stephen

i spend at least half my time working directly with developers.

for some reason i have not communicated as well as i should to you,  
what i am saying is that the job is too hard for developers *because*  
the security industry has let them down by sending them on a fool's  
errand of least privilege.

the problem or target in your words IS with security people NOT  
developers. they have other problems just not an endless quixotic  
quest for least privilege. i am not repeat not throwing developers  
under the bus in this argument.

i am ready, willing and possibly able to be proven wrong on this point  
and maybe there is a cost effective way to deploy least privilege in  
the real world just want to make sure that i communicate my argument.

-gunnar
(who is now letting go)

On Nov 25, 2008, at 12:07 PM, Stephen Craig Evans wrote:

> I can't let this go.
>
> Gary, you are self-professed working with financial institutions and
> high-end customers.
>
> Gunnar, you are the same, at least what I gather from your Silver
> Bullet podcast when talking about the difference between SOA (top
> down) and Web 2.0 (bottom up).
>
> No flame war intended, but a healthy discussion should be in order.
>
> So please don't talk about "developers" as targets. They/we are the
> lowest on the totem pole. Direct your arrows at the people that you
> deal with. Plain and simple.
>
> Cheers,
> Stephen
>
> On Wed, Nov 26, 2008 at 1:48 AM, Gunnar Peterson <[EMAIL PROTECTED] 
> > wrote:
>> look, i am a consultant. i work in lots of different companies.  
>> lots of
>> different projects. i don't see these distinctions in black and  
>> white.
>> sometimes the cto and managers are best positioned to help  
>> companies develop
>> more secure software, sometimes architects, sometimes auditors, and  
>> many
>> many times in my experience developers are best positioned.
>>
>> but i really, truly do not care who does it. my only goal is more  
>> effective
>> security mechanisms and some pragmatic roadmap to get there. we are  
>> in the
>> infancy of this industry (think automotive safety circa 1942, all  
>> seat belts
>> and brakes), we are in no position to turn away help from anyone  
>> who can
>> help. every company and every project is different, if your  
>> organization is
>> set up so that developers are not empowered, but managers and CTOs  
>> are then
>> by all means work with them.
>>
>> but actually the main point of my post and the one i would like to  
>> hear
>> people's thoughts on - is to say that attempting to apply principle  
>> of least
>> privilege in the real world often leads to drilling dry wells. i am  
>> not
>> blaming any group in particular i am saying i think it is in the  
>> "too hard"
>> pile for now and we as software security people should not be  
>> advocating for
>> it until or unless we can find cost effective ways to implement it.
>>
>> -gunnar
>>
>> On Nov 25, 2008, at 11:28 AM, Stephen Craig Evans wrote:
>>
>>> It's a real cop-out for you guys, as titans in the industry, to go
>>> after developers. I'm disappointed in both of you. And Gary, you  
>>> said
>>> "One of the main challenges is that developers have a hard time
>>> thinking about the principle of least privilege ".
>>>
>>> Developers are NEVER asked to think about the principle of least
>>> privilege. Or your world of software security must be very very very
>>> different from mine (and I think my world at least equals   yours  
>>> but
>>> by about 2 billion people more, which might be irrelevant now but a
>>> little more relevant in the future :-)
>>>
>>> With the greatest, deepest respect to both of you,
>>> Stephen
>>>
>>> On Wed, Nov 26, 2008 at 1:01 AM, Stephen Craig Evans
>>> <[EMAIL PROTECTED]> wrote:
>>>>
>>>> Gunnar,
>>>>
>>>> Developers have no power. You should be talking to the decision  
>>>> makers.
>>>>
>>>> As an example, to instill the importance of software security, I  
>>>> talk
>>>> to decision makers: project managers, architects, CTOs (admittedly,
>>>> this is a blurred line - lots of folks call themselves  
>>>> architects). If
>>>> I go to talk about software security to developers, I know from
>>>> experience that I am probably wasting my time. Even if they do  
>>>> care,
>>>> they have no effect overall.
>>>>
