Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Windows Operating Systems Software

Ask Microsoft's Security VP 543

There's always lots of discussion on Slashdot about Microsoft's security problems, and whether Windows is or isn't more secure than other popular operating systems. In a "Let's clear the air" move, Mike Nash, Microsoft Corporate Vice President, Security Technology Unit, has agreed to answer 12 of the highest-moderated questions you submit here. (You can skip the "Microsoft and security in the same sentence?" comments we've all heard 1000 times, and ask actual questions, since Mike is answering for himself instead of having PR do it for him.) We'll post his answers next week.
This discussion has been archived. No new comments can be posted.

Ask Microsoft's Security VP

Comments Filter:
  • What has changed? (Score:5, Interesting)

    by suso ( 153703 ) * on Wednesday January 18, 2006 @01:16PM (#14500849) Journal
    Besides the same old PR scripted answers that corporations like to give in order to obscure or downplay what is really going on. What assurance can you give us that Microsoft is more focused on security and that Vista is going to be any different from the previous incarnations of Windows? What proof can you give us? Information like "We have a new team doing X" or "our process for reviewing changes has gone to X" are helpful pieces of information to answer this question. What else have you seen in the way MS is developing Vista that is different from how you've developed previous products?

    From what I've heard, even though most of Vista is being rewritten from the ground up with more scrutiny on what code goes into it, it will still have major flaws generated by the way Microsoft works internally as a company.
  • by eldavojohn ( 898314 ) * <eldavojohn@noSpAM.gmail.com> on Wednesday January 18, 2006 @01:20PM (#14500888) Journal
    Mr. Nash, what are the greatest differences and similarities between Microsoft Corp. and Data General Corp., your two most recent employers? Most importantly, how drastic were the changes you saw (not necessarily changes due to job function but changes in general)? What do you like the most and what do you hate the most?
  • by VitaminB52 ( 550802 ) on Wednesday January 18, 2006 @01:21PM (#14500897) Journal
    What is the Windows / Internet Explorer design decision that MS does, from a security point of view, regret most?
  • Patch Release Cycle (Score:5, Interesting)

    by skywalker107 ( 220077 ) on Wednesday January 18, 2006 @01:22PM (#14500919)
    Did the WMF Patch now set a standard that severly high risk problems will be patched out of the standard patch Cycle? How did Microsoft come to the conclusion that is was important enough to go against what it promised it's corporate customers?
  • by dada21 ( 163177 ) * <adam.dada@gmail.com> on Wednesday January 18, 2006 @01:22PM (#14500922) Homepage Journal
    As a Microsoft product user, it has always made me wonder what the User:Bug ratio might be. Do we see more bugs found BECAUSE more users are using a product?

    Has Microsoft tracked the "security bug" to user ratio on their products and found that products with fewer users seem to have fewer bugs? If that is the case, I wonder if it is the normal process of higher supply leading to more people spending time looking for bugs.

    It is like the population:innovation ratio -- as a population goes up, the amount of innovators being born goes up, too, leading to more innovations.
  • Vista (Score:2, Interesting)

    by gcnaddict ( 841664 ) on Wednesday January 18, 2006 @01:22PM (#14500926)
    I am in the Vista beta program, and the latest build has UAP implemented in a rather annoying way. Seeing as to how 5270 was nearly code-complete, will there be any change in how the UAP is implemented so as to not bug the user? I know many people in the beta besides me are bugged about this issue. (It takes 5+ steps to delete a shortcut on a desktop! Come on!)
  • by qwijibo ( 101731 ) on Wednesday January 18, 2006 @01:22PM (#14500927)
    Is there a general policy within Microsoft to help product teams make consistent security decisions? There are frequently issues where the decision has to be made between being more secure or more user friendly.

    For example, file and printer sharing defaulting to off prevents people from unknowingly sharing their resources, but requires non-technical users who do wish to set up a small network to know more about the process than in previous versions.
  • by Anonymous Coward on Wednesday January 18, 2006 @01:23PM (#14500941)
    Given that security is a major topic on IT manager's minds these days with security flaws and patches practically making front page news of some publications, What do you feel is going to be the main focus for security in 2006 for yourself and the industry as a whole?
  • Patch Schedule (Score:3, Interesting)

    by jtdennis ( 77869 ) <oyr249m02@sneake[ ]l.com ['mai' in gap]> on Wednesday January 18, 2006 @01:25PM (#14500969) Homepage
    Microsoft recently deviated from their normal patch schedule to release the WMF patch. What is Microsoft's reasoning on trying to hold critical patches until a specified date every month instead of releasing it as soon as its ready?
  • Speed factor (Score:2, Interesting)

    by FortKnox ( 169099 ) * on Wednesday January 18, 2006 @01:25PM (#14500975) Homepage Journal
    Are many security flaws are due to features in windows that were under a time crunch and needed to be released? Perhaps due to bad testing or some other quality issue.

    As an aside, great job Roblimo! What a catch for an interviewee! Not going through a PR person, either. Can't wait to see his replies.
  • by kalpol ( 714519 ) on Wednesday January 18, 2006 @01:25PM (#14500976)
    Has open-source software such as Linux influenced the way you think about security in Windows, and if so, how?
  • by kickabear ( 173514 ) on Wednesday January 18, 2006 @01:27PM (#14501003) Homepage
    Does Microsoft lean more towards rigidly enforced coding standards as a way to prevent exploitable bugs, or does the company focus more on brute-force bug detection during testing?

