|  | <<  
             ^ 
              >> 
            
              | Date: 2001-08-04 
 
 Todesursache: Microsoft-.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.-
 
 Robert X. Cringely sehr ausführlich über die verlorenene Unschuld
 des Internet und den Tod von TCP/IP durch eine ganz normale
 Geschäftsstrategie aus Redmond.
 
 -.-. --.-  -.-. --.-  -.-. --.-  -.-. --.-  -.-. --.-  -.-. --.-
 relayed by
 "g'o'tz ohnesorge" <gotz@amiga.com>
 -.-. --.-  -.-. --.-  -.-. --.-  -.-. --.-  -.-. --.-  -.-. --.-
 
 The Death of TCP/IP
 
 Why the Age of Internet Innocence is Over
 
 By Robert X. Cringely
 
 As events of the last several weeks have shown, Microsoft
 Windows, e-mail and the Internet create the perfect breeding
 ground for virus attacks. They don't even have to exploit Windows
 flaws to be effective. Any Visual BASIC programmer with a good
 understanding of how Windows works can write a virus. All that is
 needed is a cleverly titled file attachment payload, and almost
 anyone can be induced to open it, spreading the contagion. It is
 too darned easy to create these programs that can do billions in
 damage. The only sure way to fix the problem is to re-stripe the
 playing field, to change the game to one with all new rules. Some
 might argue that such a rule change calls for the elimination of
 Microsoft software, but that simply isn't likely to happen. It's true
 that Linux and Apache are generally safer than Windows 2000 and
 IIS, but Microsoft products aren't going to go away. I promised you
 an answer to how to secure the Internet, and I mean to come
 through. First, we'll start with the way I would do it, then follow with
 a rumor I have heard about one way Microsoft might want to do it.
 
 The wonder of all these Internet security problems is that they are
 continually labeled as "e-mail viruses" or "Internet worms," rather
 than the more correct designation of "Windows viruses" or
 "Microsoft Outlook viruses." It is to the credit of the Microsoft
 public relations team that Redmond has somehow escaped blame,
 because nearly all the data security problems of recent years have
 been Windows-specific, taking advantage of the glaring security
 loopholes that exist in these Microsoft products. If it were not for
 Microsoft's carefully worded user license agreement, which holds
 the company blameless for absolutely anything, they would
 probably have been awash in class action lawsuits by now.
 
 Of course, it is not as though Microsoft intended things to be this
 way. No company deliberately designs bad products. But you must
 understand that Microsoft limits its investments to things that will
 enhance a product's market share. Every feature in Windows had
 to pass the litmus test, "Does it increase market share?" Putting
 security safeguards in their products evidently failed the litmus
 test, and therefore weren't added. While it is true that virus authors
 will target platforms that give them the most bang for their
 programming buck, the Windows platform has virtually no security
 to even slow them down. I believe the lack of security in Microsoft
 software was a deliberate business decision.
 
 Alas, things are only likely to get worse in the near term. So far,
 we've been lucky in that most virus authors have been impatient
 and want to see the immediate effects of their work. It is far more
 effective to be patient and let the virus spread quietly for months. If
 the virus does nothing, the defense against it will be slow and/or
 too late. If the virus does very little on one's PC (for awhile), it won't
 be discovered easily. It is also possible to make a stealth virus. I
 won't go into specifics for obvious reasons, but if you think about
 how virus detection software works, it isn't hard to trip it up.
 
 Even if 98 percent of the world's computers had current anti-virus
 software (which they don't), the remaining two percent would still
 be millions of devices capable of bringing down the entire Internet if
 infected.
 
 And now, we have the impending release of Windows XP, and its
 problem of raw TCP/IP socket exposure. As I detailed two weeks
 ago, XP is the first home version of Windows to allow complete
 access to TCP/IP sockets, which can be exploited by viruses to do
 all sorts of damage. Windows XP uses essentially the same
 TCP/IP software as Windows 2000, except that XP lacks 2000's
 higher-level security features. In order to be backward compatible
 with applications written for Windows 95, 98, and ME, Windows XP
 allows any application full access to raw sockets.
 
 This is dangerous.
 
 Not only is it dangerous, it is unnecessary. What is wrong with
 telling application developers, "Your application can't have access
 to raw sockets," or, "When XP ships you need to have a non-raw
 socket version ready for your customers," or, "If your application
 needs to access raw sockets, these are the security rules and
 interfaces you will have to use"? The bottom line is that Microsoft's
 choice to provide access to raw sockets was based on the market
 share litmus test, period.
 
 Unless this feature is changed before XP is released, it will mean
 that millions of new computers will be manufactured as perfect little
 virus machines. Virus authors who are anticipating these new PCs
 will be able to pre-position their digital vermin to take advantage of
 the socket flaw as the new machines appear. The result is that, in
 all likelihood, there will be massive data security problems, as well
 as massive damage to files and property, all as a result of
 Windows XP.
 
