Hack in the Box Meets Windows Vista 159
Strange_Brew writes "It appears Microsoft is really going all out to get Windows Vista secured before its release date in 2007. There's an article on PC World which talks about Microsoft's plan to give Asia's largest hackers conference an inside look at the new security features in Windows Vista this coming September." From the article: "The Hack In The Box conference will host two speakers from Microsoft. The first, Dave Tamasi, a lead security program manager at Microsoft, will give a presentation on security engineering in Vista. The talk will include a discussion about features suggested by hackers and other security conscious members of the computing community, in addition to security improvements made on Vista. The second speaker, Douglas MacIver, a penetration engineer at Microsoft, will review Vista's BitLocker Drive Encryption and the company's analysis of threats and attempts to penetrate the security feature."
Reminds me of home made encryptions (Score:2, Insightful)
When noone does the company calls his product uncrackable. These events and claims are without credibility, security doesn't get manufactured this way.
Re:Reminds me of home made encryptions (Score:5, Insightful)
You do realize BitLocker isn't about some "home brewn" encryption algorithm right? It uses standard encryption algorithms (256 bit AES for example). The "invent" part here is how this standard encryption is used. From hardware, boot process, drive access, etc. Here [microsoft.com] is a good place to start for a basic overview.
offer $100,000 or so to anyone who can crack it
Didn't see that in the articles.
When noone does the company calls his product uncrackable. These events and claims are without credibility, security doesn't get manufactured this way.
True. If ANY company says ANY product is uncrackable, they are full of it and/or marketing is having too much of a say in thier message. However, again I'm not seeing any claims like that in any of the links. Am I missing something?
Re:Reminds me of home made encryptions (Score:5, Insightful)
Specifically, my issue is with the "It appears Microsoft is really going all out to get Windows Vista secured before it's release date in 2007." sentence, and that somehow presenting a system for security experts would make it more security, as a direct causality.
Security is not a product, it is a process. If one chain in the link fails, the whole chain fails. And MS can continue to give presentations about their system and abstract design concepts, and if security experts spot weakness in the design they can tell all about it to MS, but it's throwing peas at a wall. They never listened, and I see no reason why would they listen. This is just a cheap PR stunt to reassure some less in-the-know folk. That is why I compared the situation to the example in my original post. It has nothing to do with encryption. Encryption isn't the issue. Design, security principles and how MS responds to security issues are.
Re:Reminds me of home made encryptions (Score:3, Insightful)
And they arent talking about abstract design concepts, they're presenting how their system works, at a conference of security experts; they want feedback on their implementation. But let's just keep trotting out the party line shall we? A beautiful mind indeed...
Re:Reminds me of home made encryptions (Score:2)
I have a feeling... (Score:1)
Re:I have a feeling... (Score:4, Interesting)
OR
not
Re:I have a feeling... (Score:2)
Re:I have a feeling... (Score:1)
Will Vista ship with firewall ENABLED?! (Score:1, Funny)
Microsoft job listings (Score:5, Funny)
Makes sense, after all. I've always kinda felt like MS was giving it to us all up the
Re:Microsoft job listings (Score:2)
Re:Microsoft job listings (Score:5, Funny)
Re:Microsoft job listings (Score:5, Funny)
Mind you, if you're into that sort of thing, it might be cheaper than paying a dominatrix...
Re:Microsoft job listings (Score:1)
Re:Microsoft job listings (Score:3, Funny)
The never ending story (Score:5, Insightful)
Re:The never ending story (Score:5, Insightful)
If I hang 2000 padlocks on most from the 2200 doors of my house, it will be most secured in the whole neighbourhood. Not more secure than the guy across the street, with front and back door, one good quality lock in each, and good windows from break-proof glass.
Windows is too big to be secured whole, it has too many dependencies on insecure behaviours of programs, the security too often stands in the way of usablity and as such will often be disabled or neglected. If you need to type admin password 50 times a day to perform quite simple (though potentially remotely risky) tasks, you will type in the 51st time when a trojan asks you to do so.
Re:The never ending story (Score:4, Informative)
I mean, aside of being able to claim that you can't remove it from your system...
Who had that smart idea to make the webbrowser the local file manipulation tool, and why is he still alive? Why are (other) kernel level programs responsible for dealing with DNS and other network related issues? The whole system is flawed. Not because the code is buggy, but because the design has serious flaws that break it. Not at a code level, but at the level of the underlying design work.