    I know the easy answer is to say "both, of course" but a 50/50 split is unlikely. So, does testing take the backseat, or does the code?
  • SP vs Vista (Score:2, Interesting)

    by sinucus ( 85222 ) on Wednesday January 18, 2006 @01:27PM (#14501006)
    If security is really a prime concern of Microsoft, why is it that new OS's are now getting the main focus of the dev teams? I don't know the exact number of coders in Microsoft, but it must be above 300,000. Why not have dev teams specific to each OS performing their roles? Why push back SP 3 for XP to develop Vista? Any person who has ever worked in an company knows that most companies lag behind when it comes to OS deployment. Isn't supporting and fixing bugs/exploits just as important to security as releasing the newest incarnation of MS Windows, which just brings on a new onslaught of bugs/exploits of their own?
  • Let's Rephrase That (Score:2, Interesting)

    by eldavojohn ( 898314 ) * <eldavojohn@noSpAM.gmail.com> on Wednesday January 18, 2006 @01:28PM (#14501014) Journal
    Mr. Nash, you used to work on Microsoft's marketing team and now you're in charge of security technologies, have you ever been to a conference or held a press release where every single person seems to be convinced Microsoft is evil or makes non-secure products (like this parent's author)? How do you deal with something like this? Do you try as hard as possible to convince them otherwise or do you instead try to focus on the better points of Microsoft's products?
  • Pre-installed (Score:3, Interesting)

    by schlichte ( 885306 ) on Wednesday January 18, 2006 @01:28PM (#14501018)
    This seems to be more of a problem on pre-installed systems. You get it home, set it up, and it basically boots the OS with its pants down as far as security is concerned.

    I know when I bought my Gateway laptop it came with a default login as Administrator and to identify itself on the network, it used the OEM key as its name. I knew enough to change these options and many others myself, but many users do not.

    Why is it that Windows offered pre-installed on machines doesnt at least come with some sort of brochure or pamphlet explaining the least a user can do to add any level of security?
  • by kortex ( 590172 ) on Wednesday January 18, 2006 @01:31PM (#14501045)
    Some in the industry believe that part of the problem with security gaps in MS operating systems stems from the fact that each new OS release has been entirely built on existing technology. The recent WMF scare seems to amplify the truth in that statement. Apple seems to have had a great deal of success rearchitecting OSX - will Microsoft ever be willing to start from the ground up on a new OS with security being a primary strategy from the outset?
  • Audit of Software (Score:5, Interesting)

    by WebHostingGuy ( 825421 ) * on Wednesday January 18, 2006 @01:32PM (#14501062) Homepage Journal
    Certain open source projects such as OpenBSD have routine audits of the software to search and remove potential security problems. While I understand Microsoft Operating Systems are very complex Microsoft does have an enormous amount of talent and resources at its disposal. Is it possible that Microsoft will review all new operating systems in the future with the same sort of audit performed by others? Wouldn't you think this would be worth it to prevent mistakes which could be costly to end users?
  • Home vs Pro (Score:4, Interesting)

    by Cro Magnon ( 467622 ) on Wednesday January 18, 2006 @01:33PM (#14501074) Homepage Journal
    Will Vista have a watered-down Home version that has fewer security options than the Corporate version?
  • Comment removed (Score:5, Interesting)

    by account_deleted ( 4530225 ) on Wednesday January 18, 2006 @01:34PM (#14501087)
    Comment removed based on user account deletion
  • by EvilEddie ( 243404 ) on Wednesday January 18, 2006 @01:34PM (#14501090) Homepage
    Does Microsoft forgo security in order to increase useability or vice versa?
  • Dear Microsoft Security VP:

    I know a person who doesn't have his copy of Windows registered. His PC got infested by spyware, so my deduction is that his computer was probably used to send SPAM, spread viruses and whatnot. When He called me for tech support, I told him to download the Microsoft Anti-spyware from Windows update, but his answer was that it required a registered copy.

    My question is this: If Windows updates make the Internet SAFER from hackers, spyware and viruses, why limit them to registered copies of Windows? (IMHO this is analogous to not giving the vaccine of the bird flu to illegal aliens)

    What do you plan to do about this?
  • by dpbsmith ( 263124 ) on Wednesday January 18, 2006 @01:35PM (#14501106) Homepage
    On January 17, 2002, p. 1, the New York Times reported, "Stung by Security Flaws, Microsoft Makes Software Safety a Top Goal" and quoted Jim Allchin said "Every developer is going to be told not to write any new line of code until they have thought out the security implications for the product" and that "the company was trying to change the culture of its software developers, who have been putting their emphasis on adding features to the company's software to increase its value."

    In your opinion, has Microsoft succeeded in changing its culture so that every developer now considers security first, features second?
  • WSUS Release Dates (Score:5, Interesting)

    by Mr.Fork ( 633378 ) <edward@j@reddy.gmail@com> on Wednesday January 18, 2006 @01:36PM (#14501121) Journal
    As a Service Desk manager and network guru for my organization, I am responsible for ensuring that all workstation desktops are kept up-to-date and secure. Currently, Microsoft releases patches once a month, usually on the second Tuesday of the month.

