A
Grain of Salt: dealing
with Operating Systems security debate
An
article (ref: http://www.zone-h.org/winvslinux ) recently released by Zone-h website and containing data updated to May 2003
takes into account the evolution of the number of confirmed defacements (attacks
conducted by humans to web servers which leave a trace in the form of modified
webpages on the server and are then reported to Zone-h for verification, called
also overt attacks) performed by cybercriminals on various server platforms.
This study has been taken by many as
a demonstration of the superior security of Windows server operating systems
in respect to Linux.
Part
1: Overt Attacks
The
charts included, taken from that very Zone-h feature, are indeed worth a lot
of words.
This
one shows the evolution of this kind of attack by hostnames. Given the fact
that a single webserver can host multiple sites, the chart itself is not valid
'per se' to describe how many machines running Linux or Windows have been successfully attacked by human crackers
and 'defaced'. This is easily assessed looking at the following chart:
Here
the situation appears quite different: the number of actual machines compromised
is currently kind of equal for the two OS families, but the recent past shows
a peak in damaged machines running Windows. This can lead to a bit of confusion
among readers: the two charts seem to be in stark contrast.
This
is only partially true: we can guess that an increasing number of providers
are using Linux to deploy multiple websites on single webservers, and an attack
to a single machine can lead to a so-called mass defacement, which weighs
on Linux statistics heavily. Windows machines are also used by ISPs, but it
seems that Linux for economic and flexibility reasons is more and more used
for this kind of deployments.
An
interesting point of the above chart is the correlation shown in the image
between the Slammer worm (an automated attack by a malicious program which
affected Microsoft SQL Server at the end of 2002) and the increase in Windows
defacements. This appears at least strange, because Slammer did not attack
IIS webservers (at least directly) and can't be held responsible of web defacements
(at least directly). Besides it attacked a number of machines which is estimated
much higher than 7000
(ref:
http://news.com.com/2009-1001-983540.html?tag=prntfr)
at
a lightning speed. So why the patching of Slammer marks a decrease of web
defacements? Again we can guess that many sistem administrators, while patching
their SQL servers for the Slammer worm have also given a look to their IIS
servers and applied security measures (patching, firewalling...) which led
to a more normal exploitation susceptibility for the Windows platforms. The
big peak in Windows defacements could be due to vulnerabilities which went
unpatched for a long time; besides, the Sept.11 anniversary could be also
a reason for the general explosion of defacements? Could be, but the effect
of an anniversary is not typically lasting for 6-7 months...
The
total approximate number of defacements is accessible also through a release
of mi2g (ref: http://www.mi2g.com/status ) and show, for 2002 (the
last complete year) a number of defacements of about 85000 machines (assuming
most probably a count by single IP) with Windows systems accounting for about
49000 attacks and Linux systems accounting for 24000 'overt attacks'.
So
what can we conclude from the comparative analysis of this data? Not very
much in absence of other data like the actual number of hosts running Linux
or Windows on the Internet or the percentage of mass defacements among the
two platforms. But also in presence of accessory data like this, we have to
take into account a big number of factors, as the money invested by site owners
to secure and keep up to date their webservers, the functionalities enabled
typically in every platform (ie. Apache with PHP or IIS with ASP) and the
ease of patching for every platform.
2.
Some automated attacks
In
contrast with the human-led defacements, many Internet servers are daily compromised
by automated attacks, frequently by worms (malicious code which self-replicates
and spreads using known vulnerabilities of host systems).
On
July 19, 2001 more than 359,000 computers were infected with the Code-Red
(CRv2) worm in less than 14 hours. At the peak of the infection frenzy,
more than 2,000 new hosts were infected each minute.
The
quote is from the CAIDA website
(ref:
http://www.caida.org/analysis/security/code-red )
and
is interesting for a comparison between figures of human-led and worm-led
attacks. Code Red exploited a flaw in Microsoft IIS webservers.
In
the largest such incident since the Code Red and Nimda worms bored into servers
in 2001, the Sapphire worm--also known as Slammer and SQLExp--infected more
than 120,000 computers(...)