Re:The never ending story (Score:3, Informative)
I think the KDE team gave him refugee. At least they copied the idea. Idiots.
(disclaimer: I use KDE. I hate konqueror. If you're one of the konqueror designers, please go and drown yourself.)
Re:The never ending story (Score:3, Funny)
Re:The never ending story (Score:2)
You know him? You know that person? Really?
Tell him he's a celebrity. A true one-of-a-kind guy.
Quite seriously, Konq is
My guess is that K is an attempt to make Linux "feel like Windows" for those that complain it "feels" differently, and K is an attempt to mimick
Re:The never ending story (Score:2)
I use Firefox for some things, but Konqueror isn't such a memory pig.
Re:The never ending story (Score:3, Interesting)
I think I may be "that guy."
On my lil' 800MHz notebook with "only"(?) 256M RAM, Konqueror kicks Firefox's ass. I don't have time to wait for Firefox. Firefox is my choice on beefier machines, but as a "slimmed down Mozilla," it's a joke. There's nothing slimmed-down about it, and I'm amazed that they turned an I/O-bound application into a CPU-and-memory sucking experience.
Re:The never ending story (Score:5, Informative)
(Disclaimer: I use GNOME. I am also not a big fan of Konq. If you're someone who talks about technical issues but clearly doesn't bother to have an informed opionon, please go and drown yourself.)
Re:The never ending story (Score:2)
As a web browser, I'd rather die.
Hear, hear - I kan't stand Konqueror (Score:2)
He's not alive. (Score:2)
That guy died last year.
Re:The never ending story (Score:5, Insightful)
Regarding DNS, I'm not sure what you actually mean here. The DNS client and DNS server are services, but they are not in kernel. A Windows service does not mean it's in kernel mode. Winsock itself has some kernel thunking, and as name resolution is generally done through Winsock, that might be what you mean.
Re:The never ending story (Score:2)
That would be SNCA [hejazi.org] but it seems to be there since Solaris 8.
There are also at least two in-kernel httpd for Linux: TUX [stllinux.org] and khttpd [demon.nl] but they don't seem to be used by much people.
Re:The never ending story (Score:3, Insightful)
Re:The never ending story (Score:2)
many of those flaws still exist.
Re:The never ending story (Score:4, Insightful)
Do you have any proof at all to back up that assertion?
I've seen it repeated time and again here (especially with regards to IE), but have never once seen any proof.
Re:The never ending story (Score:2)
What they're really saying is that the default install has administrator access.
---
DRM'ed content breaks the copyright bargain, the first sale doctrine and fair use provisions. It should not be possible to copyright DRM'ed content.
Re:The never ending story (Score:2)
But you don't even have to go that far. Every program has, provided it runs with Admin privileges, which it does as soon as the user starting it has admin privs (which is the default), every right necessary to use functions like CreateRemoteThread. So if you really need some special permissions, just get them from a program that has them.
Re:The never ending story (Score:2)
"The emperor is nu
Re:The never ending story (Score:2)
Why? Because of posts like the parent.
Let's begin
Most of all, every piece of crap program is tied into the kernel, or needs kernel level privileges. Can anyone give a reasonable clue why of all things a webbrowser, something that by its very nature deals with insecure content of the worst kind, needs kernel
Re:The never ending story (Score:2)
As for your questions:
1. A kernel's responsibility is resource management, resource abstraction and providing interfaces to them for the rest of the system, as well as userspace programs.
2. In current systems, the number of programs that don't "use" the kernel would be quite
Re:The never ending story (Score:2)
* Windows Help is no longer a proprietary format... it actually is HTML that is rendered nicely using the IE COM component
* Outlook Express using the IE COM component to render email messages
* About a billion applications use the IE COM component, each of whom have not (and should not) write their own HTML renderer because, as the number of vulns in IE & FF have shown, it's really hard to write a secure web browser and updating it is a hard problem (TM)
Re:The never ending story (Score:2)
Ra
Re:The never ending story (Score:2)
You seem to be confused.
Locate iexplore.exe and delete it. There, you've just removed IE from your sy
Re:The never ending story (Score:2)
So it can install all of those kewl, utilizable ActiveX controls without bothering the user, of course! After all, what desktop is complete without Comet Cursor, Bonzi Buddy, and a handy tool that downloads pr0n directly to your desktop?!
