Re: [SC-L] quick question - SXSW

2008-04-10 Thread Stephen Craig Evans
Hi Andrew,

I was reminded of what you said in your post when I read the beginning of
this prezo description from HITB 2007:
"Using a lethal combination of various client side attacks we'll smash the
same origin policy, punch our way through your firewall, and dropkick an
Oracle database on your internal network (and we're NOT talking about SQL
Injection!)."

All good points you make that I'll keep in mind for my next attempt in SE
Asia.

Cheers,
Stephen



> From: Andrew van der Stock <[EMAIL PROTECTED]>
> Date: Thu, Mar 27, 2008 at 6:02 AM
> Subject: Re: [SC-L] quick question - SXSW
> To: "Arian J. Evans" <[EMAIL PROTECTED]>
> Cc: Secure Coding Mailing List 
>
>
> Hi all,
>
>  I have been specifically targeting developer conferences these last
>  twelve months. I've had rejections from the likes of OSCON, and in
>  fact, I was rejected from BlackHat, too. I have worked out the pattern
>  to these conferences.
>
>  You gotta SEX IT UP.
>
>  Instead of submitting talks like "Safe Ajax Coding Techniques" or
>  "Securely using mainframe transactions in your web app", submit talks
>  that are titled:
>
>  "How we pillage your app, identity rape your users, steal all your
>  money, and retire in the Caribbean with the loot"
>
>  Then when you get there, start with a demo or three to end all demos.
>  Totally scare them witless. Followed by a picture of a girly drink
>  with an umbrella in it with a beach in the background, and take the
>  girly drink to the talk, too. Once you've put the fear of god (or at
>  least malicious attackers) into them, then you can:
>
>  * Do the talk you had in mind all along ("Securely using
>  mainframe ..."), and they'll learn what they needed to learn by
>  attending your talk.
>
>  This is not to say you should be a boring presenter, but we shouldn't
>  shy away from saying to developers that they MUST do this stuff, or
>  they'll be pwned.
>
>  Just before the folks fill in their presenter feedback forms, do an
>  ASTONISHING demo. Something they will remember when they're filling in
>  the feedback. When you're at the top of the feedback pile, you'll get
>  invited back.
>
>  The program committees for these trendy conferences - with some very
>  notable exceptions - are for the most part just as hostile /
>  apathetic / know little about security as the attendees. Sometimes
>  worse - many are truly hostile to security as it gets in the way of
>  their "fast and crappy beats correct every time" mindset. So make your
>  submission interesting to the program committee, so much so that they
>  want to come see it, too. Once they start accepting the talks, sooner
>  or later, after 10 years or so, we'll be able to submit the useful
>  talks without any such cover. See the design pattern folks for proof.
>
>  Arian - ARGH! Tell Anurag to check out ESAPI - it has already hard
>  core white list encoding, direct object reference maps, easy user
>  object manipulation (logout that actually does the right thing with
>  one call, etc), safe system(), encrypted property files, integrity
>  protection and encryption for hidden fields and cookies, and so on and
>  on and on.
>
>  Encoder::
>  canonicalize()   Simplifies percent-encoded and entity-encoded
>  characters to their simplest form so that they can be properly
>  validated.
>  decodeFromBase64()   Decode data encoded with BASE-64 encoding.
>  decodeFromURL()  Decode from URL.
>  encodeForBase64()Encode for base64.
>  encodeForDN()Encode data for use in an LDAP distinguished
>  name.
>  encodeForHTML()  Encode data for use in HTML content.
>  encodeForHTMLAttribute() Encode data for use in HTML attributes.
>  encodeForJavascript()Encode for javascript.
>  encodeForLDAP()  Encode data for use in LDAP queries.
>  encodeForSQL()   This method is not recommended.
>  encodeForURL()   Encode for use in a URL.
>  encodeForVBScript()  Encode data for use in visual basic script.
>  encodeForXML()   Encode data for use in an XML element.
>  encodeForXMLAttribute()  Encode data for use in an XML attribute.
>  encodeForXPath() This implementation encodes almost everything
>  and may overencode.
>  normalize()  Normalizes special characters down to ASCII
>  using the Normalizer built into Java.
>
>  It's already done! However, there's more to do - let's work together
>  on those gaps (client AJAX ESAPI) instead of re-inventing the wheel.
>
>  thanks,
>  Andrew
>
>
>  On Mar 13, 2008, a

Re: [SC-L] quick question - SXSW

2008-03-26 Thread Andrew van der Stock
Hi all,

I have been specifically targeting developer conferences these last  
twelve months. I've had rejections from the likes of OSCON, and in  
fact, I was rejected from BlackHat, too. I have worked out the pattern  
to these conferences.

