[SC-L] Unreal IRCd backdoor

2010-06-14 Thread Gadi Evron

Very interesting post by Fyodor:
http://seclists.org/nmap-dev/2010/q2/826

Gadi.
___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
Follow KRvW Associates on Twitter at: http://twitter.com/KRvW_Associates
___


Re: [SC-L] Fully Countering Trusting Trust through Diverse Double-Compiling

2009-11-04 Thread Gadi Evron

Wheeler, David A wrote:

Gadi Evron said:

David, this is very cool indeed. Thank you for sharing, and a lot of luck!


Thanks!


I'd like to note in a semi-related fashion that the concept of trusting
trust, while in the original paper limited to the compiler case, is a
generic concept in security and could go on up and down the chain of
trust forever (beyond the compiler), until at some point you take
something on blind faith.


Actually, I talk about that in the dissertation.

First, it is perfectly reasonable to redefine the word "compiler" to include all sorts of 
components that you might traditionally define as part of the "environment".  For example, you 
could include the entire operating system as well as what we would traditionally define as 
"compiler".  Of course, now you need all of ITS source code, as a different trusted compiler that's 
able to compile it, as well as time to make it work.  The good news is that, once you did that, you'd have 
then verified that ALL of those executables correspond to their source code.

Second, I do not agree that this is BLIND faith.  I agree that you must eventually accept 
SOME set of components as being sufficiently trustworthy.  But the idea is to use a 
separate trusted compiler/environment to verify your original items.  At that point, I 
don't think it's BLIND at all; you hope the original components are okay, but you've also 
performed a verification step to increase your confidence that this is so.  The phrase 
"trust, but verify" comes to mind :-).


Exactly, it is an endless process of trust, as you trust the second 
system/environment to be secure, or at least without a backdoor.


But while I really like the discussion, I don't want to take away from 
the value of your work. Thanks again for sharing!


Gadi.


--
Gadi Evron,
g...@linuxbox.org.

Blog: http://gevron.livejournal.com/
___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
___


Re: [SC-L] Fully Countering Trusting Trust through Diverse Double-Compiling

2009-11-04 Thread Gadi Evron

Wheeler, David A wrote:

All -

As you know, in the "trusting trust" attack, compilers can be subverted to 
insert malicious Trojan horses into critical software... including themselves.  This 
turns out to be a nasty attack that's not easy to counter.

I've just released my draft PhD dissertation, "Fully Countering Trusting Trust through Diverse 
Double-Compiling" (DDC), that describes how to counter the "trusting trust" attack. 
More details, including the dissertation, are here:
 http://www.dwheeler.com/trusting-trust

On November 23, 2009, 1-3pm, I will be giving a public defense of this dissertation.  If you're interested, please come!  It will be at George Mason University, Fairfax, Virginia, Innovation Hall, room 105. 


This 2009 dissertation significantly extends my previous 2005 ACSAC paper. For example, I 
now have a formal proof that DDC is effective (the ACSAC paper only had an informal 
justification). I also have additional demonstrations, including one with GCC (to show 
that it scales up) and one with a maliciously corrupted compiler (to show that it really 
does detect them in the real world). The dissertation is also more general; the ACSAC 
paper only considered the special case of a "self-parenting" compiler, while 
the dissertation eliminates that assumption.



David, this is very cool indeed. Thank you for sharing, and a lot of luck!

I'd like to note in a semi-related fashion that the concept of trusting 
trust, while in the original paper limited to the compiler case, is a 
generic concept in security and could go on up and down the chain of 
trust forever (beyond the compiler), until at some point you take 
something on blind faith.


Gadi.



--- David A. Wheeler


___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
___




--
Gadi Evron,
g...@linuxbox.org.

Blog: http://gevron.livejournal.com/
___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
___


Re: [SC-L] Supply Chain Resiliency Project Assistance

2009-03-22 Thread Gadi Evron
On Sun, 22 Mar 2009, Gary McGraw wrote:
> hi sc-l,
>
> For what it's worth, I am involved in the project with jmr...as is Sammy 
> Migues.  jmr was our BSIMM participant from DTCC.  Their software security 
> initiative is most impressive.

I don't know much TOO much about supply chain issues, but I have to admit 
that the lecture i heard on the subject by Marcus Sachs was highly 
interesting and opened my eyes.

Blessed initiative.

Gadi.

> gem
>
>
> On 3/22/09 9:08 AM, "Mason Brown"  wrote:
>
>
> Jim Routh, CISO at Depository Trust and Clearing Corporation is leading a
> project for the Financial Services ISAC.  There is a lot of knowledge on
> this list and I was hoping you might be willing to offer your thoughts.
> Below is the request from Jim.  If you have thoughts or data and could
> share it, I'll be happy to collate and send back to the list or to anyone
> that requests.  After he presents it to the FS-ISAC in May, the complete
> information will be made public.
>
> Important project if your organization uses contractors and outsourcers to
> design, build or deploy important applications. Jim Routh, CISO at
> Depository Trust and Clearing Corporation (and one of the top CISOs in
> implementing application security), leads a broad industry team
> identifying leading practices in improving supply chain resiliency --
> specifically in the area of procurement for outsourcing software
> development and services. They have asked for your help in finding sources
> of information in the public domain and/or descriptions of a practice or
> control that you have used that actually mitigates one or
> more risks. If you have experience or knowledge of security controls and
> practices specific to the outsourcing of application development through
> service providers please send a note to Mason Brown at mbr...@sans.org.
> This can include things like sample contract language or URLs
> information/resources you have seen or used. We will provide a summary of
> the information to anyone who contributes or expresses and interest in
> seeing the results.
>
>
> ***
> Action Required:
>
> Give some thought to helpful information on security controls and
> practices specific to the outsourcing of application development work
> through service providers that will help improve the resiliency of the
> supply chain that may be in two categories:
>
> 1. Source information in the public domain with reference information on
> where to find it (eg: url)
> 2. Description of a practice/control along with a summary of the risks
> mitigated
>
> We are striving to create a summary of practices/controls for
> consideration for those organizations interested in significantly
> increasing their supply chain resiliency and mitigate the risk of sabotage
> of supply chain sources. This information along with the survey results
> will provide the information security professional with a source of
> information enabling him/her to determine the appropriate
> practices/controls for his/her organization.
>
>
>
> Mason Brown, Director
> SANS Institute (www.sans.org)
> 865-692-0978 (w)
>
>
> Don't miss SANSFIRE 2009 with the Internet Storm Center! June 13-22 in
> Baltimore, MD http://www.sans.org/info/39248
>
> "SANS courses are hands-down the best security courses in the industry." -
> Scott Hiltis, Bruce Power
>
> ___
> Secure Coding mailing list (SC-L) SC-L@securecoding.org
> List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
> List charter available at - http://www.securecoding.org/list/charter.php
> SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
> as a free, non-commercial service to the software security community.
> ___
>
>
> ___
> Secure Coding mailing list (SC-L) SC-L@securecoding.org
> List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
> List charter available at - http://www.securecoding.org/list/charter.php
> SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
> as a free, non-commercial service to the software security community.
> ___
>
___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
___


Re: [SC-L] Secure Development World ?

2008-03-14 Thread Gadi Evron
On Fri, 14 Mar 2008, Steven M. Christey wrote:
>
> Gadi,
>
> All indications are that it was cancelled.  Would have been nice if they'd
> informed the speakers.  Too bad, too - it was looking like it would be a
> great conference.

They didn't inform me I am speaking, a Google alert did.
They informed me it was cancelled, but just a couple of weeks to the 
conference and the web page doesn't indicate it. So making sure.


>
> - Steve
>
>
> On Fri, 14 Mar 2008, Gadi Evron wrote:
>
>> I am trying to understand if this conference is cancelled or not?
>> ___
>> Secure Coding mailing list (SC-L) SC-L@securecoding.org
>> List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
>> List charter available at - http://www.securecoding.org/list/charter.php
>> SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
>> as a free, non-commercial service to the software security community.
>> ___
>>
>
___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
___


[SC-L] Secure Development World ?

2008-03-14 Thread Gadi Evron
I am trying to understand if this conference is cancelled or not?
___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
___


Re: [SC-L] MetriCon 2.0 CFP

2007-04-25 Thread Gadi Evron
On Tue, 24 Apr 2007, Gunnar Peterson wrote:
> Book is here
> 
> "Security Metrics: Replacing Fear, Uncertainty, and Doubt" by Andrew Jaquith

I thought it was about ROSI all over again? Having been to and spoken at
several CISO conferences, I stayed away from this book up to now.

> http://www.amazon.com/Security-Metrics-Replacing-Uncertainty-Doubt/dp/032134
> 9989
> 
> I am halfway through and it is excellent so far, will post a review soon.
> Not sure how the security industry as we know it will get by without fud.

Pretty good! Thank you very much. The problem of teaching security
practitioners on how to "speak" without FUD, even if they don't see it as
FUD, is just as great.

Gadi.

