Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.

nec207

macrumors 6502
Original poster
Mar 21, 2011
429
0
One thing about OS X application are bundle architecture maintains application as self contained bundles thus you can move application around where in windows or Linux you cannot . But I feel OS X way of doing this may be easer for user but this makes holes in security.

Also other weak spot of Mac OS X is it will not ask for authentication in user level only in system level and the way programs run and are installed makes alot of weak security in OS X. It may makes this very user friendly but not good for security .


It should be that all programs never download ,install ,remove or change in user level at all.No program should run or install in user level.Every thing should be in system level.

The thing is some times Apple makes their OS so user friendly thay strip some of the security.


Windows and Linux should be installing programs in system level people tell me.Just like OS X.What do you think? What is better? Should program run and install in system level?

Also how much authentication is too much or not enough.If you where running Apple what would you do that will make OS X have more security?
 

nunes013

macrumors 65816
May 24, 2010
1,284
185
Connecticut
One thing about OS X application are bundle architecture maintains application as self contained bundles thus you can move application around where in windows or Linux you cannot . But I feel OS X way of doing this may be easer for user but this makes holes in security.

Also other weak spot of Mac OS X is it will not ask for authentication in user level only in system level and the way programs run and are installed makes alot of weak security in OS X. It may makes this very user friendly but not good for security .


It should be that all programs never download ,install ,remove or change in user level at all.No program should run or install in user level.Every thing should be in system level.

The thing is some times Apple makes their OS so user friendly thay strip some of the security.


Windows and Linux should be installing programs in system level people tell me.Just like OS X.What do you think? What is better? Should program run and install in system level?

Also how much authentication is too much or not enough.If you where running Apple what would you do that will make OS X have more security?

im not a security expert or anywhere close but i have heard many positive things about OS X Lion. There have been people testing it saying they recommend all Apple users to upgrade sooner than later, and they said same thing with Windows users. I take that as its the most secure OS X update and also more secure than Windows. Ill post the link in a minute.

EDIT: here it is https://www.macrumors.com/2011/07/2...-but-battery-firmware-vulnerability-surfaces/


the guy is tearing it down and posting the results.
 

unixperience

macrumors regular
Jul 21, 2010
235
5
you can easily move applications due to the bundles (jsut like you would with a bundled java application for instance) but typically when you try and run the program for the first time, it asks if you really want to open it? sure its just a click away in a full administrative account (default account setting)

When you move things into the application folder (since applications live at root) most of them ask for a password (and again with an admin account this is easy type in your account password)

but then again its still unix (bsd based system) so you still have permissions account settings, group settings, you can set all that up for new users (the way a network admin would, or a parent protecting their children :-D ) theres actually a really cool parental controls. you can use a simple finder (only shows applications you allow cant install or change files except your own docs) just like regular unix systems, you can really lock it down. but by default the accounts are basically admin so they are very free
 

nec207

macrumors 6502
Original poster
Mar 21, 2011
429
0
How does administrative account work vs root?

Is this some thing only Unix,Linux and OS X have this thing called root.

So it will not ask for authentication in user level or system level if you running as a administrative account ?
 

r1ch4rd

macrumors 6502a
Aug 5, 2005
980
1
Manchester UK
It doesn't really matter whether you can run or install programs as an individual user. Because of the way UNIX works, the application cannot access critical parts of the system without an administrative password.

Think of administrators in Mac OS as having the equivalent of "sudo" type functionality in Linux. You can act as the root user, but are forced to authenticate before doing anything.
 

nec207

macrumors 6502
Original poster
Mar 21, 2011
429
0
munkery we can keep the talk on malware to this thread than the other thread that is about programming and the OS X layers.This was in that other thread but got no reply.



if I understand it you got browser space and OS space . If I go to a web site that as flash ,Java,Java-script,Active-X or scripts there is potential for malware to get on the computer.

Why not the OS and AV like Norton or Kaspersky block it ??? It cannot block it !!! if it block flash ,Java,Java-script,Active-X or scripts on the page than most web sites would not work !!