    With the current advances in smart viruses and malware, that release schedule seems unrealistic. OS security threats have been addressed with emergency patches, but that does not seem like a sustainable methodology.

    What is Microsoft's long-range vision on OS patches to ensure that our Server and Workstation Operating Systems are secure, safe, and patched in a timely manner?
  • by teklob ( 650327 ) on Wednesday January 18, 2006 @01:36PM (#14501131)
    I'm honestly not trying to troll here, but wouldn't it be easier to rewrite IE from the ground up? Have you guys considered this and ruled it out, or have you just not contemplated it. Not to vaguely bash microsoft, but a large percentage of PC and/or Windows power users would probably consider Internet Explorer 6 a write-off. Any thoughts?
  • Application software (Score:5, Interesting)

    by Cro Magnon ( 467622 ) on Wednesday January 18, 2006 @01:36PM (#14501132) Homepage Journal
    I realize that Microsoft cannot control what 3rd party software does, but will Microsoft's applications and games run under a limited account, or will they still need Admin access?
  • by timster ( 32400 ) on Wednesday January 18, 2006 @01:36PM (#14501133)
    We all know that a very important part of system security is the lack of fatal security bugs. This is a problem that has been very large with Microsoft products in the past, and is reflective of code quality. Fixing these bugs is crucial.

    However, even when a security system doesn't have any bugs, it can still be very insecure. We can define "security" in a more general sense as "the extent to which a system is doing what the owner or user expects". The problem is not that the system is capable of malice so much as that the system is capable of malice of which the user is unaware.

    How is Microsoft in the future going to design their systems so that users know what is really going on?
  • by Anonymous Coward on Wednesday January 18, 2006 @01:37PM (#14501144)
    No matter how secure it is, users still want to install apps, games, and browser plugins. Most don't read or understand what they are doing. How can you protect the uninformed from themselves?
  • by Anonymous Coward on Wednesday January 18, 2006 @01:38PM (#14501162)
    How many calls to strcpy() are made in the OS?

    How hard would it be to replace each and every one with a strncpy()?

    Surely, you must have done this by now?

    As a coward, I don't expect you'll ever see this, but I felt that I should ask anyway.
  • Spyware (Score:5, Interesting)

    by PetyrRahl ( 880843 ) on Wednesday January 18, 2006 @01:39PM (#14501168)
    Mr. Nash,

    In regards to spyware MS has already taken some steps to try and stem the flow (asking about running exe files, the Spyware Removal Tool, etc), however as a consultant I find many of my clients are still infested with the stuff. From my perspective it appears that many users are affected still by these programs and that they are either unaware of how to prevent them in the first place, or how to get rid of them. Many times it is significantly faster and easier (and in some cases, safer) to just format the machine in question and start from a clean slate. Does MS feel that spyware is still a major problem, and if so, what new measures MS doing in order to combat it?

    Regards,
    Petyr Rahl
  • Marketplace (Score:2, Interesting)

    by alfalfro ( 120490 ) on Wednesday January 18, 2006 @01:39PM (#14501179)
    Mr. Nash,

    Security decisions are usually dominated by economic and business considerations; it's often been said that Microsoft will stop making insecure software shortly after customers stop buying it.

    Let's say I'm a shareholder, explain to me why you should be spending money on security. Where and how much is the return on investment?

    You will also have to balance many considerations when determining what security to implement. What are the major security tradeoffs/decisions you anticipate making this year?
  • User privileges (Score:5, Interesting)

    by azpenguin ( 589022 ) on Wednesday January 18, 2006 @01:40PM (#14501183)
    Many users still don't understand the importance of creating user accounts instead of using the default administrator account. Will Vista work "out of the box" in a manner that will encourage those who are not technically savvy to work under a user account instead of an admin account?
  • by ZiZ ( 564727 ) on Wednesday January 18, 2006 @01:40PM (#14501188) Homepage
    Mr. Nash,

    There are a number of industry best-practices that any system administrator will tell you are vital for proper security. I will not claim to provide a complete list, but the two that seem to have the most frequent effect on an OS's percieved security are:

    • Minimizing the number of services and processes running (preferrably via a service opt-in rather than opt-out policy)
    • Performing all activities as an unpriviliged user, with some method of securely and briefly authenticating to higher permissions when required

    Windows has been steadily improving on the first point, but the second point has long been a problem for administrators; there is no generally-used near-transparent way for a program to request higher privileges, for instance.

    Worse, many third-party (and, for that matter, some Microsoft) programs will fail silently or with obtuse errors if you run them as less-privileged users because they demand the ability to, say, write to system areas - often without warning - and require heroic gymnastics by administrators to resolve (if a resolution is even possible).

    Is this issue of least-privilige being difficult to acheive being addressed in future versions of Windows? What changes can we expect to come down the line soon and in the near future?

  • Re:WMF bug in Vista (Score:4, Interesting)

    by TimTheFoolMan ( 656432 ) on Wednesday January 18, 2006 @01:41PM (#14501198) Homepage Journal
    To elaborate, what does the security review process look like from the inside (such that other development teams might learn from it)? How does it differ from a code review? Why would this process *not* catch something like the WMF hole, given that this appears to be blatantly erroneous programming (assuming it wasn't intentional at the corporate level)?

