Microsoft teaches security

kamper

Diamond Member
Mar 18, 2003
5,513
0
0
I just had to laugh when I read this. I suppose it's not so stupid but the initial idea of Microsoft training other people about security is pretty funny.
 

n0cmonkey

Elite Member
Jun 10, 2001
42,936
1
0
When was the last time you saw microsoft.com getting hacked? XP sp2 should be fun.
 

Verdant

Member
May 8, 2003
83
0
0
if you have used any new microsoft software from the past year you would probably not make such comments...

the biggest reason there is so many problems is because no one reads the manual...
 

kamper

Diamond Member
Mar 18, 2003
5,513
0
0
Originally posted by: Verdant
if you have used any new microsoft software from the past year you would probably not make such comments...

the biggest reason there is so many problems is because no one reads the manual...

Hah! And microsoft's biggest argument against linux is lower total cost of ownership because MS software is easier to use. Force people to start reading manuals and that argument loses most of its momentum. I think admin's should understand the products they use, but if you're going to put that effort in then why are you using Microsoft products anyways? Reading the manual is not a sufficient substitute for code that is free from buffer overrun holes and other such cracker treats.
 

n0cmonkey

Elite Member
Jun 10, 2001
42,936
1
0
Originally posted by: kamper
Originally posted by: Verdant
if you have used any new microsoft software from the past year you would probably not make such comments...

the biggest reason there is so many problems is because no one reads the manual...

Hah! And microsoft's biggest argument against linux is lower total cost of ownership because MS software is easier to use. Force people to start reading manuals and that argument loses most of its momentum. I think admin's should understand the products they use, but if you're going to put that effort in then why are you using Microsoft products anyways? Reading the manual is not a sufficient substitute for code that is free from buffer overrun holes and other such cracker treats.

Can you give examples of complex, but bug free code?
 

n0cmonkey

Elite Member
Jun 10, 2001
42,936
1
0
Originally posted by: BingBongWongFooey
No code can be proven to be bug-free.

That was my point in response to:
Reading the manual is not a sufficient substitute for code that is free from buffer overrun holes and other such cracker treats.
 

Barnaby W. Füi

Elite Member
Aug 14, 2001
12,343
0
0
And they're two different things. An end user probably shouldn't need to read a manual, while an admin should have read a billion already.
 

Linux has its share of exploits also. I guess the elitist Microsoft bashing will never end no matter what strides Microsoft makes to improve their software.
 

drag

Elite Member
Jul 4, 2002
8,708
0
0
Well you know the old saying(or cliche, depending on your point of view),

"Those that can't do, teach."

:p





common sense-based disclosure:
(yes MS has shown vast improvements in the past couple years, it's just that historically windows has the worst track record of pretty much any OS anywere. So don't get uptight with me, It's just a joke.)
 

chsh1ca

Golden Member
Feb 17, 2003
1,179
0
0
"A chisel is only as useful a tool as the sculptor who wields it." -- in my mind, that applies universally.

To laugh at Microsoft educating administrators about patching boxes is just plain wrong IMO. Microsoft had a very valid point when they said recently that they believed that full disclosure was hurting them in terms of security. It is a basically provable fact that a large number of the hardest-hitting worms over the last two years have resulted from full-disclosure of vulnerabilities. It does not apply universally, and during that time there have been some effectively 0-day worms running amok. I say "effectively 0 day" because it usually takes a few days/weeks for Microsoft to get a patch out. Sure, they haven't had the best track record even with patches -- there was a string of vulnerabilities they patched that subsequently undid other patches -- but that is far from being relevant to user and admin education. I suspect you will also see some major revisions to the MSCE in the coming months that will even push the security and updating regularly issue more than it already has been.
 

n0cmonkey

Elite Member
Jun 10, 2001
42,936
1
0
Originally posted by: BingBongWongFooey
And they're two different things. An end user probably shouldn't need to read a manual, while an admin should have read a billion already.

I'm not a car mechanic, or a professional driver, but I had to read a manual or two.

And no, RTFMing is not a substitute for better software, but it helps. A lot of Windows problems would have been solved by a little RTFMing.
 

Barnaby W. Füi

Elite Member
Aug 14, 2001
12,343
0
0
Originally posted by: RickyRoma
Linux has its share of exploits also. I guess the elitist Microsoft bashing will never end no matter what strides Microsoft makes to improve their software.

