable because their IT folks don't know how to manage them.
What I see is "the current spate of attacks takes
advantage of an *inherent* vulnerability in these systems" [emphasis added]. They're not blaming sys admins or failure to apply patches. They're claiming that it something wrong with the OS that can not be fixed.
What OS is to blame? (Score:2)
trying to blame an OS for this DoS stuff is like trying to blame Ford or Chrysler for drunk drivers and speeders.
many have made the point already, in various forms: the OS that the perpetrator(s) used could have been anything. he/she/it/they could have used any or all of Linux, Solaris, Win*, or even OS/2, just to name a few operating systems...
the OS that was used isn't the point. the fact is that there are people that do this stuff. there always has, and there probably always will be. the trick is to figure a way to get around the problem so that it's not an issue anymore.
linux/solaris ARE more vulnerable in this case (Score:2)
Re:Micrsoft's Fault? (Score:2)
[grin] And then a few plants and dupes ridicule the "paranoia", neatly drawing attention away from the conspirators. Ha! Caught you!
they already found the code (Score:2)
send flames > /dev/null
Re:Now who's spewwing FUD? (Score:2)
I run (ran) one NT machine now, and I tell BO with the cool plugins is the best way to manage the thing. Some thing does not work, fire it up and fix it. When I got BO on it, I tossed it up on a rack and forgot about it. Just log in with BO and check it out every now and then. Great thing is that I can reboot it remotely! Sweet!
The problem is... (Score:2)
Though according to this in-depth review (http://staff.washington.edu/dittrich/misc/stache
Does this mean that winxx machines are not vulnerable? no, just not used in this case. Just wait until some non-kiddie ports this into windows and watch UUNet go
They pulled the story! (Score:2)
Daily News
Solaris and Linux Vulnerable To Hack
By Sherman Fridman, Newsbytes.
February 11, 2000
Due to flagrant inaccuracies this article has been pulled and is being re-written.
Occasionally one of these slips through the editorial process. Computer Currents regrets the error.
February 11,2000 11:17:00 AM PST
Well, I'd like to have read the original story.. The site was slashdotted all morning.. oh well.
---
Exploiting tragedies (Score:2)
I suppose it's possible. Is it likely? Not hardly. Can MS be expected to exploit these high-profile DoS attacks to promote its own products and blame its major competitors? Bet money on it!
Katzish analogy time: Gun control zealots and censorship advocates invoked the Columbine tragedy to promote what they were selling. Why should we expect MS to behave any differently?
Calmer heads recognize(d) that these tragedies were waiting to happen. What's really surprising is not that they happened, but that they didn't happen sooner.
Linux (well, any OS, really) is only a tool. It can be used for good or for evil. Please use only for good.
Two Minutes of research reveals... (Score:2)
(Of course, Stacheldraht is not the only perpetrator in this recent spate of DoS shenanigans. However it was identified as one of the major cracks used)
From Dave Dittrich's paper on Stacheldraht , we find: "The Makefiles contain rules for Linux and Solaris, with the default being Linux (even though it appears that the code does not work very reliably on Linux). For the purposes of this analysis, all programs were compiled and run on Red Hat Linux 6.0 systems. As far as I am aware, the agent has been witnessed "in the wild" only on Solaris 2.x systems."
Hmmm. It seems that Linux is not the wide-open OS that the article makes it out to be. The rest of the paper also clearly illustrates that any OS with common networking utilities (including NT) is vulnerable to similar agents.
Mr. Dittrich's recommendation is: "The real defense is to make sure that *all* systems are kept up to date with security patches, unnecessary services are turned off, and competent system administrators are running and monitoring every Unix system on your network. (I'll hold my breath while you go make that happen, OK? ;)"
Funny, this sounds like that same old security mantra I've been hearing from day one! A more competent reporter would have attributed at least part of the blame to lax security policies.
Re:In a very related story.... (Score:2)
Yes, but no (Score:2)
As it stands right now, the average Solaris box can easily be exploited by buffer overflow scripts against Sun RPC services (cmsd, tooltalk, amd, etc). However, the same percentage of Windows boxes can be exploited via .htr buffer overflow or the RDO exploit.
BTW, if you've been running a firewall or intrusion detection system for the last several months, you probably have evidence [networkice.com] of the perps. You may also want to check out this list of intrusions [networkice.com] that hackers can run against systems, which are really evenly distributed among UNIX and Winsoze systems.
Article quality (Score:2)
Apart from the wrong statements, the 'journalist' who wrote the article obviously hasn't checked anything, he just provided a forum for that other guy who wants to sell some security-related product. It's a shame everybody can create their own news site without having to fulfill certain standards...
Tromp Loudly... (Score:2)
By Sherman Fridman, Newsbytes.
February 11, 2000
Due to flagrant inaccuracies this article has been pulled and is being re-written.
