The macosxhints Forums

The macosxhints Forums (http://hintsforums.macworld.com/index.php)
-   The Coat Room (http://hintsforums.macworld.com/forumdisplay.php?f=8)
-   -   IS OSX more secure to spyware than windows 7? (http://hintsforums.macworld.com/showthread.php?t=112875)

tlarkin 08-09-2010 10:33 AM

Quote:

Originally Posted by Anti (Post 590794)
Someone made the argument that Dell is nothing, their computers are just comprised of components manufactured by other companies, and it's only a brand.

Doesn't matter, Dell has poor choice of these "other manufacturers".

Uh so is Apple. They don't make components. In fact for a long time Asus was making all of Apple's logic boards. Probably still are.

fracai 08-09-2010 12:35 PM

Quote:

Originally Posted by tlarkin (Post 592369)
Uh so is Apple. They don't make components.

Except for the A4 in the current iPhones (and iPad?). And all the R&D that they put into developing new hardware designs and components. The actual manufacturing of those components may be performed by other companies, but Apple tech is far more than just other's components.

Several of their old inkjet printers were indeed just re-branded HP DeskJets.

tlarkin 08-09-2010 01:24 PM

Quote:

Originally Posted by fracai (Post 592391)
Except for the A4 in the current iPhones (and iPad?). And all the R&D that they put into developing new hardware designs and components. The actual manufacturing of those components may be performed by other companies, but Apple tech is far more than just other's components.

Several of their old inkjet printers were indeed just re-branded HP DeskJets.

So does HP and everyone else. They have engineers design the hardware to specification and then hand those specs to a company like Asus and they manufacture the parts. If you crack open a HP computer you will see that Asus silk screen stamp on the boards, and it is a board you cannot buy retail.

The only real difference is that Apple definitely has their "own way," of engineering their products, and they also write all the software for it. Where as HP is purely hardware and they have other companies code software for their product.

I was a warranty repair tech for years for a company that did consumer and business sales of technology. We did all the warranty work for our clients. I have probably done hardware repair on over 20,000 machines in my life time. No company actually make parts. They provide specifications to the manufacturers that make them. They may specify I want this type of capacitor, this type of resistor, and this type of wiring, but they don't actually make anything tangible. They do it through CAD-like programs to engineer hardware components.

You crack open an Apple product you will see LG, Hitachi, and Asus stamped all over their parts. I will say that no one designs anything like Apple. They are definitely unique, but higher quality of components is a very moot argument. They all use the same components. I can't tell you how many HDs I have fail every week in our macbooks here at work.

fracai 08-09-2010 02:09 PM

Absolutely.

But, the point being made was that Dell is a brand slapped on top of commodity components that they've assembled, but had no part in designing. Apple and, as you point out, many others have a hand in the design of those components.

No one is saying that Apple is designing and manufacturing their own hard drives, RAM, LCDs, etc. Or even manufacturing their own motherboards. The claim was that Dell doesn't do either. (Though I'd be marginally surprised if even the motherboards were COTS.)

Plus, it's an incredible stretch to claim that the A4 or Unibody case and manufacturing process aren't "Apple's" own components.

tlarkin 08-09-2010 02:19 PM

Quote:

Originally Posted by fracai (Post 592409)
Absolutely.

But, the point being made was that Dell is a brand slapped on top of commodity components that they've assembled, but had no part in designing. Apple and, as you point out, many others have a hand in the design of those components.

No one is saying that Apple is designing and manufacturing their own hard drives, RAM, LCDs, etc. Or even manufacturing their own motherboards. The claim was that Dell doesn't do either. (Though I'd be marginally surprised if even the motherboards were COTS.)

Plus, it's an incredible stretch to claim that the A4 or Unibody case and manufacturing process aren't "Apple's" own components.

I wasn't counting cosmetic parts. Like I said, Apple engineers their products in their own unique way, but the actual components are the same as any other computer. Whether or not Apple hardware engineers are better and making combination of specifications work better on a greater scale compared to any other major manufacturer is probably up for debate.

I am biased though, and have been repairing all sorts of electronics for years (11 years now to be exact) and I have seen many models of many different manufacturers have high failure rates. I can think of 4 different models of Macs in the past 6 years I'd never own due to their rate of hardware failure.

