Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Windows Operating Systems Software Security

NTBUGTRAQ Bashes Windows Update 565

BigBadBri writes "Russ Cooper, keeper of the NTBUGTRAQ list, has a few concerns (to put it mildly) with the trustworthiness of Microsoft's Windows Update."
This discussion has been archived. No new comments can be posted.

NTBUGTRAQ Bashes Windows Update

Comments Filter:
  • by BJZQ8 ( 644168 ) on Thursday May 15, 2003 @11:00AM (#5964189) Homepage Journal
    I don't trust Microsoft either. More often than not, their "patches" break more than they fix anyway.
  • So? (Score:5, Insightful)

    by InfinityWpi ( 175421 ) on Thursday May 15, 2003 @11:01AM (#5964216)
    This shouldn't surprise anyone at all. Anyone involved in computer security or stability is going to have doubts about any sort of update technology, especially if it's from Microsoft. All it takes is a 'minor' 'bug', like the one in the article, and we could be facing a much lerger numbers of CodeRed targets, or zombie machines, or who knows what else.

    Oh, by the way, youre car is just fine. No, no recalls at all for it. Well, one, but it's only important if you actually drive, so you're fine, I'm sure...
  • by Pov ( 248300 ) on Thursday May 15, 2003 @11:02AM (#5964220)
    It's been proven time and time again that people don't patch their systems by hand. Windows Update is at least a step in the right direction, even if it does have some flaws. I can only imagine the outcry if M$ DIDN'T have a Windows Update. It would be an evil scheme or something.
  • Re:Trust? (Score:4, Insightful)

    by Gortbusters.org ( 637314 ) on Thursday May 15, 2003 @11:03AM (#5964226) Homepage Journal
    True that... with each newer operating system and update I see more and more 'report blah blah to Microsoft to improve quality'. It happens in Windows Media Player, whenever a process crashes, and probably other places as well.

    How soon until they don't tell you that and just start reporting your web browsing favorites and selling that information to others?
  • by Teckla ( 630646 ) on Thursday May 15, 2003 @11:05AM (#5964243)
    I'll voice an opinion that'll surely prove to be unpopular around these parts: I like Windows Update.

    Sure, like any given piece of software, you may run into glitches and bugs at some point. But, overall, Windows Update has provided me with an extremely easy and painless way to keep my systems updated.

    Even my Mom can use it, which says a lot. It's better than any alternatives I've seen which require too much geek knowledge to operate. (Admittedly I've never seen how MacOS X handles updates.)

    -Teckla
  • hmmm... (Score:4, Insightful)

    by REBloomfield ( 550182 ) on Thursday May 15, 2003 @11:08AM (#5964273)
    I bet i get marked as a troll, but I bet if this was Red hat Network Update, you wouldn't be winging.

    I have had windows update tell me that i'm clean, when i've only just done a fresh install, but i don't take it personally, you'd only complain if it examined every bit of your disk to ensure that it got it right... make your minds up people!!

  • by DJ Rubbie ( 621940 ) on Thursday May 15, 2003 @11:09AM (#5964291) Homepage Journal
    Actually, it has to be the only source of update because only Microsoft can do something about problems within their source code, therefore, they are the sole providers of patches for Windows.
  • by somethingwicked ( 260651 ) on Thursday May 15, 2003 @11:13AM (#5964345)
    BS BS BS BS BS BS BS

    BS BS BS BS BS BS BS

    Yes, their patches do on occasions break things. Not defending that, they need to be more careful sometimes...

    But "MORE OFTEN THAN NOT" is FAR from the truth, and I am sure you know this. But, with your M$ $ucks patch sewn directly on your forehead, you kinda hafta make remarks like this, right?

