theweaselking: (Default)
[personal profile] theweaselking
Apple attempts to increase OS market share by shipping iPods with Windows virus set to install as soon as you plug in the device.
As you might imagine, we are upset at Windows for not being more hardy against such viruses, and even more upset with ourselves for not catching it.
Uh, no, you do NOT get to blame Windows for your own incompetence. Deliberately running malware on a Mac is just as damaging as running it on a windows PC - there's just less of it out there because nonstandard interfaces and defective functionality, running on custom hardware, with very little application support, is not and has never been a popular combination.

Worse, they go on to suggest 4 products to clean your system - two of which, Norton AV Trial Edition and McAfee AV Trial, are so intrusive that I would mark them as viruses myself. If you pay for them every time they demand money, they work. If you don't, you can almost never get rid of them completely.

(no subject)

Date: 2006-10-17 11:17 pm (UTC)
From: [identity profile] zenten.livejournal.com
Deliberately running malware on a Mac is just as damaging as running it on a windows PC - there's just less of it out there because nonstandard interfaces and defective functionality, running on custom hardware, with very little application support, is not and has never been a popular combination.

That's bullshit. Before OS 10, macs were rife with viruses. Now pretty much the only viruses you're going to find on a mac are macroviruses targeting microsoft office products. That's with many more macs on the market now than there were then.

Not saying that they were dumb with the ipod issue mind you.

(no subject)

Date: 2006-10-17 11:17 pm (UTC)
From: [identity profile] zenten.livejournal.com
And by were dumb I mean wern't dumb.

(no subject)

Date: 2006-10-17 11:20 pm (UTC)
From: [identity profile] scifantasy.livejournal.com
You know, there was an .exe file on my iPod when I plugged it in, and I think it was RafMon, at that. Of course, it didn't run, and I deleted it...

(no subject)

Date: 2006-10-17 11:32 pm (UTC)
From: [identity profile] theweaselking.livejournal.com
Notice how I didn't say "viruses", I said "deliberately run malware".

Which is what this supposed virus is: Something that can't hurt you if you don't run it. Of course, most idiots have their computers set to run everything automatically...

(no subject)

Date: 2006-10-17 11:34 pm (UTC)
From: [identity profile] zenten.livejournal.com
Ah. Is this piece of malware something that would affect multiple users on the same machine, or just the user that runs it?

(no subject)

Date: 2006-10-17 11:42 pm (UTC)
From: [identity profile] zenten.livejournal.com
Ok, read through the description on what this does, and you're sort of right, a program like this could exist on a mac, although it wouldn't work with the defaults for the OS, and would be stupidly easy to get rid of (just move the program into the trash).

(no subject)

Date: 2006-10-17 11:53 pm (UTC)
From: [identity profile] theweaselking.livejournal.com
OSX is a GUI on top of a unix-alike.

It's trivially easy to hook yourself into unix clones so deeply that you can never be removed without a complete wipe, if you have root access.

The kind of person who gets this virus is the kind of person who runs things while logged in to an admin account, which, on both debian and MacOS, means that any program you run can steal root access from there.

And once it's in, you're never getting it out. When you can't trust ls any more, you're fucked. Wipe and restore from a hopefully clean backup.

(no subject)

Date: 2006-10-17 11:56 pm (UTC)
From: [identity profile] zenten.livejournal.com

The kind of person who gets this virus is the kind of person who runs things while logged in to an admin account, which, on both debian and MacOS, means that any program you run can steal root access from there.


This is the step I'm sceptical about, when it comes to MacOS.

(no subject)

Date: 2006-10-17 11:56 pm (UTC)
From: [identity profile] zenten.livejournal.com
In that it will be able to get root access from the admin account.

(no subject)

Date: 2006-10-18 12:01 am (UTC)
From: [identity profile] anivair.livejournal.com
Ahh. the root access is the trick. Any unix-alike worth it's salt will prompt for a root password before it can do that. And unless you're a complete tard, you'll wonder why it's asking. If you don't wonder that enough to look into it, then no ammount of virus protection can help you.