    My biggest concerns about MS today surround this process, which is completely invisible to the world, but which we rely on for having greater confidence in MS products. Understanding how MS approaches these reviews might make us feel better (or might depress us beyond reason).

    Tim
  • by dtfinch ( 661405 ) * on Wednesday January 18, 2006 @01:41PM (#14501203) Journal
    We see news all the time about Microsoft vulnerabilities discovered by third parties, and later patched by Microsoft, but I can't recall many being discovered by Microsoft. I often imagine that it's because releasing patches for vulnerabilities previously unknown to researchers and the public creates an unnecessary risk by disclosing the vulnerabilities to anyone willing to reverse engineer the patches, and so the patches are held back until they vulnerabilities are rediscovered outside of Microsoft or until the next major product release, but I'm basing this on nothing more than speculation. What does Microsoft do inhouse identify and patch vulnerabilities that have not yet been discovered by third parties?
  • by tringstad ( 168599 ) on Wednesday January 18, 2006 @01:42PM (#14501221)
    Why is there no way to submit easily reproducable and verifiable bugs other than by snail mail to a generic address, or worse, opening (and paying for) a support case?

    And why does the phone number on this "report a bug" page:

    http://support.microsoft.com/gp/contactbug [microsoft.com]

    call a generic technical support & sales line, which ultimately will tell you that you must either open (and pay for) a support case, or submit your bug by snail mail to 1 Microsoft Way?

    Is it Microsoft's stance that the inability of its users to report bugs makes its OS more secure?

    -Tommy
  • XP's firewall (Score:5, Interesting)

    by fudgefactor7 ( 581449 ) on Wednesday January 18, 2006 @01:43PM (#14501233)
    When Microsoft added a firewall to XP, it was a since first step; but why was the decision made to have it only work in one direction? Surely, a better solution would have been a firewall that worked for not only incoming packets, but for outgoing as well? And as a followup: why not add that functionality?
  • by arminw ( 717974 ) on Wednesday January 18, 2006 @01:43PM (#14501237)
    In current Windows systems, many programs will only work correctly if the user is granted administrator rights. Will MS lean on developers to write their software such, that a normal user status is sufficient? Much malware today silently installs itself without so much as a warning to the user. Will VISTA incorporate some sort of warning and ask for a password before ANY executable file can run for the first time or install itself deep in the system? Will users be told NOT to type password unless they are SURE the file comes from a trusted source?
  • by swamp boy ( 151038 ) on Wednesday January 18, 2006 @01:44PM (#14501245)
    In hindsight, has the use of Kerberos in Active Directory accomplished the original objectives?
  • by tz ( 130773 ) on Wednesday January 18, 2006 @01:47PM (#14501280)
    When will drive letters go the way of floppy disc drives (or at least let me add or remove a drive without completely hosing my system)?
    When will we have actual symbolic links?
    When will you ship with everything possible disabled until needed or manually enabled?
    When will defragging a disk or some obscure network function not lock up every task?
    When will you not install by default two thousand modem or other .inf files (or at least keep them in an archive)?
    When will you not keep asking to insert a driver disk when the files are already in c:\windows\system32\ (and will "install" if I just point the directory there)?
    When will you disable autoplay features by default, or at least make them prominent in a security area (instead of editing obscure system setting panels)?
    When will you get rid of, split, or otherwise do something reasonable with the trash "heap" otherwise known as the registry?
    Are you ever going to allow me to change my hardware and do autoconfiguration (Both MacOS and Linux will let me boot from a disk in another system, a CD, etc. and manage to find all the necessary and most of the exotic hardware)?
  • by hzs202 ( 932886 ) on Wednesday January 18, 2006 @01:47PM (#14501282) Journal
    Mr. Nash, over the past year there have been countless stories about MS Windows and its vulnerability to "stealth rootkit infections". For example, F-Secure [eweek.com] reported, adware/spyware developer ContextPlus, Inc. is responsible for a large number of "stealth rootkit infections" related to its products. What is MS doing to secure its newly released OSes from dangerous kernal-mode rootkits built in adware, spyware and other applications?
  • by ObsessiveMathsFreak ( 773371 ) <obsessivemathsfreak.eircom@net> on Wednesday January 18, 2006 @01:47PM (#14501285) Homepage Journal
    How will Microsoft handle the differences between the security enviornment for Home PC's vs PC's in Business enviornments?

    Business PC's usually live in live in administrated, controlled networks, which hopefully have someone in charge of security on those networks. They also live behind firewalls, proxies and have shrinkwrapped as well as in house answers to security threats. Users have much reduced privilages, security policies are in effect and companies backup data and can even use imaging to secure against vunerabilities.

    Contrast with Home PCs which live in small, largely unadministored networks. Many are still directly connected to the internet. These PCs may have no anti-malware technology at all. On top of that, users are uneducated and often do not even realise they have been the victims of security breaches. Typically, security involves extensive suites of specialist software that gobble ever more resources.

    There are also intermediate security enviornments. Small to medium sized businesses may have sizeable networks, but fail to implement any real security policy due to time and budget constraints. Home users can also have sizable networks, with a multitude of internet capable devices in the one home becoming more commonplace.

