Windows 8 Changes Host File Blocking 1030
An anonymous reader writes "Windows 8 has been confirmed to not only ignore, but also modify the hosts file. As soon as a website that should be blocked is accessed, the corresponding entry in the hosts file is removed, even if the hosts file is read-only. The hosts file is a popular, cross-platform way of blocking access to certain domains, such as ad-serving websites."
Another reason... (Score:5, Insightful)
Re:Another reason... (Score:5, Insightful)
Microsoft gives you one more reason to switch to Mac OSX or Ubuntu.
Re:Another reason... (Score:4, Insightful)
I completely agree. This is the nail in the Windows coffin for me.
Re:Another reason... (Score:5, Insightful)
I completely agree. This is the nail in the Windows coffin for me.
If you are an enterprise IT manager this is your dream come true. You're not seeing this from the angle Microsoft is, they count on enterprise income more than they do home users.
Re:Another reason... (Score:5, Interesting)
Why is that a dream come true for an enterprise IT manager? You *want* employees to be on facebook? Or are you saying that crazy behavior on the windows platform ensures your job security?
Re:Another reason... (Score:5, Informative)
Enterprise customers will block it at using DNS or using Group Policy, not the hosts file.
Re: (Score:3, Insightful)
Yes but my point is, I will now have to use a firewall to keep Adobe CS_ from phoning home.
Re: (Score:3)
Re:Another reason... (Score:5, Informative)
Have you seen the firewall that comes with the Windows 7 generation? It's no iptables, but it can do the job now.
Re:Another reason... (Score:5, Insightful)
I think what he wants is a firewall system that explicitly cannot be controlled by the operating system without his approval. So if he blocks something he can be assured it will stay blocked regardless of what kind of backroom deals Microsoft makes.
The most annoying thing about these latest versions of Windows is that there appears to be this new class of user with control that supersedes than the owner of the hardware.
Comment removed (Score:5, Interesting)
Re:Another reason... (Score:5, Insightful)
It is inherentily impossible to build something into an OS which cannot be controller by that OS itself. If you want these really secure firewalls, they should be on a separate appliance and all your traffic should be routed through them.
Re:Another reason... (Score:5, Insightful)
You seem to be a bit confused about how Windows works.
If it is your PC and you are the administrator then yes, you have full control over it. You can set any firewall rules you want and they won't be overwritten by "backroom deals" or anything like that. Hosts was always an unsupported system file hack, and there is a pretty powerful firewall in Windows 7.
On the other hand if it isn't your computer then the (network) administrator can overrule you with Group Policy Settings. This is exactly the same as on a Linux box if you don't have a root access. Your administrator can decide if you have access to the firewall, or even right down to what types of firewall rule you can make. There really is a huge amount of fine grained control available. Enterprise admins love it.
Re:Another reason... (Score:5, Informative)
Hosts was always an unsupported system file hack
Where do you get this idea from? Hosts files are a common part [wikipedia.org] of the IP stack of various operating systems. Microsoft has been using hosts files at least since Windows 95. They are fully supported and documented [microsoft.com].
Re:Another reason... (Score:4, Insightful)
There were no backroom deals here. Certain domains are commonly targetted by malware. If malware, or perhaps another user/IT with malicious intent, modifies your hostfile to redirect facebook.com to a phishing site, it will still appear to be at a legitimate domain of facebook.com but actually serving the phishing site. It won't have SSL but your average user won't notice. So you see, it is in the interests of preventing the hosts file from being a tool for malware or malicious users. It is not in the interest of some backroom deal MS made with facebook.
Re:Another reason... (Score:5, Informative)
iptables? Really? Have you even tried OpenBSD's pf? That's a powerfull yet easy-to-use firewall!
Comment removed (Score:5, Informative)
Re:Another reason... (Score:5, Informative)
Hell if you are worried about power you can buy one of those little plug computers or my personal favorite the little cheap E350 AMD kits. Those things are cheap, make great mini-servers or office boxes, only draw about 18w under load and less than 6w on average, great little units
Seconded, however you'd best steer clear of the Asus and Asrock boards if you plan on doing anything with the PCI slots on those boards. They all use the ASMedia 1083 pci bridge, which happens to be broken beyond belief. See here [kernel.org] and here [marc.info]. TL;DR: the controller has a hardware bug where it fails to deassert its interrupt status, causing IRQ storms which effectively makes connected devices useless.
