Tillbaka till svenska Fidonet
English   Information   Debug  
VATICAN   0/2740
VIETNAM_VETS   0/14
VIRUS   0/378
VIRUS_INFO   0/201
VISUAL_BASIC   0/473
WHITEHOUSE   0/5187
WIN2000   0/101
WIN32   0/30
WIN95   0/4277
WIN95_OLD1   0/70272
WINDOWS   0/1517
WWB_SYSOP   0/419
WWB_TECH   0/810
ZCC-PUBLIC   0/1
ZEC   4

 
4DOS   0/134
ABORTION   0/7
ALASKA_CHAT   0/506
ALLFIX_FILE   0/1313
ALLFIX_FILE_OLD1   0/7997
ALT_DOS   0/152
AMATEUR_RADIO   0/1039
AMIGASALE   0/14
AMIGA   0/331
AMIGA_INT   0/1
AMIGA_PROG   0/20
AMIGA_SYSOP   0/26
ANIME   0/15
ARGUS   0/924
ASCII_ART   0/340
ASIAN_LINK   0/651
ASTRONOMY   0/417
AUDIO   0/92
AUTOMOBILE_RACING   0/105
BABYLON5   0/17862
BAG   135
BATPOWER   0/361
BBBS.ENGLISH   0/382
BBSLAW   0/109
BBS_ADS   0/5290
BBS_INTERNET   0/507
BIBLE   0/3563
BINKD   0/1119
BINKLEY   0/215
BLUEWAVE   0/2173
CABLE_MODEMS   0/25
CBM   0/46
CDRECORD   0/66
CDROM   0/20
CLASSIC_COMPUTER   0/378
COMICS   0/15
CONSPRCY   0/899
COOKING   28922
COOKING_OLD1   0/24719
COOKING_OLD2   0/40862
COOKING_OLD3   0/37489
COOKING_OLD4   0/35496
COOKING_OLD5   9370
C_ECHO   0/189
C_PLUSPLUS   0/31
DIRTY_DOZEN   0/201
DOORGAMES   0/2031
DOS_INTERNET   0/196
duplikat   6000
ECHOLIST   0/18295
EC_SUPPORT   0/318
ELECTRONICS   0/359
ELEKTRONIK.GER   1534
ENET.LINGUISTIC   0/13
ENET.POLITICS   0/4
ENET.SOFT   0/11701
ENET.SYSOP   33817
ENET.TALKS   0/32
ENGLISH_TUTOR   0/2000
EVOLUTION   0/1335
FDECHO   0/217
FDN_ANNOUNCE   0/7068
FIDONEWS   23569
FIDONEWS_OLD1   0/49742
FIDONEWS_OLD2   0/35949
FIDONEWS_OLD3   0/30874
FIDONEWS_OLD4   0/37224
FIDO_SYSOP   12847
FIDO_UTIL   0/180
FILEFIND   0/209
FILEGATE   0/212
FILM   0/18
FNEWS_PUBLISH   4215
FN_SYSOP   41525
FN_SYSOP_OLD1   71952
FTP_FIDO   0/2
FTSC_PUBLIC   0/13587
FUNNY   0/4886
GENEALOGY.EUR   0/71
GET_INFO   105
GOLDED   0/408
HAM   0/16054
HOLYSMOKE   0/6791
HOT_SITES   0/1
HTMLEDIT   0/71
HUB203   466
HUB_100   264
HUB_400   39
HUMOR   0/29
IC   0/2851
INTERNET   0/424
INTERUSER   0/3
IP_CONNECT   719
JAMNNTPD   0/233
JAMTLAND   0/47
KATTY_KORNER   0/41
LAN   0/16
LINUX-USER   0/19
LINUXHELP   0/1155
LINUX   0/22013
LINUX_BBS   0/957
mail   18.68
mail_fore_ok   249
MENSA   0/341
MODERATOR   0/102
MONTE   0/992
MOSCOW_OKLAHOMA   0/1245
MUFFIN   0/783
MUSIC   0/321
N203_STAT   902
N203_SYSCHAT   313
NET203   321
NET204   69
NET_DEV   0/10
NORD.ADMIN   0/101
NORD.CHAT   0/2572
NORD.FIDONET   189
NORD.HARDWARE   0/28
NORD.KULTUR   0/114
NORD.PROG   0/32
NORD.SOFTWARE   0/88
NORD.TEKNIK   0/58
NORD   0/453
OCCULT_CHAT   0/93
OS2BBS   0/787
OS2DOSBBS   0/580
OS2HW   0/42
OS2INET   0/37
OS2LAN   0/134
OS2PROG   0/36
OS2REXX   0/113
OS2USER-L   207
OS2   0/4786
OSDEBATE   0/18996
PASCAL   0/490
PERL   0/457
PHP   0/45
POINTS   0/405
POLITICS   0/29554
POL_INC   0/14731
PSION   103
R20_ADMIN   1117
R20_AMATORRADIO   0/2
R20_BEST_OF_FIDONET   13
R20_CHAT   0/893
R20_DEPP   0/3
R20_DEV   399
R20_ECHO2   1379
R20_ECHOPRES   0/35
R20_ESTAT   0/719
R20_FIDONETPROG...
...RAM.MYPOINT
  0/2
R20_FIDONETPROGRAM   0/22
R20_FIDONET   0/248
R20_FILEFIND   0/24
R20_FILEFOUND   0/22
R20_HIFI   0/3
R20_INFO2   2871
R20_INTERNET   0/12940
R20_INTRESSE   0/60
R20_INTR_KOM   0/99
R20_KANDIDAT.CHAT   42
R20_KANDIDAT   28
R20_KOM_DEV   112
R20_KONTROLL   0/13083
R20_KORSET   0/18
R20_LOKALTRAFIK   0/24
R20_MODERATOR   0/1852
R20_NC   76
R20_NET200   245
R20_NETWORK.OTH...
...ERNETS
  0/13
R20_OPERATIVSYS...
...TEM.LINUX
  0/44
R20_PROGRAMVAROR   0/1
R20_REC2NEC   534
R20_SFOSM   0/340
R20_SF   0/108
R20_SPRAK.ENGLISH   0/1
R20_SQUISH   107
R20_TEST   2
R20_WORST_OF_FIDONET   12
RAR   0/9
RA_MULTI   106
RA_UTIL   0/162
REGCON.EUR   0/2056
REGCON   0/13
SCIENCE   0/1206
SF   0/239
SHAREWARE_SUPPORT   0/5146
SHAREWRE   0/14
SIMPSONS   0/169
STATS_OLD1   0/2539.065
STATS_OLD2   0/2530
STATS_OLD3   0/2395.095
STATS_OLD4   0/1692.25
SURVIVOR   0/495
SYSOPS_CORNER   0/3
SYSOP   0/84
TAGLINES   0/112
TEAMOS2   0/4530
TECH   0/2617
TEST.444   0/105
TRAPDOOR   0/19
TREK   0/755
TUB   0/290
UFO   0/40
UNIX   0/1316
USA_EURLINK   0/102
USR_MODEMS   0/1
Möte WIN95_OLD1, 70272 texter
 lista första sista föregående nästa
Text 22862, 158 rader
Skriven 2006-10-23 18:36:54 av Jeff Guerdat (1:275/311)
Ärende: Vista anti-virus software, part deux
============================================
 From Biran Livingston's Windows Secrets newsletter:

