Revisiting Linux Part 1: A Look at Ubuntu 8.04
by Ryan Smith on August 26, 2009 12:00 AM EST- Posted in
- Linux
It’s Secure
Security is a tough nut to crack, both with respect to making something secure and judging something to be secure. I’m going to call Ubuntu secure, and I suspect that there’s going to be a lot of disagreement here. Nonetheless, allow me to explain why I consider Ubuntu secure.
Let’s first throw out the idea that any desktop OS can be perfectly secure. The weakest component in any system is the user – if they can install software, they can install malware. So while Ubuntu would be extremely secure if the user could not install any software, it would not be very useful to be that way. Ubuntu is just as capable as any other desktop OS out there when it comes to catching malware if the user is dedicated enough. The dancing pigs problem is not solved here.
Nevertheless, Ubuntu is more secure than other OSes (and let’s be frank, we’re talking about Windows) for two reasons. The first is for practical reasons, and the second is for technical reasons.
To completely butcher a metaphor here: if your operating system has vulnerabilities and no one is exploiting them, is it really vulnerable? The logical answer to that is “yes” and yet that’s not quite how things work. Or more simply put: when’s the last time you’ve seen a malware outbreak ravaging the Ubuntu (or any desktop Linux distro) community?
Apple often gets nailed for this logic, and yet I have a hard time disagreeing with it. If no one is trying to break into your computer, then right now, at this moment, it’s secure. The Ubuntu and Mac OS X user bases are so tiny compared to that of Windows that attacking anything but Windows makes very little sense from an attacker’s perspective.
It’s true that they’re soft targets – few machines run anti-virus software and there’s no other malware to fend off – but that does not seem to be driving any kind of significant malware creation for either platform. This goes particularly for Mac OS X, where security researchers have been warning about the complacent nature this creates, but other than a few proof of concept trojan horses, the only time anyone seems to be making a real effort to break into a Mac is to win one.
So I am going to call Ubuntu, with its smaller-yet user base and lack of active threats, practically secure. No one is trying to break into Ubuntu machines, and there’s a number of years’ worth of history with the similar Mac OS X that says it’s not going to change. There just aren’t any credible threats to be worried about right now.
With that said, there are plenty of good technical reasons too for why Ubuntu is secure; while it may be practically secure, it would also be difficult to break into the OS even if you wanted to. Probably the most noteworthy aspect here is that Ubuntu does not ship with any outward facing services or daemons, which means there is nothing listening that can be compromised for facilitating a fully automated remote code execution attack. Windows has historically been compromised many times through these attacks, most recently in October of 2008. Firewalls are intended to prevent these kinds of issues, but there is always someone out there that manages to be completely exposed to the internet anyhow, hence not having any outward facing services in the first place is an excellent design decision.
Less enthusing about Ubuntu’s design choices however is that in part because of the lack of services to expose, the OS does not ship with an enabled firewall. The Linux kernel does have built-in firewall functionality through iptables, but out of the box Ubuntu lets everything in and out. This is similar to how Mac OS X ships, and significantly different from how Windows Vista ships, which blocks all incoming connections by default. Worse yet, Ubuntu doesn’t ship with a GUI to control the firewall either (something Mac OS X does), which necessitates pulling down a 3rd party package or configuring it via CLI.
Operating System | Inbound | Outbound |
Windows Vista | All applications blocked, applications can request an open port | All applications allowed, complex GUI to allow blocking them |
Ubuntu 8.04 | All applications allowed, no GUI to change this | All applications allowed, no GUI to change this |
Mac OS X 10.5 | All applications allowed, simple GUI to allow blocking them | All applications allowed, no GUI to change this |
Now to be fair, even if Ubuntu had shipped with a GUI tool for configuring its firewall I likely would have set it up exactly the same as how I leave Mac OS X set up – all incoming connections allowed – nevertheless I find myself scratching my head. Host-based firewalls aren’t the solution to all that ails computer security, but they’re also good ideas. I would rather see Ubuntu ship like Vista does, with an active firewall blocking incoming connections.
