Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Microsoft Software

Microsoft Designed UAC to Annoy Users 571

I Don't Believe in Imaginary Property writes "At the 2008 RSA security conference, Microsoft's David Cross was quoted as saying, 'The reason we put UAC into the platform was 'to annoy users. I'm serious.' The logic behind this statement is that it should encourage application vendors to eliminate as many unnecessary privilege escalations as possible by causing users to complain about all the UAC 'Cancel or Allow' prompts. Of course, they probably didn't expect that Microsoft would instead get most of the complaints for training users to ignore meaningless security warnings."
This discussion has been archived. No new comments can be posted.

Microsoft Designed UAC to Annoy Users

Comments Filter:
  • Of course... (Score:5, Insightful)

    by evanbd ( 210358 ) on Friday April 11, 2008 @09:14PM (#23043140)
    If they'd done this from the start, no one would be complaining. In Linux or UNIX, if a program wants elevated privileges, it requires user intervention. The result is that programs don't expect to have superuser privileges if they don't actually need them, and everyone is happy because the only things that have to be done as root are things you'd expect to require root access.
  • by starglider29a ( 719559 ) on Friday April 11, 2008 @09:16PM (#23043152)
    Mac OSX has prompts for authorization also. It doesn't bother me like Vista does. Why not? I didn't really catch it... until I realized that I could ignore the dialog box and get something done before allowing an update/reboot or whatever. Something that simple and the whole problem goes away!
  • Re:Of course... (Score:3, Insightful)

    by stubear ( 130454 ) on Friday April 11, 2008 @09:20PM (#23043178)
    They did do this from the start, they just didn't force developers to follow good coding practises when writing apps for the NT platform.
  • by corsec67 ( 627446 ) on Friday April 11, 2008 @09:21PM (#23043192) Homepage Journal
    Yep, the proper way to do this would be to have UAC like crazy when running an app in debug/test mode, and leave the customers alone. If they want to put pressure on the 3rd party developers, then they should do that directly, and not mess with everyone in hopes that the pressure would kind of go back to the 3rd party developers.

    That assumes that 3rd party developers care at all about the customer experience, which if you look at Norton/McAfee, is very dubious.

    And then give the customers something reasonable, like how sudo works on *nix.
  • by khasim ( 1285 ) <brandioch.conner@gmail.com> on Friday April 11, 2008 @09:27PM (#23043220)
    You cannot force someone else to follow a particular coding practice when your coders do not do so themselves.
  • by Deviant ( 1501 ) on Friday April 11, 2008 @09:28PM (#23043226)
    I think there is going to be quite a bit of criticism of MS for this but basically you see UAC prompts where you would have to do a su or sudo to get the job done as a starndard user in Linux/Unix. The reason you don't have to do those all the time in Linux is that the application writers do not write their apps to require constant root priviledge escalations. There is one app that I couldn't get working properly in Fedora 8 without running it with a sudo - Nero Linux - and it annoyed me quite a bit.

    MS needs to drag both its users and those who write windows applications along to the limited security model we all need each other to be using for the good of the internet. It was always going to be painful.

    The one criticism that I have of the system/model in practice is the start menu - and that is all MS! I try to organize my start menu and I see several dialogs. I would be much more on-board with only one Cancel or Allow for an operation like that...
  • by unlametheweak ( 1102159 ) on Friday April 11, 2008 @09:31PM (#23043248)
    No they didn't design UAC to annoy users. This was a crass statement made by a Microsoft employee. No company would design something to annoy users. This was a poor use of self-deprecating rhetoric that will be exploited to the extreme. It's a dumb statement for a Microsoftie to make, and really dumb for the media to exploit.

    "Stupid is as stupid does", somebody once said.
  • by danielsfca2 ( 696792 ) on Friday April 11, 2008 @09:32PM (#23043254) Journal
    I'm not MS's biggest fan. But this isn't the worst strategy ever.

    It's actually pretty logical that if you make running these retarded apps annoying, you can force the vendors to fix them.

    But MS faces a big obstacle in that strategy--the fact that moving back to XP fixes the problem as well, from the user's perspective. And of course, the fact that doing so also makes today's computers 3x more responsive.

    It's a shame... I would love a world where Vista caught on but UAC didn't have to pop up ever unless something truly administrator-ish were really going on. Then all my users could be Users.
  • by dpbsmith ( 263124 ) on Friday April 11, 2008 @09:34PM (#23043268) Homepage
    This approach could have worked. But if they really meant for it to work, then developers would have been required to embed usable contact information in the application. When the UAC prompt came up it would explain that this was a result of an action taken by the application, and that if it seemed unnecessary to you, you should click a button and send feedback to the developer.

