Microsoft: Trust and Antitrust 539
Microsoft is in the news for two reasons today: the continuing saga of the antitrust cases, and Microsoft's public relations push for "trustworthy computing". A selection of links: Microsoft claims two months of code reviews and half-day seminars surpasses everything ever done by the open source community; Salon talks about the problems with a monoculture; SBC, an abusive telecom monopoly, complains about Microsoft's behavior, an abusive OS monopoly; and Microsoft responds, claiming that SBC is merely being self-serving.
Life after Microsoft (Score:3, Funny)
Two months? Get real. (Score:2, Insightful)
There's still a lot more manpower in OSS. It's just more fractious.
Re:Two months? Get real. (Score:2, Funny)
Steven B. Lipner, Microsoft's director of security assurance, responded, saying: "I'd be astonished if the open-source community has in total done as many man-years of computer security code reviews as we have done in the last two months."
Mythical Man Month (Score:5, Insightful)
I look at all the man months that have gone into the development of Windows, etc. and I look at the results. The sheer amount of time put in is no assurance of the quality of the results.
In fact, if I recall right, the sauthor of the book "the Mythical Man-Month" came to the conclusion that the more people you throw at a software project, the slower the project goes.
So the question is how of the work at MS falls into that category
Re:Mythical Man Month (Score:2)
"primary development does not scale, debugging does."
Which of course applies to the open source movement. As briefly discussed on this page [michaelmoser.org].
side note:
Note that while manager of the 360 project it was Dr. Brooks who specified that a byte would consist of 8 bits. Whether or not you agree with his decision, it's hard to argue that this has not had a huge impact on the computer field.
Which is interesting trivia by itself.
MS security man-hours (Score:2)
Re:Two months? Get real. (Score:3, Interesting)
Personally, I think both sides have code review procedures which are legitimate. MS is bragging because the open source community can't match what it did within its own procedure. It would be like waterfall method people bragging that they got a product out the door in fewer milestones than an extreme team did. An answer to this is, "Ok, good for you but saying you are better than me is a non-sequitor."
Re:Two months? Get real. (Score:3, Insightful)
Re:Two months? Get real. (Score:5, Insightful)
OpenBSD defaults to several YEARS of code reviewing. Years between any security hole in the latest release. (Or more, does the openSSH hole count?)
FreeBSD has trusted BSD which has similear aims, plus some code that would be really nice to have.
Sardonix [sardonix.org] is trying to start a general project to do code reviews. Not really running yet, but good goals, I hope they work out.
Just a quick search of open source sites and code review reveals that most projects think highly of code reviews and encourage them.
And finially, the typical way to get into open source is to do start reading code, and then contribute when you can do something. One of the things you can do is find potential holes
None of the above is perfect. All are useful, and all go on all the time. Maybe Microsoft put in more work into theirs, but I remember openBSD which was just a better netBSD, and not secure. By fixing problems they got secrure. I've been a programer long enough to know that each fix has implications elsewhere. Microsoft might have solved a lot of problems, but my expirence is the first two months introduce more problems than they fix, it is only after fixing those new problems that you begine to make progress, and it takes months to get them all closed.
Re:Two months? Get real. (Score:2, Informative)
I may be wrong on this, but I thought OpenBSD counts as Open Source, and they're certainly doing a security audit [openbsd.org] of the source code.
Re:Two months? Get real. (Score:5, Informative)
True, but in a very real way, Microsoft has a point. The Open Source community has never really taken time to say, "ok let's stop development and everyone will go check code extremely carefully."
No, False. You (and MicroSoft) are completly ignoring Open Source projects that only audit code... i.e. the Kernel Janitors: [kerneljanitors.org]
Re:Two months? Get real. (Score:3, Insightful)
Re:Feature Freeze (Score:3, Funny)
During even minor number releases you only fix bugs.
Except for when you replace the entire VM system.
Re:Two months? Get real. (Score:3, Insightful)
This is a really awful way of doing it. In order to get a good implemenation you need:
1) A solid design. That means no automatic execution of attachments.
2) Continuous review of the code. If the code sits for 3 years before it's reviewed, then you've exposed yourself to bugs in that time, and perhaps you've even accidentally built stuff which relies on that bug.
Re:Two months? Get real. (Score:2)
I think their claim may be true in a literal sense, but I wonder how effecitve their reviewing has actually been so far? I mean in a literal sense, a man-year of work could be 700 people working until noon too, it doesn't mean they're really getting anything done.Still, I'm really glad they're making the effort.