I think Apple makes a great product, and I think their laptops are the best out there period. Having owned, repaired, maintained, and given tech support for every major brand of laptop, the Macbook Pro is currently my favorite. It is also, I think, the best laptop I have ever owned. It is a work horse. However, on a component level it is the same as every other laptop out there. The design makes up some of the differences and the engineering. However, as far as parts go, it has the same "guts," as every other laptop out there. That is a fallacy in logic many people have when looking at Apple products. It is a sales pitch I often hear that is totally incorrect is all. Many companies have the same business model as Apple when it comes to hardware design. However, I think Apple does the design part a lot better. Apple also puts in tons of "little things," that make an overall big difference.

A mac is a tool just like a PC. you use your tools to get the task done. Different tools for different jobs, and different people prefer different tools.

To be honest the era of the virus is probably gone. Most malicious attacks use user interactions, since they are now the weakest link in security of a computer user.

I also think Apple has a higher quality control, when releasing their products (minus the iPhone thing, and a few models of macs that were very prone to fail) and if you buy 2nd or 3rd generation of a model of a Mac, it is going to be solid. Just try not to buy 1st gen stuff is my advice.

fracai 08-09-2010 02:53 PM

Since when is the A4 a cosmetic part?

tlarkin 08-09-2010 02:59 PM

Quote:

Originally Posted by fracai (Post 592417)
Since when is the A4 a cosmetic part?

I meant the unibody case for cosmetic part:D The A4 I believe is manufactured by Samsung, so it sort of falls under what I have been saying. Though, the A4 is completely designed by Apple as far as I can tell. I haven't read too much into it. ARM architecture though was not designed by Apple.

fracai 08-09-2010 03:18 PM

You're splitting hairs.

The original claim was that Dell simply slaps a label on commodity hardware.
You said Apple does the same because they don't make their own components. I take it you were arguing the manufacturing quality point more than the in house component development?
I think there's quite a bit of difference between assembling COTS components and putting R&D into new technology, even if that technology is eventually built by other companies.

If you're talking about the physical build quality, sure, technology is pretty advanced and everybody generally makes quality products with the occasional bad batch, design flaw, etc. In that sense, Apple is going to sometimes run into the same problem that Dell might, when quality control fails to catch manufacturing defects.

Just as users, to bring this back to spyware, are a greater threat than is the OS.

sojourner 08-10-2010 12:31 AM

Granted, this article isn't about Windows 7 per se, but I found it fairly informative: Is Windows inherently more vulnerable to malware attacks than OS X?

Spoiler: the answer is yes.

renaultssoftware 08-10-2010 07:49 AM

"Launchd."

SirDice 08-10-2010 08:27 AM

Quote:

Originally Posted by sojourner (Post 592470)
Granted, this article isn't about Windows 7 per se, but I found it fairly informative: Is Windows inherently more vulnerable to malware attacks than OS X?

Spoiler: the answer is yes.

Spoiler: the admin doesn't know what the hell he's doing.

Quote:

On August 13 at 3:04 AM, a Windows server that I've been running for all of two weeks--it just replaced an Xserve G5--was attacked by a new strain of malware.
Ah. Dumbass forgot to install the latest patches.

Quote:

The only victim requirement is that a Windows system--client or server from 2000 and XP on up, 32 and 64-bit--be on an Internet-accessible IP address and listening for socket requests to the Windows Server service.
No admin in their right mind would do such a stupid thing.

Quote:

All Windows background processes/daemons are spawned from a single hyper-privileged process and referred to as services.
All *nix processes/daemons are spawned from a single hyper-privileged process called init. What's the difference?

Quote:

By default, Windows launches all services with SYSTEM-level privileges.
Wrong. Even in the W2000/XP days.

Quote:

The activity of SYSTEM is next to impossible to control or log.
Wrong.

Quote:

Most of the code running on any Windows system at a given time is related to services, most or all of which run with SYSTEM privileges, therefore
Wrong. Even in the W2K/XP days.

Quote:

Successful infection of running Windows software carries a good chance of access to SYSTEM privileges.
Wrong because of the bad assumption everything runs as SYSTEM.

