Kenneth van Wyk: Lingering faults with security by default

FREE

Become An Insider

Sign up now and get free access to hundreds of Insider articles, guides, reviews, interviews, blogs, and other premium content from the best tech brands on the Internet: CIO, CITEworld, CSO, Computerworld, InfoWorld, ITworld and Network World. Learn more.

The out-of-the-box security settings for Apple's new iPhone 5S are just the latest example

It seems that every time we take a step toward better security by default, we end up taking one or two back just a short while later. Take the iPhone 5S. It's got that fingerprint scanner, betokening renewed attention being paid to security. But it also has what I'd have to call reckless out-of-the-box security configurations.

Let me give you a bit of context. My first encounter with the security-by-default wars was way back in the early 1990s, when Sun Microsystems famously and consistently delivered its systems with a "+" in their /etc/hosts.equiv files.

What's the big deal? Well, that little "+" resulted in every default-configured Sun machine trusting (for remote logins and file system mounts) the entire network to which it was connected. To exacerbate the problem, in those largely firewall-free days of the Internet, it meant that a default-configured Sun ended up "trusting" the entire Internet.

To continue reading, please begin the free registration process or sign in to your Insider account by entering your email address:
FREE Computerworld Insider Guide: IT Certification Study Tips
Editors' Picks
Join the discussion
Be the first to comment on this article. Our Commenting Policies