Last Words On Service Pack 2 542
thejoelpatrol writes "So did Slashdotters call this one? Windows XP SP2 seems not to be so secure after all. A Register reporter goes in depth to find out just how safe a fresh install is. He provides a list of which dangerous ports are left open and which services are left on by default. I guess now we know why Microsoft's security timetable is 10 years." Reader ack154 writes "ZDNet is reporting that many Dell Inspiron users are reporting an extreme performance decrease since installing Windows XP SP2 - decreases as much as from 2.6ghz down to 300mhz. Dell claims no responsibility, claiming it is 'externally loaded software' and they don't support it. In the mean time there has been a fix posted on Dell's forums, which rolls back the processor driver." Finally, Marxist Hacker 42 writes "Amid complaints of too much XP Service Pack 2 coverage on ZD Net, David Berlind writes that Service Pack 2 deserved the scrutiny it got- and charges that it failed to live up to Gates' Trusted Computing Initiative." Finally, Microsoft warns that installing SP2 on a spyware-infested PC is a bad idea.
Performance decreases that exxxxtreme... (Score:5, Funny)
Slowed Down? (Score:3, Interesting)
Re:Slowed Down? (Score:5, Funny)
Re:Slowed Down? (Score:4, Funny)
Re:Slowed Down? (Score:4, Informative)
Re:Slowed Down? (Score:3, Informative)
I don't see how SP2 could be faster. Microsoft added new bloat compared to SP1.
I think the reason it was faster after SP2 might be...
Windoze gets a bad case of registry rot from installing and uninstalling software, and all that spyware in there slows things down a lot, too.
Obvious solution... I gotta see a man about a penguin.
Re:Slowed Down? (Score:3, Insightful)
And now that you have SP2 installed, it will take longer than evar!11! to get bogged down again.
Yay111!1
Last Words? (Score:5, Funny)
Re:Last Words? (Score:5, Funny)
Re:Last Words? (Score:4, Funny)
Re:Last Words? (Score:5, Insightful)
The entire summary is inflammatory. "Did Slashdotters call this one?" Well, gee, I'm so surprised that Slashdotters think SP2 is a failure. And then it even links to the widely criticized "Windows Secure In 10 Years, Says MS" article.
I am fully convinced there is a smear campaign going on against Microsoft that goes beyond merely being a pro-Linux site--as in, it is going beyond normal levels of criticism. I suspect it has to do with the fact that this website is corporate-owned, an entity of OSTG which is a company that makes money off of selling OSS and Linux products. The rate of anti-Microsoft articles has increased dramatically with the release of SP2, and headlines/article summaries are often wildly exaggerated or even completely false. If Microsoft owned a tech news site, and the articles it posted were inflammatory and exaggerated in the same way Slashdot's are, you know that Slashdot itself would be all over it with criticism! But Slashdot's misleading "news" is given a pass because a lot of people here have chosen this website as the haven for their frustrations with Microsoft. This place is the Ain't-It-Cool-News for IT nerds.
I'm sure many of you will disagree, and I respect that because I used to like Slashdot too back in the 90s when it was still a good place to find cool science and computer news, but since the corporate buyout, it has been a major source for three major things--anime news, anti-Microsoft news, and OSS project releases. In between those are scattered various articles intended to generate page hits by inciting emotions in the majority viewpoint of Slashdot--anti-capitalist, anti-corporate, left-leaning computer geeks (which makes it all the more amusing that Slashdot is actually corporate-owned, displays large banner ads, and sells subscriptions). That's why we get "More Automated DMCA Lies" articles--as if an automated system was an actual live being that could "lie" to you, when it's really just some automated system that made a mistake--and anti-RIAA, anti-SCO, and anti-copyright articles. We all know the formula for those articles.
Finally, it does not surprise me one bit that this article was posted by michael. Plenty of others have said enough about him. Even Jon Katz's articles were at least genuine in their subject matter. Michael's are almost always a cynical backslap against someone. Let's not forget his all-caps "ANTI-INTEL" troll in the 64-bit chip article, which would have been modded down had it been a normal comment and not an article on the front page.
If you disagree, reply and let me know why you do. But this whole obsessive-compulsive desire to bash and bash and bash Microsoft is just boring me to death. This is supposed to be a LINUX site, remember? Isn't there anything cool going on in OSS lately? I miss the old articles we used to get on Slashdot, and the fascinating discussions that used to take place (as opposed to the karma point games that go on now as everyone plays comedian and makes +5 Funny jokes that aren't funny). Do we really need yet ANOTHER SP2-bashing article?