Vista changes lock out antivirus makers

Ryan Russell  By Ryan Russell

Microsoft is making statements 
(http://windowssecrets.com/links/16500d/9d104eh/) claiming it's going to 
let security vendors such as Symantec and McAfee have access to the 
Vista kernel. I don't believe it.

Some people say that Microsoft is merely trying to protect the kernel 
and that Symantec and McAfee are afraid of fair competition. After 
Microsoft announced its new Vista security APIs, similar voices argued 
that allowing third-party security vendors to make effective products 
would also let in the bad guys.

Read on, and I'll explain why I don't think these arguments hold water.

What has Microsoft promised security vendors?

If you saw some of the initial news accounts, Microsoft appeared to be 
caving in to demands to allow greater access to other security vendors, 
as reported by Ars Technica on Oct. 16 
(http://windowssecrets.com/links/16500d/aa0d0fh/). However, a follow-up 
article on Oct. 18 (http://windowssecrets.com/links/16500d/16af61h/) 
reveals that both McAfee and Symantec haven't been given much. A McAfee 
spokesmen says Microsoft has released only a single document vaguely 
describing some kind of API (application programming interface).

Microsoft has already hinted that the "full" security API may be a year 
or more away. The company is not providing any firm dates for any such 
development. At the same time, the current version of Vista may be the 
final release candidate, and Microsoft is on the verge of shipping the 
new OS to business users.

We've seen behavior like this in the recent past. Something tells me 
that Microsoft is trying to unfairly take advantage of its monopoly 
while dragging out any legal remedies as long as it can.

The factors driving Microsoft's Vista promises

Let's first look at Microsoft's motivation. The Redmond company is now 
in the security utility business. Unlike many other cases, such as its 
bundling of Internet Explorer with Windows, Microsoft this time is not 
introducing a new product by giving it away free as part of the 
operating system. Instead, Microsoft is now charging extra for security 
software, on top of the price of Windows itself.

At the same time that Microsoft is deciding to compete with security 
vendors for sales, the company faces a very real threat from the 
European Union, as recently described in a News.com analysis 
(http://windowssecrets.com/links/16500d/1d8a49h/). If Microsoft tries to 
use its monopoly position to create a "security monoculture," in the 
words of one EU official, regulators might go as far as not allowing the 
sale of Vista in Europe.