    It would also identify and tag the particular circumstances so that there could be a option, "don't warn me about this again."

    This latter option would have been particularly useful during the beta phase.

    After a couple of years, Microsoft might then assume that developers had been given adequate warning and adequate feedback, and the option to ignore warnings could have been retracted.

    What Microsoft did doesn't sound as if they serously wanted the approach to work. They just wanted to be able to say that users "didn't want" security, just the way Detroit said for decades that car buyers "didn't want" safety.

  • by Anonymous Coward on Friday April 11, 2008 @09:34PM (#23043276)
    Not that I disagree, and I realize bashing Vista is a quick way to feel like you fit in, but how else are you going to pressure third party vendors to not write crappy applications that need admin privileges for stupid reasons? Every Win32 program in existence seems to think it needs to put its settings into an INI file located in the program files directory.

    A big reason for Windows sucking is the third party applications. Look at what XP did with the tray: introduced this little arrow that hides infrequently used icons because every marketing assmunch realized they could brand the user's computer and most of the users wouldn't be able to do anything about it. Meanwhile, it became common to see half the task bar being eaten by the tray and 25 stupid icons just sitting there. (Sun doing that with Java says a lot about the platform.) It is the tragedy of the commons playing out on the user's desktop, and the users are the ones losing. Meanwhile, nobody seems to care, it is business as usual.

    With regard to UAC, I'm curious to what you think is a better solution. Not that I like the current one, but I rate it as the least-worst option that I can think of, other than virtualization.
  • by Anonymous Coward on Friday April 11, 2008 @09:37PM (#23043286)
    I'm not a user of any version of Windows, but out of curiosity I glanced at the instructions for disabling UAC, and noticed something striking:

    Turning off UAC doesn't involve a UAC-mediated privilege elevation.

    WTF? Even if UAC has the narrow goal of guarding against malware rather than a malicious user sitting at the console, doesn't this completely defeat the purpose?

    (It seems that it does require a reboot, but that's hardly a barrier. Some piece of malware can just silently flip a registry key to turn off UAC, and then wait until the next time you reboot to finish 0wning you.)

  • So (Score:2, Insightful)

    by jav1231 ( 539129 ) on Friday April 11, 2008 @09:46PM (#23043336)
    Wow! Microsoft thinks of its users as pawns in a pissing match between them and developers? Why not? They think of them as pawns in their pissing match with the DOJ, their vendors, the conquest of the world... Fuck you, Microsoft!
  • by a_generic_name ( 1242610 ) on Friday April 11, 2008 @09:58PM (#23043398)
    Why not just tell the application vendors to "eliminate as many unnecessary privilege escalations as possible"? It would be an easier way to solve the problem, plus less people would hate their operating system.
  • by pavera ( 320634 ) on Friday April 11, 2008 @09:59PM (#23043402) Homepage Journal
    I'm sad to hear that. This was the most logical explanation of UAC's existence I have heard. If you are correct that means MS actually had a different object/goal in mind for UAC, that they actually thought it would improve security, that they actually thought that it WASN'T annoying, that this thing got passed off on multiple levels throughout the dev process as being a) useful, b) a desirable feature, c) accomplished a purpose.

    UAC does none of those things in the real world. It is a horrible security mechanism, it slows down every day usage of most PCs, it causes endless annoyance to users. If this feature was designed solely for the purpose of alerting 3rd party devs to the numerous unnecessary privilege escalations they are using, it almost would be worth it/make sense. If not, it is proof that MS has absolutely no clue what users want, need, or what is a good feature.

  • by Anonymous Coward on Friday April 11, 2008 @09:59PM (#23043410)

    Remembering your sudo privileges for a while is a huge thing that UAC lacks. MS's UAC could easily be considered a satire of sudo.
    So, I'm a malware developer - My software sits in the background and waits for you to do something that requires UAC. Then after a few moments, I use the remembered UAC authorization to install my spyware.

  • by Animats ( 122034 ) on Friday April 11, 2008 @10:01PM (#23043418) Homepage

    Microsoft is right. Most applications should never have administrator privileges, not even during installation. It's way past time to tighten the screws.

