![]()  |     ||||||||
![]()  |     ||||||||
![]()  |   ||||||||
|         A               Grain of Salt Reloaded  (November               2004) 
 This               feature is a 'technical advice' article. It is devoted to help consumer               advisors to make informed decisions about what product and technologies               can offer benefits to consumers. The issue treated is particular               and needs to be integrated in order to give complete assessments               on consumer products (ie. this paper debates some aspect in computer               security, but a computer product is 'much more' than its security               alone). This said, it needs to be remembered that we try to report               informed opinions to the public, but they are only opinions, and               nothing more. Use them for your benefit and remember that this feature               is open (as the rest of this magazine) to peer review. You'll find               our e-mail addresses reading www.thinkmagazine2.org. 
 1 
 A recent press release by Mi2g (http://www.mi2g.co.uk) UK security consultants again stigmatizes poor security of Linux (and to a lesser extent of Windows) giving statistics about overt attacks performed by crackers (cybercriminals) on machines connected permanently to the Internet. Since this kind of machines very usually are servers and since "MI2G               is basing part of their research job relying on Zone-H.org databases" http://www.zone-h.org/en/winvslinux               (Year 2003) which               archive defacements of web servers (very typical overt attacks)               we could focus on the server panorama... For               now, here is the raw data (one year ending Nov.2004): on a total               of 235,907 successful digital breaches Linux               accounts for 65.64 per cent  of               the total successful overt attacks. 
 Top               Developers 
 One               can object that Apache does not mean Linux. It's true. Perhaps the               most valid contestant to Linux in the Apache arena is FreeBSD. In               fact a news release by Netcraft (June 2004) was saying: http://news.netcraft.com/archives/2004/06/07/nearly_25_million_active_sites_running_freebsd.html This would place Linux around 60% of the total share of active hostnames (not parked domains). To resume briefly (please notice: VERY ROUGH ESTIMATES): 
 
 Linux               overt attacks 65.64%  
 There               not seems to be a clear difference between attacks to Windows and               Linux platforms, in terms of sheer probability. BSDs on the contrary               seem to fare rather well. However, weighing in the millions of hosts               compromised by Windows server worms like SQL Slammer and others               (see as reference our previous feature),               this could spell bad news for overall 'real world' security of Windows               server platforms. 
 Please               notice: here we aren't discussing 'absolute security' of the various               platforms, just 'average security' in normal condition of use. This               includes human error (misconfigurations, etc). So don't take it               on the religious side.  
 One could object that since mass hostings usually happen on Linux and BSD platforms, these should be far more attacked than they are...after all if I was a cracker I'd go only after big providers with poorly administered free homepages. This is a good argument, and if proven true could place BSDs in the Olympus and Linux quite well off in this kind of analysis, but I have no reliable data to investigate further on this issue. 
 
 In               a later press release, Mi2g addressed the market share issue comparing               the overall market share of the various platforms, including desktops.               Since many manual overt attacks happen to webservers, I find the               present analysis more accurate. Mi2g continued stating that one               of the most valuable data about reliability of online platform is               uptime, and pointed to a Netcraft analysis stating that the longest               webserver uptimes are 'owned' by BSD platfoms. For reference see               http://uptime.netcraft.com/up/today/top.avg.html 
 But be sure to have a look to the following uptime FAQ, also on Netcraft (emphasis mine): 
 
 
 
 
 The               Linux kernel switched to a higher internal timer rate at kernel               version 2.5.26. Linux 2.4 used a rate of 100Hz. Linux 2.6 uses a               timer at 1000Hz. (An explanation of the HZ setting in Linux.) 
 Mi2g also periodically gives estimates about damages made by the various types of attacks. Since the amount of damage a compromise does depends widely on the importance of data contained in the compromised machine (ie. Government servers are usually more critical than mine), this seems not very related to the present article. Therefore I won't comment on this issue. 
 security.html 
 
 3 A final joke 
 
 
 Now, back to reality 
 (From               'The Register') "80               per cent of home PCs infected - survey (...)They               found that nearly all Windows PCs are infected with some form of               malware(...)" Also remember that many widespread Windows worms open backdoors into compromised desktop and server machines, effectively r00ting them to benefit crackers for either manual or automatic, mostly covert, exploits. 
 Conclusion 
 -Speaking               of servers, a good advice would be to use good service providers,               regardless to the used OS. Servers are very exposed to many kinds               of compromises, and need competent staff to handle them. Prefer               paid contracts with some degree of service guarantee, if available. -Speaking               of desktops, the simple fact of using alternative platforms seems               to restrict very much the chances to be infected or however compromised. -Best practice, though, is to use the OS you prefer and know well (provided it's actively patched and updated by the manufacturer), patching and assisting it with attention. If all the systems deployed were patched and configured in a timely manner most exploits, either manual or automatic, simply wouldn't happen. 
 
 From               Mi2g site 
 
 
 
 
 
  |     ||||||||