<$BlogRSDUrl$>

Monday, May 26, 2003

Tail between My Legs: MSFT vs. Linux

OK. I have made several mistakes and the general thrust of much of what Thom says is correct. That said, I will not cede the point that I believe at some level MSFT must have the ability to be or become more secure than Linux. In my earlier argument, I made several errors about the relative security of MSFT web servers versus Linux servers. I have recently completed an updated analysis that compares an estimate of the proportion of MSFT vs. Linux web servers and the proportion of MSFT vs. Linux web defacements. By comparing these figures, I was hoping to discover empirically whether MSFT or Linux was relatively more secure. As part of the analysis, I developed a simple quantification of Linux and MSFT's relative lack of security. I defined security weakness factor (SWF) as SWF = SWD / SS, where SWD = share of total web defacements and SS = share of total web servers. The higher the SWF score, the worse the security. I retrieved data on web defacements from Attrition and data on web servers from The Internet Operating System Counter. I have copied below the spreadsheet I used to perform the calculations.

Attrition Share of Total Web Defacements by OS, selected months in 2000 and 2001

 


















































































































































































































Jun-00

Jul-00

Aug-00

Sep-00

Oct-00

Nov-00

Dec-00

Jan-01

Feb-01

Mar-01

Apr-01

May-01

Totals

Windows (NT + 2000)

245

263

219

181

321

472

465

537

440

515

1028

930

5616

Linux (all varieties)

53

95

219

189

152

147

89

310

335

250

274

102

2215

Others

81

41

104

106

100

103

129

50

73

122

244

105

1258

Totals

379

399

542

476

573

722

683

897

848

887

1546

1137

9089

                         


Jun-00

Jul-00

Aug-00

Sep-00

Oct-00

Nov-00

Dec-00

Jan-01

Feb-01

Mar-01

Apr-01

May-01

Totals

Windows (NT + 2000)

65%

66%

40%

38%

56%

65%

68%

60%

52%

58%

66%

82%

62%

Linux (all varieties)

14%

24%

40%

40%

27%

20%

13%

35%

40%

28%

18%

9%

24%

Others

21%

10%

19%

22%

17%

14%

19%

6%

9%

14%

16%

9%

14%

Totals

100%

100%

100%

100%

100%

100%

100%

100%

100%

100%

100%

100%

100%

                         

 


 



Internet Operating System Counter, April of 1999
Windows 24.40%
Linux 28.50%

Relative Insecurity Levels of Windows and Linux
Windows 2.53
Linux 0.86

As you can see, Linux appears to be more secure by a factor of roughly 3x. However, I should caveat that the operating system counter statistics are from April of 1999 and the web defacement statistics are from mid-2000 to mid-2001. That said, assuming that Linux has not achieved a 3x advantage in share of web servers, it is likely still more secure.

Now that I have conceded this point, I would like to address a few of Thom's arguments and then conclude. Thom makes an interesting but ultimately flawed "good eyes" versus "bad eyes" argument. Thom admits that a key variable for his model is the number of crackers and percentage of users who actually read the code. However, these variables, while important, are not in my view the most important. I would wholeheartedly agree with Thom that there are likely more "good eyes" as he claims than "bad eyes"--(see Thom I am optimistic!). However, I think that a debate about these variables fundamentally misses the problem with open source. I find it hard to believe that "bad eyes" looking at open source code are equally effective in creating security breaches in open source as the "bad eyes" looking at closed source are in creating security breaches in closed source code. The crux of my argument is that "bad eyes" get a lot of good and useful information for their cracking endeavors by looking at the source code of an OS. Stated differently, my point is that "bad eyes" attacking Linux are likely more effective than "bad eyes" attacking MSFT. Now, I could be wrong since it appears from my argument above that Linux is currently more secure than MSFT. Thom does briefly address this point by saying that such tools as hex editors and reverse compilers might level the playing field between crackers attacking closed source and crackers attacking open source. However, I think that most everybody would agree, Thom included, that using reverse compilers and hex editors is much more painstaking, complicated, and error-ridden process than is simply looking at the source code.

I grant Thom his argument on repair. I think it is fundamentally correct that repairs likely occur more quickly in Linux than they do in MSFT. I also operated under an incorrect assumption in my previous argument that Linux was not the OS of choice for large scale corporations on key servers. I am now increasingly aware of the fact that my assumption is likely false. So I agree with Thom. As my statistics above reveal, more web servers as of late 1999 ran Linux than MSFT. Though I am not totally sure what is going on at the largest corporations (where presumably security efforts receive more budget funding), I would assume that Linux has a larger share than MSFT. On the ethical question Thom raised, I will have to address that later.

