Subject: Re: seti runs better on win or linux
From: Martin
Date: 12/10/2003, 03:30
Newsgroups: alt.sci.seti,sci.astro.seti

Other posters have already answered all this well, but here's a few additional snippets...


(To summarise! The 'pressures' and support for Linux guide it far more favourably than the very aggressive pressures driving MS. Consequently, the resultant OSes are developed to very different standards and quality and thoroughness...)


Rich wrote:

Martin replied:
[...]
Note that certain OSes are more vulnerable by _design_ due to their marketing compromised design philosophy...

I'm not sure I understand what you are saying. Are you saying that
Marketing tells the OS group to design the OS to be vulnerable?

In effect, yes. And deliberately so... There's also a historical bias.

The MS OSes were hacked up from a shell running on DOS with the idea of a single user on an isolated machine (eg the pre Win95 stuff).

A _lot_ of the single user ideas remain entrenched in the OS structures. Add on top of this the very aggressive marketing requirements to add features and unfettered freedom in rapid increments to keep the cash flowing in... Very severe compromises continue to be made and some rather poor design decisions have been forced which has made the present very successful mess (note the puns (:-))...

Note also that the OS design has been skewed on occasion specifically to lock out 3rd party competition. MS has been fielding multiple anti-trust law suits for over a decade!


Unix and thence Linux has been multi-user with a well defined security model right from over 30 years ago... It has also had an incredibly rich and diverse development path.


[...]
Flawed design? How do you differentiate between implementation and design?

'Design' as in how the functional units and layers are defined and then how those different parts interact to provide a platform from which users and applications can get something done.

For example, do you have one functional unit that has authority over the printer port, or can any piece of program access it directly unfettered?... (BTW: all the hierarchy for a printer spool queue is a Very Good Idea!...)

The designed structure of the MS OSes have very poor security that as an aside help ease implementing bodge fixes. Also, the structure helps maximise freedoms and speed up rapid feature development. These freedoms also consequently permit easy abuses. All is good enough on an isolated machine. However, communication to it opens up the vulnerabilities.

The 'restricted users' on NT and W2K and later are half a security fix at the expense of requiring being 'administrated'. Fine in business circles, but expensive and convoluted in how it is done.


Linux cheated BTW, it took the design from another OS, lock, stock and
barrel.

Yes, and quite right too! Linux has however had its code written from scratch by some very able dedicated programmers. (No marketing deadlines!)


Windows grew out of DOS, which was a cross-compiled version of
CP/M designed by Gary Kiddal (RIP). Unix also owes it's legacy to
another existing OS. Both have their roots in history.

Yes, so?
Very different beginnings in very different contexts.


[...]
Especially when marketing puts on pressure to leverage value from that updating, including deliberate feature breakage and EULA ransoms.

Can you document this? And what do you mean by ransoms?

Google for WPA, driver certification, office document formats, java, xml, MS adopted standards in general... MS have a policy of 'embrace and expand' to ensure proprietary lock-in of your data. And then you have to pay to upgrade.

A recent essential security update also forcibly updated your EULA if you wanted to be saved by the update!

An unrelated example soon coming up is that of the internet chat protocols. (Not seen any comments as to _why_ the changes.)


Aside: http://www.lowendmac.com/musings/microsoft.shtml
gives a terse MS history. Skip down to Micrsoft 402 for the juicy bits.


[...]
The Chinese choice. Not sure if this is a good thing or not.

Sorry, I don't understand. Please expand.

The story's a bit old but I found this...

    http://www.ale.org/archive/ale/ale-1999-11/msg00310.html

    Linux, the official OS of Red China
    http://www.ga-source.com/linux/news/bits/10+10+1999/16:54:2.shtml

    The Chinese government is so enthusiastic about the community ethos
    behind the open source community that it is making Linux the official
    operating system of the Peoples Republic of China, thanks to a deal
[...]

Yes, and a fair few other _countries_ and states have adopted Linux. Some are freely contributing to it too.

The Chinese regime may even be influenced for the better as the more open culture of Linux permeates through (:-P)


[...]
I think this is more of a problem. Which distribution do you choose? If you
don't know the difference, how do you decide?

Much better than 'take it or leave it' and being held to ransom also with aggressive proprietary lock-in.

The choices available can be an education, and then also they can be simplified. My local group are doing just this for a Linux 'awareness day'.


