| Subject: Re: seti runs better on win or linux |
| From: AthlonRob |
| Date: 10/10/2003, 21:05 |
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
NotDashEscaped: You need GnuPG to verify this message
On Fri, 10 Oct 2003 07:06:53 -0700, Rich <someone@someplace.com> wrote:
A big point about Linux and open-source is that problems and exploits
are widely published and quickly fixed VERY QUICKLY.
Perhaps, but this does not mean that most users know about, or update
their systems. Even unix sys admins don't do a reliable job, as the
last worm demonstrated.
I think things have changed in that regard. I don't remember a worm
hitting unix/linux server in the last year. These days, when a possible
exploit is found, patches are usually available within hours and within
a day everybody is aware of the problem and has their systems patched.
Sure, there are exceptions to this rule, but they're becoming far less
common these days.
There's many eyes to scrutinize for problems and there's no big
marketing department to get in the way of _real_ progress.
And no central planning or control, which makes what gets done
somewhat hit or miss.
Central planning or control? You mean one big company making all the
software?
Naw, doesn't sound like a good idea, and definitely makes me think
things would be more hit-or-miss.
It's very easy to follow different servers you're running. There are
centralized security mailing lists available. When a bug is found in,
say, OpenSSL (just had one found a week or two back)... it gets patched
ASAP and people running servers with OpenSSL on them find out through
their distro's security mailing list.
In a sense, the distributions themselves help act as a central
repository for things like security holes. The people running the
projects that make the servers themselves patch bugs after they're
found. If they don't, you switch to a different server, as Linux is all
about choice.
You also have a security model that has survived 30+ years of very
thorough testing!
I believe that by default, most linux's come with the ftpd running,
etc..., and as a result they are mostly open to attack, especially for
uninformed users. Unix was designed more for an open environment than
security, although of course it's still much better than Windows.
While some do still ship with ftpd running, that isn't opening them up
for attack. The ftp server that runs isn't an anonymous FTP server. It
isn't one that comes with known security exploits. It's one the
distribution maker deemed safe.
Most distros these days seem to ship with a default firewall to close
off services to the outsid world. Those that don't tend to be targetted
at people who have a Clue and can set up a firewall themselves... and
already know what servers they have listening on what ports.
But I've seen many security problems on unix systems over the years,
usually of the buffer overflow variety that allows a root shell to
be obtained. Unix is no more secure than it's system admin. Now for
home systems this is rarely a big problem. But how many companies have
had credit card numbers stolen by a hacker, from unix based systems?
How many govt agencies have had sensitive information stolen, from
unix systems, by hackers? Check out "The Cuckoo's Egg".
http://www.amazon.com/exec/obidos/tg/detail/-/0743411463/102-9899101-0828923?v=glance
These cases aren't really near as common as you make them out to be.
And you might be surprised at how many of those credit card numbers are
stored on Windoze servers. A recent 'hacking' incident left Valve
software reeling from the theft of the HalfLife2 source code. It was
all Windows involved there.
I think for every Unix/Linux hacking story, you can come up with three
for Windows. And Unix/Linux servers are still more common than Windows
servers.
I'd strongly suggest that you don't just assume that linux is safe.
Hackers could discover a bug tomorrow and everything could change.
I'd still bet that Linux is better than windows, but I also bet that
few Linux owners keep their systems up to date or apply security patches.
Naw, I think most Linux users (I don't think there's such a thing as a
Linux owner, really) do keep more up to date with security patches than
that.
And sure, a hacker tomorrow could find a security hole in Linux that
changes everything, but it would be changed back within a few hours, as
past examples have shown.
--
Rob | If not safe,
Email and Jabber: | one can never be free.
athlonrob at axpr dot net |
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (GNU/Linux)
iD8DBQE/hxEYhm6KEoOOAe0RArRtAJ0T6YrEG+5GC8OwEuKATCWBPe33FQCggg3n
AEIWG2yMnyQlsC/qipH3b88=
=0SlJ
-----END PGP SIGNATURE-----