OS related question

A

albertv

Frank said:
I don't, but it's very obvious from your postings you do.
Frank



Windows XP's new support of the full raw socket application programming
Interface (API) allows for the creation of fraudulent and damaging
Internet traffic. This has never been possible under Windows without
first modifying the operating system with third-party device drivers —
which has never been done by malicious programs.

The security features built into all other raw socket capable operating
systems (Windows 2000, Unix, Linux, etc.) deliberately restrict raw
socket access to applications running with full "root" privilege.
However, the Home Edition of Windows XP executes all applications with
full administrative ("root") privilege. Thus, Windows XP eliminates the
raw socket safety restrictions imposed by all other operating systems.

For the first time ever, applications running under the Home Edition of
Windows XP — whether deliberately executed or running as hidden "Trojan"
programs — will be easily able, without modifying the operating system
in any way, to generate the most damaging forms of Internet attacks.

Internet attacks launched from security-compromised Windows systems are
already common. (Because security-compromised Windows systems are
common.) However, the previous Internet API built into Windows,
prevented those attacks from being as damaging as those launched by Unix
and Linux systems. The sole reason for this difference was Windows'
previous lack of full raw socket support (which was a blessing).

No previous version of Windows (9x, ME, or NT) had, or needed, full raw
socket support. Those systems worked seamlessly on the Internet. While
there are valid uses for advanced raw-IP packet generation by system
level processes (NAT routing, IPsec support, etc.), there is no valid
use for raw sockets by end-user software. The only applications are
Internet Research or the exercise of malice. Therefore, this new danger
is without justification.

Windows XP's security model, which has been seriously compromised in
order to accommodate the needs of Windows 9x legacy applications, will
not prevent the wholesale hijacking of Windows XP machines. These
compromised machines — with their needlessly potent full raw socket
support — will be used to attack and damage any chosen Internet user or
site.

http://www.grc.com/dos/xpsummary.htm

Still think I don't know what I talking about? Say good night!
 
F

Frank

albertv said:
Windows XP's new support of the full raw socket application programming
Interface (API) allows for the creation of fraudulent and damaging
Internet traffic. This has never been possible under Windows without
first modifying the operating system with third-party device drivers —
which has never been done by malicious programs.

The security features built into all other raw socket capable operating
systems (Windows 2000, Unix, Linux, etc.) deliberately restrict raw
socket access to applications running with full "root" privilege.
However, the Home Edition of Windows XP executes all applications with
full administrative ("root") privilege. Thus, Windows XP eliminates the
raw socket safety restrictions imposed by all other operating systems.

For the first time ever, applications running under the Home Edition of
Windows XP — whether deliberately executed or running as hidden "Trojan"
programs — will be easily able, without modifying the operating system
in any way, to generate the most damaging forms of Internet attacks.

Internet attacks launched from security-compromised Windows systems are
already common. (Because security-compromised Windows systems are
common.) However, the previous Internet API built into Windows,
prevented those attacks from being as damaging as those launched by Unix
and Linux systems. The sole reason for this difference was Windows'
previous lack of full raw socket support (which was a blessing).

No previous version of Windows (9x, ME, or NT) had, or needed, full raw
socket support. Those systems worked seamlessly on the Internet. While
there are valid uses for advanced raw-IP packet generation by system
level processes (NAT routing, IPsec support, etc.), there is no valid
use for raw sockets by end-user software. The only applications are
Internet Research or the exercise of malice. Therefore, this new danger
is without justification.

Windows XP's security model, which has been seriously compromised in
order to accommodate the needs of Windows 9x legacy applications, will
not prevent the wholesale hijacking of Windows XP machines. These
compromised machines — with their needlessly potent full raw socket
support — will be used to attack and damage any chosen Internet user or
site.

http://www.grc.com/dos/xpsummary.htm

Still think I don't know what I talking about? Say good night!
That is such old news (Oct 6, 2003) as to no longer be relevant. We all
knew about it over 2 years ago. No you don't know what you're talking
about if you still think running any Win9x is more secure than any NT.
Frank
 
A

albertv

Frank said:
That is such old news (Oct 6, 2003) as to no longer be relevant. We all
knew about it over 2 years ago. No you don't know what you're talking
about if you still think running any Win9x is more secure than any NT.
Frank

It maybe old news but nothing has changed Frank.


---
avast! Antivirus: Outbound message clean.
Virus Database (VPS): 0511-1, 03/17/2005
Tested on: 3/21/2005 6:19:43 PM
avast! - copyright (c) 1988-2004 ALWIL Software.
http://www.avast.com
 
F

Frank

albertv said:
It maybe old news but nothing has changed Frank.


---
avast! Antivirus: Outbound message clean.
Virus Database (VPS): 0511-1, 03/17/2005
Tested on: 3/21/2005 6:19:43 PM
avast! - copyright (c) 1988-2004 ALWIL Software.
http://www.avast.com
You seem to be saying that raw sockets in and of themselves are a
security threat. That's simply not true and not what SG is saying.
If you have a secure system, then no one can get in and use the raw
socket for dos attack. And an MS based secure desktop system starts with
Windows XP, not Windows 9x. 9x is easier to penetrate in its native form
and thus much more susceptible to having a raw socket inserted and being
used for a dos attack.
Since Win 2K/XP dos attacks have greatly diminished.
Go here and enlighten yourself.
Frank
http://www.theregister.co.uk/2001/07/13/ms_security_chief_talks_raw/
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top