Re:Another reason... (Score:5, Insightful)
An IT manager using Hosts is an IT manager that needs to be replaced.
First, if you are doing your web filtering on the workstation, you are doing it badly, badly wrong. Second, HOSTS is not somethin that is easily maintained or modified. Third, there are about a zillion better ways to accomplish blocking than using a HOSTS file.
Its basically a kludge from bygone days before DNS, and for 99% of use cases where you might think "I can use a HOSTS file for that", there are far better methods-- or else the thing you are trying to do is retarded.
Re:Another reason... (Score:5, Insightful)
Even allowing for your premise....
Why on earth would MS destroy a simple, well known behavior that users might indeed have reason to want to use? Why 'fix' something that isn't broken? Why break something that wasn't hurting anything else on the OS?
No harm in leaving a well known tool and behavior be.....but plenty of reason not to fuck with it, no?
Re: (Score:3)
I agree, I just dont think theres anything remotely noteworthy here. If it werent for awful 90s era programs that cant handle DNS, Id say kill the entire thing off and end the stupid "Hosts is a good idea" myth altogether.
Re:Another reason... (Score:5, Interesting)
Considering that the number of systems hit by malware making use of HOST file modifications is far larger than the list of systems using it to block access to sites, the balance of evidence is in favor of what Microsoft is doing. I know some people who have extensive files, but that group is very small. LordLimecat was right: it's a feature from a bygone era that is used more often for harm than for good. Even adding a switch to the functionality (which might well be there in the form of a registry entry) doesn't help because that switch will get flipped by malware.
Sometimes features once useful outlive that usefulness.
Re:Another reason... (Score:5, Insightful)
This is silly reasoning. "Since I don't have a good reason to use it, nobody else should either."
I use it to test services that are replacing old services with the same name. It works well as a temporary/quick way of testing. Yes, I could do it in DNS but it would take much longer to vet the change to our DNS servers than my local hosts file. Thankfully, I don't have to worry about this since I don't use Windows.
Re: (Score:3, Interesting)
Yup, that's what I use it for too. Changing DNS changes it for everybody, which is what I don't want.
Re:Another reason... (Score:5, Funny)
I use it to stop Mom from reading my blog.
As far as she is aware my "awful site" as been offline since May.
Re:Another reason... (Score:4, Insightful)
These people defending MIcrosoft's behaviour are just tools... I wouldn't pay much attention to them. Microsoft can't "kill the hosts file off" because the behaviour is part of the IP specification (defined in the RFC's)
We expect implementations of the TCP/IP protocol in clients to behave in established ways and Microsoft has no right to change that.
I make use of the hosts file for various purposes, including getting my forum users set up with hosts file entries to the new server, beforehand, whenever our DNS entries are changing so they can still reach the forum while changes are propagating. THIS is a prime example of why the hosts file still exists and the behaviour should not be fucked with by those assclowns at Microsoft.
Hosts was never meant to be used for blocking sites, but it works well enough as a consequence and the behaviour should be left alone. Whatever the user puts in there, should work as intended. I don't fucking CARE that it's used for malware. Fight malware in other ways.
Re:Another reason... (Score:5, Informative)
No, it's a prime example of a bad IT person. If you had any clue about what you're doing, you'd lower the TTL prior to making the change, then make the change, then change the TTL back to normal.
Expecting random clients to modify their config to compensate for your incompetence is just dumb.
Re: (Score:3, Interesting)
Crap!
The hole to plug (17 years over do) Is the fact that malware is able to modify the hosts file or flip a registry switch. Not some M$ convoluted notion of spaghetti security. I bet that by itself has holes in it.
Guys be careful an M$ troll making a days pay ...
