Skip to content or view mobile version

Home | Mobile | Editorial | Mission | Privacy | About | Contact | Help | Security | Support

A network of individuals, independent and alternative media activists and organisations, offering grassroots, non-corporate, non-commercial coverage of important social and political issues.

Hidden Article

This posting has been hidden because it breaches the Indymedia UK (IMC UK) Editorial Guidelines.

IMC UK is an interactive site offering inclusive participation. All postings to the open publishing newswire are the responsibility of the individual authors and not of IMC UK. Although IMC UK volunteers attempt to ensure accuracy of the newswire, they take no responsibility legal or otherwise for the contents of the open publishing site. Mention of external web sites or services is for information purposes only and constitutes neither an endorsement nor a recommendation.

Good News for Linux Users (Must Read)

The Don | 23.01.2005 02:24

I personally hate Microsoft since its software is so full of Security holes
I thought I share this with everyone. I personally would recommend Linux
since its cheaper to run and more stable.

Happy Reading MS haters!



You may retrieve this story by entering QuickLink# 52057

> Return to story


Study: Linux server attacks declining
An unpatched Linux system lasts about three months before it's compromised


News Story by Matthew Broersma






JANUARY 20, 2005 (TECHWORLD.COM) - Attackers are no longer bothering to attack average Linux systems, apparently because there's so much more money to be made from invading Windows, according to security researchers.

The Honeynet Project, which sets up Linux networks in order to observe attack activity, found that the life expectancy of such systems has dramatically increased from two years ago. Its 2004 findings, published recently, found that an unpatched Linux system lasts, on average, three months before it is compromised. That's compared with about 72 hours for 2001-02.

Some of the project's systems were exposed to the Internet for nine months without a successful attack.

The project's "honeynets" -- networks of two or more "honeypots" -- are designed to detect random attacks on the Internet. Such attacks are carried out on targets that are detected through random searching, scanning and hacking systems such as worms and autorooters, rather than particular attacks focused on specific targets. A honeypot is a system set up for the purpose of attracting random attack activity.

Since overall Internet attacks don't seem to be going down, the project's researchers theorized that the focus of hacking activity has shifted to Windows systems, simply because the platform is so widespread that it presents an irresistible target.

"It's now easier to hack the end user than hacking the bank," said Lance Spitzner, president of the Honeynet Project. "Banks are well protected; end users are not. Hack enough end users, and you can make as much, if not more, than hacking the bank."

While the project didn't carry out comparative research using Windows, Spitzner pointed out that research from security organizations such as Symantec Corp. and the Internet Storm Center (ISC) has found no shortage of attacks on Windows honeypots. For example, an ISC project involving Windows systems measures survival time in minutes rather than hours.

The average survival time for the systems the ISC tests has declined from about 55 minutes in the autumn of 2003 to just under 20 minutes at the end of 2004, although those figures are an improvement from a low of 15 minutes in the spring of 2004. Microsoft says survival rates for Windows should decline as Windows XP Service Pack 2 becomes more widely used, because the update is designed to make Windows' default configuration more secure.

The project deliberately focused on average systems that didn't present any particular attraction to attackers -- in the real world, the equivalent would be home networks or small and medium-size businesses. The project deployed 12 honeynets in eight countries -- the U.S., India, the U.K., Pakistan, Greece, Portugal, Brazil and Germany -- consisting of a total of 24 unpatched Unix and Unix-like honeypots. Nineteen of the systems were Linux, mostly Red Hat, including one Red Hat 7.2 system, five Red Hat 7.3 systems, one using Red Hat 8.0, eight using Red Hat 9.0 and two Fedora Core 1 systems. Other deployments included one SUSE 7.2 system, one SUSE 6.3 system, two Solaris Sparc 8 systems, two Solaris Sparc 9 systems and one using Free-BSD 4.4.

Services such as SSH, HTTPS, FTP and SMB were enabled, with inbound connections to these services allowed. Some of the systems also used insecure or easily guessed passwords. The systems weren't registered in the Domain Name System or search engines, so they could be found only by automated means.

The situation for high-value Linux systems, such as company Web servers, CVS (Concurrent Versions System) repositories or research networks, is potentially very different, Spitzner said. "I'm sure these high-value Linux systems are prime targets and are attacked every day, if not every hour. If vulnerable, they would be hacked very soon," he said.

Older Linux systems were more likely to be successfully attacked than newer deployments, probably because more vulnerabilities have been uncovered and attackers have had time to learn which exploits work, the project found. This also reflects the fact that default Linux installations are becoming more secure, the project said.

Once they compromised systems, attackers used them mainly for Internet Relay Chat bouncing, bots and the hosting of phishing scams, the project found. On at least one of the systems, attackers attempted to set up a fake bank in order to harvest bank and credit card information.

