
FBI: Massive MS Exploits Over Last Year 290
Wanker writes "An Eastern European hacker group has spent the last year systematically exploiting known bugs in IIS to steal customer and credit card info. Read about it at the
SANS security site."
Says SANS, "The FBI and Secret Service are taking the unprecedented step of releasing detailed forensic information from ongoing investigations" of the IIS, MS SQL Server and Windows NT breakins. We don't normally post news about exploits, but the scale here is massive: more than a million credit cards have been taken in a blackmail-extortion operation that has been going on for a year. Speculation is welcome as to why NT sysadmins don't install service packs for known vulnerabilities...
Update: 03/09 03:37 AM GMT by J : Microsoft says,
Don't Be A Victim!.
If you are an NT admin or know someone who is, note especially:
"Within a day or two, the Center for Internet Security will release a small tool that you can use to check your systems for the vulnerabilities and also to look for files the FBI has found present on many compromised systems...
"The Center's tools are normally available only to members, but because of the importance of this problem, the Center agreed to make the new tool, built for the Center by Steve Gibson of Gibson Research) available to all who need it."
Re:Sounds pretty easy: (Score:2)
Instead of a S-kiddie, you'll be an MS-kiddie!
--
Re:No choice. (Score:3)
Why not use a proxy to trap this? It's tempting to do a Junkbuster patch - just needs a separate lookup on www.netcraft.com (hopefully cacheable). Of course, non-IIS servers can have holes too, so it would be useful to generalise this to look up against server-auditing services (if there are any that can be trusted).
Re:Why dont the service packs get installed? (Score:2)
by the way, those words are spelled "corporate" and "corporation".  too bad they can't afford literate help...
Re:Why dont the service packs get installed? (Score:5)
Service pack 6 also broke the Lotus notes (I think, or was it Domino?) servers, until came the 6a service pack..
I guess thats life with MS patches. Test on lab before put on the production servers...
shouldn't even bother...OK I'll bite (Score:2)
Very True. This guy shouldn't have been modded "Troll". If moderatore/slashdot/posters/etc... can't say anything nice, we are talking to ourselves. Let the FBI be the bad guys here. Use quotes from what the Story had to say for the negitive and concentrate on the positive.
"Speculation is welcome as to why NT sysadmins don't install service packs for known vulnerabilities..."
"I've worked with many companies, both Windows based and UNIX based, and in my experience there's plenty of clueless sysadmins to go around."
That is totally true, for some ass kissing is enough.
"In fact, while I have no numbers to back it up, my experience suggests NT sysadmins are MORE likely to be running patched systems than UNIX sysadmins... Not because they are more clueful, but because its easier to install one monolithic service pack than hundreds of seperate patches to deal with specific security problems as is the norm on the UNIX side of things."
For the preceding statment...
Solaris==true
FreeBSD==wrong question
Red Hat (based)Linux==true
Debain Linux==false
If you don't know Debian let me teach you...
apt-get update [return](sync up database)
apt-get upgrade [return] (update all updated packages)
Thats it, all updated up to the minute. Even if someone is waiting just for your box they may never get in!
"I'm not saying the NT 'way' is better -- you certainly generally have to wait longer for a fix to a known problem on that end, but to suggest that sysadmins who use NT are someone less clueful or responsible just because they are running NT is just, well, fucking stupid."
"less clueful"---->probably, I honestly think most people here are tring to help you discover what we have discovered about computers and the good side of the source.
"(less) responsible"---->If anybody tells you that they just a jerk. They are "fucking stupid" They don't speak for everyone though. :)
Re:Why dont the service packs get installed? (Score:3)
But so what? Your DB shouldn't be accessible to outsiders anyway. It should be "hidden" somewhere unreachable, preferably in nonroutable space (RFC1918). Your applications need to reach it. Outsiders don't.
Of course, using UNIX is no magic solution. I know of a company that deals (if they still exist) with *money* in their DB. The child DBA installed Sybase on a public IP and left the password blank. That he did this on a Solaris box didn't make a difference; it was still stupid.
Needless to say, they didn't bother with a firewall.
Back to your message: hardcoding *any* password is an invitation to problems. I know of a different company that had a password hardcoded throughout their software. This was a password which provided login access to the web servers (among other things). Of course, an ex-employee of reduced morals exploited this and gave them a nice "rm -rf
It wasn't the root password, so it didn't kill everything. But it took out all of their application software.
