Tuesday, October 26, 2021

Gates Misses the Mark, and the Point, on Security

Bill Gates wants us to believe security is Microsoft’s new Number One

priority. He wants us to believe they have the users’ best interests at

heart.

I, personally, want to believe the moon is made of green cheese. The

problem with both of these situations is I know too much for either to

ever happen.

Until Microsoft announces a major effort to rearchitect the source code

for the Windows operating system, everything he says about security

should fall on deaf ears.

Windows machines account for somewhere between 70 and 90 percent of all

computers on the Internet — for safety’s sake, we’ll put those numbers

in the U.S. Windows’ Number One selling point is ease-of-use for the end

user. Well, that and it’s cute, too.

From the beginning, the emphasis has not been on security.

How can I make such a bold statement? Two words: Buffer Overflow.

In the very first class I took in programming (those many years ago), we

were berated class after class about proper bounds checking to prevent

buffer overflows. What this means in simple terms is that every time my

program asked the user for input, it had better check to make sure the

input fit in the place I reserved for it. If I asked for a ”Y/N” and I

got a ”yes” or a ”no”, those extra characters had to go somewhere and

I had better be prepared for them.

Buffer overflows are just the beginning of security flaws written into

the Windows operating system.

Gates states that the new IE 7.0 will fix ”most security flaws” in

Internet Explorer. That’s great, but it will only be available to

WindowsXP Service Pack 2 users. What? If you’re running Windows 2000,

that’s just too darn bad. Security isn’t for you.

But that’s kind of OK, because it really isn’t for the XP SP2 crowd,

either.

Why is that? Service Pack 2 is a package of patches, updates, and fixes

all rolled into one large executable. It’s also the size of a small

operating system (about 40Mb). And it doesn’t fix everything or we

wouldn’t currently be experiencing the revival of the MyDoom virus on

networks around the world.

According to Microsoft, there are

more than 70 security patches rolled into Service Pack 2. This doesn’t

include the ones that are listed as base operating system patches, IE

patches, RPC patches and ”other”, many of which involve that little

thing known as the Buffer Overflow, which ”could allow arbitrary code

execution”.

My favorite patch in Service Pack 2 is listed as Windows XP and Windows

XP Service Pack 1 (SP1) Kernel Rollup Hotfix Package. Do you want to know

what this fixes? It fixes a Buffer Overflow in Service Pack 1.

Yah, it’s all about the security.

The week before the recent RSA Conference in San Francisco, Microsoft

announced 14 new vulnerabilities in Windows XP. Since the first of the

year, there have been more than 20 vulnerabilities found in Windows, and

these are just the ones being tracked by the SANS Critical Vulnerability

Assessment group.

In 2001, when XP was released, it was held up as a new paradigm in

operating systems, built to withstand the foibles of the older DOS-based

OS. But Service Pack 1 came out in late 2002, the patch to the patch was

released in May 2003 and Service Pack 2 was released in November of 2004.

It’s clear they haven’t gotten it worked out yet. But they are going to

continue to throw patches and hotfixes at the problem rather than resolve

the underlying weakness in the source code.

To top it all off, there are free operating systems on the Internet that

are smaller than the latest Service Pack. Yes. They are complete

operating systems that will run on your PC, and that are smaller than

Microsoft’s latest patch rollup.

There also are free browsers that do a much, much better job of

preventing the installation of subversive code without your knowledge.

They also block all those annoying popup ads, which are the source of

much spyware. Why isn’t everyone bolting for a more secure, better

managed operating system? They don’t have the Windows-like simple

interface and plug-n-play abilities. In some cases, they aren’t even

cute.

But what about free browsers? Why wait for the latest and greatest

Internet Explorer to come out this summer? Take a look at Firefox and see

what you think for yourself.

And we can’t forget that buffer overflows are just one example of

vulnerabilities.

Windows users are under threat from privilege elevation exploits,

denial-of-service attacks, spyware and malware, which are probably the

most insidious of all vulnerabilities.

At the recent RSA conference, Gates said security is a challenging area.

”New threats are emerging all the time… but we’re working to mitigate

those problems,” he added.

But the question remains — What is being done about preventing the

threat in the first place?

If you don’t build a house made of glass, every rock-throwing little kid

won’t be a threat.

One argument that I’ve heard from various sources is that Microsoft is a

victim of it’s own popularity. Because it is the predominant operating

system in use, the bad guys target it for attack because the victim pool

is so large.

My response is phrased in a simple proverb I learned in my childhood —

”To whom much is given, much shall be required.”

Microsoft has the money and the resources, and it has an obligation to

the people who swear by Windows to do it right, and do it right the first

time. Gates wants more market share. He wants the space shuttle to run

Windows (And to be honest, it probably already DOES run Windows on some

systems. Isn’t that a scary thought?) But he never acknowledges the need

to complete a top down/bottom up overhaul of the existing code base.

If I had the money Gates does, I could write an operating system that

incorporates security, does everything Windows does for the user, and

more.

It’s never been about security for Microsoft and I don’t think it is now.

Similar articles

Latest Articles