It goes both ways: there are just as many people willing to ignore truth and logic and defend microsoft just because of some silly loyalty. Bigots, zealots, and fanboys exist for nearly everything.

I prefer to declare everything sucky and play devil's advocate, pissing everyone off at times while making few enemies. ;)
 

drag

Elite Member
Jul 4, 2002
8,708
0
0
To laugh at Microsoft educating administrators about patching boxes is just plain wrong IMO. Microsoft had a very valid point when they said recently that they believed that full disclosure was hurting them in terms of security. It is a basically provable fact that a large number of the hardest-hitting worms over the last two years have resulted from full-disclosure of vulnerabilities.

Full disclosure is what makes OS's more safer then they were just a few years ago. MS saying full disclosure is hurting them is marketing BS and an attempt to point the finger at other people.

Security professionals for the most part are professionals. They rely on there reputation for business and releasing vunerabilities before patches are avaible hurts them as much as everybody else. The idea that they do it for sensationalism is mostly false, except for the fact that they at least want credit for their work.


You see for a long time these people tried to point out and get patches for problems. Most large software vendors were guilty of ignoring problems, MS was just a big fish that was habituatlly bad behaving. Other companies like Sun had some of the longest running un-fixed vunerabilities.

So once they told these companies these problems existed, they just waited for patches that never came.

So exasperated they simply started publishing details.

Then they had to contend with threatening lawsuites and accuasations from big companies (who don't want to admit to publishing faulty software and then not fixing it for months, even years, after it had a known problem), so in self defense and to remain creditable they had to start publishing "proofs of concept" code that system adminstrators could use to test out their servers to see if they were vunerable.

Personally I have used theses things in to break out of a chroot jail, I even did it once to fix a issue that I was having with a computer's OS that I was installing remotely over the internet.

Tools like Nessus use these tools to help administrators do detailed audits of their networks and systems to improve security.

You see once people started publishing this data, thats when companies like MS started responding to security issues. Before that there attitude was "If nobody knows it's a security issue, then it's not a security issue."

If you want to look up worms and stuff you'd notice that in 95% of the cases, and especially big worms, that MS was notified months in advance that people were going to publish details of the vunerabilities, MS and whatever security group negotiated a resonable time frame for a patch and then after MS released the patch for a while, then these people reported their findings.

If MS seemed like they were dragging their feet, then they would release details anyways.

Mostly it's lazy or unedicated administrators and users that are the cause of most viral and worm outbreaks.

Full disclosure is a nessicary evil, and has a proven track record of getting people fixes and resolving issues before they become real issues.

Remember that worms just immitate (badly) basic steps a human goes thru to exploit a vunerability, anybody that gets nailed with a worm would probably just as easily get nailed by a cracker.

The difference is that a cracker can cover his tracks, while most worms don't.


(oh and MS DEFINATLY isn't the only one guilty of dragging their feet or ignoring issues. Sun, Apple, IBM and most any other major software manufacturer was guilty of it, most times they were guilty several times. For instance Sun was famous for not releasing patchs for some issues that were known for years in a couple cases)
 

Verdant

Member
May 8, 2003
83
0
0
just going to restate that from a technical perspective, and speaking with microsoft employees, their software day forward is going to much more secure, in fact i wouldn't doubt that on average it will have superior security to most *nix machines.

should they have made this shift earlier? most definitly... but one has to remember that when windows was developed features were the big push, and the internet wasn't really a factor,

you also must remember that there are have been very few exploits that SHOULD have effected any machines, this is partially due to negligence of the end user, as well as microsoft.

solving the issue of security is not just about microsoft, now matter how secure they make it out of the box, they will need to make some features available... without it there is no product. with features comes configurability, with configurability comes the possibility of making a computer unsecure... as long as they are making software that is configurable they should be teaching people how to use it properly and securely, that is why this is a good idea... (consequently, microsoft has been teaching security for many years)
 

xyyz

Diamond Member
Sep 3, 2000
4,331
0
0
Originally posted by: kamper
I just had to laugh when I read this. I suppose it's not so stupid but the initial idea of Microsoft training other people about security is pretty funny.