Free Life
Heart
Re:Another reason... (Score:4, Insightful)
If that was the legitimate reason, then the proper course of action would have been to remove the hosts file feature totally (not this half-assed bullshit).
Re:Another reason... (Score:5, Insightful)
then the proper course of action would have been to remove the hosts file feature totally
IIRC you still need posix compliance (or the ability to claim it such that your claims can not be rubbished too easily) for your OS to be used in many US agencies, and the hosts file is one of the many minor points mentioned in that specification. Presumably that spec says something about having the feature, but does not say anything about effectively disabling it in this way.
Re:Another reason... (Score:5, Interesting)
MS sells ads. The biggest use of the HOSTS file is blocking ads. Google wishes they could do this.
Re:Another reason... (Score:5, Insightful)
Malware. (Score:5, Insightful)
the Hosts file is targeted my malware to redirect to malicious sites and to keep under the radar to infect systems after they have been clean. (or even to a locally hosted proxy to infect sites like Facebook) Personally, I've seen facebook and myspace targeted in it. Never seen doubleclick but my guess is doubleclick is a target so that they can redirect to their own profit generating ads, or more malware to attempt to extort money out of people.
My guess is that the sites defender removes from hosts are sites that have been targeted by malware in the past. Frankly, I'd like to see the list of domains it looks for, but I'm sure that I woudn't want any of them redirected to some scumware site trying to pawn off fake antivirus.
Re:Another reason... (Score:5, Interesting)
Why 'fix' something that isn't broken?
Because it is broken.
Malware can easily change the hosts file and screw you up, it's really a hole in name resolution security.
Re:Another reason... (Score:5, Insightful)
Seems like they fixed the wrong problem.
Re:Another reason... (Score:5, Interesting)
in the case of the host file you could simply require administrator permission. If the malware has admin access you have already lost. And if the malware is affecting the host file currently then the problem is still not in the host file or its implementation it is that the malware is on the system to begin with and the hole it exploited to do so in the first place is what need fixed.
Re:Another reason... (Score:5, Informative)
I agree that for blocking or for network-wide control using HOSTS is a horrible idea.
I also realize that the issue apparently here is blocking only.
But with that said, what about independent developers running their own web application on their machine ? If you're a web developer and you do your coding locally, it makes sense to use your host file to send a domain like dev.example.com to 127.0.0.1.
Again, I know it looks like Windows 8 won't interfere with that. But it's still an example of a legitimate reason someone might rely on the hosts file, and why it could be a major PITA to have it messed with by the OS. Or is there a better way that I'm missing ? ( (and running your own DNS server, even locally, and especially on a Windows machine, seems way overkill and no where near "better" IMO).
The problem with HOSTS files were they needed to be synchronized, distributed and maintained. Yes, it's a hold over to pre-DNS. But for a single machine who needs to set up certain private domains locally it seems the best option.
Re:Another reason... (Score:4, Informative)
Its basically a kludge from bygone days before DNS, and for 99% of use cases where you might think "I can use a HOSTS file for that", there are far better methods-- or else the thing you are trying to do is retarded.
Ah, so I should rather set up a DNS server for my 5 machines, rather than have one hosts file that never changes and that I append once after installation?
Re:Another reason... (Score:5, Funny)
Re:Another reason... (Score:5, Insightful)
no, but dev.realdomain.com might be... and yet I have to overwrite it to simulate on my local machine for development testing. Or perhaps I need to ensure when I load realdomain.com I go directly to a specific IP address instead of the default one that hits the load balancer.
There's a whole slew of reasons for having a hostsfile (especially for developers) that DNS doesn't solve.
Re:Another reason... (Score:5, Insightful)
I would only be affected if I used Windows 8, which I don't plan to.
Re:Another reason... (Score:5, Interesting)
Re: (Score:3)
So, how is one supposed to test moving a host around without fucking about with the DNS server now, too?
Used to be I could just stick overrides in HOSTS for the reported nameservers or whatnot and browse/use the host normally, to confirm it works before throwing the switch at the registrar.
What, are we supposed to ask IT to temporarily modify zones that aren't even in their zone of authority now? Or are we just supposed to throw the switch and see what happens?
