decoration decoration
Stories

GROKLAW
When you want to know more...
decoration
For layout only
Home
Archives
Site Map
Search
About Groklaw
Awards
Legal Research
Timelines
ApplevSamsung
ApplevSamsung p.2
ArchiveExplorer
Autozone
Bilski
Cases
Cast: Lawyers
Comes v. MS
Contracts/Documents
Courts
DRM
Gordon v MS
GPL
Grokdoc
HTML How To
IPI v RH
IV v. Google
Legal Docs
Lodsys
MS Litigations
MSvB&N
News Picks
Novell v. MS
Novell-MS Deal
ODF/OOXML
OOXML Appeals
OraclevGoogle
Patents
ProjectMonterey
Psystar
Quote Database
Red Hat v SCO
Salus Book
SCEA v Hotz
SCO Appeals
SCO Bankruptcy
SCO Financials
SCO Overview
SCO v IBM
SCO v Novell
SCO:Soup2Nuts
SCOsource
Sean Daly
Software Patents
Switch to Linux
Transcripts
Unix Books

Gear

Groklaw Gear

Click here to send an email to the editor of this weblog.


You won't find me on Facebook


Donate

Donate Paypal


No Legal Advice

The information on Groklaw is not intended to constitute legal advice. While Mark is a lawyer and he has asked other lawyers and law students to contribute articles, all of these articles are offered to help educate, not to provide specific legal advice. They are not your lawyers.

Here's Groklaw's comments policy.


What's New

STORIES
No new stories

COMMENTS last 48 hrs
No new comments


Sponsors

Hosting:
hosted by ibiblio

On servers donated to ibiblio by AMD.

Webmaster
Dueling Studies on Security and TCO in Windows and Linux
Friday, October 22 2004 @ 01:13 PM EDT

The Register has something you'll be interested in, a detailed study of security in Windows and Linux by Nicholas Petreley. The link is to the article, and the full report is here. The conclusion after all the slicing and dicing?

Linux is inherently more secure.

You might want to have the study handy when folks start quoting Steve Ballmer at you:

"'We're more secure than the other guys,' Ballmer said, blaming the sheer volume of attacks against his company's products on their popularity and the resulting fame that can be gained by hacking them. 'There are more vulnerabilities in Linux, it takes longer for Linux developers to fix security problems. It's a good decision to go with Windows.'"

According to Petreley, not true.

From Petreley's Executive Summary:

"We compared Windows vs. Linux by examining the following metrics in the 40 most recent patches/vulnerabilities listed for Microsoft Windows Server 2003 vs. Red Hat Enterprise Linux AS v.3 . . . . The results were not unexpected. Even by Microsoft's subjective and flawed standards, fully 38% of the most recent patches address flaws that Microsoft ranks as Critical. Only 10% of Red Hat's patches and alerts address flaws of Critical severity. These results are easily demonstrated to be generous to Microsoft and arguably harsh with Red Hat, since the above results are based on Microsoft's ratings rather than our more stringent application of the security metrics. If we were to apply our own metrics, it would increase the number of Critical flaws in Windows Server 2003 to 50%.

"We queried the United States Computer Emergency Readiness Team (CERT) database, and the CERT data confirms our conclusions by a more dramatic margin. When we queried the database to present results in order of severity from most critical to least critical, 39 of the first 40 entries in the CERT database for Windows are rated above the CERT threshold for a severe alert. Only three of the first 40 entries were above the threshold when we queried the database about Red Hat. When we queried the CERT database about Linux, only 6 of the first 40 entries were above the threshold."

If you like to do comparisons of your own, Microsoft's "Get the Facts" website has white papers galore, the best that money can buy, and some others as well. Laura DiDio's two-part study on TCO is hilariously headlined:

Large Enterprises: Switching from Windows to Linux "Prohibitively Expensive, Extremely Complex, Provides No Tangible Business Gains".

Talk about your loyal servant. She never adds in the cost of coping with viruses and other malware. *No* tangible business gain? I'd say having an inherently more secure operating system is a tangible business gain by any metric, but suit yourself. Joe Barr does his own analysis, factoring in the costs of a visit from the BSA. Here's another study, that found the opposite of Ms. DiDio:

"Companies with at least 2,000 employees can reduce their total cost of ownership (TCO) by as much as 26 percent over three years by using Linux servers over Windows, and 12 percent on open-source office applications over Office products from Microsoft Corp., said Soreon, an IT researcher who focuses exclusively on European markets."

The savings, they say, come from reduced license fees and operating costs. Even Gartner now says that Open Source is a value proposition. Gartner Vice President Mark Driver at their yearly conference Symposium/ITxpo is reported to have repeatedly said, "You'd be stupid not to use open source as part of your application management strategy." I'm sure he wasn't intentionally calling anybody else's study stupid or anything.