Agree with you (Score:4, Insightful)
I have complained about editorial policy in several of my posts, but (silly me) haven't ever suspected that ownership of Slashdot could have to do with what gets posted here.
I have also complained about low quality FUD troll articles by michael and suggested that articles be moderated, too, so that we can filter out that cheap propaganda that pollutes the site.
Of course, it seems it'd be "complicated" (suddenly it became hard to tinker with
This year has been really bad.
I my opinion, some 40% of all articles and 80% of all comments are of miserable quality. Sometimes one has to browse four pages of comments to find 3-4 insightful posts. And as the parent post says, you can't get rid of worthless comments because totally stupid articles get modded insightful or funny.
As articles can't be modded or filtered ("michael filter" anyone?) either, it's becoming quite unbearable.
Sadly, that is the new Slashdot - perhaps it's "If you don't like it - leave!", so I've been thinking if I should still visit Slashdot.org any more or perhaps join one of commercial tech sites with quality articles and forums.
Truly pathetic.
P.S. In past months I've been getting to moderate ONLY anonymous posts - now I have started to suspect that happens because I've voiced my dissatisfaction too many times... Anyone else gets only to moderate only posts by anonymous cowards?
Astroturfer (Score:3)
Smear campaign agains MS? You sound like you could be on the MS payroll, one of those "grassroots" marketing efforts they can fund with the stacks of cash they make sellin you a $1 CD / software package for $300. I have never met a legitimate fan of MS products. People may be
It deserves scrutiny (Score:4, Insightful)
Re:It deserves scrutiny (Score:3, Funny)
Yup, in one way or another.
At least it shows the MS Quality Assurance team don't use Dell.
Re:It deserves scrutiny (Score:3, Funny)
Re:It deserves scrutiny (Score:5, Insightful)
Re:It deserves scrutiny (Score:3)
To paraphrase the Lousiana sherrif out of a Bond movie.
"In which direction?"
any time now... (Score:5, Funny)
Re:any time now... (Score:5, Funny)
Re:any time now... (Score:5, Insightful)
12 years? 14? (Score:3, Funny)
YOU'RE A TROLL! Longhorn will be out next year.
http://www.apple.com/macosx/tiger/ [apple.com]
Oh, you meant Microsoft's version. Yeah, 12 or 14 is about right.
Re:any time now... (Score:4, Interesting)
Re:any time now... (Score:5, Informative)
Meanwhile, back in the Short term.
Microsoft disclaims responsibility for OEM software and:
"Dell does not validate any externally loaded software and can therefore make no representations as to their effectiveness, stability, appropriateness, or safety. Any problems encountered with this kind of software should be addressed to the respective manufacturer."
It appears that the actual support that can be relied on is maybe a hair less than what you get from Fedora Core release candidates.
CPU Driver Problem? (Score:5, Informative)
Aren't 99% of drivers 3rd party software? The only thing MS does is bundle them together, but I believe that AMD or Intel et al are the ones who actually WRITE the device drivers. And if the performance of a new driver sucks, I'd chock that up to being a shitty driver, versus a shitty Service Pack...
Re:CPU Driver Problem? (Score:3, Insightful)
I mean, a driver is something that tells your computer how to talk to some piece of hwardware - say a modem. It maps from a common API (say, the windows API) to the specific API of the device (say, use Int21 with ax=3 to hang up the phone).
Are you saying there's a windows API to the CPU? Something like HWND add(HWN ax, HWN bx) ?
That makes no sense at all.
Someone please explain this to me.
Re:CPU Driver Problem? (Score:5, Informative)
Re:CPU Driver Problem? (Score:5, Informative)
"AMD Athlon(tm) 64 Processor Driver for Windows XP, Version (exe) 1.1.0.14 - AMD Athlon(tm) 64 Processor Driver for Windows XP allows the system to automatically adjust the CPU speed, voltage and power combination that match the instantaneous user performance need. Download this Setup Installation program (EXE) to automatically update all the files necessary for installation. This package is recommended for users whom desire a graphical user interface for installation. This .EXE driver is a user friendly localized software installation of the driver designed for end-users."
This is followed by a link to a file called CPUDRIVER.EXE, so as strange as it sounds ,there are actual drivers for Windows XP to make use of advanced power features on CPUs.
