Gunnar, Developers have no power. You should be talking to the decision makers.
As an example, to instill the importance of software security, I talk to decision makers: project managers, architects, CTOs (admittedly, this is a blurred line - lots of folks call themselves architects). If I go to talk about software security to developers, I know from experience that I am probably wasting my time. Even if they do care, they have no effect overall. Your target and blame is wrong; that's all that I am saying. Stephen On Wed, Nov 26, 2008 at 12:48 AM, Gunnar Peterson <[EMAIL PROTECTED]> wrote: > Sorry I didn't realize "developers" is an offensive ivory tower in other > parts of the world, in my world its a compliment. > > -gunnar > > On Nov 25, 2008, at 10:30 AM, Stephen Craig Evans wrote: > >> HI, >> >> "maybe the problem with least privilege is that it requires that >> developers:..." >> >> IMHO, your US/UK ivory towers don't exist in other parts of the world. >> Developers have no say in what they do. Nor, do they care about >> software security and why should they care? >> >> So, at least, change your nomenclature and not say "developers". It >> offends me because you are putting the onus of knowing about software >> security on the wrong people. >> >> Cheers, >> Stephen >> >> On Tue, Nov 25, 2008 at 10:18 PM, Gunnar Peterson >> <[EMAIL PROTECTED]> wrote: >>> >>> maybe the problem with least privilege is that it requires that >>> developers: >>> >>> 1. define the entire universe of subjects and objects >>> 2. define all possible access rights >>> 3. define all possible relationships >>> 4. apply all settings >>> 5. figure out how to keep 1-4 in synch all the time >>> >>> do all of this before you start writing code and oh and there are >>> basically no tools that smooth the adoption of the above. >>> >>> i don't think us software security people are helping anybody out in >>> 2008 by doing ritual incantations of a paper from the mid 70s that may >>> or may not apply to modern computing and anyhow is riddled with ideas >>> that have never been implemented in any large scale systems >>> >>> compare these two statements >>> >>> Statement 1. Saltzer and Schroeder: >>> "f) Least privilege: Every program and every user of the system should >>> operate using the least set of privileges necessary to complete the >>> job. Primarily, this principle limits the damage that can result from >>> an accident or error. It also reduces the number of potential >>> interactions among privileged programs to the minimum for correct >>> operation, so that unintentional, unwanted, or improper uses of >>> privilege are less likely to occur. Thus, if a question arises related >>> to misuse of a privilege, the number of programs that must be audited >>> is minimized. Put another way, if a mechanism can provide "firewalls," >>> the principle of least privilege provides a rationale for where to >>> install the firewalls. The military security rule of "need-to-know" is >>> an example of this principle." >>> >>> Statement 2. David Gelernter's Manifesto: >>> "28. Metaphors have a profound effect on computing: the file-cabinet >>> metaphor traps us in a "passive" instead of "active" view of >>> information management that is fundamentally wrong for computers. >>> >>> 29. The rigid file and directory system you are stuck with on your Mac >>> or PC was designed by programmers for programmers — and is still a >>> good system for programmers. It is no good for non-programmers. It >>> never was, and was never intended to be. >>> >>> 30. If you have three pet dogs, give them names. If you have 10,000 >>> head of cattle, don't bother. Nowadays the idea of giving a name to >>> every file on your computer is ridiculous." >>> >>> Conclusion(gp): Least Privilege is the point where the practical >>> matter of applying Saltzer and Schroeder's principles breaks down in >>> modern systems. Its a deployment issue, and a matter of insufficient >>> models and modes. >>> >>> http://1raindrop.typepad.com/1_raindrop/2008/06/mashup-of-the-titans.html >>> >>> Remember the 1990s when there were all these search engines that >>> required you tag up all the content and put it in hierarchical >>> directories and so on? Well what happened? Google came along and ate >>> their lunch. When the problem is information overload, telling >>> everyone to go out and label everything is not gonna work. >>> >>> -gunnar >>> >>> >>> >>> On Nov 24, 2008, at 4:34 PM, Gary McGraw wrote: >>> >>>> Sadly this non-adoption of privileged/managed code (filled with >>>> blank stares) has been the case ever since the Java security days a >>>> decade ago. One of the main challenges is that developers have a >>>> hard time thinking about the principle of least privilege and its >>>> implications regarding the capabilities they should request. Dinis >>>> is brave to set such thinking as a target. I've settled (after ten >>>> years) with getting developers just to utter the word "security." >>>> >>>> All together now..."security". >>>> >>>> gem >>>> >>>> company www.cigital.com >>>> podcast www.cigital.com/silverbullet >>>> blog www.cigital.com/justiceleague >>>> book www.swsec.com >>>> >>>> >>>> On 11/24/08 12:31 PM, "Mike Lyman" <[EMAIL PROTECTED]> wrote: >>>> >>>> Dinis Cruz wrote: >>>>> >>>>> Don't get me wrong, this is a great document if one is interested in >>>>> writing applications that use CAS (Code Access Security), I would >>>>> love >>>>> for this to be widely used. >>>> >>>> When we recommended recommending CAS during a review of the U.S. >>>> Defense >>>> Information System Agency's new Application Security and Development >>>> Security Technical Implementation Guide earlier this year we were met >>>> with what amounted to blank stares. (At least it seemed like that >>>> since >>>> it was a phone conference.) Some on the call understood it and agreed >>>> with the recommendation but those hosting the call and doing the >>>> writing >>>> didn't seem to grasp it. It may be a while before we see too many >>>> adopting this or requiring it for a while. >>>> -- >>>> >>>> Mike Lyman >>>> [EMAIL PROTECTED] >>>> >>>> _______________________________________________ >>>> Secure Coding mailing list (SC-L) SC-L@securecoding.org >>>> List information, subscriptions, etc - >>>> http://krvw.com/mailman/listinfo/sc-l >>>> List charter available at - http://www.securecoding.org/list/charter.php >>>> SC-L is hosted and moderated by KRvW Associates, LLC >>>> (http://www.KRvW.com >>>> ) >>>> as a free, non-commercial service to the software security community. >>>> _______________________________________________ >>>> >>>> >>>> _______________________________________________ >>>> Secure Coding mailing list (SC-L) SC-L@securecoding.org >>>> List information, subscriptions, etc - >>>> http://krvw.com/mailman/listinfo/sc-l >>>> List charter available at - http://www.securecoding.org/list/charter.php >>>> SC-L is hosted and moderated by KRvW Associates, LLC >>>> (http://www.KRvW.com >>>> ) >>>> as a free, non-commercial service to the software security community. >>>> _______________________________________________ >>>> >>> >>> >>> _______________________________________________ >>> Secure Coding mailing list (SC-L) SC-L@securecoding.org >>> List information, subscriptions, etc - >>> http://krvw.com/mailman/listinfo/sc-l >>> List charter available at - http://www.securecoding.org/list/charter.php >>> SC-L is hosted and moderated by KRvW Associates, LLC >>> (http://www.KRvW.com) >>> as a free, non-commercial service to the software security community. >>> _______________________________________________ >>> >> > > _______________________________________________ Secure Coding mailing list (SC-L) SC-L@securecoding.org List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l List charter available at - http://www.securecoding.org/list/charter.php SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com) as a free, non-commercial service to the software security community. _______________________________________________