Speaking of headlines, here's my personal favorite, as a counterpoint to Microsoft's amusing spin on the DiDio study, from CXOtoday.com Business News for Technology Buyers:

"If Microsoft's Cheaper Than Linux, The Earth's Flat."

It says it all, no?


  


Dueling Studies on Security and TCO in Windows and Linux | 205 comments | Create New Account
Comments belong to whoever posts them. Please notify us of inappropriate comments.
Dueling Studies on Security and TCO in Windows and Linux
Authored by: Anonymous on Friday, October 22 2004 @ 02:28 PM EDT
Corrections HERE! (please)

[ Reply to This | # ]

I post this, then a few minutes later, the topic changes, ah well....
Authored by: skip on Friday, October 22 2004 @ 02:28 PM EDT
A year ago last thursday, I was strolling in the zoo
When I met a man who thought he knew the lot
He was laying down the law about the hackers and The FOSS
And the number of patents a Microsoft has got
So I asked him "What's that Kernel's name?" and he answered
"That's a Unix!"
And I'd have gone on thinking that was true
If the animal in question hadn't put that chap to shame,
And remarked "I ain't a Unix I'm a GNU!

I'm a GNU I'm a GNU
The g-nicest piece of software in the zoo
I'm a GNU how do you do?
You really oughtta g-know w-who's w-who
I'm a GNU spelt G - N - U
I'm not a SCO or a microsoft tha'noo
So let me introduce, I'm neither man nor moose
Oh, g-no, g-no, g-no, I'm a GNU!"

I had taken a few chances by declaring I'd be free
Whence I travelled first with Stallman at MIT
On the second night I stayed there I was wakened from a dream
Which I'll tell you all about some other time
Among the hunting trophies on the wall above my bed
Stuffed and mounted was a face I thought I knew
A bsd? An Unix? a win32 or three?
Then I seem to hear a voice—"I'm a GNU!

I'm a GNU—a-g-nother GNU
I wish I could g-nash my teeth at you
I'm a GNU A G-linux Gnu?
You really oughtta g-know w-who's w-who
I'm not a daft old McBride who'll sue
Nor am I in the least like that dreadful hearty beast
Oh, g-no, g-no, g-no, I'm a GNU!
G-no, g-no, g-no, I'm a GNU!
G-no, g-no, g-no, I'm a GNU!"

---

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
"Mumbo, perhaps. Jumbo, perhaps not!"
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

[ Reply to This | # ]

Official "The SCO Group" Positions -8 days without an offical post
Authored by: skip on Friday, October 22 2004 @ 02:33 PM EDT
Main posts in this thread may only be made by senior managers or attorneys for
"The SCO Group". Main posts must use the name and position of the
poster at "The SCO Group". Main posters must post in their official
capacity at "The SCO Group".

Sub-posts will also be allowed from non-"The SCO Group" employees or
attorneys. Sub-posts from persons not connected with "The SCO Group"
must be very polite, address other posters and the main poster with the
honorific "Mr." or "Mrs." or "Ms.", as
appropriate, use correct surnames, not call names or suggest or imply unethical
or illegal conduct by "The SCO Group" or its employees or attorneys.
This thread requires an extremely high standard of conduct and even slightly
marginal posts will be deleted.

P.J. says you must be on your very best behavior.

If you want to comment on this thread, please post under "O/T"

---

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
"Mumbo, perhaps. Jumbo, perhaps not!"
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

[ Reply to This | # ]

The problem of course is crediblity
Authored by: Turin on Friday, October 22 2004 @ 02:36 PM EDT
Unfortunately, Petreley is about as credible as Ballmer. Petreley has been
bashing Microsoft for over 10 years, first as an OS/2 zealot and now as a late
convert to the Linux side of the house since IBM shelved OS/2 after losing the
desktop wars back in the 90's.

Someone a little more evenhanded is appropriate for a security or TCO
evaluation, methinks.

[ Reply to This | # ]

Dueling Studies on Security and TCO in Windows and Linux
Authored by: blacklight on Friday, October 22 2004 @ 02:53 PM EDT
"'We're more secure than the other guys,' Ballmer said, blaming the sheer
volume of attacks against his company's products on their popularity and the
resulting fame that can be gained by hacking them. 'There are more
vulnerabilities in Linux, it takes longer for Linux developers to fix security
problems. It's a good decision to go with Windows.'" Steve Ballmer

I am going through a garbage experience where I have spent the last two weeks
working out the methodology for centrally securing the settings of a 100+
network of Windows XP SP1 desktops. Right now, I am finishing the selection of
1100 GPO parameter settings on my custom speadsheet, which I put together from
scratch. I figure that if I were dealing with Windows XP SP2, I would have to go
through a minimum of 1500 GPO parameter settings. I may be unfair, but this kind
of fine-grained selection capability has a lot more with petty micromanagement
than with creating any real security. In fact, I will state straight out that
the GPO's are a micromanager's or a control freak's wet dream. Anybody who has
seriously thought about security wouldn't be burying the security parameters
among 1500 parameters, would he or she? As for the TCO: my CEO is painfully
aware of how much my time is costing him.