  • by Todd Knarr ( 15451 ) on Friday April 11, 2008 @10:02PM (#23043426) Homepage

    The basic idea's sound. The problem is that, given the implementation, users view the problem as being UAC and/or Vista, not the apps. After all, the apps work just fine if you turn those annoying dialogs off or go back to XP. If the users don't view the app as the cause of the problem, they won't pressure the app vendor to do anything about it. Idea fails.

    I prefer the Unix approach. The OS doesn't pop up any dialog, or offer the user any choice. If an app does something it doesn't have privileges for, it gets an ENOPRIV returned from that call and isn't allowed to do that. How the app handles it from there is up to the app, but there's no easy way to make the errors go away at the system level (most modern Unixes are set up to make it inconvenient to log in or run programs as root, and only root can install a program setuid-root).

  • by Anonymous Coward on Friday April 11, 2008 @10:10PM (#23043478)

    c:\progra~1\ would be the workaround there, fyi

    Dos programs used to handle it like that with (and my memory is a bit fuzzy here) FAT32 methinks. The legacy is still in there even though the modern cmd.exe can handle long names in quotes. Now, if only they could learn how to properly escape special characters...

    If you're stuck with a browse box and no option to type in the path manually I guess you're pretty much out of luck...I'd kill for decent symbolic linking in Windows, shortcuts are like a bad joke

  • Re:Of course... (Score:5, Insightful)

    by CyberLife ( 63954 ) on Friday April 11, 2008 @10:11PM (#23043488)
    To extend your point, the reason UNIX systems don't have UAC-style privilege elevation is due to its history. UNIX came into being, and was largely developed, during an era in which virtually all computers were large, multi-user systems that sat in a back room. An administrator would have to be sitting at a terminal 24/7 just in case somebody came knocking -- quite an unreasonable expectation. As a result, programmers had to get used to the idea of restricted abilities.

    With the desktop computer model, the situation is quite different. Classically-speaking, the user is sitting right at the machine and is the only one using it. They are the administrator as well as the user. There is no expectation of security since nobody else is involved. Windows derives much of its architecture and style from this method of computing.

    Modern-day computing is rapidly moving back toward the shared-computer model. This is occurring somewhat on the front-end (e.g. individual user accounts on a desktop machine for different users), but mostly it's happening on the back-end. Internet servers are very reminiscent of the mainframe-era multi-user model. This is why UNIX is such a good fit for such tasks -- it was designed specifically for it, whereas Windows has had to play catch-up. UAC is a good example of single-user thinking applied to a multi-user problem.
  • by Anonymous Coward on Friday April 11, 2008 @10:14PM (#23043508)
    Because it's much easier to sit on Slashdot and make up bullshit and lies about Microsoft because it's trendy to hate them.
  • by tepples ( 727027 ) <tepplesNO@SPAMgmail.com> on Friday April 11, 2008 @10:14PM (#23043512) Homepage Journal

    Why not just tell the application vendors to "eliminate as many unnecessary privilege escalations as possible"?
    Because a decade of experience starting with Windows 95 shows that application vendors don't listen.
  • by Mr2001 ( 90979 ) on Friday April 11, 2008 @10:14PM (#23043514) Homepage Journal
    If some blank paper is in the printer, and a program writes to it without authorization from the owner of the paper, the paper becomes unusable.

    But do you have to enter your root password every time you print? I think not.
  • by CastrTroy ( 595695 ) on Friday April 11, 2008 @10:32PM (#23043602)
    Doesn't matter, I should only get 1 prompt, not 3.
  • by repka ( 1102731 ) on Friday April 11, 2008 @10:37PM (#23043628)
    Any particular examples? Application designed following guidelines of win95 (e.g. Office) will work properly in Vista and will not even require folder/registry virtualization (btw, I assume a lot of effort went into this feature to minimize UAC prompts and it for some reason is rarely mentioned among usual rants about them).

    I consider the opposite: Microsoft spends too much effort for app-compat. Would Win2k have defaulted users to be "restricted", while win98/ME were viable alternatives (i.e. MS could still cash in on their sale) for compatibility, this effort could have been much more successful and, nowadays, when you try to get Intuit Quickbooks to start under limited user (you don't have much choice in college setting), you didn't have to give write access to whole CLASSES_ROOT registry branch (don't get me started on this...).