Re:Another reason... (Score:5, Insightful)
Re: (Score:3)
I'm not sure how smaller companies do it, but I don't know of any decent sized enterprises that rely on a hosts file to restrict access to certain sites.
That said, this is some really stupid shit from the MS gene pool. Hosts should always take priority and simple visiting a site should never modify hosts as a result.
That said, I wonder if the old trick of setting 'System' to read only works?
Re:Another reason... (Score:5, Insightful)
Re:Another reason... (Score:4, Funny)
Re:Another reason... (Score:5, Informative)
Re:Another reason... (Score:4, Insightful)
Umm, would you use the hosts file if setting up a Windows box for firewall purposes? I think not.
I actually think not allowing critical things like *.microsoft.com (especially windows update and MSE) being redirected is a good thing - but there should be a Big Fat Popup warning that this is being done, and extending the hosts-removal for things like facebook and doubleclick? That's dubious, to put it mildly.
Re: (Score:3)
And this move makes sure you will never consider using a Windows-based platform as a small office-firewall,
And it also guarentees you will never use it as a stapler. Thing is, noone was doing either of those things before, nor will they now.
Re:Another reason... (Score:5, Insightful)
If they're interested in 'enterprise' (I really hate that word these days), they may want to have a look at what's been happening. Good or bad security-wise, people have been pushing for using their own devices, devices they *like* to use. I think the only thing really stopping it from taking off for tablets and phones is the failure of Rim, Apple, etc, to open their protocols so a business does not need to pick a single type of device. If they ever figure that out, Microsoft is hosed.
Hamhandedness. (Score:5, Insightful)
Hardly. At the enterprise level there are multiple different ways of handling situations such as this. Which one(s) you choose depends upon how you've organized Active Directory and your network.
But a different point is that this is an OLD way of phishing. The phisher is publishing the IP addresses that need to be blocked. So, again, at the enterprise level this kind of phishing would not be an issue.
If a phisher really needed to redirect traffic like that he'd have an easier time just getting the information in the local machine's DNS cache. That way it would never show up in the hosts file which means that it would be that much harder to spot. Then just keep updating the DNS cache.
So this is the wrong solution to the wrong problem and it is implemented in the wrong way. And it will probably cause more issues in the future as 3rd party developers have to work around not having the hosts file as a reliable option any more.
Nice way to remove a useful tool that's been around for decades.
Re: (Score:3)
Dream? No, nightmare. A machine the can't be configured as desitred and rewrites itself at will has no place in any corporate shop. You don't want the user rewriting the hosts file? That's not unreasonable and you can implement that right now, via policy so it's uniformly implemented. A client unavoidably rewriting itself against management wishes and that behavior can't be changed? Completely unacceptable. With this "feature", Windows
Re:Another reason... (Score:5, Informative)
Re:Another reason... (Score:5, Informative)
How can I check a site is up on a server with a certain domain name before I point DNS to it?
I guess you could add it to the hosts file the way you always did.
All they did was block redirecting certain high profile domains that were commonly attacked by phishing and url redirection attacks by malware writing to the hostsfile. You'll still be able to add your my-cat-fluffys-enterprise-weblog.com and it will still work.
Unless you happen to work on small handful of high profile websites that are commonly attacked by phishing/url redirection attacks, nothing has changed.
If you do happen to work for facebook, and you do happen to use your hosts file to point facebook.com at internal development servers and you happen to use Microsoft's Windows Defender on your development pc, then things got ever so slightly more complicated. You'll probably cope, though.
if you're an enterprise IT sysadmin, this is a nightmare.
Yes, a nightmare on the same scale as the Dairy Queen across town being out of my favorite flavor. The horror.
Re:Another reason... (Score:4, Interesting)
You'll still be able to add your my-cat-fluffys-enterprise-weblog.com and it will still work.
That's unfortunate because, as others have noted, the hosts file "feature" is indeed a relic of a bygone era that should be laid permanently to rest rather than being broken for certain use cases. There seem to be two camps here; the ones that say "leave our beloved feature intact!" and those who say "kill it for the sake of the enterprise!" They are both right -- What MS should do is not break the hosts file or make it behave inconsistently, but replace it with something better.