Steve Ballmer very much reminds me of those Big Three auto executives in the
80's who were going on and on as to how much their cars were superiors to the
Japanese imports.

[ Reply to This | # ]

Off topic and trolls here
Authored by: Anonymous on Friday, October 22 2004 @ 02:55 PM EDT
\ \ \ \ \ \ \

Trolls please post umopəpısdn.

\\\ Cyp \\\

\ \ \ \ \ \ \

[ Reply to This | # ]

This is a bridge....
Authored by: tiger99 on Friday, October 22 2004 @ 02:56 PM EDT
... where all good Trolls can lurk. Come on, say something.

[ Reply to This | # ]

Dueling Studies on Security and TCO in Windows and Linux
Authored by: Anonymous on Friday, October 22 2004 @ 03:16 PM EDT
Of course it costs more to switch from Windows to Linux.
That's why you should start off with Linux in the first place!

[ Reply to This | # ]

Get the Facts...
Authored by: Slimbo on Friday, October 22 2004 @ 03:30 PM EDT
I get alot of IT trade publications. Normally Microsoft rotates their GTF adds,
but for the last several weeks it has been nothing but full page Laura Didio
studies. I think they've lost hope on the other studies.

[ Reply to This | # ]

Possible bias in "facts"
Authored by: Anonymous on Friday, October 22 2004 @ 03:42 PM EDT
In general I agree with the conclusions but disagree with some of the "facts" brought up in the document. I already used The Register site to reply and will see what kind of feedback I get. To summarize:
  1. The broad condemntation of RPCs is over the top to me. There are certainly valid uses of RPCs and ignores that you can use RPCs without exposing the interface to the network.
  2. Does not mention that once you break a network server, the cracker then loads / runs a root exploit (if available) to get to root access. It raises the bar but does not significantly delay the determined cracker.
  3. The Linux kernel is by no means "minimal" and includes a lot of stuff that could be run in user land. It is certainly advantageous that there is less "inside" the boundary than on Windows, but that isn't a compelling argument for better security under Linux.
I mention these because I believe these issues can be dealt with better and as-is, the overall conclusions are weakened.

[ Reply to This | # ]

Metrics on Lock-in
Authored by: Anonymous on Friday, October 22 2004 @ 04:04 PM EDT
I wonder if anyone has tried to create metrics for including the cost of vendor
lock-in.

While it's true that there is inertia moving from one Linux distribution to
another, it's minimal in comparison to moving from Windows to anything else.

And, the situation is likely to get much worse, with Longhorn lock-in will be
the key feature!

I would suggest that there is a huge cost differential between moving from
Windows to Linux now, and moving in years to come - Microsoft is going to make
it as hard as possible to get off Windows (and MS Office).

My advice, find the areas in you company that have least inertia, and move them
ASAP.

Example - File and printer sharing, switch each file share and printer share
piece by piece to a Samba server. Low disruption, low cost. Depending on
current setup, it may be possible to do without users even noticing.

Plus - instant benefit, as the servers will stay up and running without
attention. Also, you may be able to make better use of your resources - no need
to use X Windows, so more shares and printers on the same kind of hardware.

Desktops will probably provide the most inertia. Many applications have not
been designed to run on Linux - but typically, only a small number of
applications require Windows.

If no alternative is available, it may be possible to get by with terminal
services, or VMWare.

I guess my main point is that TCO of Windows vs GNU/Linux will diverge. MS is
already having trouble keeping up with FOSS development, and will have
difficulty selling customers on new OSes without new features, but once DRM
kicks in, Windows will be hard to get rid of.

Don't just look at the numbers now, but look at where they are going.

[ Reply to This | # ]

"If Microsoft's Cheaper Than Linux, The Earth's Flat."
Authored by: ray08 on Friday, October 22 2004 @ 04:09 PM EDT
I'm sure if you ask Stevie, he would argue that the world is indeed flat, if
that's a requirement for winblows to be cheaper. IMHO, in Stevie's alternate
reality, the world is flat (just look around), pigs can (but don't) fly, and
h*ll is a very cold place even in July. And he has the money to buy all the
necessary studies to prove it!

More seriously, it's called propaganda (brain washing). Tell people the same
thing enough times from different sources, and they start to believe it. Hitler,
et al, were masters of it. I hope the masses are smart enough to sort through M$
crapola.

---
Caldera is toast! And Groklaw is the toaster! (with toast level set to BURN)

[ Reply to This | # ]

Yellowing newspaper cutting
Authored by: Anonymous on Friday, October 22 2004 @ 04:17 PM EDT
I kept (I wish I knew where it was right now) a copy of a newspaper article in The Age newspaper in Melbourne from about five years ago entitled "Linux won't change the world," about the Gartner group's examination of the future of our favourite operating system.

