LinuxQuestions.org
Visit Jeremy's Blog.
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 07-22-2005, 06:56 AM   #1
Itachi
Member
 
Registered: Jan 2005
Posts: 55

Rep: Reputation: 15
Spyware,virus questions


my harddisk is partitioned into two partitions, one holding linux, the other windows. if my linux is hit by a virus or spyware or trojan, then when i connect to the net using windows, will my system be exposed to these malicious wares? (my windows has both antivirus and firewall in place).
Thanks in advance for answer my queries.
 
Old 07-22-2005, 07:04 AM   #2
infinity42
Member
 
Registered: Apr 2005
Location: England
Distribution: Gentoo
Posts: 142

Rep: Reputation: 16
There are no Linux viruses in the wild, due to the extreme difficulty of creating them. Linux has a far better security model than windoze and, while not perfect, makes viruses very difficult to implement. As for Trojans & Spyware, just don't so anything stupid and nothing will happen.. I don't know if there are any for linux, but i've certainly never come across any. But anyway, if by some freak chance linux got infected, it would not affect windoze, as linux binaries cannot be run on windoze and vice-versa.

As for windoze, don't rely on firewalls and antivirus to protect you, they sure help, but there are so many critical flaws in the OS itself you're screwed anyway. All I can say is good luck with windoze...

Hope that explained a few things.
 
Old 07-23-2005, 12:09 AM   #3
Itachi
Member
 
Registered: Jan 2005
Posts: 55

Original Poster
Rep: Reputation: 15
Wink

Thanks a lot. It certainly clear my queries.
 
Old 07-23-2005, 12:12 AM   #4
Itachi
Member
 
Registered: Jan 2005
Posts: 55

Original Poster
Rep: Reputation: 15
another qn. if i run a vnc on my linux, and the vnc pc that i connect to is infected, will my linux get infected ? if i use a windows to run to vnc , what will be outcome be like?
 
Old 07-23-2005, 06:44 AM   #5
ta0kira
Senior Member
 
Registered: Sep 2004
Distribution: FreeBSD 9.1, Kubuntu 12.10
Posts: 3,078

Rep: Reputation: Disabled
Just make sure your Windows machine can't connect to your Linux machine as a privledged user to keep from getting your Linux hacked via Windows if Windows is infected or is connected to the web. If it's the other way around (Linux on the web) you can probably get full control of your Windows machine with the Linux user owning the VNC, but it shouldn't be any less safe than just connecting to the web with a Windows machine by itself.
ta0kira
 
Old 07-23-2005, 11:03 PM   #6
Itachi
Member
 
Registered: Jan 2005
Posts: 55

Original Poster
Rep: Reputation: 15
Just to get a clearer idea.
I set up a vnc server on my remote linux, and i use another linux (client) to access this vnc server. If my remote linux is infected, will my linux(client) be affected?
 
Old 07-24-2005, 09:18 PM   #7
tkedwards
Senior Member
 
Registered: Aug 2004
Location: Munich, Germany
Distribution: Opensuse 11.2
Posts: 1,549

Rep: Reputation: 52
Quote:
I set up a vnc server on my remote linux, and i use another linux (client) to access this vnc server. If my remote linux is infected, will my linux(client) be affected?
Infected with what? As infinity said there are almost no viruses for Linux and none of them have spread widely. A virus would actually require your manual intervention to infect you, ie you'd have to download it, save it to the hard drive, change the permissions on it and then execute it from a terminal. There is also currently no known spyware targetting Linux (it simply isnt a big enough market and has no equivalent of the easily hackable activex on its web browsers) and the equivalent of trojans, which are generally called rootkits in Linux, are things which have to be manually installed by the hacker after they've already compromised your box.

The only way that you could get infected through VNC like that is if some massive vulnerability where discovered in VNC and someone managed to hack the box you are vnc'ing into to get it to send something bad down the connection at you. Such a vulnerability doesn't exist and nothing like it has ever been discovered in VNC.

Really all you need to do is get your firewall settings right and use your distro's update check mechanism every day. Don't run suspicious files or scripts (you'll likely be sticking to packages built for your distro by relatively trusted people anyway) and you should be secure.
 
Old 07-25-2005, 06:58 PM   #8
sundialsvcs
LQ Guru
 
Registered: Feb 2004
Location: SE Tennessee, USA
Distribution: Gentoo, LFS
Posts: 10,970
Blog Entries: 4

Rep: Reputation: 4027Reputation: 4027Reputation: 4027Reputation: 4027Reputation: 4027Reputation: 4027Reputation: 4027Reputation: 4027Reputation: 4027Reputation: 4027Reputation: 4027
Even Windows (yeech... ) is not "the poor kid at school who picks up every cold that comes within a hundred miles of the schoolhouse." Windows malware is uncommonly-successful due to a combination of two reasons:
  1. There are millions of Windows machines out there, all connected to the Internet.
  2. On a substantial number of those machines, the logged-on user is an Administrator, with carte blanche access to the machine.
A "rogue program" is nothing magical: it's simply a program, having malicious intent, that manages to execute on your machine, under your user-id, without your knowledge or consent. It proceeds to wreak havoc by doing things that your user-id is authorized to do, but that you (and no one in their right mind) would actually choose to do. If your user-id is authorized to do "anything," then if the rogue says, "Kill yourself!" your computer will say, "yes, master..." (And Linux would equally-well obey a command sequence like "cd /;rm -rf *" if issued by root. Same suicide, same reason, different language.)

