Reg readers sabotage their Windows boxes

And we made them do it

  • alert
  • submit to reddit

The Power of One Brief: Top reasons to choose HP BladeSystem

We now know first-hand why, say, an electric hand mixer needs a warning label advising users to switch it off before licking icing from the beaters.

We recently ran a detailed article describing the default insecurity of a Windows XP Pro box with SP2 installed, and produced a long list of Windows features, components, and services that we believe should be disabled by default.

Note that there is a crucial difference between saying that Windows should ship with X features off, and saying that, if you find X feature running, you should immediately panic and turn it off yourself. Some things need to be enabled for other things to work, and your system's dependencies will vary widely according to how you connect to the Internet, which applications you run, what you actually do with your machine, and so on.

Our point was - and remains - that it is the box's owner who should enable the needed services, features, and components, not Microsoft (or Dell, or HP, etc). And we faulted Microsoft for making this business entirely too difficult for the average user to accomplish.

Nevertheless, Reg readers have, in rather large numbers, been dutifully going through our list of questionable features and services, disabling everything in sight, and innocently sabotaging their Windows boxes.

We beg you to stop.

The article was a critique of a single, deliberately stripped-down, stand-alone test system - probably very different from yours - as well as a critique of Microsoft's enduring feature-rich efflorescence. It was NOT a practical guide to hardening a Windows system. This is why we didn't include instructions: to discourage inexperienced users from tinkering and blowing up their systems. Unfortunately, many of you did. (There is a tech manual available that provides the instructions, caveats, and background information needed to harden - that is, to simplify - a Windows or Linux system without unpleasant surprises.)

Blaming the victim

Some readers, and quite reasonably if incorrectly, faulted us for expecting users to enable services and features that they may need, but may not understand, and may have great difficulty controlling. In a sense, we were 'blaming the victim' for not knowing how to run Windows safely on the internet, and for expecting users to sort things out for themselves.

This is a very important point, but we believe that the fault lies with Windows' many confusing, and varied, GUI system configuration interfaces. If secure system configuration is currently too difficult for most users to achieve, then we believe that Microsoft should put serious effort into making it far, far easier.

We believe in particular that the Services configuration interface is far too difficult for most home users to handle (and for too many professional admins, for that matter), yet we wish that Microsoft would ship Windows with most of its networking-related services disabled. This is not as contradictory as it might appear. It should not be at all difficult to enable only the networking services and components that one needs.

For example, Microsoft could make much better use of its GUI setup 'wizards' by tying them to services and networking components.

Let's consider DNS. The setup 'wizard' could, if it were designed properly, ask whether the user 1. wants to specify the DNS servers they'll use, or 2. get DNS automatically from their ISP, or 3. have no idea what this puzzling question implies. The first option would bring users to the TCP/IP settings, where they could specify the DNS servers they wish to use. The second and third options would enable the DNS client. How hard is that?

Carry that idea forward, and you can see that Microsoft could do a great deal to ensure that only the networking components and services that one needs will be installed and enabled.

Again, for example, instead of installing and enabling file and print sharing by default, the 'wizard' could ask if the computer will be providing these services to, or demanding these services from, other machines on the local network. It could then install and enable what's needed, and no more. Installing Windows would take longer, and it would become more interactive, requiring some actual user attention and input, all right, but that's a very small price to pay for significantly enhanced security.

But instead, by default, Microsoft installs and enables almost everything that a user might need.

DNS blues

Nothing attracted more, or ruder, flames than our contention that the Windows DHCP and DNS clients should be disabled by default.

As usual, those commentators who were most sure of themselves were also those most mistaken. We were, however, lectured numerous times, with emphatic all caps, multiple exclamation points, and profanity, that it is "IMPOSSIBLE!!!!" to connect to the internet without the DNS and DHCP clients, "YOU FU**ING MORON!!!!"

It should surprise no one to learn that it's quite easy to connect to the internet without the Windows DHCP and DNS clients. You simply enter an IP address for the box, a subnet mask, and a gateway (e.g., your router), and choose a DNS server or two, in your TCP/IP advanced settings. It's hardly brain surgery.

But why would you want to shut them off? Surely they're not dangerous; they're clients, after all. We heard this many times.

This comes down to being proactively defensive. It is always wise to turn off any service that you don't need or intend to use - and this goes for *nix as well. We know of no current exploits against either client mentioned, but if one should be developed tomorrow, people not using these services will not be affected. We recall that everyone thought DCOM was a harmless little gimmick - until the Blaster worm struck. But people who had DCOM turned off were blithely unaware of it.

No one can say which Windows component will be attacked next with some worm; therefore, it is only prudent that you should not run any feature, component, or service that you don't need. Fewer routes to exploitation, and fewer potential routes, means more fun and less trouble for you. Period.


Our previous list of candidate services that should be shipped disabled included one very big blunder. We said that the "Remote Access Connection Manager" should be disabled. In fact, many users will need it. We meant to say that the "Remote Access AUTO Connection Manager" should be disabled. That was a careless space-out. We apologize.

Up next

Many readers faulted us for testing SP2 with Win XP Pro, and then bitching about how difficult it is for home users to configure it for decent security. Actually, we happen to know that XP Pro and XP Home are virtually identical in their dangerous feature richness, but we feel that it's only fair to test an XP Home system with SP2, just as we did with XP Pro, and compare the results. We will post our finding soon. Stay tuned. ®

Thomas C Greene is the author of Computer Security for the Home and Small Office, a comprehensive guide to system hardening, malware protection, online anonymity, encryption, and data hygiene for Windows and Linux.

Related Stories

WinXP SP2 = security placebo?
Windows XP SP2 features security crater - report
XP SP2 über patch already needs fixing
200 apps clash with XP SP2
WinXP SP2: stop moaning and get downloading

Using blade systems to cut costs and sharpen efficiencies

More from The Register

next story
Apple fanbois SCREAM as update BRICKS their Macbook Airs
Ragegasm spills over as firmware upgrade kills machines
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
NO MORE ALL CAPS and other pleasures of Visual Studio 14
Unpicking a packed preview that breaks down ASP.NET
Captain Kirk sets phaser to SLAUGHTER after trying new Facebook app
William Shatner less-than-impressed by Zuck's celebrity-only app
Cheer up, Nokia fans. It can start making mobes again in 18 months
The real winner of the Nokia sale is *drumroll* ... Nokia
EU dons gloves, pokes Google's deals with Android mobe makers
El Reg cops a squint at investigatory letters
Chrome browser has been DRAINING PC batteries for YEARS
Google is only now fixing ancient, energy-sapping bug
prev story


Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.