Re:Two months? Get real. (Score:2, Interesting)
There's still a lot more potential manpower in OSS. As has been proven in several big OSS projects, like Mozilla for one, just because there are tens of thousands of people who can work on a poject, it doesn't mean there will be tens of thousands of people who do work on a project.
resignation and postmortem. [jwz.org]
The truth is that, by virtue of the fact that the contributors to the Mozilla project included about a hundred full-time Netscape developers, and about thirty part-time outsiders, the project still belonged wholly to Netscape -- because only those who write the code truly control the project.
Brainwashed geeks? (Score:3, Interesting)
No comment needed.
Re:Brainwashed geeks? (Score:5, Insightful)
I was surprised by this quote too. The implication that developers at MS are some sort of automatons taht are easily brainwashed is amazing. I'm no fan of MS, its products or its tactics but the developers who work there are robots. I have found the MS people I have met to be pretty party-line company guys but they did have brains and were capable of independent thought.
The other problem with training like this is that without reinforcement from management it is not terrible useful. Sure some of the developers will "get religion" and will be absolutely scrupulous about writing secure code, but others will get lazy, forget the training or go back to old bad habits. Without code review and standards enforced by management in some way training is ineffective.
Re:Brainwashed geeks? (Score:2)
Yeah, exactly.
It's not enough to teach your programmers to write code that can't be exploited by buffer overflows.
You've got to back that up with management trainning, emphasizing security and documentation (a critical component of security) over features.
If you're sending your programmers to class for a day, you need to send your managers to classes for a week.
Silly debating tactics (Score:3, Insightful)
C'mon. He's making a good point about geeks -- you can use their love of learning new stuff and putting it to use makes it possible to change their collective direction quickly. It's a valid insight.
Microsoft has been able to exploit this better than any other large company. It's a matter of hiring the right people. They don't always get the right direction, but they can be moved rapidly when necessary. Remember Microsofts total lack of preparation for the Internet a couple of years ago? Now we're worrying about the possibility they may coopt it.
I would view a similar microsoft shift towards more trustworthy software development practices as an unmitigated good. You can't dominate the field of "trustworthy" software. It's just about producing higher quality software, which benefits both their customers and even people who aren't their customers (how many non-windows sites suffered collateral damage to Code Red).
The problem is the inevitable PR baloney that goes with it. Perhaps Microsoft sincerely wants to produce more trustworthy software; this is good. However they want their customers to trust their products right now, so they're trying to make them think that most of the problems have been fixed by a gargantuan effort. This is bad. You can't fix years of shoddy work with a couple of months of auditing. Fixing security problems is, I don't know, but I'd guess at least a ten times as hard as avoiding them in the first place.
A little humility would make people who know better feel a bit more comfortable that this is more than PR hype.
Re:Brainwashed geeks? (Score:3, Interesting)
We geeks tend to be facinated by "the newest thing", and rush to try it, and then preach it's merits to anyone who will listen. I know I'm generalizing, and there are people still happily running 2.0 kernels, but look at the general trend. We don't mind using version 0.0.7b6 of products that are cool without thinking twice about it.
Once we learn something new, we tend to make great use of it. And we seem to think of little else. That's probably what he was aiming for in that quote.
And remember, he's knocking his own geeks too.
Re:Brainwashed geeks? (Score:2)
Seriously, though, you have to be able to think for yourself and work things out, it's not about watching a lecture for 2 months and all of a sudden getting it.
Or are they trying to say they've figured out Artificial Intelligence now too?
Windows XP SP1 (Score:2, Interesting)
Re:Windows XP SP1 (Score:3, Interesting)
And why do I need IE and Media Player on a server that's only running a database?
Step #1 of security, remove and/or disable everything to don't need to get the job done.
MSFT has been ignoring that for years, but maybe they are finally starting to learn.
Re:Windows XP SP1 (Score:4, Insightful)
In response to you and cscx (below)...
crudeboy writes: (in regards to IE and Media Player) but... a more correct question might be: Why bother to remove it?
End user applications have no business existing on a dedicated server machine. As for why, see below:
cscx writes: Second of all, you don't install all the goodies in Windows 2000 server/advanced server. Why do you need IE? Well, it's handy as hell. You can locally install updates while at the box in the server room, run windows update, download hotfixes, etc. Plus, it's also useful for visiting tech documents / howtos to diagnose problems that the Novell and Linux servers in the same server room are having (yes, this has happened to me before ;P)
So you're going to be surfing random sites on a critical server machine... while logged in as Administrator?????
I'm glad you don't work for me. That would be grounds for a reprimand, at the very least.
Back in the old days, surfing the web ran no risk to the client machine. Nowdays there are all kinds of risks because of mobile code (ActiveX, Javascript, etc.) and exploitable client programs (increasingly complex web browsers). Do either of you guys remember how those worms were spreading last year? Sooner or later, someone's going to figure out yet another exploit for IE.
