Re: [Full-disclosure] Windows' future (reprise)

2010-05-25 Thread M.B.Jr.
Hey kids, whazup?


On Sat, May 15, 2010 at 11:40 AM, Thor (Hammer of God)
t...@hammerofgod.com wrote:
 If you are still running Windows 95 that's your problem.


Nevertheless, if one runs Windows 7, here is the problem:

http://en.windows7sins.org/


Regards,



Marcio Barbado, Jr.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Windows' future (reprise)

2010-05-25 Thread Christian Sciberras
Oh my G!


I'm going to quote that site next time I get to help a *nix newbie figure
out permissions without sudo.

Seriously by that reason I could accuse linux users of exerting too much
freedom giving the allusion of godly control - which as you might have
guessed is a sin.


...unless you redefined sin as using MS windows?




On Tue, May 25, 2010 at 6:13 PM, M.B.Jr. marcio.barb...@gmail.com wrote:

 Hey kids, whazup?


 On Sat, May 15, 2010 at 11:40 AM, Thor (Hammer of God)
 t...@hammerofgod.com wrote:
  If you are still running Windows 95 that's your problem.


 Nevertheless, if one runs Windows 7, here is the problem:

 http://en.windows7sins.org/


 Regards,



 Marcio Barbado, Jr.

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Windows' future (reprise)

2010-05-21 Thread Georgi Guninski
On Tue, May 18, 2010 at 11:27:22AM -0400, valdis.kletni...@vt.edu wrote:
 
 (Note that the esteemed Mr READ_THE_LIST_CHARTER   overlooked unknown 
 knowns - that class
 of stuff we don't realize or refuse to admit we actually *do* know:

ok, i know i am a writer not a reader (like a narcisist chukcha is ;) )

can you recommend reading about malware that belongs to a class of malware the 
existence of which provably cannot be proved within current technology ... if 
one assumes current technology itself is consistent [1]

the disclosed idea of backdooring the compiler doesn't count, because currently 
people are *examining* compilers (well, assuming they can do it).

did someone {\TeX , .pdf } producer managed to represent in text some 
_abstract??_ backdooring that is undetectable with current plausible budgets 
(as in god can backdoor all of your bases or it may be possible to screw the 
electric field in exploitable way in any circumstances ) ?


[1] 
http://en.wikipedia.org/w/index.php?title=Large_cardinal_propertyoldid=18071390

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Windows' future (reprise)

2010-05-19 Thread lsi
On 18 May 2010 at 14:40, Thor (Hammer of God) wrote:

 In fact, this thread has inspired me to add a new section to the
 Hammer of God website (currently undergoing major renovation)

Uh-huh... get a new version of Dreamweaver did we? :)

 I just want to make sure you understand that *I* didn't have anything
 do with any ludicrous comments 

Sure, we understand that completely. we really do :)

Just teasing, tx for the chats, lookin forward to next time...

Stu

---
Stuart Udall
stuart a...@cyberdelix.dot net - http://www.cyberdelix.net/

--- 
 * Origin: lsi: revolution through evolution (192:168/0.2)

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Windows' future (reprise)

2010-05-19 Thread Thor (Hammer of God)
LOL.  Actually, I *did* get a new version of Dreamweaver!  But I think I'll 
stick with Expression - I like it... but, I'll still have to see what DW will 
do for me.

It's great that we can make fun of each other without the other taking it too 
personally.  Good stuff.  

t

-Original Message-
From: full-disclosure-boun...@lists.grok.org.uk 
[mailto:full-disclosure-boun...@lists.grok.org.uk] On Behalf Of lsi
Sent: Wednesday, May 19, 2010 1:08 PM
To: full-disclosure@lists.grok.org.uk
Subject: Re: [Full-disclosure] Windows' future (reprise)

On 18 May 2010 at 14:40, Thor (Hammer of God) wrote:

 In fact, this thread has inspired me to add a new section to the 
 Hammer of God website (currently undergoing major renovation)

Uh-huh... get a new version of Dreamweaver did we? :)

 I just want to make sure you understand that *I* didn't have anything 
 do with any ludicrous comments

Sure, we understand that completely. we really do :)

Just teasing, tx for the chats, lookin forward to next time...

Stu

---
Stuart Udall
stuart a...@cyberdelix.dot net - http://www.cyberdelix.net/

---
 * Origin: lsi: revolution through evolution (192:168/0.2)

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Windows' future (reprise)

2010-05-18 Thread Cassidy MacFarlane
Sent from my HTC

-Original Message-
From: Thor (Hammer of God) t...@hammerofgod.com
Sent: 15 May 2010 21:59
To: full-disclosure@lists.grok.org.uk full-disclosure@lists.grok.org.uk
Subject: Re: [Full-disclosure] Windows' future (reprise)

No, It's Tim Mullen.  No Bill here.  

No, I don't misunderstand:  You said You may recall that last year, the 
average annual growth rate of new threats (as defined by Symantec) was 243%.  
This enabled me to predict that the number of new threats in this year's 
Symantec Threat Report would be 243% of last years.  IOW, you took what 
Symantec's numbers were for one year, and guessed they would be the same for 
this year, and then posted how you were almost right.  Congratulation, you can 
make statements in the obvious.

You people really need to get your stories straight.  Isn't there some club or 
something you guys can join to at least sync up your talking points?   First we 
hear about how AV is stupid, unneeded, useless, a waste of money, and if you 
install it then you are ignorant.  Then we hear about how some people can 
bypass AV using kernel hooks on windows XP and call it an 8.0 Earthquake.  
Now you come out and say that you predict that AV will not be able to keep up 
with these new threats and that people must stop using Windows as a result 
since Windows is not likely of producing any secure version of anything 
anytime soon.  

Then you blithe on about how people should avoid any software that locks them 
into a Microsoft Platform like the plague and specifically note .NET for 
businesses but of course fail to provide any examples of where they should go, 
or any real advice on your mitigation strategy.  

What it is about .NET that should be avoided like the plague?  Wait, before you 
answer that, let's make sure you are qualified to answer.  One must assume that 
you are an expert .NET developer and that you have keen insight into the very 
foundation of the platform in order to know unequivocally that it should not be 
used under any circumstances.   Please give us some code examples of your .NET 
projects where it failed so miserably, even given your expertise, and then 
provide the proper secure solution in your magic TardWare solution.  
Certainly someone speaking with such authority on the matter can come up with 
examples in no time.  

Additionally, you've clearly performed migration engagements for these people 
you advise.  Please let us know what the actual migration plan was, and how 
you have so brilliantly created a one-off cost migration path.  I'm really 
interested in the details about that.  I would particularly like to know what 
authentication infrastructure you would build to support secure 
enterprise-based services, your solution for client access and administration, 
and your overall network concepts.  Also, what is your preferred replacement 
for .NET again?  Details on your SDL process would be fantastic as well. 

You've got a great opportunity to really contribute to the industry by 
providing us with your qualifications and subsequent solutions to these 
problems, so I'm really looking forward to seeing what you have to say on the 
matter beyond Symantec said we'd have this amount of growth, so I said that 
too, and I was almost right.  And since I was almost right, it is imperative to 
drop all Windows products and re-write all of your .NET code immediately 
because AV won't be able to keep up with it.

t

-Original Message-
From: full-disclosure-boun...@lists.grok.org.uk 
[mailto:full-disclosure-boun...@lists.grok.org.uk] On Behalf Of lsi
Sent: Saturday, May 15, 2010 1:07 PM
To: full-disclosure@lists.grok.org.uk
Subject: Re: [Full-disclosure] Windows' future (reprise)

Is that you, Bill?

I think you misunderstand.  9 months ago, I measured the growth rate at 243%, 
using Symantec's stats.  9 months ago I posted that number here, together with 
a prediction of this year's stats.  Recently, I got this year's stats and 
compared them with that prediction.  I found that this prediction was 75.4% 
accurate.  I am now reporting those results back to the group.  And this is 
trolling how?

My point is that the prediction was not wildly wrong, and so that leads me to 
wonder if anything else I said, 9 months ago, was also not wildly wrong.

My main reason for claiming that Windows is inherently insecure is because it's 
closed source.  However it's also because of the sloppy, monolithic spaghetti 
code that Windows is made of.  If you're claiming Windows is in fact inherently 
secure, I assume this means you don't use AV on any of your Windows machines, 
and advise everyone you know to uninstall it?

I never said migration would be free or easy.  That is why I am posting this 
data here, because I see it as a vulnerability, a very big vulnerability that 
many companies have not woken up to.  The very fact that migration is hard, 
lengthy, and expensive, means that the vulnerability is larger than ever.

Stu

Re: [Full-disclosure] Windows' future (reprise)

2010-05-18 Thread Christian Sciberras
Happens they are completely unrelated stories. Also happens that I won't
fall for someone's hysteria from using windows.

By the way, I don't know you, but I would depend on the _fact_ that I've
been using a product without a hitch rather then someone's claims that the
said product will fall in a year's time.

By the way, I think it would do you a lot of good if you quote Thor's
messages warning us from using Windows etc.

If you only have a troll's remarks to add, then leave the discussion.

As of this time, there is only one huge security risk all researchers agree
on; human error aka people's stupidity





On Tue, May 18, 2010 at 11:01 AM, Cassidy MacFarlane 
cassidy.macfarl...@grantmanagement.co.uk wrote:

 Sent from my HTC

 -Original Message-
 From: Thor (Hammer of God) t...@hammerofgod.com
 Sent: 15 May 2010 21:59
 To: full-disclosure@lists.grok.org.uk full-disclosure@lists.grok.org.uk
 Subject: Re: [Full-disclosure] Windows' future (reprise)

 No, It's Tim Mullen.  No Bill here.

 No, I don't misunderstand:  You said You may recall that last year, the
 average annual growth rate of new threats (as defined by Symantec) was 243%.
  This enabled me to predict that the number of new threats in this year's
 Symantec Threat Report would be 243% of last years.  IOW, you took what
 Symantec's numbers were for one year, and guessed they would be the same for
 this year, and then posted how you were almost right.  Congratulation, you
 can make statements in the obvious.

 You people really need to get your stories straight.  Isn't there some club
 or something you guys can join to at least sync up your talking points?
 First we hear about how AV is stupid, unneeded, useless, a waste of money,
 and if you install it then you are ignorant.  Then we hear about how some
 people can bypass AV using kernel hooks on windows XP and call it an 8.0
 Earthquake.  Now you come out and say that you predict that AV will not be
 able to keep up with these new threats and that people must stop using
 Windows as a result since Windows is not likely of producing any secure
 version of anything anytime soon.

 Then you blithe on about how people should avoid any software that locks
 them into a Microsoft Platform like the plague and specifically note .NET
 for businesses but of course fail to provide any examples of where they
 should go, or any real advice on your mitigation strategy.

 What it is about .NET that should be avoided like the plague?  Wait, before
 you answer that, let's make sure you are qualified to answer.  One must
 assume that you are an expert .NET developer and that you have keen insight
 into the very foundation of the platform in order to know unequivocally that
 it should not be used under any circumstances.   Please give us some code
 examples of your .NET projects where it failed so miserably, even given your
 expertise, and then provide the proper secure solution in your magic
 TardWare solution.  Certainly someone speaking with such authority on the
 matter can come up with examples in no time.

 Additionally, you've clearly performed migration engagements for these
 people you advise.  Please let us know what the actual migration plan was,
 and how you have so brilliantly created a one-off cost migration path.  I'm
 really interested in the details about that.  I would particularly like to
 know what authentication infrastructure you would build to support secure
 enterprise-based services, your solution for client access and
 administration, and your overall network concepts.  Also, what is your
 preferred replacement for .NET again?  Details on your SDL process would be
 fantastic as well.

 You've got a great opportunity to really contribute to the industry by
 providing us with your qualifications and subsequent solutions to these
 problems, so I'm really looking forward to seeing what you have to say on
 the matter beyond Symantec said we'd have this amount of growth, so I said
 that too, and I was almost right.  And since I was almost right, it is
 imperative to drop all Windows products and re-write all of your .NET code
 immediately because AV won't be able to keep up with it.

 t

 -Original Message-
 From: full-disclosure-boun...@lists.grok.org.uk [mailto:
 full-disclosure-boun...@lists.grok.org.uk] On Behalf Of lsi
 Sent: Saturday, May 15, 2010 1:07 PM
 To: full-disclosure@lists.grok.org.uk
 Subject: Re: [Full-disclosure] Windows' future (reprise)

 Is that you, Bill?

 I think you misunderstand.  9 months ago, I measured the growth rate at
 243%, using Symantec's stats.  9 months ago I posted that number here,
 together with a prediction of this year's stats.  Recently, I got this
 year's stats and compared them with that prediction.  I found that this
 prediction was 75.4% accurate.  I am now reporting those results back to the
 group.  And this is trolling how?

 My point is that the prediction was not wildly wrong, and so that leads me
 to wonder if anything

Re: [Full-disclosure] Windows' future (reprise)

2010-05-18 Thread Thor (Hammer of God)
What messages warning you from using Windows?  I certainly hope you do not have 
me confused with the OP - I already used the term hysteria to describe his 
ideas and subsequent recommendations.  The entire premise is fatally flawed, 
and the subsequent replies show a level of ignorance that I have not seen in a 
professional security person in some time.   It's not surprising to see that 
the background of his site remains blackened in protest against the many 
illegal and unethical activities of the USA.  Hysterical indeed.

In fact, this thread has inspired me to add a new section to the Hammer of God 
website (currently undergoing major renovation) called Tard of the Month  
where I'll take claims like the one submitted by the OP and basically... well, 
you know what I'll do.

I just want to make sure you understand that *I* didn't have anything do with 
any ludicrous comments about abandoning the Windows platform because all the 
oxygen in my computer was being consumed by what Symantec notes as new 
threats.

t

From: Christian Sciberras [mailto:uuf6...@gmail.com]
Sent: Tuesday, May 18, 2010 3:40 AM
To: Cassidy MacFarlane
Cc: Thor (Hammer of God); full-disclosure@lists.grok.org.uk
Subject: Re: [Full-disclosure] Windows' future (reprise)

Happens they are completely unrelated stories. Also happens that I won't fall 
for someone's hysteria from using windows.

By the way, I don't know you, but I would depend on the _fact_ that I've been 
using a product without a hitch rather then someone's claims that the said 
product will fall in a year's time.

By the way, I think it would do you a lot of good if you quote Thor's messages 
warning us from using Windows etc.

If you only have a troll's remarks to add, then leave the discussion.

As of this time, there is only one huge security risk all researchers agree on; 
human error aka people's stupidity




On Tue, May 18, 2010 at 11:01 AM, Cassidy MacFarlane 
cassidy.macfarl...@grantmanagement.co.ukmailto:cassidy.macfarl...@grantmanagement.co.uk
 wrote:
Sent from my HTC

-Original Message-
From: Thor (Hammer of God) t...@hammerofgod.commailto:t...@hammerofgod.com
Sent: 15 May 2010 21:59
To: full-disclosure@lists.grok.org.ukmailto:full-disclosure@lists.grok.org.uk 
full-disclosure@lists.grok.org.ukmailto:full-disclosure@lists.grok.org.uk
Subject: Re: [Full-disclosure] Windows' future (reprise)
No, It's Tim Mullen.  No Bill here.

No, I don't misunderstand:  You said You may recall that last year, the 
average annual growth rate of new threats (as defined by Symantec) was 243%.  
This enabled me to predict that the number of new threats in this year's 
Symantec Threat Report would be 243% of last years.  IOW, you took what 
Symantec's numbers were for one year, and guessed they would be the same for 
this year, and then posted how you were almost right.  Congratulation, you can 
make statements in the obvious.
You people really need to get your stories straight.  Isn't there some club or 
something you guys can join to at least sync up your talking points?   First we 
hear about how AV is stupid, unneeded, useless, a waste of money, and if you 
install it then you are ignorant.  Then we hear about how some people can 
bypass AV using kernel hooks on windows XP and call it an 8.0 Earthquake.  
Now you come out and say that you predict that AV will not be able to keep up 
with these new threats and that people must stop using Windows as a result 
since Windows is not likely of producing any secure version of anything 
anytime soon.

Then you blithe on about how people should avoid any software that locks them 
into a Microsoft Platform like the plague and specifically note .NET for 
businesses but of course fail to provide any examples of where they should go, 
or any real advice on your mitigation strategy.
What it is about .NET that should be avoided like the plague?  Wait, before you 
answer that, let's make sure you are qualified to answer.  One must assume that 
you are an expert .NET developer and that you have keen insight into the very 
foundation of the platform in order to know unequivocally that it should not be 
used under any circumstances.   Please give us some code examples of your .NET 
projects where it failed so miserably, even given your expertise, and then 
provide the proper secure solution in your magic TardWare solution.  
Certainly someone speaking with such authority on the matter can come up with 
examples in no time.

Additionally, you've clearly performed migration engagements for these people 
you advise.  Please let us know what the actual migration plan was, and how 
you have so brilliantly created a one-off cost migration path.  I'm really 
interested in the details about that.  I would particularly like to know what 
authentication infrastructure you would build to support secure 
enterprise-based services, your solution for client access and administration, 
and your overall network concepts.  Also, what is your

Re: [Full-disclosure] Windows' future (reprise)

2010-05-18 Thread Georgi Guninski
On Sun, May 16, 2010 at 08:49:29PM -0400, valdis.kletni...@vt.edu wrote:
 On Sun, 16 May 2010 23:49:00 BST, lsi said:
  Malware is flooding at 243% (+/- error).  This is consuming the
  oxygen in your machine.
 
 The basic error in your analysis is that although there may in fact be
snip

why flame about constants about detectable malware when the world missed
100% of the undetectable malware? :)

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Windows' future (reprise)

2010-05-18 Thread Christian Sciberras
Thor,

Sorry, I didn't make my points clear enough. I was replying sarcastically to
Cassidy's remarks and asking him to prove his claims.

Regards.


On Tue, May 18, 2010 at 4:40 PM, Thor (Hammer of God)
t...@hammerofgod.comwrote:

 What messages warning you from using Windows?  I certainly hope you do not
 have me confused with the OP – I already used the term “hysteria” to
 describe his ideas and subsequent recommendations.  The entire premise is
 fatally flawed, and the subsequent replies show a level of ignorance that I
 have not seen in a “professional” security person in some time.   It’s not
 surprising to see that the background of his site “remains blackened in
 protest against the many illegal and unethical activities of the USA.”
 Hysterical indeed.



 In fact, this thread has inspired me to add a new section to the Hammer of
 God website (currently undergoing major renovation) called “Tard of the
 Month”  where I’ll take claims like the one submitted by the OP and
 basically… well, you know what I’ll do.



 I just want to make sure you understand that **I** didn’t have anything do
 with any ludicrous comments about abandoning the Windows platform because
 all the oxygen in my computer was being consumed by what Symantec notes as
 “new threats.”



 t



 *From:* Christian Sciberras [mailto:uuf6...@gmail.com]
 *Sent:* Tuesday, May 18, 2010 3:40 AM
 *To:* Cassidy MacFarlane
 *Cc:* Thor (Hammer of God); full-disclosure@lists.grok.org.uk

 *Subject:* Re: [Full-disclosure] Windows' future (reprise)



 Happens they are completely unrelated stories. Also happens that I won't
 fall for someone's hysteria from using windows.

 By the way, I don't know you, but I would depend on the _fact_ that I've
 been using a product without a hitch rather then someone's claims that the
 said product will fall in a year's time.

 By the way, I think it would do you a lot of good if you quote Thor's
 messages warning us from using Windows etc.

 If you only have a troll's remarks to add, then leave the discussion.

 As of this time, there is only one huge security risk all researchers agree
 on; human error aka people's stupidity




 On Tue, May 18, 2010 at 11:01 AM, Cassidy MacFarlane 
 cassidy.macfarl...@grantmanagement.co.uk wrote:

 Sent from my HTC


 -Original Message-
 From: Thor (Hammer of God) t...@hammerofgod.com

 Sent: 15 May 2010 21:59
 To: full-disclosure@lists.grok.org.uk full-disclosure@lists.grok.org.uk
 Subject: Re: [Full-disclosure] Windows' future (reprise)

 No, It's Tim Mullen.  No Bill here.

 No, I don't misunderstand:  You said You may recall that last year, the
 average annual growth rate of new threats (as defined by Symantec) was 243%.
  This enabled me to predict that the number of new threats in this year's
 Symantec Threat Report would be 243% of last years.  IOW, you took what
 Symantec's numbers were for one year, and guessed they would be the same for
 this year, and then posted how you were almost right.  Congratulation, you
 can make statements in the obvious.