>>>> Your target and blame is wrong; that's all that I am saying.
>>>>
>>>> Stephen
>>>>
>>>> On Wed, Nov 26, 2008 at 12:48 AM, Gunnar Peterson
>>>> <[EMAIL PROTECTED]> wrote:
>>>>>
>>>>> Sorry I didn't realize "developers" is an offensive ivory tower  
>>>>> in other
>>>>> parts of the world, in my world its a compliment.
>>>>>
>>>>> -gunnar
>>>>>
>>>>> On Nov 25, 2008, at 10:30 AM, Stephen Craig Evans wrote:
>>>>>
>>>>>> HI,
>>>>>>
>>>>>> "maybe the problem with least privilege is that it requires that
>>>>>> developers:..."
>>>>>>
>>>>>> IMHO, your US/UK ivory towers don't exist in other parts of the  
>>>>>> world.
>>>>>> Developers have no say in what they do. Nor, do they care about
>>>>>> software security and why should they care?
>>>>>>
>>>>>> So, at least, change your nomenclature and not say  
>>>>>> "developers". It
>>>>>> offends me because you are putting the onus of knowing about  
>>>>>> software
>>>>>> security on the wrong people.
>>>>>>
>>>>>> Cheers,
>>>>>> Stephen
>>>>>>
>>>>>> On Tue, Nov 25, 2008 at 10:18 PM, Gunnar Peterson
>>>>>> <[EMAIL PROTECTED]> wrote:
>>>>>>>
>>>>>>> maybe the problem with least privilege is that it requires that
>>>>>>> developers:
>>>>>>>
>>>>>>> 1. define the entire universe of subjects and objects
>>>>>>> 2. define all possible access rights
>>>>>>> 3. define all possible relationships
>>>>>>> 4. apply all settings
>>>>>>> 5. figure out how to keep 1-4 in synch all the time
>>>>>>>
>>>>>>> do all of this before you start writing code and oh and there  
>>>>>>> are
>>>>>>> basically no tools that smooth the adoption of the above.
>>>>>>>
>>>>>>> i don't think us software security people are helping anybody  
>>>>>>> out in
>>>>>>> 2008 by doing ritual incantations of a paper from the mid 70s  
>>>>>>> that may
>>>>>>> or may not apply to modern computing and anyhow is riddled  
>>>>>>> with ideas
>>>>>>> that have never been implemented in any large scale systems
>>>>>>>
>>>>>>> compare these two statements
>>>>>>>
>>>>>>> Statement 1. Saltzer and Schroeder:
>>>>>>> "f) Least privilege: Every program and every user of the  
>>>>>>> system should
>>>>>>> operate using the least set of privileges necessary to  
>>>>>>> complete the
>>>>>>> job. Primarily, this principle limits the damage that can  
>>>>>>> result from
>>>>>>> an accident or error. It also reduces the number of potential
>>>>>>> interactions among privileged programs to the minimum for  
>>>>>>> correct
>>>>>>> operation, so that unintentional, unwanted, or improper uses of
>>>>>>> privilege are less likely to occur. Thus, if a question arises  
>>>>>>> related
>>>>>>> to misuse of a privilege, the number of programs that must be  
>>>>>>> audited
>>>>>>> is minimized. Put another way, if a mechanism can provide  
>>>>>>> "firewalls,"
>>>>>>> the principle of least privilege provides a rationale for  
>>>>>>> where to
>>>>>>> install the firewalls. The military security rule of "need-to- 
>>>>>>> know" is
>>>>>>> an example of this principle."
>>>>>>>
>>>>>>> Statement 2. David Gelernter's Manifesto:
>>>>>>> "28. Metaphors have a profound effect on computing: the file- 
>>>>>>> cabinet
>>>>>>> metaphor traps us in a "passive" instead of "active" view of
>>>>>>> information management that is fundamentally wrong for  
>>>>>>> computers.
>>>>>>>
>>>>>>> 29. The rigid file and directory system you are stuck with on  
>>>>>>> your Mac
>>>>>>> or PC was designed by programmers for programmers — and is  
>>>>>>> still a
>>>>>>> good system for programmers. It is no good for non- 
>>>>>>> programmers. It
>>>>>>> never was, and was never intended to be.
>>>>>>>
>>>>>>> 30. If you have three pet dogs, give them names. If you have  
>>>>>>> 10,000
>>>>>>> head of cattle, don't bother. Nowadays the idea of giving a  
>>>>>>> name to
>>>>>>> every file on your computer is ridiculous."
>>>>>>>
>>>>>>> Conclusion(gp): Least Privilege is the point where the practical
>>>>>>> matter of applying Saltzer and Schroeder's principles breaks  
>>>>>>> down in
>>>>>>> modern systems. Its a deployment issue, and a matter of  
>>>>>>> insufficient
>>>>>>> models and modes.
>>>>>>>
>>>>>>>
>>>>>>> http://1raindrop.typepad.com/1_raindrop/2008/06/mashup-of-the-titans.html
>>>>>>>
>>>>>>> Remember the 1990s when there were all these search engines that
>>>>>>> required you tag up all the content and put it in hierarchical