Re:The never ending story (Score:2)
Re:85. Want to guess how many Linux had? :) (Score:4, Informative)
Also, MS has moved to regular patch cycles and every patch is actually a container with many patches inside, which you don't see unless you check the details.
So in short: You simply can not compare these numbers, because the methods and contents are too different to make any comparison meaningful. Maybe comparing with OSX would work better.
Windows Vista: most secure version of Windows yet (Score:4, Insightful)
That box you speak of... (Score:5, Interesting)
The box they built themselves into - or rather that they had to build around themselves - isn't so much the box that is the security model in Windows. I have no doubt whatsoever that Microsoft is entirely capable of locking down the system so badly that nobody but the most powerful ueber-god of a SysAdmin can open it back up to a casual user, let alone out to the internet for hackers to 'crack'.
But therein lies the problem as well. Windows users are -not- ueber-gods of SysAdmins, and this shows in the decisions that they feel are forced to make. I can't spot it in all the Slashdot story summaries on Vista right now, but there have been at least two stories in which there was a reference to Microsoft dropping a security feature or loosening a security setting -because- major clients of theirs told them that things were 'just too complex'. And this is in an operating system that guides you through reasonably easy-to-read GUIs with hint balloons and help files up the wazoo. You can well imagine what happens if you'd sit them down behind a screen that just shows a prompt and a one-liner telling them that security settings can be changed by editing the text file "omfglolwtfbbq.conf"
So yes, they're in a box that is difficult to get out of - but that's mostly because their clients make the walls so damn slippery after plating the bricks with titanium and burned down all but one of the ladders, then stationed several million angry users alongside it, hissing and whining at them whenever they try and scale it.
They are, well and truly, damned if they do - and damned if they don't. But at least they realize that they are a little less damned in the first case.
Re:That box you speak of... (Score:2)
In Windows, I believe the equivalent file is actually called "pwndjoon00b!.ini".
Re:That box you speak of... (Score:2)
http://it.slashdot.org/article.pl?sid=06/07/15/172 236 [slashdot.org]
Microsoft Retracts Private Folder Option
"Just recently, an update to Windows added the option to password-encrypt a personal folder. The intent was to allow users who share PCs to have a measure of privacy, but C|Net reports the company is now removing that functionality with a patch. IT managers hit the roof when the option was added, c
Re:Windows Vista: most secure version of Windows y (Score:2)
That Vista is going to be the most secure Windows Version ever is a given. I'd laugh at anyone who tries to sell it with this as the catchphrase. It's like saying "Oh, well, he's on time every day" when trying to say somet
Re:Windows Vista: most secure version of Windows y (Score:2)
Re:Windows Vista: most secure version of Windows y (Score:3, Informative)
Have you used a recent Linux distribution? I use Windows about 50% of the time (most of my customers use Windows) and Linux most of the rest. I literally cannot remember the last time I logged on as root under Linux (except during initial installs). In pretty much all modern Linux systems, the system knows when administrative rights are needed and prompts for
Re:Windows Vista: most secure version of Windows y (Score:2)
When I worked in tech support, I would have conversations like this on a REGULAR basis:
Me: Okay, turn the computer off and back on again
Them: Which button is that?
Me: The one you use to turn your computer on.
Them: Okay (hits the monitor power button instead)
I'm not joking, that was a TYPICAL conversation.
-Eric
Re:Windows Vista: most secure version of Windows y (Score:2)
Vista still "protective" of keeping it's malware (Score:5, Interesting)
There is one major difference... Mac and Linux allow privileged processes to remove (and even replace) a file that still is in use. Vista continues to "protect" files that are in use from deletion.
Re:Vista still "protective" of keeping it's malwar (Score:2)
Re:Vista still "protective" of keeping it's malwar (Score:2)
Or maybe that zip file I downloaded a week ago that got bugged and I'm never going to be able to delete.
