Re: Holy Security

2005-02-15 Thread Spike
Jochem van Dieten wrote: > Spike wrote: > >>Not to mention the fact that a lot of the exploits that are discovered >>in open source software may well have a directly comparable exploit in >>closed source software if the mechanism of failure is a non-obvious one >>in an otherwise typical code co

RE: Holy Security

2005-02-15 Thread Ben Rogers
> You discover a bug in open-source software. You notify the develpers. > They say "cool, we'll fix that". The new version has this fix and is > released a few days/weeks after the initial notification. Or they tell you it's not actually a bug. It's the way it should work because of some obscure

Re: Holy Security

2005-02-14 Thread Jon Austin
And is some cases, issue an IMMEDIATE fix/workaround which you can patch against (or fetch the fixed version from CVS) and have the hole plugged in matter of minutes. Some researchers who have been finding exploitable issues in MS products have been issuing their own binary patch as a band-aid sol

RE: Holy Security

2005-02-14 Thread Damien McKenna
Here's a thought... You discover a bug in closed-source software. You notify the developers. You are told, after paying the $xxx per-call support fee that yes, this is a bug and will be fixed in the next version. You wait X months/years and the new release costs another few hundred/thousand $,

RE: Holy Security

2005-02-14 Thread Phillip B. Holmes
>>last norton report says (vulnerabilities) >>windows 60,000 + >>mac & linux 60 LOL! Only one remote hole in the default install, in more than 8 years! http://www.openbsd.org Phillip --- [This E-mail has been scanned for viruses.]

Re: Holy Security

2005-02-14 Thread dave
sure thing boss!! if it helps convey the point then it should be said, wasnt about "mines bigger than yours" From: Mike Kear <[EMAIL PROTECTED]> Sent: Monday, February 14, 2005 10:15 PM To: CF-Talk Subject: Re: Holy Security Can yo

Re: Holy Security

2005-02-14 Thread Mike Kear
Can you guys take your 'mine is bigger than yours' contest to some other list please? Cheers Mike Kear Windsor, NSW, Australia Certified Advanced ColdFusion Developer AFP Webworks http://afpwebworks.com ColdFusion, PHP, ASP, ASP.NET hosting from AUD$15/month On Mon, 14 Feb 2005 21:46:18 -0500, d

Re: Holy Security

2005-02-14 Thread dave
well it kinda shows that closed source surely aint "the shit" it would make sense to be! From: Claude Schneegans <[EMAIL PROTECTED]> Sent: Monday, February 14, 2005 9:41 PM To: CF-Talk Subject: Re: Holy Security >>l

Re: Holy Security

2005-02-14 Thread Claude Schneegans
>>last norton report says (vulnerabilities) >>windows 60,000 + >>mac & linux 60 So what? These are only known vulnerabilities, and vulnerabilities are only known when people try to find them, so it only proves that there are 60,000 guy interested in finding vulnerabilities in Windows for 60 gu

Re: Holy Security

2005-02-14 Thread dave
last norton report says (vulnerabilities) windows 60,000 + mac & linux 60 From: Claude Schneegans <[EMAIL PROTECTED]> Sent: Monday, February 14, 2005 9:24 PM To: CF-Talk Subject: Re: Holy Security >> Absolutely. If I was to look for

Re: Holy Security

2005-02-14 Thread Claude Schneegans
>> Absolutely. If I was to look for vulnerabilities any where, It would sure be easier if I had the source code! ;-) The fact that there are less attacks against Linux is similar to the fact that there are (almost) no virus for Macs: there are nobody to watch ;-) Just like those guys running nud

Re: Holy Security

2005-02-14 Thread Jon Austin
On Tue, 15 Feb 2005 01:40:25 +0100, Jochem van Dieten <[EMAIL PROTECTED]> wrote: > You mean like the integer overflows that made non priviledge > separated OpenSSH rootable a few years ago. Sure, the patch was > out before the exploit was out. But did anybody take a step back, > said "wow, this is

Re: Holy Security

2005-02-14 Thread Rob
> > I would argue that open source code is MORE analyzed than closed > > source. Especially if it is a critical/core component. > > > > Look at OpenBSD. They have a fantastic security record. > > But I am afraid they are the exception, not the rule. Crazy talk. Most anything based on BSD - open

Re: Holy Security

2005-02-14 Thread Jochem van Dieten
Jon Austin wrote: > No, but it was in response to your original question, > > "Do you know anyone that analyzes the quality of other peoples > open source code? Anyone?" I meant that as friends, collegues, not names on LKML. > I would argue that open source code is MORE analyzed than closed > s

Re: Holy Security

2005-02-14 Thread Rob
On Mon, 14 Feb 2005 19:28:04 -0500, dave <[EMAIL PROTECTED]> wrote: > when ppl are looking at what you are doing your just write better code, im > assuming 90% of ms code is written by ppl completely wigged out on starbucks > ;)~ And they just got out of school having never "worked" in IT (gott

Re: Holy Security

2005-02-14 Thread Jochem van Dieten
Spike wrote: > Not to mention the fact that a lot of the exploits that are discovered > in open source software may well have a directly comparable exploit in > closed source software if the mechanism of failure is a non-obvious one > in an otherwise typical code construct. You mean like the in

Re: Holy Security

2005-02-14 Thread Jon Austin
No, but it was in response to your original question, "Do you know anyone that analyzes the quality of other peoples open source code? Anyone?" I would argue that open source code is MORE analyzed than closed source. Especially if it is a critical/core component. Look at OpenBSD. They have a fan