    So in short, yes, I believe UAC is a great compromise, which forces lousy coders to reconsider their approach to the stuff they ship.
  • by SendBot ( 29932 ) on Friday April 11, 2008 @10:37PM (#23043630) Homepage Journal

    No company would design something to annoy users.
    I've got two words for you: "alarm clock"
  • by pablomme ( 1270790 ) on Friday April 11, 2008 @10:40PM (#23043642)

    UAC is not a bad idea. True, they could have gone the gksudo way and allow a window of time before asking for permission again. And then they could ask for a password instead of getting people in the habit of clicking away past warning windows. But still, it's not a bad thing.

    They also had to stop programs from storing settings and user stuff under the write-restricted "Program Files" folder.

    Now, annoying users intentionally to exert pressure on software vendors is just twisted.

    UNIX/Linux users may want to have a little thought about what things would be like without the SUID facility ('ping', anyone?), and, on the other hand, the security implications of SUID. I was shocked when I read the example at page 249 of the UNIX Haters' Handbook, which illustrates the problem of blindly trusting your PATH with a simple example in which you can trick your system administrator into providing you with a root shell binary. Tried it. It works.

    Not that this has prevented me from ditching Windows Vista in favour of Ubuntu on my laptop (desktop to follow when Ubuntu 8.04 is released).

  • by JustNiz ( 692889 ) on Friday April 11, 2008 @11:05PM (#23043782)
    UAC is totally ineffective as as its one of the first things nearly everyone turns off because its so damned annoying.
  • Re:Of course... (Score:5, Insightful)

    by Anpheus ( 908711 ) on Friday April 11, 2008 @11:10PM (#23043810)
    Last I remember, registering an account on Slashdot didn't give me a user account on the Linux server.

    UNIX being "such a good fit for such tasks" is completely off-base and irrelevant to the discussion. The software that runs on the OS determines my interactions, and the "privileges" being imparted to registered users, such as allowing me to post a message and have my account name appear above it, are not at all imparted by the multi-user sensibilities of the OS the web server is running off of.

    I guarantee Slashdot could run off Windows or Linux boxes and you or I wouldn't know the difference.
  • by nmb3000 ( 741169 ) on Friday April 11, 2008 @11:13PM (#23043826) Journal
    You cannot force someone else to follow a particular coding practice when your coders do not do so themselves.

    While what you said is true, it can be simplified: You cannot force someone else to follow a particular coding practice.

    For a variety of reasons Windows users grew accustomed to running as full administrators. Large vendors (aka customers) made assumptions when developing for Windows. These assumptions cause problems for a Windows end user (aka the customer) trying to use the large vendor's (aka the other customer's) program. If the user calls the vendor the answer is "run as admin". This conflict is only bad for Microsoft because the end user will put usability over security every day and the large vendor may get sick of dealing with "Windows bugs" and choose a different OS to develop (develop, develop, develop) for.

    Microsoft was really damned if they did and damned if they didn't. It may well be their own fault (due to the original design of DOS) but unless you have a time machine nobody can change that. It seems to me that, while I find UAC to be annoying as hell, they probably did the right thing. By making it pervasive it will help get the Windows security paradigm changed faster than if it was just a gentle suggestion. At the very least they are trying to put it back on the software vendors to focus on security when creating their products--something good for everybody.
  • by morgan_greywolf ( 835522 ) * on Friday April 11, 2008 @11:18PM (#23043850) Homepage Journal
    The bottom line is that Microsoft here sounds like a drug addict blaming his problems on everybody else. They are essentially blaming application vendors for their security fuckups. Here's all you, as a logical person, need to know:

    1) Who is the purveyor of the most popular development tools for use on Windows? Microsoft.
    2) Who is the purveyor of the most popular development training materials for use by budding Windows developers? Microsoft.
    3) Who certifies Microsoft Certified Developers? Duh. Microsoft.
    4) Who is supposed to be leading their ISVs by example? Microsoft.
    5) What's the common denominator here? Microsoft.

    Microsoft is responsible for making their platform insecure. They are responsible for training developers to use unnecessary security elevations. And they do it themselves.

    If Microsoft, like a drug addict, would just admit that their past and present security failings are their own fault, they would be one step closer to recovery.
  • by Dogun ( 7502 ) on Friday April 11, 2008 @11:20PM (#23043854) Homepage
    The problem is that the UAC prompt also has to work with legacy applications which don't have contact information. :)

    'don't warn me about this again' - presuming an app was trusted once at install-time, it's just going to go write the 'oh, the user allowed me permanantly, it's ok' setting wherever it turns out that is stored. Then they have no incentive to fix their design issues.