But that doesn't excuse them from sending it. I'm not sure I'm willing to believe they did it on purpose as a company, but that doesn't mean someone didn't do it on purpose.

(no subject)

Date: 2006-10-18 12:02 am (UTC)
From: [identity profile] anivair.livejournal.com
It can't do that on a debian ystem. Debian runs root access of sudo, so it will prompt you for the password. You'd have to be stupid enough to enter it without having run anything.

(no subject)

Date: 2006-10-18 12:03 am (UTC)
From: [identity profile] theweaselking.livejournal.com
It's a known exploit, since april 2003.

Run malware as admin. It stays resident and does nothing except set itself to start automatically if you reboot, if it can.

It watches /var/log.

When you use sudo, it shows in /var/log
It runs sudo after you, giving root access without requiring a password.

(no subject)

Date: 2006-10-18 12:04 am (UTC)
From: [identity profile] theweaselking.livejournal.com
It's a known exploit, since april 2003.

Run malware as admin. It stays resident and does nothing except set itself to start automatically if you reboot, if it can.

It watches /var/log.

When you use sudo, it shows in /var/log
It runs sudo after you, giving root access without requiring a password. After all, sudo works without a password for 5 minutes.

(no subject)

Date: 2006-10-18 12:05 am (UTC)
From: [identity profile] theweaselking.livejournal.com
> Ahh. the root access is the trick. Any unix-alike worth it's salt will
> prompt for a root password before it can do that

Unless you've used sudo in the last five minutes, and given it your password so it can do what you told it to.

In which case sudo doesn't require a password.

(no subject)

Date: 2006-10-18 12:06 am (UTC)
From: [identity profile] zenten.livejournal.com
Actualy, I just remembered John's right. On OS 10.x, using sudo does not require any password.

(no subject)

Date: 2006-10-18 12:07 am (UTC)
From: [identity profile] zenten.livejournal.com
Ok, this makes me happy that I reconfigured sudo then :)

But it does prove your point.

(no subject)

Date: 2006-10-18 12:21 am (UTC)
From: [identity profile] anivair.livejournal.com
That's true. But you still need to give it root access. In the end it comes down to knowing what you install. Sure, I can write malware that loks great and con you into installing it, but that's what malware is. Which is why you should be extremely careful about what you install.

In this particular case, It's really a noissue. If you use the debian repositiries to maintain a system, as is recommended, then all the checing has been done for you (and if something happens to get through, usually the fix will be done for you as well).

Granted, by that note you're still right that this is apple's fault. But I would be mightily suspicious of any instance where i plugged in my ipod and it asked me for root.

(no subject)

Date: 2006-10-18 12:23 am (UTC)
From: [identity profile] anivair.livejournal.com
really? Wow. That's crap. I conceed the stupidity just based off that.

If a user wants to set sudo to not prompt for a password (as I have on some of our smaller servers that don't connect to the net at work) that's one thing, but if that's the default, that's really silly.

(no subject)

Date: 2006-10-18 12:25 am (UTC)
From: [identity profile] zenten.livejournal.com
Yup, or at least it is on my sisters 10.3 machine (I know she didn't change it, since she didn't even know what a command prompt was).

(no subject)

Date: 2006-10-18 02:26 am (UTC)
ext_12920: (Default)
From: [identity profile] desdenova.livejournal.com
*blink* It does on my machine, running OS 10.3.9, and has in every previous 10.x version I've used.

(no subject)

Date: 2006-10-18 04:02 am (UTC)
ext_189560: (Default)
From: [identity profile] nubule.livejournal.com
Before OS 10, macs were rife with viruses.
They existed, but ‘rife’ is definitely not the best word.

(no subject)

Date: 2006-10-18 04:02 am (UTC)
ext_189560: (Default)
From: [identity profile] nubule.livejournal.com
Reprehensible.

(no subject)

Date: 2006-10-18 09:49 am (UTC)
From: [identity profile] sebkha.livejournal.com
So, if unix-alikes are trivially easy to compromise, what do you recommend for an un-administered domestic computer?