A Windows service that allows DNS names to be overridden by user request is what is called for here. It could be added as a supported feature ...something that is controlled by group policy and managed through Windows RM to satisfy the enterprise IT folks ...something with a nice UI and possibly new features like pattern matching for the ad-blocking/web-developing user base.
Practically speaking that probably won't happen, as it's always easier to shoot a piece of software in the head than actually improve or replace it...
Re: (Score:3)
How can I check a site is up on a server with a certain domain name before I point DNS to it?
It's not a nightmare if you are competent. nslookup to 4.2.2.2 and get the current IP for the host in question (bypasses your hosts and DNS settings). Then ping the IP (doesn't use hosts or DNS).
If you don't have that stored in your head, you aren't a competent admin. Though I can't count the number of times I used nslookup, only to have the person looking over my shoulder mention he's never seen it before. So the number of competent admins is likely very small.
Re:Another reason... (Score:4, Interesting)
You didn't understand the question. The question was about servers hosting multiple domains, assumedly in the context of HTTP since most other protocols don't give a fuck about the domain name. To test this properly, you'll need to either edit the HTTP request by hand or convince your machine that so and so server is actually the host you're requesting. The HOSTS file provides a convenient way to do this for those without direct control over their DNS server.
That said, unless your site is in the list of protected domains this is entirely irrelevant, and if it is you are probably running your own internal DNS which allows for as much testing as you'd like.
The sites affected are regularly accessed domains for which malware has historically been known to attack via the HOSTS file. The few users who legitimately need to add these domains to said files can be assumed to be able to figure out how to disable said restriction (though I agree with the idea that MS should have put a note in the file stating that such a thing was occurring) or run their own DNS making this a non-issue.
tl;dr: You interpreted the question wrong, but the question was pointless to begin with.
Re: (Score:3)
Re: (Score:3)
You just forfieted your geek card, Linux is a kernel.
No he's ok. ;)
You OTOH, have just earned the pedant endorsement on yours with that post, congratulation.
Re:Another reason... (Score:4, Interesting)
Could you be so kind to post the other reasons?
I have been using UNIX/linux/BSD and odd stuff like BeOS, System 7/8/9, OS X, Solaris/CDE, IRIX etc for 15 years.
Never found a solid reason to use windows, and now you tell me there's more than one reason _not_ to run windows?
That is one alternative reality I must grab..
So... (Score:5, Insightful)
Just add the hosts file to the Defender's white list. If you know how to edit the hosts file, you should know how to add it to the white list.
Otherwise, who says the edits to that file were not malicious.
Re:So... (Score:5, Interesting)
Precisely. It's smells of a bad excuse for some money under the table.
Re:So... (Score:5, Informative)
IIRC doubleclick is Google. Are you seriously implying that MS is in some sort of conspiracy to give more money to Google?
Stop and think about that for a second, then get back to us once you remove the tinfoil hat.
Re: (Score:3)
Stop and think about that for a second, then get back to us once you remove the tinfoil hat.
Aha, it's a conspiracy to make me remove my tinfoil hat!
Re:So... (Score:5, Informative)
How about this: Windows Defender removes from the hosts file references to well-known and often accessed sites that could be redirected by malware for nefarious purposes?
I might not want to visit ad.doubleclick.net but I certainly don't want it redirected to some other unknown IP address! Many, many, MANY websites I visit try to pull up links in that domain.
Perhaps they should make an exception for localhost references, but considering how much of the general population knows about hosts files, I'm inclined to side with GP. Odds are very high that on most machines running Windows Defenders, a redirected ad.doubleclick.net reference is malicious.
Re: (Score:3)
Every web page you visit (practically) has an ad.doubleclick reference. Could be a pretty effective attack vector to spoof them. But, clearly preventing someone from doing this through hosts would not eliminate the ability to do it.