I knew that one day it would come around to bite them in their highly-paid, ignorant, collective asses.

[ Reply to This | # ]

Reminds me of a signature I saw the other day....
Authored by: penfold on Friday, October 22 2004 @ 04:24 PM EDT
I think it is probably the easiest answer to all of the numbers thrown about in
the "Get the facts."

"98.36 of all statistics are fiction."

Sometimes it is too easy to get buried in the details. I am certainly thinking
of keeping this report handy to put the "Of Life" spin on Microsoft's
marketing campaign. :)

However, I think I will quote the above witty one liner to anyone preaching to
be about M$ and ask them if they wanted to dicuss things that may cause them to
question what their "Get the facts" brochure wants them to believe.

---
The worth of man is determined by the battle between good and evil in the mans
subconcious.The Evil within is so strong that the way to win is to deny it
battle

[ Reply to This | # ]

This seems to go beyond the posting rules.
Authored by: seanlynch on Friday, October 22 2004 @ 04:46 PM EDT
Please read the posting rules for this weblog, and please respect them.

[ Reply to This | # ]

PJ, please consider removing the parent post...!!!
Authored by: Groklaw Lurker on Friday, October 22 2004 @ 04:52 PM EDT
This post violates one or more of the posting guidelines on Groklaw and thus,
should be removed.

---
(GL) Groklaw Lurker
End the tyranny, abolish software patents.

[ Reply to This | # ]

Boy - you must be desparate..
Authored by: cheros on Friday, October 22 2004 @ 05:09 PM EDT
I knew there was a reason why IP addresses were logged..

[ Reply to This | # ]

Windows Is Insecure By Design
Authored by: Prototrm on Friday, October 22 2004 @ 05:16 PM EDT
As I've stated here and on the Linux Gazette (the .net one) before, it's not
possible to make Windows secure without making major changes to the basic design
of the OS. Windows is a single-user operating system with a thin layer of
multi-user painted on top. Programs and system services can interact on such an
intimate level that a flaw anywhere in the OS can compromise the entire system.
Notice how many things break with the additional security in XP's Service Pack
2. It's like having repeated unprotected group sex with complete strangers.

And another thing: can someone explain to me why some programs, such as Doom 3,
*require* administrator access in order to run? This is a *game*, for cryin' out
loud, not a low-level security or disk utility tool! This is the sort of thing
that almost forces you to give your User ID the Windows equivalent of Root
access, which is a dangerous thing to do.

At this point, Microsoft doesn't dare fix the bad design. If it did, there would
be even more broken applications than with SP2. All it can do is treat the
symptoms as they appear, and hope to keep ahead of the deluge. I'm reminded of
an old 3 Stooges short, where they're in a boat that's leaking and Larry drills
a hole in the bottom to "let the water out".

Until Microsoft is willing to break backward compatibility, which it will never
do, it will never make Windows as secure as Linux/Unix.

[ Reply to This | # ]

Tragic, just tragic...
Authored by: Groklaw Lurker on Friday, October 22 2004 @ 05:25 PM EDT
It is sad to think that managerial employees of SCO are reduced to posts such as
this. One must wonder what ever will become of them...

---
(GL) Groklaw Lurker
End the tyranny, abolish software patents.

[ Reply to This | # ]

Pamela Jones and Merkey
Authored by: Greebo on Friday, October 22 2004 @ 05:50 PM EDT
Wrong section Anon. The Troll thread is up the page a bit.

If you think anyone here believes any of this BS you are sadly mistaken. Actions speak louder than words, and PJ has shown herself to be a woman of integrity, honesty, and good judgement. Jeff Merkey on the other hand.... well, just read some of the stuff on LKML, and what he has allegidly posted on Groklaw as anon and i think you'll soon see the difference.

So i you think we're going to put any faith in the words of an anonomous coward you are sadly mistaken.

Sad. Very, very sad.

Greebo

---
-----------------------------------------
Recent Linux Convert and Scared Cat Owner

[ Reply to This | # ]

Troll score 3/10 Way too obvious
Authored by: Anonymous on Friday, October 22 2004 @ 06:11 PM EDT
You really need to take some troll lessons.

[ Reply to This | # ]

It would seem
Authored by: overshoot on Friday, October 22 2004 @ 06:11 PM EDT
That there are exceptions to the GrokLaw posting-in-good-taste rules.

In particular, there is no limit to the defamatory bad taste allowed in posts attacking PJ personally. I can understand the reasons for bending over backwards for them, but it saddens me regardless.

[ Reply to This | # ]

Dueling Studies on Security and TCO in Windows and Linux
Authored by: Anonymous on Friday, October 22 2004 @ 06:12 PM EDT
While not contesting the Petreley results in general, they must know one thing:
the CERT vulnerability metrics are partly based on a product's 'popularity'.
And, IE has a >90% market share. I'm also sure there are more Windows
machines. Probably CERT even measures the average user's knowledge (dunno about
this). So, the higher metrics come partly from what Ballmer said, really. I must
also state that I don't dare to connect to the internet using Windows. I use
Win98 without connecting it to the Net.