Dell responsibility (Score:5, Insightful)
As an OEM that sells systems bundled with XP, Dell, I believe, is obligated to support systems whose users apply service packs to the OEM-installed OS. There was some flak about this some time ago when some OEMs simply referred their customers to Microsoft, and I believe that they were reminded that they picked up this obligation as one consequence of their OEM arrangement. This support site page [dell.com] gives the particulars for Dell. In my experience, Dell acts like any other Windows sysadm: they wait until their own internal testing is done before they add it to the list of supported service packs, so that they can simultaneously publish a list of any issues (such as required driver updates). Until then, you take your chances (which have been minimal for me, though I tend to stay in the Latitude line, even for home systems) and rely on the forums. My reading is that Dell isn't done with its testing, and the particular spokesperson is only half right: not supported until their testing is complete and it appears on the above page.
Why I didn't bother... (Score:5, Interesting)
I might add that the free/OSS I have protecting my machine weighs in considerably less in terms of combined file size then does SP2.
Re:Why I didn't bother... (Score:5, Funny)
I'm dual-booting 98SE and Gentoo Linux. '98 predates all the security holes, and Linux doesn't have any worth mentioning.
Re:Why I didn't bother... (Score:4, Funny)
Re:Why I didn't bother... (Score:4, Interesting)
Re:Why I didn't bother... (Score:4, Informative)
Re:Why I didn't bother... (Score:4, Insightful)
What about that software that uses IE APIs? Someone may not be running IE but they're still at risk because they are running software that is.
Re:Why I didn't bother... (Score:3, Interesting)
That isn't feasible. The mass majority of users out there are not going to have the time to become security aware. The curve to getting there is too steep and requires devoting too much time. Somehow, systems out there will have to be redone to have a secure foundation and security measures, like patching, will require automation. This is as true for a corporate system as it is for a home system.
Re:Why I didn't bother... (Score:4, Insightful)
For an added bonus: Installing Firefox and Thunderbird.
That's it. You're done. The average user installs far more than two/four pieces of software and someone put together a CD of this stuff, all of which is free or OSS, with simple instructions you could teach anyone to harden their computer. Hell, I've taught people who know nothing about computers some basic security. Now they ask me reasonably intelligent questions about what they can do to further protect themselves.
Re:Why I didn't bother... (Score:3, Insightful)
Re:Why I didn't bother... (Score:3, Interesting)
The biggest problem I had was trying to actually get the update through Windows Update. I did set Windows Update to automatically download it (but not install) but that didn't work for 3 whole days after SP2 had been released. So I tried to use Windows Update m
This just sucks (Score:2, Informative)
So basically: (Score:2, Insightful)
Because I wasn't expecting that it would, but apparently somebody is. Unrealistic expectations also lead to insecure implementation.
Re:So basically: (Score:5, Insightful)
Re:So basically: (Score:5, Insightful)
Many of microsofts security problems could be fixed by just following best practices, and the built in firewall doesn't do shit.
Re:So basically: (Score:5, Insightful)
If they were to close off all those ports, they would risk all the clueless sysadmins screaming on MS forums that SP2 breaks everything, even basic windows sharing facilities.
I think the main point here is that MS has tried to appeal to people by saying that it's easy to be a sysadmin, that anyone can set up a network and run it. Real sysadmins all over the place freaked out, with good reason. They were accused of being set in their ways, etc, etc.
Now all those things that the skillful have said would happen, have happened. Rampant security problems, etc.
Re:So basically: (Score:3, Insightful)
Ahh, but it is easy to be a sysadmin and setup a network in the Windows world. Good network? probably not. Secure network? probably not. However, it's going to be good enough for people to get their work done.
I once saw a small company with a terrible network. The configuration was an abomination and security was lax. Everyone in the company drove an S
Re:So basically: (Score:5, Insightful)
Ports 135-139 are enabled by defailt when joining a domain.
Windows Firewall is managable by DOMAIN POLICY.
Complaining that they're enabled by default is moronic.
Re:So basically: (Score:3, Insightful)
If Microsoft had delievered a completely robust, all encompassing firewall product bundled in SP2, would you then gripe and bitch that was unfair and anticompetitive?
Damned if you do, damned if you don't. It's not strong enough or you're being unfair and bundling.
Whatever, either way, saying "doesn't do shit" is pure BS - it DOES do "shit", it just doesn't do everything YOU want it to do (or what you read that others want it to do).
