On Fri, Jan 04, 2002 at 09:41:27PM +0700, [EMAIL PROTECTED] wrote:

Namanya buatan manusia itu nggak ada yg perfect om....ya kita fight aja.


>Assalamu'alaikum
>
>
>Pertengahan  tahun lalu kita dihebohkan dengan munculnya worm (virus ?) Code Red
>dan  Nimda  yang  banyak  menghancurkan  beberapa  Web Server berbasis NT. Tidak
>sedikit  korban akibat serangan 'virus super' ini. Selanjutnya banyak pihak yang
>khawatir sistem komputer mereka terinfeksi kedua virus ini.
>
>Kehawatiran  serupa  juga sempat terlintas dalam benak para Administrator Linux,
>khususnya  mereka yang memiliki beberapa workstation berbasis Windows, meski pun
>Linux dikenal sebagai OS yang memiliki tingkat keamanan cukup tinggi.
>
>Sebagian dari mereka khawatir akan infiltrasi dan serangan virus ke dalam server
>Linux  mereka melalui beberapa workstationnya. Kekhawatiran ini semakin menjadi,
>mengingat sifat Linux yang open source, sehingga sangat mudah disusupi virus.
>
>Selanjutnya  kekhawatiran  tsb berkembang menjadi beberapa mitos yang belakangan
>cukup santer, misalnya :
>
>- Tidak lama lagi Linux akan menjadi OS yang tidak aman, karena ia akan menjadi
>target serangan virus selanjutnya  sebagaimana halnya Windows.
>- Mengingat sifat open sourcenya, akan mudah bagi para hacker untuk menyusupkan
>program virus ke dalam sistem Linux.
>- Virus akan dengan mudahnya melakukan self executing di dalam sistem Linux,
>sebagaimana yang dikenal pada sistem Windows.
>- Virus akan dengan mudah menyebar melalui e-mail ke dalam sistem Linux,
>sebagaimana yang sering terjadi pada  komputer berbasis Windows.
>
>Berikut  ini ada artikel menarik yang memfokuskan pembahasan : "Mungkinkah Virus
>melakukan infiltrasi ke system Linux?"
>
>Semoga  artikel  ini dapat menjadi menjawab keragu-raguan seputar serangan Virus
>pada  sistem  Linux,  khususnya  bagi para administrator Linux dan para pengguna
>Linux pada umumnya.
>
>Wallahua'lam
>
>
>Wassalamu'alaikum wr. wb.
>
>
>
>Agung Primamorista
>
>==================
>
>
>Linux a Virus Target?
>
>taken from : www.roaringpenguin.com/mimedefang/anti-virus.html
>
>In an article on vnunet.com (http://www.vnunet.com/News/1127347), two executives
>of anti-virus firms opined that Linux would be the next virus target. Here are
>excerpts from the article:
>
>   "Of course we will see more and more attacks on Windows, but Linux will be a
>   target because its use is becoming more widespread," said Raimond Genes,
>   European president for antivirus at Trend Micro. "It is a stable OS, but it's
>   not a secure OS."
>
>
>   Jack Clarke, European product manager at McAfee, said: "In fact it's probably
>   easier to write a virus for Linux because it's open source and the code is
>   available. So we will be seeing more Linux viruses as the OS becomes more
>   common and popular."
>
>I will be charitable and call these statements "myths" or "misperceptions"
>rather than other nastier but perhaps more accurate terms. Let's examine and
>debunk the myths.
>
>
>
>
>Myth: Widespread use equals widespread abuse
>
>This myth goes as follows: Product X (Windows, Outlook, whatever) has more
>security problems because it is far more widely used than Product Y (Linux,
>Mutt, whatever).
>In fact, the Apache Web server is far more widely used than Microsoft's IIS
>(Source: Netcraft), but has suffered far fewer security problems (Source:
>defacement archives).
>
>Update: I have had several comments saying that this survey reveals that Windows
>computers account for about 50% of Web servers, but that Apache runs more web
>sites. Some people claim that under this metric, therefore, IIS is more widely
>used than Apache. Even if I accept these figures, the fact is that the
>defacement archives show Windows defacements outnumbering non-Windows
>defacements 62 to 38. From this, I still conclude that the number of
>vulnerabilities in a piece of software does not necessarily correlate with its
>popularity.
>
>
>Myth: Linux is not a secure OS
>
>In fact, no commodity OS is "secure". Security is a process, not a product, as
>dozens of security experts keep reminding us. Linux does, however, have
>important security enhancements compared to consumer-level Windows operating
>systems: File permissions and separate user accounts can greatly mitigate the
>damage caused by malicious software. If all of the security features built-into
>Linux are properly configured and enabled, Linux is a highly secure system.
>
>For those who need even more security, the U.S. National Security Agency
>provides a Security Enhanced Linux distribution which contains advanced security
>features beyond anything found in Microsoft operating systems.
>
>
>
>
>Myth: It is easier to write viruses if you have the OS source code
>
>I would suggest just the opposite: If source code is widely-available, many
>organizations with an interest in security (such as the NSA, for example) can