You gotta SEX IT UP.

Instead of submitting talks like "Safe Ajax Coding Techniques" or  
"Securely using mainframe transactions in your web app", submit talks  
that are titled:

"How we pillage your app, identity rape your users, steal all your  
money, and retire in the Caribbean with the loot"

Then when you get there, start with a demo or three to end all demos.  
Totally scare them witless. Followed by a picture of a girly drink  
with an umbrella in it with a beach in the background, and take the  
girly drink to the talk, too. Once you've put the fear of god (or at  
least malicious attackers) into them, then you can:

* Do the talk you had in mind all along ("Securely using  
mainframe ..."), and they'll learn what they needed to learn by  
attending your talk.

This is not to say you should be a boring presenter, but we shouldn't  
shy away from saying to developers that they MUST do this stuff, or  
they'll be pwned.

Just before the folks fill in their presenter feedback forms, do an  
ASTONISHING demo. Something they will remember when they're filling in  
the feedback. When you're at the top of the feedback pile, you'll get  
invited back.

The program committees for these trendy conferences - with some very  
notable exceptions - are for the most part just as hostile /  
apathetic / know little about security as the attendees. Sometimes  
worse - many are truly hostile to security as it gets in the way of  
their "fast and crappy beats correct every time" mindset. So make your  
submission interesting to the program committee, so much so that they  
want to come see it, too. Once they start accepting the talks, sooner  
or later, after 10 years or so, we'll be able to submit the useful  
talks without any such cover. See the design pattern folks for proof.

Arian - ARGH! Tell Anurag to check out ESAPI - it has already hard  
core white list encoding, direct object reference maps, easy user  
object manipulation (logout that actually does the right thing with  
one call, etc), safe system(), encrypted property files, integrity  
protection and encryption for hidden fields and cookies, and so on and  
on and on.

Encoder::
canonicalize()   Simplifies percent-encoded and entity-encoded  
characters to their simplest form so that they can be properly  
validated.
decodeFromBase64()   Decode data encoded with BASE-64 encoding.
decodeFromURL()  Decode from URL.
encodeForBase64()Encode for base64.
encodeForDN()Encode data for use in an LDAP distinguished  
name.
encodeForHTML()  Encode data for use in HTML content.
encodeForHTMLAttribute() Encode data for use in HTML attributes.
encodeForJavascript()Encode for javascript.
encodeForLDAP()  Encode data for use in LDAP queries.
encodeForSQL()   This method is not recommended.
encodeForURL()   Encode for use in a URL.
encodeForVBScript()  Encode data for use in visual basic script.
encodeForXML()   Encode data for use in an XML element.
encodeForXMLAttribute()  Encode data for use in an XML attribute.
encodeForXPath() This implementation encodes almost everything  
and may overencode.
normalize()  Normalizes special characters down to ASCII  
using the Normalizer built into Java.

It's already done! However, there's more to do - let's work together  
on those gaps (client AJAX ESAPI) instead of re-inventing the wheel.

thanks,
Andrew

On Mar 13, 2008, at 4:11 AM, Arian J. Evans wrote:
> and Anurag will be releasing some APIs
> for java developers to actually do things like output encoding,
> where Java/J2EE is about 4 years behind the rest of the world.


thanks,
Andrew van der Stock
Lead Author, OWASP Guide and OWASP Top 10




___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
___


Re: [SC-L] quick question - SXSW

2008-03-14 Thread Arian J. Evans
I'm not sure if the post made the list, but I outlined
what I believe is a huge difference between government
and beltway contractors, and the private sector.

DoD (and most gov/gov-contractor corps) fall squarely
into the "assurance" camps.

Private sector is heavily into "mitigation" and "response".

I get a completely different feel, due to entirely different
organizational/business realities, from software startups
and silicon valley in general.

That's great that you see this, though. Good news.

-ae


On Fri, Mar 14, 2008 at 7:06 AM, Mike Lyman <[EMAIL PROTECTED]> wrote:
> Arian J. Evans wrote:
>  > Overall security is not a feature or a function that you can monetarize.
>  > It's not even cool or sexy. It's an emergent behavior that is only
>  > observed when it is making your software harder to use.
>  >
>
>  Maybe it is just the US Department of Defense environment where I am
>  currently working but I see developers start to see this as cool and
>  sexy. Most are picking it up quickly and a few are even interested in
>  diving in deep into the security world. They ask great questions and are
>  doing a lot of independent research on it. We are in an environment
>  where they get security awareness training a few times a year and are
>  constantly bombarded with security messages but some of them really are
>  getting into it. It gives them something new to learn and it is driving
>  them to go deeper into some development subjects that they normally
>  would not ever be allowed to look at due to delivery schedules. Security
>  is giving them a good excuse to go learn more.
>  --
>
>  Mike Lyman
>  [EMAIL PROTECTED]
>
>
>
>  ___
>  Secure Coding mailing list (SC-L) SC-L@securecoding.org
>  List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
>  List charter available at - http://www.securecoding.org/list/charter.php
>  SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
>  as a free, non-commercial service to the software security community.
>  ___
>