    The problem isn't UAC, it's the fact that windows developers aren't writing for the standard user.
  • by Anonymous Coward on Friday April 11, 2008 @11:20PM (#23043858)
    I doubt it'll happen, though. It seems like the most widely-disseminated "Vista tweak" is how to turn off UAC. Regular users (including your average Windowsland programmer and others who might consider themselves technologically sophisticated) don't see UAC as a feature, they see it as a bug.
  • by guruevi ( 827432 ) on Friday April 11, 2008 @11:22PM (#23043872)
    I have been asked and wondering why Microsoft has such a bad track record in security and user access control especially since recent Windows have been built on NT which comes from OS/2 and VMX. According to me it's fairly simple: group permissions. Look at a default Linux/Unix-style installation, you have about 20 groups to start out with. If you're a desktop user, usually you're a member of audio, video, games, cdrom and user. On a Windows machine you're either a User or an Administrator. The way the Linux kernel and it's modules are built, if you need direct access to hardware, you can either be root (not good) or you can access it through it's /dev entry which has group permissions.

    So if you want to play music, you can access the hardware (albeit through a kernel module) by making yourself member of the group audio. In Windows however, if you need direct access, you can either use DirectX or a process (daemon) or become an Administrator so you can get to the kernel. There is no group Audio that has only access to the Audio-part of the kernel. As soon as you need direct access for real-time anything, you can't really add yourself to any group to do so.

    This of course goes way back before desktops were running NT versions (like 2000 or XP). Before, Windows was running on top of DOS, developers could just code directly into the hardware (just load dos4gw), there is no access control in DOS. DOS was also not meant to be running any services or be connected to a network that's where the whole thing with virusses got started, anything that was running could simply request a hook into the BIOS, under the hood, protected memory was regulated with emm386 while Windows 95-ME all used the faster, less secure himem.sys. Microsoft merged together the NT and DOS and made it into 2000 and XP. There were no extra permissions added for desktop users, the pure server model was coded around to allow for desktop speed and real-time access to hardware, never giving any thought that actually running all services that hook into hardware as Administrator would give problems.
  • by rastoboy29 ( 807168 ) on Friday April 11, 2008 @11:28PM (#23043904) Homepage
    Worse, I think they  just did it as a CYA strategy, as opposed to trying to find a real solution.  It's an attitude all too prevalent in corporate America.

    Having spent most of my professional life at small companies, when I started working at larger ones in the last few years I was appalled, disgusted, and amazed to see that MOST of the employees spent their time worrying only about CYA, as opposed to doing a good job.

    What a bunch of fucking pussies.
  • by Silver Gryphon ( 928672 ) on Saturday April 12, 2008 @12:01AM (#23044056)
    Interestingly enough, Visual Studio 2005 and 2008 under Vista can't access a project stored in a local IIS website unless running as admin. You're explicitly prompted to run the entire session under Administrator account. The alternative is to change your project storage to disk instead of IIS -- maybe not a bad idea, but contradicting their new HTTP based projects of 2002/2003 (as Web services were promoted then too, now web services are actively discouraged for security and scalability reasons. Lessons learned, I guess.)

    Clicking "Run as administrator" is easier and just reinforces the "click through all these dialogs" mentality. I think MS went too far in some of the dialogs; their new push to give detailed explanations is counterproductive, as I don't want to read an essay at that particular time.

    http://msdn2.microsoft.com/en-us/library/aa964620(VS.80).aspx [microsoft.com]

    Still, I agree -- running as admin is dangerous; Linux and Unix had a great approach from their beginnings. Windows needs to catch up to that, and it'll involve a massive effort on the part of the users and developers. Having Ubuntu Linux prompt similar to UAC helps reinforce the principle of running with lowered privileges, and shows that Windows isn't any more evil now that it has UAC, it's just that things were so non-secure before that it's hard as hell to conform to the new guidelines.

  • tag:nagware (Score:5, Insightful)

    by Jurily ( 900488 ) <jurily&gmail,com> on Saturday April 12, 2008 @12:07AM (#23044094)
    What they didn't anticipate though, is people screening out the warnings. Yes, it's important for you, the developer. No, it's not important for the user, who only wants to Get Stuff Done (tm).

    If the same yes/no question pops up every 10 minutes, don't expect a different answer when it says "Do you want to install spyware, adware, a couple of trojans, and [whatever they actually wanted to install]?".

    Remember, users don't read. Not because they're incapable, they have more important things to do.
  • Re:Of course... (Score:5, Insightful)

    by Anonymous Coward on Saturday April 12, 2008 @12:37AM (#23044222)
    That's about it in a nutshell, but it is a little more complicated than that.