Re: (Score:3)
How will APK react to this? (Score:5, Funny)
APK's sole existence seems to be reliant on advocating the hosts file as a means of host filtering, despite more modern, flexible, easier, convenient and powerful alternatives existing.
How will APK stay relevant with the demise of the hosts file in Windows 8? Stay tuned....
Re: (Score:3)
Advantages over "other things"? Two words:
Firewall entries.
More flexible, centrally maintained, more granular, more reliable, and not prone to user tampering. Yea, how horrible.
Calm down (Score:5, Informative)
Before everyone gets all excited... the article has already been updated with the fact that this is a feature of “windows defender” (and imo a reasonable one) and can be disabled.
The hosts file is popular for blocking sites, but also popular for redirecting to phishing sites as well. This seems like a very ineffective way of solving that problem, but at least it doesn’t look like there is some evil malicious intent..
In other news, running certain anti-virus products will prevent you from writing to the boot sector while they are running
Re:Calm down (Score:5, Insightful)
Considering that one of the sites they are unblocking is ad.doubleclick.net (which is often blocked because the user wants it blocked) then Microsoft is taking away an option from the user.
What will be interesting will be when someone compiles a list of the sites that will be unblocked ... and finds how many BANKS will still be subject to phishing like this ... but ad.doubleclick.net will be protected.
This is a stupid move by Microsoft done in a stupid fashion.
Re:Calm down (Score:5, Insightful)
The hosts file can only be modified by administrators. Any additional protection is useless because if malware has gotten itself running as administrator, it can just kill or modify windows defender anyway.
Not user friendly, hostile (Score:5, Insightful)
From the article, Two of the sites that you can’t block using the hosts file are facebook.com and ad.doubleclick.net
I started using the hosts file over a decade ago, when I traced crashes that I was having to doubleclick.net. Ad supported software that I was using was receiving files from them, but it was doing a lot more than just displaying the ads (which I would not have objected to). Many users were experiencing this, but the author would not fix it so I and others started blocking the site (which resolved the problem, although the author lost some small amount of revenue).
More recently I have also started blocking facebook. I never use it, have no account there, but I've noticed an awful lot of network traffic going to and from my site with facebook.com. I'm not even a member, so I don't feel the need for them to track most of the sites that I visit. The hosts file has so far worked very well for this.
And argument that this feature is in any way for the benefit of the clueless user is bogus. The common way to block a site via the hosts file is to equate it to the IP address 127.0.0.1, which is the local machine. If Microsoft were doing this for the benefit of their users then they would simply look at the hosts file and, if they found redirects for sites that they were concerned about that were not pointed to the local machine, they might well conclude that it was potentially an attempt to hijack a domain name and then, after warning the user (and even asking him) correct the problem. This would even show the user that Microsoft was doing something good for the user for a change. But if the address is redirected to the local machine, the only reasonable conclusion that I can see is that the user wanted it that way (as it provides no attack vector). It took me about 30 seconds to realize that changing 127.0.0.1 redirects was user unfriendly and could easily be avoided if Microsoft were really concerned about their users who paid for the software. They just have to look at the IP address that the hosts file contains and if it is 127.0.0.1 then allow it to stay! Clearly Microsoft realized this too. The only reasonable conclusion is that they are doing this because they have a motive that is against customers interests.
Re: (Score:3)
Assuming that all redirects to localhost are user-specified is all well and good, until you figure out that some malware makes the hosts file looks like this:
update.symantec.com 127.0.0.1
update.trendmicro.com 127.0.0.1
update.mcafee.com 127.0.0.1
update.microsoft.com 127.0.0.1
Not that I consider this a good move by Microsoft, by any means, but implying that the situation is as simple as you're making it out to be is dangerous.
Re:Calm down (Score:5, Insightful)
Yes, but among the vast majority of users (i.e., not Slashdot readers), the hosts file is an attack vector rather than an adblocker or development tool. All of that security training people should receive around double-checking what's in the address bar goes out the window when the hosts file has been compromised.
It sounds like MS's security tools have been a bit overzealous in trying to protect this file and can't determine what's a legitimate versus non-legit edit. But it's better to err on the side of being more rather than less secure here, especially with the amount of damage a maliciously-edited hosts file can do.