If you take the very simple precaution, as a Windows user, of ensuring that you daily login account is a "Limited User," not "Administrator," then you will find that most of the things a rogue program will attempt to do will fail. Anything truly-nasty that the rogue might do will be limited in scope to "only that user's files." (And if, say, the Windows system simply had a once-daily scheduled task that copied all of a user's home-directory to a backup directory, owned by a separate user-ID and thus enforceably "read-only" to the original user, even those files would be quite securely and painlessly protected!)

The majority of Windows installations, at least home and small-business installations, simply do not bother to do any of these things, and this is why they are continuously struck and why they suffer millions of dollars' worth of damage as a result. I'm not defending Windows here but ... It isn't Windows' fault... it's theirs!

An anti-virus program is a high-tech equivalent of a bailing-pump ... when the correct solution is to close the gate in the dam!

Last edited by sundialsvcs; 07-25-2005 at 07:01 PM.
 
Old 07-25-2005, 07:50 PM   #9
tkedwards
Senior Member
 
Registered: Aug 2004
Location: Munich, Germany
Distribution: Opensuse 11.2
Posts: 1,549

Rep: Reputation: 52
Quote:
A "rogue program" is nothing magical: it's simply a program
Exactly. If only all these people who come on messageboards like this realised that this is why there is no reason to need anti-virus or anti-spyware programs on Linux. To get infected by something in Linux you would have to manually download and execute something manually, there's no mail program that's like older Outlook/Express versions that automatically execute attachments or browsers like IE with its flawed zones security model and ActiveX. There is no need for band-aid, treat-the-symptoms-not-the-problem solutions like anti-virus scanners or spyware removers for Linux. And if you're extra careful in Windows you probably won't need it there either - I didn't get a virus or spyware infection for a couple of years running Windows 2000 and then XP before I switched to Linux.
 
Old 07-25-2005, 08:16 PM   #10
primo
Member
 
Registered: Jun 2005
Posts: 542

Rep: Reputation: 34
Well, Microsoft doesn't help anyway because their programs access the secret innards of the Operating System, which is dangerous..... Their dirty tricks backfire....

You can only "secure" a Windows machine if you turn off NetBIOS, Windows Messenger, UPnP, Active-X (which a lot of sites use) and MS-"RPC" (used by many services) and block their own programs to protect their own OS.

NTFS permissions, too, are ugly... How can most people ever use them effectively?
Their patches are all faulty... How can you trust them?

Also, you must update the antivirus almost everyday. Your box is not only insecure while it's being online: it is too if it was turned off some time

You can secure a Linux machine without the need to reboot (unless you update your kernel)

Any Windows box is a waste of computing power
 
Old 07-25-2005, 08:22 PM   #11
primo
Member
 
Registered: Jun 2005
Posts: 542

Rep: Reputation: 34
Quote:
To get infected by something in Linux you would have to manually download and execute something manually, there's no mail program that's like older Outlook/Express versions that automatically execute attachments or browsers like IE with its flawed zones security model and ActiveX.
This is not entirely true, because vulnerable image formats may contain shellcode that do something to your box. The best way to be secure is not to use the root account for browsing the web and/or play multimedia... Not even uncompressing archives from a known source, if you're paranoid and the machine is a sensitive server. And of course, you must update your browser and the vulnerable libraries from time to time, but it is not as critical as it is currently on Windows
 
Old 07-25-2005, 08:36 PM   #12
tkedwards
Senior Member
 
Registered: Aug 2004
Location: Munich, Germany
Distribution: Opensuse 11.2
Posts: 1,549

Rep: Reputation: 52
Quote:
This is not entirely true, because vulnerable image formats may contain shellcode that do something to your box
All of which will currently be patched on up to date Linux installs. But my point was that on a properly setup up-to-date Linux box, there is no reason that viruses will 'just execute', you would have to manually intervene to make them do this. You can think up any number of potential vulnerabilities that may be discovered in future, eg 'what if the kernel has a bug that allows remote execution of code.. etc etc.' but this is a seperate issue to wether you should have AV software to protect against the execution of viruses. If a serve remote-execution flaw is found in the OS then its extremely unlikely that AV software would be able to protect you, so its a seperate issue.
 
