Assalamu'alaikum


Pertengahan  tahun lalu kita dihebohkan dengan munculnya worm (virus ?) Code Red
dan  Nimda  yang  banyak  menghancurkan  beberapa  Web Server berbasis NT. Tidak
sedikit  korban akibat serangan 'virus super' ini. Selanjutnya banyak pihak yang
khawatir sistem komputer mereka terinfeksi kedua virus ini.

Kehawatiran  serupa  juga sempat terlintas dalam benak para Administrator Linux,
khususnya  mereka yang memiliki beberapa workstation berbasis Windows, meski pun
Linux dikenal sebagai OS yang memiliki tingkat keamanan cukup tinggi.

Sebagian dari mereka khawatir akan infiltrasi dan serangan virus ke dalam server
Linux  mereka melalui beberapa workstationnya. Kekhawatiran ini semakin menjadi,
mengingat sifat Linux yang open source, sehingga sangat mudah disusupi virus.

Selanjutnya  kekhawatiran  tsb berkembang menjadi beberapa mitos yang belakangan
cukup santer, misalnya :

- Tidak lama lagi Linux akan menjadi OS yang tidak aman, karena ia akan menjadi
target serangan virus selanjutnya  sebagaimana halnya Windows.
- Mengingat sifat open sourcenya, akan mudah bagi para hacker untuk menyusupkan
program virus ke dalam sistem Linux.
- Virus akan dengan mudahnya melakukan self executing di dalam sistem Linux,
sebagaimana yang dikenal pada sistem Windows.
- Virus akan dengan mudah menyebar melalui e-mail ke dalam sistem Linux,
sebagaimana yang sering terjadi pada  komputer berbasis Windows.

Berikut  ini ada artikel menarik yang memfokuskan pembahasan : "Mungkinkah Virus
melakukan infiltrasi ke system Linux?"

Semoga  artikel  ini dapat menjadi menjawab keragu-raguan seputar serangan Virus
pada  sistem  Linux,  khususnya  bagi para administrator Linux dan para pengguna
Linux pada umumnya.

Wallahua'lam


Wassalamu'alaikum wr. wb.



Agung Primamorista

==================


Linux a Virus Target?

taken from : www.roaringpenguin.com/mimedefang/anti-virus.html

In an article on vnunet.com (http://www.vnunet.com/News/1127347), two executives
of anti-virus firms opined that Linux would be the next virus target. Here are
excerpts from the article:

   "Of course we will see more and more attacks on Windows, but Linux will be a
   target because its use is becoming more widespread," said Raimond Genes,
   European president for antivirus at Trend Micro. "It is a stable OS, but it's
   not a secure OS."


   Jack Clarke, European product manager at McAfee, said: "In fact it's probably
   easier to write a virus for Linux because it's open source and the code is
   available. So we will be seeing more Linux viruses as the OS becomes more
   common and popular."

I will be charitable and call these statements "myths" or "misperceptions"
rather than other nastier but perhaps more accurate terms. Let's examine and
debunk the myths.




Myth: Widespread use equals widespread abuse

This myth goes as follows: Product X (Windows, Outlook, whatever) has more
security problems because it is far more widely used than Product Y (Linux,
Mutt, whatever).
In fact, the Apache Web server is far more widely used than Microsoft's IIS
(Source: Netcraft), but has suffered far fewer security problems (Source:
defacement archives).

Update: I have had several comments saying that this survey reveals that Windows
computers account for about 50% of Web servers, but that Apache runs more web
sites. Some people claim that under this metric, therefore, IIS is more widely
used than Apache. Even if I accept these figures, the fact is that the
defacement archives show Windows defacements outnumbering non-Windows
defacements 62 to 38. From this, I still conclude that the number of
vulnerabilities in a piece of software does not necessarily correlate with its
popularity.


Myth: Linux is not a secure OS

In fact, no commodity OS is "secure". Security is a process, not a product, as
dozens of security experts keep reminding us. Linux does, however, have
important security enhancements compared to consumer-level Windows operating
systems: File permissions and separate user accounts can greatly mitigate the
damage caused by malicious software. If all of the security features built-into
Linux are properly configured and enabled, Linux is a highly secure system.

For those who need even more security, the U.S. National Security Agency
provides a Security Enhanced Linux distribution which contains advanced security
features beyond anything found in Microsoft operating systems.