 You people really need to get your stories straight.  Isn't there some club
 or something you guys can join to at least sync up your talking points?
 First we hear about how AV is stupid, unneeded, useless, a waste of money,
 and if you install it then you are ignorant.  Then we hear about how some
 people can bypass AV using kernel hooks on windows XP and call it an 8.0
 Earthquake.  Now you come out and say that you predict that AV will not be
 able to keep up with these new threats and that people must stop using
 Windows as a result since Windows is not likely of producing any secure
 version of anything anytime soon.


 Then you blithe on about how people should avoid any software that locks
 them into a Microsoft Platform like the plague and specifically note .NET
 for businesses but of course fail to provide any examples of where they
 should go, or any real advice on your mitigation strategy.

 What it is about .NET that should be avoided like the plague?  Wait, before
 you answer that, let's make sure you are qualified to answer.  One must
 assume that you are an expert .NET developer and that you have keen insight
 into the very foundation of the platform in order to know unequivocally that
 it should not be used under any circumstances.   Please give us some code
 examples of your .NET projects where it failed so miserably, even given your
 expertise, and then provide the proper secure solution in your magic
 TardWare solution.  Certainly someone speaking with such authority on the
 matter can come up with examples in no time.

 Additionally, you've clearly performed migration engagements for these
 people you advise.  Please let us know what the actual migration plan was,
 and how you have so brilliantly created a one-off cost migration path.  I'm
 really interested in the details about that.  I would particularly like to
 know what authentication infrastructure you would build to support secure

Re: [Full-disclosure] Windows' future (reprise)

2010-05-18 Thread Valdis . Kletnieks
On Tue, 18 May 2010 18:00:52 +0300, Georgi Guninski said:

 why flame about constants about detectable malware when the world missed
 100% of the undetectable malware? :)

There are known knowns. These are things we know that we know. There are known
unknowns. That is to say, there are things that we now know we don't know.
But there are also unknown unknowns. These are things we do not know we
don't know. -- United States Secretary of Defense Donald Rumsfeld

(Note that the esteemed Mr Rumsfeld overlooked unknown knowns - that class
of stuff we don't realize or refuse to admit we actually *do* know:

If Rumsfeld thinks that the main dangers in the confrontation with Iraq were
the unknown unknowns, that is, the threats from Saddam whose nature we cannot
even suspect, then the Abu Ghraib scandal shows that the main dangers lie in
the unknown knowns - the disavowed beliefs, suppositions and obscene
practices we pretend not to know about, even though they form the background of
our public values. -- Slavoj Zizek

The computer industry is full of its own unknown knowns...


pgpyUDFQ0WN1c.pgp
Description: PGP signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Windows' future (reprise)

2010-05-18 Thread Thor (Hammer Of God)
All I saw was sent from my HTC from him.  Maybe I'm glad I missed  
it ;)




On May 18, 2010, at 8:15 AM, Christian Sciberras uuf6...@gmail.com  
wrote:



Thor,

Sorry, I didn't make my points clear enough. I was replying  
sarcastically to Cassidy's remarks and asking him to prove his claims.


Regards.


On Tue, May 18, 2010 at 4:40 PM, Thor (Hammer of God) t...@hammerofgod.com 
 wrote:
What messages warning you from using Windows?  I certainly hope you  
do not have me confused with the OP – I already used the term  
“hysteria” to describe his ideas and subsequent recommendations.   
The entire premise is fatally flawed, and the subsequent replies sho 
w a level of ignorance that I have not seen in a “professional”  
security person in some time.   It’s not surprising to see that the  
background of his site “remains blackened in protest against the man 
y illegal and unethical activities of the USA.”  Hysterical indeed.




In fact, this thread has inspired me to add a new section to the  
Hammer of God website (currently undergoing major renovation) called 
 “Tard of the Month”  where I’ll take claims like the one  
submitted by the OP and basically… well, you know what I’ll do.




I just want to make sure you understand that *I* didn’t have anythin 
g do with any ludicrous comments about abandoning the Windows platfo 
rm because all the oxygen in my computer was being consumed by what  
Symantec notes as “new threats.”




t



From: Christian Sciberras [mailto:uuf6...@gmail.com]
Sent: Tuesday, May 18, 2010 3:40 AM
To: Cassidy MacFarlane
Cc: Thor (Hammer of God); full-disclosure@lists.grok.org.uk


Subject: Re: [Full-disclosure] Windows' future (reprise)


Happens they are completely unrelated stories. Also happens that I  
won't fall for someone's hysteria from using windows.


By the way, I don't know you, but I would depend on the _fact_ that  
I've been using a product without a hitch rather then someone's  
claims that the said product will fall in a year's time.


By the way, I think it would do you a lot of good if you quote  
Thor's messages warning us from using Windows etc.


If you only have a troll's remarks to add, then leave the discussion.

As of this time, there is only one huge security risk all  
researchers agree on; human error aka people's stupidity






On Tue, May 18, 2010 at 11:01 AM, Cassidy MacFarlane cassidy.macfarl...@grantmanagement.co.uk 
 wrote:


Sent from my HTC


-Original Message-
From: Thor (Hammer of God) t...@hammerofgod.com

Sent: 15 May 2010 21:59
To: full-disclosure@lists.grok.org.uk full-disclosure@lists.grok.org.uk 


Subject: Re: [Full-disclosure] Windows' future (reprise)

No, It's Tim Mullen.  No Bill here.

No, I don't misunderstand:  You said You may recall that last year,  
the average annual growth rate of new threats (as defined by  
Symantec) was 243%.  This enabled me to predict that the number of  
new threats in this year's Symantec Threat Report would be 243% of  
last years.  IOW, you took what Symantec's numbers were for one  
year, and guessed they would be the same for this year, and then  
posted how you were almost right.  Congratulation, you can make  
statements in the obvious.


You people really need to get your stories straight.  Isn't there  
some club or something you guys can join to at least sync up your  
talking points?   First we hear about how AV is stupid, unneeded,  
useless, a waste of money, and if you install it then you are  
ignorant.  Then we hear about how some people can bypass AV using  
kernel hooks on windows XP and call it an 8.0 Earthquake.  Now you  
come out and say that you predict that AV will not be able to keep  
up with these new threats and that people must stop using Windows  
as a result since Windows is not likely of producing any secure  
version of anything anytime soon.



Then you blithe on about how people should avoid any software that  
locks them into a Microsoft Platform like the plague and  
specifically note .NET for businesses but of course fail to provide  
any examples of where they should go, or any real advice on your  
mitigation strategy.


What it is about .NET that should be avoided like the plague?  Wait,  
before you answer that, let's make sure you are qualified to  
answer.  One must assume that you are an expert .NET developer and  
that you have keen insight into the very foundation of the platform  
in order to know unequivocally that it should not be used under any  
circumstances.   Please give us some code examples of your .NET  
projects where it failed so miserably, even given your expertise,  
and then provide the proper secure solution in your magic TardWare  
solution.  Certainly someone speaking with such authority on the  
matter can come up with examples in no time.


Additionally, you've clearly performed migration engagements for  
these people you advise.  Please let us know what the actual  
migration plan was, and how you have so brilliantly

Re: [Full-disclosure] Windows' future (reprise)

2010-05-18 Thread Paul Schmehl
--On Tuesday, May 18, 2010 14:40:45 + Thor (Hammer of God) 
t...@hammerofgod.com wrote:



 What messages warning you from using Windows?  I certainly hope you do not
 have me confused with the OP – I already used the term “hysteria” to
 describe his ideas and subsequent recommendations.  The entire premise is
 fatally flawed, and the subsequent replies show a level of ignorance that I
 have not seen in a “professional” security person in some time.   It’s
 not surprising to see that the background of his site “remains blackened in
 protest against the many illegal and unethical activities of the USA.”
 Hysterical indeed.



 In fact, this thread has inspired me to add a new section to the Hammer of
 God website (currently undergoing major renovation) called “Tard of the
 Month”  where I’ll take claims like the one submitted by the OP and
 basically… well, you know what I’ll do.



 I just want to make sure you understand that *I* didn’t have anything do
 with any ludicrous comments about abandoning the Windows platform because all
 the oxygen in my computer was being consumed by what Symantec notes as “new
 threats.”


OK.  What about the CO2 in your computer?  :-)


-- 
Paul Schmehl, Senior Infosec Analyst
As if it wasn't already obvious, my opinions
are my own and not those of my employer.
***
It is as useless to argue with those who have
renounced the use of reason as to administer
medication to the dead. Thomas Jefferson

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Windows' future (reprise)

2010-05-17 Thread Thor (Hammer of God)
Is my business at risk, if I
say the wrong thing, and my customers go out of business because
their hardware/software combination is no longer viable?  I imagine
these questions are on the minds of many IT managers, and with a
chart on the wall showing 243% mutation, it is only reasonable that
they be asked.

Stu

---
Stuart Udall
stuart at () cyberdelix dot net - http://www.cyberdelix.net/

In business, you are always exposed to some level of risk when you charge for 
professional services.  That's why you carry various business insurance 
policies should you engage in a project in which you are responsible for some 
level of loss on behalf of your client.  $5 million in EO is typical, though 
I've seen a little as $1 million as a requirement.

Given that malware and virus mitigation is a systemic issue, I doubt you could 
be held responsible for a company going out of business because an AV program 
made their hardware and software unviable.  However, when you make public posts 
to a mailing list that is replicated worldwide about how you are consulting for 
a business that purchased a $24,000 .net application (or whatever it was) but 
then go on to say how you know absolutely nothing about .net, I do think you 
are opening yourself up for legal action should the company have issues (which, 
they probably will) and there is basically proof in your own words that you 
are unqualified to do the work.

I know my way around different .nix installations a bit.  I can make stuff run, 
and I actually quite good at screwing up a kernel rebuild.  However, I don't 
trust myself to set up a secure unix installation; certainly not to a point 
that I would provide professional services and bill clients for.  If I were to 
do that, I would (and should) be held liable for damages arising out errors I 
am responsible for.

The right thing to do here, from a business and ethics standpoint, is to 
subcontract a .net professional who can represent you properly.  The job will 
get done properly, you will make money, and your customer will be happy.   
You're in London, right?  Call up some guys at NGS and see if they can help 
you.  There are some really good people there.

t

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Windows' future (reprise)

2010-05-17 Thread lsi
On 16 May 2010 at 20:49, valdis.kletni...@vt.edu wrote:

To: stu...@cyberdelix.net
Copies to:  full-disclosure@lists.grok.org.uk
Subject:Re: [Full-disclosure] Windows' future (reprise)
From:   valdis.kletni...@vt.edu
Date sent:  Sun, 16 May 2010 20:49:29 -0400

 On Sun, 16 May 2010 23:49:00 BST, lsi said:
  Malware is flooding at 243% (+/- error).  This is consuming the
  oxygen in your machine.
 
 The basic error in your analysis is that although there may in fact be
 243% more malware samples, that doesn't translate into 243% more oxygen
 consumption.

Yes, I agree that the oxygen is not being used at 243%.  

Last year, I did get a bit excited and said some things like that, 
(you'll need 200 of today's processors, just for malware filtering, 
by 2015.), I do think that was wrong.  So this year, I took pains 
not to say that, you'll note I only said the oxygen was being 
consumed, I didn't say at what rate.  

To go with your pizza example, say the CPU is the pizza, back in the 
80's I had the whole pizza to myself (no AV).  Then I installed AV 
and I had slightly less pizza; the AV takes a small slice of pizza 
for itself.  

As the years have passed the AV is doing more and more work.  That 
means its slice of pizza is growing, and the remainder, which is what 
I get, is shrinking.  

This is to ignore all the other junk that modern systems run, which 
also have their bit of pizza too.  

What I don't know is *how much* extra pizza is being consumed.  As 
you say, 243% extra samples does not correspond to 243% less pizza 
for me.  I am not familiar with the innards of an AV scan engine, so 
this might be naive - but surely there will be more CPU used by the 
AV as the number of signatures increases.

Therefore, there must come a time, assuming malware continues to 
increase in number, when eventually, my PC will use all of its CPU on 
malware filtering.  

Yes - maybe that is 20 years away, and I will have upgraded by then.  
But is it 20 years away?  And what if I can't upgrade?  What about in 
the meantime - am I going to tolerate my slow machine?  How slow is 
too slow?  Time is money.  Why would anyone willingly allow their 
machine to run slowly, and thus cost themselves money?  

As I said last year - as soon as Joe Average Business User figures 
out he can do stuff 25% faster, just by dumping his OS*, he will want 
to dump his OS.  

Note, 25% faster was a guess, that would be easy enough to measure, 
will need some old AV software and signature sets, to clock how fast 
they run while a set of tests are run, then install new AV and new 
signature sets and rerun the tests.  Then run the tests with the AV 
switched off.  

* he doesn't realise what a pain it is, but it's not his problem... 
it's mine!  And everyone else who is paid to keep stuff running.  
Although I see it an an opportunity rather than a problem.  Even Thor 
has his chance, he should get coding on that connector, then sell it 
to all his former competitors  

 Consider a pizza cut into 8 pieces and somebody comes along and eats 6 of
 them.  Now consider an identical pizza cut 16 ways and somebody eats 12 
 slices.
 The rate of slice consumption has doubled, but the actual amount of pizza
 consumed hasn't changed.

 Similarly, the fact there's (say) 5 million new malware samples doesn't mean
 there's 5 million new holes in Windows this year.  What you have is 5 million
 new ways of poking the same 20 or 30 new holes.  This makes it a lot easier 
 for
 the A/V companies. Although they may have 37 different samples, there's a very
 good chance they were produced using a Metasploit-like mindset - pick an
 exploit, add a payload, launch.  And 37 samples that use the same exploit but
 have 37 different payloads need one detection rule (for the exploit), not 37.

Thank you for explaining this.  So what it will come down to is how 
efficient the AV is at reducing that big number (total threats) to a 
smaller number (total detection rules).  37:1 is a big ratio, is that 
likely, however?  Would you know the ratio as currently enjoyed by 
current AV software, by any chance?

Stu

---
Stuart Udall
stuart a...@cyberdelix.dot net - http://www.cyberdelix.net/

--- 
 * Origin: lsi: revolution through evolution (192:168/0.2)

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Windows' future (reprise)

2010-05-17 Thread lsi
On 17 May 2010 at 18:08, Thor (Hammer of God) wrote:

 Is my business at risk, if I
 say the wrong thing, and my customers go out of business because
 their hardware/software combination is no longer viable?

 In business, you are always exposed to some level of risk when you
 charge for professional services.  That's why you carry various
 business insurance

No, I'm not worried about being sued, I'm worried about my revenue 
streams disappearing.

 However, when you make public posts to a mailing list that is
 replicated worldwide about how you are consulting for a business that
 purchased a $24,000 .net application (or whatever it was) but then go
 on to say how you know absolutely nothing about .net, I do think you
 are opening yourself up for legal action

Not at all - my customer is fully aware that I know nothing about 
their software.  They got sick of me giving them my disclaimer.  They 
are happy for me to work on it because otherwise, they need to pay a 
large amount in annual support fees, to the company who wrote the 
software.

 However, I don't trust myself to set up a secure unix installation;
 certainly not to a point that I would provide professional services
 and bill clients for.  If I were to do that, I would (and should) be
 held liable for damages arising out errors I am responsible for. 

Small print is always good.  Also, some systems need to be more 
secure than others.  For public servers, I outsource to another 
outsourcer.

 The right thing to do here, from a business and ethics standpoint,
 is to subcontract a .net professional who can represent you properly. 

I am pushing my customer to re-sign the service contract with the 
developers of the product.  They don't want to spend the money.  
There's politics too - the guy who made the purchasing decision 
doesn't want to admit it was a mistake, so he is pretending there are 
no problems with the software, and therefore there is no need to pay 
for the service contract (or so goes his logic).

It'd make an excellent case study for someone...

 The job will get done properly, you will make money, and your customer
 will be happy.   You're in London, right?  Call up some guys at NGS
 and see if they can help you.  There are some really good people
 there. 

Thanks.  I don't have access to the source, however, so I doubt 
there's anything that can be done.  This app, even the error messages 
are encrypted!  (is that some .NET wheeze? lovely)  So it can be 
quite touch and go. But it still costs them less than their annual 
support contract would.

Stu

---
Stuart Udall
stuart a...@cyberdelix.dot net - http://www.cyberdelix.net/

--- 
 * Origin: lsi: revolution through evolution (192:168/0.2)

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Windows' future (reprise)

2010-05-17 Thread lsi
On 17 May 2010 at 0:18, valdis.kletni...@vt.edu wrote:

 On Mon, 17 May 2010 03:48:36 BST, lsi said:
 
  It is mutating at approx 243% per annum, a rate which is more than
  twice as fast as Moore's Law (200% every 24 months).  I do find this
  alarming, because I want my CPU back.  So does everyone else I know.
 
 Unfortunately, you haven't shown that the CPU actually consumed is going up by
 243% or any significant fraction thereof.  Admittedly, A/V products are slowly
 taking more and more resources, but nowhere near a Moore's Law rate.
 
 Do some benchmarking.  Time how long it takes to scan a collection of 500 or 
 so
 random files using a 2007 version of your favorite A/V software and 
 signatures,
 and time how long this week's version take. The difference between the two
 numbers is the CPU you can get back. I guarantee it has no relationship
 to the 243% you're complaining about (for starters, even if it *was* gaining
 243% a year, that's a 243% grown rate of the 5% or so your anti-virus uses,
 not of your entire CPU capacity.

Indeed.

Although 243% of 5% will get quite large quite soon too.  I think it 
might be less than that right now - 2% maybe.  The problem is really 
that even 0.5% will turn into 42.36% after 5 years, at 243% growth.  
(I have triple checked that, I'm certain it's right, that's 
outrageous, it's because it's an exponential curve, gets steep 
quickly).

(It will be 243% of 5%, divided by the efficiency ratio you mentioned 
earlier.  That ratio is critical.  The smaller it is, the less it 
holds back the 243%.)

  I'm not analysing infections, I'm analysing new threats (as defined
  by Symantec).
 
 Read Thor's description of the difference between threats and risks.
 
 Defending against threats doesn't consume additional CPU.
 Defending against risks *may* consume additional CPU.

My interpretation of risk assessment tells me that if the chances of 
denial-of-service due to malware flooding is small, but the potential 
damage is substantial, despite the improbability, then that risk must 
be mitigated.

I do understand that additional new threats (as defined by 
Symantec) may, or may not, impact on CPU due to the efficiency ratio 
you explained earlier.

It's not possible to accurately quantify the risk until key numbers, 
such as the average CPU usage per detection rule, and the average 
efficiency ratio, are known.  What we can say right now is that there 
is a risk, of size unknown, that malware flooding will result in DOS 
conditions.

We cannot say how big the risk is yet.  But also, we cannot say that 
it does not exist.

As numbers such as average CPU usage per detection rule, and the 
average efficiency ratio, are likely to be commercial secrets, that 
will mean we will be forced to navigate blind.  This heightens the 
risk and thus the level of mitigation that is required.  That is why 
my advice remains to evacuate the platform.

Stu

---
Stuart Udall
stuart a...@cyberdelix.dot net - http://www.cyberdelix.net/

--- 
 * Origin: lsi: revolution through evolution (192:168/0.2)

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Windows' future (reprise)

2010-05-16 Thread Christian Sciberras
An interesting point - Unicode?

I don't think 5Mb files are infeasible, especially as time passes,
that'll be just a blip before long.

Stu


You call it a blip yet you are counting in infections for *everywhere* and
*anyone* so, what makes you think service providers (which have been comfy
in the last 6 years with a dialup-grade connection) to abruptly switch to
high-speed fiber-optic?

I'm just saying that your statistics are based on too little variables - it
would be like saying Earth will die of hunger just because a product is out
of stock at a local supermarket.

You yourself mentioned an error margin of ~24%. This will only *grow* by
next year.
Lastly, I stand my point: Malware cannot be taken is a combination (as you
and other certain specialists think of it). Reason number one being that a
software combination (hash) can vary from between malware, useful or
utterly useless; ie, the combination of having only malware is so
undefinable that you can't put it in any equation.

Symantec's results are not wrong, it is how you/people use them that may be
wrong, such as attempting to predict anything out of them.

On Sun, May 16, 2010 at 6:32 AM, lsi stu...@cyberdelix.net wrote:

 Hi Bill!

 Thanks for the tip on the DIR command, I did in fact notice that,
 however it doesn't give percentages (or total space), AFAIK, and my
 monitoring bot wants percentages.  My df also reports the computer
 name (so I can make sense of the output when the space on multiple
 machines is listed one after the other in a report, and if an alert
 is generated by the monitoring bot).

 The new version of my df uitil is 1951 bytes, the version on my site
 is old.

 I'm sorry I upset you because I mentioned .NET, is it because you
 make a living off it?  Sorry to be the bearer of bad tidings.  .NET
 is merely one case of many, I picked it as an example because I am
 currently supporting a customer with a £23,000 .NET application that
 has them utterly locked to Microsoft, and I have no hope at all of
 selling them unix anything.  Which is a shame for them (I just made a
 packet cleaning a nasty virus infection from one of their XP PCs).

