Allow me to reply in like kind to the largest batch of misinformation I've seen come out of a major American multinational since "so easy to use, no wonder we're number one." Point-by-point analysis of the quoted article:
Microsoft's Security Chief Says Windows Safer Than Linux
By what standard, pray tell? Perhaps we'll find out more as we go on...
Microsoft's top security honcho insisted Thursday that Microsoft "is making progress on security using any reasonable metric."
Would "any reasonable metric" include independent review of clear-box code? No? Why is that? Oh, that's right, Windows is
black-box, making such analysis - for all practical intents and purposes - IMPOSSIBLE.
Mike Nash, the company's chief security executive, made the comment during an online chat session just days after Microsoft rolled out its biggest bunch of Windows patches since April 2004.
If that isn't the pot calling the kettle black. You mean these vulnerabilites are
at least a year old? How many others JUST LIKE THEM are we unaware of because of the propietary procedures used to guard the Windows source? Better yet, how is keeping the kernel closed - when malicious hackers are doing their damnedest to decompile it - keeping it secure? Where's the logic to the conclusion that's being drawn here?
Nash staunchly defended the Redmond, Wash.-based developer's progress, and compared Windows' flaws with those in open-source Linux operating systems from Red Hat and Novell's SuSE.
You can't do that. You really CANNOT. A mass of root-level security breaches, that took 365+ days to fix, versus a handful of root accesses that were fixed within weeks, if not days, of being noticed by a number of independent coders in the kernel sources?
"Even with the relatively large number of bulletins we released this week, we compare favorably," he said. "Year-to-date for 2005, Microsoft has fixed 15 vulnerabilities affecting Windows Server 2003. In the same time period, for just this year, Red Hat Enterprise Linux 3 users have had to patch 34 vulnerabilities and SuSE Enterprise Linux 9 users have had to patch over 78 vulnerabilities."
Of which, how many were critical flaws? How many on each system? Last I checked, there were maybe five common vulneabilities among the Linux distros, and those were all fixed within moments of being noticed. How many were root-level flaws on Windows? Last I checked, by design, most - if not all - of them. Nash, you're also making a faulty comparison by rationalizing each patched vulnerability as a known root-level exploit. You can't do that and expect an honest outcome, particularly when your OWN product has what is likely a GREATER number of exploits that nobody - save a handful of coders that can't read their own source because of the lack of comments, for design "efficiency" - can find, let alone comprehend. Just because nobody robs the house, that doesn't mean the door was closed and locked. Likewise, just because the door was closed and locked, that doesn't mean nobody robbed the house (by climbing in the Windows,
). It goes both ways.
Nash also said that the number of patches shouldn't be the only criteria users apply to tell if Microsoft's doing its job. "Note that this is just one measure, and doesn't take into consideration all of the other progress we're making, with security guidance for customers, improving security manageability and introducing innovative security solutions and technologies," he said.
I'm going to give him the benefit of the doubt here. He may be delusional, but he brings up a valid point, despite the fact that he fails to practice what he preaches. If your source was open, you wouldn't HAVE to guide customers to security fixes (well, not the majority, at any rate), they'd find the patches and/or fix them themselves. Oh, and Windows Security Center is nothing to be proud of by any stretch of the imagination. You should have done that when XP first came out, if not sooner. Don't say you "introduce innovative security solutions and technologies" either, most of those can be backtraced to companies you either bought out or drove out of business by swiping
their open-source code and closing it, in flagrant violation of the LGPL. That being said, at least you didn't claim you "
invent security solutions and technologies."
When asked if Microsoft would consider refining its four-step severity rating system to give additional guidance to enterprises wrestling with deciding which of the 10 critical vulnerabilities of Tuesday to patch first, Nash said that for 2005, the rankings will remain as is.
That's the first sensical thing I've heard yet, although I still think "Root / Negligible" would be simpler than the current four-level severity ranking. That is to say, you either can get root access with the exploit, or you cannot.
Nash also took questions about this week's acquisition of Sybari Software, a maker of enterprise-oriented anti-virus and anti-spam add-ons for messaging platforms such as Microsoft Exchange and Lotus Notes. In particular, he said that the anti-virus scanning engine acquired in 2003's purchase of Romania-based GeCAD would be supported by Sybari's products this year.
Thanks for the insight Sherlock. An acquired corporation's engine being supported by said corporation's products? What a novel concept. Microsoft should look into it some time.