> 
> -gp
> 
> On 4/24/07 7:32 PM, "Gary McGraw" <[EMAIL PROTECTED]> wrote:
> 
> > Plus, check out Andrew Jaquith's excellent book:
> > 
> >  -Original Message-
> > From:  Gunnar Peterson [mailto:[EMAIL PROTECTED]
> > Sent: Tue Apr 24 20:14:53 2007
> > To: Secure Mailing List
> > Subject: [SC-L] MetriCon 2.0 CFP
> > 
> > Last year's conference, MetriCon 1.0 featured a software security metrics
> > track ( http://securitymetrics.org/content/Wiki.jsp?page=Metricon1.0),
> > including:
> > 
> > * A Metric for Evaluating Static Analysis Tools - Chess & Tsipenyuk, Fortify
> > * An Attack Surface Metric - Manadhata & Wing, Carnegie-Mellon
> > * "Good enough" Metrics - Epstein, WebMethods
> > * Software Security Patterns and Risk - Heyman & Huygens, U of Leuven
> > * Code Metrics - Chandra, Secure Software
> > 
> > -gp
> > 
> > Second Workshop on Security Metrics (MetriCon 2.0) < Call for Papers
> > MetriCon 2.0 CFP
> > 
> > August 7, 2007 Boston, MA
> > 
> > Overview
> > 
> > Do you cringe at the subjectivity applied to security in every manner? If
> > so, MetriCon 2.0 may be your antidote to change security from an artistic
> > "matter of opinion" into an objective, quantifiable science. The time for
> > adjectives and adverbs has gone; the time for hard facts and data has come.
> > 
> > MetriCon 2.0 is intended as a forum for lively, practical discussion in the
> > area of security metrics. It is a forum for quantifiable approaches and
> > results to problems afflicting information security today, with a bias
> > towards practical, specific implementations. Topics and presentations will
> > be selected for their potential to stimulate discussion in the Workshop.
> > 
> > MetriCon 2.0 will be a one-day event, Tuesday, August 7, 2007, co-located
> > with the 16th USENIX Security Symposium in Boston, MA, USA
> > (http://www.usenix.org/events/sec07/). Beginning first thing in the morning,
> > with meals taken in the meeting room, and extending into the evening.
> > Attendance will be by invitation and limited to 60 participants. All
> > participants will be expected to "come with findings" and be willing to
> > address the group in some fashion, formally or not. Preference given to the
> > authors of position papers/presentations who have actual work in progress.
> > 
> > Each presenter will have 10-15 minutes to present his or her idea, followed
> > by 15-20 minutes of discussion with the workshop participants. Panels and
> > groups of related presentations may be proposed to present different
> > approaches to selected topics, and will be steered by what sorts of
> > proposals come in response to this Call.
> > 
> > 
> > Goals and Topics
> > 
> > The goal of the workshop is to stimulate discussion of and thinking about
> > security metrics and to do so in ways that lead to realistic, early results
> > of lasting value. Potential attendees are invited to submit position papers
> > to be shared with all. Such position papers are expected to address security
> > metrics in one of the following categories:
> > 
> > Benchmarking
> > Empirical Studies
> > Metrics Definitions
> > Financial Planning
> > Security/Risk Modeling
> > Tools, Technologies, Tips, and Tricks
> > Visualization
> > Practical implementations, real world case studies, and detailed models will
> > be preferred over broader models or general ideas.
> > 
> > How to Participate
> > 
> > Submit a short position paper or description of work done/ongoing. Your
> > submission must be no longer than five(5) paragraphs or presentation slides.
> > Author names and affiliations should appear first in/on the submission.
> > Submissions may be in PDF, PowerPoint, HTML, or plaintext email and must be
> > submitted to MetriCon AT securitymetrics.org.
> > 
> > Presenters will be notified of acceptance by June 22, 2007 and expected to
> > provide materials for distribution by July 22, 2007. All slides and position
> > papers will be made available to participants at the workshop. No formal
> > proceedings are intended. Plagiarism constitutes dishonesty. The organizers
> > of this Workshop as well as USENIX prohibit these practices and will take
> > appropriate action if dishonesty of this sort is found. Submission of
> > recent, previously published work as well as simu

[SC-L] [fuzzing] the future of fuzzing [was: Rcov] (fwd)

2007-03-27 Thread Gadi Evron
I didn't want to cross-post to another list, but sending here if the
moderator finds this post useful.

-- Forwarded message --
Date: Mon, 26 Mar 2007 19:05:58 -0500 (CDT)
From: Gadi Evron <[EMAIL PROTECTED]>
To: Kowsik <[EMAIL PROTECTED]>
Cc: [EMAIL PROTECTED], dailydave@lists.immunitysec.com
Subject: [fuzzing] the future of fuzzing [was: Rcov]

On Mon, 26 Mar 2007, Kowsik wrote:
> We just released rcov-0.1, an interactive/incremental code coverage
> tool to assist in building effective fuzzers.
> 
> Quick summary:
> 
> - It's a WEBrick browser-based application (ruby)
> - Uses gcov's notes/data files to get at blocks and function summaries
> - Interactively/incrementally shows the coverage information while fuzzing
> - Uses ctags to cross reference functions/prototypes/definitions/macros

Hi Kowsik, thanks for this.

I have a few notes though, as I believe this can be taken much further
(at least my studies so far show that).

We have three levels or layers (depends on approach):
1. Building better fuzzers (which you cover).
2. Helping the fuzzing process, fuzzing better.
3. Making the process of finding the actual vulnerability once an
   indication is found (a successful test case, or as they say in QA, a
   passing one) easier.

Several folks in the past few months have said that fuzzing isn't new and
has been done for years - that much is true.

Some folks also said that fuzzing is as simple as it gets and has no where
left to evolve. That is indeed very much false.

Code coverage, static analysis, run-time analysis.. etc. all have a place
in the future of fuzzing.

I see fuzzers development in coming years as changing the term "dumb
fuzzing" to mean today's protocol-based smart fuzzing, and "smart
fuzzing" being about what interactive changes are happening as you fuzz.

The most that we see today (in most cases) is the engine running
undisturbed, while the monitor (if such even exists) being a simple
debugger.

Evolving host and network monitoring to use profiling technologies, map
functions and paths, watch for memory issues, etc. is fast coming.

Today, changing the action of a fuzzer as it is running is difficult
(there is no real Driver, just an Engine). A simple example for this
evolution could be watching for CPU uage. If the CPU usage spikes it could
mean:
1. We are sending too many requests per second - we should slow down the
engine.
2. (if for the thread itself) We are on to something, we should explore
this attack (likely 1 "attacks" we went through) or adjust to a
different fuzzing engine to explore that particular section of the
program (as we mapped it - code coverage again).

The two don't easily work together, not to mention even stopping a fuzzer,
rewinding it or God forbid running a different one at the same time (on
the same instance anyway).

Which brings us to distributed fuzzing... but that's a whole
different subject yet again.

Fuzzing has a long way to go, and we didn't even really start to explore
full intergration with static analysis tools (other than with results).

We had a discussion on the fuzzing mailing list recently about genetic
fuzzing, but I dam not really a math geek. Jared can explain that one
better... and so on.

All that before we explore uses for fuzzing outside of the development
cycle (mostly security QA) and vulnerability research, which is with
client-side testing. Perhaps fuzzers will help us force the hand of
software vendors to develop more robust and secure code.

Working for a fuzzing vendor I am only too familiar with the Turing
halting problem and seeking reality in the midst of eternal runs, but the
most interesting thing I found in the past few months (which wasn't
technical) is the clash of cultures between QA engineers and Security
professionals. It will be very interesting to see where we end up.

Thanks,

    Gadi.

--
"beepbeep it, i leave work, stop reading sec lists and im still hearing
gadi"
- HD Moore to Gadi Evron on IM, on Gadi's interview on npr, March 2007.

___
fuzzing mailing list
[EMAIL PROTECTED]
http://www.whitestar.linuxbox.org/mailman/listinfo/fuzzing

___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
___


Re: [SC-L] Full Disclosure: Fuzzled - Perl fuzzing framework

2007-03-26 Thread Gadi Evron
On Mon, 26 Mar 2007, Kenneth Van Wyk wrote:
> FYI, I saw this tool announcement and thought some folks here might  
> find it useful.  It's a free perl-based fuzzing framework written by  
> Tim Brown.  Follow the link to find the download site.
> 
> http://seclists.org/fulldisclosure/2007/Mar/0415.html
> 

Another interesting open source fuzzer from recent months is TAOF.



> Cheers,
> 
> Ken
> -
> Kenneth R. van Wyk
> SC-L Moderator
> KRvW Associates, LLC
> http://www.KRvW.com
> 
> 
> 
> 
> 

___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
___


Re: [SC-L] Economics of Software Vulnerabilities

2007-03-13 Thread Gadi Evron
On Tue, 13 Mar 2007, Gary McGraw wrote:
> In my opinion, though fuzz testing is certainly a useful technique (we've 
> used it in hardware verification for years), any certification based solely 
> on fuzz testing for security would be ludicrous.  Fuzz testing is not a 
> silver bullet.

Fuzzing is indeed, most definitely, not a or the silver bullet, nor should
testing be based on itsolely. What it does provide us with is a measurable
fashion by which we can reliably test the:
1. Stability
2. Programming quality
3. Robustness

Of software, to a level which is much higher than employing several
reverse engineers and test engineers (not to say just examining
vulnerability history on the bugtraq archive).

Further, if not by certification, fuzzing has already shown it can
pressure companies to use software development lifecycle methodologies and
that way enforcing (encouraging?) better security with "partners" (read
Microsoft).

Fuzzing has also shown that it can be used to force vendors who sell to
you to indeed be "tested" by certain products (read large
Telcos). Although I am unsure if this approach holds water.

The re-emergence of this field beyond rubber stamp certifications or very
costly certifications, is something I see as very positive.

That, of course, if not a or the sulver bullet in any way, either, but
maybe we will see less input validation bugs around and will start facing
logical flaws that will boggle our minds.

Personal opinion: enough with buffer overflows already, no? :)

> The biggest stumbling block for software certification is variability in 
> final environment.