 As for the .NET connector for PHP, yes, I made that up, and the
 problem is where?  You wanted a migration strategy, I gave you one! I
 did say off top of head.  You want me to research it?  That's
 £120/hr.

 I also don't see a problem posting my mail from a Windows PC.  Why do
 I need to be running unix before I can report that malware is
 mutating at 243%?  I don't, is the short answer.

 Why don't you criticise my arguments, instead of myself, or my job,
 or my computer, or my email program, or my personal migration
 strategy, or my software?  Is it because you can't?  I think so.

 Stu

 On 16 May 2010 at 3:06, Thor (Hammer of God) wrote:

 From:   Thor (Hammer of God) t...@hammerofgod.com
 To: full-disclosure@lists.grok.org.uk full-
 disclos...@lists.grok.org.uk
 Date sent:  Sun, 16 May 2010 03:06:18 +
 Subject:Re: [Full-disclosure] Windows' future (reprise)

  This just gets better all the time.  I have to admit, it was fun at
 first, but now's I grow weary, mostly because this is just sad.
 
  For you to actually think that one can't find out how much free drive
 space in Windows would be funny it were not so ridiculous.  And it's been
 built into DIR forever.  Oh, and your .bas file is 60,000 some odd bytes,
 not 1951.  I think you are confusing the size with the last time you
 actually did research into what you are talking about.
 
  The main point here is for people to see how easy it is for someone who
 admits that they know nothing about .NET, nor care to learn anything about
 .NET, to honestly and publically say that people must uninstall it as if it
 were the plague.  You actually get paid to tell people to uninstall it and
 use a .NET connector to PHP - whatever the hell that is.  Simply amazing
 to me.
 
  And yet, it's fine for YOU to continue to use a closed source operating
 system to run your dear Peg closed source email program because you don't
 feel like practicing what you preach.   To think that you consider insight
 into moving a couple of computers over to *nix as the basis to make sweeping
 generalized statements of how migrating is a one-off cost staggers the
 imagination.  But, everyone is entitled to their opinion, so good luck with
 yours dude.   But what you are doing to the poor people who not only trust
 you but also pay you seems to be quite a disservice indeed.  But that's
 between you and whatever your ethic is.
 
  So in a nutshell (and I'll drop off after this as I think this has played
 itself out) you hate closed source and .NET and get paid to tell other
 people to migrate to non-existent .NET connector's to PHP after switching
 from Windows to BSD, but compose the very email that you so vehemently
 condemn them on a closed source operating system with a closed source
 program

Re: [Full-disclosure] Windows' future (reprise)

2010-05-16 Thread Thor (Hammer of God)
The error in your overall thesis is your failure to identify the difference 
between threat and risk.  You are interacting with Symantec's report of x new 
threats as if it actually means something, or more specifically, that these 
new threats somehow translate into some new level of risk.  They don't.

According to Stephen Hawking, there are new threats emerging based on the 
statistical probability of the existence of aliens.  Therefore, a threat 
exists where I may be struck in the head by a falling block of green alien poo, 
frozen in the atmosphere after being flushed out by a passing pan-galactic 
alien survey ship.  However, the actual *risk* of me being hit in the head 
while walking to a matinée of The Rocky Horror Picture Show doesn't dictate 
that I apply a small mixture of Purell and Teflon to my umbrella and fill my 
squirt gun with alien repellent.

The risk of me personally being struck by falling alien poo is *far* lower than 
the risk of any one of the almost 7 billion people on the planet being struck 
by falling alien poo.  You may be able to calculate the risk of my being poo'd 
in relation to any given human being poo'd, but no level of math will allow you 
to determine what my or any other person's individual chance of being poo'd is.

Your argument would call everyone to change the way they protect themselves 
from falling alien poo out of the mere existence of a threat without really 
qualifying the associated risk.  That does nothing for anyone, and would only 
cause a rise in the cost of umbrellas and squirt guns and would probably result 
in the theater putting the kibosh on Rock Horror completely and charging people 
to watch Born Free.  (Insert clever association of Born Free with free open 
source products here.  See what I did there?)

Further, the basis of this threat is that you would actually have to trust 
what Stephen Hawking is saying in the first place.  In his case, there really 
isn't any way to know that he's the one saying it, is there?  For all we know, 
the ghost of Carl Sagan could have hacked into his computer and has made Mr. 
Hawking's requests to have his Depends changed translated into run for your 
lives, the aliens are coming, the aliens are coming  when his computer talks.

My point is that you are taking threat statistics from Symantec that don't mean 
anything on their own, as there is no definition of how those threats would 
apply to any given system, and directly converting them into some global level 
of risk - and you are doing so to such extremes that you actually conclude that 
the solution is to do away with Microsoft products based on some unproven and 
imagined postulate that closed source is somehow at the core of the issue while 
at the same time admitting you don't know anything about the platform.   The 
fact that you are actually using Windows and programs written with Visual 
Studio out of convenience to you critically damages your argument.  If you as 
the author of this idea refuse to migrate from Windows or applications written 
with Windows development products and frameworks just because it is *not 
convenient* for you, how could you possibly expect anyone supporting any 
infrastructure of consequence to take your advice or even consider your ideas 
as anything other than hysteria when they would have to engage in unfathomable 
expense, effort and time to create a total and complete paradigm change in 
their business simply to try to defend against being hit by falling alien poo?

t


An interesting point - Unicode?

I don't think 5Mb files are infeasible, especially as time passes,
that'll be just a blip before long.

Stu

On 15 May 2010 at 14:59, Christian Sciberras wrote:

Date sent:  Sat, 15 May 2010 14:59:46 +0100
Subject:Re: [Full-disclosure] Windows' future (reprise)
From:   Christian Sciberras uuf6429 () gmail com
To: stuart () cyberdelix net


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Windows' future (reprise)

2010-05-16 Thread lsi
Imagine you are in an enclosed space.  It starts to flood.  As the 
water level rises, the amount of oxygen you have available falls.  
Unless it stops flooding, eventually you will have no oxygen at all.

So, the CPU, RAM, diskspace, and network bandwidth of your machine, 
as well as limits imposed by integer math, are the enclosed space. 
Those specify the finite processing limits of your machine.  Malware 
is the flood.  Oxygen is what's left in your enclosed space/machine, 
once your malware defences have run.

Malware is flooding at 243% (+/- error).  This is consuming the 
oxygen in your machine.  You can enlarge your enclosed space, with 
hardware upgrades, but that's not stopping the flooding.

Eventually you will find it's not possible to upgrade the machine 
(usually a software dependency of some kind).  At this point the 
machine will run slower and slower.  Your alternatives will be to 
disconnect the machine from the internet, and partially/completely 
disable malware filters; or to replace the machine.

As you can see you're spending money on upgrades and replacements, 
and losing productivity and/or capabilities (eg. internet access).

Meanwhile, the malware is still flooding into your enclosed space.  
Every second that goes by, the rate of flooding increases.  Your boss 
is screaming at you for spending a zillion on hardware.  Your users 
are whinging because everything is running like a dog.  Your support 
staff are running around constantly fixing machines on which the AV 
has failed (yet again) to stop the latest 0-day variant.  Your 
company's customers are livid because you had to tell them you had a 
trojan on an accounts machine and their credit card data is now on 
the web.  Your wife has the hump because you're never home, except in 
a bad mood, your kids think you are a boarder, and the dog hates you 
because you never take it for walks anymore.

And you now need to go to your boss and ask for more money for more 
upgrades.

What are you gonna do?  Are you going to let your IT run like this 
forever?  Do you think your boss will like it when you ask him for 
more budget?

What is your long-term strategy for fixing this problem?

Stu

On 16 May 2010 at 19:08, Thor (Hammer of God) wrote:

From:   Thor (Hammer of God) t...@hammerofgod.com
To: full-disclosure@lists.grok.org.uk full-disclosure@lists.grok.org.uk
Date sent:  Sun, 16 May 2010 19:08:26 +
Subject:Re: [Full-disclosure] Windows' future (reprise)

 The error in your overall thesis is your failure to identify the difference 
 between threat and risk.  You are interacting with Symantec's report of x 
 new threats as if it actually means something, or more specifically, that 
 these new threats somehow translate into some new level of risk.  They don't.
 
 According to Stephen Hawking, there are new threats emerging based on the 
 statistical probability of the existence of aliens.  Therefore, a threat 
 exists where I may be struck in the head by a falling block of green alien 
 poo, frozen in the atmosphere after being flushed out by a passing 
 pan-galactic alien survey ship.  However, the actual *risk* of me being hit 
 in the head while walking to a matinée of The Rocky Horror Picture Show 
 doesn't dictate that I apply a small mixture of Purell and Teflon to my 
 umbrella and fill my squirt gun with alien repellent.
 
 The risk of me personally being struck by falling alien poo is *far* lower 
 than the risk of any one of the almost 7 billion people on the planet being 
 struck by falling alien poo.  You may be able to calculate the risk of my 
 being poo'd in relation to any given human being poo'd, but no level of math 
 will allow you to determine what my or any other person's individual chance 
 of being poo'd is.
 
 Your argument would call everyone to change the way they protect themselves 
 from falling alien poo out of the mere existence of a threat without really 
 qualifying the associated risk.  That does nothing for anyone, and would only 
 cause a rise in the cost of umbrellas and squirt guns and would probably 
 result in the theater putting the kibosh on Rock Horror completely and 
 charging people to watch Born Free.  (Insert clever association of Born 
 Free with free open source products here.  See what I did there?)
 
 Further, the basis of this threat is that you would actually have to trust 
 what Stephen Hawking is saying in the first place.  In his case, there really 
 isn't any way to know that he's the one saying it, is there?  For all we 
 know, the ghost of Carl Sagan could have hacked into his computer and has 
 made Mr. Hawking's requests to have his Depends changed translated into run 
 for your lives, the aliens are coming, the aliens are coming  when his 
 computer talks.
 
 My point is that you are taking threat statistics from Symantec 
that don't mean anything on their own, as there is no definition of 
how those threats would apply to any given system, and directly

Re: [Full-disclosure] Windows' future (reprise)

2010-05-16 Thread Valdis . Kletnieks
On Sun, 16 May 2010 23:49:00 BST, lsi said:
 Malware is flooding at 243% (+/- error).  This is consuming the
 oxygen in your machine.

The basic error in your analysis is that although there may in fact be
243% more malware samples, that doesn't translate into 243% more oxygen
consumption.

Consider a pizza cut into 8 pieces and somebody comes along and eats 6 of
them.  Now consider an identical pizza cut 16 ways and somebody eats 12 slices.
The rate of slice consumption has doubled, but the actual amount of pizza
consumed hasn't changed.

Similarly, the fact there's (say) 5 million new malware samples doesn't mean
there's 5 million new holes in Windows this year.  What you have is 5 million
new ways of poking the same 20 or 30 new holes.  This makes it a lot easier for
the A/V companies. Although they may have 37 different samples, there's a very
good chance they were produced using a Metasploit-like mindset - pick an
exploit, add a payload, launch.  And 37 samples that use the same exploit but
have 37 different payloads need one detection rule (for the exploit), not 37.



pgpS5P6hT3cAt.pgp
Description: PGP signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Windows' future (reprise)

2010-05-16 Thread lsi
On 17 May 2010 at 1:06, Christian Sciberras wrote:

 Malware is not flooding. It only s much as changes and not at an
 alarming rate neither.

It is mutating at approx 243% per annum, a rate which is more than 
twice as fast as Moore's Law (200% every 24 months).  I do find this 
alarming, because I want my CPU back.  So does everyone else I know.

 Happens that any piece of [individual] malware is smaller than 5Mb (as in my
 example) therefor what you call a flood is nothing more then a couple of
 droplets of water in a lake.

Did you ever try and use your computer when it was doing a virus 
scan?  That's much more than a droplet of CPU that you are missing.

 Besides, competent anti-viruses automatically clean their own signature base
 from systems immune to certain malware (eg patched).

Nice.  That would improve things I think (assuming the patch does in 
fact make the machine invulnerable to the malware that it can no 
longer detect).

 Also, thankfully, I don't get infected with new malware X times per day, in
 fact, I don't recall ever being infected in the last 6/7 years I've run
 Windows (your point of focus).
 I'm sure I'm not alone, so where do you put us in your equation? Surely you
 can't infect non-existent workstations?

I'm not analysing infections, I'm analysing new threats (as defined 
by Symantec).  

However if I was analysing infections, I'd call you an outlier 
(anomaly), and exclude you from my computation.  You would be one of 
the few.  Impressive though.

Stu

 On Mon, May 17, 2010 at 12:49 AM, lsi stu...@cyberdelix.net wrote:
 
  Imagine you are in an enclosed space.  It starts to flood.  As the
  water level rises, the amount of oxygen you have available falls.
  Unless it stops flooding, eventually you will have no oxygen at all.
 
  So, the CPU, RAM, diskspace, and network bandwidth of your machine,
  as well as limits imposed by integer math, are the enclosed space.
  Those specify the finite processing limits of your machine.  Malware
  is the flood.  Oxygen is what's left in your enclosed space/machine,
  once your malware defences have run.
 
  Malware is flooding at 243% (+/- error).  This is consuming the
  oxygen in your machine.  You can enlarge your enclosed space, with
  hardware upgrades, but that's not stopping the flooding.
 
  Eventually you will find it's not possible to upgrade the machine
  (usually a software dependency of some kind).  At this point the
  machine will run slower and slower.  Your alternatives will be to
  disconnect the machine from the internet, and partially/completely
  disable malware filters; or to replace the machine.
 
  As you can see you're spending money on upgrades and replacements,
  and losing productivity and/or capabilities (eg. internet access).
 
  Meanwhile, the malware is still flooding into your enclosed space.
  Every second that goes by, the rate of flooding increases.  Your boss
  is screaming at you for spending a zillion on hardware.  Your users
  are whinging because everything is running like a dog.  Your support
  staff are running around constantly fixing machines on which the AV
  has failed (yet again) to stop the latest 0-day variant.  Your
  company's customers are livid because you had to tell them you had a
  trojan on an accounts machine and their credit card data is now on
  the web.  Your wife has the hump because you're never home, except in
  a bad mood, your kids think you are a boarder, and the dog hates you
  because you never take it for walks anymore.
 
  And you now need to go to your boss and ask for more money for more
  upgrades.
 
  What are you gonna do?  Are you going to let your IT run like this
  forever?  Do you think your boss will like it when you ask him for
  more budget?
 
  What is your long-term strategy for fixing this problem?
 
  Stu
 
  On 16 May 2010 at 19:08, Thor (Hammer of God) wrote:
 
  From:   Thor (Hammer of God) t...@hammerofgod.com
  To: full-disclosure@lists.grok.org.uk 
  full-disclosure@lists.grok.org.uk
  Date sent:  Sun, 16 May 2010 19:08:26 +
  Subject:Re: [Full-disclosure] Windows' future (reprise)
 
   The error in your overall thesis is your failure to identify the
  difference between threat and risk.  You are interacting with Symantec's
  report of x new threats as if it actually means something, or more
  specifically, that these new threats somehow translate into some new level
  of risk.  They don't.
  
   According to Stephen Hawking, there are new threats emerging based on the
  statistical probability of the existence of aliens.  Therefore, a threat
  exists where I may be struck in the head by a falling block of green alien
  poo, frozen in the atmosphere after being flushed out by a passing
  pan-galactic alien survey ship.  However, the actual *risk* of me being hit
  in the head while walking to a matinée of The Rocky Horror Picture Show
  doesn't dictate that I apply a small mixture of Purell and Teflon to my
  umbrella

Re: [Full-disclosure] Windows' future (reprise)

2010-05-16 Thread Valdis . Kletnieks
On Mon, 17 May 2010 03:48:36 BST, lsi said:

 It is mutating at approx 243% per annum, a rate which is more than
 twice as fast as Moore's Law (200% every 24 months).  I do find this
 alarming, because I want my CPU back.  So does everyone else I know.

Unfortunately, you haven't shown that the CPU actually consumed is going up by
243% or any significant fraction thereof.  Admittedly, A/V products are slowly
taking more and more resources, but nowhere near a Moore's Law rate.

Do some benchmarking.  Time how long it takes to scan a collection of 500 or so
random files using a 2007 version of your favorite A/V software and signatures,
and time how long this week's version take. The difference between the two
numbers is the CPU you can get back. I guarantee it has no relationship
to the 243% you're complaining about (for starters, even if it *was* gaining
243% a year, that's a 243% grown rate of the 5% or so your anti-virus uses,
not of your entire CPU capacity.

 I'm not analysing infections, I'm analysing new threats (as defined
 by Symantec).

Read Thor's description of the difference between threats and risks.

Defending against threats doesn't consume additional CPU.
Defending against risks *may* consume additional CPU.




pgpLnEzQhKMdX.pgp
Description: PGP signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Windows' future (reprise)

2010-05-15 Thread Thor (Hammer of God)
I am constantly amazed at posts like this where you make yourself sound like 
some sort of statistical genius because you were able to predict that since 
last year was %243, that this year would be %243.  Wow.  Really?

And for the record, these claims of 'inherent insecurity' in Windows are simply 
ignorant.  If you are still running Windows 95 that's your problem.  Do a 
little research before post assertions based on 10 or 20 year old issues.

This smacks of the classic troll, where you say things like nothing that 
Microsoft makes is secure and it never will be and then go on to say how easy 
it is to migrate, and how it's free, with only a one off cost, and how to move 
off of .NET.

Obvious predictions, ignorant assumptions, and a total lack of any true 
understanding of business computing.  Yep, troll.

t

-Original Message-
From: full-disclosure-boun...@lists.grok.org.uk 
[mailto:full-disclosure-boun...@lists.grok.org.uk] On Behalf Of lsi
Sent: Saturday, May 15, 2010 6:12 AM
To: full-disclosure@lists.grok.org.uk
Subject: [Full-disclosure] Windows' future (reprise)

Hi All!

Just a followup from my posting of 9 months ago (which can be found
here):

http://www.mail-archive.com/full-disclosure@lists.grok.org.uk/msg37173.html

Symantec have released Internet Security Threat Report: Volume XV: 
April 2010.  My posting from last year was based on the previous Internet 
Security Threat Report: Volume XIV: April 2009.  So I thought it would be 
interesting to check my numbers.  The new edition of the Threat Report is here:

http://www4.symantec.com/Vrt/wl?tu_id=SUKX1271711282503126202

You may recall that last year, the average annual growth rate of new threats 
(as defined by Symantec) was 243%.  This enabled me to predict that the number 
of new threats in this year's Symantec Threat Report would be 243% of last 
years; eg. I predicted 9 months ago the number of new threats in this year's 
Symantec Threat Report would be 243% * 1656227, or 3840485.87.

The actual number of new threats in this year's Symantec Threat Report is 
2895802, an error on my part of 24.6%.

This is quite a chunk, however it is not that far off.  My excuses:

- my number was based on averages, so it will never be exact.  There will be a 
natural variance in the growth rate, caused by many factors.

- in the new edition, Symantec have altered the raw data a little - the number 
of new threats for 2009, 2008, 2007 etc is slightly different to those same 
years, as listed in the previous version of the report.  I have not updated my 
projection to allow for this.

- Symantec note that The slight decline in the rate of growth should not 
discount the significant number of new signatures created in 2009. 
Signature-based detection is lagging behind the creation of malicious 
threats... (page 48).

Am I retreating from my position?  Absolutely not.  I am now expecting the 
number of new threats in next years' report to be 7036798.86. This is 2895802 * 
243%.  This includes the error introduced by Symantec's changes to the raw 
data.  I don't think it matters much.

As this flood of new threats will soon overpower AV companies' 
ability to catalogue them (by 2015, at 243% growth, there will be
2.739 MILLION new threats PER DAY (over 1900 new threats per minute)), and as 
Symantec admits above that signature-based detection is lagging, and as 
Microsoft are not likely to produce a secure version of anything anytime soon, 
I am not at all hopeful of a clean resolution to this problem.

I continue to advise that users should, where possible, deploy alternatives; 
that they should, if they have not already, create and action a migration 
strategy; and that they should avoid like the plague, any software which locks 
them into a Microsoft platform.  
Business .NET applications, I'm lookin' at you.

Those failing to migrate will discover their hardware runs slower and slower, 
while doing the same job as it did previously.  They will need to take this 
productivity hit, OR buy a new computer, which will also eventually surcumb to 
the same increasing slowness.  They will need to buy new machines more and more 
frequently.  Eventually, they will run out of money - or, for the especially 
deep-pocketed, they will find they cannot deploy the new machines fast enough, 
before they are already too slow to use.  The only alternative to this 
treadmill is to dump Windows.  The sooner it is dumped, the less money is 
wasted buying new hardware, simply to keep up with security- induced slowness.