They'd have changed the password more often, but "it was too hard" to do so because it was encoded all over the place.
We won't even discuss the wisdom of how this company organized their file ownerships and access rights.
So the blank password is really a red herring. Access to the DB from outside is wrong. Hardcoding any password is wrong.
And these are wrongs that can be committed on any OS.
Re:Windows Update (Score:2)
--
Re:Why dont the service packs get installed? (Score:2)
I later quit that job. After that, no patches
were applied to that box, which was the company mail server.
I later heard, from a friend of a friend who still works there that the box was hacked.
When you put your credit card number into a web site, how do you know if they have a full staff
to maintain the boxes and network where your
credit card is stored?
At my current place of employment, an NT/IIS based web site was recently defaced. So they ran down
the list of measures required to close the holes
and sent them to the list of sysadmins for all the boxes outside the firewall.
Not all the measures where service packs. Some involved disabling RDO. Luckily, there were
no credit card numbers involved.
Kernel versions and service packs are not enough.
To greatly reduce the chance of being hacked, you have to have
good people given enough time to keep checking the
security alerts and changing the box configurations (both Linux and NT) to keep all
the known security holes shut.
Patches (Score:4)
=-=-=-=-=
Re:What notification do cardholders get (Score:2)
Your wallet is stolen and you can report to police, your credit card and personal data is stolen and you don't even know, even if the ones that were keeping the info knew that it was stolen.
All this is very flawed.
MY data belongs to me, I claim the right to have it myself and just me, I don't want to be stored anywhere.
If I show you my car you don't assume it is yours know, why the heck should retailerwhatever.com feel the right to keep my data in a database just because I showed them for the purpose of buying once in a lifetime? Don't store my data anywhere and if someone breaks in your computers, I don't give a damn thing them, it is your problem. But no... it has to be the other way, store my data, a criminal breaks in, takes it, I am stolen, you never tell me and now it is YOU that don't give a damn, after all it is me that has been stolen.
Sorry for the rant.
Comment removed (Score:5)
Re:Goes to Show You... (Score:2)
Re:Why I dislike NT service packs... (Score:2)
I admin at a research lab, and the GSR's (graduate student researchers) are always asking me "Can you install Matlab6"? To which I reply, "Whats wrong with matlab 5.1?" ... "Well, the EE department has matlab 6..." "We will to, as soon as you can tell me why we need it."
Granted, In this case the windows patches were definatley not-optional, but I understand the mind frame that wouldn't wanna install them.
Re:Windows Update (Score:4)
First, Microsoft does not adequately test its service packs. There was a very embarassing series of "service packs required to fix prior service pack" with NT4. I think it ran from SP4 through SP7. If installing a service pack may take down your system, only an idiot will allow it to be done automatically or "casually."
Second, Microsoft is notorious for doing more than simple bug fixes in its service packs. Sometimes that functionality is useful, more often it breaks installed third-party applications. Again, only an idiot will allow it to be done automatically or "casually."
In many ways, this "feature" reminds me of the joke about the helicopter pilot lost in the fog over the Microsoft campus. This feature might look helpful to the casual observer, but it ignores the real problems.
Re:Stealing credit card numbers... (Score:2)
Re:makes you wonder... (Score:2)
Re:I shouldn't even bother... (Score:2)
Well, first off, I said NT, not 2000. However, let's go with your response and take it as given that 2K is NT 5.0.
I can do this with Solaris workstations, even PC-hardware Solaris workstations. I can do it with the free Solaris downloadable off the net.
I can do it without buying anything extra.
I can do it from anywhere in the world that has a telnet client available, or for that matter just a web browser since I can use a Java telnet client.
And, more importantly, I can set it up on Friday afternoon, and have it happen automatically on Sunday morning. Reliably. Setup takes minutes.
-
Re:No choice. (Score:2)
Why? Junkbuster can look at the "Server" response-header all by itself. It doesn't need netcraft for this.
Re:Why dont the service packs get installed? (Score:2)
--
Re:Why dont the service packs get installed? (Score:2)
--
Re:I shouldn't even bother... (Score:2)
NT4 Service Pack 6a. Thanks for bringing this up. Try grabbing an older NT4 CD with Service Pack 1 and installing 6a on it. I've done this several times... I refused to believe fellow NT admins that upgrading from SP1 to 6a was a bad idea. That is until the systems I installed blew up and died once I configured IIS and JRun, and theirs didn't. Make sure you install 3 or 4 before installing 6a or the system will be VERY unreliable. One of the boxes I did this way bluescreened and never booted again.