    On the few occasions things break they are rarely of the "blow up the server" variety, and MORE OFTEN THAN NOT *grin* they are of the "when the stars align" kind that you HEAR about in bug reports but don't experience first hand.
  • by sczimme ( 603413 ) on Thursday May 15, 2003 @11:16AM (#5964382)

    From the article:

    we no longer even need to make that visit manually, we can trust that Microsoft will supply us with a properly tested security patch within 24 hours and patch our systems for us

    What follows is not MS-bashing.

    System security (and other functions) should not be left to a laissez-faire, set-it-and-forget-it sort of mechanism. The administrator is responsible for applying the patches, manually if need be, and should be diligent enough to determine whether all requisite patches are installed even when using an automated method like Windows Update. Yes, that includes apt-get, RHN, up2date, and others.

    I believe it also behooves the administrator to conduct independent testing on-site: there have some notable examples of patches getting out the door that caused as many problems as they solved. (Yes, I'm thinking of SP4 for NT 4.0. Still not MS bashing, though.)

    Trust, but verify.
  • by svenjob ( 671129 ) <vtsvenjob@@@gmail...com> on Thursday May 15, 2003 @11:17AM (#5964394)
    If you don't trust Windows Update, don't use their service. If you don't trust nVidia, get an ATI. Online voting? Do it the old fashioned way! There are many things in the world which you can choose to use or not to use based on trust. Don't trust it, don't use it. (like free candy)
  • by andrewmc ( 88496 ) on Thursday May 15, 2003 @11:18AM (#5964409)
    Windows Update has provided me with an extremely easy and painless way to keep my systems updated.
    Maybe I'm missing something, but didn't the article say that it can leave your system not fully updated, while you only think it is?
  • by SCHecklerX ( 229973 ) <greg@gksnetworks.com> on Thursday May 15, 2003 @11:26AM (#5964482) Homepage
    Russ complains a lot, but he never offers any solutions to the problem.
  • Maybe not... (Score:5, Insightful)

    by Uruk ( 4907 ) on Thursday May 15, 2003 @11:27AM (#5964487)
    Is it better? Here's a quote from the article:

    Let me put it this way. Since the inception of Windows Update millions of computers have been infected with Trojan's that are today allowing individuals to conduct en-masse DDoS attacks. Read that how you want, but its a fact. Here's another. Since the inception of Windows Update Microsoft has gone to producing patches almost every week. Few if any business' have found Microsoft trustworthy enough to permit automatic updates

    Many people will also tell you that a false positive is far worse than a false negative. For example, if Windows Update is misconfigured and tells you that you're up to date when you're really not, that's arguably worse than not being up to date and knowing that you're not up to date. (Because in the latter situation at least you can do something about it)

    Even if technically windows update is better than nothing, it's utterly pathetic that this is the best one of the richest and most powerful corporations on the planet can do for their customers.

  • Hm (Score:2, Insightful)

    by Anonymous Coward on Thursday May 15, 2003 @11:29AM (#5964514)
    Well, I'm sure Russ is a MS customer like everyone else, so it's MS' responsibility to fix the problem.

    I mean, if my headgasket in my GM blows, I don't go to Goodwrench with the schematics for a new design.
  • by J. J. Ramsey ( 658 ) on Thursday May 15, 2003 @11:32AM (#5964541) Homepage
    A "Windows Update" that doesn't update is worse than nothing, not better. Users are discouraged from further vigilance since they are fooled into thinking their systems are properly patched.
  • A different way? (Score:2, Insightful)

    by eonblueye ( 627191 ) * on Thursday May 15, 2003 @11:32AM (#5964544) Homepage
    If "windows update" is so bad, then how to expect everyday people to update/patch thier computer(s)?
    I think its a win/lose/lose type of situation.
  • Re:Trust? (Score:3, Insightful)

    by 1010011010 ( 53039 ) on Thursday May 15, 2003 @11:37AM (#5964595) Homepage
    they've yet to prove that their intentions are any other than making quality software.