Yes, yes, you can limit the risks with security settings, but that is no longer proof against attacks.
crudeboy writes: If you really think that you probably shouldn't work with security at all... To say that things you do when implementing a software solution should be carried out first is just plain nonsense...
Well, if "limit your exposure" isn't supposed to be #1 on a security checklist, then it is #2 or #3.
Since you don't seem to understand the basics, then I suggest you read up on the subject before you start calling things "nonsense".
Re:Windows XP SP1 (Score:2, Informative)
Quote from the article: (Score:2, Flamebait)
Hah hah hah!! What an idiot.
Mr. Spey
Re:Quote from the article: (Score:5, Insightful)
Re:Quote from the article: (Score:3, Insightful)
No, big bugs require reviewing the architecture which the code implements. Bad design is the cause of big bugs, and you have to be willing to scrap the bad design and start over from -architecting- the code before even reimplementing it.
Is MS willing to do that?
I would agree with the statement (Score:2)
How often has the community found it necessary to do a complete security review of any package, years after the fact?
Re:Quote from the article: (Score:2, Insightful)
Perhaps it is me, but two months doesn't seem like a very long time to do "security reviews" ("you see a problem, Frank?" "Yeah, but at $5.00/Hour they don't pay me to fix problems, Joe...").
Okay, so let us say they DID review it. Did they fix anything? Or is it just on their ever-growing (read never-ending) list of problems they just haven't gotten around to yet (lets all give them a Round TUIT, eh?).
Personally, after seeing the level of "quality" shipped in some of the source for CE (drivers that hang, etc.), I've been underwhelmed at the code quality. I've seen Open Source that beats the pants off of it.
Ah, but whadda I know? I'm just brainwashed...
Okay, hold your arms out and recite after me: Brains...brains...brains...
Inaccuracies and arrogance (Score:2, Insightful)
You speak as if "the Open Source community" is a cohesive and organized group. They are not. This "open Source Community" that you speak of is awfully hard to define, consisting of many different people in different countries and speaking different languages with many different opinions and different ideologies. Have you read the debates between the BSD proponents and the GPL proponents? Given how different they are, would you still group the two in this so-called "Open Source community"? Do you not realize that many of the people you may be putting in that camp take issue with the very term "open source"?
And what product is "the Open Source community" focused on creating? Fact is, these people are creating multiple different products, ranging from small applications to programming languages to full-featured office suites to entire operating systems. Some of them are highly focused on being secure. Some are not. You seem to be grouping all of them under an "unsecure" umbrella, and this is not only inaccurate, but insulting to those who do focus on security.
Its not necessarily a bad thing, but the open source community, as a whole, doesnt do much in the way of code audits.
This is a fairly arrogant statement for you to make. How would you know, anyway?
Key to user security... (Score:5, Insightful)
Key to user security... (Score:2, Insightful)
Re:Key to user security... (Score:5, Informative)
Essentially, Windows.NET server ships with absolutely NOTHING enabled by default. This does present a problem to the typical Microsoft "its so easy just plug it in" sort of thing, but that is solved by an improved "configure your server wizard". The first time the server boots up, the user can explicity select what to install and/or turn on, and ONLY what they select gets installed/turned on.
The individual components themselves have improved as well. IIS 6 by default will serve only static HTML files, and installs no sample files or other stuff. You have to manually run the IIS security wizard to turn on things like ASP, CGI, etc. If you install a new ISAPI filter or something of the like, you have to manually enable it. Nothing gets turned on unless YOU the admin turns it on.
The other thing is that IIS 6 is a complete ground-up rewrite; no code from IIS 5 was used in its creation. Its gone through a complete code review to (hopefully) eliminate any buffer overflows or other bugs. There are other improvements as well... for example, the easy ability to run each website being hosted under a separate security account, typically with minimal access to anything.
Microsoft isn't stupid; they see that their biggest PR problem right now is security and they are doing something about it. True, they should have jumped on this a long time ago, but late is better than never.
Bullshit, look at OE and file sharing defaults... (Score:3, Informative)
Re:Key to user security... (Score:4, Interesting)
I've seen you, and others, bandy about this type of statistic for some time. But I have not found a single reference to back it up. Can you back this statistic up with a valid reference?
Re:Key to user security... (Score:3, Interesting)
Still, this statistic is hardly a good indication that all Linux installations "in the wild" are being compromised within X hours. And this is the claim that is constantly made, complete with bogus statistics.
Re:Key to user security... (Score:4, Interesting)
One of the amazing things about Microsoft is its ability to turn on a dime. They almost missed the Internet. Then they played an amazing game of catch-up.
But that does not mean they will be able to do it every time.
There is a major difference in the nature of Microsoft's first two challenges (desktop and internet) and its current one (security). The first two were really exercises in marketing. The third is a technical challenge.