The Honeynet Project is a nonprofit research organization supported by a number of security companies, including Foundstone Inc., Counterpane Internet Security Inc., SecurityFocus.com and Sourcefire Inc.


 http://www.computerworld.com/securitytopics/security/story/0,10801,99080,00.html

The Don

Upcoming Coverage
View and post events
Upcoming Events UK
24th October, London: 2015 London Anarchist Bookfair
2nd - 8th November: Wrexham, Wales, UK & Everywhere: Week of Action Against the North Wales Prison & the Prison Industrial Complex. Cymraeg: Wythnos o Weithredu yn Erbyn Carchar Gogledd Cymru

Ongoing UK
Every Tuesday 6pm-8pm, Yorkshire: Demo/vigil at NSA/NRO Menwith Hill US Spy Base More info: CAAB.

Every Tuesday, UK & worldwide: Counter Terror Tuesdays. Call the US Embassy nearest to you to protest Obama's Terror Tuesdays. More info here

Every day, London: Vigil for Julian Assange outside Ecuadorian Embassy

Parliament Sq Protest: see topic page
Ongoing Global
Rossport, Ireland: see topic page
Israel-Palestine: Israel Indymedia | Palestine Indymedia
Oaxaca: Chiapas Indymedia
Regions
All Regions
Birmingham
Cambridge
Liverpool
London
Oxford
Sheffield
South Coast
Wales
World
Other Local IMCs
Bristol/South West
Nottingham
Scotland
Social Media
You can follow @ukindymedia on indy.im and Twitter. We are working on a Twitter policy. We do not use Facebook, and advise you not to either.
Support Us
We need help paying the bills for hosting this site, please consider supporting us financially.
Other Media Projects
Schnews
Dissident Island Radio
Corporate Watch
Media Lens
VisionOnTV
Earth First! Action Update
Earth First! Action Reports
Topics
All Topics
Afghanistan
Analysis
Animal Liberation
Anti-Nuclear
Anti-militarism
Anti-racism
Bio-technology
Climate Chaos
Culture
Ecology
Education
Energy Crisis
Fracking
Free Spaces
Gender
Globalisation
Health
History
Indymedia
Iraq
Migration
Ocean Defence
Other Press
Palestine
Policing
Public sector cuts
Repression
Social Struggles
Technology
Terror War
Workers' Movements
Zapatista
Major Reports
NATO 2014
G8 2013
Workfare
2011 Census Resistance
Occupy Everywhere
August Riots
Dale Farm
J30 Strike
Flotilla to Gaza
Mayday 2010
Tar Sands
G20 London Summit
University Occupations for Gaza
Guantanamo
Indymedia Server Seizure
COP15 Climate Summit 2009
Carmel Agrexco
G8 Japan 2008
SHAC
Stop Sequani
Stop RWB
Climate Camp 2008
Oaxaca Uprising
Rossport Solidarity
Smash EDO
SOCPA
Past Major Reports
Encrypted Page
You are viewing this page using an encrypted connection. If you bookmark this page or send its address in an email you might want to use the un-encrypted address of this page.
If you recieved a warning about an untrusted root certificate please install the CAcert root certificate, for more information see the security page.

Global IMC Network


www.indymedia.org

Projects
print
radio
satellite tv
video

Africa

Europe
antwerpen
armenia
athens
austria
barcelona
belarus
belgium
belgrade
brussels
bulgaria
calabria
croatia
cyprus
emilia-romagna
estrecho / madiaq
galiza
germany
grenoble
hungary
ireland
istanbul
italy
la plana
liege
liguria
lille
linksunten
lombardia
madrid
malta
marseille
nantes
napoli
netherlands
northern england
nottingham imc
paris/île-de-france
patras
piemonte
poland
portugal
roma
romania
russia
sardegna
scotland
sverige
switzerland
torun
toscana
ukraine
united kingdom
valencia

Latin America
argentina
bolivia
chiapas
chile
chile sur
cmi brasil
cmi sucre
colombia
ecuador
mexico
peru
puerto rico
qollasuyu
rosario
santiago
tijuana
uruguay
valparaiso
venezuela

Oceania
aotearoa
brisbane
burma
darwin
jakarta
manila
melbourne
perth
qc
sydney

South Asia
india


United States
arizona
arkansas
asheville
atlanta
Austin
binghamton
boston
buffalo
chicago
cleveland
colorado
columbus
dc
hawaii
houston
hudson mohawk
kansas city
la
madison
maine
miami
michigan
milwaukee
minneapolis/st. paul
new hampshire
new jersey
new mexico
new orleans
north carolina
north texas
nyc
oklahoma
philadelphia
pittsburgh
portland
richmond
rochester
rogue valley
saint louis
san diego
san francisco
san francisco bay area
santa barbara
santa cruz, ca
sarasota
seattle
tampa bay
united states
urbana-champaign
vermont
western mass
worcester

West Asia
Armenia
Beirut
Israel
Palestine

Topics
biotech

Process
fbi/legal updates
mailing lists
process & imc docs
tech