ipfw is not disabled. The default ruleset is still in place.
:
:
I bring up ipfw because part of its default ruleset is filtering for the port the browser uses to prevent packets that could be executable from passing.
I had tried to indicate that to munkery by (parenthetically) posting a ps command, but perhaps it was too subtle.If you check on a default Leopard or Snow Leopard install, you will find that ipfw is not running by default. You can check this yourself.
Excellent... i just dropped in to post something similar, but i see you've done that already. I'll just add one variation then:How to find if ipfw is active (i.e. running and enforcing its ruleset), and some sample outputs.
Terminal commands:
Output on Leopard, with Application Firewall active:Code:sudo ipfw list
Code:65535 allow ip from any to any
$ [color=blue]sudo ipfw list[/color]
Password:
33300 deny icmp from any to me in icmptypes 8
65535 allow ip from any to any
I am aware of the technique and of its many limitations and I stand by my question. Miller might e.g. show that it is possible to crash Preview by giving it random PDFs. That is unsurprising, what is interesting is any sort of exploit that undermines OSX. A denial of service attack against OSX applications might be at worst an irritant, it is not a zero day vulnerability in any meaningful sense of the phrase. Why is this guy anything other than a media whore?
I'm more of a Terminal junkie than a Networking guru, so perhaps someone else can answer that. Just from a basic viewpoint however, if no ports were open at all... then Mail, Safari and Software Update (to name a few) would be fairly useless apps.@Hal
That first article you posted (http://www.macworld.com/article/132558/2008/03/connect2504.html) it says that by default Mac OSX leaves few ports open but by the sounds of it this is not related to firewalling.
Can you give me some guidance to sources to understand how that is done?
The article maybe wrong but this perception that the ports are closed lead me to believe in the past that it was from a firewall.
I am aware of the technique and of its many limitations and I stand by my question. Miller might e.g. show that it is possible to crash Preview by giving it random PDFs. That is unsurprising, what is interesting is any sort of exploit that undermines OSX. A denial of service attack against OSX applications might be at worst an irritant, it is not a zero day vulnerability in any meaningful sense of the phrase. Why is this guy anything other than a media whore?
Those sums are cheap for publicity, we will indeed see in 3 or 4 days time. Anyway, after 18 pages we got this thread back on the topic of the initial summary, that is probably a more significant achievement than will be revealed on Wednesday.
I doubt if Miller has anything of substance, certainly not enough to win a contest. He is out for publicity and, to be fair, he has got some of that already without having done anything.To summarize, I doubt that merely crashing Preview is going to count as a contest winner. However, I could be wrong about that, since the 2010 rules don't seem to be finalized yet.
Why would she keep the keys in the glovebox when she grew up keeping them in the visor?![]()
I never claimed to be some sort of an expert. And you know… you never once seeing a real world exploit in 20 years, I find that hard to believe. But good for you if that’s the case.Yes, because using Macs since 2006 makes you an expert on such matters. I have been using them consistently for 20 years. Not just using them mind you, I mean administering them. Never once have I seen a real world exploit.
Less as in ZERO.
I believe there have been a couple of 'proof of concepts' but nothing malicious or self replicating, these were just Trojans which aren't really viruses anyway.
Semantics. True that Inqtana.A is categorized as a worm and the rest I quite clearly marked. But seriously. Worm, trojan, backdoor… Whatever you call it you’re not gonna like what it doesInqtana.A is a worm, not a virus — and it doesn't even affect Macs running 10.5 or later.
http://www.symantec.com/security_response/writeup.jsp?docid=2006-021715-3051-99
Worms and trojan backdoors are not viruses. By definition, a virus must be able to self-replicate. Worms and trojans can not.
So again: Name one OSX virus.
It’s not really a hassle at all.Well, I will not spend a penny and go through the hassle of keeping my antivirus up-to-date and slowing down my machine because I want to protect the PC users that don't update their antivirus...
Good question.Why is everyone in this thread going on about viruses? The article has nothing to to with them.