    Typically, Microsoft has offered essentially the same software framework for both Home and Business computers. Will Microsoft offer a one size fits all security framework also?
  • by Bob_Villa ( 926342 ) on Wednesday January 18, 2006 @01:48PM (#14501305)
    Why are you adding in DRM controls to Vista that regular users are not going to want? It may come in handy for corporations wanting to control their documents, but I can't see how regular users would knowingly want a product that restricts their access to their documents or files.

    Also, I think you could dramatically improve security by decoupling Internet Explorer from Windows. Have it be a separate program similar to Opera, FireFox, Safari, etc... Is there really a valid reason that Windows Explorer has to be driven by Internet Explorer?
  • by MasterOfGoingFaster ( 922862 ) on Wednesday January 18, 2006 @01:49PM (#14501313) Homepage
    1 - Could you comment on how the "every-user-is-an-administrator" usage came about, and what Microsoft can do about this?

    2 - Why is Internet Explorer used for Windows Update, rather than use a robust, spicific use application?

    3 - Will Vista offer an option to install in a secured, locked-down mode, with most services turned off (in a BSD-like fashion)?

    4 - Shouldn't Internet Explorer default Active-X use to "ask"? Why not?
  • Legacy Code (Score:4, Interesting)

    by chill ( 34294 ) on Wednesday January 18, 2006 @01:51PM (#14501347) Journal
    As the recent WMF issues have demonstrated, there is a lot of legacy code in the core OS. Some of it seems to date back over a decade. Much of it seems to originate in a time where security was no where near the concern it is now, and network connectivity was the exception and not the rule. While I understand backwards compatibility is important for some customers, has there been serious efforts to audit that old code? What about the idea of a clean break with ancient code?

      -Charles
  • by AVee ( 557523 ) <slashdot&avee,org> on Wednesday January 18, 2006 @01:52PM (#14501365) Homepage
    And, besides the Uder to Bug ratio do you see a relation between the amount of code and the amount of bug? Is any effort made to reduce the amount of code, since, at least from the outside, it seems there is mostly more code being added to create more security...
  • users and auditing (Score:5, Interesting)

    by H310iSe ( 249662 ) on Wednesday January 18, 2006 @01:53PM (#14501367)
    As a windows desktop administrator since the bad old days of 95 and 98 I have to give you guys some credit for how far you've come; however there are two issues I'm faced with that continue to be problematic - user rights and security auditing.

    Despite whatever SU-like features you have, on XP I still can't reliably install, or in some cases even run(!), programs under restricted user accounts, forcing me to give most of my clients admin accounts and just hoping for the best. How seriously do you treat this issue and what work is being done towards getting an OS that can be used in the real world with restricted user rights?

    Auditing - finding, say, if user X has any write rights anywhere on a server, who has done what on the system in the past day, what files were modified by a program's install, etc. all these things are do-able but not easily, and not using just MS supplied tools. How about a toolset for administrators that give us (especially the part-time admins like myself who don't just live and breath security) easy access to the reporting, auditing, and security tweaking we need to do our jobs well. And no, configuring and interpreting the security logs in the event viewer doesn't count as an easy to use auditing tool.

  • by andholio ( 665152 ) on Wednesday January 18, 2006 @01:53PM (#14501377)
    Microsoft is embarking on an ambitious DRM framework intiative that will hopefully tie a vast number of services, computing activities, and data into a seemless trust environment. Users can share Office documents through email and encrypt and tie those directly to their recipients to prevent forwarding and enable greater control over content. Where do you see this framework becoming pervasive as a part of Microsoft's enterprise security deployments? In other words, will organizations deploy the DRM-enabled Office Services, Windows Live, then have user machines tied into DRM through Vista? Does this solidify Microsoft's commitment to the Trusted Computing Environment and establish a common trust architecture?
  • by avalys ( 221114 ) on Wednesday January 18, 2006 @01:54PM (#14501380)
    What modern, in-use, server operating system do you consider the most secure one available today? I'm talking about one along the lines of Linux (name the distro), OpenBSD, Mac OS X, Windows, and so forth. How about a desktop operating system?

    Please name a specific answer for both questions, and please don't name something useless like DOS. Your answer must be something that a sane network administrator might choose for an internet-connected server and desktop deployment.

    Separately, do you think that Mac OS X is a more secure _desktop_ operating system than Windows XP? Obviously there have been far fewer worms, trojans, and viruses for OS X than Windows. Is that really solely due to OS X's lesser popularity, or is it truly a fundamentally more secure system?

    If you think Windows XP is more secure, why? What security features does it have that OS X doesn't?

  • by jonathan_lampe ( 943581 ) on Wednesday January 18, 2006 @01:55PM (#14501393)
    Why hasn't Microsoft added AES to its SSL stack yet? As a Microsoft developer, it's annoying to get beaten over the head when facing competing solutions that can use the AES (128-,192- and 256-bit) encryption algorithm in their SSL implementations.