That makes sense, but I figure if we can eliminate some more by a factor
in our testing environment(s), all the better.

> gem

Gadi.

--
"beepbeep it, i leave work, stop reading sec lists and im still hearing
gadi"
- HD Moore to Gadi Evron on IM, on Gadi's interview on npr, March 2007.

___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
___


Re: [SC-L] Economics of Software Vulnerabilities

2007-03-12 Thread Gadi Evron
On Mon, 12 Mar 2007, Crispin Cowan wrote:
> Ed Reed wrote:
> > For a long time I thought that software product liability would
> > eventually be forced onto developers in response to their long-term
> > failure to take responsibility for their shoddy code.  I was mistaken. 
> > The pool of producers (i.e., the software industry) is probably too
> > small for such blunt economic policy to work.
> >   
> I'm not sure about the size of the pool. I think it is more about the
> amount of leverage that can be put on software:
> 
> * It is trivial for some guy in a basement to produce a popular
>   piece of open source software, which ends up being used as a
>   controlling piece of a nuclear reactor, jet airplane, or
>   automobile, and when it fails, $millions or $billions of damages
>   result. The software author has no where near the resources to pay
>   the damage, or even the insurance premiums on the potential damage.
> * In contrast, with physical stuff it is usually the case that the
>   ability to cause huge damage requires huge capital in the first
>   place, such as building nuclear reactors, jet planes, and cars.
> 
> With this kind of leverage, the software producers don't have the
> resources to take responsibility, and so strict liability applied to
> authors reduces to "don't produce software" unless, possibly, you work
> for a very large corporation with deep pockets. Even then, corporate
> bean counters would likely prevent you from writing any software because
> the potential liability is so large.
> 
> > It appears, now, that producers will not be regulated, but rather users
> > and consumers.  SOX, HIPAA, BASEL II, etc. are all about regulating
> > already well-established business practices that just happen to be
> > incorporating more software into their operations. 
> >   
> Much like the gun industry. Powerful, deadly tools that, if used
> inappropriately, can cause huge damage.

Indeed, and I found your posts enlightening.

Still, today an alternative presentsitself in the now more likely realm of
software security certification and testing. It has become more easier and
potentially regulated now that fuzzers have become:

1. Good enough.
2. Measurable.
3. Widely accessible.

Gadi.

___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
___


Re: [SC-L] Dr. Dobb's | The Truth About Software Security | January 20, 2007

2007-01-30 Thread Gadi Evron
On Tue, 30 Jan 2007, Michael S Hines wrote:
> One examining only source code will miss any errors or problems that may be
> introduced by the compiler or linker.  As Symantec says - working with the
> object code is working at the level the attackers work.  
>  
> Of course one would have to verify the object code made public is the same
> object code that was analyzed/verified.   Otherwise you could get the case
> where the code was advertised as 'checked' and it still have a
> vulnerability.Of course that could happen anyway - as the process
> probabily isn't perfect (thought much better than nothing).   
>  
> Not all compilers or linkers are perfect either.   
>  
> There is only one way to get it right, yet so many ways to get it wrong.   

One question which would be very interesting is whether this is just
static analysis (which of course leads to other questions) or if this is
done while the binary is running.

Gadi.

>  
> Mike Hines
>  
> -
> Michael S Hines
> [EMAIL PROTECTED] 
>  
> 
>   _  
> 
> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
> On Behalf Of Kenneth Van Wyk
> Sent: Tuesday, January 30, 2007 5:25 AM
> To: Secure Coding
> Subject: [SC-L] Dr. Dobb's | The Truth About Software Security | January
> 20,2007
> 
> 
> FYI, there's an interesting article on ddj.com about a Symantec's new
> "Veracode" binary code analysis service.
> 
> http://www.ddj.com/dept/security/196902326 
> 
> Among other things, the article says, "Veracode clients send a compiled
> version of the software they want analyzed over the Internet and within 72
> hours receive a Web-based report explaining--and prioritizing--its security
> flaws." 
> 
> 
> Any SC-Lers have any first-hand experience with Veracode that they're
> willing to share here? Opinions?
> 
> 
> Cheers,
> 
> 
> Ken
> 
> -
> Kenneth R. van Wyk
> SC-L Moderator
> KRvW Associates, LLC
> http://www.KRvW.com
> 
> 
> 
> 
> 

___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
___


[SC-L] fuzzing the corporate world

2007-01-16 Thread Gadi Evron
After a couple of folks said they liked it, I figured it is on-topic
enough to send it here. This is my lecture from CCC, I hope you like it
(I swear in it.. it's defcon-like, be warned PG-13).

It basically describes fuzzing and how it can be/is implemented in the
corporate world/as part of the development process/as certification/as
testing... etc. and how a fuzzer can be built to fit what the corporate
world is looking for.

This is not a technical lecture in any way - so skip it if that's what you
are looking for. We do cover the basics of black box testing with fuzzing,
though.
:)

http://media.hojann.net/23C3/23C3-1758-en-fuzzing_corporate_world.m4v
http://fsmpi.uni-bayreuth.de/~pw/23c3/23C3-1758-en-fuzzing_corporate_world.m4v

>From the talk description:
http://events.ccc.de/congress/2006/Fahrplan/events/1758.en.html
(an updated PDF of the presentation should be there soon)

Fuzzing in the corporate world

The use of fuzzing in the corporate world over the years and recent
implementation of fuzzing tools into the development cycle and as a
requirement before purchase

We will discuss fuzzing uses by software vendors and in the corporate
world, for security auditing ("fuzzing before release") and third party
testing ("fuzzing before purchase"). We will look at what contributed to
this change in the use of fuzzing tools from home-grown hacking tools to
commercial products, as well as how these organizations implement fuzzing
into their development cycle.

Fuzzing has been used for a long time in the hacker scene. Mostly, these
tools have been home-grown. In the recent year, several commercial fuzzing
tools appeared. These in turn are now utilized by organizations in the
development cycle under the moto of "fuzzing before release", or "find the
vulnerability before hackers do". Another interesting and somewhat
unexpected development in the field is that end-clients are the largest
consumers of advanced fuzzing technology, performing tests on software
before purchase. Further, some large telcos and financial institutions now
demand for products to be certified (even if not by an official seal) by
fuzzing products which they authorize.

Is fuzzing finally a solution to reduce vulnerabilities in products rather
than just later discover them? How is it used by these corporations and
third-party organizations? Some methodologies as well as examples will be
presented, and we will also try to look into what the future holds.

Gadi.

___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
___


[SC-L] Luis Miras on automated exploit detection in binaries at CCC

2007-01-02 Thread Gadi Evron
CCC was amazing, and here is the video for one of the lectures.

http://video.google.com/videoplay?docid=-5897236579900914407&q=23c3

___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
___


[SC-L] it's Y2K, no, it's 32 bit unix time, no, it's slashdot!

2006-11-09 Thread Gadi Evron
[X-posted to the funsec mailing list]

http://slashdot.org/articles/06/11/09/1534204.shtml

"2^24 comments ought to be enough for anyone" -- CmdrTaco

Slashdot Posting Bug Infuriates Haggard Admins 
Posted by CmdrTaco on Thursday November 09, @10:45AM
 from the this-is-never-good dept. 
 Slashdot.org 
 Last night we crossed over 16,777,216 comments in the database. The wise
amongst you might note that this number is 2^24, or in MySQLese an
unsigned mediumint. Unfortunately, like 5 years ago we changed our primary
keys in the comment table to unsigned int (32 bits, or 4.1 billion) but
neglected to change the index that handles parents. We're awesome! Fixing
is a simple ALTER TABLE statement... but on a table that is 16 million
rows long, our system will take 3+ hours to do it, during which time there
can be no posting. So today, we're disabling threading and will enable it
again later tonight. Sorry for the inconvenience. We shall flog ourselves
appropriately.

___
Secure Coding mailing list (SC-L)
SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php


Re: [SC-L] Fwd: re-writing college books - erm.. ahm...

2006-11-07 Thread Gadi Evron
On Tue, 7 Nov 2006, Matt Bishop wrote:
> Folks,
> 
> A comment based on an idea we tried here.
> 
> > Well, I never recieved any replies here on what's already being  
> > done.. so
> > now, I am asking for ideas on how we can approach schools. What's  
> > needed,
> > in order for basic CS classes to have a security orientation?
> 
> Ideally, I agree with the sentiment but would quarrel with the  
> wording :-). On a practical level, I think this is very unlikely to  
> happen. For example, one problem is those classes are already  
> overloaded with how to program *plus* language stuff. You can only do  
> so much in 10 or 15 weeks (depending on whether you're on the quarter  
> or semester system).
> 
> An alternative to focusing on the introductory classes is to provide  
> support for programming throughout the curriculum. But the big  
> problem is overloaded classes--we try to teach too much material now.  
> Telling an algorithms instructor she also needs to teach some  
> security will fail on at least two counts: (1) "How do I teach the  
> required course material *plus* security?" (2) "How do I learn enough  
> about security to know what to teach and how to teach it? And where  
> do I find the time to learn this?" So I don't think adding more  
> material to existing classes will work.
> 
> So let's take a page from English departments and/or law schools.  
> Both have writing clinics--they are separate from classes, and  
> provide reviews of written papers before those papers are turned in.  
> The ones I'm familiar with do *not* address content, but they *do*  
> address mechanics (grammar, punctuation, etc.) and expression--does  
> the writing make sense, is it well organized, and so forth. Why not  
> establish something similar for programming?
> 
> You could work this in a number of ways. The one we've tried here was  
> to require the students to write the program and then meet with  
> someone working in the clinic. The clinician went through the program  
> with the student, pointed out potential problems and bad programming  
> practices, and (when appropriate) security issues. No grading  
> occurred, but the student could rewrite the program to fix the  
> problems pointed out (and others that the student found--the  
> clinician did not try to find all the problems, just enough to show  
> the student what types of problems were there).
> 
> We did some very informal testing, and the results were promising. If  
> anyone's interested, we did a write-up of it; see:
> 
> http://nob.cs.ucdavis.edu/~bishop/papers/2006-cisse-2/
> 
> I need to emphasize the results are informal because we weren't  
> educational metricians. Our next step (assuming we can get the  
> funding) will be to devise formal metrics and do some more rigorous  
> measurements to see how well the clinic works.
> 
> The interesting point about the clinic is that it appeared to be  
> effective at both introductory and upper division levels, provided  
> the students used it. It also would provide reinforcement throughout  
> the student's undergraduate education, and give the student more of a  
> chance to absorb good programming practices than do one or two  
> classes that focus on those aspects of programming.
> 
> Just a thought 

I am not sure I understand all you wrote yet. So I may ask you more later.