I don't get it (Score:4, Insightful)
Re:I don't get it (Score:5, Insightful)
Having said that- I was surprised by his port scan of a SP2 machine, since my own tests at ODOT showed NetBios inaccessible after SP2 install, killing the ability for SMS to see the machine (one of the reasons that I'm NOT allowed to do testing on the real network for SP2).
Re:I don't get it (Score:4, Informative)
Today I built a fresh XP machine with SP2. I just scanned that machine with nmap and it showed absolutely nothing open except the VNC port that I specifically configured. The machine doesn't even return pings. I'd say that's a pretty tight default setup.
Re:I don't get it (Score:3, Informative)
Whoa! (Score:3, Funny)
*phew*
I think I must sit down to recover from the shock.
From an Inspiron 9100 owner... (Score:5, Interesting)
Fellow inspiron owner (Score:5, Insightful)
>So did Slashdotters call this one?
No. They really didn't. Of course SP2 was going to cause *some* problems, but poo-pooing everything MS in a knee-jerk fashion doesn't help anyone and probably is keeping people from installing it, which is a real shame because:
1. Firewall on by default. Power users can easily shut it off. How many Slashdot posts do we have that wish MS did this, but when they do suddenly MS is doing wrong. Yes an admin can shut it off even with an activeX control. Such is the life of running as admin.
2. Nag screens for anti-virus and updates. Much needed.
3. Better wireless interface. The old one wasn't so hot and this is a welcome upgrade.
4. "Drive by installs" are not going to be as common as IE requires an extra step to install/download stuff and blocks pop-ups natively and by default. Man, how many slashdoot posts did we have about "MS should do something about pop-ups and click installs!" Well, they did. Sure, they didnt remove activeX altogether, but no one was expecting that.
5. NX support for AMD 64. Wow.
> Finally, Microsoft warns that installing SP2 on a spyware-infested PC is a bad idea.
No shit. Installing ANYTHING on a spyware infested PC will cause all sorts of problems. Fighting spyware is what SP2 is trying to do. Give it time or at least introduce your friends and co-workers to a little thing called Ad Aware, especially if they'll never switch to FireFox. Face it, many people will never switch and will go to their deathbeds using bundled software.
>So did Slashdotters call this one?
Granted, if you take the negative approach to life 24/7 you will be right every so often or at least subjectively, but I feel these are much needed changes and will help technophobes better use their machines. MS can do things right. Yeah, break out the smelling salts...
From a Compaq Presario owner... (Score:3, Informative)
Easy Windows (Score:3, Insightful)
not to be a jerk, but... (Score:3, Interesting)
David Berlind writes that Service Pack 2 deserved the scrutiny it got- and charges that it failed to live up to Gates' Trusted Computing Initiative.
Okay, Mr. Berlind, did you actually fall for that and now you're surprised?
Spyware infestation (Score:5, Informative)
Firewall is on by default (Score:5, Interesting)
I say it's a "massive step forward" because there are literally MILLIONS of windows machines which are never updated, don't run any firewall software, and which are directly connected to broadband ISPs. The people running these boxes truthfully don't know what they're doing in these matters.
Right now, those poeple have NOTHING. Now at least they will have something, albeit limited. This is a major improvement. Even the old XP internet connection firewall, if it had only been enabled by default, would have prevented Blaster from ever happening.
Of course there are some questionable exceptions in the new firewall default configuration, and no doubt the next generation of worms will take advantage of those - but at least the bar has been raised a little higher.
Re:Firewall is on by default (Score:5, Insightful)
So if these machines are not updated, and the owners don't know what they're doing, what makes you think they'll install SP2?
Re:Firewall is on by default (Score:3, Insightful)
But I'm anticipating SP2 making it onto new PCs at some point soon.
Spy ware and SP1 (Score:5, Informative)
One word. DUH. If you even install sP1 on a spyware infested computer it can render it unbootable. I've run into atleast 10 machines this week that have had this same problem. I work at a university which is forcing students to install service pack 1. there are a lot of machines that can't even take the service pack because of the spyware the installs just hang or destroy the install on the computer. I feel bad for the students because they have to either format or pay to get thier comptuer fixed. It not thier fault or the universities fault. who would have thought forcing college students to update thier microsoft patches would be a bad idea.
Re:Spy ware and SP1 (Score:3, Insightful)
Perhaps not the first time you notice the problem, but after that, it's the university's fault. It's very easy to tell people to install and run adaware before installing the update...
