[freenet-dev] Gobbles Security post to BugTraq

2003-03-06 Thread Matthew Toseland
On Wed, Jan 22, 2003 at 04:17:29PM -0500, Jay Oliveri wrote: > An article was posted to BugTraq by makers of software funded by the RIAA to > enable an eventual distributed denial of service attack on "infected" p2p > network nodes (their words). Freenet isn't specifically mentioned, but I > th

Re: [freenet-dev] Gobbles Security post to BugTraq

2003-03-05 Thread Matthew Toseland
On Wed, Jan 22, 2003 at 04:17:29PM -0500, Jay Oliveri wrote: > An article was posted to BugTraq by makers of software funded by the RIAA to > enable an eventual distributed denial of service attack on "infected" p2p > network nodes (their words). Freenet isn't specifically mentioned, but I > th

Re: [freenet-dev] Gobbles Security post to BugTraq

2003-02-14 Thread Mark J Roberts
bdonlan: > How can it determine that? That's what needs to be figured out, obviously - some relatively generic scheme for "registering privileged code at initialization" and "calling privileged code." I don't claim to be qualified to design it. ___ devl

Re: [freenet-dev] Gobbles Security post to BugTraq

2003-02-14 Thread bdonlan
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Friday 14 February 2003 06:37 pm, Mark J Roberts wrote: > bdonlan: > > I don't understand. Anyway, why not fork() and restrict the child? > > That is hardly easy or efficient. > > My point is that I've got this notion of being able to use some > cap

Re: [freenet-dev] Gobbles Security post to BugTraq

2003-02-14 Thread Mark J Roberts
bdonlan: > I don't understand. Anyway, why not fork() and restrict the child? That is hardly easy or efficient. My point is that I've got this notion of being able to use some capability only by calling a predefined function (ie, the one I posted that accepts user input from the terminal), but I

Re: [freenet-dev] Gobbles Security post to BugTraq

2003-02-14 Thread bdonlan
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Friday 14 February 2003 06:12 pm, Mark J Roberts wrote: > bdonlan: > > How do you propose isolating the functions and relocating them using > > current compilers? Getting them to call library function'd be > > difficult... > > Oh, I have no clue. >

Re: [freenet-dev] Gobbles Security post to BugTraq

2003-02-14 Thread Mark J Roberts
bdonlan: > How do you propose isolating the functions and relocating them using current > compilers? Getting them to call library function'd be difficult... Oh, I have no clue. I'm thinking about how the kernel can generically enable the "predefined interface" thing... _

Re: [freenet-dev] Gobbles Security post to BugTraq

2003-02-14 Thread bdonlan
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Thursday 13 February 2003 08:11 pm, Mark J Roberts wrote: > bdonlan: > > Use an interpreted language. They'll prevent buffer overflows and you can > > unimplement unallowed functions. > > Buffer overflows are the worst offender, but there are plenty

Re: [freenet-dev] Gobbles Security post to BugTraq

2003-02-13 Thread Mark J Roberts
bdonlan: > Use an interpreted language. They'll prevent buffer overflows and you can > unimplement unallowed functions. Buffer overflows are the worst offender, but there are plenty of other ways that programs can be tricked into doing things they never should be doing. Ruling out those possibili

Re: [freenet-dev] Gobbles Security post to BugTraq

2003-02-13 Thread bdonlan
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Thursday 13 February 2003 07:24 pm, Mark J Roberts wrote: > bdonlan: > > And let it at the kernel stack? _BAD_ idea. It can still use > > printf/scanf to sniff your password anyway. > > No, it can't, becuase it will only prompt for input through you

Re: [freenet-dev] Gobbles Security post to BugTraq

2003-02-13 Thread Mark J Roberts
bdonlan: > And let it at the kernel stack? _BAD_ idea. It can still use > printf/scanf to sniff your password anyway. No, it can't, becuase it will only prompt for input through your uploaded interface function. There are innumerable other cases where security is greatly enhanced by ensuring that

Re: [freenet-dev] Gobbles Security post to BugTraq

2003-02-13 Thread bdonlan
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Wednesday 12 February 2003 09:29 pm, Mark J Roberts wrote: > bdonlan: [snip] > With code uploading, you could make _sure_ that the terminal would > only be capable of outputting questions and reading answers in the > style you want. > > void promp

Re: [freenet-dev] Gobbles Security post to BugTraq

2003-02-12 Thread Mark J Roberts
Jay Oliveri: > I don't know what to really think, since conveniently most of > their evidence is under NDA. Devising access control and permissions schemes to limit the capabilities of code processing malicious data is a tricky business. The question that needs to be constantly asked is, "Exactly

Re: [freenet-dev] Gobbles Security post to BugTraq

2003-02-12 Thread Mark J Roberts
bdonlan: > (4) load plugins > (5) Access the RTC > (6) Get access to raw video RAM... > Shall I go on? :) So? Yes, acquire those capabilities at initialization time, even ones you may not necessarily use. But drop those that you _know_ you won't need. And if, say, you have some circumstance where

Re: [freenet-dev] Gobbles Security post to BugTraq

2003-02-12 Thread Matthew Toseland
On Wed, Feb 12, 2003 at 06:52:41PM -0500, bdonlan wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > On Wednesday 12 February 2003 06:38 pm, Mark J Roberts wrote: > > Jay Oliveri: > > > I don't know what to really think, since conveniently most of > > > their evidence is under NDA. > > >

Re: [freenet-dev] Gobbles Security post to BugTraq

2003-02-12 Thread bdonlan
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Wednesday 12 February 2003 06:38 pm, Mark J Roberts wrote: > Jay Oliveri: > > I don't know what to really think, since conveniently most of > > their evidence is under NDA. > > Devising access control and permissions schemes to limit the > capabilit

[freenet-dev] Gobbles Security post to BugTraq

2003-02-12 Thread Jay Oliveri
An article was posted to BugTraq by makers of software funded by the RIAA to enable an eventual distributed denial of service attack on "infected" p2p network nodes (their words). Freenet isn't specifically mentioned, but I thought perhaps it's at least worth forwarding the link: http://online