Now, how could I believe that MSFT might have the potential to become more secure when the data reveal that it is currently quite a bit less secure? There are several reasons that this might be the case. It could be the case that crackers are much more more likely to attack MSFT servers than Linux servers. For example, perhaps crackers feel some kind of loyalty toward open source for their own cultural reasons or perhaps they simply despise MSFT for their own cultural reasons. It could also be the case that the types of sites that crackers want to crack happen to run MSFT more frequently than Linux. This might be the case if sites that have valuable data or information typically run MSFT. Finally, it could be the case that there are security relationships between the server market (where MSFT and Linux have roughly equal market share) and the client market (where MSFT clearly dominates) that make crackers want to attack MSFT servers more. For example, it may be possible to crack an MSFT server and then exploit this weakness to distribute an e-mail virus to a larger group of MSFT client computers.

However, I will grant Thom that it might simply be the case that there are inherent net security benefits to open source over closed source. I still doubt it but if the analysis I performed above continues to show MSFT at such a security disadvantage in say 2-3 years, I may have to cede the point entirely.

On a side note, Gartner released a survey in 2001 that said that 45% of new server shipments were MSFT and only 25% were Linux. The survey also concluded that Linux remains an option for those companies seeking a "lower cost alternatives" to MSFT. Gartner also said that it "does not predict any massive groundswell of support for Linux that would have any serious impact on Windows server market share." Statements like the latter require some justification. However, this data is pregnant with hermeneutic possibilities. Despite our quibble about security, is Linux ever more than a "low cost" alternative to MSFT? Will it every have a serious impact on MSFT? Perhaps it already has in that Windows has publicly addressed it as a threat. But is this simply lip service? Questions for another day.


# posted by VR Founder : 9:20 AM

Wednesday, May 21, 2003

[Note: this rebuttal was written in response to Jeron's post of May 20 (and its subsequent edit). It does not explicitly address his post of May 21st, which essentially concurs with my analysis of the CERT advisories from 2002 & 2003.]

First, let me make clear that this discussion is focusing on the issue of security. I dispute Jeron's claims that Microsoft has advantages in "customer support, installed base and ongoing innovation," but that's a whole 'nother argument.

That said, Jeron's speculation about security in Microsoft software is based on a flawed premise. I admit that common sense seems to suggest that "security through obscurity," as it's commonly called, is stronger than open-source security. The most important lesson I learned in college, though, was to reject common sense when it is contradicted by evidence.

Before I explain why I believe that Linux will win the security wars (or at least, why Microsoft won't), I need to clear away Jeron's flawed analogies. First, Jeron claims that gaurding source code is like the US Government's restrictions on DES exports. Jeron assumes, without support, that the government made the right decision, even though they have since greatly relaxed the restrictions after DES's shortcomings were demonstrated by white-hat crackers (without the source code). Second, Jeron compares sharing source code to publishing missle defense plans on the Internet. Personally, I don't think that's such a bad idea. The system doesn't work, and maybe the Europeans can help us fix it.

With the analogies (somewhat summarily) dismissed, let's look at the facts. While this is an admittedly unscientific study, I spent a little time last night surfing the website of CERT--one of the largest computer security incident response teams. Since January 2002, CERT has issued 50 advisories. Of those 50 advisories, 12 affect significant Microsoft software components and 13 affect standard Linux systems. (These numbers do not include holes in MS's services, such as the well publicized holes in Passport and Hotmail.) So, Microsoft and Linux have had an essentially equal number of vulnerabilities discovered in the past year and a half. If Jeron suggests that Microsoft's numbers are high due to their supposed greater adoption, he must also conceed that Linux's open source code should generate more reports from benign inspectors.

Let's discuss that for a minute. There's a famous, and reasonably accurate, statement that in open source systems, "with many eyes, all bugs are shallow." The idea is that the more people who look at your source code, the more likely they are to find the errors in it. With a closed source development model, like Microsoft's, the only eyes are the original developers and perhaps an internal auditing team. In the open source development model, all users are potential eyes. Of course, Jeron agrees with the "potential eyes" idea; it's a core component of his argument, since among those potential eyes are those seeking to do ill.