Microsoft... (Score:5, Funny)
If my employer ever publicly said anything like that, I'd run for the exits.
Wonder if the chants are part of the brainwashing process.
Developers, developers, developers, developers.
Developers, developers, developers, developers.
Developers, developers, developers, developers.
Re:Microsoft... (Score:2)
Couldn't happen to a more deserving company (IMHO).
I was an (contract) admin at a company that felt the need to post those ``motivational'' posters around the workplace. I found them pretty insulting. Especially the one that they had plastered on the wall where the developers worked that read: ``It's dumb to be too smart.'' (It always amazes me when managers wonder why, after treating their workers like shit, they find themselves thought of as assholes.)
After I left, I heard quite a few headhunters comment that they had a difficult time getting anyone to accept positions at that company. Some of the headhunters claimed that they were being asked to filter candidates according to age (which they refused to do), that candidates were routinely lied to during interviews, and that recruiting fees weren't paid without a huge hassle. Wonder how long it'll be before Microsoft begins being viewed the same way by recruiters.
Whoa... enough of this topic drift!
Obligatory Simpsons reference (Score:2)
the Leader,leader, Leader.
I Love the leader.
Re:Microsoft... (Score:4, Insightful)
This may sound like a troll, but it's honestly my own perception: Microsoft operates on a cult-like corporate culture. It was especially evident during the antitrust trial; the behavior of the lawyers and execs and their obvious inability to concede, even to themselves, that they just might not be arguing from a rock solid position. It really did remind me of Scientology.
And I'm offended that Mr. Howard thinks of us "geeks" as such simple, predictable, uniformly malleable children. Methinks he's been working in a cult organization too long.
Better than the OSS community? (Score:2)
two months of code reviews and half-day seminars surpasses everything ever done by the open source community
Yeah, and what was the final bill? Imagine how much work the OSS community might have gotten done for that price.Self-Serving? (Score:2, Funny)
So what if they're being self-serving? If everyone is being self-serving by dissing microsoft, it's obvious that microsoft is not adequately serving anyone.
Read the Article... it is very creepy (Score:2, Insightful)
"Geeks like learning new things, and when they pop out at the end of the process they're entirely brainwashed."
I was astonished that he can make such bold claims. I have always thought that geeks have a mindset all of our own, and not one to be brainwashed easily. But then I found this quote:
"Microsoft has always had a crisis-driven mentality," said Mr. Howard, the security expert. "You have my word: we will lead the industry in delivering secure software."
And I couldn't help but laugh my ass off.....
The telling statement (Score:4, Interesting)
Re:The telling statement (Score:2, Flamebait)
> Microsoft's greatest strengths have always been the ability to see which way the ship is headed, and when it turns out they're going in the wrong direction, to turn on a dime.
Rather, Micorsoft's biggest problem is that they don't see what everyone else is doing until several years later, and then they turn on a dime and follow along cluelessly, wreaking havoc in their wake.
this "big deal" affects the bottom line (Score:4, Insightful)
Ah, but this "big deal" negatively affects their revenue and earnings, which is why I think it is little more than PR.
Historically, Microsoft has piled in multitudes of features and foisted what should be beta software on the market. They find out what breaks, and provide bug fixes (euphemistically called "service packs") for the things people really whine about. This approach maximized their revenue, and accelerates it.
Ask yourself if Microsoft would have turned Windows 2000 into Windows 2001 if a significant security hole was found on the eve of the launch.
point taken about steering the ship, but... (Score:2)
Getting the bugs out and making the software secure prior to first sale means that they can't run as fast, getting out ahead of competitors the way they used to. It also deprives them of the point-fix revenue stream.
Maybe now that they're a genuine, legal monopoly they can afford to change business models. That's part of the point of
This turn will simply be harder than the Internet course correction.
Re:point taken about steering the ship, but... (Score:2)
Bill: Yes, we're still doing our final security checks, in line with our Trusted Computing campagin. I wonder what they missed, rushing it out... In other words, quite a few of the arguments now used against them. As for "point releases" lets take a look at IE3 vs IE4. IE3 was, rightly so, the laughing stock of the Internet. IE4 singlehandedly destroyed Netscape.
Re:The telling statement (Score:3, Funny)
Ding Ding: What is innovation?
Alex Trebeck: Bwahahahahahhahahahha...
Re:The telling statement (Score:3, Insightful)
Yes - but this is what led to many of their security problems today. They decided they were going to "do" the internet, and so mashed a truckload of net features into all their products. So Word got the ability to detect hyperlinks, Outlook used IE to render web pages and so on.