Well… maybe it’s time to think about changing AV provider. I’ve never used SEP but I’m quite happy with Intego on Mac and F-Secure on Windows. And I agree with not running anything that doesn’t need to. AV just is something that needs to.I am system admin at work and we have SEP11... Tell me about the pain we have to go everyday with Workstation that didn't update properly and have been quarantined from the network, false positive that generate, system that become ultra slow when doing the weekly scan etc.etc.etc...
I have seen how many people complaining that have installed symantech on OS X and crashed their OS at some point...
I m the kind of person that do not run anything that doesn't need to be run on my machine. I will not start to run an antivirus for people (PC Users) that don't
Like I said, semantics.They are not viruses, they are all trojans that you HAVE to INSTALL yourselves. By giving permission to OSX to install that pirated copy, you are intentionally infecting the OS yourself, which is your fault, not anybody else.
Even the perfect OS in the entire universe will not be safe from social engineering, there's no way to prevent people to stop installing crap.
Inqtana: Requires direct access to the machine from within bluetooth range, but at least this would qualify as a worm. Just not in a practical, exploitable way.
Tored is not a worm!!!! It requires a human to run it and move it along via e-mail.
Trojans do exist. I guess my general point is
1. Don't be stupid.
2. Make sure your patched up-to-date or turn off your bluetooth when you go to Starbucks.
And if you can't use Google on your own...
A worm is a self-propigating virus.
Yeah…Oh look, it's this thread again.
The idea of security through obscurity is not 100% true, nor 100% wrong either.
Oh look, it's this thread again.
On the other hand, there are a handful of regular posters who believe that Apple does no wrong
Honestly your act here is tired. The moment someone has something significant but not glowing to say about Apple/OS X you deem them disgruntled, bitter, etc.
I doubt if Miller has anything of substance, certainly not enough to win a contest.
... Why would anybody want to live in the bad part of town if they can have a farmhouse anyway?![]()
Despite winning the Mac in the contest, in 2008 and 2009?
Even if I were wagering small amounts, I wouldn't bet against Miller's track record. Not when he has the first crack at Safari this year.
I assume you incorrectly include me on this list.
Complete, utter, obvious BS. I have no problem with Apple criticism. I have plenty of Apple criticism myself (feel free to peruse my comment history). What I have a problem with are the resident trolls (the truly "tired acts") who have nothing positive to say about Apple. Ever. They have no business on an Apple users site when they add nothing but contention and anti-Apple propaganda, all day, every day.
But I am utterly concerned about security in OS X, given the huge problem identity theft and other issues are in the IT industry in general. It's everyone's concern. Not just Windows users.
Identity theft in relation to mitm attacks, as used in PWN2OWN, occurs due to eavesdropping and not arbitary code execution.
You are correct in that it is everyones concern.
So your focus on this issue in terms of the IT industry and identity theft relates to ARP poisoning in general and none of the OSes have built in faculties to prevent this.
This is a concern for everybody regardless of there OS and the solution lies in smart internet practices just like with phishing and its relation to identity theft.
Although, ArpON (http://arpon.sourceforge.net/) looks promising as a possible solution to this. To bad none of the OSes have this by default. It is open source and already works with most OSes.
Well, not entirely true. There are several past vulnerabilities in Windows that have resulted in malware getting loaded on a user's machine with zero interaction, simply by visiting a webpage. This can occur when the user clicks on a seemingly innocent Google search link, or perhaps a legitimate website that's been hacked, or, in the case of NYTimes.com, a legitimate website that sells ads to a malicious software maker with javascript exploiting vulnerabilities. All of these would be ineffective on an OS X or Linux box, but totally compromise a Windows box of that period.
It doesn't always have to be phishing or a pop-up that the user has to click yes to install or put their password in.
Very true! The product gets very different when you introduce malware in to the equation. This is where the problem starts to be more relevant; when malware becomes a component of the problem.
Mac OSX and Linux are fairing significantly better in this domain.
It is still an issue on Windows and as a previous poster stated DEP and UAC have been somewhat ineffective in preventing malware issues. I really don't know much about how they are circumvented.