www.thinkmagazine2.org
tmag arte scienza contributi dalla rete annotazioni

 

A Grain of Salt: dealing with Operating Systems security debate

An article (ref: http://www.zone-h.org/winvslinux ) recently released by Zone-h website and containing data updated to May 2003 takes into account the evolution of the number of confirmed defacements (attacks conducted by humans to web servers which leave a trace in the form of modified webpages on the server and are then reported to Zone-h for verification, called also overt attacks) performed by cybercriminals on various server platforms. This study has been taken by many as a demonstration of the superior security of Windows server operating systems in respect to Linux.

Part 1: Overt Attacks

The charts included, taken from that very Zone-h feature, are indeed worth a lot of words.


 

This one shows the evolution of this kind of attack by hostnames. Given the fact that a single webserver can host multiple sites, the chart itself is not valid 'per se' to describe how many machines running Linux or Windows have been successfully attacked by human crackers and 'defaced'. This is easily assessed looking at the following chart:

 

Here the situation appears quite different: the number of actual machines compromised is currently kind of equal for the two OS families, but the recent past shows a peak in damaged machines running Windows. This can lead to a bit of confusion among readers: the two charts seem to be in stark contrast.

This is only partially true: we can guess that an increasing number of providers are using Linux to deploy multiple websites on single webservers, and an attack to a single machine can lead to a so-called mass defacement, which weighs on Linux statistics heavily. Windows machines are also used by ISPs, but it seems that Linux for economic and flexibility reasons is more and more used for this kind of deployments.

An interesting point of the above chart is the correlation shown in the image between the Slammer worm (an automated attack by a malicious program which affected Microsoft SQL Server at the end of 2002) and the increase in Windows defacements. This appears at least strange, because Slammer did not attack IIS webservers (at least directly) and can't be held responsible of web defacements (at least directly). Besides it attacked a number of machines which is estimated much higher than 7000

(ref: http://news.com.com/2009-1001-983540.html?tag=prntfr)

at a lightning speed. So why the patching of Slammer marks a decrease of web defacements? Again we can guess that many sistem administrators, while patching their SQL servers for the Slammer worm have also given a look to their IIS servers and applied security measures (patching, firewalling...) which led to a more normal exploitation susceptibility for the Windows platforms. The big peak in Windows defacements could be due to vulnerabilities which went unpatched for a long time; besides, the Sept.11 anniversary could be also a reason for the general explosion of defacements? Could be, but the effect of an anniversary is not typically lasting for 6-7 months...

The total approximate number of defacements is accessible also through a release of mi2g (ref: http://www.mi2g.com/status ) and show, for 2002 (the last complete year) a number of defacements of about 85000 machines (assuming most probably a count by single IP) with Windows systems accounting for about 49000 attacks and Linux systems accounting for 24000 'overt attacks'.

So what can we conclude from the comparative analysis of this data? Not very much in absence of other data like the actual number of hosts running Linux or Windows on the Internet or the percentage of mass defacements among the two platforms. But also in presence of accessory data like this, we have to take into account a big number of factors, as the money invested by site owners to secure and keep up to date their webservers, the functionalities enabled typically in every platform (ie. Apache with PHP or IIS with ASP) and the ease of patching for every platform.

2. Some automated attacks

In contrast with the human-led defacements, many Internet servers are daily compromised by automated attacks, frequently by worms (malicious code which self-replicates and spreads using known vulnerabilities of host systems).

On July 19, 2001 more than 359,000 computers were infected with the Code-Red (CRv2) worm in less than 14 hours. At the peak of the infection frenzy, more than 2,000 new hosts were infected each minute.

The quote is from the CAIDA website

(ref: http://www.caida.org/analysis/security/code-red )

and is interesting for a comparison between figures of human-led and worm-led attacks. Code Red exploited a flaw in Microsoft IIS webservers.

In the largest such incident since the Code Red and Nimda worms bored into servers in 2001, the Sapphire worm--also known as Slammer and SQLExp--infected more than 120,000 computers(...)

