The biggest proportion of attacks on Linux systems come from authorised users, and most were enabled by security misconfigurations, according to a new survey of Linux developers from Evans Data.
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Linux developers said they had few problems with attacks and viruses overall, with 92% saying their Linux systems have never been infected with a virus, and 78% saying their systems have never been hacked.
Less than 7% claimed to have been hacked three or more times.
Two years ago, 94% were virus-free, while the attack figures were about the same.
Despite the slight fall, however, the figures remain far below the average. In a survey of all types of North American developers this spring, Evans found that 60% of developers said they had been breached and 32% had been hit at least three times.
The responses of Linux developers are reinforced by a general perception among developers of all stripes that Linux is the most secure platform. In a survey of more than 400 developers and IT managers last month, the largest proportion of respondents - 25% - said Linux was the most secure platform, followed closely by Windows 2003 at 19%.
Windows 2003's position has jumped more than 40% in the past six months, Evans said, boosted by the platform's explicit security support.
Windows XP, and Trusted Solaris were chosen by fewer than 10%, while Mac OS X, IBM Corp.'s AIX, HP-Unix, Windows NT and other operating systems were named by less than 5%.
Of the 22% of admitted hacks, the largest proportion - 23% - were by internal users with valid login IDs, respondents said.
The top factor allowing the attack was misconfiguration (13%) followed by internet service vulnerabilities (8.2%) and web server flaws (8.0%).
Linux kernel flaws allowed 5.5% of the attacks, Evans said. Examples of misconfiguration include forgetting to put a server behind a firewall and improperly enabling the firewall.
"Ironically, the flaws that crackers use to compromise Linux servers are flaws in applications which run on competing operating systems, so those vulnerabilities are not specific to Linux," said Nicholas Petreley, Evans Data's Linux analyst.
Linux developers are not alone in blaming users for allowing security breaches. In last month's security survey Evans found that the biggest proportion of developers (25%) said the biggest problem in implementing security was "social engineering". That is, users' lack of adherence to security policies.
Fifteen percent said their biggest headache was a lack of qualified personnel. They had little sympathy for user incompetence, with only 11% agreeing that security systems were too complicated.
Developers also disagreed with the oft-cited user complaint that security gets in the way of performance, with only 1.3% citing performance as a difficulty.
Adoption of the new version 2.6 Linux kernel is proceeding apace, rising more than 80% in the past six months, Evans said.
Forty percent of developers have now migrated at least some of their Linux installations to the 2.6 kernel, with more than 30% planning the switch within six months, and 12% expecting migration to take longer than one year.
"Only recently have major Linux distributors started including the 2.6 kernels as the default, so at least some portion of the large number of developers represented here as using a 2.6 kernel are likely to have installed it manually, themselves," Evans Data said.
Matthew Broersma writes for Techworld.com