Quote:

Windows buries most privileged software, service executables and configuration files in a single, unstructured massive directory (SYSTEM32) that is frequently used by third parties.
True but MS doesn't advise third parties to do that. They do that on their own accord. That's hardly MS's fault.

Quote:

Windows will notify you on an attempt to overwrite one of its own system files stored here, but does not try to protect privileged software.
Wrong. Probably never heard of Windows File Protection. OS-X certainly doesn't protect anything.

Quote:

Microsoft does not sign or document the name and purpose of the files it places in SYSTEM32
Wrong, everything is signed.

Quote:

Windows has no equivalent to OS X's bill of materials, so it cannot validate permissions, dates and checksums of system and third-party software.
There's no need for it. And why would Windows check third-party software?

Quote:

Windows requires that users log in with administrative privileges to install software, which causes many to use privileged accounts for day-to-day usage.
Yes, that's how it's supposed to work, except using privileged accounts for d2d usage. On the other hand OS-X allows admin users to add applications to /Applications without authentication. And that's supposed to be better?

Quote:

Windows requires extraordinary effort to extract the path to, and the files and TCP/UDP ports opened by, running services, and to certify that they are valid.
It's freaking easy to do. Never heard of netstat?

Quote:

Microsoft made it easy for commercial applications to refuse a debugger's attempt to attach to a process or thread.
Not really.
Quote:

Attackers use this same mechanism to cloak malware. A privileged user must never be denied access to a debugger on any system. My right to track down malware on my computers trumps vendors' interests in preventing piracy or reverse-engineering. Maintaining that right is one of the reasons that open source commercial OS kernels are so vital.
Go blame the DMCA.

Quote:

Access to the massive, arcane, nearly unstructured, non-human-readable Windows Registry, which was to be obsolete by now, remains the only resource a Windows attacker needs to analyze and control a Windows system.
Yes. And plists and dictionaries are sooo much easier. NOT.

Quote:

Another trick that attackers learned from Microsoft is that Registry entries can be made read-only even to the Administrator, so you can find an exploit and be blocked from disarming it.
Taking ownership of the key resets the ACL. Big deal.

Quote:

Malicious code or data can be concealed in NTFS files' secondary streams. These are similar to HFS forks, but so few would think to look at these.
Yes, because secondary streams shouldn't be needed. And it's actually a feature to make Windows servers more Mac friendly!

Quote:

One of the strongest tools that Microsoft has to protect users from malware is Access Control Lists (ACLs), but standard tools make ACLs difficult to employ, so most opt for NTFS's inadequate standard access rights.
They are not difficult to employ. They are however difficult to understand by a n00b sysadmin. I'd say get some training!

Quote:

Why this can't happen under OS X:

• OS X has no user account with privileges exceeding root.
You don't need anything exceeding root. Root can do everything. Try keeping root out of something. It's rather easy to block access to administrators on Windows.

Quote:

Unlike services.exe, launchd executes daemons and scheduled commands in a shell that's subject to login scripts, environment variables, resource limits, auditing and all security features of Darwin/OS X.
Wrong, services.exe has absolutely no problems running services on different accounts with different profiles/logins/resource limits/whatever.

Quote:

Apple's daemons have man pages, and third parties are duty-bound to provide the same. Admins also expect to be able to run daemons, with verbose reporting, in a shell for testing.
Go visit MSDN.

Quote:

OS X Man pages document daemons' file dependencies, so administrators can easily rework file permissions to match daemons' reduced privileges.
Unless the man page is out of date or otherwise incomplete (it happens).

Quote:

Launchd can tripwire directories so that if they're altered unexpectedly, launchd triggers a response.
Windows File Protection

Quote:

If an attacker takes over a local or remote console, any effort to install software or alter significant system settings cannot proceed without entering the administrator's user name and password, even if the console is already logged in as a privileged user. In other words, even having privileges doesn't ensure that even an inside hacker can arrange to keep them.
Wrong on so many levels I don't even know where to begin.

Quote:

OS X has a single console and a single system log, both in plain text.
Which is easily edited/modified/deleted by anyone with enough privileges.