    UNIX legacy lies in Multics which was designed to work along side big iron hardware with hierarchical protection domains that provide the mechanism to restrict the access of a process to resources. UNIX, being directly derived from Multics, benefitted from this lineage by having such robust security throughout it's design at the expense of not being able to run on commodity hardware.

    Windows's legacy lies in DOS, which was designed to run on commodity hardware that completely lacked these capabilities. Without hierarchical protection rings the OS had absolutely no ability to enforce any form of resource management. Even if there were enough hardware resources to allow for the OS to have more than a few resident functions in memory, every application still had full and complete control over all of the hardware, and a lot of them made the most of it for performance reasons. It didn't matter how many users there were; security was simply not an option.

    When Windows NT was being developed the correct choice was made to completely isolate the older processes to an emulator. Unfortunately this meant that any process written within the last 5 years ran like garbage. Towards the end of the 16-bit era programmers got very creative in overcoming both the limitations of DOS and squeezing every last cycle out of the hardware. This made emulation exceedingly difficult and prone to failure. Companies were sticking to Windows 3.x rather than jumping to NT because of the failure to support legacy applications perfectly.

    When Microsoft developed Windows 95 they reversed that decision and kept the 16-bit DOS core, both for compatibility with legacy applications (particularly games), development time and performance. This enabled the large DOS library to work without a hitch on Windows 95 at the sacrifice of locking down the security model. Without that programmers were able to and continued to shirk the basic security guidelines set forth by Microsoft and write applications that required full access, if not direct kernel access.

    Microsoft is trying to have their cake and eat it too. UAC is three things:

    First, it tries to prepare the user for life as a non-admin. Everyone is used to being admin, and if being admin means not having to think about security then people will continue to be admin. However, if admin isn't really admin unless you really mean it, then admin feels like a normal user. The disadvantage to this is that users will become jaded to the prompt, particularly at this stage when it's fairly prevalent.

    Second, it does force the application developers to make correct decisions and follow the written guidelines. An application that does so will never, ever see a UAC prompt and will run perfectly fine under UAC, and under a normal user context. These guidelines have been a part of the Windows Logo process since Windows NT was first released. Hopefully, as more application developers catch on the UAC prompts will become significantly more infrequent, and applications that require escalation for specific tasks will follow the procedures to inform the user of this fast and request escalation internally only for that task.

    Third, it tries to silently handle programs that do stupid things by "virtualizing" their actions. The vast majority of applications that require administrative access only do so because they try to write either to the %PROGRAMFILES% directory or the HKEY_LOCAL_MACHINE hive of the registry. So, with UAC enabled, attempts to write to these locations are silently redirected to the user's profile. The task succeeds, the application is happy and the user is happy.

    You could argue that the route Apple took was better. I wouldn't disagree, but these kinds of business decisions are complex. Apple basically gets to say "fuck you" to everyone every ten years and they largely live with it. I'm not sure the people would be so forgiving with Microsoft, even if doi
  • Well, links in BBCode are a bit easier and quicker to write than HTML.
  • by VGPowerlord ( 621254 ) on Saturday April 12, 2008 @01:24AM (#23044348)
    While you can blame Microsoft for training issues, Microsoft's own products work just fine as Limited Users.
  • by p0tat03 ( 985078 ) on Saturday April 12, 2008 @02:43AM (#23044624)
    I run Mac OS X too. The reason why it doesn't bug you that much is because it... actually doesn't bug you that much. The only times you'll ever be asked to sudo is when installing or patching things. There are very few times when doing my normal everyday things that I've ever been asked to sudo.
  • Re:Of course... (Score:5, Insightful)

    by Chris Colohan ( 29716 ) on Saturday April 12, 2008 @02:51AM (#23044654) Homepage
    My first PC (replaced my old Amiga...) was a 486DX/33 with 8MB of RAM. Since I was a geek, I installed OS/2 2.0, Windows 3.1, and SLS Linux 0.95.3. (Aside: my mouse didn't work under Linux. So I kludged the driver to make it work, and submitted the patch to Linus. Now my name is in the kernel, on a driver for a mouse that nobody has made since 1992...)

    Windows was snappy and fast. OS/2 lumbered along (it spent a lot of time swapping, since 8MB was not really enough for it). Linux was zippy fast, unless you started X -- X worked, but was pretty darn slow.