Blame (Score:3, Interesting)
all in the spirit....and its manifestation... (Score:3, Interesting)
Its this same manifestation of the application of doing things in software to "make people need them" that is causing all the security problems.
This security problem is not fixable by this mindset that cause it.
Its like an alcoholic or drug abuser, their mind is geard towards supporting the continuation of its vise. What I call a "self supporting dependancy". And under such conditions, as those who have admitted it and sough help, you have to have external help in order to be lead out of the blindness of the self supporting mindset.
Whos helping MS??? If anyone can?
ZDNet, huh... (Score:3, Insightful)
I'm not going to place any faith in benchmarks generated by someone who thinks performance is measured in clock speed.
Chris Mattern
Re:ZDNet, huh... (Score:5, Insightful)
Classic, just classic. (Score:3, Funny)
We look to ZDNet as a beacon of light in IT journalism.
(pauses)
BWAAAHAHAHAHAHAHA!
All I can say to this person, is 'look out for the oncoming train...prolly complete with windows logo and named "longhorn".'
IT journalism, brought to you from the same folks of Military Intelligence.
Hrmm... (Score:5, Funny)
So basically, you don't want to install it on any computer running a Microsoft operating system that has been using a Microsoft browser or a Microsoft e-mail client.
Huh..I think I'm starting to see a pattern.
Stop bitching (Score:4, Insightful)
Interesting... (Score:5, Informative)
Now, I'm no fan of Microsoft (Windows free for over 5 years now), but this is insane. Evey home user I have ever helped needs a DHCP client so that their computer can get an IP off the university LAN or off their brand-spankin'-new broadband router. To disable the DHCP client means to turn off the interweb for the majority of users. Greene went a little over the top it seems.
Re:Interesting... (Score:5, Insightful)
Suggesting that we turn off DHCP with a comment like "Unnecessary on most home machines" shows that someone is not in touch with the rest of the world.
Maybe in L33Td0M you only run static IPs so you can connect by typing in l33T IP addresses instead of machine names, but the rest of the world doesn't know an IP address to save them.
Comments like that show you have no clue, because the world is not full of command prompt users.
Reverse FUD (Score:5, Informative)
-Lucas
Re:Interesting... (Score:3, Insightful)
Re:Interesting... (Score:3, Interesting)
2.6ghz down to 300mhz (Score:3, Funny)
Security by obesity.
What crap (Score:5, Insightful)
He claims that WebClient, DCOM, TCP/IP NetBIOS Helper, Secondary Logon, Remote Desktop Help Session Manager, Remote Access Connection Manager, DNS Client are all on or set to manual and should be disabled. Thanks, but I'd like to be able to use WebDAV, COM/DCOM, share files with a roommate/family member, use remote desktop from work, VPN into work in the first place, and resolve DNS hostnames thanks.
I might also add that he rails on Microsoft not taking advantage of multiuser capability properly then recommends that Secondary Logon be disabled for home users! Without it, Windows can't popup when you try to install a program or run Control Panel and ask for an admin password to proceed... which makes using a non-admin account a pain in the ass.
He also whines about these network drivers being installed:
Client for Microsoft Networks, File and Print Sharing, and the QoS Packet Scheduler
But perhaps he assumes everyone has one and only one PC in their home and has no wish to share files between them (yeah right). Oh, and you'd like to take advantage of QoS for VOIP or bandwidth throttling? Forget it if the driver isn't available.
With "genius" insights like these I certainly wouldn't trust this yahoo to install a toaster oven, let alone an operating system.
I can't believe this got published (Score:3, Interesting)
I can't believe they published this bullshit.
Opinion Represented as Fact with a \. Slant... (Score:5, Informative)
L0LZ@Micro$0ft!111!!11oneeleven1!! because your firewall choices and services defaults aren't what I would have picked.
There's still service bloat in XP. There's little doubt about that, but suggesting that you turn off DHCP when 51% of us use broadband? I mean, DHCP only has an effect for people that actually, you know - HAVE A FRICKIN NETWORK CABLE PLUGGED INTO THEM! Can we make an assumption that a pretty fair percentage of people who have network cables plugged into their computer use DHCP? Good lord almighty.
Also, he complains because the service type on most services is set to...
Sure, XPSP2 isn't perfect, but articles like this, these "If I had made it, I'd have made it stupid!" articles - they're just drivel.