And so, the argument between security through openness and security through obscurity becomes one of optimism vs pessimism. Let's take an imaginary product with 10 developers, 100,000 users and 500 crackers--people who will try to break the system. Let's say, furthermore, that if the system is open source, 1% of the legitimate users will actually read the source code (or hire someone to read it). So, in the closed source model the system has 10 "good eyes," the developers, and 500 "bad eyes," the crackers. The "bad eyes" don't have access to the source code, but they have access to the Internet, to packet sniffers, to hex editors, and to reverse compilers. In the open source model the system has 1000 "good eyes," the developers and 1% of the users, for those 500 "bad eyes." The two key variables in this model are the number of crackers and the percentage of users who will actually read the code. If you believe that there are more benign code readers than malicious ones, open source seems to make sense. If you're paranoid that the world is out to get you, then maybe it is best that you keep your secrets close to your chest.

Another benefit of OSS is speed of repair. I don't have statistics, but very often the person who finds an exploit in OSS will also submit a patch fixing the problem. Microsoft actually has a bug in NT that they have publicly stated they will not fix, and at least one of the CERT advisories from last year still contained the message that Microsoft would reply when they'd finished a security audit.

Jeron argues that "[OSS security benefits are] largely relevant to small and medium-sized enterprises." I don't understand this statement. Does he mean to suggest that large corporations are not susceptible to "worms, etc?" I think that the IT departments of most Fortune 500 companies wouldn't brush off the cost and effort involved in fighting the Code Red worm. If instead, he means that Microsoft is less susceptible to carefully planned and directed attacks, such as from corporate espionage, I rebut with two points. First, the computers of large corporations run the same services as small--web servers, remote login, virtual private networks, etc--and those web services are the doors through which all Internet-based attacks must come. That's just the way computers work. Second, it ignores statements by many professional (ex-)crackers that the weakest link for a targeted attack is user error and poor user training: misconfiguration, improper updating of compromised code, users with poor passwords or the improper control of passwords and security information.

I've neglected four aspects to this argument, but in the interest of space I'll only touch on them briefly. First, I've left untouched the ethical questions of open vs closed source. I'm not a huge proponent of the so-called moral argument for open source, but I do believe OSS is morally preferable in security applications. Second, Jeron argues that Microsoft is a common target for crackers because "such a large portion of the installed base runs on MSFT." What installed base it that? While MS has a strong grip on the desktop market, it's claim to the server market is relatively weak. In Netcraft's Web Server Survey for April 2003, they found that over twice as many web sites run the open source Apache than MS's IIS. While we can't assume that all Apache servers are running on an open source operating system, Apache itself is OSS; it is clear that neither Microsoft nor any other closed-source competitor dominates this market. Third, I've set aside Jeron's argument (since removed) that "as open source becomes more established much of the entrepreneurial spirit of the contributors will be dampened." I think this is another argument for another day. It can be included in my model above, though, by decreasing over time the percentage of users who read the code. How fast should it decrease? I don't know; are you an optimist or a pessimist?

For another look at open- vs closed-source development, see "The Cathedral and the Bazaar".
# posted by Thom : 5:08 PM
MSFT vs. Linux Security

I must amend my earlier argument. I ran some interesting numbers based on some information that I found on the Internet. According to a survey performed by Attrition (www.attrition.org/mirror/attrition/os.html) over a 1 year 4 month period it tracked 8071 separate incidents of web site hacking and defacement. The OS percentages for these incidents were 56.57% Windows, 12.59% Linux, and 8.25% Solaris. According to my own extrapolation from IDC growth estimates of the Windows, Linux and Unix installed bases, I calculated the installed base of Windows over that same period to be about 60-61%, Linux to be 13-16%, and Unix to be 27-34%. This means that the frequency of web site hackings were slightly disproportionately small for _both_ Windows and Linux--though not much. This analysis basically supports the thesis that security breaches occur in Windows and Linux OS environments according to roughly the same proportion of the size of their respective installed bases. Hence from this analysis, it is not possible to demonstrate that either Linux or Microsoft has a clear security advantage.
# posted by VR Founder : 10:52 AM
iTunes--Finally Somebody Does it Right