Occasionally one of these slips through the editorial process. Computer Currents regrets the error.
Aahh, you gotta love the power of the Internet and accountable media. How many times does your newspaper do this? How about the Evening News? How often do they need to....
Computer Currents? (Score:2)
Either way, I would ignore it. Computer Currents has zero credibility. If you read their print version, it's mostly ads for here-today-gone-tomorrow ISPs and product reviews along the lines of "Adobe Photoshop lets me change the color of my cat's eyes! Amazing!"
Seriously. I've picked up copies from time to time since ~1995 (gotta read something on the exercise bike). The quality is very uneven. If you can do "Hello, World!" in C, you can label yourself a "software expert" and they'll let you make a total fool of yourself in print.
As Mr. Gump says, "...and that's all I have to say about that."
Re:READ THE FUCKING ARTICLE (Score:2)
While I'm not one to advocate security through obscurity, I do have to take you to task over your claim that it's an outright lie; it's not.
1. If the source comes with it, I can embed my own malicious code in the source and pass it on like that. People have to check what I've done - and people might not spot it. I can't do my own source rev for a closed-source OS, so this form of attack won't work. The closest analagous attack that will work is a trojan or virus attack.
2. If the source comes with it, I can run it through BoundsChecker or Purify or some other such intelligent lint tool and find any buffer overflows in the source - or any potential other errors. Heck, I can even go through it by hand and see what I can find that I can use to get access to the machine. I don't report them - I just note they're there and use them as exploits to embed my DDOS code onto the system that is vulnerable. This is much easier than the way you have to do it on closed-source systems, where you have to do things as a matter of trial and error and slowly wend your way through the system prodding here and there to try and find some kind of hole - and then you've got to find some way of inserting your own code onto the system from there. Much more difficult.
Let's face it - it's possible on both systems. But let's also face it, it's not a lie to say that it's easier to insert malicious/foreign code into an operating system that you have the source to. Because it IS easier - just not much easier.
Simon
DoS attack on currents.net? :) (Score:2)
I'm sure somebody out there would belive it
Vox
DoS attack on currents.net? :) (Score:2)
I'm sure somebody out there would belive it
Vox
PS: I hope this isn't duplicated.../. isn't answering on the first try
Time for the distros to be more responsible (Score:2)
The fact of the matter is that most Linux distributions install out of the box with way to many ports open and exposes them to attack.
Yeah, so do Windows boxes, yadda, yadda, but who gives a shit? I care about making Linux better, not about Windows being worse.
Item No. 1: At my LUG somebody this week asked for help after his RH 6.1 box was cracked. Guess what, his install had left his machine running BIND (the version with the known exploit!), Samba, nntpd, ftpd (with anonymous ftp enabled!) and all sorts of other crazy things. Why in the hell does an installation for a home machine open all this crap? (It's the same for Slackware, and for all the other big distros). This is crazy and totally irresponsible.
Item No.2: Where I work I'm in charge of security and we get our daily ration of port scans and such. Ocasionally I discretely run nmap back at the source. Granted I don't do this always, but when I do the fact is that the vast majority of those machines turn out to be running Linux and are wide open, listening on all sorts of ports that home machines have no business listening on.
Linux is becoming more popular; and that's wonderful. But in the short term this just means that more machines are sitting ducks, really. The way the default installations leave the machines so open it's a sad joke, combined with more high-bandwidth connections means that there are more potential slaves out there for distributed DoS and it's incredibly easy to break them wide open without the owner ever noticing.
And I don't care if Windows is even easier to crack. That's a f*ing lame excuse. If we're committed to Linux we should react to stories like this by asking "what can Linux do to avoid being part of the problem"? rather than shouting "BackOrifice, nyah, nyah!" or some other pointless diatribe. That's FUD in reverse and any Linux fan should be embarrassed for engaging in it.
Hell, at work I've advocated Linux to the point where we're running many important servers on it, despite some reluctance of management (and a good amount of FUD from vendors who were cut out
But I'm not talking about whether theoretically Windows is more crackable than Linux; I'm talking about what I see almost every time I take a close look at who's portscanning our firewall and most of the time it's a Linux box; and you know what? It's embarassing and there's no good reason for it to happen.
The proper response, IMHO, is to petition the makers of all the popular distributions to adopt a closed configuration for their default install, with users having to explicitly open services after been given a short blurb on security and the risks of running unattended network daemons. That's more productive than wondering about a conspiracy that Microsoft could't pull off even if they wanted to.
Re:Little Whiney Stevie (Score:2)
WTF?? (Score:2)
I just love the fact that this guys blatantly says that Unix/Solaris/Linux systems are vulnerable to having unwanted code placed on them. I really doubt there's much truth to this.