Backwards compatibility, or rather the lack thereof, is also a technical security benefit for Ubuntu. Unlike Windows, which attempts to provide security and still support old software that pre-dates modern security in Windows, Ubuntu does not have any such legacy software to deal with. Since Linux has supported the traditional *nix security model from the get-go, properly built legacy software should not expect free reign of the system when running and hence be a modern vulnerability. This is more an artifact of previous design than a feature, but it bears mentioning as a pillar of total security.
Moving on, there is an interesting element of Ubuntu’s design being more secure, but I hesitate to call it intentional. Earlier I mentioned how an OS that doesn’t let a user install software isn’t very useful, but Ubuntu falls under this umbrella somewhat. Because the OS is based heavily around a package manager and signed packages, it’s not well-geared towards installing software outside of the package manager. Depending on how it’s packaged, many downloaded applications need to be manually assigned an executable flag before they can be run, significantly impairing the ability for a user to blindly click on anything that runs. It’s genuinely hard to run non-packaged software on Ubuntu, and in this case that’s a security benefit – it’s that much harder to coerce a user to run malware, even if the dancing pigs problem isn’t solved.
Rounding out the security underpinnings of Ubuntu, we have the more traditional mechanisms. No-eXecute bit support helps to prevent buffer overflow attacks, and Address Space Layout Randomization makes targeting specific memory addresses harder. The traditional *nix sudo security mechanism keeps software running with user privileges unless specifically authenticated to take on full root abilities, making it functionally similar to UAC on Vista (or rather, the other way around). Finally, Ubuntu comes with the AppArmor and SELinux security policy features that enable further locking down the OS, although these are generally overkill for home use.
There’s one last issue I’d like to touch on when it comes to technical security measures, and that’s the nature of open source software. There is a well-reasoned argument that open source software is more secure because it allows for anyone to check the source code for security vulnerabilities and to fix them. Conversely, being able to see the source code means that such vulnerabilities cannot be completely obscured from public view.
It’s not a settled debate, nor do I intend to settle it, but it bears mentioning. Looking through the list of updates on a fresh Ubuntu install and the CERT vulnerability list, there are a number of potential vulnerabilities in various programs included with Ubuntu – Firefox for example has been patched for vulnerabilities seven times now. There are enough vulnerabilities that I don’t believe just counting them is a good way to decide if Ubuntu being open source has a significant impact on improving its security. Plus this comes full-circle with the notion of Ubuntu being practically secure (are there more vulnerabilities that people aren’t bothering to look for?), but nevertheless it’s my belief that being open source is a security benefit for Ubuntu here, even if I can’t completely prove it.
Because of the aforementioned ability to see and modify any and every bit of code in Ubuntu and its applications, Ubuntu also gains a security advantage in that it’s possible for users to manually patch flaws immediately (assuming they know how) and that with that ability Ubuntu security updates are pushed out just about as rapidly as humanly possible. This is a significant distinction from Windows and Patch Tuesday, and while Microsoft has a good business reason for doing this (IT admins would rather get all their patches at once, rather than testing new patches constantly) it’s not good technical reasoning. Ubuntu is more secure than Windows through the virtue of patching most vulnerabilities sooner than Windows.
Finally, looking at Ubuntu there are certainly areas for improvement with security. I’ve already touched on the firewall abilities, but sandboxing is the other notable weakness here. Windows has seen a lot of work put into sandboxing Internet Explorer so that machines cannot get hit with drive-by malware downloads, and it has proven to be effective. Both Internet Explorer and Google’s Chrome implement sandboxes using different methods, with similar results. Meanwhile Chrome is not ready for Linux, and Firefox lacks sandboxing abilities. Given the importance of the browser in certain kinds of malware infections, Ubuntu would benefit greatly from having Firefox sandboxed, even if no one is specifically targeting Ubuntu right now.
195 Comments
View All Comments
Guspaz - Wednesday, August 26, 2009 - link
"Not that it would necessarily be of much use, the last time I saw any statistics for instant messaging network usage, the vast majority of North American users were on AOL’s AIM network."IM use is highly regionalized. As such, AIM is clearly the dominant IM in the USA. However, Canada is dominated by MSN Messenger, and has been for many years (most of us migrated from ICQ to MSN around the release of Windows XP, I believe, due to the bundling of then Windows Messenger).