[ Reply to This | # ]

DO NOT DELETE THE PARENT!
Authored by: Anonymous on Friday, October 22 2004 @ 06:36 PM EDT
This must remain in the public record so that others can know about this
disgusting behaviour! As abhorrent as it is, we must learn to deal with the
ugliness that encompasses someone like Merkey.

Whether the post is from Merkey or one of his supporters, it serves as a
testament to the type of person that he is, and/or the type of people he
associates with.

DELETE NOT, I say.... and let the truth exist, for the public to view. I can
guarantee that if he files a lawsuit against Pamela, this will come back to
haunt him.


[ Reply to This | # ]

Overkill character terminal emulators
Authored by: Anonymous on Saturday, October 23 2004 @ 05:07 AM EDT
The simple fact is that many, if not most, of the people that have desktop PCs on their desks do not employ them as desktop computers at all, but merely clients to various back-end processes such as the Internet, file servers etc.

Or even as just terminal emulators! I have recently taken to peering over counters while visiting various shops to see what kind of business systems the clerks use, and one very common theme seems to be running a terminal emulator on Windows NT! The actual business is done with some bigger computer in the back room (or central office), and these people havd a gigaherz, multimegabyte system with a bloated OS running a terminal emulator app that could be easily handled with a 1970's vintage 8-bit processor and about ten kilobytes of memory...

(I used to have an old leftover "smart" ADM42 terminal at home that was actually implemented that way: Outwardly a huge beast but inside it was an 8-bit Motorola 6800, memory chips and assorted TTL logic on a big board, and of couse the video hw. The smartness meant it could be optionally programmed to handle simple form filling locally and send the finished form at one go).

[ Reply to This | # ]

Flawed by Design
Authored by: sproggit on Saturday, October 23 2004 @ 08:53 AM EDT
When all is said and done, no operating system is 100% perfect. We've had posts like this on Groklaw before, and the common theme is that they draw zealots the same way that magnets draw iron filings...Reading this today, I was interested in the lack of specific observations or facts. Another common theme for such debates.

In other words, this debate is flawed by design. And you thought my post title was a reference to one OS or other, didn't you?

Just so you know, until about 5 years ago I was an admiring believer in Microsoft, and their commitment to producing complete, integrated software. I got annoyed with their bugs, sure, but really liked NT4, SQL6.5, VB5 and the like. I wrote a fair amount of software for the VB5/SQL6.5 model. Then Microsoft started to change their behaviour, and from about 97 onwards the growth of the internet released a plague of viruses. My interest waned.

I now run GNU/Linux by choice because I believe it to be more secure. I will not claim to be an expert [perhaps just an experienced user], but chose not to continue with Microsoft because of what I believe to be serious flaws. I prefer to be specific, so here they are. If we have reasoned debaters on GL today, feel free to respond. Objective is to move the debate forward, not start or compound a flame war, OK?


  1. Buffer Overflows.This flaw is typically found in software written in the C or C++ programming language, and manifests when data written to a memory storage area overflows that area of code, corrupting neighbouring memory. This can allow malicious users to alter the functioning of the program by means of carefully crafted attacks. It can be difficult to implement, but exceptionally dangerous when done well. This is a common flaw in Microsoft software and one we have seen many times over. It happens in Linux too, but in practice the massive "peer review" process of the Linux community catches this type of error very well. To quote Linus, "Many eyeballs make all bugs shallow". Microsoft has simply failed to address this with better tools, even though they have the money to do so.

  2. Feature Failure. Microsoft, in the early days, earned market share by offering more and better features than the competition. Excel defeated Lotus 1-2-3, for instance. IE vanquished Navigator [but here comes Firefox]. Microsoft became accustomed to this model of beating the competition. "Add more features" became a way of life. We've seen their products bloat and bloat and bloat until MS Office takes a 170Mb footprint when installed. But with this rush to add features, we've seen a wild disregard for simple checks and balances. A new feature [say Windows Scripting Host] is introduced, because MS perceive that unix shell scripting has no counterpart in Windows. But the designers cheerfully ignore basic security principles and we have as a result the fact that I could email you a message with a script attached to it that says "FORMAT C: /Y" and if you open my attachment your machine would be wiped out. [OK, this has been largely written out by now, but how the heck did this get written in the first place?] No self-respecting Linux hacker would produce that kind of feature, surely?

    As a complete aside, this approach fell short with the Linux community. Sponsored and started by "hard-core" tekkies who had lost interest in the bloat of Windows, Linux produced lean, nimble environments, and small, sharp tools that performed their job with neat efficiency. Interest in "the next best feature" evapourated. Microsoft failed to spot this sea change and are only now struggling to change their focus.