Ok, so... (Score:5, Interesting)
Think about it, for a moment. The firewall is blocking internally-generated connections. Which is fair enough. (Though silently dropping would likely have been safer.) However, to lock the machine up, the TCP stack has got to be taking the error as cause to retransmit the packet.
Why am I so certain that this is what's happening? Because Windows has had some degree of preemption for a while. It's not great, but it works. Sort-of. Lock-ups should be next to impossible on a totally pre-emptive OS, as the locked-up program would simply be interrupted. It'd slow the machine down, slightly, but it wouldn't be fatal.
What we're getting here, though, looks like something fouling up big-time in a non-blockable part of Windows. Odds are pretty good that it's the network code. My suspicion is that the TCP stack and firewall are in an unbreakable infinite loop, with the error generated by the firewall causing the TCP code to resend the packet, ad infinitum.
A lot of people have argued that Microsoft isn't to blame for other people's crappy code. Which is fair enough. But they are very much to blame for their own crappy code. If you're going to have non-blockable code (a VERY bad idea!) then you've got to be damn sure that there are no scenarios in which that code will put itself into a spin-dry cycle.
It seems as though Microsoft merely added firewall code, with absolutely no thought as to the possible impact it could have on the rest of Windows.
Further, if my suspicion is correct (and I'm pretty confident it is), then it should be possible to crash any Windows box remotely. Simply generate a packet that Windows cannot reply to. By forcing the TCP stack and the firewall to fight it out, you'd paralyze the machine.
The correct way to handle this kind of situation is to recognise when a connection is administratively prohibited or impossible, and to not keep retrying. You'd then escape out of the non-blockable code, and pre-emption would allow you to continue as normal.
If you want slightly "smarter" behaviour, then if a process repeatedly keeps retrying a connection or activity that is prohibited, every time it gets woken back up, it should drop in priority, be slept a reasonably long time (in the hope the problem can be cleared by then) or get kicked off the system. ("Three strikes and you're out." logic.)
It should absolutely not be possible for any user process, no matter how badly written, to create a situation in which an uninterruptable infinite loop can develop. Either there needs to be some mechanism to interrupt any loop that might be infinite, OR there needs to be a mechanism for recognising when a loop is running unacceptably long.
It's no use Microsoft whining that customers should clean their computers first. That would be like McAffee arguing that you should clean your computer of viruses before running their software. And how are you supposed to do that, if you've no software installed for detecting and/or cleaning the damn things in the first place?
The only way you can know (for certain) that there's nothing trying to access an unauthorised port is by blocking the ports and seeing what happens when you try to use the computer as normal. And the only way you can then do anything about it is if the computer can cope with that situation in a controlled manner.
Busy Work (Score:3, Insightful)
It's a computer for crying out loud! Why can't the process be automated so users can do other things?
Bogus write up by the register (Score:3, Interesting)
The first section of the article goes on to explain how a number of services are left on that "shouldn't be". This is for the most part a subjective rant about services that have traditionally been a source of system compromise. The "Hate On Microsoft" stick was made apparent when the author went so far as to proclaim that the DHCP client service and DNS client service should be off by default, "DHCP Client, automatic. Unnecessary on most home machines. Should be disabled by default. "DNS Client, automatic. Unnecessary on most home machines. Should be disabled by default." that wouldn't be a very useful computer would it? How about hitting up google for an answer to "Why can't I check my mail, browse the web, or do ANYTHING online?" - oh, wait...
Among some of the old favorites that were left on, file and print services made the list. That would be pretty bogus if the system's firewall wasn't turned on by default:
"The new "Windows Firewall" packet filter is turned on by default, finally. However, an exception for Remote Assistance connections is enabled, which is preposterous, although file and printer sharing, and UPnP, are blocked by the firewall as they should be."
Since it's firewalled, it's a non-issue. In fact, most of the article is written as if the system's firewall is not installed. Remote assistance is referenced in almost all of the help documents it would be a pretty bad user experience if you wanted help - but couldn't get it. As far as I can tell there has been no exploit based on this service since the introduction of XP.
Generally speaking unused services should be turned off. The only reasonable way to address this would have been yet another wizard that would ask the user how they use the computer and set services setting accordingly. However, the question of "Is sp2 remotely exploitable out of the box? More to the point is it secure from a network perspective, now and into the future?" The answer to that question is generally yes. Unless there is a nasty buffer overflow of some kind in the firewall (one hasn't been found, not to say it won't) an SP2 box is pretty safe on the network.