This
quote is from News.com website
(ref:
http://news.com.com/2100-1001-982135.html?tag=nl ).
The
Slammer worm has been held responsible for networks overloads worldwide,
all this obtained attacking just a class of Internet connected computers
(Microsoft SQL Servers). Strictly speaking this worm did not attack webservers,
but it is worth mentioning in the bigger picture of 'server operating
systems security' debate. Besides, as noticed before, this worm has been
held responsible (not correctly, we guessed) for Windows defacements.
The
most recent major outbreak--Nimda, which infected hundreds of thousands of
systems in September--was "the ultimate cocktail," a worm that exploited
multiple methods of spreading, and attacked systems through multiple security
holes in Microsoft's Internet Information Services software(...)
This
quote is from the Pcworld.com website
(ref:
http://www.pcworld.com/news/article/0,aid,71343,00.asp )
and
testifies about another popular worm which targeted Windows mixed platforms
back in 2001.
For
a comparison, it's worth quoting an article regarding the Slapper worm,
taken from the Vnunet website
(ref:
http://www.vnunet.com/News/1135137 )
The
Internet Storm Centre (ISC), the early warning system from the Sans Institute,
is on yellow alert for the first time in months as the Slapper worm continues
its infection of Apache web servers. (...) Slapper-infected servers have
already been linked to denial of service (DoS) attacks against other machines.
It is thought that some script kiddies found the source code for a concept
attack known as peer-to-peer UDP Distributed DoS (PUD) on a security site
and turned it into a working worm. The ISC has confirmed that around 6,000
servers are currently infected. But speculation on the BugTraq security
mailing list suggests that numbers may be as high as 30,000. A patch has
already been released by the OpenSSL crew (...).
The
Slapper worm exploited vulnerable Apache servers back in 2002.
3.
A bigger picture
A
first conclusion could be that human attacks are more or less continuous,
and reach figures around 100000 yearly, but automated exploits have by
far outweighed them, sometimes in days or hours (see examples above).
Another key point is that nothing in this 'bigger picture' is testifying
a lesser security of Linux operating systems in respect to their Windows
counterparts.
This
article is not aimed to denigrate Windows or praise Linux OSes, the aim
of this paper is to put 'en garde' journalists and end users from the
dangers of simplification. If in the desktop arena Windows is by far the
most targeted platform (tens of thousands of viruses exist according to
some estimations), and countless papers have tried to explain it as a
result of poor design or simply of market dominance, in the server arena,
where the host can't be 'hidden' completely from attackers, no operating
system can be considered 'less targeted', because very skilled humans
can penetrate almost any security measure. And if humans don't bother
you, automated attacks are always waiting for unpatched software vulnerabilities.
As
a final consideration, may we strongly suggest to nonexpert system administrators
NOT to run their own webservers (on whatever platform) and let instead
run their websites by a good Service Provider? Assistance and disaster
recovery are better done by professionals...if, instead, you belong to
the Elected Uberadministrators, you sure don't need our advice.
This
article is not intended to denigrate/damage any of the quoted websites
(may we agree with them or not) or to steal their intellectual property.
All sources are properly quoted and the information used for educational
purpose only.
21th of July, 2003
Simone
Bianchi
UPDATE
In
November I contacted the Administrator of Zone-h with the following mail:
Dear
Admin
I already wrote to you from another e-mail address. Assuming my post did
not reach you, I'm reposting to you to request if it's possible to have
the defacement archive also selectable to show single-IP defacements (ie.
show mass defacements as a single hit). Some IT pros would find useful
to know how many machines (and not virtual websites)
have been compromised for each OS. As regarding your useful article of
some months ago (Windows vs. Linux) I've written a comment article I'd
like the author to read.
Here is the address:
http://www.thinkmagazine2.org/versione_layer/security.html
Thanks for your attention
Simone Bianchi
Here
is the answer of the Admin:
Dear
Simone, I got hold on your mail and I went to read your article.