Let me ask you this, the basic courses such as C (pascal, c++,
whatever) are used to teach other things along the line. Won't changing
that course be a great start?

Further, if not much can be changed with time constraints, what would it
"cost, for example, to teach people to check their input, or set
boundaries? With references to more material.

Gadi.

> 
> Matt
> 
> ==
> Matt Bishop
> Department of Computer Science
> University of California at Davis
> One Shields Ave.
> Davis, CA 95616-8562
> United States of America
> 
> phone: +1 530 752 8060
> fax: +1 530 752 4767
> web: http://seclab.cs.ucdavis.edu/~bishop
> 
> 
> 

___
Secure Coding mailing list (SC-L)
SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php


Re: [SC-L] Fwd: re-writing college books - erm.. ahm...

2006-11-07 Thread Gadi Evron
On Wed, 8 Nov 2006, Robin Sheat wrote:
> 
> It is important to note that there is no goal of teaching students to go off 
> and be safe programmers. Computer science is seen to a reasonable extent to 
> be a theoretical persuit. Algorithms are covered, GC methods, heuristical 
> searchs, and so on. That many students from this tend to go off and become 
> programmers is almost seen the same as if they went off and became plumbers, 
> just much more common. They are, of course, expected to hang around and 
> become academics ;)

CS degree brings you to the academic world, and makes a scietist of
you. Many go that route to become, coders.

You don't teach programming at an EDU.

As they are supposed to be scientists, I see no reason why this training
can't be done with correct programming in mind. Teaching people how to
code wrongly just to teach them later how it sid one correctly and slower,
is a silly idea.

It's not a bad idea as a conentrated specialized course, it is a silly
idea as far as the actual original teaching goes, that is equivalent to
patches rather than no vulnerabilities.

Gadi.

___
Secure Coding mailing list (SC-L)
SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php


Re: [SC-L] Fwd: re-writing college books - erm.. ahm...

2006-11-07 Thread Gadi Evron
On Mon, 6 Nov 2006, Julie J.C.H. Ryan wrote:
> Folks, I've been forwarding select messages from this listserv to my  
> nephews, who are undergrads in CS at some fairly reknown  
> universities, which shall remain nameless cause it would embarrass  
> the heck out of them to have the following sentiment aired..
> 
> Begin forwarded message:
> 
> >
> > ya, as per one of your previous emails, we are still taught to use
> > only printf and random stuff like that. printf was even incorporated
> > into java 1.5 because "it was so good." But right now I think we are
> > really just learning base algorithms and ideas rather than security
> > practices. Hell, I talked to my student advisor and apparently I can't
> > even take security courses till I'm working on a masters degree.

Well, I never recieved any replies here on what's already being done.. so
now, I am asking for ideas on how we can approach schools. What's needed,
in order for basic CS classes to have a security orientation?

Gadi.

___
Secure Coding mailing list (SC-L)
SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php


Re: [SC-L] re-writing college books - erm.. ahm...

2006-11-06 Thread Gadi Evron
On Sun, 5 Nov 2006, Leichter, Jerry wrote:
> Much as I agree with many of the sentiments expressed in this discussion,
> there's a certain air of unreality to it.  While software has it's own
> set of problems, it's not the first engineered artifact with security
> implications in the history of the world.  Bridges and buildings
> regularly collapsed.  (In the Egyptian desert, you can still see a
> pyramid that was built too aggressively - every designer wanted to
> build higher and steeper than his predecessor - and collapsed before
> it was finished.)  Steam boilers exploded.  Steel linings on wooden
> railroad tracks stripped of, flew through the floors of passing cars,
> and killed people.  Electrical systems regularly caused fires.
> 
> How do we keep such traditional artifacts safe?  It's not by writing
> introductory texts with details of safety margins, how to analyze the
> strength of materials, how to include a crowbar in a power supply.
> What you *may* get in an introductory course is the notion that there
> are standards, that when it comes time for you to actually design
> stuff you'll have to know and follow them, and that if you don't you're
> likely to end up at best unemployed and possibly in jail when your
> "creativity" kills someone.
> 
> In software, we have only the beginnings of such standards.  We
> teach and encourage an attitude in which every last bit of the
> software is a valid place to exercise your creativity, for better
> or (for most people, most of the time) worse.  With no established
> standards, we have no way to push back on managers and marketing
> guys and such who insist that something must be shipped by the
> end of the week, handle 100 clients at a time, have no more tha
> 1 second response time, and run on some old 486 with 2 MB of memory.
> 
> I don't want to get into the morass of licensing.  It's a fact that
> licensing is heavily intertwined with standard-setting in many
> older fields, but not in all of them, and there's no obvious inherent
> reason why it has to be.
> 
> The efforts to write down "best practices" at CERT are very important,
> but also very preliminary.  As it stands, what we have to offer
> are analogous to best practices for using saws and hammers and
> such - not best practices for determining floor loadings, appropriate
> beam strengths, safe fire evacuation routes.
> 
> Every little bit helps, but a look at history shows us just how
> little we really have to offer as yet.

Well said, and quite right. A few pointers though.

A bridge is a single-purpose device. A watch is a simple purpose computer,
as was the Enigma machine, if we can call it such.

Multi-purpose computers or programmable computers are where our problems
start. Anyone can DO and create. One simply has to sit in front of a
keyboard and screen and make it happen..

As such, even if built well, the computer is programmable, and thus at
risk.

Gadi.

> -- Jerry
> 
> 
> ___
> Secure Coding mailing list (SC-L)
> SC-L@securecoding.org
> List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
> List charter available at - http://www.securecoding.org/list/charter.php
> 

___
Secure Coding mailing list (SC-L)
SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php


Re: [SC-L] re-writing college books - erm.. ahm...

2006-10-30 Thread Gadi Evron
On Sun, 29 Oct 2006, Robert C. Seacord wrote:
> Gadi,
> 
> I feel like I've been here before, but I'll give it another shot anyway.
> 
> > Okay, than let's make some progress:
> > 1. Where and who is currently involved with doing this?
> > 2. What are they doing?
> > 3. Can we use their experience to make it a larger success?
> > 4. How do we begin doing something large-scale?
> 
> The Secure Coding Initiative at CERT has a web site at
> www.securecoding.cert.org.  The purpose of this site is to collect
> secure coding recommendations and rules for various programming
> languages.  Our initial focus has been C and C++, but we are willing and
> interested in expanding this effort to other programming languages
> provided that we can find someone to manage the efforts.
> 
> The C and C++ material on the site will be used as supplemental material
> to the Addison-Wesley book "Secure Coding in C and C++" in a "Secure
> Programming" course I am teaching this Spring at CMU (so it is being
> used to teach, as well as being a commercial and government resource).
> I am also working with other instructors at other educational
> institutions to develop secure coding curriculum.

We misunderstand each other. I am not speaking of a secure coding book, I
am speaking of "Introduction to Computer Science" and "The C programming
Language".

If we can use what you have already worked on to supplament these courses,
then all for the better!

> 
> We have had significant community effort in the development of these
> secure coding standard practices so far, but we can use all the help we
> can get.  If you would like to get involved, go the sight, sign up, and
> start reviewing the material.  If you are qualified and would like to
> edit the material directly, send me email and I will grant you edit
> permissions.

I doubt I am that much of a good coder anymore.

> 
> I think having a body of knowledge that identifies insecure coding
> practices and provides secure alternatives is a good first start, and
> not as easy as it sounds.

Agreed!
Nice work on all that!

> 
> -
> 
> I also had another thought about improving the quality of code examples
> in texts.  I know my publisher (Addison-Wesley), and I'm sure others,
> are very concerned about quality.  I could ask my editor if they would
> be willing to make sure that someone with a security background reviewed
> any new programming texts.  If we can come up with a list of subject
> matter experts willing to review new texts, I'm guessing they would be
> very happy to have our feedback.

That sounds like a very good idea! I am sure many would agree to get some
extra cash for reviewing, thing is, that doesn't pay very well.

> 
> rCs
> 
> 

___
Secure Coding mailing list (SC-L)
SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php


Re: [SC-L] re-writing college books - erm.. ahm...