Wasn't that the point of SP2?
When evaluating the effectiveness of SP2 the net result needs to be evaluated. Many critics have evaluated the implementation. A lot of people might NOT AGREE with File sharing, RPC, Remote Assistance, or any number of the other services being on by default for that matter, but does it matter from an exploitability perspective? Only if that port is available for remote exploitation -- which is not the case.
Network issues aside, IE and the shell both do a good job of throwing up warning dialogs when the user is about to run an executable. There is also the "Data Execution Prevention" feature that detects when "data" is trying to execute as a program, though for it to work well the hardware has to support non-executable memory regions. Only time will tell how well those measures aid in stopping the propagation of worms.
New PC + SP2 =Broken Pgm (ECDC5) - Dell shines it. (Score:3, Informative)
(We have a need to make saving to CD as simple as a floppy for some elderly folks.)
This one isn't listed on Microsoft's list of SP2 incompatible [microsoft.com] programs [microsoft.com].
Nor is anything mentioned on Roxio's site except people complaining. Roxio is up to version 7 now so you know they say to upgrade, but Dell still ships old v.5 out with new PCs. Go figure
On the contrary (Score:3, Insightful)
Methinks something is borked with this anaylsis. A lot of these services aren't accessible on the boxes I've tested with (both on and off domains).
Security Vs. App Compatibility (Score:3, Insightful)
1 -- "XP SP2 BREAKS TONS OF APPS!!"
Essentially, Windows is *too* secure and now breaks tons of programs -- so don't install it!
2 -- "XP SP2 IS TOTALLY INSECURE!!"
Too many Windows services are on, which means lots of apps -- including harmful ones -- are still able to run, which means XP SP2 is totally insecure -- so don't install it!
You can't have life both ways. Yes, added security will break *some* apps, but most will still work. Yes, it's not as secure as, say, a OpenBSD installation where you turn on one service at a time -- but end-users aren't expected to go through turning on service by service and tweak firewall settings every time they install a new app!!
By the way, for corporate deployments, most of that stuff (services, firewall, etc) can be administrated through Group Policy, anyway, so the default settings apply much more to home users than corporate ones who can pick and choose what services, firewall settings, etc to allow on their Windows PCs.
Windows XP SP2 treats "password" as a special case (Score:4, Interesting)
This is odd. Now, repeat the steps again *after* switching the password from "password" to "test". The results? The login dialog does not report that "test" is an invalid password.
While I am not doing any more debugging of XP for Microsoft (a detail or two might not be 100% correct), what I have seen is enough to make me wince. Microsoft did not test this one well enough.
Note: It may be necessary to have a program running in the admin account to trip up this bug.
DNS Client service - misnamed (Score:3, Insightful)
He's too kind.
They should call it the "DNS on crack" service.
The only reason I can see for it existing is for sites where DNS is non-existent or badly broken, so that names pulled out of WINS, browsing, or by casting entrails or yarrow sticks can be used to let some applications run that would otherwise freak out. The problem is that when you do have working DNS it will, occasionally, freak out and return randomly wrong information.
Unless you're at a small business using a misconfigured Windows-based external firewall AND you're not willing to spring for an Active Directory server, turn this baby off and disable it. You'll be glad you did.
Comment removed (Score:3, Informative)
A cursory inspection of the article yields (Score:5, Insightful)
The service is not enabled... it is in a state where applications that rely on it can start it if its necessary, but that would be performed by the user. Have it not enabled is not a security risk....
I love this service. I love that it is not enabled by default, but must (as above) be initiated by the user. Again, there is nothing wrong having this service in a state where the user can enable it without confusion...
This service is what allows fast-user-switching (multiple console logons w/out logging out). It is an integral part of the XP ui and absolutely should be enabled.
Newsflash -- Windows is not *nix, its user base is not a *nix user base, etc... Excuse the cliche, but "Mom" is not going to login as a "user" then launch setup apps in root/admin context -- this is just not something that "mom" can wrap her head around.
I'm calling bullshit on this one. Pick -- the end user should be smart enough to work in the user context until he/she needs admin access, then they should go use it for that specific context, etc... but they shouldn't know if they trust a site or not? And by default there is nothing in the "trusted" sites list, so the user is going to be prompted for each download attempt. If they don't like the "zones" idea that's fine, but complaining about the implementaion is different from that implementation being unsafe.
