benpatient said:
i think it quite funny that you guys whine about windows always having security updates all the time and man, how horrible it must be to run windows and always have all these security problems, and blah blah blah.
do those of you that feel this way realize that we get an OS X security update every couple of weeks just like XP users?
There are 2 reasons you don't hear about the OS X security issues:
1. in comparison to windows, nobody uses OS X...especially not hackers.
Every couple of weeks? My Software Update log shows:
Nov 01, Nov 05, Nov 20, Dec 20, Jan 26, Feb 23, Apr 05
(yeah, November was busy ... if I had time I'd go find out what they were... but anyway)
To my mind, this isn't too bad -- compare this to the numbers of Windows updates available to Windows admins like myself --
here's a thread where I list the figures direct from our Microsoft Windows Update Services server.
Compared to the breadth and scope of MS updates, these OS X updates are small change.
Also, more often than not, these updates simply bring to OS X improvements that F/OSS developers have made to standard UNIX libraries or daemons which are used in almost every modern UNIX system. This latest update to cups (Common Unix Printing System) will, for example, be implemented on Linux distributions too.
This also puts paid to your comments regarding OS X's userbase. This software is common to many other Unix systems (Linux, Solaris, SCO [shudder] -- both desktop and server.
2. apple likes to be extremely vague about their security problems. this is a good and bad policy. It is good because it makes it more difficult for hackers (if there were any) to find and exploit weaknesses before they are patched. it is bad because a 'power' user will always be better off with more information instead of less...and apple in general prefers to give less.
eh?
You may be correct regarding Apple-owned software... although I can only remember one security issue with Cocoa in the past 2 1/2 years. But regarding libssl, apache, cups, etc... there's absolutely nothing preventing you from going to the project's site, reading their version histories, and even jumping in there and looking at the code yourself. Probably even able to grab the diff's for the patch and find the exact lines of code that've been changed.
And security through obscurity is no security at all. This doesn't help hackers by not showing them the code. For these unix tools, the code is available to
everyone, all of the time. If a hacker wants to look for exploitable bugs in these tools, they can go straight to the horse's mouth. If they find an exploit, good luck to them -- it may well be possible to multiple unix variants.
But wait -- as soon as the exploit's discovered, absolutely anyone with a patch can submit it and get the hole fixed. Anyone can look at the code, and anyone with the ability can suggest a patch. And that patch will be distributed not only to every other unix variant, but to OS X too.
we're all just lucky that OS X is 1% of the market, if that...if it gets too popular, we could be in trouble...
Seriously, I'm not practising fanboyism. Network and security management is my job and my interest .... just trying to share some knowledge and learn some myself.