    That's pretty funny.
  • Wrong (Score:2, Insightful)

    by TheCabal ( 215908 ) on Thursday May 15, 2003 @11:43AM (#5964662) Journal
    Don't like WU? Download SUS Server and be your own Windows Update. Impress your friends! Be the envy of everyone on the block!

    I can't think of a reason why any business or corp at this point is patching their Windows boxen directly from Windows Update. SUS make it a whole lot more controlled, reliable and faster.
  • by michaelggreer ( 612022 ) on Thursday May 15, 2003 @11:50AM (#5964728)
    I agree that administrators have this responsibility, but most computer users are not qualified admins, nor should they have to be. They cannot "conduct independent testing on-site." We require consumer OSes to be set-it-and-forget-it, so this criticism of MS is completely valid.
  • What alternative to Windows Update is there for people to use? You can't just not apply any updates. What is the choice that you speak of?
    Huh? Do you think that there are no alternatives to Windows Update? First, let's get the obvious ones (for slashdotters) out of the way: Linux, *BSD, Solaris, MacOS. But let's say you want to stay on Windows. So turn off Windows update, and replace Windows Media Player, Internet Explorer, Outlook/Outlook Express, Internet Information Server, and MS-SQL with Winamp, Mozilla, Mozilla, Apache, and MySQL (for example). Get yourself a subscription to MS Technet for your security updates. Use a third-party firewall (software or hardware). Subscribe to one of the many mailing lists out there that send out alerts on Windows vulnerabilities.

    Windows Update is supposed to be the "magic button" that makes your computer safe. But it doesn't work, and there are still lots of alternatives that will keep your computer safe. You just can't expect it to be as easy as pushing a button. That's why they pay Systems Administrators.
  • by bogie ( 31020 ) on Thursday May 15, 2003 @11:53AM (#5964752) Journal
    Isn't the security aspect, its the fact that MS hasn't gotten patching down yet. Patches from Microsoft CONSTANTLY slow down and screw up peoples computers. Every time you download a patch its like playing russian roulette.

    I just experienced this two days ago. My friend had me reinstall XP on his laptop so I started with a disc that had XP SP1 included. Now considering the huge list of known problems SP1 causes both he and myself were happy with how the system preformed after install. It seemed snappy and worked well. But then after I ran windows update and pulled down like 15 security updates, boom instant slowdown. I'd say its about 15-20% slower now. I might as well have pulled out his PIII900 and dropped in a PIII600. (And yes I specifically avoided 811493)

    When will MS stop having to reissue patches and stop slowing down and screwing up systems because they can't figure out how to make software with some decent security built in? I mean screw the security track record of other OS's, Microsoft is the one with 40 billion in the bank. They are also the ones who still don't get it and are just now telling their programmers that security needs to be considered when designing software. For about the fact that OSS exists, I still can't believe people can people can have faith in a company like that.
  • by vondo ( 303621 ) * on Thursday May 15, 2003 @11:54AM (#5964768)
    It's impossible not to "use" online voting, even if it is only an option. The product of online voting is a new government or new laws, so if it has problems, they effect you whether you actually vote online or not (or not at all).

    It's a completely different situation than not using NVidia.

  • by jez_f ( 605776 ) <jeremy@jeremyfrench.co.uk> on Thursday May 15, 2003 @11:55AM (#5964786) Homepage
    On the few occasions things break they are rarely of the "blow up the server" variety, and MORE OFTEN THAN NOT *grin* they are of the "when the stars align" kind that you HEAR about in bug reports but don't experience first hand.

    Lucky you.
    You can keep your faith in M$ but, speaking from experience, when you install a seemingly innocuous update then get BSOD on boot and have to rebuild the box from scratch you tend to loose your trust in them. It is probly half the reason that people don't patch and end up being hacked. So either way you loose.
  • by Anonymous Coward on Thursday May 15, 2003 @11:57AM (#5964802)
    That's it -- just dismiss all faults as MS bashing. See how much easier it is?
  • by mccalli ( 323026 ) on Thursday May 15, 2003 @11:58AM (#5964803) Homepage
    >>I find it [RHN] extremely irritating, because it requires seperate download and install steps.
    >I'm sorry, but the separation of download and install steps is a good idea.