>audit the code, correct security problems, and feed these corrections back to
>the main code tree.
>Why is it that tens of thousands of viruses exist for closed-source systems like
>Windows (with several of them actively propagating around the Internet as you
>read this), while only a handful of pathetic "proof-of-concept" viruses have
>been written for Linux, and none has propagated to any extent?
>
>Why is it that open-source Apache has a far better security record than
>closed-source IIS?
>
>
>
>
>Why Linux viruses are unlikely?
>
>In order for an e-mail virus to propagate, it must be able to:
>1.   Enter the target machine
>2.   Execute on the target machine
>3.   Propagate itself
>
>Linux makes steps 2 and 3 very difficult.
>
>
>
>
>Social Engineering to Enable Execution
>
>Under Windows, a file is marked as "executable" based on its filename extension
>(.exe, .com, .scr, etc.) Encoding metadata (like file type) into the file name
>is a very bad idea and has horrendous security consequences. Encoding metadata
>in this way allows for the simple-minded social-engineering attacks we see on
>windows: "Click here for a cool screensaver!!!"
>
>Such an attack under Linux would go like this: "Save this file; open up a shell;
>enable execute permissions on the file by typing 'chmod a+x filename', and then
>run it by typing './filename'."
>
>Obviously, the Linux permissions system makes such a social-engineering attack
>very difficult.
>
>
>
>
>Software Flaws to Enable Execution
>
>Another means by which viruses can execute are by exploiting bugs in e-mail
>client software. Both Outlook and the various Linux mail clients have had their
>share of bugs, and this is indeed a risk, even on Linux. However, because of the
>overwhelming uniformity of Windows desktops, a virus which exploits a software
>bug in Outlook is far more likely to propagate than one which exploits a
>software bug on a Linux e-mail client. This is simply because of the huge array
>of Linux e-mail clients in use. At any given time, only a small portion of all
>Linux users are vulnerable to e-mail client bugs.
>
>
>
>
>Virus Propagation
>
>To propagate itself, an e-mail virus must re-mail itself to others. On
>Windows/Outlook, this is simple, because there is a uniform, well-known
>interface for obtaining address lists and sending e-mail. On Linux, this is
>harder. There is no uniform way for a virus to read your address book, so a
>Linux virus would have to work harder to propagate itself.
>
>
>
>
>Linux in the Future
>
>There is a trend under Linux to build complex, rich desktop environments which
>allow rich interaction between programs. These environments could, if not
>designed correctly, increase the chances for viruses to execute and propagate.
>So far, however, the designers of these environments seem to be following
>sensible design and security procedures. No-one, for example, has built a Linux
>e-mail client which automatically executes an attachment with just one mouse
>click.
>
>
>
>
>Challenge to Anti-Virus Companies
>
>I firmly believe that it is in the anti-virus companies' interest for people to
>continue using insecure software. After all, obtaining millions of dollars of
>anti-virus revenue depends on keeping people in a constant state of anxiety and
>unease.
>
>Secure desktop software could eliminate the entire anti-virus industry. Even
>simple (and free) products like MIMEDefang can eliminate large classes of e-mail
>viruses without the need to constantly update signature files. I therefore issue
>the following challenges to anti-virus companies:
>
>1.   If you have the courage and decency to do so, release products which block
>executable e-mail attachments, similar to the example filter supplied with
>MIMEDefang. Several MIMEDefang installations blocked the "goner" virus even
>though it came out after the MIMEDefang software was installed. Do not force
>your customers to scramble for signature updates each time a new virus appears.
>Of course, this will hurt your revenue stream, but you should be more interested
>in the security of your clients, rather than the size of their wallets... right?
>
>2.   I challenge any anti-virus company to infect my desktop Linux machine with
>an e-mail borne virus. I hereby offer a prize of $2000 Canadian to the first
>person to successfully infect my machine with an e-mail borne virus. Sucessful
>infection means:
>1.   The virus must enter my machine via e-mail.
>2.   It must create a file called "/etc/VIRUS-WAS-HERE" on my machine.
>3.   It must e-mail a message from my desktop machine
>(shishi.roaringpenguin.com) with the subject "I GET THE PRIZE" to the e-mail
>address "[EMAIL PROTECTED]", with a copy to "[EMAIL PROTECTED]"
>Until someone manages to win the prize, I expect Raimond Genes and Jack Clarke
>to retract their statements.

-- 
budsz

-- 
Utk berhenti langganan, kirim email ke [EMAIL PROTECTED]
Informasi arsip di http://www.linux.or.id/milis.php3

Kirim email ke