But the OS you got user level and system level. The malware I got was in user level.

What is the difference of OS X user level and system level vs windows user level and system level .

Why have user level and system level at all.

Why not the browser sandbox or OS sandbox block it ? It cannot if it block it than most web sites would not work.

So the point of a being very secure goes out the window here.It would not better if I was using windows,Linux,Unix or OS X or any other OS as no OS can block it.
 

munkery

macrumors 68020
Dec 18, 2006
2,217
1
One thing about OS X application are bundle architecture maintains application as self contained bundles thus you can move application around where in windows or Linux you cannot . But I feel OS X way of doing this may be easer for user but this makes holes in security.

Also other weak spot of Mac OS X is it will not ask for authentication in user level only in system level and the way programs run and are installed makes alot of weak security in OS X. It may makes this very user friendly but not good for security .

Doing it this way eliminates way more security issues than it creates.

All the reliable vectors for malware to be profitable are protected by DAC in OS X. The app bundle architecture keeps third party executables separate from these reliable vectors.

Windows installs software at the same level as the reliable vectors in Windows. So, if an app is malicious, it has more access to security sensitive areas in Windows than compared to apps in OS X.

It should be that all programs never download ,install ,remove or change in user level at all.No program should run or install in user level.Every thing should be in system level.

This is not possible. If permissions are set to require authentication at the user level, then users would have to authenticate every action on the system, including opening files and folders.

The thing is some times Apple makes their OS so user friendly thay strip some of the security.

The total opposite is actually the truth. The increased user friendliness reduces the likelihood of the user making mistakes in relation to security.

Windows and Linux should be installing programs in user level people tell me.Just like OS X.What do you think? What is better? Should program run and install in system level?

OSs should follow the principle of least privilege. Windows does not follow this principle as well as other OSs.

munkery we can keep the talk on malware to this thread than the other thread that is about programming and the OS X layers.This was in that other thread but got no reply.

Sure, if you stop making threads about topics that I have discussed with you several times in the past.

I don't want to discuss topics with you if you are going to try to spin that information into misinformation.

Why not the OS and AV like Norton or Kaspersky block it ??? It cannot block it !!! if it block flash ,Java,Java-script,Active-X or scripts on the page than most web sites would not work !!

But the OS you got user level and system level. The malware I got was in user level.

What specific malware? What OS are you using?

Active-X suggests that you are using Windows. Only Windows uses Active-X.

What is the difference of OS X user level and system level vs windows user level and system level .

The difference is that DAC is easily bypassed in Windows and that the registry is not well enough protected by DAC in Windows even if DAC is not bypassed.

These issues do not exist in OS X.

Why have user level and system level at all.

Do you want to authenticate every time you open any file or folder?

If no, then OS has to be separated into different levels of permissions.

Do you want malware to have system level access from only a single exploit?

If no, then OS has to be separated into different levels of permissions.

Why not the browser sandbox or OS sandbox block it ? It cannot if it block it than most web sites would not work.

What browser are you using? What OS are you using?

The effectiveness of the sandbox in Windows is not as good as the sandbox implementations used in OS X and Linux.

Depending on the browser, the rendering and scripting engines as well as any plugins run in either a separate process and/or a sandbox.

I do not think the sandbox was bypassed unless you are using Windows and IE.

So the point of a being very secure goes out the window here.It would not better if I was using windows,Linux,Unix or OS X or any other OS as no OS can block it.

This is absolutely untrue.
 
Last edited:

nec207

macrumors 6502
Original poster
Mar 21, 2011
429
0
What browser are you using? What OS are you using?

The effectiveness of the sandbox in Windows is not as good as the sandbox implementations used in OS X and Linux.

Depending on the browser, the rendering and scripting engines as well as any plugins run in either a separate process and/or a sandbox.

I do not think the sandbox was bypassed unless you are using Windows and IE.



Any time where there is flash , javascript ,Java or active-x on a page there is potential for malware.

And pop ups are getting very smart now they say the opposite what they mean you click on close and really it is run.Also I have seen fake UAC and fake anti-virus scans that look and feel like the real virus scan. You may go to bad web site and get fake UAC popup or fake AV.