So, if Canada is dominated by MSN, while I can't speak for Mexico, it's misleading to claim that "the vast majority of North American users". As a Canadian, I can't think of anybody I know in person that uses AIM. They all use MSN or Google Talk without exception.
Aclough - Wednesday, August 26, 2009 - link
For myself, the thing that most bugs me when I have to go back to Windows is all the missing features from the window manager. I've come to rely on having multiple workspaces on my desktop, but I can adjust to having just one fairly easily when I'm not working on a lot of different stuff at once. What really bugs me, though, is how much more effort it takes to move or resize windows in Windows. On Linux I can press ALT and then click anywhere on the window, but with Windows I have to carefully click the title bar or the very edge of the window and that takes a noticeably longer time once you're used to doing things differently.Oh, and I find that the Linux scheduler seems to be noticeably better than the Windows one in preserving responsiveness when the system is under load.
fumacapena - Wednesday, August 26, 2009 - link
Great article!How about some benchmarks of "minimal" distros (like Puppy, Tine Core, ...)??
I like the idea of "ressurect" an old PC, but I would like to see benchmarks in Quad Cores, i7 too!
Anandtech is great, Bench(beta) is awesome!!
(sorry by bad english)
Thanks
InGraphite - Wednesday, August 26, 2009 - link
A few months ago most major trackers unbanned Transmission, but it still doesn't seem to be universally accepted on private trackers.I remember offhand (I could be wrong) that the main gripe was due to the fact it made excessive queries and thus flooded trackers with requests, or had the ability to.
chomlee - Wednesday, August 26, 2009 - link
I think you really need to mention the big picture here.I myself just tried Ubuntu for the first time 2 months ago and although I will admit that I have spent up to 8 hours trying to figure out how to install a specific program (before I found out there was a way to get the package manager to find the install), and I wanted to smash my computer at times. Now that I have learned quite a bit more, I realized that the few things I have installed worked great and flawlessly.
Anyhow back to the big picture. I can understand some of your concerns with how the OS will work with specific programs but what I have found is that most people I know use their computers for 2 things email and web browsing. Most of these people are constantly having problems with the system running too slow and cant seem to get rid of hidden viruses/malware. So I think that those people could easily be much happier with a simple OS like Ubuntu just for email and web browsing (And I would get a heck of alot of less calls from my dad asking my why his computer is running too slow). Lets also not forget that everything is moving to be browser compatible (like you mentioned).
Also, for people like myself, I use my Ubuntu system for a file server as well as a media center (XBMC is Awesome).
So, yes, for burning DVDs/CDs/Playing Games/Microsoft Office, I see no reason why you wouldn't use windows, but I think 95% of the users would be perfectly fine with ubuntu which is something that Mr Bill would not be very happy about when the public realizes this.
Keno - Thursday, August 27, 2009 - link
I think you have missed one small but important part.I am Ubuntu user since 8.04. I came to Linux because of the constant treat of viruses.
Last month I have installed 7 and it is very user friendly and I think it is very user frinedly but after Avira Antivir got crashed by virus I installed Kaspersky INternet security 2010. then it took almost twice as long to boot. Then I gladly returned to Ubuntu 9.04. Because MIcrosoft can not exist without Antivirus I think you should do some real benchmarking and test windows WITH Antivirus.
On Ubuntu I have ClamWin just in case i get some files from Windows users:)
Thanks
ioannis - Wednesday, August 26, 2009 - link
just wanted to point out that you can install software under the LiveCD. Of course it does not install on the hard drive. It remains on a ram-drive, so when you reboot, it's gone. It's still useful, if you wish to test out some package or perform some task with a tool not installed by default on the LiveCDstrikeback03 - Wednesday, August 26, 2009 - link
Even more useful (and not mentioned) is that Ubuntu can easily run off a flash drive, and more recent versions even include a GUI tool for installing it to one. Then all installs and other changes are saved from session to session, and everything runs much more quickly than the LiveCD.Mr Pearce - Wednesday, August 26, 2009 - link
It would be great if you could do more articles on compiler and especially driver performance differences. That was the most interesting part of this article.Ryan Smith - Wednesday, August 26, 2009 - link
This is what Part 2 will look at. I can compile some stuff by hand to see if it closes the Windows/Ubuntu gap, and I have plenty of video cards on hand to test what I can when it comes to graphics.