More of the same. We get it, you don't like the "zones" thing. There is no difference between what the review wants and what IE already does in this case. There are no trusted sites by default and the user is going to have to go out of his/her way to get some there. If you like reading some activex riddled crap page you should be able to view the site without being bothered every 2 seconds. You have that right.
As a matter of fact, can you imagine the user experience if these setting
This article is just dead wrong. (Score:3, Interesting)
If the past year has proven nothing else, it's that we can't afford to let the Windows masses to have control over their own machines. The paranoid rants of a few slashdotters gave us Blaster, and I really don't think they can be forgiven for that.
Block Windows XP Service Pack 2 (Score:3, Informative)
FUD?? (Score:4, Insightful)
Port 445 (Score:3, Interesting)
Two machines a minute are saying 'Hello' on 445, 95% of my scans are on that Port and it has been left open. Sheesh.
The other unblocked Port where I often saw scans is 135, but the frequency there has dropped almost to zero recently.
Re:News for Nerds but not for Slashdot Nerds (Part (Score:3, Insightful)
Do you actually believe an article that has:
"Microsofties say they were more worried about Linux a few years ago, when it was a truly free program, spreading on its own, from user to user, like a virus."
The author insists on comparing Linux support costs to Windows product costs:
"If the Linux camp simply manages to create an operating system that does roughly what Windows does for roughly the same price, what will be the point?"
The author says the difference between support and the product is "seman
Re:Oh boy an article from the Register! (Score:3, Insightful)
Just because A is insecure and B is insecure does not mean A and B are equal in terms of security.
*gasp* *gasp* *gasp*
Re:Last words on SP2? (Score:3, Informative)
I otherwise agree with most that was written - I totally agree that "less is more" when it comes to security (although there often ends up being hooks for stuff like RPC all over the place) and I couldn't believe it
Re:All I see is Security Center (Score:4, Insightful)
Microsoft as well as Apple and other companies understand more about the average computer user than most other software companies, especially when it comes to these particular rules:
1) 99% of computer users do not know what they are doing
2) People do not read unless they absoletly have to.
3) You must create all user interfaces under the presence of monkey. In other words, if you cant train a monkey to use it then your wasting your time.
The Security center for example, covers all three of these, it basically forces you to read it by prompting non stop, it's easy enough to train a monkey against and even a moron can understand that a big red blinking X covered shield means bad.
Sp2 also brings these concepts to the activeX realm. Spyware becomes almost impossible to install through IE using them most common methods used today. basicially you load a spyware infested page, it then drops down the "oh no this page is downloading activeX" box, forces you to click on it and say download it, Reloads the page again which screws most browser hijacking from occuring because most hijackers don't reload in a browser refresh, then promps you again to make sure you really want to do this.
They know they don't want people downloading this stuff, so they first force you to pay attention and read, then they actually break the #3 rule to purposely make it hard for John Q moron to install the scumware unless he absoletly needs it to survive.
It also has to be noted that the firewall and automatic patching is ON and encouraged to be ON by the security center. regardless of what you think of the firewall it basically stealth's you from the net and it's better than wide open anyday, and if everyone was patching automatically we wouldn't have had half of the infected blaster and sasser systems out there.
SP2 has flaws, basicially a complex virus could easily turn off the firewall, spoof the security center and go insane, but they did some under the hood things to deter rapid spreading and frankly I dont care which operating system your running, If a virus has root, or administrator or whatever is the highest access given by your favorite OS, Your Screwed because it will disable any protection you may have had and hapilly make you and your Net neighbor's life a living hell.
Re:I just don't get it... (Score:4, Insightful)
I think that most of us "in the know" will find that the step was not major, a major step would be to provide a locked down network configuration for XP and not rely on the user turning off services. Rely on the user to enable the services he or she needs, and force all users to run under unprivliged accounts. You are right that *nix is not more secure, its just more secure by default.
Re:Recommendations on speeding up XP (Score:3, Funny)
Attach very long power cord to computer.
Start computer
Gently shove computer, running and attached to long power cord off building.
Using the formula v = (g/c)(1-e^(-tc)) where the constant c is about 0.394 sec^-1, integrating and solving for initial conditions gives you x=[integral] vdt = (g/c)(t + (1/c)(e^(-tc) -1)), your Windows XP machine will be faster than it ever has been before the long power cord disconnects itself.
Dell employees modded me down! LOL! (Score:3, Insightful)