While this is no doubt a big headache and a ton of work for Tim, and I empathize, this is also a very good discussion to help others avoid this. I think this would make for a great page on the Wiki to have some of these suggested measures available for everyone to have ready access to.
I only am wondering if it should be it's own subject/parent page or a child page to like planning an installation. 73. --Rich On Wed, Dec 15, 2021 at 11:52 PM Brian <theturtl...@gmail.com> wrote: > One more thought... Samba is Open Source, and I think you could make a > case that mature, established, widely-used open source software is > generally less exploitable than widely-used proprietary software of any > age. The reason for this being the fact that the source code is public. > > With public source code in a mature codebase, all the low-hanging fruit > has been plucked years ago. The first place a would-be exploit creator is > going to look for vulnerabilities is the source code. Same with security > researchers. The whole world can clearly see the implementation of the > software, and so with something as widely deployed as Samba, errors will be > caught swiftly by anyone from a random software engineer perusing the > codebase out of curiosity to a security researcher being paid to find > vulnerabilities in open source software. It follows from the sheer number > of eyeballs looking at the code. > > Brian > > > On Wed, Dec 15, 2021 at 8:43 PM Brian <theturtl...@gmail.com> wrote: > >> On Wed, Dec 15, 2021 at 9:02 AM Alejandro olivan Alvarez < >> alejandro.olivan.alva...@gmail.com> wrote: >> >>> Being a Linux-only user, I would add that, IMHO (and risking to be >>> polemic) nothing is more secure regarding security fixes/updates on the SMB >>> protocol than MS Itself (Windows server environment, with AD)... MS will be >>> the first to detect AND DEPLOY any security fix for MS machines via Windows >>> Updates. A Linux machine, on the other hand, can live happily with >>> older/vulnerable samba packages for ages. >>> >> I'm not sure this conclusion follows from the premises. Samba on *nix is >> a totally independent implementation of the SMB/CIFS protocols that shares >> nothing in common with the MS implementations. 99.9% of the time >> vulnerabilities like the one described aren't caused by an inherent flaw in >> the protocol itself, but on one of the implementations of the protocol. If >> the vulnerability were in the protocol itself, that would generally require >> disabling the related feature of the protocol or rolling out a new version >> of the protocol itself, not just patching a bug. The actual coding bugs >> that could be exploited are nearly always going to be totally different – >> and in totally different places – from one implementation to the next. >> >> An exploit that works against Samba is *extremely* unlikely to work >> against Windows, and an exploit that works against Windows is *extremely* >> unlikely to work against Samba. >> >> Therefore, how fast Microsoft patches a vulnerability has no bearing on >> the relative security in practice of choosing Samba. >> >> On the other hand, Microsoft has the disadvantage of being considerably >> more widely deployed as an enterprise file server than Samba on *nix – and >> therefore a much juicier target for malicious attackers to spend their time >> developing exploits for. >> (Though I admit, one might reasonably make the case that the >> proliferation of Samba on Linux-based NAS appliances might actually make it >> an equally tempting target.) >> >> I think it's likely that exploitable vulnerabilities are less commonly >> discovered in Samba than in Windows, so even if they take longer to patch, >> it may still end up being the case that there are fewer days per year that >> a vulnerability could be actively exploited on Samba than on Windows. (I >> would need to compare the frequency/severity of CVEs on both platforms, >> taking number of days unpatched into account to say with certainty) >> >> To summarize: >> * MS is going to have a lot more exploits to patch to keep up with and on >> top of. >> * The exploits that work against MS will almost never work against Samba >> and vice versa. >> * Logically, the swiftness of Microsoft patching vulnerabilities in >> Windows has nothing to say one way or the other about the relative security >> of a Samba deployment. >> >> Brian >> >> > _______________________________________________ > Rivendell-dev mailing list > Rivendell-dev@lists.rivendellaudio.org > http://caspian.paravelsystems.com/mailman/listinfo/rivendell-dev > -- -=:{ Rich Gattie, KB2MOB }:=- Email: mob...@gmail.com Web: http://x1radio.net
_______________________________________________ Rivendell-dev mailing list Rivendell-dev@lists.rivendellaudio.org http://caspian.paravelsystems.com/mailman/listinfo/rivendell-dev