Unlike fines of hundreds of millions of dollars, which Microsoft can 
afford to pay, the threat of an injunction has the company's full attention.

I'm pretty sure that Microsoft doesn't care about McAfee's and 
Symantec's complaints on their merits. But the fact that those companies 
have the ear of the EU has forced Microsoft to appear concerned.

Are there any valid reasons for Microsoft to lock security vendors out 
of the deepest parts of Vista? Microsoft has mentioned the importance of 
protecting the kernel from attackers. Let's look into whether locking 
out security software improves users' protection.

Keep in mind that we don't yet know whether Microsoft will lock out its 
own add-on software.

Can Vista actually protect its kernel?

All of the following applies only to the 64-bit version of Vista, not 
the 32-bit version. The shift to 64 bits required some significant 
architectural changes. In the process, Microsoft was able to enable a 
number of new protection mechanisms. To be sure, the 64-bit Vista is a 
cleaner Windows than any past Windows — no argument from me there.

Even so, can Vista successfully protect its own kernel? I believe that 
it cannot. The reason is simple: every new, 64-bit driver, which 
Microsoft requires to be digitally signed, runs at the same privilege 
level as the kernel itself. They all run in Ring 0 — the most privileged 
access level on Intel architecture, aside from hardware virtualization.

For the sake of this discussion, I'm making a blanket statement here 
that should be qualified. Some drivers may in fact run with fewer 
privileges. The new Vista architecture may allow for even more privilege 
restriction in the future. But my basic point stands: there will be a 
ton of code running next to the kernel that is not the kernel.

In my June 6 article 
(http://windowssecrets.com/links/16500d/4d00abh/sy3crnw9dsssu/60646-00435r/) 
in the paid version of the newsletter, I talked about how Windows can be 
hacked via buggy drivers. All of that still applies to Vista. Sure, 
Vista will be better. I'm hoping for fewer bugs. The problem is, it has 
to be perfect and have zero bugs in order for this model to really work.

That means zero bugs in all the Vista kernel code, zero bugs in all the 
drivers that Microsoft supplies, and zero bugs in any third-party 
drivers that you happen to install. If a single one of those pieces has 
a bug, then the bad guys can get into the kernel.

Microsoft has, of course, implemented several checks and balances in 
hopes of preventing the rootkits from moving in. But the rootkits will 
simply disable the checks. It will be the same game of patch-and-exploit 
that we've been playing for years now.

Why security vendors need equal access

A technical rendition of how the whole process works is provided in an 
excellent article (http://windowssecrets.com/links/16500d/efc200h/) on 
the subject, aptly entitled Bypassing PatchGuard on Windows x64, at 
security site Uninformed.org.

For another description, read Joanna Rutkowska's Oct. 19 analysis 
(http://windowssecrets.com/links/16500d/d7c6ddh/) of the subject. This 
is the same Joanna Rutkowska who demonstrated one of the first 
"hypervisor" rootkits at Black Hat Briefings this year. She points out 
that a high level of sophistication won't be necessary to subvert Vista. 
She may or may not disagree with me on whether vendors should be locked 
out of the kernel, but she certainly agrees with me that malware will 
get in.

I take it for granted that the black hats will find ways into the 
kernel. Do you want security software to be able to go in and root the 
bad stuff out? If not, I believe your only alternative will be to wipe 
the disk and reinstall. Of course, a wipe-and-reinstall is not a bad 
idea if you want to be sure you've completely eliminated a pest. But we 
have to recognize that this is simply not practical advice for the vast 
majority of users.

There will continue to be kernel malware. I believe we need products to 
be able to remove that malware. That leaves one question: who should be 
allowed to make software that can do that?

I suspect Microsoft will permit its own software to do so. As a matter 
of fact, I'd complain loudly if Microsoft's security software couldn't 
operate on the kernel. When kernel threats appear, you bet I expect 
Microsoft to try to clean them out.

The question is whether you'll be able to pay third parties to try also. 
Their approaches could well be more effective than Microsoft's. I 
personally don't want to rely solely on the Redmond software giant for 
such products. I want to have options and I want to have fair 
competition. Those are things you don't have when a company that 
dominates a market is allowed to use its monopoly to shut out competitors.

Do I trust Symantec or McAfee to always remove malware better, to be 
bug-free, to not destabilize the system? No, not at all. But, by the 
same token, I don't trust Microsoft to always have those qualities, either.

Despite my desire for competition, I use Windows, just as you probably 
do. But I've made a choice to use Windows. As long as I get to pick my 
poison, I'll live with its side-effects.
--- Platinum Xpress/Win/WINServer v3.0pr5a
 * Origin: FidoTel & QWK on the Web! www.fidotel.com (1:275/311)