Re:Vista still "protective" of keeping it's malwar (Score:2)
Many applications require Administrator rights to install, and some require Administration rights to run even th
Re:Vista still "protective" of keeping it's malwar (Score:2)
On that note, you're definitely right about Windows users not taking precautions, but the problem is that that isn't going to change. Most Windows users don't know enough to know what precautions to take. I have enough trouble getting my grandfather to remember how to get on the internet. I'd rather have to clean his computer on a regular basis than try to explain to him how to avoid viruses and malwar
Re:Vista still "protective" of keeping it's malwar (Score:2)
I dont think it is a myth, it is just too convenient to exaggerate those claims to make it look like "everyone is out to get us because we are Microsoft". I am sure as many viruses would be attempted to be written for other OSes if they were as popular as Windows, but less would actually be successful on the others tha
Re:Vista still "protective" of keeping it's malwar (Score:3, Interesting)
If they have root access, they can hose the whole system. If they don't have root access (or refuse to supply the credentials), they can still hose their own user account. Either way, if you're looking to add another PC to your zombie botnet, the difference is immaterial, especially on single-user machines.
Even if there were absolutely no remotely exploitable holes, there
Re:Vista still "protective" of keeping it's malwar (Score:2)
And which users do you aim for, the 10% or the 90%? (I dont know the exact figures). Of course you go for the latter, with the greater number of Windows users you have more chance of getting a hit. Thus my point that the disparity in the number of breaks of Windows vs OSX/Linux/etc is partly due to its greater prevalence.
Re:Vista still "protective" of keeping it's malwar (Score:1)
Penetration engineer? (Score:1, Redundant)
I don't even know where to begin on that one...
Re:Penetration engineer? (Score:2)
Re:Penetration engineer? (Score:3, Funny)
Dear Microsoft, (Score:5, Funny)
Yours,
Asia.
Re:Dear Microsoft, (Score:4, Funny)
Love,
Asia
P.S. We found 109.
Good Idea? (Score:3, Interesting)
This just in: Asian hackers give M$ a look... (Score:5, Funny)
hacks are valuable... (Score:3, Interesting)
1. the money that can be made by selling the secrets to bad guys.
2. MS hatred goes deep in the hacking community...a lot of "hackers" would love to see vista hackable out of the box to hurt MS.
welcome to the real world (Score:4, Insightful)
There's a 95% probability that Vista will fall into the same traps, and will be just about as insecure as any other windos because of these problems and because Outlook still executes binaries sent by mail, and users can still be tricked by calling your virus.exe virus.jpg.exe and providing the proper icon.
(the other 5% are that Vista doesn't ship at all)
Re:welcome to the real world (Score:2)
Lazy? Doing that presents so many issues that documenting and fixing them occupies an entire blog about non-admin logins in Windows [msdn.com]. Then once you create the second, non-admin account, you're still vulnerable if an attacker includes in their payload a privilege escalation attack [princeton.edu].
>developers are too careless and still write software that doesn't work unless you run it as admin.
Amen. For example, the person or persons who wrote a *typing tutor*
Non-disclosure (Score:1)
And if that doesn't happen, how's
Security? (Score:3, Insightful)
basics (Score:2, Insightful)
It's time to dump most of the legacy code (Score:4, Insightful)
Re:It's time to dump most of the legacy code (Score:2)
2) You should've downloaded and tried the Vista beta before commenting on what they've done and not done.
Hint: an awful lot of software will not run on it. Many of those that don't can be run in a "compatibility" sandbox, which is pretty isolated from the system.
Re:It's time to dump most of the legacy code (Score:2)
Hint: an awful lot of software will not run on it. Many of those that don't can be run in a "compatibility" sandbox, which is pretty isolated from the system.
From what I've read, it is kinda, sorta isolated. If they wanted security, however, all applications would be running in a sandbox for security reasons, not just compatibility. For that matter the security and privileges of those sandboxes should be set to functional defaults and easily editable via a top-notch UI. If I had 100 billion and 6 years t
Re:It's time to dump most of the legacy code (Score:2)
Go install it and try it. You'll see what it does.
Every damn program that needs to do anything with any sort of escalated privlidges pops up a window. A window you CAN'T say "don't show again" to.
There's a lot under the covers that has changed as well. The whole security model is totally different.
Re:It's time to dump most of the legacy code (Score:2)
Go install it and try it. You'll see what it does.
Quite frankly, I don't have the time or inclination. I've read the reviews and seen briefs.
Every damn program that needs to do anything with any sort of escalated privlidges[sic] pops up a window. A window you CAN'T say "don't show again" to.
