At 1:57 PM +0100 4/6/06, Dinis Cruz wrote:

>> At least one aspect of that is a design defect in TCP/IP, allowing
>> unprivileged users to create a port to receive inbound connections.

> If an application is a File Compression utility, then there is no reason
>why it should have access to the TCP stack. And if they do need access to
>it (for example to check for updates), then those exceptions should be
>very well controlled and monitored.

The problem then, is how to prevent an unprivileged user from setting up
a File Compression utility to access TCP and establish a port to which
an incoming connection can be made without authentication.

This is back to the issue of which programs can be trusted -- and the
answer to that should be _not_ programs provided by an unprivileged user.
-- 
Larry Kilgallen
_______________________________________________
Secure Coding mailing list (SC-L)
SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php

Reply via email to