    Compared to the Sun workstations at school which each had 10 NCD X-terminals slaved to them, Linux/X on this machine was fast. But compared to everything else, it was slooooow.
  • Because even if it works 'fine' for you, there is a better option out there, and by using windows, you are forced to pay, and are locked in. I don't know about everyone else, but I have a problem with the fact everyone in the world is paying for something which is worse than something they could get for free (and if everyone did run it, it'd become better in every way overnight (hardware manufacturers making drivers, etc...).
  • UAC is crap (Score:5, Insightful)

    by TheLink ( 130905 ) on Saturday April 12, 2008 @07:30AM (#23045690) Journal
    UAC is actually very bad from a security viewpoint. By annoying users more than necessary (more later), all it does it makes most users turn UAC off.

    From a cynical POV, I think all UAC is for is to allow Microsoft to blame users for security problems (ah you turned UAC off - so it's YOUR fault).

    If Microsoft was really interested in security they would have done more and better sandboxing of applications.

    My suggestion is to have a manageable number of default templates for sandboxing applications. If the app is unsigned by a user-trusted entity, the user gets a pop up which tells the user what type of sandbox the application wants to run in.

    It would be far easier to train Joe Schmoe to not run a "flash game" which asks for "Full User Privileges" or even "Full System Privileges" (with all the scary warnings etc) and to only run a "flash game" that asks for a "Guest Game" sandbox. After all there is no need for most legitimate flash games to access "My Documents" or your web browser bookmarks, or even your microphone/webcam.

    The idea is even if a program wanted to do something nasty, if it is running in a sandbox, it can't, and if a program requests an unusual sandbox so that it can do something nasty, it is easier for a user to know something strange is going on.

    This would also be a lot less work than UAC. Don't need to make 10 decisions one after another when you run the app.

    There could be custom sandbox templates that are validated and signed by a mutually trusted authority. So that new apps that require fancy privileges can run in fancy sandboxes without annoying prompts that bother Joe Schmoe.

    As for Linux and OSX, they aren't really more secure than Windows, with both these OSes if Joe Schmoe is about to run something new, he doesn't even know what the program is really going to do till he runs it. It is like expecting Joe Schmoe to solve the halting problem and without him being able to read the source code either - "Is this program going to halt, or is it going to take over my computer?". So my suggestions are just as applicable to them.
  • by Anonymous Coward on Saturday April 12, 2008 @07:37AM (#23045702)
    OK, and what exactly stops me from simply doing my very own dialog that looks exactly like UAC? What exactly stops me from redirecting the call for issuing an UAC prompt to my dialog instead?

    Right: nothing. Almost.

    One thing, disabled by default, is the SAS (you known, Ctrl+Alt+Del). If enabled, it requires the user to press it, which only the UAC dialog is able to ignore. Almost, since it doesn't matter - do your dialog in DirectX or OpenGL with a transparent surface, and you'll still be able to force your dialog to always be on the top.

    Also, some third party components like VMware allow you to trap SAS on behalf of the system, or your malware.

    Once having aqquired the admin password, I can use CreateProcessAsTokenW() to elevate to admin privileges.

    What comes then is a matter of configuration: By default I can do anything I want, since once I'm running with admin rights while being logged in as a user UAC thinks that I've already elevated and doesn't ask any more.
    But even if it is configured to ask again, there are some actions which don't trigger requests, for example the usage of the SE_BACKUPRESTORE_PRIVILEGE - which allows me to write to the raw disk as well as override all ACLs; that is a complete compromise.

    The cause are two big problems:
    - SAS doesn't worl because DirectX and OpenGL are considered as too privileged.
    - The UAC provides no means to authenticate itself. Why not letting a user choose a picture at install time which is then stored at a safe location with only NT-AUTHORIYT\SYSTEM being able to read, such that only the UAC dialog is able to present it to the user?
  • by Anonymous Coward on Saturday April 12, 2008 @07:49AM (#23045746)
    "Do what I say, not what I do"

    Sounds perfectly reasonable to me.

    e.g.
    "Go to school"
    "Don't drive the car"
    "Don't try to have sex with mom"
    "Don't do that or you'll end up like me"

    Tons of different rules for children and adults. Welcome to the real world. Minors aren't the same as adults.
  • Re:Of course... (Score:3, Insightful)

    by yuna49 ( 905461 ) on Saturday April 12, 2008 @08:35AM (#23045952)
    Nor was Windows designed to be multi-user in the first place, either. It's roots were in DOS - one computer, one user. Even running with Netware, the workstations were still fundamentally single-user systems. The NOS controlled access to storage and peripherals.