The problem is - they didn't really do the net at all. Compared to say KDE, where I can give any KDE program a net URL to open and it'll just do it, the Windows internet integration is a joke. They never resolved key policy decisions, like which takes precedence: windows file metadata (with extensions) or MIME types? This is the problem that means I now get several emails every day that contain an embedded wave file, except it isn't a wave file, it's an EXE. IE sees that it's MIME-typed as a WAV, so passes it to the OS, which then makes its own, independant decision and detects from the extension that it's a program and so autoruns it.
The same problem surfaces with web pages. IE usually ignores MIME types - when I was developing a web application recently I wanted to see some XML embedded into an iframe, and then be able to copy and paste it. I return the XML as text/plain, but IE realises it's XML and shows it in that pretty tree thing. Now I can't copy and paste it. Mozilla however follows the rules, so I have to use that instead.
That's not a problem that can just be fixed overnight - it's a key design flaw. How do they fix that virus problem? By switching off the WAV background sound feature (something nobody ever used anyway) in emails. That's just a bandaid, and doesn't get to the core problem, which is the internet code in Windows usually ignores or doesn't receive MIME type info.
Now I have no doubt that after this session of looking at code, MS products will have caught up with the competition in terms of security. Nobody should underestimate them. But as has been pointed out, whether that'll change their long term mindset is anybodies guess.
Re:The telling statement (Score:3, Interesting)
You're giving them a lot of credit for essentially catching onto something that was about as difficult to ignore as, say, Woodstock going on in your backyard. With the billions of dollars and expectations pouring into companies like Netscape, it would have required nothing short of a deliberate act of self-destruction for MS to ignore what was going on.
Purchasing and developing a web browser in order to compete with a company that had very publicly vowed to put you out of business and buying web services like hotmail (for embarassingly high prices) do not brilliant business strategy make. Even today IIS is not the dominant web server, despite years of aggressive marketing.
As far as I can see, all Microsoft has done is react and trade on their already tough-to-beat desktop monopoly and cash reserves like they were going out of style. With .NET, they're just doing more reacting, at least so far, by implementing what is essentially a Java lookalike and backing it up with Microsoft monopoly and marketing clout.
No, they don't run the internet. (Score:4, Insightful)
When one of the DNS root servers switches to NT, please let me know - not that DNS is that stable or secure.
When IIS has a 60% market share (as Apache does now), I might also get a bit concerned.
When the Microsoft Sybase rip-off has a 46% market share (as Oracle currently has), we might start worrying about the datacenter.
When they have a stable, scalable 64-bit version of Windows, we might start worrying.
In order for Microsoft to get any of these markets, they will have to have a good product, good customer service, and good interoperability with other vendors products. I don't see that happening anytime soon.
After all, we gave them SMTP, and look what they did with that.
Re:The telling statement (Score:4, Insightful)
Well if you think that's all Microsoft have done to become Internet-centric then you are vastly missing the point. Have you looked at their
Lipner is astonished! (Score:5, Funny)
Lipner also reacted with astonishment when he was told that professional wrestling matches are fixed.
Wait a second (Score:4, Funny)
I thought they were the default security player. Don't the vast majority of hackers break into MS boxes already?
hey now! (Score:2, Funny)
KingPrad
students view (Score:5, Insightful)
looking at this -
dozen half-day training sessions for its programmers, about 1,000 at a time.
And i fail to see how you can teach. Its hard as hell to learn in a lecture hall of 300, but 1000? thats insane.
Not only that, but for a half day? Cmon, americans have an attention span of what? 15 sec? if that? (dont anyone take insult...:))
How do they expect coders to pay attention to a small figure in front for a full 6 hours....1.5 hours is hard as it is for a normal college lecture.
Re: (Score:2, Insightful)
Re:students view (Score:2)
You just have to make it a convincing threat.
(Hey, somebody around here has to stick up for us).
you've been in school too long then (Score:5, Insightful)
Re:a teacher's view... (Score:3, Funny)
OTOH, experiments have tended to show that the total amount of genuinely new material that can be learned in a particular area (i.e., organized around and extending from some particular area) is a bit limited as a function of time. Sorry I can't remember a particular reference, but that is the gist of it.
After learning new stuff in some area, a break with dreaming sleep is needed to consolidate the information before any more material can be learned that is directly connected to that area. Otherwise you get the "cramming" effect, where things are learned and remembered only for a short period of time, but if you check back a week or so later, most of the new information has been forgotten.
I think that I read the synopsis of the research in Science News, but I couldn't tell you even which year to search. (And I suppose that it might have been Scientific American or somewhere else.)
Microsoft.com Running on Linux(DNS at Akamai) (Score:2, Interesting)
Wired News reported today that Microsoft has outsourced their DNS to Akamai, and microsoft.com is now being served by name servers with a "networking implementation very similar to that of Linux". Akamai Technologies is a well-known Linux shop, but let's see.
