|
ntwrk: Commentaries: Could Server Uptime Bring Security Downtime? |
|
|
Could Server Uptime Bring Security Downtime?
By Larry Seltzer
Conventional wisdom would have it that a Windows system needs to be rebooted every time you play a tough game, every time the kids hit a new Web site, and every time Law and Order is on the tube. It's really an exaggerated reputation.
I know of Windows servers, especially Windows 2000 servers, that have been up for months and even years. When you have a server that performs a small number of tasks and you don't mess with it—for example, foregoing installations of random shareware—it's not unreasonable to think it will go on forever. Most of the long-running servers I hear about are backup domain controllers (BDCs in NT-speak) or print servers or simple file servers. At the same time, I know of an Internet cafe that uses an Windows NT4 server as the main domain controller, print server and file server—and the thing never goes down.
Of course, one of the most common reasons to have to reboot a Windows system is to install a security patch. So if you find a Windows system that has been up and running for years, you have to wonder how many gaping, famous, unpatched security holes are sitting there on the system.
I was especially surprised to see in the latest news from Netcraft that the Baltimore Technologies Web site has been up working without a reboot for more than two years now, making it the Cal Ripkin of Windows 2000 Web servers.
Baltimore Technologies is a security company, long a player in the enterprise public key infrastructure (PKI) business. One would think that a security company would be conscious enough of security issues that they would apply patch every now and then.
Not only does it appear that Baltimore Technologies hasn't applied these patches—because quite a few of them do require reboots—but it appears that they have gotten away with it. As the Netcraft article says, in two years even a not-so-famous company like this would have had a serious amount of traffic on their Web site. And they're still running. I suppose it's possible that the site was hacked and Baltimore doesn't know it, but that's very doubtful.
When I asked Netcraft about it, I think they shared my sense of incredulity at the situation. Still, they pointed out that not every function of Windows and IIS is open to attack. If a server did not use any of the usually affected technologies, for example by offering WebDAV services or running SQL Server or leaving Port 35 open to the Internet, there's no really critical problem that a 2-year old version of Windows 2000 Server would be subject to attack. Baltimore's site appears to be a testament to Microsoft's work to remove memory leaks from the basic Windows kernel and IIS.
Baltimore Technologies agreed, according to the Netcraft article. The Web site's reliability is enabled by 'a stable power source, good physical security, a webmaster who cooperates with the networks team and a proper screening firewall,' said Keith O'Byrne, a network engineer with Baltimore Technologies. So it's not just Windows 2000, but the good work of Baltimore staff that's responsible.
Stories like this make you wonder. Is it worth applying security patches as a matter of course, or better to scrutinize the patch to make sure that it's relevant to a function you're actually running? Both approaches could be called conservative, because examining patches follows the don't fix it if it ain't broke maxim. But my own preference is better safe than sorry, also a conservative track.
Yet a better question to ask would be: Who cares about uptime, per se?
As long as the server isn't being rebooted because of a memory leak or because some malfunctioning app refuses to quit, it's just a minor hassle. Most sites can afford to be down, or serve content from external caches, for the few minutes it takes to reboot. Besides, if a site is so busy that it can't afford such downtime, it probably needs some redundancy anyway.
So it's best to skip Baltimore Technologies as an example of usual practice. For most of us, running a 2 year old Windows isn't worth the risk.
Security Center Editor Larry Seltzer has worked in and written about the computer industry since 1983.
eWeek
|
|
|
|
Posted on Friday, 31 October 2003 @ 04:35:00 EST by phoenix22
|
|
|
|
|
Login |
|
|
|
|
|
· New User? ·
Click here to create a registered account.
|
|
|
Article Rating |
|
|
|
|
|
Average Score: 0
Votes: 0
|
|
|