Bruce Johnson wrote:
> 
> On Sunday, February 22, 2004, at 03:01  AM, Philip Stortz wrote:
> 
> >
> > classic, unfortunately is run on top of os x, and indeed does not load
---------
> Yes it does! If you click the little reveal arrow of the window that
> comes up while Classic is booting you will see the old OS 9 boot
> screen, complete with marching extensions...

no, it doesn't really, at least not in the same way os 9 does by itself.  yes, the 
icons
show up, and they are "installed" under classic, sort of.  what really happens is that 
os
x sits between the hardware and classic and emulates the hardware so that the 
extensions
can have access through os x, but it is not direct and doesn't always work correctly 
since
they are dealing with a hardware abstraction layer in os x that mearly simulates the
hardware while the os x drivers are the ones that really access peripherals and system
resources.

-----------

> 1) Out of the box, OS X is very secure. Nothing is turned on; it
> doesn't have the myriad of weird little services running you can get in
> a poorly set-up Linux box, for example. Telnet, FTP, heck even logging
> in via ssh is turned off.

----------

no, in fact, until the "mremap" vulnerabilities are fixed it's terribly insecure, see:
<http://www.openwall.com/linux/>, the same vulnerabilities exist in all versions of 
bsd,
which do have a patch based on the linux fix.  i checked apples software updates and
couldn't find this fix for os x, and this is a huge, huge bug in that an intruder could
take over your machine completely and access anything on it.  it's similar to a 
recently
discovered windows bug.  what's worse is that it was found over a year ago and most 
linux
and bsd versions didn't incorporate it because not enough people were aware of it.  if
apple has released a patch for the mremap vulnerabilities i'd like to know, i want to 
use
os x, though hopefully a hardware firewall running a patched os would protect os x from
this hole it's best to have it closed on all systems that are web connected.

secondly, of course more services running means more potential security problems, 
however,
you always have the os running and tcp, (and at least one client or server) all of 
which
can have bugs and very often it is tcp (and it's many parts) that is attacked by people
trying to break in.  there is only anecdotal evidence that os x is reasonably secure, 
that
doesn't mean that it is, just that the holes aren't widely known, or at least not 
known to
many.  that's why there are always security updates to any os, new bugs are always 
being
found and some of them will be major security holes no matter what os is being 
discussed. 

-----------

> 2) What spyware or virus problems? There are NO OS X viruses, and no
> spyware I've yet to find being sent around (you can indeed have
> programs that function as spyware, but they don't get installed because
> you think you're installing a pop-up blocker in IE...

actually, that's frequently exactly how spyware gets installed, by installing an
application that does something useful but also has spyware in it.

again, the fact that you or the mac community aren't aware of any spyware or viruses
doesn't mean they aren't out there.  spy ware (and viruses) aren't supposed to be 
obvious
and works best before any one discovers a particular piece of spy war (or virus).  
also,
spy ware (and viruses) doesn't have to run directly under os x, it can be java for 
example
in which case it's more dependent on the browser than the os.  spy ware can also run at
the other end or take the form of cookies or "one pixel icons" which are commonly used 
to
track surfers.  yahoo has announced it's intention to have such a web beacon (aka one
pixel icons) on every internet connected machine.  many applications have a scripting
language, and there are viruses for many of them, i.e. there are viruses that propagate
through word and through adobe acrobat.  often these scripting viruses are passed
on to any other document that's opened.

> 
> 3) Software vs. Hardware firewalls are not much different, as hardware
> firewalls are merely specialized computers doing the same thing that a
> software firewall does, with no resources used on the protected
> computers.

----------

the major difference is that they are setup and mostly left alone, users aren't adding
programs that may break the firewall, and often parts of the os like a graphical
environment aren't included, eliminating the associated vulnerabilities.  also, in many
hardware firewalls the code is in eeprom and can't easily be changed by an attacker,
unlike a users machine where it will live in ram and on a hard drive, both of which are
more easily corrupted by accident or deliberately.

---------

> >  i use a software firewall now, and even on a dialup line with a
> > dynamic ip i get an amazing number of incursion attempts, which often
> > create a denial of
> > service effect just because of the number of attempts from different
> > machines or from an
> > aggressive machine, and i've run into some pretty obnoxious and
> > rapidly repeated incursion
> > attempts that just tie up all the bandwidth.
> 
> A hardware firewall is not going to do diddly to help this. If you're
> on a *dial* up system and this is eating your bandwidth complain to
> your ISP, or get a different one.

i don't expect a hardware or software firewall to solve bandwidth poisoning problems 
from
rapid and repeated incursion attacks, i mentioned that simply to explain how prevalent
break in attempts can be.  i don't expect or want my isp to block these attacks as i 
want
to decide what ports and ip addresses can talk to me and that i can talk to and with 
which
port numbers and protocols.

------------
 
> Also, what software firewall are you running? Some of those, when
> mis-configured, do a dandy job of DOS'ing themselves though
> over-reporting. Some will let you monitor every bit of TCP/IP traffic
> to and from your computer, turning them into packet sniffers as well.

of course, again you are right.  any poorly configured software can slow things down. 
however, what constitutes misconfiguration depends on the specific application.  
further,
packet logging of break in attempts is something that i want so i can determine what
attack it is and spot new ones, hopefully before they manage to get in or at least 
before
they get in a second time.  however, yes, it's rarely necessary to log all of the 
traffic
(at least it's not necessary to log all of the packets, logging all of the connections 
on
the other hand is a good thing).  

it doesn't hurt to have hardware and software firewalls running, multiple perimeters 
are
usually more secure in that what one firewall misses the other may catch and it 
creates a
situation where the attacker usually has to defeat both systems, not just one and they
have to break the hardware firewall before they can break the software firewall, 
usually. 

------------------

security is mess, i'm on and regularly read a number of security list, and the number 
and
scope of problems are far more severe than most people realize.  fortunately, when 
holes
are reported they are usually patched quickly, but not always.  many software makers 
just
don't care about security, and it's very hard to make an application (i.e. a client or
server) secure if security wasn't taken into consideration when it was written.  this 
is
one of the problems with windows in particular.

you can call me paranoid, but there are a lot of people trying to break in out there. 
remember, only the paranoids expect the spanish inquisition.  obviously no net 
connected
machine can ever be completely safe, but that doesn't mean you shouldn't do what you 
can
to secure your' machine (within reason).  obviously it also depends on the value of 
what's
in a given machine or on a given network.  if it's business information it's worth a 
lot
more trouble to protect it than if it only runs game software or plays music and 
video's
or is only used to surf casually.  in my case, i will eventually have some valuable 
data
on my machine that i'll want to protect.

-- 
G-List is sponsored by <http://lowendmac.com/> and...

 Small Dog Electronics    http://www.smalldog.com | Refurbished Drives |
 -- We have Apple Refurbished Monitors in stock!  |  & CDRWs on Sale!  |

      Support Low End Mac <http://lowendmac.com/lists/support.html>

G-List list info:       <http://lowendmac.com/lists/g-list.shtml>
  --> AOL users, remove "mailto:";
Send list messages to:  <mailto:[EMAIL PROTECTED]>
To unsubscribe, email:  <mailto:[EMAIL PROTECTED]>
For digest mode, email: <mailto:[EMAIL PROTECTED]>
Subscription questions: <mailto:[EMAIL PROTECTED]>
Archive: <http://www.mail-archive.com/g-list%40mail.maclaunch.com/>

Using a Mac? Free email & more at Applelinks! http://www.applelinks.com

Reply via email to