no offense, but grow up. this is more the rubbish a silly script kiddie who wears a pengin tee-shirt 'cause it makes him *look* 733t would say. it's not something you'd ever catch from the mouth of a seasoned administrator.

what's this supposed to mean? any OS worthy of an enterprise environment needs to be hardened. you think linux, off the bat is any more secure than win2k3 server? a poorly configured machine, even if it's an OpenBSD machine is a big security risk.

the entire point of security is to be proactive about it. this means doing anything from locking down your boxes to generating and applying a solid security policy that covers everything from from the physical to the theoretical (well maybe not so much theoretical... but you know what i mean.)

personally, i think it's a great idea that MSFT is offering these free hands-on training seminars to those who want to know how to secure their MSFT systems.
 

Sunner

Elite Member
Oct 9, 1999
11,641
0
76
IMO Microsoft's biggest security issue isn't with their code, at least not these days.
It's the fact that their general "way of thinking" encourages bad admin habits.

Wizards preconfiguring everything, cure manuals explaining things is far too simple terms, etc, the result is the vast number of incometent Windows admins out there.
In the case of servers, forcing people to RTFM is a Good Thing.
 

chsh1ca

Golden Member
Feb 17, 2003
1,179
0
0
Originally posted by: drag
Full disclosure is what makes OS's more safer then they were just a few years ago. MS saying full disclosure is hurting them is marketing BS and an attempt to point the finger at other people.
I agree with that statement, but keep in mind, full disclosure's biggest con has got to be the ease with which a virus/worm developer and/or cracker can develop new malware to expoit it. The proof is in the pudding, or in this case, in the history of virus releases.

By and large I agree with the rest of your post, however the one caveat is that there are lazy sysadmins. Full disclosure of the vulnerability after MS has issued patches still didn't stop Code Red, or Nimda, as an example. Not every sysadmin routinely applies patches to their servers.
 

kamper

Diamond Member
Mar 18, 2003
5,513
0
0
I should apologize to those who have been offended by this thread (my posts in particular). I should let it be known that I go to school who's cs department is strongly anti-microsoft and it definitely rubs off. Picking on ms is kinda fun and, you'd have to admit, fairly easy pickings. If it makes you feel better you can truthfully pass me off as a linux-geek wannabe who is just defensive because of microsoft's growing success in enterprise markets.

My comment about buggy code was not meant to imply that any operating system (or any code) is bug free. I am a software developper and I know that. It just seems like everytime I read about a new vulnerability in windows it's because of some programmer that didn't do a basic security check and that microsoft is passing the majority of the work in fixing the problem off to admins. But the admission that patching is not a sufficient security measure is a step in the right direction, props to ms on that. My initial reaction to the linked article was that this was a large step straight back in the other direction, that's why I laughed.

So no more of this "elitist Microsoft bashing" for me, I've had my little rant.
 

n0cmonkey

Elite Member
Jun 10, 2001
42,936
1
0
Rants are good. I'm anti-microsoft for the most part myself. I think some of the steps they are taking (XP sp2's off by default stance, education, etc) is a good thing.

The OP wasn't too bad, and it sparked some conversation. And it was a little more interesting than the usual around here lately. :)
 

chsh1ca

Golden Member
Feb 17, 2003
1,179
0
0
Originally posted by: n0cmonkey
Rants are good. I'm anti-microsoft for the most part myself.
Don't forget Anti-Linux, and Anti-Solaris :)P), and Anti-MacOS, and so on...

The OP wasn't too bad, and it sparked some conversation. And it was a little more interesting than the usual around here lately. :)
Agreed. The thread subject isn't an outright flame either.
 

n0cmonkey

Elite Member
Jun 10, 2001
42,936
1
0
Originally posted by: chsh1ca
Originally posted by: n0cmonkey
Rants are good. I'm anti-microsoft for the most part myself.
Don't forget Anti-Linux, and Anti-Solaris :)P), and Anti-MacOS, and so on...

Linux I just don't get. Slowaris is kind of annoying, but I think my ultra 1e will have it installed. And I'm using Mac OS X right now (but Mac OS was horrid) ;)

The OP wasn't too bad, and it sparked some conversation. And it was a little more interesting than the usual around here lately. :)
Agreed. The thread subject isn't an outright flame either.

Yeah it was. But I think it was one of those flames that even Microsofties could chuckle about at a bar.