  3. Inter-Process Communication. Another rarer but no less dangerous flaw in Windows is more subtle to detect. Say you have two programs running on your machine. Both can take advantage of Windows features such as OLE [Object Linking and Embedding] and basic Windows IPC. Except that with Windows, the program sending the message talks to the OS, which then talks to the receiver. This means that the receiver knows it is talking to the Operating System [which it trusts implicitly]. An otherwise harmless piece of software with trojan code inside it can search your PC for a running app [MS Word, anyone, or, heaven forbid, IE] and just start talking. A skilled programmer could do a lot of damage with this. Yes, it's true that Linux has pipes and actively encourages data exchange with human-readable flat files. But the fact that this happens in this way, with process talking to process, and operating via files to which ownerships can be specified, helps to reduce or eliminate what would otherwise be a security flaw.

    Another aside, and to be fair, I personally see the more granular and refined file level security of NT onwards [via NTFS] to be considerably superior to that of unix clones such as Linux. I live in hope that one day someone will sponsor a project for a kernel extension and a new file system type that allows for more refined FGAC [Fine Grained Access Control] at the file level.

  4. Active-X. This came about through successive generations of Microsoft's Visual C++ and Visual Basic work, seeking to produce new and ever better paradigms for coding out to other software and the operating system itself. Then Active-X found a whole new lease of life in the web world, where developers could write Active-X modules that could be downloaded and executed by Explorer. So this was cheerfully introduced with little thought to security. The MS response? A check-box in IE settings that lets you turn off IE 's use of Active-X. Closing the stable door after the horse bolted. Yet another example of adding feature without stopping to ask the most basic security questions.

  5. Lack of Architecture or Interfaces. This might not seem so obvious at first. Steve Ballmer speaks reverently of the power [monopoly] of the Windows API. Features get added in the rush to keep the developers happy. But it's random. There is no clear, clean design. The interfaces themselves are not clearly structured, have no flowing, logical design. Half of them aren't even published, for crying out loud! I own the Visual Basic 5 Programmers' Reference Manual and it's a hefty tome, no mistake. It's also seriously incomplete, because Microsoft don't release all their API calls to the "public". I suspect [have no proof] that this is because they want their applications to run better than their competitors.

    But the simple truth is that under the covers the architecture of Windows itself has been badly chopped around since they bought the Digital OS Team and wrote Windows NT 3.1. There is no clear segmentation. They move major components into and out of the kernel [like the video subsystem] for performance reasons, or other arbitary factors, without considering consequences. Under the covers the Windows API is just a morass of hashed together code. Windows, like many OS, was originally designed as a ring system, with Ring0 being the kernel. There are [or should be] clear rules about "who can call what function from where". When Microsoft move large chunks of code around under the covers, those original boundaries start to break, become vulnerable. In my very limited experience Linux copes with this reasonably well. I do have issues with certain module inter-dependencies, but it's largely pretty sound. Windows, on the other hand, is a nightmare. I've already mentioned the video subsystem, but what about networking? What a nightmare!

    Windows originally shipped with NetBEUI [NetBIOS Extended User Interface] as standard. TCP/IP was originally an extra protocol shipped with NT. It was never properly written. Because windows doesn't readily adopt the concept of daemons or subsystems, IP networking became written into the OS in a haphazard way. This makes it's behaviour much more vulnerable to attack. For example, with a Linux host it is possible to bring the host up in stand-alone mode, with networking disabled. With Windows the only way to do this is unplug the cable from the NIC. With Linux it's possible to recycle the networking subsystem [inetd] without killing programs or services that are using it. With Windows this is just not the case. Microsoft made a lot of the fact that Windows NT was certified by the US Government as being C2 compliant. [C2 is a security accreditation, where A1 is the best]. That certification [C2] was only valid for stand-alone machines. OK, before the flames start, I must acknowledge that this is old news. I've run Windows2000 but not XP and not Server 2003, so I don't know if they have improved. Somehow I don't think so.

  6. Development Culture
    I've actually worked with Microsoft and ex-Microsoft Developers and know a little of the way that they produce code. One of the ideas is the concept of the bug-tracking system. As a developer at MS, you are allowed to work on new functions or features in your code. Every night, their CVS systems take the uploaded source and produce builds of code, which are then released to testers. As a developer, you may then get bugs posted against your code. You can continue to work on new features until you get to a maximum bug count. Then you have to stop the new stuff and go fix bugs. At any point in time, a large project like Windows XP might have thousands of known bugs. But here's the thing. Microsoft are still willing to RTM a product [Release To Manufacturing] that has known flaws - perhaps even thousands of them. They argue that the Linux community is no better. The truth is that the Linux community clearly labels beta code as beta. Literally thousands or millions of developers work on testing, and code is very rarely released until it is ready. I'm writing this post using Firefox 1.0PR. I started using the browser in the 0.8 releases, accepting it to be a reasonably solid beta. Haven't had a single problem. MS, on the other hand, don't even publish a "known bugs" list when they ship a new product. Why? Would you buy Windows XP on release day if you knew it had thousands of known bugs and flaws? I don't think so!!! The difference is that MS are taking your money. When you download FOSS, you are not being robbed.