2006-10-29 Thread Gadi Evron
On Sat, 28 Oct 2006, Crispin Cowan wrote:
> Gadi Evron wrote:
> > So, "dump C", "Use SML", "What secure coding classes are you doing?" and
> > "we are already doing it!!" are the responses I got when I started this
> > thread.
> >   
> What did you expect from whining about the generally poor quality of
> software? :)
> 
> > Can someone mention again why re-writing the main often-used and probably
> > less than 3 mostly-used basic programming books is a bad idea?
> >   
> Uh ... 'cause I question the assertion that there are 3 mostly-used
> basic programming books. I suspect it is more like 78 mostly used books.
> More importantly, if there are 3 mostly used books, then there are 78
> more behind them vying for those 3 slots, and they all have the same
> problems. If you write a new book, then you just join the pool of 78,
> and you have the impact of a drop in the bucket.
> 
> Worse, we are talking about correctness here. Correctness is hard, and
> correctness on a large scale is harder. I doubt that even a concerted
> effort at a "correct" book on intro to programming would manage to
> actually be correct any time before the 3rd edition, 10 years from now.
> 
> Seeking perfect correctness as an approach to security is a fool's
> errand. Security is designing systems that can tolerate imperfect software.

For argument sake, let's assume there are 100.

How about campaigning for a secure coding chapter to be added to these
semester, erm, world-wide?

Nothing is ever easy, but we have to start somewhere. I don't see why this
is a bad idea. Yes, it takes time. Yes, it will have a much bigger impact.

Gadi.

> 
> Crispin
> 
> -- 
> Crispin Cowan, Ph.D.  http://crispincowan.com/~crispin/
> Director of Software Engineering, Novell  http://novell.com
>  Hack: adroit engineering solution to an unanticipated problem
>  Hacker: one who is adroit at pounding round pegs into square holes
> 

___
Secure Coding mailing list (SC-L)
SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php


Re: [SC-L] re-writing college books - erm.. ahm...

2006-10-29 Thread Gadi Evron
On Sat, 28 Oct 2006, Crispin Cowan wrote:
> Gadi Evron wrote:
> > Nothing is ever easy, but we have to start somewhere. I don't see why this
> > is a bad idea. Yes, it takes time. Yes, it will have a much bigger impact.
> >   
> It is not a bad idea. But it clearly is not sufficient. Why are you

Now we're talking.

Not sufficient I am game with. Nothing ever is, it is one more thing to
do.

> assuming that it is not already being tried? The problem is that
it is

I am assuming most higher education institutions in the world do not have
it done.

> being tried with the usual degree of effectiveness, i.e. unevenly.
> Saying "lets try it" is redundant, because that is already going on,
> just not enough. To make it more, one would have to convince the people
> who are currently not doing it, or doing it badly, to do better, and
> they (by definition) are not listening.

Okay, than let's make some progress:
1. Where and who is currently involved with doing this?
2. What are they doing?
3. Can we use their experience to make it a larger success?
4. How do we begin doing something large-scale?

Gadi.

> 
> Crispin
> 
> -- 
> Crispin Cowan, Ph.D.  http://crispincowan.com/~crispin/
> Director of Software Engineering, Novell  http://novell.com
>  Hack: adroit engineering solution to an unanticipated problem
>  Hacker: one who is adroit at pounding round pegs into square holes
> 

___
Secure Coding mailing list (SC-L)
SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php


Re: [SC-L] re-writing college books - erm.. ahm...

2006-10-28 Thread Gadi Evron
On Tue, 24 Oct 2006, Crispin Cowan wrote:
> Sure, there are likely to be ways in which SML is better than C# or
> Java. However, in security, the perfect is all to often the enemy of the
> good-enough. The big community hears security people talk about the high
> security approach that security geeks really want, consider the costs,
> and go back to doing things the old way, and ignore the security people.
> If security people instead pitch something that is feasible and makes
> the situation better, instead of asking for the moon, we will make more
> progress.
> 
> Crispin

(not directed at you, Crispin)

So, "dump C", "Use SML", "What secure coding classes are you doing?" and
"we are already doing it!!" are the responses I got when I started this
thread.

Can someone mention again why re-writing the main often-used and probably
less than 3 mostly-used basic programming books is a bad idea?

All of us will still have a job in 5 years if we do this, even in 25. I
promise.

Gadi.

___
Secure Coding mailing list (SC-L)
SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php


Re: [SC-L] re-writing college books [was: Re: A banner year for software bugs | Tech News on ZDNet]

2006-10-12 Thread Gadi Evron
On Wed, 11 Oct 2006, Gary McGraw wrote:
> We're working on it!  The problem is not simply a book.

Great! What are you guys doing? What more can be done? There are quite a
few of us willing to help, and I figure, starting with the books future
programmers learn from is not a bad idea.

This community is perfect for this job.

Gadi.

> 
> gem
> 
>  -Original Message-----
> From: Gadi Evron [mailto:[EMAIL PROTECTED]
> Sent: Wed Oct 11 20:58:12 2006
> To:   Kenneth Van Wyk
> Cc:   Secure Coding
> Subject:  [SC-L] re-writing college books [was: Re: A banner year for 
> software bugs | Tech News on ZDNet]
> 
> So, how can we edit current basic programming college books to present
> secure code, a couple of words of the correct way of doing things, and a
> whole new chapter on secure coding (which may be redudndent?)
> 
> How do we start?
> 
> Some Whiley book for introduction to CS?
> 
> Any volunteers to get this on the road?
> 
>   Gadi.
> 
> On Wed, 11 Oct 2006, Kenneth Van Wyk wrote:
> 
> > So here's a lovely statistic for the software community to hang its  
> > hat on:
> > 
> > http://news.zdnet.com/2100-1009_22-6124541.html?tag=zdfd.newsfeed
> > 
> > Among other things, the article says, "Atlanta-based ISS, which is  
> > being acquired by IBM, predicts there will be a 41 percent increase  
> > in confirmed security faults in software compared with 2005. That  
> > year, in its own turn, saw a 37 percent rise over 2004."
> > 
> > Of course, the real losers in this are the software users, who have  
> > to deal with the never ending onslaught of bugs and patches from  
> > their vendors.  We've just _got_ to do better, IMHO, and automating  
> > the patch process is not the answer.
> > 
> > Cheers,
> > 
> > Ken
> > -
> > Kenneth R. van Wyk
> > KRvW Associates, LLC
> > http://www.KRvW.com
> > 
> > 
> > 
> > 
> > 
> 
> ___
> Secure Coding mailing list (SC-L)
> SC-L@securecoding.org
> List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
> List charter available at - http://www.securecoding.org/list/charter.php
> 
> 
> 
> 
> 
> This electronic message transmission contains information that may be
> confidential or privileged.  The information contained herein is intended
> solely for the recipient and use by any other party is not authorized.  If
> you are not the intended recipient (or otherwise authorized to receive this
> message by the intended recipient), any disclosure, copying, distribution or
> use of the contents of the information is prohibited.  If you have received
> this electronic message transmission in error, please contact the sender by
> reply email and delete all copies of this message.  Cigital, Inc. accepts no
> responsibility for any loss or damage resulting directly or indirectly from
> the use of this email or its contents.
> Thank You.
> 
> 

___
Secure Coding mailing list (SC-L)
SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php


[SC-L] re-writing college books [was: Re: A banner year for software bugs | Tech News on ZDNet]

2006-10-11 Thread Gadi Evron
So, how can we edit current basic programming college books to present
secure code, a couple of words of the correct way of doing things, and a
whole new chapter on secure coding (which may be redudndent?)

How do we start?

Some Whiley book for introduction to CS?

Any volunteers to get this on the road?

Gadi.

On Wed, 11 Oct 2006, Kenneth Van Wyk wrote:

> So here's a lovely statistic for the software community to hang its  
> hat on:
> 
> http://news.zdnet.com/2100-1009_22-6124541.html?tag=zdfd.newsfeed
> 
> Among other things, the article says, "Atlanta-based ISS, which is  
> being acquired by IBM, predicts there will be a 41 percent increase  
> in confirmed security faults in software compared with 2005. That  
> year, in its own turn, saw a 37 percent rise over 2004."
> 
> Of course, the real losers in this are the software users, who have  
> to deal with the never ending onslaught of bugs and patches from  
> their vendors.  We've just _got_ to do better, IMHO, and automating  
> the patch process is not the answer.
> 
> Cheers,
> 
> Ken
> -
> Kenneth R. van Wyk
> KRvW Associates, LLC
> http://www.KRvW.com
> 
> 
> 
> 
> 

___
Secure Coding mailing list (SC-L)
SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php


Re: [SC-L] Google code search games

2006-10-08 Thread Gadi Evron
On Sun, 8 Oct 2006, Ron Forrester wrote:
> WSDL:
> 
> http://www.google.com/codesearch?hl=en&lr=&q=file%3A.wsdl%24+transfer&btnG=Search

I am still updating the main post with new search regex as I find them,
all the time:
http://blogs.securiteam.com/index.php/archives/663

Some other fun was noted on the daily WTF, where the do more funny
searches:
http://thedailywtf.com/forums/thread/94630.aspx


> 
> 
> On 10/5/06, Gadi Evron <[EMAIL PROTECTED]> wrote:
> > > playing with Google Code Search, as Lev Toger just wrote:
> > >
> > > Google released a code search engine to catch up with Krugle, Koders, and
> > > Codease.
> > >
> > > Like most of the other Google?s tools it can be easily abused for hacking
> > > :)
> 
> 
> -- 
> rjf&
> ___
> Secure Coding mailing list (SC-L)
> SC-L@securecoding.org
> List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
> List charter available at - http://www.securecoding.org/list/charter.php
> 

___
Secure Coding mailing list (SC-L)
SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php


Re: [SC-L] Google code search games

2006-10-05 Thread Gadi Evron
Another guy just wrote some more fun keyw ords to search for:
http://blogs.securiteam.com/index.php/archives/661

On Thu, 5 Oct 2006, Gadi Evron wrote:

> playing with Google Code Search, as Lev Toger just wrote:
> 
> Google released a code search engine to catch up with Krugle, Koders, and
> Codease.
> 
> Like most of the other Google?s tools it can be easily abused for hacking
> :)
> 
> To find undisclosed vulnerabilities pass over this code:
> 
> http://www.google.com/codesearch?q=ugly%7Chack%7Cfixme
> 
> Or some other interesting combination (Use your favorite ugly code
> comment). 
> -
> 
> http://blogs.securiteam.com/index.php/archives/659
> 
> SO... ugly? dirty hack?
> 
>   Gadi.
> 
> 

___
Secure Coding mailing list (SC-L)
SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php


[SC-L] (no subject)

2006-10-05 Thread Gadi Evron
playing with Google Code Search, as Lev Toger just wrote:

Google released a code search engine to catch up with Krugle, Koders, and
Codease.