I can't wait to tell the sysadmins about your last point: "same amount of time." Both the UNIX and NT guys will find that hilarious.
---
Re:I shouldn't even bother... (Score:2)
Well, most commercial *nixes do have "huge monolithic service packs". I've just finished setting up ten Solaris 2.7 servers, and all I had to do was run the Maintenance Update, then the latest Recommended package zip from Sun. Basically, two service packs.
You've just been looking at the Linuxes, where this level support is not there yet (although Debian and apt-get are getting there.)
Of course, if you routinely install GNU or open source software, you'd have to maintain that yourself, but any competent admin can roll their own update tarballs.
Admins aren't stupid because they use NT. It's just that stupid admins prefer NT. I've met some really competent NT admins, although for some reason they almost always look like they could use a lot more sleep.
Re:Goes to Show You... (Score:2)
Story of Incompetence (Score:2)
He didn't get the job, but a "trained monkey" did -- the guy converted the entire colleges WinNT domain setup into various workgroup shares because he didn't know how to admin NT.
Re:I shouldn't even bother... (Score:2)
www.ssh.com. Remote administration for NT. Please research your information before speaking out of your ass.
> The fact is, NT service packs are a horrible mess and hassle. You have to remove the pack and reinstall it frequently, and if the pack is fixing support for hardware you NEED to access the system, you've got a serious issue on your hands.
Really? That's news to me. I'm using NT4 with Service Pack 6a without a hitch. Perhaps it's just you.
> Oh; using wget and ssh, I can automate this process for hundreds of machines in minutes. How long does that take to set up in NT, again?
Same amount of time.
Re:Windows Update (Score:2)
My idea, Microsft releases a OSPS (Operating System Patch Server), sort of like Norton and Anit-Virus updates but for Microsoft products. That way you would only have to patch the OSPS machine manually!
Re:What notification do cardholders get (Score:2)
Re:NSA says kill ratio was from COMINT Ops (Score:2)
Re:Allow me to forestall the anti-Linux crowd... (Score:2)
Good call on this though. `8r)
--
Gonzo Granzeau
Re:Helpful Util (Score:2)
I'm not sure why this was rated offtopic. Troll, maybe
Hopefully, maybe the tool they're releasing can't even diagnose the flaws of NT directly. Maybe you have to run it directly on the NT box you're looking at. I hope that's how it works, because otherwise hackers will have a field day with it remotely scrutinizing people's boxes.....
http://www.bootyproject.org [bootyproject.org]
Re:Patches (Score:2)
Try upgrading DNS, WINS, IIS, and KERNEL32.DLL on a Windows machine (even the oh-so-holy W2K) without a reboot. Can't be done. Reboots mean more downtime; and downtime is bad -- so these things don't get done often. Not to mention the fact that the requirements for becoming a "NT SysAdmin" are not exactly that strict -- so the _average_ level of competence is going to be higher for Unix admins then NT admins (you need to know what you are doing to get into a Unix shop).
Note that I'm not saying _all_ NT admins are dolts. Just a large number of them. ;)
--
Re:Stealing credit card numbers... (Score:2)
For example...
Use a message queue service like MSMQ or MQSeries to setup a one way communication gateway between the web host and the internal order processing server.
I don't know, just seems dumb to have customer data available on the web host or on a machine directly accessible from the web host.
Re: "Patches? We don't neeed no steekeen patches!" (Score:5)
Um, this is on the server, where Microsoft dosen't have a monopoly, not even a plurality. According to netcraft [netcraft.com], that title belongs to Apache [apache.org].
So what's microsoft's problem?
There are a number of them, as I see it:
Bruce Schneier once called security a "process, not a product". Microsoft has tried to pretend that they are selling a product. That you go to the store, buy Microsoft Foo 2000, pull the disks out of the shrink wrap, and use it like you'd use a television or a vacume cleaner. An Operating System is too complex of a beast for that to be the case, and no amount of Wizards or flying folders is going to change that simple fact.
Re:Why dont the service packs get installed? (Score:2)
On our PDC, we had our vendor come in to apply SP3 after it had been out for a couple months. It took 5-6 hourse, and a couple dozen reboots, since explorer would hang immdiately after login. All that could be done was reboot, again, and again, and again, until finally it came up.