What code reviews? (Score:4, Insightful)
Re:What code reviews? (Score:2, Informative)
I'm not saying they are delivering either, but they are doing stuff. Time will tell if it is actually real work or just smoke.
Remember who we're talking about... (Score:3, Interesting)
You want security? Fine, buy our subscription products.
Bad Idea for Microsoft (Score:5, Insightful)
It could not possibly survive by selling bug-free software - it's just not in their interest. The vast majority of users DON'T blame MS for the crashes, rather they either blame a 3rd party program or themselves even though the fault lies almost entirely on Microsoft.
They DON'T get bad press from outlook viruses - the evil hacker delinquent kids do. MS is seen, of course, as the victim.
Windows2000 was released with, what, 20,000 known bugs in it. It seems to me that my Windows partition works worse and worse with each new version I put on it. So I buy another.
Don't you realize, this is the best business model of all? But of course, now that the nerds, geeks and generally intelligent people are widely blaming microsoft they want to quickly sidestep widespread scrutiny by (you guessed it) telling us security is their highest priority.
Microsoft sells software that is so bloated that if they actually did a decent code audit (which, of course, would be far too expensive) and tightened things up, you wouldn't need that couple gigs just devoted to the OS. In short: MS NEEDS you to upgrade. Why on earth would they really mend their ways? Especially if it would cost more and get less overall business?
Re:Bad Idea for Microsoft (Score:5, Insightful)
As someone who's actually inside the Borg cube I can tell you that security is currently our highest priority. Thousands of people across various product teams have attended security lectures, new development has been stopped, old code and new code has been stringently reviewed, an emphasis on secure defaults is beginning to occur, and new functionality is designed with security in mind before all else.
Of course some people will complain about why this has taken so long while others will probably say "better late than never" but either way it should be noted that a code review/security audit on this scale is probably unprecedented in software development history. Some may chime in about how Open Source is supposedly a constant large scale code review but I've previously written on the fallacy of this kind of thinking [slashdot.org].
Now on to counter the main claims of your post that releasing software with security issues is a good business model. This may have been true in an un-networked world where the most a compromise could do was allow another user on your system perform some mischief but in a world where some kid in Asia can tie up mail servers on most of the planet by using a GUI virus toolkit, security becomes very important. Unfortunately across the entire software development spectrum from *NIX to Windows, from Open Source to proprietary we as developers are failing and clinging to panaceas and silver bullets (Open Source - the with many all bugs are shallow myth, safe programming languages, just use crypto, etc) when in truth there is more to security than just applying a buzzword technology or software development style. I outlined some of the practices and techniques that lead to more secure software in my The Myth of Open Source Security Revisited v2.0 [earthweb.com] article. Having done some more research into security issues I should probably do a followup article and focus on other fallacies and problems which lead to complacency in software development and from there insecure software.
Disclaimer: This post is my opinion and does not reflect the opinions, intentions, strategies or plans of my employer.
Re:Bad Idea for Microsoft (Score:5, Interesting)
And even with those misleading statistics, the only distro above NT/2000 (42) is Red Hat (54).
Your lack of objectivity renders your entire article irrelevant.
Re:Avoiding the Issue and Missing the Point (Score:4, Insightful)
In conclusion, I find your article nothing more than semi-sophisticated FUD.
Fear - Be afraid, that OSS might not be very secure.
Uncertainty - Well, if it isn't secure you probably shouldn't deploy it, should you. Use commerical software (and keep my paycheck coming).
Doubt - Hmm, well, maybe we should stick with the tried and true, good ole MS. (or IBM if we want to go back in time.)
Possibly correct (Score:5, Insightful)
So I will continue to percieve MS software as basically unfriendly, useless, insecure, etc. The last versions that I could legally look at and evaluate were that way, and I see no reason to change my opinion. Any company that makes it illegal to post reviews of their current products does not deserve any amount of "suspension of disbelief".
More to the point, any company that insists on the right to add, delete, copy, or remove whatever software it chooses from my hard disk cannot be considered secure no matter how secure the software itself actually is. That legal requirement is nearly the zenith of possible insecurity, and renders any software that requires it unsuitable for any application that I can conceive of.
Perhaps you've changed your license again. Is there any reason for me to believe that you won't change it back just as soon as I buy in? You seem to be requiring the right to change the terms of the license without my agreeing to it, of even knowing of it (via "license specs are kept on a web page").
I don't see how things COULD be less secure, for the end user.
Re:Bad Idea for Microsoft (Score:3, Interesting)
Then again probably not, FreeBSD has had every line of code reviewed before, and if you count the fact that it has more functionality pound for pound.