A quick question for my fellow bloggers. Is the iTunes business model sustainable? Finally somebody has narrowed the wedge between costs / benefits of getting free music at places like KaZaa and Morpheus and the costs / benefits of getting Big 5 music company-sanctioned music legitimately over the Internet. Generally, I view the value proposition of iTunes as: pay $0.99, no monthly fee, download as much as you want and make a few copies. The other companies trying to do something similar like rhapsody.com, pressplay, etc., have a very similar value proposition except most of them charge a monthly fee close to $20.00. So you pay $0.99 / song plus a monthly fee. This is simply too expensive for the typical user especially when there is a "free" alternative around the corner--KaZaa and Morpheus, etc.--and the only cost of these services is the guilt that the downloader feels. I think we sometimes underestimate this guilt factor. I imagine that Apple's model will appeal to a very large crowd of people--many of whom just don't feel quite right about downloading music for free. My big question is: Is this model sustainable? What is to prevent other competitors from doing the exact same thing? In fact, even worse, do pressplay, rhapsody.com and others even have a choice but to eliminate the monthly fee now? Is this just going to lead to a price war that will continue to erode the Big 5 music producers margins (which is bound to happen)? Just a few days ago, Roxio announced that it is considering launching a business under the Napster name that will essentially copy Apple's business model.

As usual, Apple innovated and is first to this party. Can they sustain their current advantage over competitors and new entrants?
# posted by VR Founder : 7:27 AM

Tuesday, May 20, 2003

Why Open Source OSes (like Linux) Will Never Overtake Microsoft

Most of the arguments that I have heard on this subject contrast the constant improvement, adaptability, and low-cost advantages of open source with the customer support, installed base and ongoing innovation advantages of Microsoft. I want to add a dimension that I believe has not been fully fleshed out: security. Despite its recent security blunders, including the recent discovery of a major security fault in Microsoft's Passport product (originally released in 1999 and performing quite poorly) by a Lebanese programmer, Microsoft products will always be more secure for mission critical functions than open-source products. I know this is an oversimplification but I think we could make an analogy to DES encryption technology originally developed in 1976 in the US. The US banned the export of this technology. From a security perspective, open source is like inviting the EU to help the US develop a missile defense system. "Let's post the plans to the net and see if any helpful scientists find any flaws." Here are the two major security threats that I see: 1) making it easier for cybercriminals to find weak spots in the OS or disable existing security features and 2) creating the potential for cybercriminals to bake in malicious code.

Granted until now, the open source movement has generated net benefits for security. However, the type of security benefits that it has generated remain largely relevant to small and medium-sized enterprises and protect against some of the more common forms of malicious code--internet worms, etc. Some malicious code appears to be directly targeted at the Microsoft OS thus making it more common for MSFT failures to occur. This, however, is not a function of inherently poorer security on the MSFT platform but rather a quality of the numbers of attacks targeted directly at MSFT rather than at Unix or Linux, etc. This, in turn, is a function of the fact that such a large portion of the installed base runs on MSFT. If Linux gets that big--which it won't in its current form--then there I imagine that it will fare the same or worse than MSFT. Also, though small companies can benefit from the low cost of Linux and the relatively high level of security for simple attackes, I believe that large companies will have the capabilities to protect against the lower level security threats and will want the additional piece of mind of knowing that their OS cannot be thoroughly examined by more professional hackers. Thoughts?
# posted by VR Founder : 5:43 PM
Meet the Founders

Ayr Muir-Harmony (of MIT, Harvard Business School, and McKinsey fame) and Thom Goodsell (of Charles River Analytics), two of the smartest, opinionated, and occassionally "downright ornery" technology people I know, have agreed to co-found the emerging tech blog with me. In some discussions we realized that we wanted to be clear that this blog will focus on topics of debate and interest for us. We do not intend to compete with some of the larger magazines that focus on emerging technology. Instead, we hope to bring a business focus, a sense of humor, and an emphasis on making good arguments about the potential and impact of emerging technologies to our blog.
# posted by VR Founder : 5:31 PM

Saturday, May 17, 2003

Welcome

Welcome to the inauguration of the emerging tech blog. I am trying to do something a bit different here than some of the other technology blogs like corante.com. In this blog I would like to slow down the timing of posts and instead focus on creating more integrative, well-reasoned assessments of early technologies. I will draw on insights from the best technological and entrepreneurial business theorists, insightful venture capitalists, and friends and entrepreneurs. I will hopefully have some guest writers as well as I post more material. Enjoy, and please feel free to let me know what you think of the material.
# posted by VR Founder : 10:40 PM

This page is powered by Blogger. Isn't yours?