    Two users who disagree. Solution would be to make the behaviour configurable then, yes?

    Cheers,
    Ian

  • by tshak ( 173364 ) on Thursday May 15, 2003 @12:02PM (#5964854) Homepage
    You mean that flaw that has little practical relevance and only occurs in isolated scenario's? Don't get me wrong, MS should fix all flaws, but how does this lose your trust? My XP Sp1 runs on around 150mb, but that's considering that I'm running an Enterprise DB (SqlServer 2000), IIS, at least one ASP.NET worker process, and a couple instances of IE.
  • Re:Maybe not... (Score:5, Insightful)

    by drinkypoo ( 153816 ) <drink@hyperlogos.org> on Thursday May 15, 2003 @12:06PM (#5964909) Homepage Journal
    So wait, microsoft is releasing more updates, this is bad? So maybe some of their updates have bugs, at least we get the fixes rapidly. It's not like this doesn't happen to, say, linux - a fix breaks something else and another patch comes out three days later.

    So if that's a problem with Windows Update, perhaps that is why many companies still don't trust Open Source. The only difference here is that we don't see the source code. I don't read the source anyway, so I'm not losing anything :P

  • by Anonymous Coward on Thursday May 15, 2003 @12:10PM (#5964957)
    Are you running that hard-drive on a promise controller? Cause they have a problem with SP3 unless you have the latest drivers [promise.com]. Always check driver compatibility before service packs. Hmm... somehow this thread turned into NT bugtraq itself.
  • Re:Summary (Score:2, Insightful)

    by Destoo ( 530123 ) <destooNO@SPAMgmail.com> on Thursday May 15, 2003 @12:11PM (#5964962) Homepage Journal
    They cannot be trusted.. but somehow the Soviet Russia jokes had it right.

    Trust is not about users trusting the corporation.

    The trust they want to implement is the other way around.

    Trusted computing involves the hardware running only "trusted" code, the screen showing only "trusted" documents. And knowing is half the battle.
  • by JordoCrouse ( 178999 ) on Thursday May 15, 2003 @12:20PM (#5965072) Homepage Journal
    Let us replace the "s" in Microsoft with a dollar sign, so that we remember that they are business who put profit first. Oh, how they do not fit in our idealized view of the world. They almost annoy as I sip on my Coke and adjust my Gap pants while I sit in my Herman-Miller chair.

    Thats funny, and probably true (and definately shouldn't have been modded to -1), but thats missing the point a bit.

    Its not a bad thing to be about profit, but it is a bad thing to put profit ahead of other concerns, especially when you are an industry leader. I think that the outcry would be the same way if Ford knew that a part was faulty, and they supressed the knowlege or downplayed it in the press. How about Boeing? Should either of these companies put their corporate reputation and profit ahead of safety? Of course not.

    Now, you might say, whatever - nobody ever died because of a Microsoft trojan horse. And I would agree - but they have caused hundreds of millions of dollars of damage and hundreds of thousands of wasted man hours - all beacuse they are unwilling to reveal themselves for what they are - human.

    First, they need to admit that they make the occasional mistake. Secondly, they need to make an easy and trustworthy way of recovering from those mistakes. And thirdly, they need to make it seem like they care more about about the security of their existing customers than trying to gain new ones. Its that easy.