Old 07-25-2005, 08:49 PM   #13
sundialsvcs
LQ Guru
 
Registered: Feb 2004
Location: SE Tennessee, USA
Distribution: Gentoo, LFS
Posts: 10,970
Blog Entries: 4

Rep: Reputation: 4027Reputation: 4027Reputation: 4027Reputation: 4027Reputation: 4027Reputation: 4027Reputation: 4027Reputation: 4027Reputation: 4027Reputation: 4027Reputation: 4027
I am not willing to say that "Linux cannot get viruses," because that statement really is not true. Any operating-system can be penetrated, particularly if the user can obtain surreptitious access to a shell-prompt or its equivalent. Exploits, including very serious ones, do exist for Linux.

The Windows OS is complicated ... unnecessarily so, in many cases ... and it is often difficult to know what is or is not enabled. But the overwhelming principal cause of the reasons for its growing reputation of insecurity is, simply, the fact that it has become popular. The rest is simple probability. The odds that "of a sample of X IP-addresses, Y vulnerable systems will be found" are exploitably-large.

The flaw is not so much "the system," but how that system is deployed and used. The simple fact that Linux users probably aren't root ... is an unexpectedly large factor in reducing that probability. This, by itself, is enough to produce the popular notion that "Windows is vulnerable and Linux is not." Linux users should also be vigilant.

Last edited by sundialsvcs; 07-25-2005 at 08:50 PM.
 
Old 07-25-2005, 09:09 PM   #14
primo
Member
 
Registered: Jun 2005
Posts: 542

Rep: Reputation: 34
Quote:
Originally posted by sundialsvcs
But the overwhelming principal cause of the reasons for its growing reputation of insecurity is, simply, the fact that it has become popular. The rest is simple probability. The odds that "of a sample of X IP-addresses, Y vulnerable systems will be found" are exploitably-large.
You're mixing things. Popularity doesn't mean vulnerability (this only happens to Hollywood stars) because one thing is the number of machines infected per OS, and another is (in)secure design.
The number of infected Windows machines is greater because there are more Windows boxes out there, this is clear. But you can't mix this with the design approach used by each OS...
The odds of finding exploitable vulnerabilities in Windows is higher too, and it is not because of its popularity... it's because of its bad design...

Unix is a developer-oriented OS. All programmers may find things that may be improved. On Windows, you will only find bugs

Quote:
The flaw is not so much "the system," but how that system is deployed and used. The simple fact that Linux users probably aren't root ... is an unexpectedly large factor in reducing that probability. This, by itself, is enough to produce the popular notion that "Windows is vulnerable and Linux is not." Linux users should also be vigilant. [/B]
Mmmm. Not true. Many Unix and Windows servers run with root privileges. Is there something like chroot(2) in Windows?

Last edited by primo; 07-25-2005 at 09:15 PM.
 
Old 07-25-2005, 09:10 PM   #15
aysiu
Senior Member
 
Registered: May 2005
Distribution: Ubuntu with IceWM
Posts: 1,775

Rep: Reputation: 86
The problem here is that computer users don't really want to be vigilant. Most computer users have two modes--complacent and paranoid.

Come to think of it, that mindset goes beyond computing; just look at America and terrorist attacks. Pre-9/11: complacent. Post-9/11: paranoid.

Do you need to worry that every little thing you do in Linux could possibly let in a virus? Is your computer likely to be infected by a virus in Linux without anti-virus software (is there anti-virus Linux software?)? Probably not. Does that mean you can do whatever the hell you want in Linux and not have to worry about security? No.

I don't go about my life worrying that someone's going to break into my apartment or steal my car. That doesn't mean I leave the doors unlocked either. Same with computers. I do a few simple things to secure my computer (a firewall, turning off javascript for most sites, reading messages text-only, not logging in as root), and I hope for the best.

Nothing's ever 100% fullproof. I was reading in Newsweek a little while back an article about identity theft. Some of the people they profiled as victims did everything they were "supposed" to do. They checked their credit reports regularly. They never gave out unnecessary information. They shredded documents. Still, they got their identities stolen.

So, you can't ever be invulnerable against malware or security breaches, no matter what your operating system, but you also should realize that sometimes you're safer than other times.

When I used to live in the suburbs as a kid, I knew scary things could happen. I could be kidnapped. My parents' house could burn down. None of these things happened, but I didn't harbor illusions that we were invincible. Now that I live in the city, I've had my car broken into three times in three years. Was I safer in the suburbs? Yes. Was I invincible in the suburbs? No.

Same with Linux. Will anything bad happen to your computer if you run Linux as user, not root? Probably not. But you can never be sure. It's still better than running Windows as administrator, though.

Last edited by aysiu; 07-25-2005 at 09:12 PM.
 
  


Reply


Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Anti-Virus/Firewall/Spyware ClericPreston Linux - Newbie 16 05-25-2005 04:43 PM
Virus spyware software with Slackware. dcc Linux - Security 1 03-03-2005 02:51 PM
spyware/virus insertion into OSS? jbeyer General 5 01-20-2005 07:24 AM
spyware/virus insertion in OSS? jbeyer Linux - General 2 01-13-2005 03:44 AM
spyware virus question true_atlantis Linux - Newbie 1 08-27-2004 01:25 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 08:55 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration