[TriLUG] Fwd: [support] Accountability and possible solutions

David R.Matusiak dave at matusiak.org
Thu Sep 11 16:22:10 EDT 2003


hello Linux Lubbers --  i took a few moments today to address a major 
problem we are seeing on the UNC-Chapel Hill campus (and presumably at 
other institutions).  i thought my note might be of interest to those 
on TriLUG.  any feedback appreciated.

best regards,
dave m.

Begin forwarded message:

> From: "David R. Matusiak" <matusiak at unc.edu>
> Date: Thu Sep 11, 2003  3:51:07  PM US/Eastern
> To: support at listserv.unc.edu
> Cc: "BRM" <midkiff1 at email.unc.edu>
> Subject: Re: [support] Accountability and possible solutions
>
> While I would wholeheartedly echo the sentiments of Bentley Midkiff 
> about making software vendors more accountable for insecure products, 
> I fear that our selfless, heroic governmental representatives are too 
> far in the pockets of big software firms to hear the weak carping of 
> their constituents.  Witness "Shrink Wrap Licensing," UTICA, and the 
> DMCA.  All of these things are designed to protect the profit margins 
> of software corporations while whittling away at the rights and 
> freedoms afforded those that give the corporations money - US, the 
> consumers - each and every one of us.
>
> So I do not think that our efforts are best spent chasing down dirty 
> deals between Washington and Silicon Valley.  Instead I believe that 
> we must fight this approaching menace on the home front.  What is 
> meant by that is that each technology dollar spent (both as 
> individuals and as a university) should be subject to strict review, 
> not only in terms of unit cost economics, but more importantly in 
> terms of the impact that said technology will have on us, our 
> networks, our students and co-workers, and perhaps our careers.
>
> As I read through the summer log of major problems and outages that 
> came across the UNC Support list, I am not so much surprised by what 
> has taken place, but instead bothered by the fact that such limited 
> solutions (if any) have been presented.  Please do not read that as 
> "Certain campus sectors not doing their jobs," because I think that 
> individual departments (especially ATN Networking and Security) are 
> doing excellent jobs.  Considering the magnitude of some of the recent 
> attacks, we should be thankful to have any network connectivity at all 
> -- not to mention such great and available support people.
>
> Instead I want you to consider this one fact - the only advice ever 
> really offered is "Go to Microsoft and apply their patches."  This 
> paltry token is the most that can be offered, however, to those who 
> are running these inherently insecure operating systems.  And we have 
> had reports of responsible admins following this advice and still 
> seeing their machines get infected over and over again.  To further 
> belabor this point, please note this article from eWeek (published 
> yesterday) where the author has the opportunity to point out "Three 
> New Critical RPC Flaws Found" in current Microsoft products.
>
> http://www.eweek.com/article2/0,4149,1261437,00.asp
>
> This is a very sad state of affairs.  Almost two years ago, Bill Gates 
> promised he was pulling engineers away from the development of "new 
> features" in order to shore up the security of their products.  And 
> this summer has shown us all just how much integrity that gesture had. 
>  Week after week, virus and worm activity has skyrocketed and with new 
> exploits coming out regularly, there is no reasonable hope in sight.  
> So I would like to offer some more effective solutions in hopes of 
> improving both network security and End User happiness on the campus 
> here at Carolina.
>
> First and foremost, Rule # 1 should always be to understand the 
> process(es) necessary to keep your machine (or those you are 
> responsible for) patched and secure, both at the OS level and at the 
> application level.  No product is perfect and any device can be 
> dangerous if these vitals are ignored.  You must keep track of these 
> things or we will see more and more problems.  I cannot stress this 
> point enough.
>
> Next on the list would be to rectify misperceptions about "the 
> competition."  Believe it or not, there are actually other companies 
> out there whose primary purpose is to manufacture computer operating 
> systems.  One of the world's largest is our Raleigh neighbor, Red Hat 
> Linux, Inc.  While I would not solely endorse Red Hat above other 
> Linux vendors (mainly a personal preference issue), I do see them 
> doing good things for the software community and users alike.  Perhaps 
> most important amongst the recent improvements in Linux are the "ease 
> of use" factors and auto-updating functions being developed to help 
> both users and administrators alike successfully complete a transition 
> to Linux.  Besides this, we have some of the best LUGs (Linux User 
> Groups) in the country to assist with problems and questions (much 
> like this list does).  There are now very few proprietary application 
> products that have not been either ported to Linux or created anew to 
> draw users who used to say "Well, I need so-and-so and it only runs on 
> Windows 98."  1998 was almost 7 years ago - a lot has changed since 
> then.
>
> Perhaps you have heard of the SCO lawsuit against IBM, in which they 
> are trying to scare users and organizations away from Linux adoption 
> with their FUD (Fear, Uncertainty, Doubt) campaign that insists their 
> Intellectual Property has been infringed by Linux developers.  If 
> rational minds are allowed into the courtroom to testify, this will 
> become clear that SCO has no case and they themselves released and/or 
> jumbled code into Linux with their own Caldera Linux product.  You 
> cannot take back what you have already released under the GPL license. 