Myth: It is easier to write viruses if you have the OS source code

I would suggest just the opposite: If source code is widely-available, many
organizations with an interest in security (such as the NSA, for example) can
audit the code, correct security problems, and feed these corrections back to
the main code tree.
Why is it that tens of thousands of viruses exist for closed-source systems like
Windows (with several of them actively propagating around the Internet as you
read this), while only a handful of pathetic "proof-of-concept" viruses have
been written for Linux, and none has propagated to any extent?

Why is it that open-source Apache has a far better security record than
closed-source IIS?




Why Linux viruses are unlikely?

In order for an e-mail virus to propagate, it must be able to:
1.   Enter the target machine
2.   Execute on the target machine
3.   Propagate itself

Linux makes steps 2 and 3 very difficult.




Social Engineering to Enable Execution

Under Windows, a file is marked as "executable" based on its filename extension
(.exe, .com, .scr, etc.) Encoding metadata (like file type) into the file name
is a very bad idea and has horrendous security consequences. Encoding metadata
in this way allows for the simple-minded social-engineering attacks we see on
windows: "Click here for a cool screensaver!!!"

Such an attack under Linux would go like this: "Save this file; open up a shell;
enable execute permissions on the file by typing 'chmod a+x filename', and then
run it by typing './filename'."

Obviously, the Linux permissions system makes such a social-engineering attack
very difficult.




Software Flaws to Enable Execution

Another means by which viruses can execute are by exploiting bugs in e-mail
client software. Both Outlook and the various Linux mail clients have had their
share of bugs, and this is indeed a risk, even on Linux. However, because of the
overwhelming uniformity of Windows desktops, a virus which exploits a software
bug in Outlook is far more likely to propagate than one which exploits a
software bug on a Linux e-mail client. This is simply because of the huge array
of Linux e-mail clients in use. At any given time, only a small portion of all
Linux users are vulnerable to e-mail client bugs.




Virus Propagation

To propagate itself, an e-mail virus must re-mail itself to others. On
Windows/Outlook, this is simple, because there is a uniform, well-known
interface for obtaining address lists and sending e-mail. On Linux, this is
harder. There is no uniform way for a virus to read your address book, so a
Linux virus would have to work harder to propagate itself.




Linux in the Future

There is a trend under Linux to build complex, rich desktop environments which
allow rich interaction between programs. These environments could, if not
designed correctly, increase the chances for viruses to execute and propagate.
So far, however, the designers of these environments seem to be following
sensible design and security procedures. No-one, for example, has built a Linux
e-mail client which automatically executes an attachment with just one mouse
click.




Challenge to Anti-Virus Companies

I firmly believe that it is in the anti-virus companies' interest for people to
continue using insecure software. After all, obtaining millions of dollars of
anti-virus revenue depends on keeping people in a constant state of anxiety and
unease.

Secure desktop software could eliminate the entire anti-virus industry. Even
simple (and free) products like MIMEDefang can eliminate large classes of e-mail
viruses without the need to constantly update signature files. I therefore issue
the following challenges to anti-virus companies:

1.   If you have the courage and decency to do so, release products which block
executable e-mail attachments, similar to the example filter supplied with
MIMEDefang. Several MIMEDefang installations blocked the "goner" virus even
though it came out after the MIMEDefang software was installed. Do not force
your customers to scramble for signature updates each time a new virus appears.
Of course, this will hurt your revenue stream, but you should be more interested
in the security of your clients, rather than the size of their wallets... right?

2.   I challenge any anti-virus company to infect my desktop Linux machine with
an e-mail borne virus. I hereby offer a prize of $2000 Canadian to the first
person to successfully infect my machine with an e-mail borne virus. Sucessful
infection means:
1.   The virus must enter my machine via e-mail.
2.   It must create a file called "/etc/VIRUS-WAS-HERE" on my machine.
3.   It must e-mail a message from my desktop machine
(shishi.roaringpenguin.com) with the subject "I GET THE PRIZE" to the e-mail
address "[EMAIL PROTECTED]", with a copy to "[EMAIL PROTECTED]"

Until someone manages to win the prize, I expect Raimond Genes and Jack Clarke
to retract their statements.




-- 
Utk berhenti langganan, kirim email ke [EMAIL PROTECTED]
Informasi arsip di http://www.linux.or.id/milis.php3

Kirim email ke