Quote:

Every installed file is traceable to a bill of materials that can verify that the file is meant to exist, and that it and all of its dependencies match their original checksums. Mac users, back up and protect your Receipts folder!
Another lovely file that can easily be modified/deleted by an attacker.

Quote:

The directories used to hold OS X's privileged system executables are sacred. Anything new that pops up there is immediately suspect.
And how many people will actually know what's supposed to be in there so they can detect what's new?

Quote:

OS X does not require that a user be logged in as an administrator to install software.
And how does this increase security?

Quote:

The user or someone aiding the install needs to know the name and password of a local administrative user to complete the install.
Not always.

Quote:

On a network, most software is installed using Remote Desktop, an inexpensive Systems Management Server-like console.
Great, same as on Windows.

Quote:

The UNIX/POSIX API, standard command-line tools and open source tools leave malware unable to hide from a competent OS X administrator.
Very, very wrong. Guess where 'rootkits' started and guess why they're called "root" kits? Exactly, the technique originated on Unix.

Quote:

It takes a new UNIX programmer longer to choose an editor than it does to write a console app that walks the process tree listing privileged processes
It's also fairly trivial to write something that doesn't show up in that list. It's also trivial to hook the APIs needed to get that info. This can be used to hide processes and other things.

Quote:

Likewise, OS X Server will image any Mac client or server's local drives and maintain safe copies that can be used not only for restoration, but which can be booted from to guarantee that there's no trace of infection.
Unless the infection went unnoticed for some time. Rendering all your backups useless.


The clueless moron does nothing but spread false and inaccurate information.

Craig R. Arko 08-10-2010 11:03 AM

For my nickel, from the day they decided to put the Window Manager and the GDI into Ring 0 (in NT 4, via the Win32 API, done so the graphics performance could equal DOS and surpass OS/2), Microsoft was walking down the malware path.

GDI+ has improved on this, and DWI further, by catching up with the hardware and making it do more of the work. But since the legacy code is still there they have had to jump through a lot of extra hoops to deal with it, and finally Windows 7 has pushed all the GDI-related code into software abstracted rendering only.

Apple did not make that choice, and as a consequence the gaming performance of Mac OS X has suffered, but many other headaches have been avoided.

There are very sound historical reasons that things have turned out the way they are.

Feel free to Google up a storm for references; you can start here.

And then compare it with the XNU kernel of Mac OS X, perhaps starting here.

Apple (and NeXT) had the benefit of seeing other peoples' mistakes. ;)

renaultssoftware 08-10-2010 11:14 AM

Quote:

Originally Posted by SirDice (Post 592506)
The clueless moron does nothing but spread false and inaccurate information.

Change some words and that looks like a ton of proverbs: "a fool spreads folly"

And I thought the file Lock (uchg) from Terminal kept root out too.

SirDice 08-10-2010 11:42 AM

Quote:

Originally Posted by renaultssoftware (Post 592523)
And I thought the file Lock (uchg) from Terminal kept root out too.

Nope, root can set that flag but it can also be removed again.

Code:

dice@lady3jane:~/test%ls -alO
total 0
drwxr-xr-x  2 dice  dice  -  68 Aug 10 17:47 .
drwxr-xr-x+ 50 dice  dice  - 1700 Aug  4 21:47 ..
dice@lady3jane:~/test%touch test
dice@lady3jane:~/test%chflags uchg test
dice@lady3jane:~/test%ls -alO
total 0
drwxr-xr-x  3 dice  dice  -    102 Aug 10 17:47 .
drwxr-xr-x+ 50 dice  dice  -    1700 Aug  4 21:47 ..
-rw-r--r--  1 dice  dice  uchg    0 Aug 10 17:47 test
dice@lady3jane:~/test%sudo su -
lady3jane:~ root# cd /Users/dice/test/
lady3jane:test root# ls -alO
total 0
drwxr-xr-x  3 dice  dice  -    102 Aug 10 17:47 .
drwxr-xr-x+ 50 dice  dice  -    1700 Aug  4 21:47 ..
-rw-r--r--  1 dice  dice  uchg    0 Aug 10 17:47 test
lady3jane:test root# chflags nouchg test
lady3jane:test root# ls  -alO
total 0
drwxr-xr-x  3 dice  dice  -  102 Aug 10 17:47 .
drwxr-xr-x+ 50 dice  dice  - 1700 Aug  4 21:47 ..
-rw-r--r--  1 dice  dice  -    0 Aug 10 17:47 test
lady3jane:test root# rm test
lady3jane:test root# ls -alO
total 0
drwxr-xr-x  2 dice  dice  -  68 Aug 10 17:48 .
drwxr-xr-x+ 50 dice  dice  - 1700 Aug  4 21:47 ..
lady3jane:test root#


