Feeds

Steve Gibson picks a fight with Microsoft and The Register

Loud and security-ignorant the pair of us

  • alert
  • submit to reddit

The Essential Guide to IT Transformation

Security consultant Steve Gibson - whose claims that Microsoft's latest OS, Windows XP, will destabilise the Internet we have covered extensively - has posted another DDoS diatribe following a conference call with the Beast of Redmond's security team.

In an extremely rare occurrence, however, The Register has been clumped with Microsoft and both received a barracking at his hands [isn't that our job? - Ed]. Well, more precisely Thomas C Greene has been clumped with MS.

Claiming that his concerns and complaints about XP have fallen on deaf ears, Steve Gibson states: "and thanks to many other loud and equally security-ignorant voices which are attempting to confuse the industry on this topic, Microsoft shows no intention of responding to this now very visible threat" with part of the text hyperlinked to one of our stories.

Which one? Er, that'll be the "Steve Gibson really is off his rocker" story. This reporter (me) extensively covered Gibson's claims that XP would enable huge denial of service attacks over the Internet due to its implementation of raw sockets.

This will enable hackers to direct spoofed IP packets at particular sites. The theory runs that since XP will have such a huge uptake with technically illiterate people, hackers will be able to load Trojans onto hundreds of machines and then direct them at will. Hence XP will bring down the Net.

Thomas - who does know a thing or two about security - remains utterly unconvinced by this argument however. As he puts it: "malicious kiddies can already take over Windows machines with Trojans like SubSeven and use them for heavy packeting without the owner's knowledge. Raw socket functionality does not in itself make a machine more or less vulnerable to such infection.

"Furthermore, malicious operators can already do heaps of packet damage using Windows clients without spoofing. Gibson is right that spoofing makes packets nearly impossible to filter, but filtering isn't the answer to a severe packet attack, as anyone who's had to deal with one can attest."

In short, Gibson is "talking absolute bollocks".

So, what does Steve have to say about Thomas' comments. Not much, sadly. The inclusion of the story does seem to calm him down however. Starting with a very angry "Microsoft knows nothing about security and are a bunch of idiots" stance, by the time The Register makes an entrance, Steve has put on his reasoned hat and concluded: "Even though perfect security may be - and probably is - impossible to achieve, increasing the difficulty of criminal exploitation is a worthwhile and effective deterrent."

So there you have it. Check it out for yourself here. Ironically, we found out about this latest installment from receiving an email from Steve sent to email group "My press friends". ®

Related Link

Steve Gibson's latest diatribe

Related Stories

Steve Gibson really is off his rocker
Windows XP will make Internet unstable - top security expert
Everything you wanted to know about DDoS attacks
Security expert waves DDoS white flag
Network ICE CTO responds to further BlackICE criticisms
Network ICE hits back over Gibson jibes
Security expert waves DDoS white flag
Everything you wanted to know about DDoS attacks

Build a business case: developing custom apps

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Backing up Big Data
Solving backup challenges and “protect everything from everywhere,” as we move into the era of big data management and the adoption of BYOD.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.