That move may put additional pressure on third-party vendors whose engines are currently supported by Sybari, which include those from Sophos, Computer Associates, and Kaspersky Labs.
That would be precisely why I use
BitDefender,
SpywareBlaster, and
Ad-aware SE almost exclusively on systems where my client insists on using Windows.
Although he refused to get specific about when Microsoft will release desktop AV software, the company is "working hard on it." It will be based on the GeCAD technologies, he said, but with numerous enhancements.
"GeCAD was very solid when we acquired it . . . That said, there were some things we wanted to improve. We feel very good about the progress we have made [and] know we have to have great technology before we ship our own desktop AV solution."
F.U.D. I'm not certain that this product will ever materialize beyond vaporware dreams of entering the AV/SE market, but if it does, it will almost certainly be broken in myriad ways detectable only to those who break the source and thus void their install rights. It might be interesting to see whether this detects Alexa, or considers it a "valuable browser add-on."
The combination of the Sybari purchase and the looming entry of Microsoft into the desktop anti-virus market has investors in major security firms like Symantec and McAfee worried.
So invest in Softwin. Better yet, turn your funds to better use with RedHat or SuSE, or consider financing your neighborhood computer construction shop.
As well they should, wrote three Gartner analysts Wednesday. "The Sybari architecture will also enable Microsoft to plug in its own AV engine," Gartner analysts Neil MacDonald, Arabella Hallawell, and Maurene Caplan Grey wrote. "Gartner believes Microsoft AV engine, along with its signature service, will be the foundation of Microsoft's forthcoming desktop offering."
Yeah, Windows BORG. Resistance is futile.
The AV engine would be the one developed from GeCAD, the same that Sybari's products will support when the acquisition closes sometime before the end of the second quarter.
"We have not announced the availability date of our desktop AV solution at this point," said Nash. "That said, we do expect to have the GeCAD engine available on the Sybari platform soon after the deal closes. I would certainly expect that to be this year."
So basically, you're admitting to making vaporware claims, and anti-competitive behaviour. Oh come on, make your OWN product for once. You might like it.
Nash also repeatedly said that it would be important for Microsoft to tie its various security tools together in the enterprise. "We do think that there needs to be a management capability to allow enterprises to both control and monitor their security technologies like anti-spam and anti-virus," he said. "We're currently working through specific requirements."
To their credit, Windows Security Center doesn't block out competing scanner technologies. It even lets you set your own. For now. That's the part that's of concern to both myself and numerous third-party vendors: will Microsoft use WSC against the consumer once it enters the AV/SE market? If past behaviour is any indication, it will be possible to install other software, but increasingly difficult and unappealing considering the convenience of having integrated software - despite the inherent danger to the end user of complacency with such measures.
In a final note, Nash said that Windows AntiSpyware, the tool acquired during its December 2004, purchase of Giant Company Software, will go through at least one more beta version before it's released. In related news, Microsoft's anti-spyware product has been targeted by virus writers, in what experts believe is the beginning of what will be a salvo of malware attacks on Microsoft security products.
As other Microsoft executives have said in the past, Nash wouldn't reveal whether AntiSpyware would continue to be offered free (as the beta is now), or whether fees would be charged. "We have not yet finalized the packaging/licensing, but will communicate that as soon as it's determined, so stay tuned," he said.
Oh, I can tell you what the license will read. "Not for use on more than one computer at a time," it will read. "Usage on multiple systems will be subject to site license fees, and such software must be removed
at the vendor's behest." So, if your company starts getting any bright ideas about using McAfee on Windows, don't expect their security offering to stay enabled. In fact, you can expect visits from their "vendor rights" goons, telling you you'll lose your Windows licensor status if you distribute it with anything
BUT Microsoft's own AV package. They've done it to hardware vendors, and they did it to companies that bundled Netscape with their systems by default. Don't expect them to change that behaviour any time soon. Last I heard, AntiSpyware was just fine; I suspect Microsoft needs time to remove the comments to befuddle future coders, and to split the classes into black-boxed components. Yee-haw boys, I look forward to charging users
double to remove spyware from their boxes when they happen to be infested with
your malware. If you were to fix the holes in your OS, you wouldn't
need to sink your hard-earned (HA!) funds into a spyware/anti-virus engine, but then you'd never sell any upgrades.
The marketing wheels churn on, let's see what FUD the Redmond Boyz release next.