SMS 2.0 gave me fits last year, as it claimed it required "NT4 SP4 or later, IE 4 or later." Well, I installed SP6a and IE 5.0 SP1, and the little fucker just wouldn't run. Turns out that the MS "Cumulative Service Packs that contain all updates from previous packs," DON'T contain the MDAC or Y2K updates included w/SP4. Bastards.
--
Re: "Patches? We don't neeed no steekeen patches!" (Score:4)
It's also that unix systems tend towards programs which each do a single task. With NT being more huge programs doing multiple tasks. The same idea applies to patches vs "service packs".
Thus it's probably easier for someone to work out what a un*x box is actually doing than an NT box in the first place.
Re: "Patches? We don't neeed no steekeen patches!" (Score:2)
It may or may not create security problems, what it does do however is make expolits far more serious.
A software monoculture carries many of the same risks as an agricultural monoculture.
Even more so if all the distributions are binaries. Since the likes of buffer overflows depend on what's in the binary.
Re:Why dont the service packs get installed? (Score:2)
This is what always gets me about Windows NT. It is absolutely insane the crazy dancing-in-the-moonlight, chickenbones-waving stuff that you have to do to get it to work. Every update requires a reboot, or three. And half of the fixes break more things than they fix.
The fact of the matter is that Windows is much harder to keep up to date than even the cruftiest of *nix boxes (well, maybe not the cruftiest).
What notification do cardholders get (Score:2)
Re: "Patches? We don't neeed no steekeen patches!" (Score:2)
Whereas with unix type systems the admin is assumed to know what they are doing.
Cruising for a bruising (Score:2)
--
Re:Speculation (Score:2)
neither does rpmfind --latest, it seems.
--
Re: "Patches? We don't neeed no steekeen patches!" (Score:2)
It's a combination of both. As Linux gains popularity and takes on more novice users, exploits of Apache have skyrocketed, almost to the point where Linux/Apache is as 'sploit-prone as NT/IIS. This has less to do with the inherent security of the OS than with the practises of the people who deploy them. I suspect you'd see the exact same situation happening if OpenBSD were gaining popularity the same way that Linux has recently.
ObJectBridge [sourceforge.net] (GPL'd Java ODMG) needs volunteers.
Goes to Show You... (Score:5)
I'd like to start seeing some liability lawsuits against companies whose admins apparently can't be bothered to keep up with the current security updates. Either the admins can't be bothered because they don't know their ass ends from their elbows or they are so overloaded that something slips by them. In either case, the company is at fault.
Re:No choice. (Score:2)
Because it needs to be simple for the idiots.
I shouldn't even bother... (Score:3)
Speculation is welcome as to why NT sysadmins don't install service packs for known vulnerabilities...
I'm a programmer. I've worked with many companies, both Windows based and UNIX based, and in my experience there's plenty of clueless sysadmins to go around. In fact, while I have no numbers to back it up, my experience suggests NT sysadmins are MORE likely to be running patched systems than UNIX sysadmins... Not because they are more clueful, but because its easier to install one monolithic service pack than hundreds of seperate patches to deal with specific security problems as is the norm on the UNIX side of things. I'm not saying the NT 'way' is better -- you certainly generally have to wait longer for a fix to a known problem on that end, but to suggest that sysadmins who use NT are someone less clueful or responsible just because they are running NT is just, well, fucking stupid.
Like linux users are any better at it. (Score:2)
Right. So the thousands of unpatched RedHat systems that the ramen worm (not to mention billions of script kiddies) has been exploiting are being run by, what...NT Sysadmins?
People who live in glass houses should exercise care when beating their heads against the walls.
Re: (Score:2)
Re: (Score:2)
Helpful Util (Score:2)
Cool! I'll have to use this utility to select the next web sites I'll crack. I used to have to run tons of different 1337 scripts to accomplih that same goal, but now it looks like I can do it all with one app.
http://www.bootyproject.org [bootyproject.org]
This would be cool in Mozilla (Score:3)
--------------------------------------
Why I dislike NT service packs... (Score:2)
I do software development on Windows NT at work. One of the programs I work on started development on a Windows NT 4 SP3 system. Had everything working just fine, including this little (okay, slightly flakey) graphics package. Got switched to working on something else, and during this "upgraded" the system to service pack 5.