This quote is from News.com website

(ref: http://news.com.com/2100-1001-982135.html?tag=nl ).

The Slammer worm has been held responsible for networks overloads worldwide, all this obtained attacking just a class of Internet connected computers (Microsoft SQL Servers). Strictly speaking this worm did not attack webservers, but it is worth mentioning in the bigger picture of 'server operating systems security' debate. Besides, as noticed before, this worm has been held responsible (not correctly, we guessed) for Windows defacements.

The most recent major outbreak--Nimda, which infected hundreds of thousands of systems in September--was "the ultimate cocktail," a worm that exploited multiple methods of spreading, and attacked systems through multiple security holes in Microsoft's Internet Information Services software(...)

This quote is from the Pcworld.com website

(ref: http://www.pcworld.com/news/article/0,aid,71343,00.asp )

and testifies about another popular worm which targeted Windows mixed platforms back in 2001.

For a comparison, it's worth quoting an article regarding the Slapper worm, taken from the Vnunet website

(ref: http://www.vnunet.com/News/1135137 )

The Internet Storm Centre (ISC), the early warning system from the Sans Institute, is on yellow alert for the first time in months as the Slapper worm continues its infection of Apache web servers. (...) Slapper-infected servers have already been linked to denial of service (DoS) attacks against other machines. It is thought that some script kiddies found the source code for a concept attack known as peer-to-peer UDP Distributed DoS (PUD) on a security site and turned it into a working worm. The ISC has confirmed that around 6,000 servers are currently infected. But speculation on the BugTraq security mailing list suggests that numbers may be as high as 30,000. A patch has already been released by the OpenSSL crew (...).

The Slapper worm exploited vulnerable Apache servers back in 2002.

3. A bigger picture

A first conclusion could be that human attacks are more or less continuous, and reach figures around 100000 yearly, but automated exploits have by far outweighed them, sometimes in days or hours (see examples above). Another key point is that nothing in this 'bigger picture' is testifying a lesser security of Linux operating systems in respect to their Windows counterparts.

This article is not aimed to denigrate Windows or praise Linux OSes, the aim of this paper is to put 'en garde' journalists and end users from the dangers of simplification. If in the desktop arena Windows is by far the most targeted platform (tens of thousands of viruses exist according to some estimations), and countless papers have tried to explain it as a result of poor design or simply of market dominance, in the server arena, where the host can't be 'hidden' completely from attackers, no operating system can be considered 'less targeted', because very skilled humans can penetrate almost any security measure. And if humans don't bother you, automated attacks are always waiting for unpatched software vulnerabilities.

As a final consideration, may we strongly suggest to nonexpert system administrators NOT to run their own webservers (on whatever platform) and let instead run their websites by a good Service Provider? Assistance and disaster recovery are better done by professionals...if, instead, you belong to the Elected Uberadministrators, you sure don't need our advice.

This article is not intended to denigrate/damage any of the quoted websites (may we agree with them or not) or to steal their intellectual property. All sources are properly quoted and the information used for educational purpose only.

 

21th of July, 2003

Simone Bianchi

UPDATE

In November I contacted the Administrator of Zone-h with the following mail:

Dear Admin
I already wrote to you from another e-mail address. Assuming my post did not reach you, I'm reposting to you to request if it's possible to have the defacement archive also selectable to show single-IP defacements (ie. show mass defacements as a single hit). Some IT pros would find useful to know how many machines (and not virtual websites)
have been compromised for each OS. As regarding your useful article of some months ago (Windows vs. Linux) I've written a comment article I'd like the author to read.
Here is the address:


http://www.thinkmagazine2.org/versione_layer/security.html


Thanks for your attention
Simone Bianchi

Here is the answer of the Admin:

 

Dear Simone, I got hold on your mail and I went to read your article.
The analisys you did is quite right, except for one point, where you said:
"An interesting point of the above chart is the correlation shown in the image between the Slammer worm (an automated attack by a malicious program which affected Microsoft SQL Server at the end of 2002) and the increase in Windows defacements. This appears at least strange, because Slammer did not attack IIS webservers (at least directly) and can't be held responsible of web defacements (at least directly). Besides it attacked a number of
machines which is estimated much higher than 7000"


The correlation you are referring to, is actually the opposite. In the
article we released together with the chart it is stated that the slammerworm is actually the reason of the DECREMENT of the windows defacement. We never stated that slammerworm was the cause of the defacements, we rather stated that the worm and its wide publicity on the media was the cause that pushed admins to patch, thus rendering their windows systems less attackable.