Basically: yes, it's Windows 8's fault that this happens, but it's not Microsoft trying to screw you over like the headline makes out. There should be a tool that can edit, save, and sign the hosts file to make this distinction, not entirely unlike visudo - and all operating systems should have something similar. My Cisco VPN client straight-up replaces my hosts file every time I connect, and while I was able to find and update the file it uses to make that less annoying (I have hosts for a lot of VMs in there), the fact that a non-privileged application can do that is quite scary.
Re:Calm down (Score:5, Insightful)
No, it's Microsoft being stupid and ignoring its own security. If a non-privileged program is permitted to ignore the fact that a file is set to be Read-Only, you have absolutely no protection against malicious code changing anything it wants. All it has to do is infect Windows Defender and it can do anything it wants. If I were still a Windows user, I'd be very reluctant to trust Windows 8 at this point because of this obvious lack of common sense in how it handles this.
Re:Calm down (Score:5, Interesting)
Comment removed (Score:5, Insightful)
Re: (Score:3)
If a non-privileged program is permitted to ignore the fact that a file is set to be Read-Only, you have absolutely no protection against malicious code changing anything it wants.
Im going to go out on a limb and say you have no idea what youre talking about-- primarily because you seem to think that Windows Defender is non-privileged. It would be a pretty sorry anti-malware / virus software that ran in user-mode.
Im going to go further out on a limb here and say that Defender probably runs with System rights, and can do pretty much whatever it wants from a OS security perspective.
Re: (Score:3)
Not using Windows is irrelevant.
Any security software, by definition, and regardless of operating system, has to have access to the entire system, ergo, needs system rights.
The fact that you missed this has nothing to do with your lack of Windows knowledge, and everything to do with your lack of security knowledge.
I'd say that's quite the limb, after all.
Re:Calm down (Score:5, Informative)
Linux is not owned by a single entity like Windows is.
Windows is what MIcrosoft says it is because they own it and they can do anything they like with it. If you're offended, your only alternatives are to "hack it" or abandon it.
There isn't some other pre-packaged variant of Windows you can switch to.
This makes sense... for (most) Windows users (Score:5, Insightful)
As comments in the article point out, this behavior can be turned off by going to the Windows Defender settings... But by and large this make sense for 95% of Windows users as they will have NO clue about the hosts file, and even less of a clue if it has been modified for a phising attack. Nice to see microsoft take another step forward in protecting the blindingly ignorant and inept.
Re:This makes sense... for (most) Windows users (Score:5, Insightful)
Re: (Score:3)
Prompting users to make security decisions means you have less security. If Defender prompted you every time it was blocking a write to a sensitive/monitored file, most people (the ones that really need the extra security software) would be inundated with requests eventually causing them to hit allow every time just to make the dialog boxes go away.
There should be a comment in the hosts file indicating how to opt-out of this behavior, but I think what Microsoft has done here is both reasonable and a good se
Re: (Score:3)
As comments in the article point out, this behavior can be turned off by going to the Windows Defender settings... Nice to see microsoft take another step forward in protecting the blindingly ignorant and inept.
No, a step forward would be requiring administrator rights to write to the file, and then ensuring admin access is granted only when actually needed. Please, understand this: If you've got software modifying your hosts file, then Windows Defender hasn't done its job and you've got much bigger problems already.
Re:This makes sense... for (most) Windows users (Score:5, Insightful)
But it also does this for Doubleclick, which sounds more like someone sucking up to their corporate partners.
You do realize who owns DoubleClick, right? Google. Not exactly a partner of Microsoft. Microsoft has their own ad network that competes with DoubleClick, so that part actually helps make a case to me that this was not ill-intentioned.
on what planet? (Score:3)
Re: (Score:3)
It seems to make sense. Inject your own ads in place of one of the most popular ad networks. Any other content you want to bundle along with those ads you can as well of course.
Adobe's Activation Servers (Score:5, Funny)
Prepare them for the shitstorm.