    (OpenSSL - including the Mozilla browsers - and Java SSL have all had AES support for a while. Most SSH implementations have also had it for a while.)
  • by jthrelfall ( 946894 ) on Wednesday January 18, 2006 @01:57PM (#14501418)
    IMHO - I find that the reason that Microsoft's products are insecure is because of the level of backwards compatibility that has been engineered into the product lines. While being able to run older applications is useful for many corporations that have difficulty in finding replacement apps, the sad state of affairs is that it is just that level of compatibility that hampers a full rewrite of the Windows core architecture. If Microsoft were to make a bold decision and create a truly new architecture that had the Windows look & feel but was based on sound secure coding practices, the possibility for exploits would be drastically reduced than with the current 'we have to make sure that the app written in Visual C ++ v2.0 still works' mentality. Backwards compatibility for older applications can be achieved with running the app(s) with a slim kernel & supporting services in a virtual machine that has very limited privileges. So my question is: Will Microsoft ever make the move to a newer, secure architecture, or can we expect Win9x compatibility with WinOS circa 2025?
  • Next big thing? (Score:5, Interesting)

    by Randolpho ( 628485 ) on Wednesday January 18, 2006 @02:01PM (#14501459) Homepage Journal
    By now, many of us have heard about Singularity [microsoft.com], Microsoft's research OS with its ultimate goal of dependability (in which security plays a very large role). How does Singularity fit into Microsoft's long-term security and operating system goals? Will Microsoft eventually adopt Singularity and its inherent security? Will Microsoft adapt the concepts of Singularity to its current NT-based OS structure? Is there a third option coming down the pipe?
  • SSH? (Score:1, Interesting)

    by Anonymous Coward on Wednesday January 18, 2006 @02:01PM (#14501460)
    I have noticed that Windows ships with Telnet for remote shell access and FTP for file transfers. However, both of the protocols send plaintext login information over the network, a major security problem. Since SSH was first created, as a secure RSH replacement, it has become a de-facto standard for secure remote shell access and file transfers in the Linux/Unix community.

    Why hasn't Microsoft shipped an SSH client and server with Windows?
  • Linux (Score:2, Interesting)

    by towsonu2003 ( 928663 ) on Wednesday January 18, 2006 @02:01PM (#14501464)
    Which Linux distros do you currently use? Please be honest...
  • by massysett ( 910130 ) on Wednesday January 18, 2006 @02:02PM (#14501483) Homepage
    On a related note, it seems MS is afraid to change the default configuration of Windows file permissions because it would break existing apps that either were written for Windows 9x, or that were not written to conform to the standards of the Windows 2000/XP file tree. Would MS consider tightening the file permissions, even though it will break many existing apps, in order to demand better behavior from app developers and have a more secure system?

    Also, it seems to me that Windows' dual focus on consumer machines and business deployments holds it back. For example, while backward compatibility with old apps is important for enterprises, it is not nearly as important for consumers, yet backward compatibility is one reason why the default XP file permissions have not changed. Has MS ever considered splitting Windows into separate versions--one for businesses and one for consumers--that would address the specific needs of each market? From what I can tell, XP Media Center Edition, XP Home, and XP Pro are not truly "separate versions" for the purposes I'm discussing here. For example, the future "Home" version could have even tighter security than the "Pro" version, on the assumption that the "Pro" machine is administered by pros. The "Home" version might break existing non-compliant apps, but that would be the price to pay for more security.

  • Culture and Security (Score:4, Interesting)

    by Hard_Code ( 49548 ) on Wednesday January 18, 2006 @02:07PM (#14501538)
    I have started watching videos at Channel 9 that explain in-depth the internals of some core Windows components, which has given me some perspective and respect for those developers. However, even from these videos it is clear that Microsoft has been in the past (and perhaps still is) ruled by a "cowboy coder" culture (revealed for example in the series on the Vista kernel in which they openly discuss their attempts at managing the "state" issue, and talk about the problems due to unscrupulous use of the registry).

    I would like to think that Microsoft has finally "got the religion" about reliable code, unit testing, defensive programming, etc. (it seems that many historic decisions were made on disputable performance grounds instead of a long-term view of security implications, and now Microsoft is paying the price).

    Is this the case (do you even agree with the premise) and if not, what is Microsoft's strategy for evangelizing safe and robust programming practices (as well as overall architecture) *inside* Microsoft? It seems that the best laid plans of kernel and system architects can be ruined by some guy working on the shell that is getty pressured by marketing to Hurry Up and implement that gee-whiz feature that will "impress" the customer.

    (extra cheat question: Raymond Chen has recently posted about "decoy" windows and other hacks that MS has implemented to compensate for badly written application code - as a user, this does not seem to serve my interests. Instead of quiety accepting the misbehavior, I would like Microsoft to make these sorts of problems apparent in some manner to make the user aware of their software and demand better behavoir from developers of the software they purchase, and also to shame software developers into behaving well. Continually accommodating intentionally bad software seems to be a bad long-term strategy. Any comment on that?)
  • by spyrochaete ( 707033 ) on Wednesday January 18, 2006 @02:09PM (#14501573) Homepage Journal
    Mr. Nash,

