----- Original Message -----
From: C Francis Pineda
To: [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Sent: Thursday, April 03, 2003 10:17 AM
Subject: Re: [plug] OPERATION: Defend the Penguin


>i think that would be great, we can have that instead of the
> openbsd - mike, our cto suggests that openbsd is almost
> not considered an "official entry" to this type of competition
> as this was built becauseof security. who can i talk to your group?

thanks for the reply francis... we will let you know to whom you are going
to talk to but we need a special request on your part if possible... 3 days
is a short period of time for giving a rule contest... we are requesting for
as soon as possible to state the rule contest... i believe that there will
be lots of clarifications on this matter...  i will state some
clarifications here as i read the first post of ian sison and i quote:

"We will be given 3 days to bring online a hardened server with
a specifically chosen set of services to offer."

as i understand here, the hackers will be the one to provide us what
services are going to run...

first clarification... are they going to provide us the source code and we
will be the one responsible to compile and run it? or they will provide us a
compiled program and we will just run it?

the issues here for the first clarification are the followings:

first... majority of the hackers are focusing on the buffer overflow... im
pretty sure that these services they are going to offer are already well
known to them as vulnerable and know where the holes are... second, if they
provide us the source code (or close code), we need to examine the code
first and it will takes time because we are always assuming that they will
going to put a backdoor in it... eventhough, your system is fully protected
with buffer overflow, it will be useless if there is a backdoor...

second clarification.. they must define clearly about the definition of a
hacked system..

example scenario of second clarification... they told us to run apache web
server.. they knew that there is a remote buffer overflow of the said
server... they are trying to deface the web site but the filesystem where
the html files reside are read-only files... therefore no matter what they
are going to do.. they cant remove and change the files... but the question,
is this already considered as a hacked system because of the successful
remote buffer overflow but the html files are still the same?

im pretty sure there are lot lot more of clarificaitons once the rules are
stated and therefore takes time to evaluate these issues... and that is why
we are asking if possible to state the rules as soon as possible...

with this we have the time to consider the rule contest if we are still
willing to join or not.... as the saying goes "if a problem is not
completely understood, it is probably best to provide no solution at all"

fooler.





_
Philippine Linux Users Group. Web site and archives at http://plug.linux.org.ph
To leave: send "unsubscribe" in the body to [EMAIL PROTECTED]

Fully Searchable Archives With Friendly Web Interface at http://marc.free.net.ph

To subscribe to the Linux Newbies' List: send "subscribe" in the body to [EMAIL 
PROTECTED]

Reply via email to