Why spend all that time and money on a series of new Windows machines, without 
fixing the actual problem, which is the inherent insecurity of Windows?  People 
can spend the same time and money replacing Windows, and then they won't need 
to worry about the problem any more.  The difference is that sticking with 
Windows incurs ongoing and increasing costs, while a migration incurs a one- 
off cost.

I don't think it takes a genius to see which 

Re: [Full-disclosure] Windows' future (reprise)

2010-05-15 Thread Peter Besenbruch
On Sat, 15 May 2010 14:40:29 +
Thor (Hammer of God) t...@hammerofgod.com wrote:

 And for the record, these claims of 'inherent insecurity' in Windows
 are simply ignorant.  If you are still running Windows 95 that's your
 problem.  Do a little research before post assertions based on 10 or
 20 year old issues.

To be fair to the original poster, there are activities that I wouldn't
want to do on a Windows machine, and if you read Brian Krebs' blog, the
same goes double for small businesses: Online banking comes to mind.

-- 
Hawaiian Astronomical Society: http://www.hawastsoc.org
HAS Deepsky Atlas: http://www.hawastsoc.org/deepsky

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Windows' future (reprise)

2010-05-15 Thread Thor (Hammer Of God)
That kind of goes for everything, doesn't it?

T



On May 15, 2010, at 10:32 AM, Peter Besenbruch p...@lava.net wrote:

 On Sat, 15 May 2010 14:40:29 +
 Thor (Hammer of God) t...@hammerofgod.com wrote:

 And for the record, these claims of 'inherent insecurity' in Windows
 are simply ignorant.  If you are still running Windows 95 that's your
 problem.  Do a little research before post assertions based on 10 or
 20 year old issues.

 To be fair to the original poster, there are activities that I  
 wouldn't
 want to do on a Windows machine, and if you read Brian Krebs' blog,  
 the
 same goes double for small businesses: Online banking comes to mind.

 -- 
 Hawaiian Astronomical Society: http://www.hawastsoc.org
 HAS Deepsky Atlas: http://www.hawastsoc.org/deepsky

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Windows' future (reprise)

2010-05-15 Thread lsi
Is that you, Bill?

I think you misunderstand.  9 months ago, I measured the growth rate 
at 243%, using Symantec's stats.  9 months ago I posted that number 
here, together with a prediction of this year's stats.  Recently, I 
got this year's stats and compared them with that prediction.  I 
found that this prediction was 75.4% accurate.  I am now reporting 
those results back to the group.  And this is trolling how?

My point is that the prediction was not wildly wrong, and so that 
leads me to wonder if anything else I said, 9 months ago, was also 
not wildly wrong.

My main reason for claiming that Windows is inherently insecure is 
because it's closed source.  However it's also because of the sloppy, 
monolithic spaghetti code that Windows is made of.  If you're 
claiming Windows is in fact inherently secure, I assume this means 
you don't use AV on any of your Windows machines, and advise everyone 
you know to uninstall it?

I never said migration would be free or easy.  That is why I am 
posting this data here, because I see it as a vulnerability, a very 
big vulnerability that many companies have not woken up to.  The very 
fact that migration is hard, lengthy, and expensive, means that the 
vulnerability is larger than ever.

Stu

On 15 May 2010 at 14:40, Thor (Hammer of God) wrote:

From:   Thor (Hammer of God) t...@hammerofgod.com
To: full-disclosure@lists.grok.org.uk full-
disclos...@lists.grok.org.uk
Date sent:  Sat, 15 May 2010 14:40:29 +
Subject:Re: [Full-disclosure] Windows' future (reprise)

 I am constantly amazed at posts like this where you make yourself sound like 
 some sort of statistical genius because you were able to predict that since 
 last year was %243, that this year would be %243.  Wow.  Really?
 
 And for the record, these claims of 'inherent insecurity' in Windows are 
 simply ignorant.  If you are still running Windows 95 that's your problem.  
 Do a little research before post assertions based on 10 or 20 year old issues.
 
 This smacks of the classic troll, where you say things like nothing that 
 Microsoft makes is secure and it never will be and then go on to say how 
 easy it is to migrate, and how it's free, with only a one off cost, and how 
 to move off of .NET.
 
 Obvious predictions, ignorant assumptions, and a total lack of any true 
 understanding of business computing.  Yep, troll.
 
 t
 
 -Original Message-
 From: full-disclosure-boun...@lists.grok.org.uk 
 [mailto:full-disclosure-boun...@lists.grok.org.uk] On Behalf Of lsi
 Sent: Saturday, May 15, 2010 6:12 AM
 To: full-disclosure@lists.grok.org.uk
 Subject: [Full-disclosure] Windows' future (reprise)
 
 Hi All!
 
 Just a followup from my posting of 9 months ago (which can be found
 here):
 
 http://www.mail-archive.com/full-disclosure@lists.grok.org.uk/msg37173.html
 
 Symantec have released Internet Security Threat Report: Volume XV: 
 April 2010.  My posting from last year was based on the previous Internet 
 Security Threat Report: Volume XIV: April 2009.  So I thought it would be 
 interesting to check my numbers.  The new edition of the Threat Report is 
 here:
 
 http://www4.symantec.com/Vrt/wl?tu_id=SUKX1271711282503126202
 
 You may recall that last year, the average annual growth rate of new threats 
 (as defined by Symantec) was 243%.  This enabled me to predict that the 
 number of new threats in this year's Symantec Threat Report would be 243% of 
 last years; eg. I predicted 9 months ago the number of new threats in this 
 year's Symantec Threat Report would be 243% * 1656227, or 3840485.87.
 
 The actual number of new threats in this year's Symantec Threat Report is 
 2895802, an error on my part of 24.6%.
 
 This is quite a chunk, however it is not that far off.  My excuses:
 
 - my number was based on averages, so it will never be exact.  There will be 
 a natural variance in the growth rate, caused by many factors.
 
 - in the new edition, Symantec have altered the raw data a little - the 
 number of new threats for 2009, 2008, 2007 etc is slightly different to those 
 same years, as listed in the previous version of the report.  I have not 
 updated my projection to allow for this.
 
 - Symantec note that The slight decline in the rate of growth should not 
 discount the significant number of new signatures created in 2009. 
 Signature-based detection is lagging behind the creation of malicious 
 threats... (page 48).
 
 Am I retreating from my position?  Absolutely not.  I am now expecting the 
 number of new threats in next years' report to be 7036798.86. This is 2895802 
 * 243%.  This includes the error introduced by Symantec's changes to the raw 
 data.  I don't think it matters much.
 
 As this flood of new threats will soon overpower AV companies' 
 ability to catalogue them (by 2015, at 243% growth, there will be
 2.739 MILLION new threats PER DAY (over 1900 new threats per minute)), and as 
 Symantec

Re: [Full-disclosure] Windows' future (reprise)

2010-05-15 Thread lsi
An interesting point - Unicode?  

I don't think 5Mb files are infeasible, especially as time passes, 
that'll be just a blip before long.

Stu

On 15 May 2010 at 14:59, Christian Sciberras wrote:

Date sent:  Sat, 15 May 2010 14:59:46 +0100
Subject:Re: [Full-disclosure] Windows' future (reprise)
From:   Christian Sciberras uuf6...@gmail.com
To: stu...@cyberdelix.net

 In a nutshell, I disagree. For one thing, that much variants would exhaust
 the number of combinations per malware, unless we are talking about malware
 in excess of 5 Mb.
 I'm not disagreeing with the prediction of an increase, nor for a
 possibility of a grim future for windows. I'm just saying that at those
 numbers, there is more probability of a (very) wrong predication.
 
 Cheers.
 
 
 
 
 
 
 On Sat, May 15, 2010 at 2:11 PM, lsi stu...@cyberdelix.net wrote:
 
  Hi All!
 
  Just a followup from my posting of 9 months ago (which can be found
  here):
 
  http://www.mail-archive.com/full-disclosure@lists.grok.org.uk/msg37173.html
 
  Symantec have released Internet Security Threat Report: Volume XV:
  April 2010.  My posting from last year was based on the previous
  Internet Security Threat Report: Volume XIV: April 2009.  So I
  thought it would be interesting to check my numbers.  The new edition
  of the Threat Report is here:
 
  http://www4.symantec.com/Vrt/wl?tu_id=SUKX1271711282503126202
 
  You may recall that last year, the average annual growth rate of new
  threats (as defined by Symantec) was 243%.  This enabled me to
  predict that the number of new threats in this year's Symantec Threat
  Report would be 243% of last years; eg. I predicted 9 months ago the
  number of new threats in this year's Symantec Threat Report would be
  243% * 1656227, or 3840485.87.
 
  The actual number of new threats in this year's Symantec Threat
  Report is 2895802, an error on my part of 24.6%.
 
  This is quite a chunk, however it is not that far off.  My excuses:
 
  - my number was based on averages, so it will never be exact.  There
  will be a natural variance in the growth rate, caused by many
  factors.
 
  - in the new edition, Symantec have altered the raw data a little -
  the number of new threats for 2009, 2008, 2007 etc is slightly
  different to those same years, as listed in the previous version of
  the report.  I have not updated my projection to allow for this.
 
  - Symantec note that The slight decline in the rate of growth should
  not discount the significant number of new signatures created in
  2009. Signature-based detection is lagging behind the creation of
  malicious threats... (page 48).
 
  Am I retreating from my position?  Absolutely not.  I am now
  expecting the number of new threats in next years' report to be
  7036798.86. This is 2895802 * 243%.  This includes the error
  introduced by Symantec's changes to the raw data.  I don't think it
  matters much.
 
  As this flood of new threats will soon overpower AV companies'
  ability to catalogue them (by 2015, at 243% growth, there will be
  2.739 MILLION new threats PER DAY (over 1900 new threats per
  minute)), and as Symantec admits above that signature-based
  detection is lagging, and as Microsoft are not likely to produce a
  secure version of anything anytime soon, I am not at all hopeful of a
  clean resolution to this problem.
 
  I continue to advise that users should, where possible, deploy
  alternatives; that they should, if they have not already, create and
  action a migration strategy; and that they should avoid like the
  plague, any software which locks them into a Microsoft platform.
  Business .NET applications, I'm lookin' at you.
 
  Those failing to migrate will discover their hardware runs slower and
  slower, while doing the same job as it did previously.  They will
  need to take this productivity hit, OR buy a new computer, which will
  also eventually surcumb to the same increasing slowness.  They will
  need to buy new machines more and more frequently.  Eventually, they
  will run out of money - or, for the especially deep-pocketed, they
  will find they cannot deploy the new machines fast enough, before
  they are already too slow to use.  The only alternative to this
  treadmill is to dump Windows.  The sooner it is dumped, the less
  money is wasted buying new hardware, simply to keep up with security-
  induced slowness.
 
  Why spend all that time and money on a series of new Windows
  machines, without fixing the actual problem, which is the inherent
  insecurity of Windows?  People can spend the same time and money
  replacing Windows, and then they won't need to worry about the
  problem any more.  The difference is that sticking with Windows
  incurs ongoing and increasing costs, while a migration incurs a one-
  off cost.
 
  I don't think it takes a genius to see which approach will cost less.
 
  Notes:
  - see page 10 of the Volume XIV (2009) edition, and page 48 of Volume
  XV (2010) edition

Re: [Full-disclosure] Windows' future (reprise)

2010-05-15 Thread Jeffrey Walton
 My main reason for claiming that Windows is inherently insecure is
 because it's closed source.
As opposed to crowd sourcing, which some claim is inherently more
secure because more [uneducated] eyes review the source code? This is
along the lines of, 'Linux does not get viruses' argument. Give me a
break...

On Sat, May 15, 2010 at 4:06 PM, lsi stu...@cyberdelix.net wrote:
 Is that you, Bill?

 I think you misunderstand.  9 months ago, I measured the growth rate
 at 243%, using Symantec's stats.  9 months ago I posted that number
 here, together with a prediction of this year's stats.  Recently, I
 got this year's stats and compared them with that prediction.  I
 found that this prediction was 75.4% accurate.  I am now reporting
 those results back to the group.  And this is trolling how?

 My point is that the prediction was not wildly wrong, and so that
 leads me to wonder if anything else I said, 9 months ago, was also
 not wildly wrong.

 My main reason for claiming that Windows is inherently insecure is
 because it's closed source.  However it's also because of the sloppy,
 monolithic spaghetti code that Windows is made of.  If you're
 claiming Windows is in fact inherently secure, I assume this means
 you don't use AV on any of your Windows machines, and advise everyone
 you know to uninstall it?

 I never said migration would be free or easy.  That is why I am
 posting this data here, because I see it as a vulnerability, a very
 big vulnerability that many companies have not woken up to.  The very
 fact that migration is hard, lengthy, and expensive, means that the
 vulnerability is larger than ever.

 Stu

 On 15 May 2010 at 14:40, Thor (Hammer of God) wrote:

 From:                   Thor (Hammer of God) t...@hammerofgod.com
 To:                     full-disclosure@lists.grok.org.uk full-
 disclos...@lists.grok.org.uk
 Date sent:              Sat, 15 May 2010 14:40:29 +
 Subject:                Re: [Full-disclosure] Windows' future (reprise)

 I am constantly amazed at posts like this where you make yourself sound like 
 some sort of statistical genius because you were able to predict that 
 since last year was %243, that this year would be %243.  Wow.  Really?

 And for the record, these claims of 'inherent insecurity' in Windows are 
 simply ignorant.  If you are still running Windows 95 that's your problem.  
 Do a little research before post assertions based on 10 or 20 year old 
 issues.

 This smacks of the classic troll, where you say things like nothing that 
 Microsoft makes is secure and it never will be and then go on to say how 
 easy it is to migrate, and how it's free, with only a one off cost, and how 
 to move off of .NET.

 Obvious predictions, ignorant assumptions, and a total lack of any true 
 understanding of business computing.  Yep, troll.

 t

 [SNIP]

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Windows' future (reprise)

2010-05-15 Thread BMF
On Sat, May 15, 2010 at 7:40 AM, Thor (Hammer of God)
t...@hammerofgod.com wrote:
 I am constantly amazed at posts like this where you make yourself sound like 
 some sort of statistical genius because you were able to predict that since 
 last year was %243, that this year would be %243.  Wow.  Really?

I agree that the post is a bit pompous...however:

 And for the record, these claims of 'inherent insecurity' in Windows are 
 simply ignorant.  If you are still running Windows 95 that's your problem.  
 Do a little research before post assertions based on 10 or 20 year old issues.


 This smacks of the classic troll, where you say things like nothing that 
 Microsoft makes is secure and it never will be

But...it is true that nothing Microsoft (or anyone, perhaps) makes is
secure. And given that Microsoft has a decades long history of far
worse than industry average security I think it is pretty reasonable
to surmise that Windows will never be secure.

 and then go on to say how easy it is to migrate, and how it's free, with only 
 a one off cost, and how to move off of .NET.

We migrated. With only a one off cost. Been a few years now. Business
is looking good.

 Obvious predictions, ignorant assumptions, and a total lack of any true 
 understanding of business computing.  Yep, troll.

Trollish but not entirely wrong.

BMF

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Windows' future (reprise)

2010-05-15 Thread Thor (Hammer of God)
No, It's Tim Mullen.  No Bill here.  

No, I don't misunderstand:  You said You may recall that last year, the 
average annual growth rate of new threats (as defined by Symantec) was 243%.  
This enabled me to predict that the number of new threats in this year's 
Symantec Threat Report would be 243% of last years.  IOW, you took what 
Symantec's numbers were for one year, and guessed they would be the same for 
this year, and then posted how you were almost right.  Congratulation, you can 
make statements in the obvious.

You people really need to get your stories straight.  Isn't there some club or 
something you guys can join to at least sync up your talking points?   First we 
hear about how AV is stupid, unneeded, useless, a waste of money, and if you 
install it then you are ignorant.  Then we hear about how some people can 
bypass AV using kernel hooks on windows XP and call it an 8.0 Earthquake.  
Now you come out and say that you predict that AV will not be able to keep up 
with these new threats and that people must stop using Windows as a result 
since Windows is not likely of producing any secure version of anything 
anytime soon.  

Then you blithe on about how people should avoid any software that locks them 
into a Microsoft Platform like the plague and specifically note .NET for 
businesses but of course fail to provide any examples of where they should go, 
or any real advice on your mitigation strategy.  

What it is about .NET that should be avoided like the plague?  Wait, before you 
answer that, let's make sure you are qualified to answer.  One must assume that 
you are an expert .NET developer and that you have keen insight into the very 
foundation of the platform in order to know unequivocally that it should not be 
used under any circumstances.   Please give us some code examples of your .NET 
projects where it failed so miserably, even given your expertise, and then 
provide the proper secure solution in your magic TardWare solution.  
Certainly someone speaking with such authority on the matter can come up with 
examples in no time.  

Additionally, you've clearly performed migration engagements for these people 
you advise.  Please let us know what the actual migration plan was, and how 
you have so brilliantly created a one-off cost migration path.  I'm really 
interested in the details about that.  I would particularly like to know what 
authentication infrastructure you would build to support secure 
enterprise-based services, your solution for client access and administration, 
and your overall network concepts.  Also, what is your preferred replacement 
for .NET again?  Details on your SDL process would be fantastic as well. 

You've got a great opportunity to really contribute to the industry by 
providing us with your qualifications and subsequent solutions to these 
problems, so I'm really looking forward to seeing what you have to say on the 
matter beyond Symantec said we'd have this amount of growth, so I said that 
too, and I was almost right.  And since I was almost right, it is imperative to 
drop all Windows products and re-write all of your .NET code immediately 
because AV won't be able to keep up with it.

t

-Original Message-
From: full-disclosure-boun...@lists.grok.org.uk 
[mailto:full-disclosure-boun...@lists.grok.org.uk] On Behalf Of lsi
Sent: Saturday, May 15, 2010 1:07 PM
To: full-disclosure@lists.grok.org.uk
Subject: Re: [Full-disclosure] Windows' future (reprise)

Is that you, Bill?

I think you misunderstand.  9 months ago, I measured the growth rate at 243%, 
using Symantec's stats.  9 months ago I posted that number here, together with 
a prediction of this year's stats.  Recently, I got this year's stats and 
compared them with that prediction.  I found that this prediction was 75.4% 
accurate.  I am now reporting those results back to the group.  And this is 
trolling how?

My point is that the prediction was not wildly wrong, and so that leads me to 
wonder if anything else I said, 9 months ago, was also not wildly wrong.

My main reason for claiming that Windows is inherently insecure is because it's 
closed source.  However it's also because of the sloppy, monolithic spaghetti 
code that Windows is made of.  If you're claiming Windows is in fact inherently 
secure, I assume this means you don't use AV on any of your Windows machines, 
and advise everyone you know to uninstall it?

I never said migration would be free or easy.  That is why I am posting this 
data here, because I see it as a vulnerability, a very big vulnerability that 
many companies have not woken up to.  The very fact that migration is hard, 
lengthy, and expensive, means that the vulnerability is larger than ever.

Stu

On 15 May 2010 at 14:40, Thor (Hammer of God) wrote:

From:   Thor (Hammer of God) t...@hammerofgod.com
To: full-disclosure@lists.grok.org.uk full-
disclos...@lists.grok.org.uk
Date sent:  Sat, 15 May

Re: [Full-disclosure] Windows' future (reprise)

2010-05-15 Thread BMF
On Sat, May 15, 2010 at 1:22 PM, Jeffrey Walton noloa...@gmail.com wrote:
 As opposed to crowd sourcing, which some claim is inherently more
 secure because more [uneducated] eyes review the source code?

There are far more educated eyes able to review the Linux source code
than the Windows source code. The uneducated people reviewing it don't
seem to be hurting anything while the educated people reviewing it are
helping a lot if all of the patches I see coming in every day are any
measure.

 This is along the lines of, 'Linux does not get viruses' argument.

Well...has it ever? I've been running it on a day to day basis on my
desktop since 1994 and have never once gotten a virus. I have been
active in the community since then and I have never met anyone who got
one. So...

BMF

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Windows' future (reprise)

2010-05-15 Thread rdsears
And what of the pass the hash group of attacks, not to mention the  
insecure hashing to begin with? Combine that with token manipulation  
and process migration and you have a very deadly combination to almost  
any windows network that you don't see anywhere else. Exploiting  
windows networks in this way is trivial at best, and is built in to  
the operating system as a set of 'features'.

That's not to say the *nix platform doesn't have it's own security  
problems, but at least they're a.) dealt with in a more timely manner,  
and b.) easily analyzed by anyone. Even if 99/100 people that looks at  
it is 'uneducated' as you put it i'd rather have the one set of eyes  
on it going 'hey this needs to be fixed' and educating eveyone else on  
how to manage it, a la the Debian PRNG SSH bug a couple years ago.  
Imagine how that wouldve gone if Microsoft had dealt with a similar  
issue.