A couple months later, I switched back to the program. Hadn't made a single change to the program. Guess what, this little graphics package was suddenly giving me memory access errors. No changes except that service pack.
Service packs are dangerous. If you have a system that you think is "working just fine" I can *easily* understand not wanting to apply a service pack. You don't know when a service pack is going to break something, or, even worse, fix something that your program depended on being broken.
I'm not saying not to apply security hotfixes... but bear in mind you may be introducing problems, as well as correcting problems.
Why dont the service packs get installed? (Score:5)
(NOTE: I work for one of the largest corperations on the planet. we aint no rinky-dink operation)
How about the fact that SP5 basically broke every NT server on the planet, so we are afraid to apply patches from MS....
It's MS, you live with the flaws.
Why admins dont install patches? (Score:5)
Secondly NT service packs do have a reputation of breaking stuff more then fixing them. This is partialy just 'FUD', but it has happend @ my company a few times that a sys admin (yes one of those of the clueless types) installed a service pack on the main NT server, it broke NT, exchange and the MsSQL server, and the network was escentialy down for 2 days
Just my 2 cnts
-- Chris Chabot
"I dont suffer from insanity, i enjoy every minute of it!"
Re:Patches (Score:2)
-------
CAIMLAS
Re:Windows Update (Score:3)
The cracks were done on Windows NT, not Windows 2000.
Allow me to forestall the anti-Linux crowd... (Score:5)
Pro-Linux Wacko: "This just proves that MS sucks! Their software sucks and causes problems to no end! Microsoft should go to Hell and DIE! And Bill Gates too! Free Software is the One True Way! All hail Richard M. Stallman!"
Moderate Reasonable Guy: "Okay, okay, settle down children--*BLAM BLAM* (shot by Anti-Linux and Pro-Linux Wackos)
Okay, we've gotten that out of the way. Maybe now we can have a reasonable conversation instead of the usual prattle.
Re: "Patches? We don't neeed no steekeen patches!" (Score:2)
For example, I can put security.debian.org in my /etc/apt/sources.list, and set cron to run apt-get upgrade nightly. This will automagically install any security patches with no user intervention.
I hope you only do that for your desktop machine, and not any production servers.
An example for why this is a bad idea: I tried upgrading Zope today in response to a security alert for Debian. I install the package as normal, however, when I try to access the web server, it asks for a password, and doesn't accept any valid ones. This is for the front page!
If that had happened during the night, our server would have been unavailable for hours. As it is, I just re-installed the old version, so our downtime was limited to just a few minutes.
I usually try to test out upgrades first, but since the last Zope upgrade went very smoothly, I started to get cocky (and thereby less careful).
Re:Patches (Score:2)
MS makes admins wait to install monolithic Service packs which not onyl fix my bug, but add funcationaltiy and fix other bugs too. In the process of doing so, they break systems. I don;t know about the 2K certification, but the NT4 MCSE classes told us to never install a service pack unless you needed something fixed and were sure it wouldn't melt the server.
Re:shouldn't even bother...OK I'll bite (Score:2)
False. Shell script. Cron. Up2date. Nuff said.
Re:Like linux users are any better at it. (Score:2)
Okay [hwa-security.net].
Re: "Patches? We don't neeed no steekeen patches!" (Score:2)
Re:makes you wonder... (Score:2)
--
Re:Goes to Show You... (Score:2)
(IA of course NAL and if you go to Slashdot for legal advice then you are insane.)
Now, here are some practical hurdles that need to be overcome. Say I use my credit card at a web site, and then some strange debits appear on my statement. How do I prove that the web site was cracked? If the web site was cracked, how do I prove that the strange debits were due to the crack, and not to dishonest wait staff at the restaurant where I used the card the week before?
The expense of proving liability probably exceeds recoverable damages for any one person, especially when the crackers are overseas. This could be overcome through class action lawsuits and punitive damages.
--
Ooh, moderator points! Five more idjits go to Minus One Hell!
Delenda est Windoze
Speculation (Score:5)
Because apt-get update;apt-get upgrade doesn't seem to work on my NT boxen...
Re:Windows Update (Score:3)
This isn't as trivial a decision as it may sound. A system which, in theory, can interrupt the user every five minutes to deliver a security patch, is gonna get disabled. Excessively onerous "warnings" are almost as much a problem in software design as the absence of warning signs.
