What is it about Windows that everybody likes? (A rant)

Page 10 - Seeking answers? Join the AnandTech community: where nearly half-a-million members share solutions and discuss the latest tech.

Skaendo

Senior member
Sep 30, 2014
339
0
76
Last I knew the turnaround time once found was quite fast (and faster than the responses for the Linux Kernel - and heaven forbid you need to wait for a new kernel version to hit your distro...) One might add Microsoft didn't have the SSL bug, and Heartbleed took what, 2-3 years to be found?

In fact:
'The discovery of "Poodle," which stands for Padding Oracle On Downloaded Legacy Encryption, prompted makers of web browsers and server software to advise users on Tuesday to disable use of the source of the security bug: an 18-year old encryption standard known as SSL 3.0.'

'Ivan Ristic, director of application security research with Qualys, said "Poodle" was not as serious as the previous threats because the attack was "quite complicated," requiring hackers to have privileged access to networks.'

'Microsoft Corp issued an advisory suggesting that customers disable SSL 3.0 on Windows for servers and PCs.'

How does this not apply to Microsoft Windows?

Source:
http://www.huffingtonpost.com/2014/10/14/google-ssl_n_5986104.html
 

RampantAndroid

Diamond Member
Jun 27, 2004
6,591
3
81
In fact:
'The discovery of "Poodle," which stands for Padding Oracle On Downloaded Legacy Encryption, prompted makers of web browsers and server software to advise users on Tuesday to disable use of the source of the security bug: an 18-year old encryption standard known as SSL 3.0.'

'Ivan Ristic, director of application security research with Qualys, said "Poodle" was not as serious as the previous threats because the attack was "quite complicated," requiring hackers to have privileged access to networks.'

'Microsoft Corp issued an advisory suggesting that customers disable SSL 3.0 on Windows for servers and PCs.'

How does this not apply to Microsoft Windows?

Source:
http://www.huffingtonpost.com/2014/10/14/google-ssl_n_5986104.html

It's a bug in the actual spec for SSL3/RC4 (well, an issue with an ancient cipher dating back to 1987), not a bug in Microsoft's implementation. Point in fact, Microsoft advised system admins to stop using RC4 a year ago. Additionally, MS has been supporting TLS for a while now, and has been working to kill SHA1 off.

I suggest you not get tech news from huffpo.
 

Cerb

Elite Member
Aug 26, 2000
17,484
33
86

RampantAndroid

Diamond Member
Jun 27, 2004
6,591
3
81

And your point is...what? That Microsoft forcibly turn off the RC4 cipher? It isn't their code, and it isn't in their hands. Heartbleed was not a vulnerability in the cipher or the spec, it was a bug in the implementation allowing memory to leak, and random chunks of memory to be returned. These aren't in any way the same type of issue. It'd be like blaming MS for rainbow tables...
 

Skaendo

Senior member
Sep 30, 2014
339
0
76
Point is that it affects not the OS, but every OS is affected because it is a browser issue. And yes, even IE is affected, by the browser can revert back to SSLv3 if it's not disabled.
Not what you said here:
One might add Microsoft didn't have the SSL bug
In actuality MS says themselves that it affects every version of Windows.
 

RampantAndroid

Diamond Member
Jun 27, 2004
6,591
3
81
Point is that it affects not the OS, but every OS is affected because it is a browser issue. And yes, even IE is affected, by the browser can revert back to SSLv3 if it's not disabled.
Not what you said here:

In actuality MS says themselves that it affects every version of Windows.

Then you missed the point. I was responding to your assertion that Linux (and by extension, open source code) gets fixed faster. My response was that the checkin that caused Heartbleed happened something like two years prior to the public disclosure/discover and fix of the heartbleed bug.

The comment of this not affecting MS was that their implementation of SSL did not have the same heartbeat/heartbleed bug; that's a fact. Anyone using MS' implementation of SSL was NOT at risk to be exploited by Heartbleed (and if you were tracking that back when it happened, you realized a lot of banks were thankfully NOT using OpenSSL.)

My point stands; your issue is a bug in SSL itself and is totally unrelated to my point. I even mentioned heartbleed in my post...
 
Last edited:
sale-70-410-exam    | Exam-200-125-pdf    | we-sale-70-410-exam    | hot-sale-70-410-exam    | Latest-exam-700-603-Dumps    | Dumps-98-363-exams-date    | Certs-200-125-date    | Dumps-300-075-exams-date    | hot-sale-book-C8010-726-book    | Hot-Sale-200-310-Exam    | Exam-Description-200-310-dumps?    | hot-sale-book-200-125-book    | Latest-Updated-300-209-Exam    | Dumps-210-260-exams-date    | Download-200-125-Exam-PDF    | Exam-Description-300-101-dumps    | Certs-300-101-date    | Hot-Sale-300-075-Exam    | Latest-exam-200-125-Dumps    | Exam-Description-200-125-dumps    | Latest-Updated-300-075-Exam    | hot-sale-book-210-260-book    | Dumps-200-901-exams-date    | Certs-200-901-date    | Latest-exam-1Z0-062-Dumps    | Hot-Sale-1Z0-062-Exam    | Certs-CSSLP-date    | 100%-Pass-70-383-Exams    | Latest-JN0-360-real-exam-questions    | 100%-Pass-4A0-100-Real-Exam-Questions    | Dumps-300-135-exams-date    | Passed-200-105-Tech-Exams    | Latest-Updated-200-310-Exam    | Download-300-070-Exam-PDF    | Hot-Sale-JN0-360-Exam    | 100%-Pass-JN0-360-Exams    | 100%-Pass-JN0-360-Real-Exam-Questions    | Dumps-JN0-360-exams-date    | Exam-Description-1Z0-876-dumps    | Latest-exam-1Z0-876-Dumps    | Dumps-HPE0-Y53-exams-date    | 2017-Latest-HPE0-Y53-Exam    | 100%-Pass-HPE0-Y53-Real-Exam-Questions    | Pass-4A0-100-Exam    | Latest-4A0-100-Questions    | Dumps-98-365-exams-date    | 2017-Latest-98-365-Exam    | 100%-Pass-VCS-254-Exams    | 2017-Latest-VCS-273-Exam    | Dumps-200-355-exams-date    | 2017-Latest-300-320-Exam    | Pass-300-101-Exam    | 100%-Pass-300-115-Exams    |
http://www.portvapes.co.uk/    | http://www.portvapes.co.uk/    |