Having said that I have to say even though some people may not find  
Stuart's research interesting, he's simply trying to report his  
findings. He's doing this to help paint a picture of security in the  
state it's ACTUALLY in, and try to predict where it's progressing to.

Everything in nature can be modeled with mathematics, why not threat  
trends?

On May 15, 2010, at 4:22 PM, Jeffrey Walton noloa...@gmail.com wrote:

 My main reason for claiming that Windows is inherently insecure is
 because it's closed source.
 As opposed to crowd sourcing, which some claim is inherently more
 secure because more [uneducated] eyes review the source code? This is
 along the lines of, 'Linux does not get viruses' argument. Give me a
 break...

 On Sat, May 15, 2010 at 4:06 PM, lsi stu...@cyberdelix.net wrote:
 Is that you, Bill?

 I think you misunderstand.  9 months ago, I measured the growth rate
 at 243%, using Symantec's stats.  9 months ago I posted that number
 here, together with a prediction of this year's stats.  Recently, I
 got this year's stats and compared them with that prediction.  I
 found that this prediction was 75.4% accurate.  I am now reporting
 those results back to the group.  And this is trolling how?

 My point is that the prediction was not wildly wrong, and so that
 leads me to wonder if anything else I said, 9 months ago, was also
 not wildly wrong.

 My main reason for claiming that Windows is inherently insecure is
 because it's closed source.  However it's also because of the sloppy,
 monolithic spaghetti code that Windows is made of.  If you're
 claiming Windows is in fact inherently secure, I assume this means
 you don't use AV on any of your Windows machines, and advise everyone
 you know to uninstall it?

 I never said migration would be free or easy.  That is why I am
 posting this data here, because I see it as a vulnerability, a very
 big vulnerability that many companies have not woken up to.  The very
 fact that migration is hard, lengthy, and expensive, means that the
 vulnerability is larger than ever.

 Stu

 On 15 May 2010 at 14:40, Thor (Hammer of God) wrote:

 From:   Thor (Hammer of God) t...@hammerofgod.com
 To: full-disclosure@lists.grok.org.uk full-
 disclos...@lists.grok.org.uk
 Date sent:  Sat, 15 May 2010 14:40:29 +
 Subject:Re: [Full-disclosure] Windows' future  
 (reprise)

 I am constantly amazed at posts like this where you make yourself  
 sound like some sort of statistical genius because you were able  
 to predict that since last year was %243, that this year would be  
 %243.  Wow.  Really?

 And for the record, these claims of 'inherent insecurity' in  
 Windows are simply ignorant.  If you are still running Windows 95  
 that's your problem.  Do a little research before post assertions  
 based on 10 or 20 year old issues.

 This smacks of the classic troll, where you say things like  
 nothing that Microsoft makes is secure and it never will be and  
 then go on to say how easy it is to migrate, and how it's free,  
 with only a one off cost, and how to move off of .NET.

 Obvious predictions, ignorant assumptions, and a total lack of  
 any true understanding of business computing.  Yep, troll.

 t

 [SNIP]

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Windows' future (reprise)

2010-05-15 Thread shawn Davison


Sent from my HTC Touch Pro2 on the Now Network from Sprint®.

-Original Message-
From: BMF badmotherfs...@gmail.com
Sent: Saturday, May 15, 2010 4:54 PM
To: full-disclosure@lists.grok.org.uk full-disclosure@lists.grok.org.uk
Subject: Re: [Full-disclosure] Windows' future (reprise)

On Sat, May 15, 2010 at 7:40 AM, Thor (Hammer of God)
t...@hammerofgod.com wrote:
 I am constantly amazed at posts like this where you make yourself sound like 
 some sort of statistical genius because you were able to predict that since 
 last year was %243, that this year would be %243.  Wow.  Really?

I agree that the post is a bit pompous...however:

 And for the record, these claims of 'inherent insecurity' in Windows are 
 simply ignorant.  If you are still running Windows 95 that's your problem.  
 Do a little research before post assertions based on 10 or 20 year old issues.


 This smacks of the classic troll, where you say things like nothing that 
 Microsoft makes is secure and it never will be

But...it is true that nothing Microsoft (or anyone, perhaps) makes is
secure. And given that Microsoft has a decades long history of far
worse than industry average security I think it is pretty reasonable
to surmise that Windows will never be secure.

 and then go on to say how easy it is to migrate, and how it's free, with only 
 a one off cost, and how to move off of .NET.

We migrated. With only a one off cost. Been a few years now. Business
is looking good.

 Obvious predictions, ignorant assumptions, and a total lack of any true 
 understanding of business computing.  Yep, troll.

Trollish but not entirely wrong.

BMF

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Windows' future (reprise)

2010-05-15 Thread Peter Besenbruch
On Sat, 15 May 2010 16:22:26 -0400
Jeffrey Walton noloa...@gmail.com wrote:

 This is
 along the lines of, 'Linux does not get viruses' argument. Give me a
 break...

I set up a dual boot arrangement on a friend's machine. The Windows
side promptly got infected. The guy was furious and blamed his son.
Fortunately, it was a relatively easy infection to clean. The tip off
that all was not as the man claimed, was when I found several copies of
the virus saved to his home directory in the Linux side. It seems he
hadn't been able to get the attachment to run under Linux, and had
switched to Windows.

Now, I am NOT arguing about Linux being safe because no-one writes
malware for it. I am arguing that that the guy was safe running
Linux because:

a) He could only save the attachment to disk.
b) Had it been Linux malware, he would have had to make it executable.

The guy wasn't knowledgeable enough to do all that. He also didn't know
that much about how malware gets delivered. I suspect that there is a
broad correlation between computer knowledge and safe on-line behavior.
The irony is that the less a person, or employee knows about computers,
the better off everyone would be if that person ran Linux.

-- 
Hawaiian Astronomical Society: http://www.hawastsoc.org
HAS Deepsky Atlas: http://www.hawastsoc.org/deepsky

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Windows' future (reprise)

2010-05-15 Thread lsi
 IOW, you took what Symantec's numbers were for one year, and guessed
 they would be the same for this year, and then posted how you were
 almost right.

You definitely misunderstand.  AFAIK, Symantec do not publish the 
number 243%.  I calculated it myself, using this sum:

(0.92 + 3.67 + 1.64 + 1.24 + 4.44 + 2.65) / 6

I also calculated those numbers, using the general formula y(n+1) / 
y(n).  This is all explained on the link I gave in my original post:

http://www.cyberdelix.net/files/malware_mutation_projection.pdf

Even in the most recent report, Symantec only refer to the growth 
rate by saying it was more than double (eg, 200+%) - although I 
haven't read it closely, they may well elaborate on that at some 
point.

 You people really need to get your stories straight.

There is only one of me, I assure you.

 Then you blithe on about how people should avoid any software that
 locks them into a Microsoft Platform like the plague and specifically
 note .NET for businesses but of course fail to provide any examples of
 where they should go, or any real advice on your mitigation
 strategy.  

I agree Windows needs mitigation, that is why I am posting.  I didn't 
mention alternatives as that's not my purpose, to promote a specific 
product, and I wouldn't want my observations to be tainted by it.  
However, now you've asked, I'd recommend FreeBSD, without even seeing 
your spec.  Desktops?  PC-BSD.  As for .NET, off top of head I'd 
suggest a .NET connector for PHP, running on FreeBSD of course.

 What it is about .NET that should be avoided like the plague?  Wait,

Sorry but I already answered that.   It's because it locks the 
customer into a Microsoft platform.

 One must assume that you are an expert .NET developer

You'd assume wrong - it doesn't take an expert to recognise a 
dependency.

 Additionally, you've clearly performed migration engagements for these
 people you advise.  Please let us know what the actual migration
 plan was, and how you have so brilliantly created a one-off cost
 migration path.  I'm really interested in the details about that.  

I'm sure you are, and I'd be happy to oblige.  My rates for that kind 
of work start at £120/hr.  Please PM me for more info.

 Details on your SDL process would be fantastic as well. 

Continuous incremental improvement (TQM). RERO.  Prototyping.  Agile 
is the word used nowadays I believe... revolution through evolution, 
as I said

Stu

 -Original Message-
 From: full-disclosure-boun...@lists.grok.org.uk 
 [mailto:full-disclosure-boun...@lists.grok.org.uk] On Behalf Of lsi
 Sent: Saturday, May 15, 2010 1:07 PM
 To: full-disclosure@lists.grok.org.uk
 Subject: Re: [Full-disclosure] Windows' future (reprise)
 
 Is that you, Bill?
 
 I think you misunderstand.  9 months ago, I measured the growth rate at 243%, 
 using Symantec's stats.  9 months ago I posted that number here, together 
 with a prediction of this year's stats.  Recently, I got this year's stats 
 and compared them with that prediction.  I found that this prediction was 
 75.4% accurate.  I am now reporting those results back to the group.  And 
 this is trolling how?
 
 My point is that the prediction was not wildly wrong, and so that leads me to 
 wonder if anything else I said, 9 months ago, was also not wildly wrong.
 
 My main reason for claiming that Windows is inherently insecure is because 
 it's closed source.  However it's also because of the sloppy, monolithic 
 spaghetti code that Windows is made of.  If you're claiming Windows is in 
 fact inherently secure, I assume this means you don't use AV on any of your 
 Windows machines, and advise everyone you know to uninstall it?
 
 I never said migration would be free or easy.  That is why I am posting this 
 data here, because I see it as a vulnerability, a very big vulnerability that 
 many companies have not woken up to.  The very fact that migration is hard, 
 lengthy, and expensive, means that the vulnerability is larger than ever.
 
 Stu
 
 On 15 May 2010 at 14:40, Thor (Hammer of God) wrote:
 
 From: Thor (Hammer of God) t...@hammerofgod.com
 To:   full-disclosure@lists.grok.org.uk full-
 disclos...@lists.grok.org.uk
 Date sent:Sat, 15 May 2010 14:40:29 +
 Subject:  Re: [Full-disclosure] Windows' future (reprise)
 
  I am constantly amazed at posts like this where you make yourself sound 
  like some sort of statistical genius because you were able to predict 
  that since last year was %243, that this year would be %243.  Wow.  Really?
  
  And for the record, these claims of 'inherent insecurity' in Windows are 
  simply ignorant.  If you are still running Windows 95 that's your problem.  
  Do a little research before post assertions based on 10 or 20 year old 
  issues.
  
  This smacks of the classic troll, where you say things like nothing that 
  Microsoft makes is secure and it never will be and then go on to say how 
  easy

Re: [Full-disclosure] Windows' future (reprise)

2010-05-15 Thread Thor (Hammer of God)
This just gets better all the time.  I have to admit, it was fun at first, but 
now's I grow weary, mostly because this is just sad.

For you to actually think that one can't find out how much free drive space in 
Windows would be funny it were not so ridiculous.  And it's been built into DIR 
forever.  Oh, and your .bas file is 60,000 some odd bytes, not 1951.  I think 
you are confusing the size with the last time you actually did research into 
what you are talking about.

The main point here is for people to see how easy it is for someone who admits 
that they know nothing about .NET, nor care to learn anything about .NET, to 
honestly and publically say that people must uninstall it as if it were the 
plague.  You actually get paid to tell people to uninstall it and use a .NET 
connector to PHP - whatever the hell that is.  Simply amazing to me.

And yet, it's fine for YOU to continue to use a closed source operating 
system to run your dear Peg closed source email program because you don't 
feel like practicing what you preach.   To think that you consider insight into 
moving a couple of computers over to *nix as the basis to make sweeping 
generalized statements of how migrating is a one-off cost staggers the 
imagination.  But, everyone is entitled to their opinion, so good luck with 
yours dude.   But what you are doing to the poor people who not only trust you 
but also pay you seems to be quite a disservice indeed.  But that's between you 
and whatever your ethic is.

So in a nutshell (and I'll drop off after this as I think this has played 
itself out) you hate closed source and .NET and get paid to tell other people 
to migrate to non-existent .NET connector's to PHP after switching from 
Windows to BSD, but compose the very email that you so vehemently condemn them 
on a closed source operating system with a closed source program because you 
don't have time to figure out how to use your computer at the same time. 
(direct quote).  I think I got it.  Thanks for sharing.

Oh, one last thing - your dear Pegasus 4.51 Windows-based program that you 
hypocritically hold on to while demonizing Windows and .NET was...   wait for 
it   wait for it   written with Visual Studio 2008 C++  - a proud 
Microsoft .NET Framework development platform!

Ladies and Gentlemen, Goodnight!

t

-Original Message-
From: full-disclosure-boun...@lists.grok.org.uk 
[mailto:full-disclosure-boun...@lists.grok.org.uk] On Behalf Of lsi
Sent: Saturday, May 15, 2010 7:15 PM
To: full-disclosure@lists.grok.org.uk
Subject: Re: [Full-disclosure] Windows' future (reprise)

On 16 May 2010 at 0:09, Thor (Hammer of God) wrote:

 Just as I expected.   A wishy washy response, nothing concrete or even
 vaguely resembling substantive material, backtracking on an exact
 quote, the obligatory reference to your formula ala Craig Wright, with
 the final oh, I'm sure you would like to know, but I'll have to
 charge you in order to tell you.

Well spotted, I am a consultant... I get paid to behave that way!

It was your misquote I corrected, if you call that a backtrack, suit yourself!  
I was giving you my working so you could reproduce my numbers... never mind.

 I was wrong to assume that you would try to educate yourself about
 .NET

Other than how to uninstall it, I have no desire to know anything about it.

 The amount of free disk space on a drive utility you wrote

Yeah, how crap, it's called df in unix, everyone hates it enormously!
A truly useless tool.  That must be why a df command appeared in Version 1 of 
ATT UNIX.  Windows doesn't have something like that, so I made one myself.  
You should see the new version, writes to STDOUT, supports multiple drives on 
one commandline, 1951 bytes of source, 154k uncompressed EXE, beat it if you 
can

 P.S.  The headers on your email show that you are using Pegasus Mail
 for Windows (4.51).  I know a guy who can help you switch to Linux if
 you want.  I think he charges about £120/hr.

Amusing, however Pegasus is a perfect example of the difficulty users face when 
migrating.  As my dear Peg isn't open source, it's one of the reasons this 
machine still runs Windows (along with Quake, and the tools I have created over 
years to help me work, and their PowerBasic compiler).  I don't want to be on 
the phone to a customer and trying to figure out how to use my computer at the 
same time, so I decided to go slow for now.  I think this is a fair decision.  
My servers run unix, it's just this desktop that is left.  I'm not in a big 
hurry, this machine is nicely optimised.  I'm not looking forward to the day 
that I have to rewrite all my tools.  I know it will be a total PITA, take 
ages, introduce bugs and generally cost me a packet.
Unfortunately, long-term, the alternative is even worse.  I am very familiar 
with the issues faced when migrating, as I have those issues.  Does this 
surprise you?

Stu

 -Original Message-
 From: full-disclosure-boun

Re: [Full-disclosure] Windows' future (reprise)

2010-05-15 Thread Sabahattin Gucukoglu
On 16 May 2010, at 04:06, Thor (Hammer of God) wrote:
 Oh, one last thing - your dear Pegasus 4.51 Windows-based program that you 
 hypocritically hold on to while demonizing Windows and .NET was...   wait for 
 it   wait for it   written with Visual Studio 2008 C++  - a proud 
 Microsoft .NET Framework development platform!

Sadly, a bad example: it was ported from Borland, an increasingly fragile and 
unsupported compiler.  It's also not a .net app, which IMNSHO makes a world of 
difference to the point being made, but never mind that, you've had your last 
word.

FTR: David did say some supportive things about RAD and .net.  It's all there 
in his blog, and I can't be bothered looking for it.  I also note that Pegasus 
wines reasonably well, so using the header to identify the platform of the 
sender may mislead you.  It is, alas, a well-rounded GUI mailer that Unix 
people such as myself rather like compared to the mint-flavoured-wire GUI 
alternatives.

Cheers,
Sabahattin



smime.p7s
Description: S/MIME cryptographic signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Windows' future (reprise)

2010-05-15 Thread lsi
Hi Bill!

Thanks for the tip on the DIR command, I did in fact notice that, 
however it doesn't give percentages (or total space), AFAIK, and my 
monitoring bot wants percentages.  My df also reports the computer 
name (so I can make sense of the output when the space on multiple 
machines is listed one after the other in a report, and if an alert 
is generated by the monitoring bot).

The new version of my df uitil is 1951 bytes, the version on my site 
is old.

I'm sorry I upset you because I mentioned .NET, is it because you 
make a living off it?  Sorry to be the bearer of bad tidings.  .NET 
is merely one case of many, I picked it as an example because I am 
currently supporting a customer with a £23,000 .NET application that 
has them utterly locked to Microsoft, and I have no hope at all of 
selling them unix anything.  Which is a shame for them (I just made a 
packet cleaning a nasty virus infection from one of their XP PCs).

As for the .NET connector for PHP, yes, I made that up, and the 
problem is where?  You wanted a migration strategy, I gave you one! I 
did say off top of head.  You want me to research it?  That's 
£120/hr.

I also don't see a problem posting my mail from a Windows PC.  Why do 
I need to be running unix before I can report that malware is 
mutating at 243%?  I don't, is the short answer.

Why don't you criticise my arguments, instead of myself, or my job, 
or my computer, or my email program, or my personal migration 
strategy, or my software?  Is it because you can't?  I think so.

Stu

On 16 May 2010 at 3:06, Thor (Hammer of God) wrote:

From:   Thor (Hammer of God) t...@hammerofgod.com
To: full-disclosure@lists.grok.org.uk full-
disclos...@lists.grok.org.uk
Date sent:  Sun, 16 May 2010 03:06:18 +
Subject:Re: [Full-disclosure] Windows' future (reprise)

 This just gets better all the time.  I have to admit, it was fun at first, 
 but now's I grow weary, mostly because this is just sad.
 
 For you to actually think that one can't find out how much free drive space 
 in Windows would be funny it were not so ridiculous.  And it's been built 
 into DIR forever.  Oh, and your .bas file is 60,000 some odd bytes, not 1951. 
  I think you are confusing the size with the last time you actually did 
 research into what you are talking about.
 
 The main point here is for people to see how easy it is for someone who 
 admits that they know nothing about .NET, nor care to learn anything about 
 .NET, to honestly and publically say that people must uninstall it as if it 
 were the plague.  You actually get paid to tell people to uninstall it and 
 use a .NET connector to PHP - whatever the hell that is.  Simply amazing to 
 me.
 
 And yet, it's fine for YOU to continue to use a closed source operating 
 system to run your dear Peg closed source email program because you don't 
 feel like practicing what you preach.   To think that you consider insight 
 into moving a couple of computers over to *nix as the basis to make sweeping 
 generalized statements of how migrating is a one-off cost staggers the 
 imagination.  But, everyone is entitled to their opinion, so good luck with 
 yours dude.   But what you are doing to the poor people who not only trust 
 you but also pay you seems to be quite a disservice indeed.  But that's 
 between you and whatever your ethic is.
 
 So in a nutshell (and I'll drop off after this as I think this has played 
 itself out) you hate closed source and .NET and get paid to tell other people 
 to migrate to non-existent .NET connector's to PHP after switching from 
 Windows to BSD, but compose the very email that you so vehemently condemn 
 them on a closed source operating system with a closed source program because 
 you don't have time to figure out how to use your computer at the same 
 time. (direct quote).  I think I got it.  Thanks for sharing.
 
 Oh, one last thing - your dear Pegasus 4.51 Windows-based program that you 
 hypocritically hold on to while demonizing Windows and .NET was...   wait for 
 it   wait for it   written with Visual Studio 2008 C++  - a proud 
 Microsoft .NET Framework development platform!
 
 Ladies and Gentlemen, Goodnight!
 
 t
 
 -Original Message-
 From: full-disclosure-boun...@lists.grok.org.uk 
 [mailto:full-disclosure-boun...@lists.grok.org.uk] On Behalf Of lsi
 Sent: Saturday, May 15, 2010 7:15 PM
 To: full-disclosure@lists.grok.org.uk
 Subject: Re: [Full-disclosure] Windows' future (reprise)
 
 On 16 May 2010 at 0:09, Thor (Hammer of God) wrote:
 
  Just as I expected.   A wishy washy response, nothing concrete or even
  vaguely resembling substantive material, backtracking on an exact
  quote, the obligatory reference to your formula ala Craig Wright, with
  the final oh, I'm sure you would like to know, but I'll have to
  charge you in order to tell you.
 