For a shocking example, I refer you to "An Investigation of the Therac-25 Accidents." [vt.edu] Basically, an X-ray device malfunctioned and killed a whole bunch of people in part because it popped up warning messages as a matter of course. The operators got so desensitized to them that they lost their effectiveness, and people got hurt as a result.
The moral of the story: it's important to warn the user when he's doing something dangerous. It's as important to leave him alone and let him get some work done the rest of the time.
-----
"You owe me a case of beer. Sucka'."
Re:Why I dislike NT service packs... (Score:2)
Better to find out while developing it rather than when the program is out in the field.
One major reason holes aren't fixed: cost (Score:2)
I work with some world-class NT engineers and they know their shit. While I give them a hard time for not using a real OS, I have to admit that they've proven to me that it's the quality of the syadmins, not the quality of the OS, that really matters. (I still think windows sucks, but I admit you can make it suck less)
However, even God's Gift to NT can't change the fact that in order to do certain things in windows (service packs in particular) you have to jump through so many hoops, and the multitude of reboots (and hence downtime) from those hoops, that many companies can't or won't afford the downtime. With *nix and most other OS's you aren't nearly so screwed and can address the vast majority of updates/fixes etc without incurring any downtime.
And that is one of the main reasons these known holes in the Windows world are so common and exploited. Not to mention that it has the added bonus of reinforcing the perception that NT Admin==Clueless Monkey which we all love to laugh about. :)
Re:Why dont the service packs get installed? (Score:2)
Exactly, Unix admins like to think that they are more on the ball, but the fact of the matter is that they simply have superior tools. In some cases vastly superior tools. Adding the security updates to Debian's apt system makes staying current so incredibly easy that a child could do it. And even crufty old tar balls are better than Microsoft's service pack dance. At least that way you can update only the software that you need to update.
And that's the other part of the problem with Microsoft's Service Packs. Instead of simply fixing the problems that you have and being done with it Microsoft insists on foisting new software updates on their users as well. Nearly every service pack has had some added functionality. This functionality generally wasn't overly helpful either. Many times it served as nothing more than a way for Microsoft to force sysadmins to install software that was important to Microsoft's long term strategy. Why, for example, do I need a web browser on my database server?
Fortunately there is a cure for this madness, and that is to simply avoid Microsoft software where possible. This is emminently practical when it comes to systems that actually face the Internet. Heck, at the very least you could shield your NT servers behind an OpenBSD box with port 80 forwarded to your Windows box. That way if you really felt like you need to use Windows development tools you could shield your vulnerable Windows machines with something specifically designed to thwart attacks.
Re:OT: Fighter planes (Score:2)
Re:Like linux users are any better at it. (Score:2)
--
Re:Goes to Show You... (Score:2)
As I've said for years, a compitent admin for NT costs just as much as a compitent admin for Unix (which 5 years ago was $70k if the binifits were good) NT is easier to setup once you know what to setup. However the difficult part of admining a system is not the setup, but knowing how to do it right. Setting up even the most obscure undocumented mess of an OS is easy compared to the job of knowing the right way to set it up.
NT gives you the ability to fool yourself into thinking that is works so it much be right. You can do the same with any OS, but unix is difficult enough that your research on how to do it will generaly lead you to at least one how to do it right document which gives up a chance. (But of course you can still screw up unix)
Re:One major reason holes aren't fixed: cost (Score:2)
Unfortunately the single most responsible party for advancing this perception is microsoft themselves. Every time somebody at microsoft talks about Linux they mention how you don't need engineers or highly trained sysadmins which cost money to use windows. You reap what you sow I guess.
Re:I shouldn't even bother... (Score:2)
Re: "Patches? We don't neeed no steekeen patches!" (Score:2)
Service Patches aren't time machines... (Score:2)
With such a wide-sweeping operation as the one detailed in this article, who's to say that the security hole to be addressed by next months' hotfix isn't being exploited right now?
Trained hotfix monkey or 6-digit sysadmin, your IIS system is still vulnerable today to the bugs that go public tomorrow.
Which isn't to say that IIS is alone in this vulnerability, but it's silly to assume that keeping up to date with security patches and revs, be it Windows, Linux, Irix, or whatever, is a panacea to security break-ins. Your e-commerce architecture should be such that the credit cards are never on the same machine as your public server, and that the public server only has the ability to send CC info to the CC database, and never the other way.