Common Themes and Ideas
As we consider the [subjective and one-sided] points I have raised here, I suggest to you that there is both a common theme to these perceived weaknesses in Windows, and a common thread between the difference in culture between Microsoft and GNU/Linux.

Microsoft come from a commercial world in which they have thrived by having more and better software features than anyone else. This rush to add functionality has been made at the expense of everything else. When did you last see a Microsoft announcement that said simply, "We've been busy and with this patch we've squashed all these bugs." Never happened. They can't even do that without folding in "new features". It's almost like a phobia.

The GNU/Linux community are purely tekkies [can you imagine the FOSS community having an Open Source Marketing Department? Anyone watch Dilbert?] The FOSS community are interested in different things: sharing, learning, collaborating, and most importantly of all, raising the quality of their artwork [and it is artwork] to the highest possible level they can attain. They will review and rewrite and enhance and polish until what's left is a sculptured work of art. There is no commercial rush, no competitor to beat. The only thing that matters is the quality of the code.

These are intrinsically different ideals and for this reason alone the religious debate between Open and Closed software development will rage on through the years. Enjoy your posts. Throw in a few trolls if you really have to [pick the right post to respond to though, please]. At the end of the day, make your choice.

When you do, please remember one thing. Today, you have a choice. Then look around, and ask yourself who out there is protecting and enhancing that freedom of choice, and who is trying to take it away, to legislate against it, or patent it.

To [mis-]quote a line from "A Few Good Men",

Those are the facts of the case, and they are undisputed.




[ Reply to This | # ]

  • Flawed by Design - Authored by: Anonymous on Saturday, October 23 2004 @ 09:32 AM EDT
  • Flawed by Design - Authored by: Anonymous on Saturday, October 23 2004 @ 11:33 PM EDT
  • Flawed by Design - Authored by: Anonymous on Saturday, October 23 2004 @ 11:46 PM EDT
  • Fun with ACLs - Authored by: Zartan on Sunday, October 24 2004 @ 06:19 AM EDT
TCO a personal experience
Authored by: cpw on Saturday, October 23 2004 @ 01:01 PM EDT
Well I just had to do it! What did I have to do? well, install Windblows SP2 thats what!. It was my own stupid fault, and I can hear you all chuckling away, and I can picture you all now with big, cheesy "Told you so" smirks on your sickeningly smug faces.

I'm an IT contractor (Unix/Linux/Perl) and I have a dual boot system at home in the office with XP and SuSE 9.1 installed, anyway last Wednesday I was checking my email using Windows (Thunderbird in case you're wondering) when up pops the message "New updates are available" so being mildly paranoid and knowing the good old MS rep for being vulnerable to all sorts of strange electrically transmitted diseases, I decided to perform the required upgrade, bad move, very, very, bad move! Now don't get me wrong, my eyes were open, and yes, I'd heard all horror stories about SP2 previously, but having used the MS update system in the past without problem I just thought "Yeah well, there may be the odd snag or two but probably nothing I can't sort out" so I proceeded to download and install the update (all 90MB of it!). When it had completed I performed the mandatory reboot and that's when the full horror of my situation began to manifest itself. I use a wireless network here and also have Norton Antivirus and Firewall s/w installed.

Of course the first thing I do is try out the network connectivity, not a sausage, bu**er all! sweet FA, I quickly find out that as far as any form of networking is concerned my system is about as useful as a chocolate teapot! Close inspection reveals that good old MS has decided that no one else's software is as good as there's and so have turned on the firewall by default, in principle, and for your average home user, probably a sound idea, but as far as I'm concerned a totally rubbish one! Why won't it detect 3rd party software? anyway, I have a perfectly adequate 3rd party product so I'll use that, so switch off the firewall. Does it work now? nope! anyway after several happy evening hours spent trying to breath some form of network related life into something that to all intents and purposes is more suited to the task of a boat anchor rather than that of a high-tech piece of computer kit, I decide that the only thing for it is to re-install good old Microshaft Windblows from scratch and also put up with all the fallout that that entails. Which I have duly done but not after having to spend many hours performing a task that I should never have had to do in the first place!

The reason I relate this sad little story is this; If I had been a (non-tech-savvy) propietor of a small business (which come to think of it I probably am) that relied heavily on having a network capability, say for incoming orders or whatever, this little episode would have ended up costing me big time as I would have not only been off-line and losing money in the form of orders, but (in the absence of a service contract) I would probably have had to pay a premium for someone to come and sort this mess out!