    I understand that MS has recently decided to extend the deadline to abandon official support of Windows XP Home to 2008. While many applaud this 1-year extension, others feel this deadline is insufficient. Considering this is the most popular operating system in the history of personal computing, will MS take responsibility for any damages caused by this deadline? (e.g., unpatched vulnerabilities resulting in spam and DDoS zombies, virus proliferation, identity theft, etc.) Is MS willing to reconsider this deadline?
  • by Asprin ( 545477 ) <gsarnoldNO@SPAMyahoo.com> on Wednesday January 18, 2006 @02:16PM (#14501653) Homepage Journal

    Does Microsoft have any regrets regarding its historical strategy of designing software that mixes code in with data (E.g., ActiveX, IE, VB Office, etc.) to make life easier for developers, despite the security implications and risks of such a strategy?
  • DRM (Score:3, Interesting)

    by Stomkrow ( 945742 ) on Wednesday January 18, 2006 @02:18PM (#14501679)
    Given the recent spate of ugliness regarding DRM in the marketplace what solutions does Microsoft intend on implementing to ensure consumer rights? Do you really think DRM will float with consumers or that it is destined a slow and terribly painful death? I know that I speak for a great many of us when I say that I fully intend on banning any and all DRM materials from my home and my business. PERIOD. There is no debate in this.
  • Security & Education (Score:3, Interesting)

    by SchrodingersRoot ( 943800 ) on Wednesday January 18, 2006 @02:19PM (#14501684) Journal
    As a former PC tech, I have many of the usual horror stories regarding tens of thousands of spyware components on machines. Now, while I never objected too strongly to users having lots of spyware, as it helped pay my salary, I appreciated the fact that Microsoft purchased and made MSAntiSpyware available free. I'm also glad that Vista will be deployed with Windows Defender, along with automatic updates, and that IE will ship with security improvements, such as 'protected mode' and ActiveX controls disabled by default.

    However, to me, this seems only half of the real battle when it comes to spyware (and other security issues). The other half, in my experience (And in GI Joe's, apparently), is knowledge. Education. I have noted that some systems, even heavily used systems, without tools like MSAntiSpyware, AdAware, and Spybot installed can have very little spyware, whereas even some systems with such tools can become heavily infested.

    So my question is this: especially given that many of the users of Windows are less tech savvy than would be preferable, are there any plans to address the other side of the equation in Vista (or elsewhere), for security issues like spyware? A Security Tour, recommendations, help features, tutorials, etc?
  • by freedom_india ( 780002 ) on Wednesday January 18, 2006 @02:20PM (#14501696) Homepage Journal
    Are you moving all unnecessary code (like nVidia drivers, mouse drivers, video drivers etc) back to User Mode and leave the Kernel pretty thin and safe?

    I understand you moved Video drivers into Kernel mode in NT 4.0 for performance reasons on slow machines of that day.

    Now that machines are much faster than ever before, are you moving back all Video Drivers/stuff back to user Mode so that Windows Vista can be MORE secure?

  • by Nascar_Geek ( 682890 ) on Wednesday January 18, 2006 @02:24PM (#14501751)
    The number of machines being turned into zombies every month make it pretty obvious that many users don't know how to protect their computers from attack.

    What do you see your company doing to make PC's running Windows products more secure right out of the box and to keep them secure with little or no input from the user?
  • Security for Morons (Score:3, Interesting)

    by chadjg ( 615827 ) <chadgessele2000@yahooLION.com minus cat> on Wednesday January 18, 2006 @02:27PM (#14501779) Journal
    I'm not very smart about computer security, but I can follow directions with precision, think about threats in a general way, and I care. What is your company doing for people like me? It seems that no matter what I do I have problems with your software. Ok, I'm still using windows 98, but why do I have to run two security apps plus the cheap Zone Alarm firewall just to stay functional?
  • Slashdot bites? (Score:3, Interesting)

    by rilister ( 316428 ) on Wednesday January 18, 2006 @02:29PM (#14501801)
    How do you feel about the at-least-slightly-prejudicial busted-up broken window icon Slashdot use to highlight this article?

    realtedly: Do you believe the anti-Microsoft bias of Slashdot is peculiar to this forum or does it reflect a general antipathy in tech circles? Why do you care what the community at Slashdot thinks?
  • by Stan Vassilev ( 939229 ) on Wednesday January 18, 2006 @02:31PM (#14501825)
    I hope my question is not too technical, but here goes:

    One of the most important innovations in Vista regarding security is the revised user/privileges system, including the new "limited" mode IE (and potentially other web apps) will run in.

    The basic goal is that even if IE has a flaw which allows malicious code to run from the browser, that it will not have the privileges to read/write/execute code, with the exception of writing in the IE temp files folder (the cache).

    However to allow the IE plugins and IE itself to go on its business (such as download files to where the user wants), special 'broker' processes were introduced IE to talk to.

    Apparently those processes have higher privileges. So if IE can command them to download code, doesn't it render the point about the privileges protection moot. If not why.

    And another such concern. I suppose the limited IE mode applies only when the mshtml engine is launched from within the "official" IE shell.

    However many apps use that shell, and since the malicious code retains the ability to write to the Temp Files, won't it be possible the reuse of "infected" cache via embeded IE to raise the privileges for execution and infect the system anyway.

    Thanks.
  • Re:What has changed? (Score:5, Interesting)

    by Wolfrider ( 856 ) <kingneutron@NOsPAm.gmail.com> on Wednesday January 18, 2006 @03:04PM (#14502261) Homepage Journal
    My question is, Are you going to allow popular programs that have not been written securely to run on Vista by means of a "hack" or "tweak"?