Kevin Fox
--
Re:I shouldn't even bother... (Score:2)
Wow you have shot down every argument MS ever made against linux"
Unicenter TNG is not included in the cost of windows so windows is not cheaper then other server operating systems (as a bonus you get to deal with CA what fun!).
Wise is also not included with NT add that to the cost too (might as well add pc-anywhere too).
Windows does not offer a lower TCO because every package must be carefully scrutinized and an install script must be made using wise. This process requires a clued in sysadmin. These sysadmins don't cost less then unix sysadmins.
Your sysadmins must also be able to program in VBscript, jscript, perl or something in order to write complex login scripts once again precluding a cheap easy to find sysadmin.
Sounds pretty easy: (Score:2)
2)Find sites that haven't patched the hole yet.
3)Crack the site using information provided by Ms in step 1.
4)Repeat.
It pretty amazing to me that commerce sites don't patch security holes as soon as fixes become available.
Re:Windows Update (Score:4)
yeah, and any patch from MS is not going to present stability issues, and of course it will be compatible with all the existing software on the machine.
The worst thing about a lot of sites is the lack of a way to either back out an "upgrade" if it trashes stuff, or a duplicate machine to test that on. I spent a happy 36 hours once trying to undo an "urgent security patch" to MS_SQL Server that made the thing secure all right, the fscking thing wouldn't run at all it was so secure. Never let PHB have root, it just blows your availability out the window(tm)
Re:I shouldn't even bother... (Score:3)
So monelithic service packages can be good (easy to use) but also quite bad in practise..
The new windows 2000 'windows update' is a good step though (same functionality as Redhat's up2date basicly). It seems to be a good middle-of-the-road style solution that pleases most people.
-- Chris Chabot
"I dont suffer from insanity, i enjoy every minute of it!"
Re: "Patches? We don't neeed no steekeen patches!" (Score:2)
Not that our Un*x boxen are inherently any better. We just seem to "care" more about knowing what our servers are actually doing. NT Admins are usually too busy doing everything from installing Service Pack n and cleaning the CEO's mouse to keep on top of what they were expected to be doing in the first place. Or perhaps its also a "s/he who lives by the Install Wizard dies by the Wizard" situation. It's too easy to do a "lazy install" on a Winserver.
I feel sorry for 'em, and hope this scare finally wakes up some of the CEO's who believe their IT shops will run by themselves because Bill Gates' marketeers told them a Windows server is just as service-free as their PC is. So they have one poor soul doing 5 peoples' IT jobs. *sigh*
Re:Patches (Score:2)
It's the sysad, not the OS (Score:5)
Sysads are responsible (or should be) for the security of their systems. But all sysads aren't created equal. I'm reminded of this statistic:
In spite of the fact that the American F-86 Sabre and the Russian MiG-15 were roughly comparable aircraft, during the Korean War, the Sabres racked up a 10 to 1 kill ratio.
Why? Because the American pilots were better trained and more aggressive than their North Korean and Chinese opponents.
Perhaps because they pretty much have to learn more about how their systems work, Linux admins are in effect better trained, and a bit more aggressive about security than most NT admins.
Re: "Patches? We don't neeed no steekeen patches!" (Score:2)
Re:Windows Update (Score:2)
You get what you pay for. (Score:2)
It all comes down to, you get what you pay for in a SysAdmin. Many admins don't know you need to apply these fixes. I've worked for several companies that limited the service packs and fixes that could be applied. When all they allow is Service Pack 3, they get what they deserve.
So...don't blame Microsoft. Blame the companies that don't hire the right people and the clueless admins that don't do their job. We all get busy, but it's time to stop making excuses when you're behind 2 service packs.
Re:I shouldn't even bother... (Score:4)
You don't know what you're talking about. I suspect that it's because your main UNIX experience is probably dealing with Linux systems.
Installing the latest patches for a few dozen Solaris vulnerabilities looks like this:
./install_cluster
Followed by hitting "y" once.
And if we want to add a piece of hardware or change an IP address, we don't have to remove the patches first, make the change, reboot twice, and then reinstall the patches.
I can use ssh to do that simultaneously on several hundred systems. Can you say the same with NT?
I can install the patches while the OS is active, leave the machines sitting running stably for a week until I get a downtime window, then reboot them for the one or two patches that require that. Can you say the same with NT?