 Well spotted, I am a consultant... I get paid to behave that way

Re: [Full-disclosure] windows future

2009-09-04 Thread lsi
Hi All,

Sorry for the delay, I had some urgent migration planning to attend 
to ... ;)  Stats below.  Short version: evacuate.  Long version:

- stats are in, exponential curve is real, see it for yourself here:

http://eval.symantec.com/mktginfo/enterprise/white_papers/b-whitepaper_internet_security_threat_report_xiv_04-2009.en-us.pdf

(page 10)

- I also added up the numbers at 
http://www.virusbtn.com/resources/malwareDirectory/prevalence/index.xml?year=2009
... exponential curve also visible, though I think their stats are 
dodgy, their website is already suffering from math limits - it is 
reporting current yearly stats as NaN% (Not A Number).

- average rate of change per year (annual growth rate), calculated 
from Symantec's chart: 243%

- approximate date when number of NEW threats reached 1 Million: 2008

- approximate date when number of NEW threats will reach 1 Billion: 
2015

- approximate date when number of NEW threats will reach 2 Billion: 
2016

- charts showing this: 
http://www.cyberdelix.net/files/malware_mutation_projection.pdf

- will the AV companies be able to classify 1 billion new threats per 
year? that is 2.739 MILLION new threats per DAY (over 1900 new 
threats per minute).

- will your computer cope with scanning every EXE, DLL, PIF etc 1 
billion times, every time you use them?

- aside from the theoretical limits imposed by hardware and software, 
there is one extra limit, imposed by users.  Users will not tolerate 
machines operating slowly, and will seek alternative platforms well 
before 100% CPU utilisation (either as a direct result of the size of 
the blacklist, or indirectly caused by swapping due to low RAM).  
This user limit might be lower than 20% CPU utilisation.  If users 
figure out that 20% of their time is being wasted, and rising fast, 
they will run for the exit.

- will you tolerate your machine constantly processing a list a 
billion items long?

- do you plan to, and can you afford to, upgrade your compute power 
by 243%, every year?

- will you do this, even though you know viable alternative platforms 
exist, at less total cost to yourself?

- if you're already irritated that AV is slowing down your machine, 
consider that malware levels will be 500 times higher in approx 5 
years (assuming growth rates continue at 243%). That means your AV 
will be running 500 times slower.  Unless you upgrade your machine by 
500 x current (eg. to an effective speed of approx 1000 GHz), your 
machine is going to slow down even more.  Given that chipmakers don't 
seem to be able to get much past 5GHz, without melting the die, that 
means you'll need 200 of today's processors, just for malware 
filtering, by 2015.

- Moore's Law says compute power doubles (200%) every 24 months.  
However, malware is growing at 243% every 12 months.  Thus it is 
already exceeding Moore's Law, by a massive margin.  I suspect this 
means this race is unwinnable, and we should give up now, and devote 
our resources to something sustainable.

- how AV writers will generate 2.7 million new threats/day: 

Evolvable Malware:
http://www.genetic-programming.org/hc2009/3-Noreen/Noreen-Presentation.ppt

A Field Guide to Genetic Programming:
http://www.gp-field-guide.org.uk/

Wiki:
http://en.wikipedia.org/wiki/Genetic_programming

- the insecurity of Windows creates a public space, of sorts, an area 
of common ground, with shared ownership - and this is thus 
susceptible to the tragedy of the commons ... 
http://en.wikipedia.org/wiki/Tragedy_of_the_commons ... so no, I 
don't think malware authors will slow down the mutation rate, so as 
to prolong the life of the platform, they do not work together.  As 
Messagelabs puts it, there's no honour amongst thieves ... 
http://www.messagelabs.com/mlireport/MLIReport_Annual_2008_FINAL.pdf

- the greenhouse emissions caused by billions of computers checking 
billions of items for billions of malware are likely to be 
measurable, and will increasingly erode the world's ability to meet 
environmental targets

- my own maths might be dodgy, please check it, spreadsheet: 
http://www.cyberdelix.net/files/malware_mutation_projection.ods

Stu

On 28 Aug 2009 at 15:32, lsi wrote:

From:   lsi stu...@cyberdelix.net
To: full-disclosure@lists.grok.org.uk
Date sent:  Fri, 28 Aug 2009 15:32:45 +0100 

 Thanks for the comments, indeed, the exponential issue arises due to 
 use the of blacklisting by current AV technologies, and a switch to 
 whitelisting could theoretically mitigate that, however, I'm not sure 
 that would work in practice, there are so many little bits of code 
 that execute, right down to tiny javascripts that check you've filled 
 in an online form correctly, and the user might be bombarded with 
 prompts.  Falling back on tweaks to user privileges and UAC prompts 
 is hardly fixing the problem.  The core problem is the platform is 
 inherently insecure, due to its development, licensing and 

Re: [Full-disclosure] windows future

2009-09-04 Thread Rohit Patnaik
All this shows is that there's exponential growth in the number of 
*threats*. It doesn't give any data about the number of actual 
*infections*. I mean, its quite possible that all these bits of malware 
are just targeting the same group of vulnerable Windows boxen, and 
they're just competing to conquer the same fixed base.

After all, if you extrapolated from the exponential growth of maggots on 
a rotting carcass, you'd be predicting that the entire world would be 
covered in maggots not too far from the future.

--Rohit Patnaik
lsi wrote:
 Hi All,

 Sorry for the delay, I had some urgent migration planning to attend 
 to ... ;)  Stats below.  Short version: evacuate.  Long version:

 - stats are in, exponential curve is real, see it for yourself here:

 http://eval.symantec.com/mktginfo/enterprise/white_papers/b-whitepaper_internet_security_threat_report_xiv_04-2009.en-us.pdf

 (page 10)

 - I also added up the numbers at 
 http://www.virusbtn.com/resources/malwareDirectory/prevalence/index.xml?year=2009
 ... exponential curve also visible, though I think their stats are 
 dodgy, their website is already suffering from math limits - it is 
 reporting current yearly stats as NaN% (Not A Number).

 - average rate of change per year (annual growth rate), calculated 
 from Symantec's chart: 243%

 - approximate date when number of NEW threats reached 1 Million: 2008

 - approximate date when number of NEW threats will reach 1 Billion: 
 2015

 - approximate date when number of NEW threats will reach 2 Billion: 
 2016

 - charts showing this: 
 http://www.cyberdelix.net/files/malware_mutation_projection.pdf

 - will the AV companies be able to classify 1 billion new threats per 
 year? that is 2.739 MILLION new threats per DAY (over 1900 new 
 threats per minute).

 - will your computer cope with scanning every EXE, DLL, PIF etc 1 
 billion times, every time you use them?

 - aside from the theoretical limits imposed by hardware and software, 
 there is one extra limit, imposed by users.  Users will not tolerate 
 machines operating slowly, and will seek alternative platforms well 
 before 100% CPU utilisation (either as a direct result of the size of 
 the blacklist, or indirectly caused by swapping due to low RAM).  
 This user limit might be lower than 20% CPU utilisation.  If users 
 figure out that 20% of their time is being wasted, and rising fast, 
 they will run for the exit.

 - will you tolerate your machine constantly processing a list a 
 billion items long?

 - do you plan to, and can you afford to, upgrade your compute power 
 by 243%, every year?

 - will you do this, even though you know viable alternative platforms 
 exist, at less total cost to yourself?

 - if you're already irritated that AV is slowing down your machine, 
 consider that malware levels will be 500 times higher in approx 5 
 years (assuming growth rates continue at 243%). That means your AV 
 will be running 500 times slower.  Unless you upgrade your machine by 
 500 x current (eg. to an effective speed of approx 1000 GHz), your 
 machine is going to slow down even more.  Given that chipmakers don't 
 seem to be able to get much past 5GHz, without melting the die, that 
 means you'll need 200 of today's processors, just for malware 
 filtering, by 2015.

 - Moore's Law says compute power doubles (200%) every 24 months.  
 However, malware is growing at 243% every 12 months.  Thus it is 
 already exceeding Moore's Law, by a massive margin.  I suspect this 
 means this race is unwinnable, and we should give up now, and devote 
 our resources to something sustainable.

 - how AV writers will generate 2.7 million new threats/day: 

 Evolvable Malware:
 http://www.genetic-programming.org/hc2009/3-Noreen/Noreen-Presentation.ppt

 A Field Guide to Genetic Programming:
 http://www.gp-field-guide.org.uk/

 Wiki:
 http://en.wikipedia.org/wiki/Genetic_programming

 - the insecurity of Windows creates a public space, of sorts, an area 
 of common ground, with shared ownership - and this is thus 
 susceptible to the tragedy of the commons ... 
 http://en.wikipedia.org/wiki/Tragedy_of_the_commons ... so no, I 
 don't think malware authors will slow down the mutation rate, so as 
 to prolong the life of the platform, they do not work together.  As 
 Messagelabs puts it, there's no honour amongst thieves ... 
 http://www.messagelabs.com/mlireport/MLIReport_Annual_2008_FINAL.pdf

 - the greenhouse emissions caused by billions of computers checking 
 billions of items for billions of malware are likely to be 
 measurable, and will increasingly erode the world's ability to meet 
 environmental targets

 - my own maths might be dodgy, please check it, spreadsheet: 
 http://www.cyberdelix.net/files/malware_mutation_projection.ods

 Stu

 On 28 Aug 2009 at 15:32, lsi wrote:

 From: lsi stu...@cyberdelix.net
 To:   full-disclosure@lists.grok.org.uk
 Date sent:Fri, 28 Aug 2009 15:32:45 +0100 

   

Re: [Full-disclosure] windows future

2009-09-04 Thread Thor (Hammer of God)
Studies show that 78.3% of all statistics are worthless.

t

 -Original Message-
 From: full-disclosure-boun...@lists.grok.org.uk [mailto:full-
 disclosure-boun...@lists.grok.org.uk] On Behalf Of Rohit Patnaik
 Sent: Friday, September 04, 2009 8:04 AM
 Cc: full-disclosure@lists.grok.org.uk
 Subject: Re: [Full-disclosure] windows future

 All this shows is that there's exponential growth in the number of
 *threats*. It doesn't give any data about the number of actual
 *infections*. I mean, its quite possible that all these bits of malware
 are just targeting the same group of vulnerable Windows boxen, and
 they're just competing to conquer the same fixed base.

 After all, if you extrapolated from the exponential growth of maggots
 on
 a rotting carcass, you'd be predicting that the entire world would be
 covered in maggots not too far from the future.

 --Rohit Patnaik
 lsi wrote:
  Hi All,
 
  Sorry for the delay, I had some urgent migration planning to attend
  to ... ;)  Stats below.  Short version: evacuate.  Long version:
 
  - stats are in, exponential curve is real, see it for yourself here:
 
  http://eval.symantec.com/mktginfo/enterprise/white_papers/b-
 whitepaper_internet_security_threat_report_xiv_04-2009.en-us.pdf
 
  (page 10)
 
  - I also added up the numbers at
 
 http://www.virusbtn.com/resources/malwareDirectory/prevalence/index.xml
 ?year=2009
  ... exponential curve also visible, though I think their stats are
  dodgy, their website is already suffering from math limits - it is
  reporting current yearly stats as NaN% (Not A Number).
 
  - average rate of change per year (annual growth rate), calculated
  from Symantec's chart: 243%
 
  - approximate date when number of NEW threats reached 1 Million: 2008
 
  - approximate date when number of NEW threats will reach 1 Billion:
  2015
 
  - approximate date when number of NEW threats will reach 2 Billion:
  2016
 
  - charts showing this:
  http://www.cyberdelix.net/files/malware_mutation_projection.pdf
 
  - will the AV companies be able to classify 1 billion new threats per
  year? that is 2.739 MILLION new threats per DAY (over 1900 new
  threats per minute).
 
  - will your computer cope with scanning every EXE, DLL, PIF etc 1
  billion times, every time you use them?
 
  - aside from the theoretical limits imposed by hardware and software,
  there is one extra limit, imposed by users.  Users will not tolerate
  machines operating slowly, and will seek alternative platforms well
  before 100% CPU utilisation (either as a direct result of the size of
  the blacklist, or indirectly caused by swapping due to low RAM).
  This user limit might be lower than 20% CPU utilisation.  If users
  figure out that 20% of their time is being wasted, and rising fast,
  they will run for the exit.
 
  - will you tolerate your machine constantly processing a list a
  billion items long?
 
  - do you plan to, and can you afford to, upgrade your compute power
  by 243%, every year?
 
  - will you do this, even though you know viable alternative platforms
  exist, at less total cost to yourself?
 
  - if you're already irritated that AV is slowing down your machine,
  consider that malware levels will be 500 times higher in approx 5
  years (assuming growth rates continue at 243%). That means your AV
  will be running 500 times slower.  Unless you upgrade your machine by
  500 x current (eg. to an effective speed of approx 1000 GHz), your
  machine is going to slow down even more.  Given that chipmakers don't
  seem to be able to get much past 5GHz, without melting the die, that
  means you'll need 200 of today's processors, just for malware
  filtering, by 2015.
 
  - Moore's Law says compute power doubles (200%) every 24 months.
  However, malware is growing at 243% every 12 months.  Thus it is
  already exceeding Moore's Law, by a massive margin.  I suspect this
  means this race is unwinnable, and we should give up now, and devote
  our resources to something sustainable.
 
  - how AV writers will generate 2.7 million new threats/day:
 
  Evolvable Malware:
  http://www.genetic-programming.org/hc2009/3-Noreen/Noreen-
 Presentation.ppt
 
  A Field Guide to Genetic Programming:
  http://www.gp-field-guide.org.uk/
 
  Wiki:
  http://en.wikipedia.org/wiki/Genetic_programming
 
  - the insecurity of Windows creates a public space, of sorts, an area
  of common ground, with shared ownership - and this is thus
  susceptible to the tragedy of the commons ...
  http://en.wikipedia.org/wiki/Tragedy_of_the_commons ... so no, I
  don't think malware authors will slow down the mutation rate, so as
  to prolong the life of the platform, they do not work together.  As
  Messagelabs puts it, there's no honour amongst thieves ...
  http://www.messagelabs.com/mlireport/MLIReport_Annual_2008_FINAL.pdf
 
  - the greenhouse emissions caused by billions of computers checking
  billions of items for billions of malware are likely to be
  measurable

Re: [Full-disclosure] windows future

2009-09-04 Thread Valdis . Kletnieks
On Fri, 04 Sep 2009 15:46:19 BST, lsi said:

 - approximate date when number of NEW threats reached 1 Million: 2008
 
 - approximate date when number of NEW threats will reach 1 Billion: 2015
 
 - approximate date when number of NEW threats will reach 2 Billion: 2016

This is assuming an exponential growth model, when there's no realistic
reason to believe it to be so.  There are however good reasons to expect
that the correct model is the logistics curve (slow growth at first,
a steep middle section, then flattening out asymptotic to a horizontal line).

For starters, new threats have to come from *somewhere*, and there's only
a limited supply of dark-side code hackers, and a limited supply of people
worth fleecing (sure, OLPC may distribute 100M laptops - but those are going to
people who can't be monetized easily).  From whence will the 1 billion
new threats in the 2015-16 span come from? Who will create these, and who will
make money from them?  At what point will some of the marginal players leave
the game and find other avenues of making money?  Remember - if the threat
pool is 100,000, and you have 1,000 threats, you have 1% of the market, and
can probably live well off that 1% if monetized.  But if you have 1,000 threats
in a pool of a billion, you're a marginal player and not likely to get rich
fast doing that.

 - charts showing this: 
 http://www.cyberdelix.net/files/malware_mutation_projection.pdf
 
 - will the AV companies be able to classify 1 billion new threats per 
 year? that is 2.739 MILLION new threats per DAY (over 1900 new 
 threats per minute).
 
 - will your computer cope with scanning every EXE, DLL, PIF etc 1 
 billion times, every time you use them?

You don't have to scan it a billion times. You need to scan it *once* for
one billion attacks.  And proper pattern-matching should help a lot here - quite
often, you'll have 2,934 exploit codes in the wild, all using the same attack
code lifted from Metasploit or milw0rm or whatever.  So only one check is
needed.  A bigger danger here is if we start seeing *single* threats that
include a really good real-time polymorphism/obfuscator - *that* could really
suck.

 - aside from the theoretical limits imposed by hardware and software, 
 there is one extra limit, imposed by users.  Users will not tolerate 
 machines operating slowly, and will seek alternative platforms well 
 before 100% CPU utilisation (either as a direct result of the size of 
 the blacklist, or indirectly caused by swapping due to low RAM).  
 This user limit might be lower than 20% CPU utilisation.  If users 
 figure out that 20% of their time is being wasted, and rising fast, 
 they will run for the exit.

Interesting statistic - year before last, around 10% of all new computer
purchases were replacements for malware-infested boxes.  Just buying a new
one was easier/cheaper than trying to fix the old one for a lot of people.

Second interesting statistic - the vast majority of that 10% ended up using
the exact same operating system.

So even when it's well past the 20% mark and the box is basically unusable,
they *still* don't run for the exit.


pgpnpWV6NEzFm.pgp
Description: PGP signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] windows future

2009-09-04 Thread Rohit Patnaik
And that's also ignoring the fact that you don't have to scan for things 
that you know you're not exposed/vulnerable to. For example, I don't 
take precautions against Feline Immunodeficiency Virus, because I know 
it can't infect humans. I also don't take precautions against Ebola or 
Smallpox because the chance I'd be exposed to them is vanishingly small.

In the same way, I don't worry about IIS threats - I'm not running an 
IIS server. I'm not worried about threats to Outlook - its not my mail 
client.  I don't worry about boot sector virii from the late 80s/early 
90s - they're far too rare to spend time on.  Likewise, I don't care 
about threats against which I've already applied vendor patches or 
service packs.  The total number of threats may be growing 
exponentially, but once you factor in the growing immunity of my 
computer system to said threats, the number of outstanding threats 
(things for which I don't have immunity, and are capable of infecting my 
machine) drops to a much more manageable level.

--Rohit Patnaik

valdis.kletni...@vt.edu wrote:
 On Fri, 04 Sep 2009 15:46:19 BST, lsi said:

   
 - approximate date when number of NEW threats reached 1 Million: 2008

 - approximate date when number of NEW threats will reach 1 Billion: 2015

 - approximate date when number of NEW threats will reach 2 Billion: 2016
 

 This is assuming an exponential growth model, when there's no realistic
 reason to believe it to be so.  There are however good reasons to expect
 that the correct model is the logistics curve (slow growth at first,
 a steep middle section, then flattening out asymptotic to a horizontal line).

 For starters, new threats have to come from *somewhere*, and there's only
 a limited supply of dark-side code hackers, and a limited supply of people
 worth fleecing (sure, OLPC may distribute 100M laptops - but those are going 
 to
 people who can't be monetized easily).  From whence will the 1 billion
 new threats in the 2015-16 span come from? Who will create these, and who will
 make money from them?  At what point will some of the marginal players leave
 the game and find other avenues of making money?  Remember - if the threat
 pool is 100,000, and you have 1,000 threats, you have 1% of the market, and
 can probably live well off that 1% if monetized.  But if you have 1,000 
 threats
 in a pool of a billion, you're a marginal player and not likely to get rich
 fast doing that.

   
 - charts showing this: 
 http://www.cyberdelix.net/files/malware_mutation_projection.pdf

 - will the AV companies be able to classify 1 billion new threats per 
 year? that is 2.739 MILLION new threats per DAY (over 1900 new 
 threats per minute).

 - will your computer cope with scanning every EXE, DLL, PIF etc 1 
 billion times, every time you use them?
 

 You don't have to scan it a billion times. You need to scan it *once* for
 one billion attacks.  And proper pattern-matching should help a lot here - 
 quite
 often, you'll have 2,934 exploit codes in the wild, all using the same attack
 code lifted from Metasploit or milw0rm or whatever.  So only one check is
 needed.  A bigger danger here is if we start seeing *single* threats that
 include a really good real-time polymorphism/obfuscator - *that* could really
 suck.

   
 - aside from the theoretical limits imposed by hardware and software, 
 there is one extra limit, imposed by users.  Users will not tolerate 
 machines operating slowly, and will seek alternative platforms well 
 before 100% CPU utilisation (either as a direct result of the size of 
 the blacklist, or indirectly caused by swapping due to low RAM).  
 This user limit might be lower than 20% CPU utilisation.  If users 
 figure out that 20% of their time is being wasted, and rising fast, 
 they will run for the exit.
 

 Interesting statistic - year before last, around 10% of all new computer
 purchases were replacements for malware-infested boxes.  Just buying a new
 one was easier/cheaper than trying to fix the old one for a lot of people.

 Second interesting statistic - the vast majority of that 10% ended up using
 the exact same operating system.

 So even when it's well past the 20% mark and the box is basically unusable,
 they *still* don't run for the exit.
   
 

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] windows future

2009-09-04 Thread lsi
  - approximate date when number of NEW threats will reach 1 Billion: 2015

 This is assuming an exponential growth model, when there's no realistic
 reason to believe it to be so.  

The reason to believe the exponential model will remain valid, is 
that it is the model that is currently valid.  A different model will 
need to explain how the existing exponential curve is derailed.