Like most of the other Google?s tools it can be easily abused for hacking
:)

To find undisclosed vulnerabilities pass over this code:

http://www.google.com/codesearch?q=ugly%7Chack%7Cfixme

Or some other interesting combination (Use your favorite ugly code
comment). 
-

http://blogs.securiteam.com/index.php/archives/659

SO... ugly? dirty hack?

Gadi.

___
Secure Coding mailing list (SC-L)
SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php


Re: [SC-L] Web Services vs. Minimizing Attack Surface

2006-08-16 Thread Gadi Evron
On Wed, 16 Aug 2006, mikeiscool wrote:
> On 8/16/06, John Wilander <[EMAIL PROTECTED]> wrote:
> > Thanks for all the replies so far! I would just like to comment on
> > Holger Peine's and Mike Hines' viewpoints.
> >
> > [EMAIL PROTECTED] wrote:
> > > I don't see a conflict here: A web service (just as any
> > > network-accessible
> > > service, no matter whether programmed using sockets, Java RMI, SOAP or
> > > whatever) is _intended_ to provide some function to the outside world,
> > > so you have to open _some_ door into your system. The advice about
> > > minimizing the attack surface is about not opening any doors you don't
> > > really need (or worse, didn't even intend to open).
> >
> > As you say, any kind of system is _intended_ to provide some function.
> > But security bugs often hide in unintended, undocumented or unknown
> > functionality. By increasing the attack surface you also increase the
> > risk of adding unknown functions.
> >
> > Mike Hines commented on web services running everything through port 80
> > (HTTP) as negating "... any value of firewalls and most likely intrusion
> > detection systems". Indeed, web services tunnel a lot of functionality
> > through port 80, effectively hiding it from many system monitoring
> > defense measures. The security will rely on validating SOAP envelopes
> > and prevention at the application/run-time system level. It seems to me
> > like a huge burden.
> 
> A huge burden or a huge benefit? You can validate everything in one
> spot, and maybe even solve problems in one spot.
> 
> Imagine if everything went into the same system; thereby suggesting
> that all attacks would be similar (i.e. all attacks against the soap
> parsers of various apps, or something). If it all goes in one hole,
> you can fix it once with your IDS, or whatever acronym you have
> installed.
> 
> You seem to be saying that any given app i want to write, and have
> publically accessible, I should write to accept connections on another
> port, or find another channel to operate on (maybe through a website
> app dll calls, or something).
> 
> But then, if we do that, we have to re-write everything each time.
> Doesn't make alot of sense ...

You do realize you just described the Internet, right?

Gadi.

> 
> 
> > Regards, John
> 
> 
> -- mic
> ___
> Secure Coding mailing list (SC-L)
> SC-L@securecoding.org
> List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
> List charter available at - http://www.securecoding.org/list/charter.php
> 

___
Secure Coding mailing list (SC-L)
SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php


Re: [SC-L] Web Services vs. Minimizing Attack Surface

2006-08-15 Thread Gadi Evron
ou get to play with the code, in some cases anyway.Other than that and the
fact the code runs, mostly, locally, there is no difference.

The one major different is that  with some services, the vulnerability is
local as everybody builds their own.

The main issue here is that web services allow for easy access to the
machine, and for access to many third party and unrelated scripts and
modules that will not be accessible by most other programs, once already
connected.

Gadi.

On Tue, 15 Aug 2006 [EMAIL PROTECTED] wrote:

> > [mailto:[EMAIL PROTECTED] On Behalf Of John Wilander
> > Sent: Dienstag, 15. August 2006 10:03
> > Subject: [SC-L] Web Services vs. Minimizing Attack Surface
> > 
> > Hi!
> > 
> > The security principle of minimizing your attack surface 
> > (Writing Secure 
> > Code, 2nd Ed.) is all about minimizing open sockets, rpc endpoints, 
> > named pipes etc. that facilitate network communication between 
> > applications. Web services and Service Oriented Architecture on the 
> > other hand are all about exposing functionality to offer 
> > interoperability.
> 
> I don't see a conflict here: A web service (just as any
> network-accessible
> service, no matter whether programmed using sockets, Java RMI, SOAP or
> whatever) is _intended_ to provide some function to the outside world,
> so you have to open _some_ door into your system. The advice about
> minimizing the attack surface is about not opening any doors you don't
> really need (or worse, didn't even intend to open).
> 
> Another matter is the question of whether it might be easier to
> produce a vulnerability when providing some function in the form of a
> web service as opposed to another technique. One could argue in this
> direction, e.g. because of creating new attack vectors such as XML
> injection, or helping the attacker by providing the WSDL. But again,
> this does not make web services incompatible with the principle of
> minimal attack surface per se.
> 
> Kind regards,
> Holger Peine
> 
> -- 
> Dr. Holger Peine, Security and Safety
> Fraunhofer IESE, Fraunhofer-Platz 1, 67663 Kaiserslautern, Germany
> Phone +49-631-6800-2134, Fax -1899 (shared)
> PGP key via http://pgp.mit.edu ; fingerprint is 1BFA 30CB E3ED BA99 E7AE
> 2BBB C126 A592 48EA F9F8
> 
> ___
> Secure Coding mailing list (SC-L)
> SC-L@securecoding.org
> List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
> List charter available at - http://www.securecoding.org/list/charter.php
> 

___
Secure Coding mailing list (SC-L)
SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php


[SC-L] Google Auditing

2006-07-20 Thread Gadi Evron
Hi guys!

A few days ago, following the announcements by Dan from Websense and then
HD, I wrote a post covering what they have done and what the future may
gold for Google hacking for security purposes.

http://blogs.securiteam.com/index.php/archives/513

Today a guy posted a blog on using the filetype: feature to find coding
errors:
http://www.cipher.org.uk/index.php?p=projects/bugle.project

Gadi.


___
Secure Coding mailing list (SC-L)
SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php


Re: [SC-L] "Bumper sticker" definition of secure software

2006-07-18 Thread Gadi Evron
On Mon, 17 Jul 2006, Rajeev Gopalakrishna wrote:
> Reliability is concerned only with accidental failures while security has
> to consider malicious attacks as well. The difference is in the intent of
> the software user: benign or malicious.
> 
> And for a bumper sticker, here is one for the pessimists:
> 
> "Secure Software is a Myth"
> 
> and another version for the skeptics:
> 
> "Is Secure Software a Myth?"
> 
> :)

Again, this would speak only to a very small percentage of the
population. You me, maybe 10K people around the world if we are generous.

> 
> -rajeev
> 
> 
> On Mon, 17 Jul 2006, Peter G. Neumann wrote:
> 
> > You suggest:
> >
> >   Secure software is software that remains dependable despite efforts to
> >   compromise its dependability.
> >
> > You need a bigger-picture view that encompasses trustworthiness
> > and assurance.
> >
> > "Dependable systems are systems that remain dependable despite
> > would-be compromises to their dependability."
> >
> > "Trustworthy systems are systems that are worthy of being trusted
> > to satisfy their requirements (for security, reliability, survivability,
> > safety, or whatever)."
> >
> > Security is generally too narrow by itself, because a system that is
> > not reliable is not likely to be secure, especially when in
> > unreliability mode!
> >
> > The principle of Keep It Simple is inherently unworkable with respect to
> > security.  Security is inherently complex.  Trustworthiness is broader and
> > even more complex.  But if you don't think about trustworthiness more
> > broadly, what you get is not likely to be very secure.
> >
> > Forget the bumper sticker approach.
> >
> > ___
> > Secure Coding mailing list (SC-L)
> > SC-L@securecoding.org
> > List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
> > List charter available at - http://www.securecoding.org/list/charter.php
> >
> ___
> Secure Coding mailing list (SC-L)
> SC-L@securecoding.org
> List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
> List charter available at - http://www.securecoding.org/list/charter.php
> 

___
Secure Coding mailing list (SC-L)
SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php


Re: [SC-L] "Bumper sticker" definition of secure software

2006-07-17 Thread Gadi Evron
On Mon, 17 Jul 2006, Peter G. Neumann wrote:
> Forget the bumper sticker approach.

Hey Peter. :)

Well, one should forget the bumper-sticker approach if all us broing dry
guys keep try to explain to people how math works.

Instead, teling them:
1+1=?
Didn't learn math, eh?

Is bumper-sticker worthy, if pointless as an example.

In other words:
"I read your email! When have you last audited your code?"