And also I have seen fake pictues on the internet that look like a Jpg ,bmp or giff.Same with videos or music.

Many pages have bad scrips and adverts now.

The malware out there is very smart these day you do not have to downloads cool things of the internet like before to get malware


So I;m not sure how sanbox or OS can block this with out having no flash on the computer ,running no script and just about nothing but plain HTML that is just plain text.

Doing it this way eliminates way more security issues than it creates.

All the reliable vectors for malware to be profitable are protected by DAC in OS X. The app bundle architecture keeps third party executables separate from these reliable vectors.

Windows installs software at the same level as the reliable vectors in Windows. So, if an app is malicious, it has more access to security sensitive areas in Windows than compared to apps in OS X.

If I understand the above and past posts here any thing in user level cannot mess up the OS so in reality I could download a bad program or if a program slip by the sanbox on to the OS it will be in user level and cannot do any thing to mess up the OS do to all critical files are in system level.

In windows they use alot of DLL files ,registry and most programs are in system level in windows than user level like OS X.
 
Last edited:

munkery

macrumors 68020
Dec 18, 2006
2,217
1
Any time where there is flash , javascript ,Java or active-x on a page there is potential for malware.

(snip)

So I;m not sure how sanbox or OS can block this with out having no flash on the computer ,running no script and just about nothing but plain HTML that is kust plain text.

If the sandbox is effective, it does block browser exploit based malware from accessing both the user and system levels. With a sandbox, the malware can only access a limited area of the system allowed by the sandbox.

The sandbox in OS X and Linux is more effective than the sandbox in Windows.

If the DAC in an OS is effective, it does block malware that achieves user level access from accessing security sensitive items protected in the system level of the OS via DAC.

The DAC in OS X and Linux is more effective than the DAC in Windows.
 

nec207

macrumors 6502
Original poster
Mar 21, 2011
429
0
If the sandbox is effective, it does block browser exploit based malware from accessing both the user and system levels. With a sandbox, the malware can only access a limited area of the system allowed by the sandbox.

The sandbox in OS X and Linux is more effective than the sandbox in Windows.

If the DAC in an OS is effective, it does block malware that achieves user level access from accessing security sensitive items protected in the system level of the OS via DAC.

The DAC in OS X and Linux is more effective than the DAC in Windows.

Here is log file of old computer I had.

http://img710.imageshack.us/img710/3855/999ah.jpg

Looking at the log file you can see the AV and windows blocked the malware and some of the malware did get in my user profile and internet cash folder that I had to remove.


A browser is an application that runs above the OS level. You could chose to run Chrome, Firefox, Safari ,Opera or several other browsers. Those choices can make no difference in what happens when you visit a compromised website do to the internet cashing of sites and need to run Java,Java-scrip,flash and rich HTML so on :eek::eek:is run in browser layer or in some cases talk to the OS and is not on the page it self. This is a big problem .

Had I had a old crude windows 3.1 computer with no plugins ,no flash,no script nothing just plain monochrome browser I would have got no malware .But yet again the web site would not work.


Where Java,Java-scrip,flash ,scripts and rich HTML so on can be used for good or bad.


Then again the same malware on Windows 7 could be used on OS X or Linux to infect the user on those other OS systems. Both Linux and OS X allow users to run applications and write files to their directories.
 

munkery

macrumors 68020
Dec 18, 2006
2,217
1
A browser is an application that runs above the OS level. You could chose to run Chrome, Firefox, Safari ,Opera or several other browsers. Those choices can make no difference in what happens when you visit a compromised website do to the internet cashing of sites and need to run Java,Java-scrip,flash and rich HTML so on :eek::eek:is run in browser layer or in some cases talk to the OS and is not on the page it self. This is a big problem .

The choice does matter because almost all exploits are specific to one combination of browser and OS. A compromised website is just a host to an exploit.

If the sandbox is effective, it does block browser exploit based malware from accessing both the user and system levels. With a sandbox, the malware can only access a limited area of the system allowed by the sandbox.