    What are you doing to prevent buffer overflow and similar attacks in the future?
  • Re:WMF bug in Vista (Score:2, Interesting)

    by TimTheFoolMan ( 656432 ) on Wednesday January 18, 2006 @03:12PM (#14502375) Homepage Journal
    To the "Troll" moderator, have you even bothered trying to understand the technical issues? If so, please respond with an intelligent answer instead of just modding down an opinion that you don't like (and apparently don't understand).

    This is not a trivial question, and everything in Microsoft's new "security push" is open to question until they respond in a more intelligent way than Stephen Toulouse's mind-numbingly ambiguous non-response.

    Disagree with me if you want, but do so openly. Not like a mod-points-laden coward.

    Tim
  • by Hackeron ( 704093 ) on Wednesday January 18, 2006 @03:36PM (#14502659) Journal
    My question is there are currently 23 security exploits in windows xp that you have known about for many months and they are well documented on sites like secunia.com and securityfocus.com. With Microsoft's unlimited resources and focus on security, why arent they getting fixed?
  • by booch ( 4157 ) <slashdot2010NO@SPAMcraigbuchek.com> on Wednesday January 18, 2006 @03:58PM (#14502937) Homepage
    I'd like to know how Microsoft would respond to the Six Dumbest Ideas in Computer Security [ranum.com]. Especially #3, "Penetrate and Patch". It seem like they're trying to address the symptoms, without addressing the architectural issues. At least, I've not seen them make any architectural changes in the (what is it now, 5?) years since they decided to "concentrate" on security.
  • by spidereyes ( 599443 ) on Wednesday January 18, 2006 @05:25PM (#14504009)
    From http://www.windowsitpro.com/Articles/Print.cfm?Art icleID=48340 [windowsitpro.com]
    "Windows Vista will also bring changes to secure communications. With Vista, we'll finally see the use of 256-bit Advanced Encryption Standard (AES) to secure HTTP traffic. Vista will also use the Online Certificate Status Protocol (OSCP) for speedier certificate status checking and will implement some extensions to TLS that are outlined in Internet Engineering Task Force (IETF) Request for Comments (RFC) 3546."
  • Quelques questions (Score:2, Interesting)

    by solkanar ( 946999 ) on Wednesday January 18, 2006 @06:22PM (#14504576)
    I'm a 23 years old french student in an engineering school. I had no time to read -all- questions, so I apologize if they were asked already. In my school, there is an everlasting fight between unix users and windows user (students, teachers, professors... ) and I don't think I could get new answers to my old questions from Mike Nash (and many slashdotters would express it better than me), so I'll try to put it another way: "What question will you not answer ?" "OpenSource users are often asked "why use Open Source ?", so I would like to know "why use Microsoft ?" " "What do you think of people who belive education is better for security than fences ?"
  • Re:What has changed? (Score:5, Interesting)

    by electroniceric ( 468976 ) on Wednesday January 18, 2006 @06:33PM (#14504658)
    One major security difference between Windows and *nix is the need for many userland programs to run as Administrator. Clearly this enlarges the attackable surface area of the Windows platform by allowing attacks via applications that run as Administrator. Presumably this accounts for the decision to have XP Home users be Administrators by default.

    What is Microsoft's plan for eliminating this problem? How will Vista address the tasks that require higher levels of privileges? What restrictions does this place on normal users? How do focus group users respond to these restrictions? Has there been communication with applications vendors to ensure that they are making the necessary changes?
  • Re:What has changed? (Score:5, Interesting)

    by kestasjk ( 933987 ) on Wednesday January 18, 2006 @07:11PM (#14504924) Homepage
    On the same subject:

    Most of the most glaring Windows XP security problems (being in the Admininstrators group by default, being allowed to write anywhere by default, having the firewall off [pre-SP2] by default) were there to preserve compatibility with previous versions of Windows.
    Will Vista comprimise on security, or compatibility?
  • by Jonathan_Jeffus ( 947042 ) on Wednesday January 18, 2006 @08:23PM (#14505430)
    On the same note:

    Mr. Nash,

    Microsoft seems to be uniquely capable of solving the security problems with their older product line and maintaining backwards compatibility. Why not simply run older programs under a virtualiztion technology and completely change the foundation of Vista? Microsoft owns the I.P. involved with the OS and already owns Virtual PC. This would allow older products to perform without changes.

    Individual users would run as non-administrators and a few other core changes could be put in place. If a developer wanted to release a product that ran directly on Vista the libraries would be similar so all he needed to do is re-compile and link and ensure his product worked with the new security settings.

    On the other hand, older Windows programs could install transparently into a virtual "instance" owned by the current user and she'd never know any difference. Backwards compatibility would be ensured by the fact that they were in fact running under a "Virtual Instance" of Windows XP. It might even be possible to get some money out of businesses holding out with DOS/Win 3.x/Win95 etc. by offering "plugins" for virtualization with this technology.

    Why doesn't microsoft do something like this?

    Jonathan Jeffus

FORTRAN is not a flower but a weed -- it is hardy, occasionally blooms, and grows in every computer. -- A.J. Perlis

Working...