Feeds

Steve Gibson picks a fight with Microsoft and The Register

Loud and security-ignorant the pair of us

  • alert
  • submit to reddit

The Power of One eBook: Top reasons to choose HP BladeSystem

Security consultant Steve Gibson - whose claims that Microsoft's latest OS, Windows XP, will destabilise the Internet we have covered extensively - has posted another DDoS diatribe following a conference call with the Beast of Redmond's security team.

In an extremely rare occurrence, however, The Register has been clumped with Microsoft and both received a barracking at his hands [isn't that our job? - Ed]. Well, more precisely Thomas C Greene has been clumped with MS.

Claiming that his concerns and complaints about XP have fallen on deaf ears, Steve Gibson states: "and thanks to many other loud and equally security-ignorant voices which are attempting to confuse the industry on this topic, Microsoft shows no intention of responding to this now very visible threat" with part of the text hyperlinked to one of our stories.

Which one? Er, that'll be the "Steve Gibson really is off his rocker" story. This reporter (me) extensively covered Gibson's claims that XP would enable huge denial of service attacks over the Internet due to its implementation of raw sockets.

This will enable hackers to direct spoofed IP packets at particular sites. The theory runs that since XP will have such a huge uptake with technically illiterate people, hackers will be able to load Trojans onto hundreds of machines and then direct them at will. Hence XP will bring down the Net.

Thomas - who does know a thing or two about security - remains utterly unconvinced by this argument however. As he puts it: "malicious kiddies can already take over Windows machines with Trojans like SubSeven and use them for heavy packeting without the owner's knowledge. Raw socket functionality does not in itself make a machine more or less vulnerable to such infection.

"Furthermore, malicious operators can already do heaps of packet damage using Windows clients without spoofing. Gibson is right that spoofing makes packets nearly impossible to filter, but filtering isn't the answer to a severe packet attack, as anyone who's had to deal with one can attest."

In short, Gibson is "talking absolute bollocks".

So, what does Steve have to say about Thomas' comments. Not much, sadly. The inclusion of the story does seem to calm him down however. Starting with a very angry "Microsoft knows nothing about security and are a bunch of idiots" stance, by the time The Register makes an entrance, Steve has put on his reasoned hat and concluded: "Even though perfect security may be - and probably is - impossible to achieve, increasing the difficulty of criminal exploitation is a worthwhile and effective deterrent."

So there you have it. Check it out for yourself here. Ironically, we found out about this latest installment from receiving an email from Steve sent to email group "My press friends". ®

Related Link

Steve Gibson's latest diatribe

Related Stories

Steve Gibson really is off his rocker
Windows XP will make Internet unstable - top security expert
Everything you wanted to know about DDoS attacks
Security expert waves DDoS white flag
Network ICE CTO responds to further BlackICE criticisms
Network ICE hits back over Gibson jibes
Security expert waves DDoS white flag
Everything you wanted to know about DDoS attacks

The Power of One eBook: Top reasons to choose HP BladeSystem

More from The Register

next story
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
BMW's ConnectedDrive falls over, bosses blame upgrade snafu
Traffic flows up 20% as motorway middle lanes miraculously unclog
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.