Feeds

Steve Gibson really is off his rocker

Sorry y'all....

  • alert
  • submit to reddit

Secure remote control for conventional and virtual desktops

My recent column ridiculing security specialist Steve Gibson's claim that raw-socket functionality slated for Windows XP is a major threat attracted more flames than I can hope to post on this page.

Briefly, Gibson predicts that the ability of XP's raw sockets to send and forward spoofed packets will result in massive denial of service attacks which no one will be able to stop. I say he's loopy.

Most e-mail critics claimed that I'd missed Gibson's central point, which is that XP boxes will be used as "zombies" (as the half-tech press likes to call infected clients) to forward packets from a malicious operator, because I'd written:

We'll allow that there'll be a few s'kiddies who might prefer to use their Win-XP boxes for such purposes. But they can already do so simply by installing Linux and doing a bit of reading.

Apparently, many failed to read further, because in the next paragraph I did recognize the "zombie" potential:

There will also be more Windows clients available for malicious misuse as XP grows in popularity; but one can already do heaps of packeting from Windows machines with SubSeven, and even launch the attack in bulk from IRC.

Of course I dismissed Gibson's exaggerated concerns about it:

The boxes will eventually be found because their IPs are traceable, and admins will contact the owners and let them know they're infected -- but only long after the damage is done. Raw sockets in XP only marginally improve the situation for a malicious party.

Perhaps my phrasing wasn't quite transparent enough - so let me spell it out clearly this time: Steve Gibson is talking absolute bollocks.

Here's why:

As I pointed out in the previous article, malicious kiddies can already take over Windows machines with Trojans like SubSeven and use them for heavy packeting without the owner's knowledge. Raw socket functionality does not in itself make a machine more or less vulnerable to such infection.

Furthermore, malicious operators can already do heaps of packet damage using Windows clients without spoofing. Gibson is right that spoofing makes packets nearly impossible to filter, but filtering isn't the answer to a severe packet attack, as anyone who's had to deal with one can attest.

The real solutions to packeting are capital intensive, like load balancing and content distribution. Unfortunately, they're quite expensive solutions, and few besides well-heeled commercial entities can afford to put them to use.

Gibson learned that much for himself the hard way; he finally had to cry uncle to a thirteen-year-old packeteer named "Wicked", even though the kid tormenting him wasn't using compromised boxes capable of sending spoofed packets. Nevertheless Gibson - a security expert - couldn't make it stop.

Gibson's attempts at filtering were rarely more than briefly effective and caused him and his ISP days of exasperation, according to his own account. So if packeting without spoofing is already brutally effective, why does he insist that the inability to filter XP-forwarded packets will lead to an Internet melt-down?

Because he's loopy, that's why.

Gibson is ranting as if raw sockets are going to multiply the number of infected machines connected to the Internet. But that simply isn't true; the same primary obstacle to getting an attack started remains, spoofing or none, as Microsoft pointed out in their well-reasoned reply to Gibson: an attacker first has to compromise a number of client machines with which to packet the target system.

Let's say just for fun that there's a consistent number of infected Windows machines x on the Net. There's nothing in Gibson's reckoning which affects that number. There's nothing in Windows-XP that affects it, and nothing in raw sockets either. We still have x victims out there.

We've seen from Gibson's account that dealing with a packet attack in the absence of spoofing is a ghastly pain. I allow that the spoofing potential of XP raw sockets will make it somewhat more of a pain, but a bit worse than horrible is nothing to shriek about.

In spite of Gibson's paranoid three-storey-tall red lettering and multiple exclamation points and bold-bordered tables, nothing in XP is going to increase the number of infected victims.

He shows contempt for Windows users, assuming they're all complete idiots (presumably with the circular argument that they must be morons because they're using Windows), and strongly implies that they can only hurt themselves with a fully-featured OS.

Gibson writes it in giant letters:

When those insecure and maliciously potent Windows XP machines are mated to high-bandwidth Internet connections, we are going to experience an escalation of Internet terrorism the likes of which has never been seen before.

Madness writ large. The man seriously needs a holiday. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
The Return of BSOD: Does ANYONE trust Microsoft patches?
Sysadmins, you're either fighting fires or seen as incompetents now
Munich considers dumping Linux for ... GULP ... Windows!
Give a penguinista a hug, the Outlook's not good for open source's poster child
Intel's Raspberry Pi rival Galileo can now run Windows
Behold the Internet of Things. Wintel Things
Linux Foundation says many Linux admins and engineers are certifiable
Floats exam program to help IT employers lock up talent
Microsoft cries UNINSTALL in the wake of Blue Screens of Death™
Cache crash causes contained choloric calamity
Eat up Martha! Microsoft slings handwriting recog into OneNote on Android
Freehand input on non-Windows kit for the first time
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.