(no subject)

Date: 2006-10-18 09:52 am (UTC)
From: [identity profile] sebkha.livejournal.com
From the manpage:
If the invoking user is
root or if the target user is the same as the invoking user, no pass-
word is required. Otherwise, sudo requires that users authenticate
themselves with a password by default (NOTE: in the default configura-
tion this is the user's password, not the root password). Once a user
has been authenticated, a timestamp is updated and the user may then
use sudo without a password for a short period of time (5 minutes
unless overridden in sudoers).

(no subject)

Date: 2006-10-18 11:05 am (UTC)
From: [identity profile] zenten.livejournal.com
Odd. I'm not sure how to explain that then.

Still, the timestamp thing is still an issue, as is pointed out there.

(no subject)

Date: 2006-10-18 01:22 pm (UTC)
From: [identity profile] theweaselking.livejournal.com
For the record: they're harder to compromise than Windows running as Administrator. They're just not impossible to compromise, and if you run malware that you get from the internet, your OS is irrelevant. You'll get malware on your machine.

And what I recommend is either knowing what you're doing, or running day-to-day in a non-Admin account, switching to Administrator or sudo-capable or Root only when you specifically need to use those commands.

For the truly computer-illiterate, for whom switching accounts is complicated, I recommend having them use XP for ease of support, setting the system up to patch itself and run a good virus scanner constantly, disabling IE and Outlook/Outlook Express, and training them to never, ever run *anything* that they receive in email or from the internet.

(no subject)

Date: 2006-10-18 04:56 pm (UTC)
From: [identity profile] mazarinade.livejournal.com
Fixed in recent versions, I understand, and trivially easy to fix if you have an older version.

(no subject)

Date: 2006-10-18 11:19 pm (UTC)
From: [identity profile] eukarya.livejournal.com
Almost opposite, in fact. I'm not denying they had viruses or other problems back then (every operating system has its own set of flaws), but I think I would of had a more enjoyable computer experience if I had a Mac way back instead nine years ago.

(no subject)

Date: 2006-10-18 11:48 pm (UTC)
From: [identity profile] corruptedjasper.livejournal.com
So we've gone from OhMyGodzTheExploitz! to 'dangerous if you happen to be a fucktard right at the point when you happen to have used sudo within five minutes'.

The people who automatically click on that sort of thing are *not* the people who use sudo on a regular, let alone frequent, basis. You don't actually need sudo access except for a very very few things.

(no subject)

Date: 2006-10-19 02:06 am (UTC)
From: [identity profile] theweaselking.livejournal.com
No, we've gone from "with root access, you're fucked just as badly as Windows" to "the machine sits in memory and steals root access the next time you use it, even after a reboot, and you don't have to open a window and type "sudo" because the machine helpfully sudo's the necessary commands itself, and just demands a password."

The program stays in memory and watches /var/log, where your use of sudo is recorded - so the next time you do *anything* requiring sudo, your machine is fucked.

Assuming, of course, that you're not running as root all the time.

(no subject)

Date: 2006-10-19 03:32 am (UTC)
From: [identity profile] mcfnord.livejournal.com
CA's EZ Antivirus is free for a half a year I think.

(no subject)

Date: 2006-10-19 03:58 pm (UTC)
From: [identity profile] corruptedjasper.livejournal.com
'running as root all the time'? I didn't see that option anywhere in my admittedly just a few hours of noodling around with OS X. I've never heard anyone say it was even possible, either. The only way to even get a root prompt, AFAICT, is sudo su at a text console. Not something the people we're concerned with would do.

Also, that exploit was apparently fixed, according to the guy a bit further up.

In other words, basically, you're looking like a rabid MS apologist for suggesting that you're usually just as fucked with a 'nix as with windows.

Incidentally, let's get back to the incident.. how do these things happen? Well, they happen because the master disk for one of the disk replication devices became infected. Which means it's not even apple making the error, it's their manufacturer (Foxconn, IIRC) in China, or possibly even the supplier of the hard drives (I'm not sure *where* the disks get the FS loaded onto them). Sure, they should have caught it a bit sooner, maybe.. but catching it before the ipods entered the retail stream would be practically impossible.

Profile

theweaselking: (Default)theweaselking
Page generated Mar. 2nd, 2026 05:10 pm