BugTraq
Microsoft and Security Jun 25 2004 06:53PM
http-equiv@excite.com (1 malware com) (1 replies)
Re: Microsoft and Security Jun 26 2004 08:21AM
Radoslav DejanoviÄ? (radoslav dejanovic opsus hr) (1 replies)
Re: Microsoft and Security Jun 28 2004 12:41PM
Justin Wheeler (jwheeler datademons com) (1 replies)
RE: Microsoft and Security Jul 04 2004 09:06PM
Alun Jones (alun texis com) (3 replies)
Re: Microsoft and Security Jul 06 2004 12:33AM
Jason Coombs (jasonc science org)
Re: Microsoft and Security Jul 05 2004 05:58PM
Justin Wheeler (jwheeler datademons com) (1 replies)
RE: Microsoft and Security Jul 05 2004 11:10PM
Alun Jones (alun texis com) (2 replies)
Justin Wheeler <mailto:jwheeler (at) datademons (dot) com [email concealed]> wrote on Monday, July
05, 2004 10:58 AM:
> The simple argument I was making was that if MS' "testing
> process" is what
> keeps patches from coming out in a timely manner, perhaps they should
> actually be of decent quality. When you're getting patches
> that are both
> slow to release, as well as adversely affecting the systems
> they're being
> installed on, MS has met neither of their agends.

It's not "either perfect quality assurance or immediate patching", sadly.

We spend so much time in our binary world, that we forget that real and
complex human processes are not binary - there are a large number of shades
of grey.

The immediate patch carries maximum risk, and the perfect patch requires
unconscionable amounts of time to verify its correctness. Between those two
endpoints, however, you'll find a huge variance in what is acceptable risk
of damage from a patch versus acceptable delay to test. And unfortunately,
neither of those two values is a) measurable, or b) the same for each user.

It's a balancing act, and one performed without a net. And we've only
touched on two of the variables in this balance. There's also third-party
software, whose vendors tend to get a little tetchy when their software
doesn't work the same way it has for years, even if it's because they're
relying on undocumented and unsecure behaviour. There's probably a dozen
other variables that you need to consider. If you've ever had to respond to
a security vulnerability (perhaps if you've had to respond to more than
one), you'll understand the way that the process works, and that a rushed
untested 'patch' is worse than the worst tested patch.

A tested patch will at least work on the majority of systems. An untested
patch runs a high risk of not working at all. The problems you've pointed
to are issues with outliers - usually customers running specialised software
- not widespread damage to people with mundane configurations. Usually such
outlier customers would be the ones most able to test their own
configurations prior to rolling out any patch, though, and I would always
suggest that those who can test, should test, any patch or upgrade in their
own environment prior to patching.

Microsoft employs people who care about producing good software. We're all
indoctrinated from day one that our software is used by everyone - our
parents, our neighbours, our children... It's perhaps a unique situation
compared to producers of the other OSs, where the users are usually limited
to particular sections of the community.

I really don't think you'll find much truck with the idea that Microsoft
employees are happy to leave their mother's home machine, or those of the
general public, open to infection.

Alun.
~~~~

[ reply ]
Re: Microsoft and Security Jul 09 2004 03:21PM
Valdis Kletnieks vt edu (1 replies)
Re: Microsoft and Security Jul 12 2004 11:47AM
Charles Otstot (charles otstot ncmail net) (1 replies)
Re: Microsoft and Security Jul 17 2004 12:47AM
Lucas Holt (luke foolishgames com)
RE: Microsoft and Security Jul 06 2004 07:04PM
David F. Skoll (dfs roaringpenguin com) (1 replies)
Re: Microsoft and Security Jul 07 2004 12:57PM
Adam Shostack (adam homeport org)
RE: Microsoft and Security Jul 05 2004 07:40AM
Radoslav Dejanovic (radoslav dejanovic opsus hr)


 

Privacy Statement
Copyright 2010, SecurityFocus