Also you wrote:
"the Sept.11 anniversary could be also a reason for the general explosion of
defacements? Could be, but the effect of an anniversary is not typically
lasting for 6-7 months..."


Being in contact with the defacers panorama since a long time, i can tell
you that those kind of anniversaries are actually lasting more than 6-7 months. In fact, we ecperienced a peak also in the last sept anniversary, 2 years after the tragedy. On the other hand, we do agree with you on one point:
"So what can we conclude from the comparative analysis of this data? Not very much in absence of other data like the actual number of hosts running Linux or Windows on the Internet or the percentage of mass defacements among the two platforms. But also in presence of accessory data like this, we have to take into account a big number of factors, as the money invested by site owners to secure and keep up to date their webservers, the functionalities enabled typically in every platform (ie. Apache with PHP or IIS with ASP) and the ease of patching for every platform."


In fact, in my speech at the Defcon 11, I commented those charts with the same phrase.
I would also add that given the fact that today the attacks are conducted also on application and database level, there is no sense at all in deciding if Windows is better than Linux (in security) just judging the raw numbers of the defacements.
About the request of having the defacement archive also selectable to show single-IP defacements , we will probably implement it in the next version of Zone-H.

Regards, SyS64738 www.zone-h.org admin.

UPDATE (2)

Later on, encouraged by the kindness and competence of Admin, I wrote back to him :

Caro (first name of Sys64738)
(immagino che siamo ambedue italiani)
vorrei pubblicare la tua lettera come commento al mio articolo quando il tempo me lo permetterà...
spero che tu non abbia nulla in contrario.

(NOTE: I've reason to think Admin is Italian, so I'm telling him in Italian I'd like to publish these letters in an article.)

Besides (getting back to English) if you agree with the publication of this letter, I'd like to ask you an opinion about malware in Windows and Linux server worlds.

Doing a bit of research on the Net it's easy to discover how the first http worms were born and spread on Unix platforms. Nevertheless in the recent past the worst Unix worms (ie. Slapper) spread in a rather confined way, in respect to lightnings as Slammer (curious name resemblance) or Code Red or also Nimda. And this all in spite of the Apache/Linux/BSD http server panorama dominance...


Is it, according to you, due to the fact Windows systems are often deployed more or less equal to one another, while their opensource counterparts are a more varied panorama, rendering them less targetable by automatic exploits (but NOT by humans, which are *sigh* more versatile)?


Or were rather Windows servers targeted using the weaknesses of the Win95/98 desktops (as in the case of Nimda)?

Grazie per l'attenzione, non mancare di avvertirmi se neghi il consenso alla pubblicazione.
La rivista l'avrai già guardata, ti posso dire che le contribuzioni sono sempre state di qualità, quindi la tua voce è in buone mani.

(NOTE:I'm asking him in Italian to deny explicitly his allowance to publish if he doesn't want me to. I'm also praising Tmag ;-))

Ciao

Simone

_____________________

As soon as I'll receive a follow-up I'll publish it.

Meanwhile, if Sys64738 did not receive the e-mail or was unable to comment for whatever reason (btw. I switched mail provider in this period, though leaving pointers to reach me safely), please send mail to thinkmagazine@simonebianchi.net . I'm always available (within reasonable time, after which Tmag articles go out-of-maintenance) for further updates to this page.

3rd of December, 2003

Simone Bianchi

Updated: February 2008 (mail address)