Bad/lazy programming (Score:3)
MSE: Microsoft Screws Everything (Score:5, Insightful)
Yeah, this is basically a cack-handed way of fixing malicious hosts redirects.
It'll prevent malicious programmes from sending you to fake Facebook, but at the expense of entirely overriding any preferences YOU as tthe computer owner might wish to make via the Hosts file.
It's a staggering level of incompetence that this is their solution. It needs to be changed and they need to find either another way of solving it or allow some form of granulation and user input.
Re:MSE: Microsoft Screws Everything (Score:4, Interesting)
Yeah, this is basically a cack-handed way of fixing malicious hosts redirects.
Every OS does this: starts out with a simple (possibly easy-to-understand) model and evolves to something with more and more layers of cruft. It's called technical debt, and the long-term consequences are that these systems become harder to learn and understand.
Linux is better than Windows in this regard, but open source is by no means immune to crud formation. The maintenance tools for Debian packaging and the GNU Build System [wikipedia.org] come to mind.
Which brings me to my rant: in order to remain viable as a hobbyist OS, Linux should strive to simplify and remove "stupid complexity" that needlessly hinders technical understanding of its internals. I'm not speaking of user-friendliness per se (because that's a term that we use in reference to end users), I'm talking about removing complexity that isn't inherently necessary for the purpose of the system.
Re: (Score:3)
Re: (Score:3)
If anyone is considering trying this, I highly recommend you leave SYSTEM read privileges in there if you want it to continue to work.
Where do WE want you to go to today? (Score:5, Insightful)
Hope you enjoy your new 'media consumption appliance'. Its becoming less and less of a 'general purpose computer' every day.
Another reason to skip Windows 8 (Score:5, Insightful)
This is another good reason to stick with Windows 7, giving Windows 8 a miss.
One common use of the hosts file is to test staging servers, particularly web servers before pushing them live, and without the complexity and time it takes to set up an additional DNS server.
Mutually incompatible options (Score:5, Informative)
The option on one end is to allow the user to have full, unfettered access to everything on their system, from the highest levels down to the lowest. This was done back in the DOS and Win9x days, and although it does have a few benefits in certain niches, it's also very bad for security.
The option on the other end is to disallow access to modifying the underlying system and related settings, and only allow such actions from full administrator accounts, and maybe not even then (depending on the mindset of the development team). This pisses off a lot of the hardcore techies who like to modify everything they can, but to be fair it does help protect the average user.
Now, I'm not defending Microsoft on how they've implemented this silently and without notification to the user, but on the face of it I think it's a good idea for the average user, at least with regards to the Facebook part of it (not so much on the Doubleclick part). Think about it - the average non-techie person wants Facebook to work. They will want to get their notifications on the Start screen (and elsewhere).
I agree with other posters - they should have openly done this and notified the user before "fixing" it - something like "Your hosts file has been modified to prevent access to <site on this list>. Is this desirable to you?" with three options - "Yes", "No", "More information". That way, the techies can click "Yes" and go about their business, average users can click "More information" and maybe actually learn a little bit in the process, then come back and click "Yes" or "No" as per their wishes.
As with many things, the idea is sound, but the implementation is not. To those saying "well, malware wouldn't redirect to localhost, it'd redirect to a false Facebook", there's nothing stopping a piece of malware from being written that is similar to the existing rogue security software, but that also uses hosts to block access to various social media sites, in an attempt to give the uneducated user further reason to believe they're truly infected as bad as the rogue software tells them they are, and also as a weak attempt to prevent the user from going online and telling people about it even after the rogue software has been removed. They'll do anything to get a few more successful purchases of their crap software. I'm quite surprised they haven't really done this already, to be honest.
The answer is simple enough (Score:5, Insightful)
The answer is simple enough:
If you're already smart enough to edit the hosts file, you should be smart enough to add hosts to Windows Defender exclusion list.
Is this a change from the way that things were done in the past? Of course it is. This is how systems become more secure for the average user. Average Joe isn't messing with hosts.
Chicken Little, the sky is not falling.
Evene if it is windows defender it is bad (Score:3)