Windows- based systems are not subject to this problem. Sure. I'll believe it when I see it. If the last few years have proved anything, it is that Windows (with it's executable macros, activeX programs and other integrated offerings) is much worse when it comes to security and stability. And now all of a sudden, Windows machines are immune and Unix type machines are vlunerable? Yeah, right. Next he's gonna try to convince us that the BSoD is really just a feature which secures the box by disabling (amongst other things) net accees.
Re:Now who's spewwing FUD? (Score:2)
Re:Who is Nelson? (Score:2)
This can't happen with Windows? Ha! (Score:2)
This can't happen with Windows? Horseshit. The first hypothesis that came to mind when I heard about this DDoS attack was a Back Orifice module installed all over the place.
MSN was hit though (Score:2)
Re: NO BO on NT (Score:2)
Besides, who said that I meant NT?
Someone, quick, write a flood module for BO2k (Score:2)
We had better get a module for BO2k quick, one that will do ping-floods and other DOS nastiness, especially one that can be triggered easily with a single UDP packet..
Just for illustrative purposes of course, as we don't want to come out as if we are SUPPORTING such horrible things.
Whoa! Who is Nelson? He's the one saying it. (Score:2)
Notice how all the comments are attributed to a Nelson, but nowhere in the article does it say who he is.. No first name, no last name, no specific affiliation.
It looks like some reporter there got duped into listening to some idiot who is in desperate need of a cluestick, actually about a dozen cluesticks. Its not the fault of the magazine. (How many `intelligent' people have been scammed by Goodtimes or other `obvious' falsehoods?)
So, its either a case of ``Never ascribe to malice what can be explained by stupidity can'', or time to get out the conspiracy theories.
My advice would be to kindly email them telling them that Nelson is a fraud who doesn't know what he's talking about and they would be better served going to Lopht or a real security company for advice. Oh, and ask who Nelson is, so that we may give him the instruction (and flames) he so richly needs. Of course, this is all irrelevant, as they've probably got about 300 idiotic flames in their inbox right now.. Oh well, the slashdot crowd shoots its own foot again.
Whoa! Who is Nelson? He's the one saying it. (Score:2)
Notice how all the comments are attributed to a Nelson, but nowhere in the article does it say who he is.. We don' know if its a first name or a last name, and there is no specific affiliation.
It looks like some reporter there got duped into listening to some idiot who is in desperate need of a cluestick, actually about a dozen cluesticks. Its not the fault of the magazine. (How many `intelligent' people have been scammed by Goodtimes or other `obvious' falsehoods?)
So, its either a case of ``Never ascribe to malice what can be explained by stupidity can'', or time to get out the conspiracy theories.
My advice would be to kindly email them telling them that Nelson is a fraud who doesn't know what he's talking about and they would be better served going to Lopht or a real security company for advice. Oh, and ask who Nelson is, so that we may give him/her the instruction (and flames) they so richly need. Of course, this is all irrelevant, as they've probably got about 300 idiotic flames in their inbox right now.. Oh well, the slashdot crowd shoots its own foot again.
Re:Slashdot is NOT above this sort of thing (Score:2)
Utter bullpucky. Your logic is dreadfully flawed. I'd take the free beer, first, every time, and I'm sure most /.ers would too. Plus, it's easier and more fun to bash Microsoft with a few free beers under the belt. Burp. But, even so, the phrase "Microsoft Office 2000: FREE with the purchase of six-pack" has TREMENDOUS appeal. Make it a case and I'll even install it.
"C makes it easy to shoot yourself in the foot; C++ makes it harder, but when you do it blows your whole leg off."
It is both better and worse than this - (Score:2)
Also, as someone who works on NT as well as other OS's, there is no reason why such attacks cannot be mounted from MS OS's. It's just that the set of tools that apparently were involved in this set of attacks work on Solaris and Linux boxes. For example, another similar attack strategy, IIRC, has been identified for Macs running OS9.
The main point of the post is dead on -- the problem is large numbers of unneccessarily insecure machines on the net -- in this case *nix boxes -- that act as hosts or agents for staging the attack. CERT has been warning about this general topic for many months, with specific warnings [cert.org] about just this kind of technique using the tools (TRINOO and TFN2K) now suspected. There are specific things you can do to prevent your servers hosting this kind of attack, but too many sites have not carried out these safeguards -- and this week has proved it. Ingress filtering and better packet filters on the backbones will cut back on smurfing, but there are ways around that. If you are a sysadmin, and you are not monitoring the CERT current activity page [cert.org] as well as others, subscribing to some of the appropirate mailing lists and keeping your systems up to date accordingly, this will keep on happening, and Microsoft has nothing to do with it.
Paranoiac whining will not get us anywhere.