___
Secure Coding mailing list (SC-L)
SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php


Re: [SC-L] "Bumper sticker" definition of secure software

2006-07-17 Thread Gadi Evron
On Mon, 17 Jul 2006, Goertzel Karen wrote:
> Another possibility:
> 
> Secure software can't be subverted.

We Read Your Email
Your Program == Swiss Cheese

 
> 
> --
> Karen Mercedes Goertzel, CISSP
> Booz Allen Hamilton
> 703.902.6981
> [EMAIL PROTECTED]  
> 
> ___
> Secure Coding mailing list (SC-L)
> SC-L@securecoding.org
> List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
> List charter available at - http://www.securecoding.org/list/charter.php
> 

___
Secure Coding mailing list (SC-L)
SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php


Re: [SC-L] "Bumper sticker" definition of secure software

2006-07-16 Thread Gadi Evron
On Sun, 16 Jul 2006, mikeiscool wrote:
> On 7/16/06, ljknews <[EMAIL PROTECTED]> wrote:
> > At 3:27 PM -0400 7/15/06, Goertzel Karen wrote:
> > > Content-class: urn:content-classes:message
> > > Content-Type: multipart/alternative;
> > >   boundary="_=_NextPart_001_01C6A844.D6A28B6B"
> > >
> > > I've been struggling for a while to synthesise a definition of secure
> > >software that is short and sweet, yet accurate and comprehensive. Here's
> > >what I've come up with:
> > >
> > > Secure software is software that remains dependable despite efforts to
> > >compromise its dependability.
> > >
> > > Agree? Disagree?
> >
> > I disagree about that being bumper-sticker size, and I think we really
> > need bumper stickers.
> 
> a better bumper sticker would be something like:
> 
> "secure software is what i write. call me now to find out how!"

"I read your email"

jinx.com

___
Secure Coding mailing list (SC-L)
SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php


Re: [SC-L] ddj: beyond the badnessometer

2006-07-14 Thread Gadi Evron
On Fri, 14 Jul 2006, Daniele Muscetta wrote:
> On 7/13/06, Gary McGraw <[EMAIL PROTECTED]> wrote:
> >
> > 3) never use the results of a pen test as a "punch list" to attain
> > security
> >
> 
> 
> You are right, but very sadly, that's how it gets used by a lot of
> companies
> "hey, the pen testers found problem 1, 2, 3 - we fix those, we are fine". No
> way. But still I've seen this done in a lot of places

Gary is correct on many issues, except for one:
pen-testing is NOT black-box testing. Black-box testing is comparable to
White-box testing in parameters of quantification.

How the client deals with the results is unrelated to the type of
results. It's directly linked to why they ordered the test and how they
treat security.

Gadi.

> 
> Best,
> 
> Daniele
> 

___
Secure Coding mailing list (SC-L)
SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php


Re: [SC-L] ddj: beyond the badnessometer

2006-07-13 Thread Gadi Evron
On Thu, 13 Jul 2006, Gary McGraw wrote:
> Hi all,
> 
> Is penetration testing good or bad?
> 
> http://ddj.com/dept/security/18951

It's great, but "penetration testing" of the network assesment types is
useless as it takes a picture of what the network look slike TODAY, while
tomorrow it's a different network with different vulnerabilities.

Automating the process is the way to go.

As to software testing, it considerably depends on what you use. If you
test with SATAN-comparable tools, well, you won't get far.

> 
> gem
> 
> company www.cigital.com
> podcast www.cigital.com/silverbullet
> book www.swsec.com
> 
> 
> 
> This electronic message transmission contains information that may be
> confidential or privileged.  The information contained herein is intended
> solely for the recipient and use by any other party is not authorized.  If
> you are not the intended recipient (or otherwise authorized to receive this
> message by the intended recipient), any disclosure, copying, distribution or
> use of the contents of the information is prohibited.  If you have received
> this electronic message transmission in error, please contact the sender by
> reply email and delete all copies of this message.  Cigital, Inc. accepts no
> responsibility for any loss or damage resulting directly or indirectly from
> the use of this email or its contents.
> Thank You.
> 
> 
> ___
> Secure Coding mailing list (SC-L)
> SC-L@securecoding.org
> List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
> List charter available at - http://www.securecoding.org/list/charter.php
> 

___
Secure Coding mailing list (SC-L)
SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php


[SC-L] "Baking Security In" - Microsoft dev security training

2006-07-07 Thread Gadi Evron
http://softwaredev.itbusinessnet.com/articles/viewarticle.jsp?id=47176

Gadi.

___
Secure Coding mailing list (SC-L)
SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php


Re: [SC-L] HNS - Biggest X Window security hole since 2000

2006-05-04 Thread Gadi Evron
On Thu, 4 May 2006, Kenneth R. van Wyk wrote:
> Stories about this (below) X bug and the DHS-sponsored project that found it 
> have been floating around the net all week.  This story caught my eye, 
> though:
> 
> http://www.net-security.org/secworld.php?id=3994
> 
> The author claims, "This flaw, caused by something as seemingly harmless as a 
> missing closing parenthesis, allowed local users to execute code with root 
> privileges, giving them the ability to overwrite system files or initiate 
> denial of service attacks."
> 
> So, it sounds like a single byte change in the entire X src tree could fix a 
> bug that could give an attacker complete control of a system.  Lovely...

Hmm, I think this was fixed in earlier X versions.

Gadi.

> 
> Cheers,
> 
> Ken van Wyk
> -- 
> KRvW Associates, LLC
> http://www.KRvW.com
> 

___
Secure Coding mailing list (SC-L)
SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php


Re: [Owasp-dotnet] Re: [SC-L] Is there any Security problem in Ajax technology?

2006-03-16 Thread Gadi Evron

George Capehart wrote:

Yvan Boily wrote:


Hi George,

I think a much more eloquent form of what you are saying is that
validation must be performed each time data crosses a security
boundary.



Hello Yvan,

I absolutely agree.  Wish I'd said it myself . . .  :)


In other words, it's just Javascript. Do your coding securely. I don't 
like the big buzz. This is nothing new.




The challenge is in helping people to understand what a security boundary is.



Errrmm.  Into understatement these days, eh?  :)


I wish I had a good Yoda quote right now, but all I can come up with is 
Terry Goodkind, which I feel very ashamed of.


Gadi.

--
http://blogs.securiteam.com/

"Out of the box is where I live".
-- Cara "Starbuck" Thrace, Battlestar Galactica.
___
Secure Coding mailing list (SC-L)
SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php


Re: [SC-L] Is there any Security problem in Ajax technology?

2006-03-14 Thread Gadi Evron

George Capehart wrote:

Dinis Cruz wrote:


I personally think that AJAX has the potential to create very insecure 
applications because it pushes the data validation and authorization layers 
back to the client (i.e. the browser)

"AJAX brings 'Back the Rich Client' and all its security problems"

Kentaro, on your AJAX application you must follow the rule-of-thumb of not 
trusting any data supplied by your own Client-Side-AJAX functions, and 
authorize every request.

In a nutshell: any data validation and authorization decisions/actions made at 
the Client-Side-AJAX functions are only there for usability, and have NO 
security value.



I enthusiastically agree with the above.  I'll take it further and suggest
that, even then, the input from the Web should/must be examined and sanitized
before use . . .  /*still*/ need to check for SQL injection attacks, etc.
IMNSHO, identification, authorization and validation should always be done by
the part of the system that is at risk if the input is bad (in any of the
connotations of bad) . . .


Indeed, but I believe the main point he was trying to make was:
>>In a nutshell: any data validation and authorization 
decisions/actions made at the Client-Side-AJAX functions are only there 
for usability, and have NO security value.


Much like with regular Java. Nothing changed.

The issue is to think like an attacker. Any client-side defense can be 
thrown aside, discarded.
Client-side defenses however are often very useful for "usability", 
i.e., so that the user is not allowed to send in bad Characters, or 
he/she wouldn't know their request was stopped server-side.


Gadi.

--
http://blogs.securiteam.com/

"Out of the box is where I live".
-- Cara "Starbuck" Thrace, Battlestar Galactica.
___
Secure Coding mailing list (SC-L)
SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php


[SC-L] static analysis you say?

2006-02-09 Thread Gadi Evron
Just last month Greta Yorsh, fresh from work in Microsoft Research over 
in the US lectured to us on something related in TAUSEC 
(http://www.cs.tau.ac.il/tausec - in Hebrew).


-
Title: Testing, Abstraction, Theorem Proving: Better Together.

We present a method for static program analysis that leverages tests
and concrete program executions.  State abstractions generalizes the
set of program states obtained from concrete executions.  A theorem
prover is then used for checking that the generalized set of concrete
states covers all potential executions, and
satisfies additional safety properties.

Our method finds the same potential errors as the most-precise abstract
interpreter for a given abstraction, and potentially more efficient.
Additionally, it provides a new
way to tune performance by alternating between concrete execution and
theorem proving.
-

Anyone follow that? I didn't.

VERY basically put, she showed a system that was developed over 5 years 
that abstracts static code such as of device drivers to a simple boolean 
program, and then follows the code to find errors. Later comparing these 
errors to a run on a tad less abstracted program to see if the error is 
really there.


^^^ That is probably the worst description you will ever hear of SLAM.

She claims that with her research (not SLAM) she can prove 
mathematically a program is secure.. erm. She was a very impressive 
lecturer and almost convinced me, I really was impressed.


Here are some links from her lecture (ignore the first line which is in 
Hebrew):

http://www.cs.tau.ac.il/tausec/lectures/Greta_Yorsh_links.html

Gadi.
___
Secure Coding mailing list (SC-L)
SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php


[SC-L] it's not a bug, it's a feature!