The problem major is the definition of "escalated privileges." Windows has not implemented the granularity of control necessary and has not set reasonable defaults for behavior of existing and new software. Hundre
WTF? (Score:2)
MS Business Practices (Score:4, Funny)
fundamentally flawed (Score:3, Insightful)
Re:fundamentally flawed (Score:3, Interesting)
Noncense, backward compatibility should not break security. Windows was sold as suitable for secure use in a networked environment. It was even given C2 [infoworld.com] security certification. The problem is the WinNT memory management unit running under the x86 processor. Something that was first tackled under Linux with Exec Shield [redhat.com]. The Windows version called NX [findarticles.com] can be bypassed as otherwise JIT bytecode won't work.
"inter-processes communication
Defects are Microsoft's fault... ALL of them! (Score:2, Interesting)
A forward-thinking hacker... (Score:2, Insightful)
COM and DCOM (Score:2, Insightful)
Re:There's only one possible outcome... (Score:2, Insightful)
Re:There's only one possible outcome... (Score:1)
I think the blame would hit a different target (Score:4, Insightful)
Yes, it simply "does not pay" to dig into Linux insecurities. What for? First of all, there are very few "clueless" users. Linux still has the "geek system" halo, users that consider themselves "normal users" without any ambitions to run servers or who just want to browse the web and write the odd letter or two won't even go near it.
And they tend to be the prime targets for spammers, trojan injectors and other malware. The clueless, gullible people.
But let's assume, just for a moment, Linux was the dominant system. Let's say it had a nice, clean user interface that lets even the most inapt monkey set it up and use it. Then we would, of course, start to see a lot of Linux based malware.
In Linux, though, you can actually implement a complete, useful and enforceable security model. You can use every kind of software that you might need without compromising the security of the whole system. Something that is by its very design impossible with current versions of Windows. In short, it is not necessary to give the average user administrator privileges, something that is simply a necessity in Windows with a fair lot of programs.
I guess, was Linux the dominant system, the blame would shift. From the system, as it is now, to the clueless user who dared to go online as root.
Re:I think the blame would hit a different target (Score:2)
Something that is by its very design impossible with current versions of Windows.
Can you justify this statement? What is inherent in the design that makes this impossible?
Re:I think the blame would hit a different target (Score:3, Insightful)
Additionally, you are allowed to inject arbitrary code into whatever program is currently running. You are able to inject your code into the memory space of, say, explorer.exe and force it to run your code as a thread.
The fi
Re:No good (Score:5, Insightful)
I for one am sick of this argument, because it simply isn't true. It IS possible for the primary OS publisher out there - be it Microsoft or someone else - to release a secure OS for the masses. While being top dog does expose you to the most flak, it doesn't a priori prevent you from doing a good job in the first place.
Re:No good (Score:2)
No but it does make it a LOT harder. They're trying to juggle masses of clueless customers, a mountain of legacy software, and an army of hungry hackers all at the same time. I don't envy their position.
-Eric
Market share -- maybe it's the other way around (Score:2)
This can only be random speculation because there is an army of other variables, an army led by marketing budgets, but can you imagine corporate America ever standardizing on OpenBSD or Adamantix? OS X has a good record but it's not in the same category as those two.
In fact a really secure OS wouldn't allow running arbitrary untrusted software. Good luck selling that.
Re:No good (Score:2)
Know what 'Ad Homonym" means? Its a fundamental logic error in your argument. Just like the one that windows only has viruses because its widespread. Another fundamental logic error. Windows has viruses due in some cases to weak design, and in other cases due to poor implementation, and in other cases due to simple not-so-good admin practices. The first two are MS's responsibility, and the last of course isn't.
Re:No good (Score:2)
---
Whoever modded parent "Insightful": Please shoot yourself. Thank you.
Jesus. I scroll down one page and you are at it again. Did you buy this account on eBay or did your dad just leave the PC logged in?
Re:Techie people will never learn (Score:2)
Re:a reason for me to change... (Score:2)
I see 2 problems with your setup. 1: The VM doesn't emulate a 3d card, and 2: the VM doesn't emulate a 3d card. It may seems as though these two points are the same, but i thought it was important enough that I should list it twice.
Why don't you try to run a high graphic game on that VM as well? From the Virtual Server FAQ:
Q. Can I run Direct3D applications inside Virtual PC or Virtual Server 2005 R2?
A. No. Virtual Server 2005 R2 d
Re:Perhaps they're looking at security the wrong w (Score:2)
A non-admin u