Robert Watson wrote:
> On Wed, 24 Apr 2002, Greg 'groggy' Lehey wrote:
> > > A more conservative default configuration results in a material
> > > improvement in system security.
> >
> > *snip*
> 
> By snipping here, you removed reference to the fact that this was a
> general discussion of direction and policy, rather than specifically to do
> with X11, which provides an answer to a number of your questions.

People really try to avoid policy decisions; they trap them
into doing in the future what they say now that they will do
in the future (damned consistency!).


> As indicated, not all of these criteria may apply in every case -- this
> was just a suggested list of criteria that might be applied.  There have
> been a number of vulnerabilities in a number of different X protocol
> implementations.  Many of them require first getting past the normal X
> access control mechanisms before they may be exploited, but not all.

???

Which ones don't require that?  The only ones I can think of are
TCP vulnerabilities (as I said before), and you aren't going to
fix a TCP vulnerability unless you turn off *all* TCP-based services,
not just X11.


> If you think that's a problem, then you didn't read my e-mail.  However,
> there is actually a great deal of relevance here: protocol and
> implementation complexity have a lot to do with the chances that there
> will be a serious vulnerability.  Likewise, the level of privilege
> associated with X11 is highly relevant: if you compromise the X server,
> you've got a lot to play with.

I keep hearing "complexity := vulnerability".  I'd really, really
like to see a mathematical proof of this theory.

[ ... ]

> We adapt a number of applications for the FreeBSD environment and
> configuration.  A more common way to distinguish our localizations is
> through a WITH_GRATUITOUS_LOCAL_CHANGES make argument, or via an
> interactice interface (for example, ghostscript).

8-) 8-) I like it.


[ ... ]

> If we can expose this feature via
> rc.conf, just make it a seperate rc.conf entry and twiddle it off of the
> security configuration manu in sysinstall.  Is that something we can do
> easily?

I think the way to do this is with firewall rules.  Making everything
read rc.conf is a pretty useless thing to do.  It's also dangerous to
make a single rc.conf line apply to more than one thing, since then it
permits alternate (potentially conflicting) interpretations of meaning.

-- Terry

To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message

Reply via email to