Free code generally tends to be very high quality and very useful.
Rather than pointing fingers and telling volunteer workers what they
should or should not do, you should be happy that they put the warning
in there at all which is more than any commercial vendor will ever do
for their code.

You always have the option of removing the smb decoder which is why,
afaik, the notice was put in in the first place.

-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED]] On Behalf Of
Daniel R. Grayson
Sent: Wednesday, September 18, 2002 3:30 PM
To: [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Subject: Re: [tcpdump-workers] tcpdump warning about SMB printer



I understand.  It's hard, if you program in C, which is an unsafe
language, to avoid bugs and, hence, to avoid security holes.  Why not
just have a history (like what you say below) of the bug/security
situation near the top in the README file?

The three exclamation points from ./configure seem to demand action from
the user, and there isn't enough information at that point for the user
to decide what to do.

The README file could mention that it was the SMB printing code (not
"printer", since a "printer" is a physical machine) that had the most
bugs before, and so people might consider disabling it if they're
worried.

If you feel tempted to say something like "The SMB printing code may
still have an exploitable buffer overflow problem", then a more thorough
audit is required, and you might want to provide an apology for not
doing it yet, ask for volunteers, etc.

------------------------------------------------------------------------
-----

   Date: Wed, 18 Sep 2002 11:12:25 -0700
   From: Guy Harris <[EMAIL PROTECTED]>
   Cc: [EMAIL PROTECTED]
   Content-Disposition: inline

   On Tue, Sep 17, 2002 at 02:04:33PM -0500, Daniel R. Grayson wrote:
   >     checking whether to enable the possibly-buggy SMB printer...
yes
   >     configure: warning: The SMB printer may have exploitable buffer
overflows!!!
   > 
   > I don't know what to make of it.  Does this warning mean that you
are
   > distributing code known to have security holes?

   It says "may have", not "does have".

   At one point, there were definitely places where it could run past
the
   end of the packet and keep going.  We audited the code somewhat, and
   fixed what we found; I can't speak for Bill Fenner, who did most of
the
   work, but I think we found most of the places where that happens, if
not
   all.

   Bill, should we remove that warning at this point?

-
This is the TCPDUMP workers list. It is archived at
http://www.tcpdump.org/lists/workers/index.html
To unsubscribe use
mailto:[EMAIL PROTECTED]?body=unsubscribe

-
This is the TCPDUMP workers list. It is archived at
http://www.tcpdump.org/lists/workers/index.html
To unsubscribe use mailto:[EMAIL PROTECTED]?body=unsubscribe

Reply via email to