The sandbox in OS X and Linux is more effective than the sandbox in Windows.

Had I had a old crude windows 3.1 computer with no plugins ,no flash,no script nothing just plain monochrome browser I would have got no malware .But yet again the web site would not work.

Even the renderer can be exploited. Browsers are the least secure client-side app.

If the sandbox is effective, it does block browser exploit based malware from accessing both the user and system levels. With a sandbox, the malware can only access a limited area of the system allowed by the sandbox.

The sandbox in OS X and Linux is more effective than the sandbox in Windows.


Where Java,Java-scrip,flash ,scripts and rich HTML so on can be used for good or bad.

If the sandbox is effective, it does block browser exploit based malware from accessing both the user and system levels. With a sandbox, the malware can only access a limited area of the system allowed by the sandbox.

The sandbox in OS X and Linux is more effective than the sandbox in Windows.

Then again the same malware on Windows 7 could be used on OS X or Linux to infect the user on those other OS systems. Both Linux and OS X allow users to run applications and write files to their directories.

This is not necessarily true. The same vulnerability may not be exploitable in another OS due to different implementations of security mitigations such as overviewed in the following post:

https://forums.macrumors.com/posts/13013889/

Below are some posts from a previous discussion between that two of us that you should review:

https://forums.macrumors.com/posts/13135058/
https://forums.macrumors.com/posts/13165199/
https://forums.macrumors.com/posts/13165416/
https://forums.macrumors.com/posts/13165434/
https://forums.macrumors.com/posts/13171321/
https://forums.macrumors.com/posts/13172737/
https://forums.macrumors.com/posts/13173644/
https://forums.macrumors.com/posts/13174147/
https://forums.macrumors.com/posts/13174379/
https://forums.macrumors.com/posts/13174470/
https://forums.macrumors.com/posts/13176305/
https://forums.macrumors.com/posts/13176444/

Below are some more posts from a previous discussion between that two of us that you should review:

https://forums.macrumors.com/posts/13264019/
https://forums.macrumors.com/posts/13277531/
https://forums.macrumors.com/posts/13278074/
https://forums.macrumors.com/posts/13278424/

Below is a thread that includes a previous discussion between that two of us that you should review:

https://forums.macrumors.com/threads/1143001/
 
Last edited:

nec207

macrumors 6502
Original poster
Mar 21, 2011
429
0
That start with this one first before we get to the other things talked about in this thread..

A browser is an application that runs above the OS level. You could chose to run Chrome, Firefox, Safari ,Opera or several other browsers. Those choices can make no difference in what happens when you visit a compromised website do to the internet cashing of sites and need to run Java,Java-scrip,flash and rich HTML so on is run in browser layer or in some cases talk to the OS and is not on the page it self. This is a big problem .

Had I had a old crude windows 3.1 computer with no plugins ,no flash,no script nothing just plain monochrome browser I would have got no malware .But yet again the web site would not work.


Where Java,Java-scrip,flash ,scripts and rich HTML so on can be used for good or bad.


Then again the same malware on Windows 7 could be used on OS X or Linux to infect the user on those other OS systems. Both Linux and OS X allow users to run applications and write files to their directories.


This is do to if the OS blocks this or the sandbox or AV like Norton or Kaspersky than most web sites would not work.


If the sandbox is effective, it does block browser exploit based malware from accessing both the user and system levels. With a sandbox, the malware can only access a limited area of the system allowed by the sandbox.

Like I say if the sandbox ,OS or AV like like Norton or Kaspersky block code on web sites other than plain HTML the web sites would not work.

Most web sites like this web site at macrumors you need Java,Java-scrip,flash ,scripts and rich HTML so on .
 
Last edited:

munkery

macrumors 68020
Dec 18, 2006
2,217
1
Like I say if the sandbox ,OS or AV like like Norton or Kaspersky block code on web sites other than plain HTML the web sites would not work.

Most web sites like this web site at macrumors you need Java,Java-scrip,flash ,scripts and rich HTML so on .