A subsequent visit to the M$ website detailed an enormous number of problems with SP2, and I feel these were not indicated with nearly enough emphasis on the update alert that I was presented with. There are so many problems with installing SP2 that I have to take the view that it should never have been released in it's present form in the first place, quite frankly I think it is a totally irresponsible thing to do, this "stuff" (I hesitate to call it software) is rubbish and so obviously "not of merchantable quality" that I can only marvel at the total audacity of releasing it in the first place.

So message to M$:
a) Don't talk to me about TCO, quite frankly, I can't afford your ineptitude.
b) GRUB has now been configured to boot Linux by default.

Say it with flowers, send Bill a Triffid.

CPW

[ Reply to This | # ]

Dueling Studies on Security and TCO in Windows and Linux
Authored by: Anonymous on Saturday, October 23 2004 @ 09:54 PM EDT
I make part of my living supporting linux systems, using linux as a "swiss
knife for network" (read somewhere else). At the end someone has to pay me
for this job.

Yes, that costs money to these companies, but also it would cost money to
mantain a windows box. These m$ studies do not mantion this little fact, as if
the upgrades and patches m$ releases every time will do it. at the end this
adds up to the TCO.

My service is not only mantain, also do something better and new. I know the
systems, so I can suggest better ways to do it.

IBM learned this fact some years ago, they have gone fully into services, that
need hardware and software. Well IBM sells a solution, not only a piece of
hard/software, but a service to keep that thing going on, configure, adapt to
new needs, etc.

m$ has been "starting" to do this, but what they really do is sell a
whole bunch of things that the customer does not need, but as were adviced by
m$, they finally buy. Even m$ has some sort of "independent experts"
that do the advice, but in the end are recomended by m$... guess why!. I am not
saying IBM does not do this, but I have certain experience with m$ advices...
Other companies also have gone in making advices, interesting ones... to say the
least.

Theses "get the facts" studies are only for those who don't really
understand what it means to keep a system running. Each company is a different
world, everybody has different needs, some are similar: email, web, internet
surf, login, files, print; but the needs that make the bussiness, the ones that
bring real money, are extremely different. Theses "facts" from m$ do
not count on that, as if every shop is the same.

I think the companies that go the m$ way, are people that know nothing of
computers, that only know what the salesman told them; and also think that they
are the best. If people that really know take decision, definitely not the
rule, there would not be so much problems, but when people that know nothing
decide... auch!

Someone I know uses to say: "the world is composed by 99% stupids and 1%
intelligent people. What one need to do is be on that 1%, and live of the
99%". I remember this every day :)



Ivan

[ Reply to This | # ]

About Didio "expert"
Authored by: Anonymous on Saturday, October 23 2004 @ 11:12 PM EDT
I remember that over a year ago when sco was saying that they had tons and
millons of lines of "copied code", that this Didio were one of the
"witnesses" the sign the NDA with sco to "see" the code.

I was thinking... if she is the great expert she is, I would believe that her
history _is_ true, why would she lie on a subject like this, in the end, her
reputation is on hold.

So I ask, why has sco not appointed her as a witness? Also, can IBM do that?
She told she saw "the infringing code".



I think I know the real answer...

Ivan

[ Reply to This | # ]

RPC calls and multiple SQL Servers loaded?
Authored by: Wesley_Parish on Sunday, October 24 2004 @ 06:06 AM EDT

That scared the proverbial out of me! If anything exemplifies bad design to me, that's it!

And all done in the name of maximizing Microsoft profits by making SQL Server the default so that people stop thinking of Oracle, DB/2 and other competitors ...

Someone needs to spend time in the slammer, obviously, but who?

---
finagement: The Vampire's veins and Pacific torturers stretching back through his own season. Well, cutting like a child on one of these states of view, I duck

[ Reply to This | # ]

I don't get it
Authored by: Anonymous on Monday, October 25 2004 @ 03:01 PM EDT

How can any discussion of TCO include as much stuff as is included in those studies and on this page, and completely miss the question of how much one's data is worth to them. The risk to one's data, or to the ability to access that data, is, IMO, a major consideration when one considers TCO.

Here, Windows is simply not a contender. The official MS strategy now is that versions of Windows prior to XP will not get real security updates, hence no such version of Windows is a contender. Should you happen to update your hardware, Windows XP or later requires Microsoft approval (re-activation) before you can access your data. Hence, unless you really trust Microsoft to both be there and do the "right thing," your data is at great risk if you "go with" Windows. Anyone who trusts Microsoft, is, IMO, little less than crazy.

Unless one has data of relatively low value, I don't see how people can even call this a contest.

[ Reply to This | # ]

  • I don't get it - Authored by: Anonymous on Wednesday, October 27 2004 @ 07:17 AM EDT
Groklaw © Copyright 2003-2013 Pamela Jones.
All trademarks and copyrights on this page are owned by their respective owners.
Comments are owned by the individual posters.

PJ's articles are licensed under a Creative Commons License. ( Details )