No need to get all worked out... (Score:2)
Don't forget the Mac bug .... (Score:2)
Personally I'm just waiting for the Windows virus that infects, announces itself to it's master, then lays dormant untill required .....("what do you mean 'every PC on every @home net in the world is pinging us ...'") - it's an obvious way to get a Tribe-style resource that's an order of magnitude or two greater than you can get by hacking a bunch-of Linux/Unix systems
Ask yourself (Score:2)
Because no one in their right mind is going to trust a uninsulated Microsoft box with a pipe big enough to attack over! Linux, BSD, Solaris; They're all just fine in a sea of packets, PIX-less. Windows 98, NT? Better put 'em behind a firewall, or else some three-year old malformed packet bug is gonna get em!
The hackers realized a Win32 client would be useless; Why hasn't this journalist, a so called 'expert' (No doubt in looking like an ass in print)
They pulled it, if you hadn't seen that yet (Score:2)
Due to flagrant inaccuracies this article has been pulled and is being re-written.
Occasionally one of these slips through the editorial process. Computer Currents regrets the error.
....
---
Re:Shoddy Reporting (Score:2)
Re:Shoddy Reporting (Score:2)
Boilerplate story; not bias... (Score:2)
This seems to be a case of traditional boilerplate story forms used by the journalists. Such a story would look like:
It's not journalism to then state the speculation that OTHER potential code could do exactly the same thing on the other familiar OS types. Editors would possibly see it as a liability to state it; Dan Rather doesn't explain HOW to improve a weapon. Such speculation is punditry and analysis. Of COURSE it's true that Windows and MacOS and BeOS and PalmOS and anything else can be compromised. It just takes a change to the virus/trojan mechanisms.
"Virus" is an apt analogy. It depends on a specific sort of host. You don't catch the flu from your cat, but there are viral infections that specialize on either species. You can catch some diseases inter-species, but it requires the two species to have something in common which the virus can exploit.
Little Whiney Stevie (Score:2)
Oddball Security Question (Score:2)
Has anyone used this? (It's a Widows Only deal)
Does anyone know of a better freeware solution? (Question open to ALL operating systems)
Thank You.
-----
Article was yanked due to "flagrant inaccuracies". (Score:2)
Re:UPDATE: Story Pulled due to "Flagrant" Inaccura (Score:3)
Here [nacs.net]
**Martin
READ THE FUCKING ARTICLE (Score:3)
UPDATE: Story Pulled due to "Flagrant" Inaccuracy (Score:3)
Linux could indeed be the culprit (Score:3)
Linux, Solaris, or Windows is only secure if the system administrator constantly applies the latest security patches, and how many of you actually do that? The only way to prevent this sort of attack is being vigilant about security on all machines on your network.
Buy a clue (Score:3)
Any OS with an IP stack can be used for these attacks.
This guy is hyping a fear for the clueless so that these upper management people will rush out and buy his "software".
He's mixed up worms, viruses and DoS in one big muddled heap.
I would not even think about touching this protection software, if this is what they say it can fix.
Shoddy Reporting (Score:4)
And suggesting that Microsoft had a hand in these attacks is incredibly more irresponsible than this article saying that vulnerable Linux/Solaris systems were the host machines. If you've got proof, fine, post it. But don't say it because you didn't like the fact that someone pointed out that poorly managed Unix systems were the starting point for a massive web attack. Basically, the Unix community just got slapped in the face for being so complacent about the security of their systems. That's it.
I really thought Slashdot was above this sort of thing.
Micrsoft's Fault? (Score:4)
A) Packet Monkeys, Script Kiddies, Crackers
B) The Government, NSA, CIA, FBI
C) Microsoft
The FBI releases some tools to detect DOS Daemons, so what do we do? *Paranoia ON*
Some idiot reporter says that its the fault of Linux and that it could never happen with Windows, so what do we do? *Distrust of Microsoft ON*
So, it appears the whole thing has been orchestrated by the Microsoft-Jewish-Communist-American Government-Echelon-Media and it is the first step in a global stranglehold on free speech where Bill Gates reigns supreme.
Re:Not FUD, just plain LIE!!! (Score:4)
All it would take would be to take advantage of any of the numerous holes that have allowed people to run arbitrary code on a windows box. Sure, many of these have been fixed, but I know the Windows user community. Lots of those machines are run by people with no clue.
Hell, my own machine would almost certainly succumb. I'm tempted to try. Good thing it is behind a firewall.
Were I to actually do this, I'd throw up some website somewhere, with an invasive ActiveX control, and throw some porn on it. I'm sure I'd attract enough suckers run a DDoS attack. And once that code is one their machine, the rest is trivial. Basic sockets programming. The "hard" part would be doing it in such a way as not to get caught, but I am pretty sure even that would only require a few days work and access to a public machine.
Re:Shoddy Reporting (Score:5)
All a Windows version would need is "ActiveX" + "IP Stack" + "Thousands of cable modem and DSL systems managed by unknowledgable users".