Understanding Microsoft's Linux code shocker

July 21, 2009

Microsoft dropped a mini-bombshell on Monday, announcing that it is contributing thousands of lines of code for inclusion in Linux.

But lest anyone think Microsoft suffered a massive head trauma over the weekend, the code it is releasing isn't really about helping Linux compete better with Microsoft. The drivers are really geared at making Windows a better host for Linux.

"The Linux device drivers we are releasing are designed so Linux can run in enlightened mode, giving it the same optimized synthetic devices as a Windows virtual machine running on top of Hyper-V," Tom Hanrahan, director of Microsoft's Open Source Technology Center, said in a statement. "Without this driver code, Linux can run on top of Windows, but without the same high performance levels."

As noted by CNET Blog Network writer Matt Asay, Microsoft is releasing three drivers for Linux under the GPL that governs Linux.

Although Microsoft has released open-source code in the past, the company has generally favored licenses other than the GPL. That said, the GPL is the way into the Linux kernel and Microsoft wants this code in Linux.

In an article on its press Web site, Microsoft acknowledged the departure. The company has also been going after Linux for years, both on the marketing and legal fronts.

"Today, in a break from the ordinary, Microsoft released 20,000 lines of device driver code to the Linux community," Microsoft said. "The code, which includes three Linux device drivers, has been submitted to the Linux kernel community for inclusion in the Linux tree."

The move comes at a time of mixed signals from Redmond when it comes to Linux. Microsoft has said that the browser-based versions of Office, which are due out next year as part of Office 2010, will support Firefox, bringing at least a portion of Office to Linux for the first time.

It has also made peace with a number of Linux companies, most notably a 2006 pact with Novell, but has continued to rattle its legal saber at those with whom it has not struck patent deals.

After years of making claims that many Linux implementations violate Microsoft patents, Microsoft finally took a case to court in February, filing suit against navigation systems maker TomTom.

The two sides later settled, but the settlement left many unanswered questions and Microsoft hasn't said if it will take similar action against other companies.

Although the latest move is clearly designed to bolster Windows as a hosting environment for servers running both Linux and Windows, to me there is something slightly discordant about adding code to something you feel is already infringing on your intellectual property. Perhaps, though, that's just the very definition of co-opetition.

Microsoft is in an interesting position--seeking to compete with Linux while also understanding that many companies run both operating systems. Not only is it about making its business customers happy, but there is good money to be made by owning the management and virtualization layers, even if there is some Linux running atop Microsoft's stack.

For those that want to hear Microsoft's take on the news, here's a video of Hanrahan discussing the move with Sam Ramji, the company's senior director of platform strategy. (Note: Silverlight is required.)

Get Microsoft Silverlight

 

Linux exploit gets around security barrier

July 21, 2009

A security researcher has released zero-day code for a flaw in the Linux kernel, saying that it bypasses security protections in the operating system.

The source code for the exploit was made available last week by researcher Brad Spengler on the Dailydave mailing list. According to the researcher, the code exploits a vulnerability in Linux version 2.6.30, and 2.6.18, and affects both 32-bit and 64-bit versions. The 2.6.18 kernel is used in Red Hat Enterprise Linux 5.

The exploit bypasses null pointer de-reference protection in the mainline kernel, which could allow an attacker to gain root control of a system, Spengler wrote.

It also uses arbitrary code execution to disable security features such as auditing, Security-Enhanced Linux (SELinux), AppArmor and Linux Security Module, while making the applications running outside the kernel believe that SELinux is still operating.

In the notes for his source code, Spengler said the exploit is strengthened if SELinux is applied to the operating system. SELinux is a set of modifications that can be applied to the kernel to harden it, by providing a set of security policies.

"Having SELinux enabled actually weakens system security for these kinds of exploits," he wrote.

Security training organization the Sans Institute called the exploit "fascinating." In a blog post on Friday, Sans Institute incident handler Bojan Zdrnja said that the exploit uses the Linux compiler to overcome the security features.

"The compiler will introduce the vulnerability to the binary code, which didn't exist in the source code," wrote Zdrnja. "This will cause the kernel to try to read/write data from 0x00000000, which the attacker can map to userland--and this finally pwns the box."

In his notes on the source code, Spengler said that a workaround would be for administrators to compile the kernel with fno-delete-null-pointer-checks.

 

Symbian admits Trojan slip-up

July 18, 2009

The Symbian Foundation has acknowledged that its process for keeping malicious applications off Symbian OS-based phones needs improvement, after a Trojan horse program passed a security test.

The botnet-building Trojan, which calls itself "Sexy Space," passed through the group's digital-signing process, Symbian's chief security technologist Craig Heath said Thursday. Heath said the group is working on improving its security-auditing procedure.

"When software is submitted, we do try to filter out the bad eggs," Heath told ZDNet UK. "When apps are submitted, they are scanned. We are looking at how they could be scanned better."

Developers must submit the mobile applications they build to the Symbian Foundation for checking for the applications to be accepted by handsets with the Symbian operating system. Once the submission has been accepted, the applications are digitally signed by Symbian. Digital signatures, which are cryptographic security features, are designed to provide an amount of assurance that software for download comes from a trusted source.

The first stage of Symbian's signing process, antivirus scanning, is done automatically using an antivirus engine. Once an application has been submitted and scanned, random samples are then submitted for human audit.

In the case of the low-risk Sexy Space Trojan, which was disguised as a legitimate application called ACSServer.exe, the Trojan had not been subjected to human scrutiny, Heath said.

The Symbian Foundation became aware that Sexy Space was a Trojan two weeks ago, and the signature was revoked then, Heath said. However, an error on Symbian's servers meant the application was available for download until this week.

On the Symbian Signed Web site, the group's antivirus-scanning provider is identified as Finnish company F-Secure. Mikko Hyppönen, F-Secure's chief research officer, told ZDNet UK on Friday that the malware authors had probably tested their Trojan against the F-Secure antivirus engine to circumvent security measures.

"Virus writers scan their malware, and keep modifying it until it passes the filters," Hyppönen says. "Obviously, the signing process can be and has been circumvented."

Symbian uses graded signing processes for mobile applications, according to Hyppönen. The Sexy Space malware went through its express signing process, which is designed for freeware. "It shows the express signing process is not foolproof, but it's still much better than the apps not being signed at all," Hyppönen said.

Symbian is in the process of upgrading its automated scanning processes, Heath said, adding that human auditing is also going to be improved. However, human auditing will probably not be expanded, as this introduces cost and time delays into the process, he said.

The group is looking to automate more of the work involved in publishing applications. "Today, most of the processes behind (Symbian) require manual tasks," the organization said in a blog post on the launch of its new Symbian Horizon program. "Our goal for the near future is to develop a system that will automate this work allowing us to scale the program to include as many apps as possible."

The Symbian Horizon program intends to select applications submitted by developers and then support them through their development and submission to mobile app stores. Symbian said that one of the aims of Horizon was to automate the publication of apps as far as possible.

 



Best Communitation Website
Which communication website is best?

Myspace
Facebook
Twitter
Furry-paws
Youtube


Make a free website with Yola