Some may chime in about how Open Source is supposedly a constant large scale code review but I've previously written on the fallacy of this kind of thinking
Oh well QE- fucking - D then, if YOU wrote on it we must be wrong. Let me clue you in, no developer, company, or whatever can prepare for every eventuality, once past a certain threshold no code can be 100% secure. There's always the possibility, that something will come along to break it. And when that thing comes, it's the OSS that gets fixed quicker, and better than any commercial offering.
This would be fun. (Score:2, Funny)
Then tape the hilarity that ensues, we could have a new weakest link on our hands.
I know I'll get modded down for this, but you only live once.
Bare Computing (Score:2, Insightful)
This Salon article [salon.com] asks if people would trust Microsoft enough to allow their programming to fly planes or spaceships. Of course, a plane running on windows 3.1 or win98 would be scary indeed... but even a bloated NT/XP or *nix installation would make anybody nervous.
... but what about a DOS box?
... what about a stripped down *nix box?
It seems to me (a windows user) that the power of the *nix systems is the ability to strip it down to the bare essentials... to remove variables that could cause problems. DOS also kinda had the feel to me.
I wonder if we all would trust microsoft stuff more if we as users could completely remove the nonessential parts... and slowly build as we needed. Everybody knows it's impossible to debug in multiple dimensions...
Until that time... nobody would fly in one of those planes... due to the constant worrying if the movie that they are watching will suddenly change into the "blue screen of death."
Anyway... be gentle... my karma is so fragile...
Davak
NY Times username/password (Score:5, Informative)
Re:NY Times username/password (Score:3, Informative)
P.S.
You need to accept the second cookie for the article to appear, but that one is only a session cookie that dissapears when you close your browser.
P.P.S.
What's a gorwell? George Orwell author of 1984.
-
MicroSoft is much better at useless effort (Score:3, Funny)
The open source community is always taking shortcuts by not making every possible mistake and them fixing it. Who cares about results? MicroSoft can do more work than anybody else, and that's all that matters.
Microsoft schizophrenic (Score:2, Interesting)
after "Microsoft asked Kollar-Kotelly to throw out much of Schwartz's testimony"
Monopoly != Abusive (Score:3, Insightful)
After they took over Ameritech's operations, service and especially support improved dramatically, at least for me. I'm happy to have them here -- the best telecom company I've ever dealt with (I've done business with Ameritech, PacBell, AT&T, MCI/Worldcom, Sprint, Verizon, and some others).
impressive chutzpah or bad math? (Score:5, Insightful)
I love this quote; it's _so_ MS.
Two months of a several thousand developers = 60 days * 8 hours per day (being generous and throwing in weekends) * 9,000 coders = ~ 500 man-years. Not too shabby!
Bullshit, that's playing with numbers. I could further "statistics-ize" this to say that this means every line of Windows XP got 8 minutes of attention in the last 2 months.
The reality is that secure development takes _time_ and _experience_ as well as eyeballs. Not everything is repaired correctly the first time, and the corrections themselves often need further review and correction. A fast fix is often worse than a naive bug.
This sort of thing is even more likely to happen when you're changing your development habits to take security into account - transitions are always messy. I doubt much effective security work actually "got done" on the Windows code in those 2 months, relatyive to the amount of "security twiddling".
While I have to applaud MS for finally _beginning_ to take security seriously, it's complete B.S. on their part (and very much in classic MS form) to suddeny claim that they're "the securest of the secure" when they're just entering the field.
Re:impressive chutzpah or bad math? (Score:2)
it's nice to examine each line of code (are these former Y2K code monkeys?), but the fundamental design must be examined and secured from that perspective. i really think the process of making software totally secure begings with re-engineering the design, and securly implementing that through code.
Microsoft's New Strategy (Score:2)
I'm surprised they'd admit that so openly. Maybe they're serious about this trust thing, afterall.
Monoculture vs. Open Source (Score:2)
I'm wondering whether Microsoft is ideally placed to take advantage of this .... If Open Source software is intertwined with free transfer of intellectual property, then it seems like the media companies will almost be driven to Microsoft by default.
Wow, 2 Whole Months! (Score:2)
2 months. I'm not impressed.
-Spack
PS: For the doubters, Yggdrasil, green cover, God playing "pull my finger" with Adam on the cover.
Bwah ha ha ha ha!!! (Score:2)
Brainwashed? This coming from a Microsquash guy? I guess I'd be brainwashed too if I worked there....
EFGearman
OpenBSD (Score:2)
I wonder what Theo has to say about that!