 There are however good reasons to expect
 that the correct model is the logistics curve (slow growth at first,
 a steep middle section, then flattening out asymptotic to a horizontal line).

 For starters, new threats have to come from *somewhere* [...] From
 whence will the 1 billion new threats in the 2015-16 span come from?
 Who will create these, 

Did you see the link I posted to the Evolvable Malware PPT?  
Mutation will be automated.  Resistance is useless... ;)

 and who will make money from them?

Presumably, the same gangs who do so now.  They won't need to recruit 
billions of new coders to make their billions of new variants.  It'll 
all be generated overnight, by their botnet, which, when it's not 
sending spam, etc, will be revectoring itself, using the GP 
algorithms previously noted.

 At what point will some of the marginal players leave
 the game and find other avenues of making money?

I answered this one already as well... they will leave soon after the 
number of vulnerable hosts starts to fall, which will happen either 
though mass extinction (due to malware overload) or due to re-
deployment with a Real OS.

 [...]  A bigger danger here is if we start seeing *single* threats
 that include a really good real-time polymorphism/obfuscator - *that*
 could really suck. 

But Valdis old chap, that is exactly what the GP algorithms do, the 
proof-of-concept is already out there (see the GP PPT).

 Interesting statistic - year before last, around 10% of all new computer
 purchases were replacements for malware-infested boxes.  Just buying a new
 one was easier/cheaper than trying to fix the old one for a lot of people.

These numbers are probably skewed by some kind of newbie effect.  
Once you have had your machine for a while, as I'm sure you know, 
simply dumping it is not always an option.  Businesses, for example,
may simply be unable to dump an old system, as it runs some legacy 
something, which just happens to be mission-critical.

 Second interesting statistic - the vast majority of that 10% ended up using
 the exact same operating system.
 
 So even when it's well past the 20% mark and the box is basically unusable,
 they *still* don't run for the exit.

They're newbies.  You wait till they've done that 5 times.  Then ask 
them, are you a happy bunny... and how much money have you spent, in 
total...

- I have already decommissioned one server, due to malware growth - 
it was an old 486 machine, whose sole purpose was to serve AV updates 
for a client's LAN.  All went well for a few years, however the hard 
drive started to fill with signature updates.  So, I upgraded the 
drive, however due to a BIOS limitation (or was that NT4? FAT16?), 
the maximum size I could use was 2Gb.  That would have filled as 
well, except I moved the AV server software onto their main server 
(and proceeded to fill its disk instead, but that's another story) - 
and sent the old 486 to recycling...

So this old server, you might think of course, it's a mere 486, to 
which I reply, and a canary is also a weakling.  That is why people 
put them in mines, because they are very sensitive to carbon monoxide 
levels, and drop dead well before humans do.  So when the canary 
dies, the mine is evacuated.  

This old server was a canary.  Its tight resource limits meant it was 
very sensitive to malware levels.  It dropped dead several years ago 
now. The NaN% on the Virus Bulletin site is another canary.  Sure, 
this can probably be fixed, weak coding you say - again, I say this 
weakness is merely the low-hanging fruit, the first victims of a 
rising tide, which is not even close to its peak.  

Stu

---
Stuart Udall
stuart a...@cyberdelix.dot net - http://www.cyberdelix.net/

--- 
 * Origin: lsi: revolution through evolution (192:168/0.2)

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] windows future

2009-08-31 Thread Valdis . Kletnieks
On Sun, 30 Aug 2009 01:09:55 BST, lsi said:

 The biological metaphor does suggest that Microsoft would take some 
 kind of evasive action, and I think their only option is to license 
 unix, just as Apple did (although Apple did it for different 
 reasons).  Doing this will solve many problems, they can keep their 
 proprietary interface and their reputation, and possibly even their 
 licensing and marketing models, while under the hood, unix saves the 
 day.

Unlikely to work - there's just Too Damned Many legacy binaries that have all
sorts of dependencies on undocumented quirks of the Windows APIs.  So you end
up needing to use a Wine-like shim to provide the API the binaries need - and
if the shim is good enough for the backward-combatable binaries, it's *also*
good enough for the malware to attack.  If IE9 has a bug and some Javascript
scribbles something into the 'Documents' folder, that Javascript really doesn't
care if it's a Documents folder on a real Windows box, or one that's in a
directory being managed by a shim on a Unix/Linux box.  All it cares about is
that it *behaves* like a Documents folder.

Hint:  If a Windows user's home directory is on a remote file share, it
really doesn't care if it's a Genuine Windows(TM) or a Samba share, does it?
Heck, it doesn't even know/care if its domain controller is Windows or Samba.
All it cares is that the file share and the DC *act* like Windows.

And unfortunately, that's true for both legitimate binaries and malware.



pgphsCyqnpSar.pgp
Description: PGP signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] windows future

2009-08-30 Thread Elazar Broad
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1



On Fri, 28 Aug 2009 16:34:27 -0400 Paul Schmehl
pschmehl_li...@tx.rr.com wrote:
--On Friday, August 28, 2009 13:40:28 -0500 Rohit Patnaik
quanti...@gmail.com
wrote:


 To be fair, Linux has come a very long way in that regard. I
purchased
 an Asus Eee 900 with Linux preinstalled, and everything worked
right out
 of the box. Flash, Java, OpenOffice, the works. It was a
vindication of
 my view that the real obstacle to Linux on the desktop isn't the
user,
 but rather the OEM.

 With low-cost, low-power netbooks becoming more prevalent, OEMs
are
 finding that the cost of the Windows license begins to take up a
rather
 high percentage of the overall cost.  Therefore, many are
preinstalling
 and preconfiguring Linux. At the same time, consumers are
finding that
 application incompatibilities don't really matter for them,
since the
 Linux equivalents are able to handle data coming from a Windows
box with
 a minimum of fuss.

That's good news.  Once updating issues are resolved and Xorg
becomes as good
as Mac and Windows graphics (it's almost there now - it just
doesn't quite have
the pop or wow factor of Macs), the obstacles to migration
(for the
consumer) will be availability and the knowledge that an
alternative exists.
At that point I think we'll see Microsoft's market share begin
eroding badly.

KDE4 is quite close, but it definitely requires a bit of
tweaking(or that might just be Slackware)...
-BEGIN PGP SIGNATURE-
Charset: UTF8
Version: Hush 3.0
Note: This signature can be verified at https://www.hushtools.com/verify

wpwEAQECAAYFAkqaLzcACgkQi04xwClgpZgCWwP7BaycPtYOq1SDbt5YWDUlM8xsO/RE
SJDYoEAqiju+Gb64r/UEmS62pP5sMGTB4i6CUkXLHavVXbKun0J26VHFFYLQAWLSACB8
t960F7ICYFkZrgdDTcyMOSVDrIKZWu2gaKLo9wHQxdCLNI6O1kRUtI1LAGKHSYu7bTmb
UhXJFxg=
=2h6t
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] windows future

2009-08-30 Thread Elazar Broad
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Like them or not, M$ has done quite a bit with its SDL[1], and
though quite late in the game, the memory protection mechanism's in
Vista and Windows 7. As far as anti-virus software goes, it's
mostly useless[2][there was a recent article on signature lead
time, I can't find it for some reason] already.

[1]http://www.pcworld.com/businesscenter/blogs/bizfeed/167111/opinio
n_pigs_fly_microsoft_leads_in_security.html?tk=rss_news
[2]http://pcworld.about.com/od/virusesphishingspam/Botnets-Defeat-
Most-Anti-Virus.htm

On Sat, 29 Aug 2009 20:09:55 -0400 lsi stu...@cyberdelix.net
wrote:
I'm saying that the world's malware authors, in their race to stay

ahead of AV, are engaging in an uncoordinated, slow-motion DDOS of

the world's AV systems.  They are flooding the blacklists, and
this
flooding is accelerating.  If it continues, the world's AV systems

will be useless, as will be the machines they are protecting.

Note, I have NOT gone off and compiled some stats, I've just noted
an
existing trend, and extrapolated it.  Here's an article from 2005,

again, the numbers suggest an exponential curve.
http://www.theregister.co.uk/2005/01/05/mcafee_avert_report/

The biological metaphor does suggest that Microsoft would take
some
kind of evasive action, and I think their only option is to
license
unix, just as Apple did (although Apple did it for different
reasons).  Doing this will solve many problems, they can keep
their
proprietary interface and their reputation, and possibly even
their
licensing and marketing models, while under the hood, unix saves
the
day.  They will need to eat some very humble pie, a few diehards
might jump from Redmond's towers, and the clash of cultures will
toast some excellent marshmellows... but they will save their
business.  Do they have a choice?  Malware numbers are suggesting
they don't.

Licensing the solution suits Microsoft's business model (much
easier
for them to buy in a fix than build one, they tried that already),

they did in fact do it many times previously, starting with a
certain
product called MS-DOS, and it means they can keep their customer
base, they just sell them an upgrade which is in fact a completely

new system - again, just as Apple did with OSX.

Actually, I think the simplest thing for them to do would be to
buy
Apple, then they can rebadge OSX, instead of reinventing it.

Stu

On 28 Aug 2009 at 10:24, Rohit Patnaik wrote:

Date sent: Fri, 28 Aug 2009 10:24:25 -0500
From:  Rohit Patnaik quanti...@gmail.com
To:full-disclosure@lists.grok.org.uk
Subject:   Re: [Full-disclosure] windows future

 I'm not sure I agree with the basic premise of this scenario.
You're
 suggesting that getting exposed to malware is some kind of
 inevitability, and that eventually there will be enough
different kinds
 of malware that filtering them all will be impossible. I don't
think
 that's valid. Good browsing habits, running a firewall, and
keeping your
 machine updated will prevent almost all malware from even
getting access
 to your machine. Then all we have to worry about are the few
bits of
 code that are capable of getting through our defenses.

 To reiterate the biological analogy, we don't rely on
antibiotics to
 stop infection. We rely on good hygiene. In the same way, just
as
 increased biological infection rates led to a push for greater
public
 hygiene (e.g. indoor plumbing, closed sewers, etc.) we'll see a
push for
 greater computer hygiene as malware infection rates rise.
Windows
 already includes a firewall to prevent automated worm
infections, and
 Microsoft is working to harden network facing applications, as
evidenced
 by their recent decision to have IE run with limited privileges.
As
 malware becomes more virulent, the immunity of Windows will
likewise
 grow, putting a damper on any sort of exponential growth curve.

 --Rohit Patnaik

 lsi wrote:
  Thanks for the comments, indeed, the exponential issue arises
due to
  use the of blacklisting by current AV technologies, and a
switch to
  whitelisting could theoretically mitigate that, however, I'm
not sure
  that would work in practice, there are so many little bits of
code
  that execute, right down to tiny javascripts that check you've
filled
  in an online form correctly, and the user might be bombarded
with
  prompts.  Falling back on tweaks to user privileges and UAC
prompts
  is hardly fixing the problem.  The core problem is the
platform is
  inherently insecure, due to its development, licensing and
marketing
  models, and nothing is going to fix that.  Even if fixing it
became
  somehow possible, the same effort could be spent improving a
  competing system, rather than fixing a broken one.
 
  Just to complete the extrapolation, the below.
 
  Assuming that mutation rates continue to increase
exponentially,
  infection rates will reach a maximum when the average computer

  reaches 100% utilisation

Re: [Full-disclosure] windows future

2009-08-29 Thread Robinson DELAUGERRE
Then all we have to worry about are the few bits of 
code that are capable of getting through our defenses.

Problem is, to go forth with the bio analogy, while our antibodies forget 
with time how to deal with aggressive agents we are not exposed to, antiviruses 
cannot. This would imply running a full system check, to see what the host is 
vulnerable to. How can you know? Are you packed with a vulnerability tester? Do 
you trust the updates installed on the system? If so, what with a malware that 
makes the system think it's patched?
So to me an antivirus still has to check files for system-irrelevant malware 
(even if it was to prevent the user from being a sane carrier). As an antivirus 
manufacturer I can't make assumptions about users' hygiene.

IMO, this malware threshold will be reached, where signature-based 
antiviruses will consume a hell of a lot machine ressource to check a given 
file against all possible signatures (even with optim in the checking process). 
This will force the manufacturers to move to another paradigm, perhaps 
behaviour based, checking what the file does to the system rather than what it 
contains.

My 2 cents on the matter..

BTW, I'm all for good hygiene, I'm just not confident the average user is ready 
for it yet. User education FTW

-rd*

- Mail Original -
De: Rohit Patnaik quanti...@gmail.com
À: full-disclosure@lists.grok.org.uk
Envoyé: Vendredi 28 Août 2009 17h24:25 GMT +01:00 Amsterdam / Berlin / Berne / 
Rome / Stockholm / Vienne
Objet: Re: [Full-disclosure] windows future

I'm not sure I agree with the basic premise of this scenario. You're 
suggesting that getting exposed to malware is some kind of 
inevitability, and that eventually there will be enough different kinds 
of malware that filtering them all will be impossible. I don't think 
that's valid. Good browsing habits, running a firewall, and keeping your 
machine updated will prevent almost all malware from even getting access 
to your machine. Then all we have to worry about are the few bits of 
code that are capable of getting through our defenses.

To reiterate the biological analogy, we don't rely on antibiotics to 
stop infection. We rely on good hygiene. In the same way, just as 
increased biological infection rates led to a push for greater public 
hygiene (e.g. indoor plumbing, closed sewers, etc.) we'll see a push for 
greater computer hygiene as malware infection rates rise. Windows 
already includes a firewall to prevent automated worm infections, and 
Microsoft is working to harden network facing applications, as evidenced 
by their recent decision to have IE run with limited privileges. As 
malware becomes more virulent, the immunity of Windows will likewise 
grow, putting a damper on any sort of exponential growth curve.

--Rohit Patnaik

lsi wrote:
 Thanks for the comments, indeed, the exponential issue arises due to 
 use the of blacklisting by current AV technologies, and a switch to 
 whitelisting could theoretically mitigate that, however, I'm not sure 
 that would work in practice, there are so many little bits of code 
 that execute, right down to tiny javascripts that check you've filled 
 in an online form correctly, and the user might be bombarded with 
 prompts.  Falling back on tweaks to user privileges and UAC prompts 
 is hardly fixing the problem.  The core problem is the platform is 
 inherently insecure, due to its development, licensing and marketing 
 models, and nothing is going to fix that.  Even if fixing it became 
 somehow possible, the same effort could be spent improving a 
 competing system, rather than fixing a broken one.

 Just to complete the extrapolation, the below.

 Assuming that mutation rates continue to increase exponentially, 
 infection rates will reach a maximum when the average computer 
 reaches 100% utilisation due to malware filtering.  Infection rates 
 will then decline as vulnerable hosts die off due to their 
 inability to filter.  These hosts will either be replaced with new, 
 more powerful Windows machines (before these themselves surcumb to 
 the exponential curve), OR, they will be re-deployed, running a 
 different, non-Windows platform.

 Eventually, the majority of computer owners will get the idea that 
 they don't need to buy ever-more powerful gear, just to do the same 
 job they did yesterday (there may come a time when the fastest 
 machine available is unable to cope, there is every possibility that 
 mutation rates will exceed Moore's Law).  The number of vulnerable 
 hosts will then fall sharply, as the platform is abandoned en-masse.

 At this time, crackers who have been depending upon a certain amount 
 of cracks per week for income, will find themselves short.  They will 
 then, if they have not already, refocus their activities on more 
 profitable revenue streams.

 If every computer is running a diverse ecosystem, crackers will have 
 no choice but to resort to small-scale, targetted attacks, and the 
 days

Re: [Full-disclosure] windows future

2009-08-29 Thread lsi
I'm saying that the world's malware authors, in their race to stay 
ahead of AV, are engaging in an uncoordinated, slow-motion DDOS of 
the world's AV systems.  They are flooding the blacklists, and this 
flooding is accelerating.  If it continues, the world's AV systems 
will be useless, as will be the machines they are protecting.

Note, I have NOT gone off and compiled some stats, I've just noted an 
existing trend, and extrapolated it.  Here's an article from 2005, 
again, the numbers suggest an exponential curve. 
http://www.theregister.co.uk/2005/01/05/mcafee_avert_report/

The biological metaphor does suggest that Microsoft would take some 
kind of evasive action, and I think their only option is to license 
unix, just as Apple did (although Apple did it for different 
reasons).  Doing this will solve many problems, they can keep their 
proprietary interface and their reputation, and possibly even their 
licensing and marketing models, while under the hood, unix saves the 
day.  They will need to eat some very humble pie, a few diehards 
might jump from Redmond's towers, and the clash of cultures will 
toast some excellent marshmellows... but they will save their 
business.  Do they have a choice?  Malware numbers are suggesting 
they don't.

Licensing the solution suits Microsoft's business model (much easier 
for them to buy in a fix than build one, they tried that already), 
they did in fact do it many times previously, starting with a certain 
product called MS-DOS, and it means they can keep their customer 
base, they just sell them an upgrade which is in fact a completely 
new system - again, just as Apple did with OSX.

Actually, I think the simplest thing for them to do would be to buy 
Apple, then they can rebadge OSX, instead of reinventing it.

Stu

On 28 Aug 2009 at 10:24, Rohit Patnaik wrote:

Date sent:  Fri, 28 Aug 2009 10:24:25 -0500
From:   Rohit Patnaik quanti...@gmail.com
To: full-disclosure@lists.grok.org.uk
Subject:Re: [Full-disclosure] windows future

 I'm not sure I agree with the basic premise of this scenario. You're 
 suggesting that getting exposed to malware is some kind of 
 inevitability, and that eventually there will be enough different kinds 
 of malware that filtering them all will be impossible. I don't think 
 that's valid. Good browsing habits, running a firewall, and keeping your 
 machine updated will prevent almost all malware from even getting access 
 to your machine. Then all we have to worry about are the few bits of 
 code that are capable of getting through our defenses.
 
 To reiterate the biological analogy, we don't rely on antibiotics to 
 stop infection. We rely on good hygiene. In the same way, just as 
 increased biological infection rates led to a push for greater public 
 hygiene (e.g. indoor plumbing, closed sewers, etc.) we'll see a push for 
 greater computer hygiene as malware infection rates rise. Windows 
 already includes a firewall to prevent automated worm infections, and 
 Microsoft is working to harden network facing applications, as evidenced 
 by their recent decision to have IE run with limited privileges. As 
 malware becomes more virulent, the immunity of Windows will likewise 
 grow, putting a damper on any sort of exponential growth curve.
 
 --Rohit Patnaik
 
 lsi wrote:
  Thanks for the comments, indeed, the exponential issue arises due to 
  use the of blacklisting by current AV technologies, and a switch to 
  whitelisting could theoretically mitigate that, however, I'm not sure 
  that would work in practice, there are so many little bits of code 
  that execute, right down to tiny javascripts that check you've filled 
  in an online form correctly, and the user might be bombarded with 
  prompts.  Falling back on tweaks to user privileges and UAC prompts 
  is hardly fixing the problem.  The core problem is the platform is 
  inherently insecure, due to its development, licensing and marketing 
  models, and nothing is going to fix that.  Even if fixing it became 
  somehow possible, the same effort could be spent improving a 
  competing system, rather than fixing a broken one.
 
  Just to complete the extrapolation, the below.
 
  Assuming that mutation rates continue to increase exponentially, 
  infection rates will reach a maximum when the average computer 
  reaches 100% utilisation due to malware filtering.  Infection rates 
  will then decline as vulnerable hosts die off due to their 
  inability to filter.  These hosts will either be replaced with new, 
  more powerful Windows machines (before these themselves surcumb to 
  the exponential curve), OR, they will be re-deployed, running a 
  different, non-Windows platform.
 
  Eventually, the majority of computer owners will get the idea that 
  they don't need to buy ever-more powerful gear, just to do the same 
  job they did yesterday (there may come a time when the fastest 
  machine available

Re: [Full-disclosure] windows future

2009-08-29 Thread lsi
I'm not saying malware will frighten users away, I am saying that 
malware will leave them no choice but to leave.  This is not a 
decision users make, they will not be able to buy a Windows computer, 
as they will no longer work.  Sure you can turn them on, but that's 
all.  Once you load up your AV, you'll have no RAM left to load 
Notepad.  Your CPU will be constantly processing AV updates and your 
disk will fill with AV sigs.  The machine will be unusable.

Also, there are software-imposed limits to malware filtering, as well 
as the hardware limits I mentioned earlier, I can only think of one 
right now, and that is 32-bit integer math, I'm pretty sure once the 
number of mutations gets a bit past 2 billion, there will be problems 
with this, possibly mitigated, at a significant cost to performance, 
by using double integers, or by using 64-bit integers and dropping 
support for 32-bit machines (again, long term these approaches will 
also be exhausted).