  • by Anonymous Coward on Thursday May 15, 2003 @12:24PM (#5965122)
    That sounds to me more like a HARDWARE failure.
  • by mattdm ( 1931 ) on Thursday May 15, 2003 @12:32PM (#5965182) Homepage
    Providing the solution is not his job. In a more general sense, the people who are best suited to notice and complain about problems are by definition not the people who are best suited to fix them. This is why programmers don't do all of their own QA. "This is broken" is a completely legitimate thing to say, even if you're not going to be the one to fix it.
  • by vadim_t ( 324782 ) on Thursday May 15, 2003 @12:49PM (#5965336) Homepage
    Heh, same goes for you. Please explain how do you think he could give a solution to that. I mean, this isn't Open Source. He can't just download the tar.gz and make a patch for it. All he could do is perhaps call MS, *paying for the call*, and hope that somebody there fixes the problem.

    In Open Source, complaining like this might be frowned upon sometimes. After all, we understand that not every OSS developer works for IBM, and has time and resources to fix every bug.

    However, this is commercial software, and closed source to boot. Why should anybody solve Microsoft's problems? Isn't that why people pay for work being done for them in the first place? I think he's doing pretty much the best thing he can do, complaining in public. That's the one thing that seems to work pretty well to get the attention of large companies.
  • by ziriyab ( 549710 ) on Thursday May 15, 2003 @01:06PM (#5965534)
    So, if I notice you have a flat tire, but don't know how to fix it, I should keep my mouth shut?
  • Re:Maybe not... (Score:3, Insightful)

    by Pov ( 248300 ) on Thursday May 15, 2003 @01:12PM (#5965584)
    "Since the inception...", but it doesn't say "Because of..." and that's the difference. He's saying that Windows Update has failed to protect those computers, not that it caused a problem. It doesn't say how many millions of computers *didn't* get infected because of Windows Update, so it's not really a very fair argument. It only shows one side.

    I agree with you on the false positive scenario except that you've left out the most likely case without Windows Update, a nothing, because without Windows Update right there quick and easy to use, most people just wouldn't check at all.

    So I stand by my first statement. It's better than nothing.
  • Re:turn it off (Score:2, Insightful)

    by bigman2003 ( 671309 ) on Thursday May 15, 2003 @01:33PM (#5965775) Homepage
    I don't think he specified Windows 2000. Works on XP just fine. (I use it all the time)
  • Re:Maybe not... (Score:3, Insightful)

    by barc0001 ( 173002 ) on Thursday May 15, 2003 @01:40PM (#5965831)
    " So wait, microsoft is releasing more updates, this is bad? So maybe some of their updates have bugs, at least we get the fixes rapidly."

    Are you drunk?

    Picture this: You are the sysadmin at a company that runs its business all online, doing thousands of dollars of business per hour. You have a farm of 2000 servers running a custom back end for all your web services. The weekly patch comes down from Microsoft, it's time to update it. Again. Just like last week and the week before. You go down to the colocation facility late that evening, and apply the patches because that's the corporate policy. A few minutes after applying the patches you notice that your company's custom apps are acting.... odd. You call one of the programmers who works on the app, and he sees the same thing. Soon the whole team is conferenced in, and the consensus is that the patch screwed up the company's app. Rollback! goes the cry and hue!
    You attempt to rollback. It doesn't work.

    Fuck.

    Your options at this moment in time are:

    a) Try to patch your internal app to work around what Microsoft's wonderous patch has broken
    b) Spend the next 3 hours (per machine) reinstalling and restoring from the tape backups to be ready for the opening rush of business by the next morning. No, you are not getting paid extra for this.
    c) Clench your collective buttocks and see how badly this fault affects normal business, all the while praying the Overlords at Microsoft release a patch for this patch real soon.
    d) Pick up one of your servers, hurl it through the window in the colocation facility (on the 21st floor) and jump after it to the blissful eternal night where there is no Microsoft (that we know of).

    Answers to a couple of questions that might come up:

    Q: Why aren't you testing all of these in a test lab before going live?
    A: I don't know. Probably because we spent all our damn money we would normally use to hire a regression testing QA team on server licenses instead. Call me naive, but when we're paying multiple thousands of dollars per server on software licensing, is it too much to ask that the shit doesn't require us to hire a QA team to constantly regression test the effects of Microsoft's bug fixes? Since this is something we're trying to find the budget for, apparently it is too much to ask.