The fact is, NT service packs are a horrible mess and hassle. You have to remove the pack and reinstall it frequently, and if the pack is fixing support for hardware you NEED to access the system, you've got a serious issue on your hands.
Oh; using wget and ssh, I can automate this process for hundreds of machines in minutes. How long does that take to set up in NT, again?
-
Re:Patches (Score:2)
So, exactly how many security holes have been found in the Linux kernel is probably only known by Alan Cox and Linus.
--
Re: "Patches? We don't neeed no steekeen patches!" (Score:2)
Re:Patches (Score:2)
Re:One major reason holes aren't fixed: cost (Score:2)
Re:Allow me to forestall the anti-Linux crowd... (Score:2)
If only Plan9 had a web browser... and you didn't have to use the damn mouse so much.
The Bible is not my book, and Christianity is not my religion.
Re:Like linux users are any better at it. (Score:2)
Re:I shouldn't even bother... (Score:2)
Same amount of time.
Yeah, right; you can sit down at NT, and using freely-available tools, set off the process of downloading and installing a Service Pack on hundreds of machines. With nearly zero impact to production jobs in effect on those machines, up until you're ready for the reboot.
Whatever you're smoking, you must have bought it from Microsoft's marketting department, not their engineers.
On Solaris I do this with a shell script, one I can bang out on the command line from memory in 30 seconds. And I can run that shell script from a Linux, HP/UX, AIX, etc. system if I desire, although in practice I'd do it from another Solaris system to minimize confusion.
Hell, it's quicker for me to do this FROM an NT box than it is TO NT boxes.
-
No choice. (Score:5)
NT service packs are a huge pain in the ass. Installing one can break apps (SP 6 and Lotus notes, anyone?), create new security holes, make a (Relatively.) stable system unstable, and more. Often it can be impossible to get approval from management to upgrade like this with no testing. Getting the testing done is a pain because developers are usually more concerned with testing their latest code than worrying about service packs. Sometimes there is just no money for the testing, especially in dotcoms.
What we really need is browsers to come with a warning before anyone submits a sixteen digit number to a form on a server running IIS, warning them how dangerous it is to provide a CC number to a site running a Microsoft product.
Re:Why admins dont install patches? (Score:3)
Anyways, those are all valid points, and is kinda what i ment to say. Most people thing adminning a NT box is simple, since its point and clickey.
Also MS advertising tells them to use NT, since its so much easier to administer and use.
That however does also seem to cause a lot of the NT problems out there. Sure there are some flaws in the design changes made in NT (i still like 3.5 best for stability, 4 is ok, 2k
Take the design choices made by NT, add some Ms marketing stating that you -dont- need a 6 figure sys admin to controll the boxes, and mix that up with some broken service packs, and you've got a great recipie for missery
-- Chris Chabot
"I dont suffer from insanity, i enjoy every minute of it!"
In a related story... (Score:3)
Anyone who is serious about 24X7, secure operation of thier network will have a lab set up to test later versions of OSes & apps, as well as any security and update patches for the above.
I'll use this as a cluestick to beat the money out of the ones with the purse strings to get a test lab going, now!
Re: "Patches? We don't neeed no steekeen patches!" (Score:3)
ie: One world, One Operating System, One exploit.
Re:What notification do cardholders get answer is (Score:4)
What they should do is notify their CC clearing house which will notify VISA, Mastercard, American Express
Ever get that phone call at 7 pm at your home asking "you have done xyz amount of purchases and were confirming that because of different activity it's you" Happen twice this year (2001) so far and had all my cards switched (yes they do it for free).
Offtopic : Protecting yourself
1) only use 1 or 2 cards that are strictly for on line purchasing.
2) give the CC companies the only approved delivery address home and office ( they will thank you for it )
3) when you think you are scammed, file the claim fast and then cancel the card and have them issue a new one.
4) if you on-line bank, do it only from your home and not your office. There are sysadmins that have keyloggers and other snooping devices.
5) this is important Each $ 1000 of credit = about 200 real cash (fense value) to a thief so keep your credit purchase per transaction limit to 300. this way the CC has to veryify the purchase to the 2 known addresses and phone #'s
I hope this helps
ONEPOINT
spambait e-mail
my web site artistcorner.tv hip-hop news
please help me make it better
Comment removed (Score:3)
*ahem* (Score:4)
*cough* [trustcommerce.com]
(I'd say that your gateway being secure is as important, if not more so, that your storefront itself.)