[...]
Using third party firewalls is just a kludge to patch up the OS holes for the many exploits available in MS products.

I don't know af a major company which does not have a dedicated firewall
between themselves and their intranet. Your fanaticism is quite fascinating.

Passionate rather than fanatical I hope! Then also, you sound very well indoctrinated in the 'MS' religion.

Seeing that there are alternatives could be described as being akin to those in the film 'The Matrix' waking up to their new reality. The MS marketing machine is deep and devious and pervasive and very effective.

So much so, there are suspicions of newsnet postings from supposed MS zealots whom are in fact paid employees of whatever PR consultants hired by MS...


[...]
Good security can be considered as a layered 'onion' approach.

You don't seem to like some layers. ...

With MS Windows you pretty much only have the firewall to rely upon!
[...]

The layered onion model of security assumes that you will have significantly more than _just_ the one outer layer!


[...]
    The "Linux.Slapper.Worm" targets Linux servers running Apache Web
[...]
    By Monday morning, Slapper had infected 11,249 machines.

    "For reference, Code Red -- which is known as the worst Web worm so far
    -- managed to infect only a couple of hundred servers within a similar
    time frame," Hypponen said. "Code Red then went on to infect over
    300,000 Web servers during its peak in July 2001 and is still alive
    today."
[...]

No systems are perfect. But then, how do the numbers above compare to the multiple really rampant MS worms of the last few weeks? There's likely two or more orders of magnitude difference!

Linux is a very much harder nut to crack than MS systems...


I understand that you don't know how to make a Windows system secure,
I don't understand that this makes Linux secure.

I've got very good experience of making MS Windows systems as secure as is reasonable. Linux is much less opaque and easier to work on and with.

(And I've wasted far too many hours on the various MS security and updates issues...)


[...]
And open source is a dual edged sword. It's trivial for a hacker to examine
the source code to find vulnerabilities, you don't need to black-box it.

There's more eyes all-round to do the scrutinising. Human society works as well as it does because more of those eyes have good intent behind them than the very few mal-contents. Also, the evil doers tend to be too blind ignorant to do much other than be opportunistic. The evil-superbrain 'Moriarties' of the world are vanishingly few.


Now imagine what effect on the net of a linux virus that infects China.

Possibly cause no more than a "Was that it?" of insignificance...

(Unless the regime includes a general security hole in the name of empowering 'central control'... But then this sounds like the MS updates that themselves have been exploited...)


...And then there's the suspicions of various 'phoning home' tricks. Whether really true or not, we cannot easily know or find out or trust the marketing misinformation.

I don't understand what you are talking about here.

Unpublished data snooping/ spying/ monitoring for 'marketing' purposes. Already done on the web by some advertising companies at least.



[...]
Very true. Bill Gates made a very aggressive business out of selling deliberately buggy software.

Can you document this "deliberately buggy" part?

MS have a well known policy of getting their code out of the door. It is just a question of how aggressive their marketing is as to how honest they are about known bugs and fixing whatever bugs.

No code is perfect. However, there is a wide spectrum of how honest companies are...


There's the classic story of his first BASIC interpreter being sold with known trig function errors...


[...]
Summary:

All the above systems mentioned have their place. However, I feel that MS have significantly upped the ante with their latest EULAs, and have been a detriment to Computer Science in general over the last few years with their marketing driven product and subsequent misplaced efforts...

I quite agree about the EULAs. But I don't see how computer science is
affected.

I believe that all the expense and distraction of MS and their marketing driven GUI and work methods have slowed the development effort for a much improve Human-Computer interface. We now have monolithic competition consuming almost 'one-way' that has stifled alternative developments.


And there are very good useful alternatives available...

Depends, usually it's the applications that drive the platform, which was
why the killer app for the original mac was desktop publishing. If you
[...]

And killer apps still leverage the market.

A unique point of Linux is that it is following very different guiding pressures.


A good article for showing one side of MS is:

Windows XP Shows the Direction Microsoft is Going
http://www.hevanet.com/peace/microsoft.htm

And a more extensive article is:

2003 And Beyond
http://www.aaxnet.com/editor/edit029.html#mspath

(Note, a beer or few required to aid digestion of the above (:-))


Phew!

Regards,
Martin



-- 
----------   Give a man a fish and you have fed him for today.
- Martin -   Teach him how to fish and he won't bother you for weeks!
- 53N 1W -   - Anon
----------