    Q: Why are you using Windows 2000?
    A: That's what our app is developed on. And continues to be. You don't throw out 15 man-years of coding on a whim to switch to Linux just because this year it's "finally" being seen as ready for the enterprise by enough people in our company. We have Linux boxes a go-go here. Just not doing this.

  • SP1 hogging memory (Score:3, Insightful)

    by Overly Critical Guy ( 663429 ) on Thursday May 15, 2003 @02:47PM (#5966430)
    You must be referring to that memory management scenario that doesn't affect everybody and therefore isn't listed as a Critical Update, requiring you to actually ask Microsoft for the patch because it is so uncommon.

    But to you, it suddenly becomes "XP SP1 hogged memory."

    Next.
  • Re:Trust? (Score:4, Insightful)

    by Cro Magnon ( 467622 ) on Thursday May 15, 2003 @04:29PM (#5967414) Homepage Journal
    I never trust anyone who says "Trust me".
  • Re:Trust? (Score:3, Insightful)

    by Malcontent ( 40834 ) on Thursday May 15, 2003 @05:18PM (#5967912)
    "I don't trust Microsoft in general, but in this case they've yet to prove that their intentions are any other than making quality software."

    What an odd thing to say. You don't trust them in general buy you trust them in this particular case? Why? That's like saying "I don't trust that convicted child molester living across from me but I'll let him babysit my kids because nobody has proven he will abuse MY kids".
  • Re:Maybe not... (Score:3, Insightful)

    by HiThere ( 15173 ) * <charleshixsn@ear ... .net minus punct> on Thursday May 15, 2003 @05:47PM (#5968183)
    But the real benefit is that you can run a stable version of the OS, and that will mean that applicable patches come less than once a month...usually much less.

    E.g., Red Hat may drop support of 6.2, but they don't force you to upgrade to 9.0... they don't even force you to upgrade. Now eventually some hole may be found, but in the intermediate time period you can have been studying OS versions that have been out for a year, looking for what seems most stable and appropriate for *your* needs. (For that matter, you could be using Debian stable. Or an appropriate BSD... I think Debian is the better choice, but your needs may well be different from mine.)
  • by Minna Kirai ( 624281 ) on Thursday May 15, 2003 @08:12PM (#5969102)
    given, of course there's nothing in their license agreement that prohibits it.

    I haven't checked lately, but it's very possible that there is something that prohibits it.

    Microsoft's patch files are, after all, their own copyrighted property. Redistribution would be illegal unless they've given you specific permission. (Many software companies explicitly deny this permission, even for products which are free to download. Sun's JDK for example)

    There are other legal pitfalls- reverse engineering, for example, might be required to check if a patch is needed. (You'd be writing code to check if there are security problems, which edges towards violating the DMCA or at least a EULA)

    And anyhow, while some Linux developers are happy to do free work for IBM, you're less likely to find open source coders willing to put in time to fix Microsoft's oversights- especially for a field as unglamorous and time-consuming as patch distribution.
  • Re:Maybe not... (Score:3, Insightful)

    by barc0001 ( 173002 ) on Friday May 16, 2003 @03:15AM (#5970696)
    By definition, the moment Microsoft posts a *PATCH* to fix a hole, it's *BROKEN*.

    Perhaps the SQL worm rings a bell? The discussion about that on Slashdot was full of guys like you saying "Geez, anyone who didn't patch right away and got hit by the worm deserves to be fired!"

    Patch when it's going well in case of the next wild exploit, or don't. Can't have it both ways.

    Personally, I'll go with the lesser evil and patch. Better that than be part of the mess when the shit hits the fan. Unless of course you like the idea of your boxes being part of a half million zombie machines that attack the DoD or something...

Ya'll hear about the geometer who went to the beach to catch some rays and became a tangent ?

Working...