A real shift in Microsoft's security policy? (Score:3, Insightful)
To try to relate these two quotes: the OpenBSD folks have been doing constant security audit on their code for years. I'm pretty sure what they've done surpasses anything Microsoft has done as of yet, as they have been specifically focused on providing a secure operation system for quite a while: http://www.openbsd.org/security.html [openbsd.org]
Moreover, they've continued to have security problems [slashdot.org]...and that is the nature of software development. If the software is in use, then somebody is going to find a way to hack it. And the more people use it, the more people are going to figure out how to hack it. And the quicker this process is, the more quickly you are going to have to respond to it.
But this does not mean stopping once a year and deciding you are going to do a massive code audit. It doesn't not follow that Microsoft is all of a sudden going to have secure code unless they wake up and realize their non-disclosure policy is hurtful...they need to immediately make available patches and make people aware of security problems so people can take some sort of action...and I dare say they might think about opening up their code base (naw, that'll never happen I guess). It's a multi-faceted approach, and the open source community is just better at it at this point - we don't have a marketing department.
This whole security push on their behalf just seems to be another marketing ploy, really, complete with a catch-phrase: "Trustworthy Computing." Let's call it what it is, huh? - "we are going to fscking focus on security now." It seems like no matter what they do, as long as their marketing department is fighting their security/engineering team for dominance (well, I guess it's already won really) it's going to be the same old story.
You guys really think that? (Score:3, Interesting)
I'm willing to bet that you'll be retracting that statement when something blows up in your code or if some new security hole is discovered by some script kiddie. We have the results to show that code review should not be a rush job.
By definition, Microsoft != trustworthy (Score:3, Insightful)
It's the stuff they do with full knowledge and intent that makes them un-trustworthy.
it's so big business--and it won't help much (Score:3, Insightful)
Yes, they probably will do some good. Yes, they will probably help a little with the perennial problems with Microsoft software: that it is dumped on the market with way too many bugs, that it is dumped on the market with way too many features, and that it is dumped on the market much earlier than the software from more conscientious competitors, driving them out of business.
But it doesn't address the fundamental problems. Microsoft software is still closed source and it is still written and controlled by a small number of programmers up in Redmond, programmers who often have no experience of anything beyond Microsoft. Even if Microsoft made all their software "shared source", the economic incentives would favor the crackers (other developers don't have much interest in contributing fixed to Microsoft that they just have to pay for again in the next release).
Most importantly, however, Microsoft's goal of total market domination is their own worst enemy: an OS that runs on 95% of the machines is intrinsically and unavoidably not secure. We need operating system diversity. If no single OS or server software runs on more than 5-10% of desktops and servers, then security problems are automatically self-limiting. And, as a bonus, the increased competition would give us better products and more innovation. (And, yes, these comments apply to Apache as well.)
Re:SBC an Abusive Monopoly? (Score:2, Funny)
But that can't be. When we deregulated them, they promised to play nice.
Re:SBC an Abusive Monopoly? (Score:2)
The important thing is to have our own solutions. (Score:4, Insightful)
It would be a much wiser thing for us to do instead to focus on implementing our own open, Free, and standardized technologies that present solutions in the best interest of the community. This is the issue, and, whether we realize it or not, this is the war. We either leave these things to them and be controlled by them, or implement these solutions ourselves and protect our liberties.
Simple as that.
Re: (Score:3, Insightful)
Re: (Score:2)
Re:Yeah, so? (Score:2)
Re:No wonder... (Score:2, Troll)
No, no, no. The red nine on the black ten.
EFGearman
Re:Microsoft can do this (Score:3, Insightful)
But NT sprang from ideas brought into the company from the outside (Cutler and his background with VMS). And look how long that process took. I somehow doubt that looking inward for a half a day is going to make the security aspects of Microsoft's software design process (note: that'a possibly an oxymoron) any better. Certainly not immediately. But who from the outside will come into Microsoft and be able to make the necessary changes. I recall reading a bit about Cutler's struggles to get MS developers to do things in a more robust way; they were working in such a vacuum that they were coding things in ways that other companies had tried and thrown out years before because they were so broken. I'm betting that it'll take someone to come in and kick some serious tail to get more secure code. No pep rally is going to do it (IMHO).
What I've always found astonishing is how Microsoft managed to ignore the security model of Xenix so thoroughly when that product was, at one time, the company's stated direction. (Actually, it just might have been Cutler that pounded the final nail in Xenix's coffin; he is a reknowned UNIX-hater.) Geez... even if they decided to abort the Xenix direction they could have at least kept the UNIX security model as a starting point for OS security in their new direction. It sure seems apparent (to me, at least) that someone high up at Microsoft was shooting down most security-related features of their products. As secure as NT was supposed to be, it was/is nothing compared to what might have been had they incorporated more of the ideas from VMS. I have difficulty believing that Cutler didn't want them incorporated. But, then, I understand that he fought against moving the graphics subsystem into the kernel and lost that one, too.