The analisys you did is quite right, except for one point, where you said:
"An interesting point of the above chart is the correlation shown
in the image between the Slammer worm (an automated attack by a malicious
program which affected Microsoft SQL Server at the end of 2002) and the
increase in Windows defacements. This appears at least strange, because
Slammer did not attack IIS webservers (at least directly) and can't be
held responsible of web defacements (at least directly). Besides it attacked
a number of
machines which is estimated much higher than 7000"
The correlation you are referring to, is actually the opposite. In the
article we released together with the chart it is stated that the slammerworm
is actually the reason of the DECREMENT of the windows defacement. We
never stated that slammerworm was the cause of the defacements, we rather
stated that the worm and its wide publicity on the media was the cause
that pushed admins to patch, thus rendering their windows systems less
attackable.
Also you wrote:
"the Sept.11 anniversary could be also a reason for the general explosion
of
defacements? Could be, but the effect of an anniversary is not typically
lasting for 6-7 months..."
Being in contact with the defacers panorama since a long time, i can tell
you that those kind of anniversaries are actually lasting more than 6-7
months. In fact, we ecperienced a peak also in the last sept anniversary,
2 years after the tragedy. On the other hand, we do agree with you on
one point:
"So what can we conclude from the comparative analysis of this data?
Not very much in absence of other data like the actual number of hosts
running Linux or Windows on the Internet or the percentage of mass defacements
among the two platforms. But also in presence of accessory data like this,
we have to take into account a big number of factors, as the money invested
by site owners to secure and keep up to date their webservers, the functionalities
enabled typically in every platform (ie. Apache with PHP or IIS with ASP)
and the ease of patching for every platform."
In fact, in my speech at the Defcon 11, I commented those charts with
the same phrase.
I would also add that given the fact that today the attacks are conducted
also on application and database level, there is no sense at all in deciding
if Windows is better than Linux (in security) just judging the raw numbers
of the defacements.
About the request of having the defacement archive also selectable to
show single-IP defacements , we will probably implement it in the next
version of Zone-H.
Regards,
SyS64738 www.zone-h.org admin.
UPDATE
(2)
Later
on, encouraged by the kindness and competence of Admin, I wrote back to
him :
Caro
(first name of Sys64738)
(immagino che siamo ambedue italiani)
vorrei pubblicare la tua lettera come commento al mio articolo quando
il tempo me lo permetterà...
spero che tu non abbia nulla in contrario.
(NOTE:
I've reason to think Admin is Italian, so I'm telling him in Italian I'd
like to publish these letters in an article.)
Besides
(getting back to English) if you agree with the publication of this letter,
I'd like to ask you an opinion about malware in Windows and Linux server
worlds.
Doing
a bit of research on the Net it's easy to discover how the first http
worms were born and spread on Unix platforms. Nevertheless in the recent
past the worst Unix worms (ie. Slapper) spread in a rather confined way,
in respect to lightnings as Slammer (curious name resemblance) or Code
Red or also Nimda. And this all in spite of the Apache/Linux/BSD http
server panorama dominance...
Is it, according to you, due to the fact Windows systems are often deployed
more or less equal to one another, while their opensource counterparts
are a more varied panorama, rendering them less targetable by automatic
exploits (but NOT by humans, which are *sigh* more versatile)?
Or were rather Windows servers targeted using the weaknesses of the Win95/98
desktops (as in the case of Nimda)?
Grazie
per l'attenzione, non mancare di avvertirmi se neghi il consenso alla
pubblicazione.
La rivista l'avrai già guardata, ti posso dire che le contribuzioni
sono sempre state di qualità, quindi la tua voce è in buone
mani.
(NOTE:I'm
asking him in Italian to deny explicitly his allowance to publish if he
doesn't want me to. I'm also praising Tmag ;-))
Ciao
Simone
_____________________
As
soon as I'll receive a follow-up I'll publish it.
Meanwhile,
if Sys64738 did not receive the e-mail or was unable to comment for whatever
reason (btw. I switched mail provider in this period, though leaving pointers
to reach me safely), please send mail to thinkmagazine@simonebianchi.net . I'm
always available (within reasonable time, after which Tmag articles go
out-of-maintenance) for further updates to this page.
3rd
of December, 2003
Simone
Bianchi
Updated: February 2008 (mail address)
|