The sandbox does not block the code.

The sandbox limits the access of any code in the browser in case the code is malicious.

Malicious code is unable to do any damage if contained in an effective sandbox.

The sandbox in OS X and Linux is more effective than the sandbox in Windows.

Read the links posted in my previous post for an explanation about the differences between these different sandbox implementations.
 

nec207

macrumors 6502
Original poster
Mar 21, 2011
429
0
Wrong

This is do to if the OS blocks this or the sandbox or AV like Norton or Kaspersky than most web sites would not work.

fixed


This is do to if the OS blocks this or AV like Norton or Kaspersky than most web sites would not work.


Okay I fix the error above

----------

If the sandbox is effective, it does block browser exploit based malware from accessing both the user and system levels. With a sandbox, the malware can only access a limited area of the system allowed by the sandbox.

The sandbox in OS X and Linux is more effective than the sandbox in Windows.

If the DAC in an OS is effective, it does block malware that achieves user level access from accessing security sensitive items protected in the system level of the OS via DAC.

The DAC in OS X and Linux is more effective than the DAC in Windows.[/QUOTE]

Yes but how does this work if it does not block Java,Java-scrip,flash ,scripts and rich HTML so on ?
 

munkery

macrumors 68020
Dec 18, 2006
2,217
1
This is do to if the OS blocks this or AV like Norton or Kaspersky than most web sites would not work.

What in an OS blocks what in websites from working?

Specifically, what is the point that you are trying to make?

Yes but how does this work if it does not block Java,Java-scrip,flash ,scripts and rich HTML so on ?

Because it is a sandbox.

Search Google and read articles related to SE-Linux, AppArmor, and TrustedBSD MAC Framework. Also, read about Windows Integrity Control/Mandatory Integrity Control to compare the Windows sandbox to those other sandbox implementations.

I have already provided links related to sandbox implementations. Please read the following links:

 

nec207

macrumors 6502
Original poster
Mar 21, 2011
429
0
What in an OS blocks what in websites from working?

Specifically, what is the point that you are trying to make?

If the OS or AV like Norton or Kaspersky block code than most web sites would not work.Even basic sites like gmail,yahoo mail or macrumors.

This is do to web sites have involved and thanks to things like flash we can watch videos on web sites or have animation.JavaScript is a scripting language for computers. It is often run in web browser applications to create dynamic content like message boxes popping up or a live clock or widgets.

java-script is used every where like google, facebook and any site with a form use it to enable interaction with the site , it is capable of sending and retriving data to/from the server with out reloading the page.


It can make complex animations using text or colored divs. it can tell the user that their passwords dont match when they are creating an account


javascript. when you come to a photo album that doesnt require page reloads and dims the background of the page behind the picture has its own little x to close but is in the same browser window.


you dont need to use it but you wont have an interactive webpage with out it. you can still have forms but everything will require a page reload.

If the OS like Linux ,Unix,OS X or windows blocks code on page than most web sites would not work.

Sure you so not have to use Java,Java-scrip,flash ,scripts and rich HTML but most web sites would not work.

The OS does not have Intelligence to scan code to see what is good code and what is bad code.

The AV like Norton or Kaspersky is not built to this.It is built to scan your hard-drive with known malware and remove it.It is only some AV that are now acting as a AV and firewall and do real time scanning and blocking.

The Norton or Kaspersky pro that cost more do real time scanning and blocking it as a firewall and sanbox.

It is still very hard to put Intelligence in OS that would know what is bad code and what is good code.

That why after using Kaspersky it blocks most malware for me :eek::eek:but the other malware still slips by and get on the computer.The windows UAC will than block most registry changes or system changes.

Had I use a windows 98 or windows XP I would have got a nasty infection.But using windows 7 and UAC it would not allow registry changes or the malware being put anywhere other than by user profile.

Windows is still broken but much better than windows 98 or windows XP where just about any bad site that as a script can install malware most of tham being a trojan droppers put any where on the system and registry changes .
 

munkery

macrumors 68020
Dec 18, 2006
2,217
1

I do not understand the point you are trying to make throughout most of your post.