>>>>>>> directories and so on? Well what happened? Google came along  
>>>>>>> and ate
>>>>>>> their lunch. When the problem is information overload, telling
>>>>>>> everyone to go out and label everything is not gonna work.
>>>>>>>
>>>>>>> -gunnar
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>> On Nov 24, 2008, at 4:34 PM, Gary McGraw wrote:
>>>>>>>
>>>>>>>> Sadly this non-adoption of privileged/managed code (filled with
>>>>>>>> blank stares) has been the case ever since the Java security  
>>>>>>>> days a
>>>>>>>> decade ago.  One of the main challenges is that developers  
>>>>>>>> have a
>>>>>>>> hard time thinking about the principle of least privilege and  
>>>>>>>> its
>>>>>>>> implications regarding the capabilities they should request.   
>>>>>>>> Dinis
>>>>>>>> is brave to set such thinking as a target.  I've settled  
>>>>>>>> (after ten
>>>>>>>> years) with getting developers just to utter the word  
>>>>>>>> "security."
>>>>>>>>
>>>>>>>> All together now..."security".
>>>>>>>>
>>>>>>>> gem
>>>>>>>>
>>>>>>>> company www.cigital.com
>>>>>>>> podcast www.cigital.com/silverbullet
>>>>>>>> blog www.cigital.com/justiceleague
>>>>>>>> book www.swsec.com
>>>>>>>>
>>>>>>>>
>>>>>>>> On 11/24/08 12:31 PM, "Mike Lyman" <[EMAIL PROTECTED]>  
>>>>>>>> wrote:
>>>>>>>>
>>>>>>>> Dinis Cruz wrote:
>>>>>>>>>
>>>>>>>>> Don't get me wrong, this is a great document if one is  
>>>>>>>>> interested in
>>>>>>>>> writing applications that use CAS (Code Access Security), I  
>>>>>>>>> would
>>>>>>>>> love
>>>>>>>>> for this to be widely used.
>>>>>>>>
>>>>>>>> When we recommended recommending CAS during a review of the  
>>>>>>>> U.S.
>>>>>>>> Defense
>>>>>>>> Information System Agency's new Application Security and  
>>>>>>>> Development
>>>>>>>> Security Technical Implementation Guide earlier this year we  
>>>>>>>> were met
>>>>>>>> with what amounted to blank stares. (At least it seemed like  
>>>>>>>> that
>>>>>>>> since
>>>>>>>> it was a phone conference.) Some on the call understood it  
>>>>>>>> and agreed
>>>>>>>> with the recommendation but those hosting the call and doing  
>>>>>>>> the
>>>>>>>> writing
>>>>>>>> didn't seem to grasp it. It may be a while before we see too  
>>>>>>>> many
>>>>>>>> adopting this or requiring it for a while.
>>>>>>>> --
>>>>>>>>
>>>>>>>> Mike Lyman
>>>>>>>> [EMAIL PROTECTED]
>>>>>>>>
>>>>>>>> _______________________________________________
>>>>>>>> Secure Coding mailing list (SC-L) SC-L@securecoding.org
>>>>>>>> List information, subscriptions, etc -
>>>>>>>> http://krvw.com/mailman/listinfo/sc-l
>>>>>>>> List charter available at -
>>>>>>>> http://www.securecoding.org/list/charter.php
>>>>>>>> SC-L is hosted and moderated by KRvW Associates, LLC
>>>>>>>> (http://www.KRvW.com
>>>>>>>> )
>>>>>>>> as a free, non-commercial service to the software security  
>>>>>>>> community.
>>>>>>>> _______________________________________________
>>>>>>>>
>>>>>>>>
>>>>>>>> _______________________________________________
>>>>>>>> Secure Coding mailing list (SC-L) SC-L@securecoding.org
>>>>>>>> List information, subscriptions, etc -
>>>>>>>> http://krvw.com/mailman/listinfo/sc-l
>>>>>>>> List charter available at -
>>>>>>>> http://www.securecoding.org/list/charter.php
>>>>>>>> SC-L is hosted and moderated by KRvW Associates, LLC
>>>>>>>> (http://www.KRvW.com
>>>>>>>> )
>>>>>>>> as a free, non-commercial service to the software security  
>>>>>>>> community.
>>>>>>>> _______________________________________________
>>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>> _______________________________________________
>>>>>>> Secure Coding mailing list (SC-L) SC-L@securecoding.org
>>>>>>> List information, subscriptions, etc -
>>>>>>> http://krvw.com/mailman/listinfo/sc-l
>>>>>>> List charter available at -
>>>>>>> http://www.securecoding.org/list/charter.php
>>>>>>> SC-L is hosted and moderated by KRvW Associates, LLC
>>>>>>> (http://www.KRvW.com)
>>>>>>> as a free, non-commercial service to the software security  
>>>>>>> community.
>>>>>>> _______________________________________________
>>>>>>>
>>>>>>
>>>>>
>>>>>
>>>>
>>>
>>
>>
>


_______________________________________________
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
_______________________________________________

Reply via email to