Feeds

Reg readers sabotage their Windows boxes

And we made them do it

  • alert
  • submit to reddit

Mobile application security vulnerability report

We now know first-hand why, say, an electric hand mixer needs a warning label advising users to switch it off before licking icing from the beaters.

We recently ran a detailed article describing the default insecurity of a Windows XP Pro box with SP2 installed, and produced a long list of Windows features, components, and services that we believe should be disabled by default.

Note that there is a crucial difference between saying that Windows should ship with X features off, and saying that, if you find X feature running, you should immediately panic and turn it off yourself. Some things need to be enabled for other things to work, and your system's dependencies will vary widely according to how you connect to the Internet, which applications you run, what you actually do with your machine, and so on.

Our point was - and remains - that it is the box's owner who should enable the needed services, features, and components, not Microsoft (or Dell, or HP, etc). And we faulted Microsoft for making this business entirely too difficult for the average user to accomplish.

Nevertheless, Reg readers have, in rather large numbers, been dutifully going through our list of questionable features and services, disabling everything in sight, and innocently sabotaging their Windows boxes.

We beg you to stop.

The article was a critique of a single, deliberately stripped-down, stand-alone test system - probably very different from yours - as well as a critique of Microsoft's enduring feature-rich efflorescence. It was NOT a practical guide to hardening a Windows system. This is why we didn't include instructions: to discourage inexperienced users from tinkering and blowing up their systems. Unfortunately, many of you did. (There is a tech manual available that provides the instructions, caveats, and background information needed to harden - that is, to simplify - a Windows or Linux system without unpleasant surprises.)

Blaming the victim

Some readers, and quite reasonably if incorrectly, faulted us for expecting users to enable services and features that they may need, but may not understand, and may have great difficulty controlling. In a sense, we were 'blaming the victim' for not knowing how to run Windows safely on the internet, and for expecting users to sort things out for themselves.

This is a very important point, but we believe that the fault lies with Windows' many confusing, and varied, GUI system configuration interfaces. If secure system configuration is currently too difficult for most users to achieve, then we believe that Microsoft should put serious effort into making it far, far easier.

We believe in particular that the Services configuration interface is far too difficult for most home users to handle (and for too many professional admins, for that matter), yet we wish that Microsoft would ship Windows with most of its networking-related services disabled. This is not as contradictory as it might appear. It should not be at all difficult to enable only the networking services and components that one needs.

For example, Microsoft could make much better use of its GUI setup 'wizards' by tying them to services and networking components.

Let's consider DNS. The setup 'wizard' could, if it were designed properly, ask whether the user 1. wants to specify the DNS servers they'll use, or 2. get DNS automatically from their ISP, or 3. have no idea what this puzzling question implies. The first option would bring users to the TCP/IP settings, where they could specify the DNS servers they wish to use. The second and third options would enable the DNS client. How hard is that?

Carry that idea forward, and you can see that Microsoft could do a great deal to ensure that only the networking components and services that one needs will be installed and enabled.

Again, for example, instead of installing and enabling file and print sharing by default, the 'wizard' could ask if the computer will be providing these services to, or demanding these services from, other machines on the local network. It could then install and enable what's needed, and no more. Installing Windows would take longer, and it would become more interactive, requiring some actual user attention and input, all right, but that's a very small price to pay for significantly enhanced security.

But instead, by default, Microsoft installs and enables almost everything that a user might need.

DNS blues

Nothing attracted more, or ruder, flames than our contention that the Windows DHCP and DNS clients should be disabled by default.

As usual, those commentators who were most sure of themselves were also those most mistaken. We were, however, lectured numerous times, with emphatic all caps, multiple exclamation points, and profanity, that it is "IMPOSSIBLE!!!!" to connect to the internet without the DNS and DHCP clients, "YOU FU**ING MORON!!!!"

It should surprise no one to learn that it's quite easy to connect to the internet without the Windows DHCP and DNS clients. You simply enter an IP address for the box, a subnet mask, and a gateway (e.g., your router), and choose a DNS server or two, in your TCP/IP advanced settings. It's hardly brain surgery.

But why would you want to shut them off? Surely they're not dangerous; they're clients, after all. We heard this many times.

This comes down to being proactively defensive. It is always wise to turn off any service that you don't need or intend to use - and this goes for *nix as well. We know of no current exploits against either client mentioned, but if one should be developed tomorrow, people not using these services will not be affected. We recall that everyone thought DCOM was a harmless little gimmick - until the Blaster worm struck. But people who had DCOM turned off were blithely unaware of it.

No one can say which Windows component will be attacked next with some worm; therefore, it is only prudent that you should not run any feature, component, or service that you don't need. Fewer routes to exploitation, and fewer potential routes, means more fun and less trouble for you. Period.

Erratum

Our previous list of candidate services that should be shipped disabled included one very big blunder. We said that the "Remote Access Connection Manager" should be disabled. In fact, many users will need it. We meant to say that the "Remote Access AUTO Connection Manager" should be disabled. That was a careless space-out. We apologize.

Up next

Many readers faulted us for testing SP2 with Win XP Pro, and then bitching about how difficult it is for home users to configure it for decent security. Actually, we happen to know that XP Pro and XP Home are virtually identical in their dangerous feature richness, but we feel that it's only fair to test an XP Home system with SP2, just as we did with XP Pro, and compare the results. We will post our finding soon. Stay tuned. ®

Thomas C Greene is the author of Computer Security for the Home and Small Office, a comprehensive guide to system hardening, malware protection, online anonymity, encryption, and data hygiene for Windows and Linux.

Related Stories

WinXP SP2 = security placebo?
Windows XP SP2 features security crater - report
XP SP2 über patch already needs fixing
200 apps clash with XP SP2
WinXP SP2: stop moaning and get downloading

The Power of One Infographic

More from The Register

next story
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
KDE releases ice-cream coloured Plasma 5 just in time for summer
Melty but refreshing - popular rival to Mint's Cinnamon's still a work in progress
NO MORE ALL CAPS and other pleasures of Visual Studio 14
Unpicking a packed preview that breaks down ASP.NET
Cheer up, Nokia fans. It can start making mobes again in 18 months
The real winner of the Nokia sale is *drumroll* ... Nokia
Put down that Oracle database patch: It could cost $23,000 per CPU
On-by-default INMEMORY tech a boon for developers ... as long as they can afford it
Another day, another Firefox: Version 31 is upon us ALREADY
Web devs, Mozilla really wants you to like this one
Google shows off new Chrome OS look
Athena springs full-grown from Chromium project's head
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Securing Web Applications Made Simple and Scalable
Learn how automated security testing can provide a simple and scalable way to protect your web applications.