2006-02-09 Thread Gadi Evron

Okay, if we are so keen to make distinctions, how about this one?

In the recent WMF 0day, it was indeed a feature. But it was a security 
vulnerability non-the-less. PR-ing it as a feature was indeed, PR.


Cisco released a security advisory, advising that a default root 
password is a "vulnerability" rather than a built-in feature. :)


It seems that people often enjoy making the distinction for putting the 
right spin on things. Myself, I like this quote:

"Any sufficiently advanced bug is indistinguishable from a feature".
A spin on Arthur C. Clarke's 3rd law.

I learned just a few months ago (last year :) ) that it was coined 20 
years ago by someone many of us know: Rich Kulawiec.


What is your take on this, should this be a huge argument as well? :)

Gadi.
___
Secure Coding mailing list (SC-L)
SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php


[SC-L] heap protection in glibc - some questions

2006-01-19 Thread Gadi Evron
A friend of mine grabbed my attention to this today. I sent this to 
another list earlier and decided it may be more fitting here on Ken's list.


In version 2.3.4 of glibc...

if (__builtin_expect ((uintptr_t) p > (uintptr_t) -size, 0) ||
__builtin_expect ((uintptr_t) p & MALLOC_ALIGN_MASK, 0))

^^^ This line was added.

There is also a comment on it:

+  /* Little security check which won't hurt performance: the
+ allocator never wrapps around at the end of the address space.
+ Therefore we can exclude some size values which might appear
+ here by accident or by "design" from some intruder.  */
+  if (__builtin_expect ((uintptr_t) p > (uintptr_t) -size, 0)
+  || __builtin_expect ((uintptr_t) p & MALLOC_ALIGN_MASK, 0))
+{
+  errstr = "free(): invalid pointer";
+errout:
+  malloc_printerr (check_action, errstr, mem);
+  return;
+}

It was mentioned on http://www.securityfocus.com/columnists/359.

Now, my questions if some of you can be so kind as to try and answer:
In your estimation, how many people actually heard about this (outside
the tight circle of secure coding maniacs)?

In your estimation, how many people actually go through the pain of
upgrading glibc?

This seems effective to me. In retrospect, how effective did it prove to
be over the past year, in your experience? Is it too early to tell?

Heard of this? http://www.cs.ucsb.edu/~wkr/projects/heap_protection/
What's your take on it, and how do you compare the two?

I'd appreciate your input if you have the time.

A friend of mine might also write on this, but I would like some more
opinions.

Thanks guys!

Gadi.

___
Secure Coding mailing list (SC-L)
SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php


Re: [SC-L] ZDNet: Microsoft to hunt for new species of Windows bug

2006-01-10 Thread Gadi Evron

Steven M. Bellovin wrote:

I like this line: "This kind of threat has not been anticipated before",
from Microsoft.  Mobile code hasn't been anticipated?  C'mon!


I think they meant 'features that allow you to execute code have not 
been seen as a security issue before. We have no idea where and how many 
such instances there are.'


Reminds you of anything? ;)

Gadi.
___
Secure Coding mailing list (SC-L)
SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php


Re: [SC-L] Intel turning to hardware for rootkit detection

2005-12-13 Thread Gadi Evron

http://www.eweek.com/article2/0,1895,1900533,00.asp



Gee this sounds just like virus wars, using add-on products to make
up for weakness in the operating system.

A reliable operating system would not permit such modifications in
the first place


Whatever happened with Intel NX technology?

Anyone followed up on that?

"Rootkits" in this case seem to be *more* a good name for this tech than 
what rootkits actually are.


Gadi.
___
Secure Coding mailing list (SC-L)
SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php


[SC-L] [Fwd: DJB's students release 44 *nix software vulnerability advisories]

2004-12-18 Thread Gadi Evron
[Ed. Cross-posted from Bugtraq... KRvW]

Subject: DJB's students release 44 *nix software vulnerability advisories
Date: Thu, 16 Dec 2004 01:47:12 -0800
Message-ID: <[EMAIL PROTECTED]>
From: "Thor Larholm" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>

Widely deployed open source software is commonly believed to contain
fewer security vulnerabilities than similar closed source software due
to the possibility of unrestricted third party source code auditing.
Predictably, most users of open source software do not invest a
significant amount of time to audit the applications they use and now a
class of 25 students has discovered 44 vulnerabilities during a CS
course.

This small group of students highlights how individuals outside the
security industry without special security prerequisites can still
manage to outperform the average Bugtraq poster in sheer quantity of
discoveries. This adequately validates the typical estimate of between 5
and 15 errors in every thousand lines of code.

D.J. Bernstein (http://cr.yp.to/djb.html) is lecturing a course this
fall at the University of Illinois at Chicago called "MCS 494: Unix
Security Holes" (http://cr.yp.to/2004-494.html). One of the requirements
to pass the course was to find and exploit 10 previously undiscovered
security holes in currently deployed Unix software. 

With a class of 25 students discovering 44 vulnerabilities most students
now expect to fail the course
(http://it.slashdot.org/article.pl?sid=04/12/15/2113202).

The 44 security advisories have been published at 

http://tigger.uic.edu/~jlongs2/holes/


Ariel Berkman has discovered a remotely exploitable security hole in
2fax, a text-to-TIFF converter.
[remote] [control] 2fax 3.04 expandtabs overflows s buffer
http://tigger.uic.edu/~jlongs2/holes/2fax.txt

Limin Wang has discovered two remotely exploitable security holes in
abc2midi. 
[remote] [control] abc2midi 2004.12.04 event_text overflows msg buffer;
event_specific overflows msg buffer
http://tigger.uic.edu/~jlongs2/holes/abc2midi.txt

Limin Wang has discovered a remotely exploitable security hole in
abc2mtex.
[remote] [control] abc2mtex 1.6.1 process_abc overflows key buffer
http://tigger.uic.edu/~jlongs2/holes/abc2mtex.txt

Limin Wang has discovered a remotely exploitable security hole in
abcm2ps.
[remote] [control] abcm2ps 3.7.20 put_words overflows str buffer
http://tigger.uic.edu/~jlongs2/holes/abcm2ps.txt

Yosef Klein has discovered a remotely exploitable security hole in
abcpp.
[remote] [control] abcpp 1.3.0 process_directive overflows token buffer
http://tigger.uic.edu/~jlongs2/holes/abcpp.txt

Limin Wang has discovered two remotely exploitable security holes in
abctab2ps.
[remote] [control] abctab2ps 1.6.3 write_heading overflows t; trim_title
overflows rest
http://tigger.uic.edu/~jlongs2/holes/abctab2ps.txt

Qiao Zhang has discovered two remotely exploitable security holes in
asp2php.
[remote] [control] asp2php 0.76.23 preparse() overflows token buffer;
preparse() overflows temp buffer
http://tigger.uic.edu/~jlongs2/holes/asp2php.txt

James Longstreet and Tom Indelli have discovered a remotely exploitable
security hole in bsb2ppm, a program to convert BSB image files to PPM
image
files.
[remote] [control] bsb2ppm 0.0.6 overflows line buffer
http://tigger.uic.edu/~jlongs2/holes/bsb2ppm.txt

Ariel Berkman has discovered a locally exploitable security hole in
ChangePassword, a YP/Samba/Squid password-changing tool.
[local] [control] ChangePassword 0.8 runs setuid shell
http://tigger.uic.edu/~jlongs2/holes/changepassword.txt

Danny Lungstrom has discovered a remotely exploitable security hole in
ChBg, a tool to change background pictures.
[remote] [control] chbg 1.5 simplify_path overflows res buffer
http://tigger.uic.edu/~jlongs2/holes/chbg.txt

Ariel Berkman has discovered a remotely exploitable security hole in
Convex 3D.
[remote] [control] Convex 3D 0.8pre1 readObjectChunk overflows
objectname buffer
http://tigger.uic.edu/~jlongs2/holes/convex3d.txt

Limin Wang has discovered a remotely exploitable security hole in
csv2xml.
[remote] [control] csv2xml 0.5.1 get_field_headers overflows token
http://tigger.uic.edu/~jlongs2/holes/csv2xml.txt

Ariel Berkman has discovered a remotely exploitable security hole in
CUPS.
[remote] [control] CUPS 1.1.22 hpgltops ParseCommand overflows buf
http://tigger.uic.edu/~jlongs2/holes/cups.txt

Bartlomiej Sieka has discovered several security problems in how
lppasswd, version 1.1.22 (current), edits /usr/local/etc/cups/passwd.
[local] [kill] CUPS 1.1.22 lppasswd ignores write errors, etc.
http://tigger.uic.edu/~jlongs2/holes/cups2.txt

Ariel Berkman has discovered a remotely exploitable security hole in
dxfscope, a viewer for DXF drawings.
[remote] [control] dxfscope 0.2 overflows ent_name buffer
http://tigger.uic.edu/~jlongs2/holes/dxfscope.txt

Ariel Berkman has discovered a remotely exploitable security hole in the
elm/bolthole filter program.
[remote] [control] elm/bolthole filter 2.6.1 save_embedded_ad

Re: [SC-L] Secured Coding

2004-11-17 Thread Gadi Evron
I truly believe this as no matter how secured we make our programs there
will always be someone to figure how to break it.
So many people replied to this, I will too.
It is not about if someone could or might hack - with enough resources,
they would. Even if it is by physically breaking in and replacing your
software with their own.
Point is not if someone can potentially break your software. It is about
making it as difficult as possible for them to do so until it might even
become "not worth it".
   Gadi.