biovizier 08-10-2010 12:13 PM

Also note that in 10.5 (I don't know about 10.6), even the 'schg' and 'sappnd' flags can be unset by "root", without booting into "single-user mode" because 10.5 runs at a lower "securelevel" than in the past (you can bump it back up if you are aware of the need to).

It's funny because the author of the article gushes about Apple's documentation, yet where did Apple document this significant change to the treatment of these flags, to warn admins that might be using them as a part of their security strategy?

tlarkin 08-11-2010 10:27 AM

Quote:

Originally Posted by biovizier (Post 592536)
Also note that in 10.5 (I don't know about 10.6), even the 'schg' and 'sappnd' flags can be unset by "root", without booting into "single-user mode" because 10.5 runs at a lower "securelevel" than in the past (you can bump it back up if you are aware of the need to).

It's funny because the author of the article gushes about Apple's documentation, yet where did Apple document this significant change to the treatment of these flags, to warn admins that might be using them as a part of their security strategy?

You know what? I feel the same way. I read through the Directory Services book for the ACSA certs, and thought I had a pretty good understanding of how Directory Services works. Then I have an issue an use Apple Enterprise support and we are running commands involving slapd, slurp, and taking peeks at all these combined services and files under-the-hood the book never touches on. I think I learned more from that enterprise support call than I did reading the book.

Some of the Apple specific manuals for their specific Unix binaries are unclear or perhaps even completely lacking at times.

While, I think Apple makes a great product, in fact it is my favorite commercial OS, I do think they are lacking in some areas. Security documentation is one of them. I usually read the NSA security guides and try to teach my users best practices when using their computers.

I however, have yet to see, any OS X servers infected due to lack of security patches or documentation that a sys admin may over look. Apple keeps it simple on the top level, so sys admins of OS X server usually have simple set ups. The more you complicate it, the bigger security risk you are taking, in my opinion.

SirDice 08-11-2010 10:36 AM

These days it's not the server itself that gets attacked, it's the (web) applications that are running on it that are the most vulnerable. Web applications like CMS or forum software regularly have big holes in them. Custom made web applications are even worse.

Usually those servers are infected in such a way that it doesn't 'damage' the server. However any unsuspecting (windows) user that browses to that site gets a crap load of malware installed. Sure, it's mainly windows users that get attacked this way but there's no reason why a similar attack vector couldn't also attack Mac users. There are plenty of bugs to exploit.

And yes, I agree. Documentation is sparse. Especially good, detailed, technical, information.

tlarkin 08-11-2010 11:24 AM

Quote:

Originally Posted by SirDice (Post 592655)
These days it's not the server itself that gets attacked, it's the (web) applications that are running on it that are the most vulnerable. Web applications like CMS or forum software regularly have big holes in them. Custom made web applications are even worse.

Usually those servers are infected in such a way that it doesn't 'damage' the server. However any unsuspecting (windows) user that browses to that site gets a crap load of malware installed. Sure, it's mainly windows users that get attacked this way but there's no reason why a similar attack vector couldn't also attack Mac users. There are plenty of bugs to exploit.

And yes, I agree. Documentation is sparse. Especially good, detailed, technical, information.


Yeah I agree with you. However, some things aren't necessarily the fault of Apple and Microsoft. Some of them are the fault of whatever web based product or API, or application they are using. Java is filled with security holes that only Java can fix.


All times are GMT -5. The time now is 02:32 AM.

Powered by vBulletin® Version 3.8.7
Copyright ©2000 - 2014, vBulletin Solutions, Inc.
Site design © IDG Consumer & SMB; individuals retain copyright of their postings
but consent to the possible use of their material in other areas of IDG Consumer & SMB.