Well just because windows tells you something, doesn't mean you have to
trust it.  I know that patches are probably not 100% installed if you don't
reboot, but a lot of times microsoft likes you to reboot for no good reason.
Simply because they don't 'trust' most windows users to follow directions
properly.  For example, if a patch updates something in IIS, it might be
enough to just restart the WWW Publishing service,  but the patch won't do
that for you, and will instead ask you to reboot.  If Apache needed to be
updated, whether linux or windows, all that would be needed is to restart
the apache service.  

I know there are automated patching solutions, including the one straight
from microsoft which lets you automatically install patches and reboot the
pc at a certain time every night (if patches are available).  I'm just not
to a point where I trust microsoft enough not to mess up to enable that on
my server.     

I'm not an expert to the point where I know exactly which services are
needed and which ones are not.  Perhaps it's because I never found a good
reference for that.  I have used the NSA templates in the past to lock down
the servers, but so far I've found them to be a bit problematic from a
compatibility standpoint.  And since server management is only a small part
of my current job, I don't have time to troubleshoot the problems it will
cause.  I would appreciate a good reference though to what services can be
disabled while not affecting the accessibility of a web server machine.  

I'm not saying that windows cannot be adequatelly secure.  But windows, by
design, does not encourage good security practices.  You have to study
security in some fashion to even know that the way services are installed on
windows by default is not secure.  You have to know that you need to create
a user account for a program and then have that program's service set up to
run under that account instead of local system.  On linux, this is part of
the core OS.  There is no such thing as local system, and every program runs
as some user.  And most people know that you shouldn't run services as root,
and instead create user accounts for it.  So even if you're just poking
around for the first time, it's more likely that you will set up a program
more securely on linux then you would on windows.  

Russ

-----Original Message-----
From: Dave Watts [mailto:[EMAIL PROTECTED] 
Sent: Thursday, November 24, 2005 9:07 PM
To: CF-Talk
Subject: RE: CF Hosting

> We do have an experienced windows sysadmin... Namely me...

OK. Don't take this personally, but you're the same person who said you
didn't know whether patches were applied, right? You don't know about
automated patching solutions? You don't know what services can or can't be
turned off on a production Windows web application server?

> The point is that Linux doesn't require a reboot when it gets updates, 
> only windows does. This is due to the fact that windows updates patch 
> core windows components, things that shouldn't have problems in the 
> first place. Windows inherently has problems.

Every complex system inherently has problems. Again, most Windows patches do
not require reboots. Windows patches sometimes affect core OS components, as
do Linux patches. Of course, what's a core OS component anyway? On Windows,
IIS is considered a "core OS component" and of course if you're using it,
you'll be concerned that it's adequately secure. But many, many Windows
patches affect end-user applications like IE. Are you using IE from your
server console to browse the internet?

Again, proper system configuration beforehand can help you avoid most of
these problems. Most available Windows patches are not needed in a properly
configured production web application server environment.

> Even a well configured Windows system can be taken down, due to the 
> fact that a lot of problems exist in the core windows components, 
> things that cannot be disabled.

A well-configured system, running any mainstream OS, on an untrusted
network, can be "taken down" if it does anything useful on that network. But
any competent Windows system administrator can reduce the probability of
being vulnerable to automated attacks to near zero. Although it's a little
dated, you might find the O'Reilly book "Securing Windows NT/2000 Servers
for the Internet" (http://www.oreilly.com/catalog/securwinserv/) useful.

Again, I don't want you to take this as a personal attack, because it's not.
But I'm a bit irked when people say over and over again that Windows servers
can't be adequately secured, because they can. And it's just not that
difficult to do, either.

Dave Watts, CTO, Fig Leaf Software
http://www.figleaf.com/

Fig Leaf Software provides the highest caliber vendor-authorized instruction
at our training centers in Washington DC, Atlanta, Chicago, Baltimore,
Northern Virginia, or on-site at your location. 
Visit http://training.figleaf.com/ for more information!




~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~|
Discover CFTicket - The leading ColdFusion Help Desk and Trouble 
Ticket application

http://www.houseoffusion.com/banners/view.cfm?bannerid=48

Message: http://www.houseoffusion.com/lists.cfm/link=i:4:225217
Archives: http://www.houseoffusion.com/cf_lists/threads.cfm/4
Subscription: http://www.houseoffusion.com/lists.cfm/link=s:4
Unsubscribe: 
http://www.houseoffusion.com/cf_lists/unsubscribe.cfm?user=11502.10531.4
Donations & Support: http://www.houseoffusion.com/tiny.cfm/54

Reply via email to