    Having a GUI interface had nothing to do it.

  • by Opportunist ( 166417 ) on Saturday April 12, 2008 @10:00AM (#23046362)
    What you mention is exactly what is desired.

    UAC nags you for every little piece of rubbish. 99.999% of those requests are ok. Well, not ok, if programmers would not require godmode for every stupid little setup change... but they're not harmful. It's the other 0.001% that matter.

    Now, the average user turns off UAC. For a simple reason: Imagine some tool you don't know much besides operating it asks you "The futzgrabber in the argamajig wants to mirfl. Cancel or allow?" What do you do? After some try and error, you learn that the thing does what you want when you click allow. You start wondering why the heck you have to click allow. And the next logic step is to turn the pointless thing off altogether.

    And here's where the tool works as designed. Because if you get infected, MS can just shrug and say "Hey, we gave you the tool to avoid it. See, UAC would have told you this wants to do something bad, but you turned UAC off. Your fault."

    Instead of finding a way to give the user a secure system, MS just shifted the blame. You can't blame Windows now anymore if you get infected. It has a tool that would have told you you're going to get infected, but you turned it off. Shift the blame for the infection to the user, away from the system. That's all UAC is about.
  • by Crayon Kid ( 700279 ) on Saturday April 12, 2008 @01:10PM (#23047586)

    Now, the average user turns off UAC. For a simple reason: Imagine some tool you don't know much besides operating it asks you "The futzgrabber in the argamajig wants to mirfl. Cancel or allow?"
    Giving the users some credit (ie. "it helps protect the computer"), I think the reason is simpler than that. Removing UAC is the most obvious solution to the problem (extreme UAC annoyance).

    Let me offer another example: if Linda from Accounting makes for 75% of my daily tech support problems, the most obvious solution for that is not replacing all 2nd floor printers, rewiring Accounting and reinstalling her Windows. It's eliminating Linda.
  • by Crayon Kid ( 700279 ) on Saturday April 12, 2008 @01:15PM (#23047624)
    OK, so it can be done, but let's not get carried away and call it "easy". :)
  • by Opportunist ( 166417 ) on Saturday April 12, 2008 @06:02PM (#23049494)
    But when you tell that to her boss, who is shagging her on a weekly base, it's you who gets eliminated and replaced by someone who stomachs her calls, so your boss continues to get laid.

    Be wary when trying to eliminate someone who is obviously a moron, chances are good that he or she still has his or her job for a very good, non-work related reason.
  • by Allador ( 537449 ) on Saturday April 12, 2008 @06:28PM (#23049636)

    UAC nags you for every little piece of rubbish. 99.999% of those requests are ok.
    By definition, if UAC is nagging you, then its not OK. Either you're purposefully doing something that prompts the system (ie, everything is OK), or some software you're using is doing something bad. Writing user preferences in C:\Program Files\DumbAssApp\prefs.ini is not okay.

    The problem is that the bulk of the 3rd party software developers in the ecosystem use practices that violate the published guidelines and best-practices for the platform, and often use techniques that are indistinguishable from malware.

    Instead of finding a way to give the user a secure system, MS just shifted the blame.
    You kind of argued yourself in a circle there.

    Alot of hand waving about how bad UAC is, it maligns the users, etc etc. And then 'something should be done about it', but no substantive suggestions along those lines.

    Propose a valid alternative that doesnt involve time travel, and your argument might have some weight.

    And whats this stuff about 'blame'? There's no blame, just costs. How would you suggest Microsoft makes incompetent 3rd party developers pay the cost for their sloppy code writing without involving the user in any way?

    What MS has done here is to force the costs of sloppy coding by 3rd party developers to become visible, whereas prior to UAC, if you didnt run as non-admin, you never saw those costs. They were invisibile. MS just made them visible. So now users are bearing the costs of sloppy coding by 3rd party developers, in the hope that the pressure will then be passed on to these devs.

    Unfortunately, MS doesnt have any direct relationship with these vendors, there's no place to have leverage, to make the 3rd party devs do 'the right thing'.

    Overall, it sounds to me like you're just posting here to join in the 'look how much Micro$oft is teh suck' bandwagon, but without actually contributing anything to the conversation. Suggest an alternative thats more substantive than 'something should be done'.

Get hold of portable property. -- Charles Dickens, "Great Expectations"

Working...