Re: Holy Security

2005-02-14 Thread dave
starting to get worried about firefox From: Jon Austin <[EMAIL PROTECTED]> Sent: Monday, February 14, 2005 6:34 PM To: CF-Talk Subject: Re: Holy Security Am I misreading what you said? Strange piece of logic there. I would think the fact that the

Re: Holy Security

2005-02-14 Thread Jordan Michaels
No, you're reading it right. I was being sarcastic. =P Sorry for not making that more clear. My fault! Warm regards, Jordan Jon Austin wrote: >Am I misreading what you said? Strange piece of logic there. I would >think the fact that the source code not being available would make it >more diffic

Re: Holy Security

2005-02-14 Thread Jochem van Dieten
Jon Austin wrote: > Well, the Linux kernel for one is pretty heavily peer-reviewed. And > thats even before it gets committed to the source tree, which largely > is a final process overseen by Linus. So the kernel code is VERY > heavily reviewed. And would the process for getting patches into AIX,

Re: Holy Security

2005-02-14 Thread Spike
Not to mention the fact that a lot of the exploits that are discovered in open source software may well have a directly comparable exploit in closed source software if the mechanism of failure is a non-obvious one in an otherwise typical code construct. Since most of the bug reports for open so

Re: Holy Security

2005-02-14 Thread Rob
On Tue, 15 Feb 2005 00:56:07 +0100, Jochem van Dieten <[EMAIL PROTECTED]> wrote: > Ian Skinner wrote: > > Myself. I have done it for a couple of small things. Nothing on the scope > > of an entire browser, but I assume that all the people actually working on > > a project like Firefox are check

Re: Holy Security

2005-02-14 Thread Jon Austin
Well, the Linux kernel for one is pretty heavily peer-reviewed. And thats even before it gets committed to the source tree, which largely is a final process overseen by Linus. So the kernel code is VERY heavily reviewed. Look at the bugtraq mailing list. There are tonnes of people who are a) dis

Re: Holy Security

2005-02-14 Thread Sean Corfield
On Tue, 15 Feb 2005 00:40:40 +0100, Jochem van Dieten <[EMAIL PROTECTED]> wrote: > Do you know anyone that analyzes the quality of other peoples > open source code? Anyone? My old company, Programming Research, specialized in code analysis tools for FORTRAN, C, C++ and I believe they have a Java a

Re: Holy Security

2005-02-14 Thread Jochem van Dieten
Ian Skinner wrote: > Myself. I have done it for a couple of small things. Nothing on the scope > of an entire browser, but I assume that all the people actually working on a > project like Firefox are checking it for problems as best as they can. Of course they are. But how is that different /

RE: Holy Security

2005-02-14 Thread Ian Skinner
www.BloodSource.org Sacramento, CA "C code. C code run. Run code run. Please!" - Cynthia Dunning -Original Message- From: Jochem van Dieten [mailto:[EMAIL PROTECTED] Sent: Monday, February 14, 2005 3:41 PM To: CF-Talk ....Subject: Re: Holy Security Ian Ski

Re: Holy Security

2005-02-14 Thread Jochem van Dieten
Ian Skinner wrote: > > Yes, they also can analyze the code for holes, but in open source they aren't > the only ones doing so. Do you know anyone that analyzes the quality of other peoples open source code? Anyone? Jochem ~

RE: Holy Security

2005-02-14 Thread Ian Skinner
rom: Jon Austin [mailto:[EMAIL PROTECTED] Sent: Monday, February 14, 2005 3:30 PM To: CF-Talk ....Subject: Re: Holy Security Am I misreading what you said? Strange piece of logic there. I would think the fact that the source code not being available would make it more di

Re: Holy Security

2005-02-14 Thread Jon Austin
Am I misreading what you said? Strange piece of logic there. I would think the fact that the source code not being available would make it more difficult to find security problems. It would easier to spot an overflow of some type in the code, rather than having to effectively "brute force" an over

Re: Holy Security

2005-02-14 Thread Jordan Michaels
lol You know what? That's awesome. Converting our W2K box to SuSE 8.2 back in the day is what made a Linux believer out of me. We had nothing but trouble with our W2K box and as soon as our SuSE 8.2 box went into production, it just ran. No crashes, no strange/inexplicable errors, it just ran.

Re: Holy Security

2005-02-14 Thread Jochem van Dieten
Rob wrote: > I am sure this will be on the news soon, but it looks like a slew of > security problems on windows were reported lately That won't be in the news anytime soon: you are a week late. All these Windows issues were made public last Tuesday. Every second Tuesday of the month is MS patc

Re: Holy Security

2005-02-14 Thread Jared Rypka-Hauer - CMG, LLC
The Linux one was Windows filesystem errors... The Mozilla one allowed a local user to upgrade their privs... at first I was thinking, eh, that's not THAT big of a deal. But then I started thinking... hacker hacks in, hacker gets SU, hacker does nasties. EVEN if you're cut your users back to power

Re: Holy Security

2005-02-14 Thread Jordan Michaels
::blink:: ::laughs uncontrollably:: It's also great to note that the windows vulnerabilities you mentioned could mostly be executed remotely, whereas one of the mozilla/firefox vulnerabilities and the linux vulnerability could only be executed locally, or with a local users "permission". Howe