>  Sorry SCO, no doughnut.
>
> Still, wise IT managers must keep abreast of these issues and protect 
> their organization from such legal quagmires and threats.  If Linux is 
> not the thing for you, then I would suggest *BSD products (which are 
> all branches of the original Berkeley Software Development UNIX 
> model).  Not only are the best of these products completely FREE, they 
> are also responsible for running most of the powerhouse destinations 
> on the Internet.  FreeBSD, NetBSD and OpenBSD are amongst the most 
> respected and time-trial proven operating systems in the world.  All 
> of these products have just as active and helpful userbase as Linux.  
> You could even go with BSDi if you are in need of corporate-level 
> support.
>
> And my last suggestion is the easiest of all - Macintosh products by 
> Apple Computers, Inc.  The new OS for Mac, dubbed OS X (or OS "Ten"), 
> is itself based upon a Mach kernel derivative of BSD UNIX.  What has 
> this brought to Apple?  Unbelievable stability and all the power of a 
> full-fledged UNIX server.  What has Apple sacrificed to reach this 
> level?  Nothing - all the same plug and play niceness and GUI 
> simplicity is still present, perhaps refined even more over the aging 
> OS 9 that has been phased out.  And for personal computers (as opposed 
> to server hardware), Apple has some of the most durable and functional 
> machines out there today.  Please go take a look at either the RAMs 
> Head Shop or the Apple Store out at Streets of Southpoint.
>
> What we need is a clear and direct cultural shift away from supporting 
> the hegemony of operating systems that is Microsoft.  As outlined 
> above, no product is perfect and all need proper attention.  What is 
> undeniable, however, is the fact that most (if not all) of this nasty 
> virus and worm activity would have nowhere to go if we made this 
> shift.  Its malevolent seed could find no fertile ground for purchase, 
> so to speak.  And then we could all spend more time doing what we are 
> here to do instead of making trouble calls, creating trouble tickets, 
> balking at the hard word of the Networking people, and wondering why 
> we lost all our data or are machine is attacking others on the 
> Internet.
>
> While our RAMs Head Shop claims to be a fully functional Apple 
> reseller and repair shop, I am always more than disheartened when I'm 
> in there and hear a student inquiring about the row of Macs only to 
> have the Store employee say that "they are not supported" and then 
> point them to the back row of IBM/CCI machines.  I think we are doing 
> a major disservice to both our student population and those that have 
> to manage the networks at UNC by denying that other options exist.  I 
> think that we, as a campus, need to reexamine our tight alliances with 
> companies that make inferior and/or insecure products.
>
> Unfortunately, I only just heard of the fact that UNC is in the 
> process of hiring a new Chief Information Officer.  This is THE person 
> involved in making decisions as to the computing future of UNC and the 
> person whom I would like to ask my most difficult and pointed 
> questions, however, the last interview/presentation was on Sept. 8th 
> and I was unable to attend.  I think it is a travesty to continue 
> along the lines of our narrowly focused options for students, faculty 
> and staff alike.  I believe that the apprehension surrounding other 
> options needs to be addressed and vocally challenged by those 
> interested in keeping UNC-Chapel Hill on the cutting edge of 
> technology research and development.
>
> Obviously, a lot more is at stake than cutting down on malicious 
> network activity across our campus.  Losing the right to compare and 
> choose will certainly impair the abilities of our students and it has 
> certainly caused many headaches this summer for the campus support 
> personnel.  Please take a moment and consider some of my suggestions.  
> Also, please understand that I am not in any way paid or endorsed by 
> any of the companies and products I've mentioned above.  I am only 
> trying to put this issue in perspective for those that may not have 
> heard of such alternatives.
>
> Thanks!
> dave m.
>
> On Thursday, September 11, 2003, at 10:27  AM, BRM wrote:
>
>> Support Group:
>>
>> 	Weak admin passwords notwithstanding, does anybody else think
>> Microsoft should be held accountable for the onslaught of viruses, 
>> worms
>> and Trojans that continue to disable networks and drive up the cost of
>> IT? Consider this article, written on 6/30/2003 by Caron Carlson at
>> http://www.eweek.com/article2/0,4149,1141769,00.asp. Here is an
>> excerpt...
>>
>> 	"The greatest threat to the nation's data networks today is not
>> nascent cyber-terrorism lurking in the shadows but rather technology
>> vendors unwilling to invest adequately in security, experts told
>> Congress last week. Increasingly, industry insiders are seeking ways 
>> to
>> make vendors accountable for their products."
>> 	"The CERT Centers at the Software Engineering Institute at
>> Carnegie Mellon University, in Pittsburgh, found that security 
>> features
>> in most products have not improved over the past few years."
>>
>> 	Steve Gibson warned everybody about this potential problem more
>> than two years ago. See http://grc.com/dos/grcdos.htm.
>>
>> 	If MS-Windows were a new car, it would be recalled immediately.
>> Why? Because there would be millions of wrecked vehicles strewn across
>> the landscape.
>>
>> Q: Where does a 50 million dollar gorilla drive?
>> A: Anywhere it wants.
>>
>> Bentley R. Midkiff, B.S., A+
>> Research Technician III
>> Biochemistry & Biophysics
>
> --
> David R. Matusiak
> NC LIVE Systems Admin, UNC-Chapel Hill
> v: 919.962.1288
> f: 919.962.0484
> e: matusiak at unc.edu
> --




More information about the TriLUG mailing list