Does the following statement summarize the argument that you are trying to make?

If an OS can't execute code, than it won't work.

I never have suggested that an OS should be prevented from executing any code.

The following statement summarizes the content of my posts and links that I have provided.

Less buggy code, better runtime security mitigations, and an effective sandbox produces a more secure operating system.

Obviously, OS X and Linux are meeting the goals of that statement more effectively than Windows 7.

https://forums.macrumors.com/posts/13013889/

Windows is still broken but much better than windows 98 or windows XP where just about any bad site that as a script can install malware most of tham being a trojan droppers put any where on the system and registry changes .

I agree.
 

nec207

macrumors 6502
Original poster
Mar 21, 2011
429
0
I do not understand the point you are trying to make throughout most of your post.

.

You are claiming the OS and AV like Norton or Kaspersky can block bad code like bad Java, bad Java-scrip, bad flash , bad scripts and bad rich HTML so on.I explain above the myth about this.
 

munkery

macrumors 68020
Dec 18, 2006
2,217
1
You are claiming the OS and AV like Norton or Kaspersky can block bad code like bad Java, bad Java-scrip, bad flash , bad scripts and bad rich HTML so on.I explain above the myth about this.

Technically, the OS can block bad code via the sandbox and DAC if those security mitigations aren't bypassed by the exploit. Malware typically requires system level access to be profitable. Preventing system level access via exploitation is the role of those security mitigations.

Most AV software, including Norton and Kaspersky, are capable of on-access (real-time) scanning. This is effective at preventing the execution of bad code if the AV software has a signature to detect the threat. The problem is that it is easy to use methods (such as obfuscation, bit flipping, and encryption) to avoid detection.

Also, the data types run in the browser do not run with elevated privileges in OSs with DAC enabled. So, even if the exploit bypasses the sandbox to be able to execute code as the user, that exploit alone would not be able to bypass DAC.

In OSs where there is limited damage that can be done with only user level privileges, this negates the impact of the malware.

In Windows where malware is able to access most of the registry with only user level access, malware is able to still have an impact and possibly leverage the registry to achieve system level access via a privilege escalation exploit.

All this is explained in more detail in the following posts:


Below is a series of posts from another thread that provides more information relevant to this discussion.

 

nec207

macrumors 6502
Original poster
Mar 21, 2011
429
0
Hay most of your post answer my question here and I have lots of reading to do .

One question you did not see.


If I understand the above and past posts here any thing in user level cannot mess up the OS so in reality I could download a bad program or if a program slip by the sanbox on to the OS it will be in user level and cannot do any thing to mess up the OS do to all critical files are in system level.

In windows they use alot of DLL files ,registry and most programs are in system level in windows than user level like OS X.
 

munkery

macrumors 68020
Dec 18, 2006
2,217
1
If I understand the above and past posts here any thing in user level cannot mess up the OS so in reality I could download a bad program or if a program slip by the sanbox on to the OS it will be in user level and cannot do any thing to mess up the OS do to all critical files are in system level.

There are not many viable vectors in OS X to make malware with only user level access profitable.

A bad program with only user level access in OS X is unable to access the protected storage of other apps and any protected data entry (text entry fields that are masked).

This makes producing successful automated mass malware targeting OS X a difficult task.

In windows they use alot of DLL files ,registry and most programs are in system level in windows than user level like OS X.

The issue with Windows is most of the registry is accessible with only user level access.

Also, portions of the protected storage are located in the registry and no access controls are applied to these entries. A bad program is able to access the protected storage of other programs.

The registry also provides an easy vector to exploit Windows to the system level via registry entries for kernel mode drivers that are accessible via only user level access.

Regardless of where a program is installed, the programs typically only run with user level privileges. Installing programs at the system level makes no difference in relation to the ability to exploit the process in memory.

But, installing programs at the system level increases the amount of damage that can be done if a bad program is installed. Users are more likely to install bad software at the system level if most software is installed at that level within an OS, such as is common practice in Windows.
 
Last edited:
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.