Whitelisting ... my guess is that there will be trillions of 
legitimate pieces of code, and this list will also grow too large for 
the average computer to handle.

However, as noted in my other mail to Rohit, I think that before 
these limits are reached, Microsoft will bite the bullet and drop in 
a unix core.

Social engineering: yes, point taken, although, someone is still 
cranking out binaries, as per the original link I posted: 
http://www.theregister.co.uk/2009/08/13/malware_arms_race/ ... and to 
be honest, it doesn't matter if it's only one guy who pumps out 
trillions of mutations, it's still gonna DOS the AV.

I'm not commenting on Windows vs unix vs Mac, I didn't mean to start 
that thread, I'm just commenting on Windows, and how it appears to be 
holding a one-way ticket to oblivion.  Is that an iceberg, dead 
ahead?  The numbers are telling us that it is.

PS. Have you seen PC-BSD? :) http://www.pcbsd.org/ ... it's FreeBSD + 
KDE + sexy installer ... 

On 28 Aug 2009 at 16:45, Paul Schmehl wrote:

Date sent:  Fri, 28 Aug 2009 16:45:39 +
From:   Paul Schmehl pschmehl_li...@tx.rr.com
To: full-disclosure@lists.grok.org.uk
Subject:Re: [Full-disclosure] windows future
Send reply to:  Paul Schmehl pschmehl_li...@tx.rr.com
full-disclosure.lists.grok.org.uk  
  
mailto:full-disclosure-
requ...@lists.grok.org.uk?subject=unsubscribe 
mailto:full-disclosure-requ...@lists.grok.org.uk?subject=subscribe 
  

 --On Friday, August 28, 2009 09:32:45 -0500 lsi stu...@cyberdelix.net wrote:
 
  The world will awaken from the 20+ year nightmare that was Windows,
  made possible only by manipulative market practices, driven by greed,
  and discover the only reason it was wracked with malware, was because
  it had all its eggs in one basket.
 
 
 That's crazy talk.  I hate Windows as much as the next guy, but there's a 
 reason they have such a large market share and it's not *just* manipulative 
 market practices.  Most people outside the insular geek world use computers 
 to 
 perform tasks for them.  They think of the computer as a tool, and they 
 expect 
 it to do the job they want without getting in the way or requiring them to 
 learn to count in hex.
 
 When someone else comes up with a system that has excellent graphics, runs 
 Flash and other things without complaint, and just works without expecting 
 them to lift the hood and diagnose problems, doesn't require them to install 
 all sorts of extras to have a working system *and* is priced competitively 
 with Windows, they will buy it.
 
 Macs are competitive with Windows in every category except one; price.  And 
 by 
 price I mean the cost of walking into a store and walking out with a working 
 system.  Apple's biggest mistake has always been trying to hoard the 
 hardware 
 market for their OS - the same mistake Sun makes - which drives up the price 
 and makes them less competitive.  Unix (really Linux mostly) is getting there 
 but still has a ways to go.
 
 I say these things as a hard core Unix user who loves FreeBSD.  There are 
 many 
 reasons that I love FreeBSD and use it exclusively when I can, but things 
 like 
 making Flash work are not for the faint of heart.
 
 It won't be the malware that will drive people *away* from Windows (if it was 
 they would have been driven away long ago), it will be the (dare I say it?) 
 user friendliness of a system *and* price competitiveness that will *attract* 
 buyers to it.
 
 BTW, your comments about crackers and ecosystems are several years behind.  
 The 
 current technology crackers are using to great success is social 
 engineering. 
 Actually breaking into systems is almost passe these days.
 
 -- 
 Paul Schmehl, Senior Infosec Analyst
 As if it wasn't already obvious, my opinions
 are my own and not those of my employer.
 ***
 It is as useless to argue

Re: [Full-disclosure] windows future

2009-08-29 Thread Peter Ferrie
 I'm saying that the world's malware authors, in their race to stay
 ahead of AV, are engaging in an uncoordinated, slow-motion DDOS of
 the world's AV systems.  They are flooding the blacklists, and this
 flooding is accelerating.  If it continues, the world's AV systems
 will be useless, as will be the machines they are protecting.

You are extrapolating, based on an incorrect assumption - that
blacklists will exist forever.
When the number of bad files exceeds the number of good files, then
whitelists will reign instead.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] windows future

2009-08-28 Thread lsi
Thanks for the comments, indeed, the exponential issue arises due to 
use the of blacklisting by current AV technologies, and a switch to 
whitelisting could theoretically mitigate that, however, I'm not sure 
that would work in practice, there are so many little bits of code 
that execute, right down to tiny javascripts that check you've filled 
in an online form correctly, and the user might be bombarded with 
prompts.  Falling back on tweaks to user privileges and UAC prompts 
is hardly fixing the problem.  The core problem is the platform is 
inherently insecure, due to its development, licensing and marketing 
models, and nothing is going to fix that.  Even if fixing it became 
somehow possible, the same effort could be spent improving a 
competing system, rather than fixing a broken one.

Just to complete the extrapolation, the below.

Assuming that mutation rates continue to increase exponentially, 
infection rates will reach a maximum when the average computer 
reaches 100% utilisation due to malware filtering.  Infection rates 
will then decline as vulnerable hosts die off due to their 
inability to filter.  These hosts will either be replaced with new, 
more powerful Windows machines (before these themselves surcumb to 
the exponential curve), OR, they will be re-deployed, running a 
different, non-Windows platform.

Eventually, the majority of computer owners will get the idea that 
they don't need to buy ever-more powerful gear, just to do the same 
job they did yesterday (there may come a time when the fastest 
machine available is unable to cope, there is every possibility that 
mutation rates will exceed Moore's Law).  The number of vulnerable 
hosts will then fall sharply, as the platform is abandoned en-masse.

At this time, crackers who have been depending upon a certain amount 
of cracks per week for income, will find themselves short.  They will 
then, if they have not already, refocus their activities on more 
profitable revenue streams.

If every computer is running a diverse ecosystem, crackers will have 
no choice but to resort to small-scale, targetted attacks, and the 
days of mass-market malware will be over, just as the days of the 
mass-market platform it depends on, will also be over.

And then, crackers will need to be very good crackers, to generate 
enough income from their small-scale attacks.  If they aren't very 
good, they might find it easier and more profitable to get a 9-to-5 
job.  The number of malware authors will then fall sharply.

The world will awaken from the 20+ year nightmare that was Windows, 
made possible only by manipulative market practices, driven by greed, 
and discover the only reason it was wracked with malware, was because 
it had all its eggs in one basket.

Certainly, vulnerabilities will persist, and skilled cracking groups 
may well find new niches from which to operate.  But diversifying the 
ecosystem raises the barrier to entry, to a level most garden-variety 
crackers will find unprofitable, and that will be all that is 
required, to encourage most of them to do something else with their 
lives, and significantly reduce the incidence of cybercrime.

(now I phrase it like that, it might be said, that by buying 
Microsoft, you are indirectly channelling money to organised crime 
gangs, who most likely engage in other kinds of criminal activity, in 
addition to cracking, such as identity theft, money laundering, and 
smuggling. That is, when you buy Microsoft, you are propping up the 
monoculture, and that monoculture feeds criminals, by way of its 
inherent flaws.  Therefore, if you would like to reduce criminal 
activity, don't buy Microsoft.)

-EOF

On 27 Aug 2009 at 13:45, lsi wrote:

From:   lsi stu...@cyberdelix.net
To: full-disclosure@lists.grok.org.uk
Date sent:  Thu, 27 Aug 2009 13:45:01 +0100
Priority:   normal   

Subject:[Full-disclosure] windows future
Send reply to:  stu...@cyberdelix.net
full-disclosure.lists.grok.org.uk  
  
mailto:full-disclosure-
requ...@lists.grok.org.uk?subject=unsubscribe 
mailto:full-disclosure-requ...@lists.grok.org.uk?subject=subscribe 
  

 [Some more extrapolations, this time taken from the fact that malware 
 mutation rates are increasing exponentially. - Stu]
 
 (actually, this wasn't written for an FD audience, please excuse the 
 bit where it urges you to consider your migration strategy, I know 
 you're all ultra-l33t and don't have a single M$ box on your LAN)
 
 http://www.theregister.co.uk/2009/08/13/malware_arms_race/
 
 If this trend continues, there will come a time when the amount of 
 malware is so large, that anti-malware filters will need more power 
 than the systems they are protecting are able to provide.
 
 At this time, those systems will become essentially worthless, and 
 

Re: [Full-disclosure] windows future

2009-08-28 Thread Rohit Patnaik
I'm not sure I agree with the basic premise of this scenario. You're 
suggesting that getting exposed to malware is some kind of 
inevitability, and that eventually there will be enough different kinds 
of malware that filtering them all will be impossible. I don't think 
that's valid. Good browsing habits, running a firewall, and keeping your 
machine updated will prevent almost all malware from even getting access 
to your machine. Then all we have to worry about are the few bits of 
code that are capable of getting through our defenses.

To reiterate the biological analogy, we don't rely on antibiotics to 
stop infection. We rely on good hygiene. In the same way, just as 
increased biological infection rates led to a push for greater public 
hygiene (e.g. indoor plumbing, closed sewers, etc.) we'll see a push for 
greater computer hygiene as malware infection rates rise. Windows 
already includes a firewall to prevent automated worm infections, and 
Microsoft is working to harden network facing applications, as evidenced 
by their recent decision to have IE run with limited privileges. As 
malware becomes more virulent, the immunity of Windows will likewise 
grow, putting a damper on any sort of exponential growth curve.

--Rohit Patnaik

lsi wrote:
 Thanks for the comments, indeed, the exponential issue arises due to 
 use the of blacklisting by current AV technologies, and a switch to 
 whitelisting could theoretically mitigate that, however, I'm not sure 
 that would work in practice, there are so many little bits of code 
 that execute, right down to tiny javascripts that check you've filled 
 in an online form correctly, and the user might be bombarded with 
 prompts.  Falling back on tweaks to user privileges and UAC prompts 
 is hardly fixing the problem.  The core problem is the platform is 
 inherently insecure, due to its development, licensing and marketing 
 models, and nothing is going to fix that.  Even if fixing it became 
 somehow possible, the same effort could be spent improving a 
 competing system, rather than fixing a broken one.

 Just to complete the extrapolation, the below.

 Assuming that mutation rates continue to increase exponentially, 
 infection rates will reach a maximum when the average computer 
 reaches 100% utilisation due to malware filtering.  Infection rates 
 will then decline as vulnerable hosts die off due to their 
 inability to filter.  These hosts will either be replaced with new, 
 more powerful Windows machines (before these themselves surcumb to 
 the exponential curve), OR, they will be re-deployed, running a 
 different, non-Windows platform.

 Eventually, the majority of computer owners will get the idea that 
 they don't need to buy ever-more powerful gear, just to do the same 
 job they did yesterday (there may come a time when the fastest 
 machine available is unable to cope, there is every possibility that 
 mutation rates will exceed Moore's Law).  The number of vulnerable 
 hosts will then fall sharply, as the platform is abandoned en-masse.

 At this time, crackers who have been depending upon a certain amount 
 of cracks per week for income, will find themselves short.  They will 
 then, if they have not already, refocus their activities on more 
 profitable revenue streams.

 If every computer is running a diverse ecosystem, crackers will have 
 no choice but to resort to small-scale, targetted attacks, and the 
 days of mass-market malware will be over, just as the days of the 
 mass-market platform it depends on, will also be over.

 And then, crackers will need to be very good crackers, to generate 
 enough income from their small-scale attacks.  If they aren't very 
 good, they might find it easier and more profitable to get a 9-to-5 
 job.  The number of malware authors will then fall sharply.

 The world will awaken from the 20+ year nightmare that was Windows, 
 made possible only by manipulative market practices, driven by greed, 
 and discover the only reason it was wracked with malware, was because 
 it had all its eggs in one basket.

 Certainly, vulnerabilities will persist, and skilled cracking groups 
 may well find new niches from which to operate.  But diversifying the 
 ecosystem raises the barrier to entry, to a level most garden-variety 
 crackers will find unprofitable, and that will be all that is 
 required, to encourage most of them to do something else with their 
 lives, and significantly reduce the incidence of cybercrime.

 (now I phrase it like that, it might be said, that by buying 
 Microsoft, you are indirectly channelling money to organised crime 
 gangs, who most likely engage in other kinds of criminal activity, in 
 addition to cracking, such as identity theft, money laundering, and 
 smuggling. That is, when you buy Microsoft, you are propping up the 
 monoculture, and that monoculture feeds criminals, by way of its 
 inherent flaws.  Therefore, if you would like to reduce criminal 
 activity, don't buy 

Re: [Full-disclosure] windows future

2009-08-28 Thread Paul Schmehl
--On Friday, August 28, 2009 09:32:45 -0500 lsi stu...@cyberdelix.net wrote:

 The world will awaken from the 20+ year nightmare that was Windows,
 made possible only by manipulative market practices, driven by greed,
 and discover the only reason it was wracked with malware, was because
 it had all its eggs in one basket.


That's crazy talk.  I hate Windows as much as the next guy, but there's a 
reason they have such a large market share and it's not *just* manipulative 
market practices.  Most people outside the insular geek world use computers to 
perform tasks for them.  They think of the computer as a tool, and they expect 
it to do the job they want without getting in the way or requiring them to 
learn to count in hex.

When someone else comes up with a system that has excellent graphics, runs 
Flash and other things without complaint, and just works without expecting 
them to lift the hood and diagnose problems, doesn't require them to install 
all sorts of extras to have a working system *and* is priced competitively 
with Windows, they will buy it.

Macs are competitive with Windows in every category except one; price.  And by 
price I mean the cost of walking into a store and walking out with a working 
system.  Apple's biggest mistake has always been trying to hoard the hardware 
market for their OS - the same mistake Sun makes - which drives up the price 
and makes them less competitive.  Unix (really Linux mostly) is getting there 
but still has a ways to go.

I say these things as a hard core Unix user who loves FreeBSD.  There are many 
reasons that I love FreeBSD and use it exclusively when I can, but things like 
making Flash work are not for the faint of heart.

It won't be the malware that will drive people *away* from Windows (if it was 
they would have been driven away long ago), it will be the (dare I say it?) 
user friendliness of a system *and* price competitiveness that will *attract* 
buyers to it.

BTW, your comments about crackers and ecosystems are several years behind.  The 
current technology crackers are using to great success is social engineering. 
Actually breaking into systems is almost passe these days.

-- 
Paul Schmehl, Senior Infosec Analyst
As if it wasn't already obvious, my opinions
are my own and not those of my employer.
***
It is as useless to argue with those who have
renounced the use of reason as to administer
medication to the dead. Thomas Jefferson

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] windows future

2009-08-28 Thread Rohit Patnaik
To be fair, Linux has come a very long way in that regard. I purchased 
an Asus Eee 900 with Linux preinstalled, and everything worked right out 
of the box. Flash, Java, OpenOffice, the works. It was a vindication of 
my view that the real obstacle to Linux on the desktop isn't the user, 
but rather the OEM.

With low-cost, low-power netbooks becoming more prevalent, OEMs are 
finding that the cost of the Windows license begins to take up a rather 
high percentage of the overall cost.  Therefore, many are preinstalling 
and preconfiguring Linux. At the same time, consumers are finding that 
application incompatibilities don't really matter for them, since the 
Linux equivalents are able to handle data coming from a Windows box with 
a minimum of fuss.

--Rohit Patnaik

Paul Schmehl wrote:
 --On Friday, August 28, 2009 09:32:45 -0500 lsi stu...@cyberdelix.net wrote:
   
 The world will awaken from the 20+ year nightmare that was Windows,
 made possible only by manipulative market practices, driven by greed,
 and discover the only reason it was wracked with malware, was because
 it had all its eggs in one basket.

 

 That's crazy talk.  I hate Windows as much as the next guy, but there's a 
 reason they have such a large market share and it's not *just* manipulative 
 market practices.  Most people outside the insular geek world use computers 
 to 
 perform tasks for them.  They think of the computer as a tool, and they 
 expect 
 it to do the job they want without getting in the way or requiring them to 
 learn to count in hex.

 When someone else comes up with a system that has excellent graphics, runs 
 Flash and other things without complaint, and just works without expecting 
 them to lift the hood and diagnose problems, doesn't require them to install 
 all sorts of extras to have a working system *and* is priced competitively 
 with Windows, they will buy it.

 Macs are competitive with Windows in every category except one; price.  And 
 by 
 price I mean the cost of walking into a store and walking out with a working 
 system.  Apple's biggest mistake has always been trying to hoard the 
 hardware 
 market for their OS - the same mistake Sun makes - which drives up the price 
 and makes them less competitive.  Unix (really Linux mostly) is getting there 
 but still has a ways to go.

 I say these things as a hard core Unix user who loves FreeBSD.  There are 
 many 
 reasons that I love FreeBSD and use it exclusively when I can, but things 
 like 
 making Flash work are not for the faint of heart.

 It won't be the malware that will drive people *away* from Windows (if it was 
 they would have been driven away long ago), it will be the (dare I say it?) 
 user friendliness of a system *and* price competitiveness that will *attract* 
 buyers to it.

 BTW, your comments about crackers and ecosystems are several years behind.  
 The 
 current technology crackers are using to great success is social 
 engineering. 
 Actually breaking into systems is almost passe these days.

   

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] windows future

2009-08-28 Thread Paul Schmehl
--On Friday, August 28, 2009 13:40:28 -0500 Rohit Patnaik quanti...@gmail.com 
wrote:


 To be fair, Linux has come a very long way in that regard. I purchased
 an Asus Eee 900 with Linux preinstalled, and everything worked right out
 of the box. Flash, Java, OpenOffice, the works. It was a vindication of
 my view that the real obstacle to Linux on the desktop isn't the user,
 but rather the OEM.

 With low-cost, low-power netbooks becoming more prevalent, OEMs are
 finding that the cost of the Windows license begins to take up a rather
 high percentage of the overall cost.  Therefore, many are preinstalling
 and preconfiguring Linux. At the same time, consumers are finding that
 application incompatibilities don't really matter for them, since the
 Linux equivalents are able to handle data coming from a Windows box with
 a minimum of fuss.

That's good news.  Once updating issues are resolved and Xorg becomes as good 
as Mac and Windows graphics (it's almost there now - it just doesn't quite have 
the pop or wow factor of Macs), the obstacles to migration (for the 
consumer) will be availability and the knowledge that an alternative exists. 
At that point I think we'll see Microsoft's market share begin eroding badly.

-- 
Paul Schmehl, Senior Infosec Analyst
As if it wasn't already obvious, my opinions
are my own and not those of my employer.
***
It is as useless to argue with those who have
renounced the use of reason as to administer
medication to the dead. Thomas Jefferson

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] windows future

2009-08-28 Thread Rob Thompson
First off, I want to second what Rohit said below.  I have a 901 and it
came that way as well.  Granted I've hacked the shit out of it and now
it's running something else and very well at that, but by default they
are super easy machines to run.  And everything just works.


Paul Schmehl wrote:
 --On Friday, August 28, 2009 13:40:28 -0500 Rohit Patnaik 
 quanti...@gmail.com 
 wrote:
 
 To be fair, Linux has come a very long way in that regard. I purchased
 an Asus Eee 900 with Linux preinstalled, and everything worked right out
 of the box. Flash, Java, OpenOffice, the works. It was a vindication of
 my view that the real obstacle to Linux on the desktop isn't the user,
 but rather the OEM.

 With low-cost, low-power netbooks becoming more prevalent, OEMs are
 finding that the cost of the Windows license begins to take up a rather
 high percentage of the overall cost.  Therefore, many are preinstalling
 and preconfiguring Linux. At the same time, consumers are finding that
 application incompatibilities don't really matter for them, since the
 Linux equivalents are able to handle data coming from a Windows box with
 a minimum of fuss.
 
 That's good news.  Once updating issues are resolved and Xorg becomes as good 
 as Mac and Windows graphics (it's almost there now - it just doesn't quite 
 have 
 the pop or wow factor of Macs), the obstacles to migration (for the 
 consumer) will be availability and the knowledge that an alternative exists. 
 At that point I think we'll see Microsoft's market share begin eroding badly.
 

IMO - the Linux graphics are equivalent with Windows.  Mac though,
that's another thing.  Ubuntu did good to try to add a lot more pretty
into their desktop with the last release, to specifically compete with
Mac, but Mac still owns that beast.

Mac's really are something else to look at.  But I'd never own one.  ;p
 I like Apple as much as I like Microsoft.

Y'all have a great weekend.  :)

-- 
Rob  (I am a PC and I run Linux.)

+-=-=-=-=-=-=-=-=-=-=-=-=-=-=-+
| _   |
|  ASCII ribbon campaign ( )  |
|   - against HTML email  X   |
|/ \  |
| |
+-=-=-=-=-=-=-=-=-=-=-=-=-=-=-+

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/