 But as consumers, guess what -- we won't even get a choice.
 Microsoft will require the PC makers to install XP in the factory. It
 will come on your PC, and you won't have the choice or option to
 pick something different. When Microsoft issues a new OS, it is
 forced into the market.
 
 Here is my preferred solution for Internet security. We could
 implement a secure user identity system precisely like telephone
 Caller ID. It would be essentially an Internet ID. All Internet
 transactions could be based on it. Anyone who sends me e-mail
 can be identified. Anything I send can be traced to me. People
 wouldn't be forced to participate, but if they remain anonymous, I
 might choose to block them. I certainly wouldn't accept file
 attachments from them. I know you hate this idea, but I think the
 Internet needs a fingerprint. It does not have to have personal
 information, but if you break the law it can be traced to you. You
 can choose not to have a fingerprint, but then your ability to
 communicate with others may be limited -- a price many people
 may choose to pay.
 
 I am not opposed to people being anonymous -- just to anonymous
 people receiving public assistance. Send all the anonymous love or
 hate mail you like, but don't expect to attach a file.
 
 And what's with those file attachments, anyway? Replace mail
 clients and APIs with secure models. The new model will not run
 attachments as they do today. E-mail attachments should not have
 access to the e-mail client, APIs, etc. Attachments should not
 have access to the operating system by default. The user should
 approve the use of some APIs, like having to give permission before
 device drivers are updated.
 
 Any application that wants to send bits onto the Internet must first
 be permitted to do so. Applications would be registered to send
 outgoing traffic. The applications would be limited by function and
 port. You would register your e-mail program as the only
 application that could talk SMTP, POP3, etc. If Microsoft Word
 wanted to send an e-mail, your e-mail program would pop up, ask
 you to authenticate yourself and explicitly send the message. At
 that point, you would be in complete control of what was happening
 on your PC. For mail-enabled applications, there would be an
 application user account registered on the post office. The account
 would be unique, and registered to a unique application.
 
 If kids want to install an Internet game, the game's IP port would be
 registered and permitted to operate, hopefully by the parent. If kids
 wanted to install an Internet chat program, too bad -- it wouldn't
 work if Dad didn't want it to work.
 
 By default, under this scenario, your PC becomes a TCP/IP read-
 only device. By running applications like Gibson's Zone Alarm you
 can -- right now -- severely limit the use of TCP/IP by applications
 on your PC. And what happens when you do so? Everything works
 just fine. So rather than ripping the protocol stack wide open, let's
 do the exact opposite. Restrict access to it.
 
 The only e-mail activity on my PC should be initiated by me,
 personally. Nothing else should access my address book or send
 out messages without my express permission. Microsoft will of
 course reject the idea, mostly because it will fail the "increase
 market share litmus test." My answer is, "Microsoft, if you do not
 take responsibility for locking down your APIs, it will become
 obvious to the public and become a detriment to your market
 share."
 
 Now to the other approach, the one some people attribute to
 Microsoft. I am not making this up. The story came to me from
 people I have come to trust, and I have looked into it closely
 enough to think it might have some validity. But for the sake of
 keeping lawyers off my back, let's just call it a rumor, and only use
 it as a basis for discussion. To be perfectly clear, I am not claiming
 that the following is true -- just that I have heard it from more than
 one source, and think it accurately characterizes some past
 behaviors of Microsoft. Perhaps by bringing it into the light, we can
 ensure that Redmond takes a more thoughtful course. I certainly
 hope it is wrong.
 
 Programmers who ought to be familiar with Microsoft's plans have
 suggested that the real motive for raw socket support is for
 Microsoft to use Windows XP to exploit a bad situation, to
 deliberately make things worse.
 
 According to these programmers, Microsoft wants to replace
 TCP/IP with a proprietary protocol -- a protocol owned by Microsoft -
 - that it will tout as being more secure. Actually, the new protocol
 would likely be TCP/IP with some of the reserved fields used as
 pointers to proprietary extensions, quite similar to Vines IP, if you
 remember that product from Banyan Systems. I'll call it TCP/MS.
 
 How do you push for the acceptance of a new protocol? First,
 make the old one unworkable by placing millions of exploitable
 TCP/IP stacks out on the Net, ready-to-use by any teenage
 sociopath. When the Net slows or crashes, the blame would not be
 assigned to Microsoft. Then ship the new protocol with every new
 copy of Windows, and install it with every Windows Update over
 the Internet. Zero to 100 million copies could happen in less than a
 year, and that year could be prior to the new protocol even being
 announced. It could be shipping right now.
 
 Mehr
 http://www.pbs.org/cringely/pulpit/pulpit20010802.html
 
 
 -.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.-
 - -.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.-
 edited by
 published on: 2001-08-04
 comments to office@quintessenz.at
 subscribe Newsletter
 - -.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.-
 <<  
                   ^ 
                    >>
 |  |  |  |