-- 
Arian Evans
software security stuff
___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
___


Re: [SC-L] quick question - SXSW

2008-03-14 Thread Gary McGraw
hi sc-l,

As many of you know, I have been doing this stuff for over a decade now.  In 
terms of developer awareness and uptake, we have made great strides in the last 
three years.  I taught my first training class on software security at Goldman 
in 2001.  Since then, we've trained well over 8000 developers and others on 
software security (at Cigital where I work).  Attitudes have definitely 
shifted, and the market continues to grow.  Demand is up and interest is high.

gem

company www.cigital.com
podcast www.cigital.com/silverbullet
blog www.cigital.com/justiceleague
book www.swsec.com


On 3/14/08 10:06 AM, "Mike Lyman" <[EMAIL PROTECTED]> wrote:

Arian J. Evans wrote:
> Overall security is not a feature or a function that you can monetarize.
> It's not even cool or sexy. It's an emergent behavior that is only
> observed when it is making your software harder to use.
>

Maybe it is just the US Department of Defense environment where I am
currently working but I see developers start to see this as cool and
sexy. Most are picking it up quickly and a few are even interested in
diving in deep into the security world. They ask great questions and are
doing a lot of independent research on it. We are in an environment
where they get security awareness training a few times a year and are
constantly bombarded with security messages but some of them really are
getting into it. It gives them something new to learn and it is driving
them to go deeper into some development subjects that they normally
would not ever be allowed to look at due to delivery schedules. Security
is giving them a good excuse to go learn more.
--

Mike Lyman
[EMAIL PROTECTED]

___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
___


___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
___


Re: [SC-L] quick question - SXSW

2008-03-14 Thread John Steven
All,

I just got back from SD West where I spoke twice in the security track. My 
third year working this show I was shocked to find larger audiences, avid 
participation, and (what excited me the most) very clueful development types.

Awareness will continue to be a big part of "getting the word out there". But 
what Gunnar attempted to do with his track at QCon was excellent and we should 
learn from it. He 1) organized a set of talks that followed each other clearly, 
building on previous content and 2) focused on more intermediate or advanced 
content.

Too often, the security talks at conferences overlap. Even this year's SD West 
had two threat modeling talks and a secure design talk. I'm also sick of their 
patronizing structure and titles: "Top 10 Web Vulnerabilities". Smart 
developers interested in learning this stuff can avail themselves of strong web 
tutorials from a variety of sources at this point. Overlapping talks comprised 
mostly of top ten lists leave developers with the empty "So what do I do about 
it?" feeling.

At SD West, I positioned my two talks as "advanced". I laughed looking at the 
conference board. I personally accounted for about half of the advanced talks 
for the conference.  My "Static Analysis Tool Customization" talk generated 
great discussion. I was pleased. Almost every audience member worked for an 
organization that was piloting or had already adopted a tool. They had really 
used it, and crashed against a rock. Because experience varied (Coverity, 
KLocwork, Fortify, and Ounce experience all represented) we got to talk about 
more than just one tool. Comparison was very demonstrative. People took copious 
notes, stayed after, discussion continued.

Yes, we still need more awareness but people want more advanced talks. They're 
ready.

At SD Best, I'm working to modernize the curriculum. I'm working with the 
development track leads to make sure that things cohere. Rather than mixing 
old-school buffer overflow information, with web security, with some process 
help, with some tool demos, I'm going to try to organize instruction around 
some of the newer stuff that developers are beginning to play with and be 
excited about. We'll focus on web services and web 2.0. In my mind, teaching 
people to "think destructively" is important, but brining it back around and 
showing what to do about vulnerabilities is hugely important at a dev. 
conference. Last year I pushed speakers in this track to give constructive 
advice. I'll do the same this year.

Whether we're speaking to security guys or developers, it's time to show people 
patterns and approaches that will help them solve the problems we've been 
talking about for years.

Sum: Modernize advice. Talk to people in the languages and frameworks that 
they're using now. Get practical and constructive. Teach people how to build it 
right. Move beyond awareness to intermediate and advanced topics. It's time to 
raise the bar.


John Steven
Technical Director; Principal, Software Security Group
Direct: (703) 404-5726 Cell: (703) 727-4034
Key fingerprint = 4772 F7F3 1019 4668 62AD  94B0 AE7F EEF4 62D5 F908

Blog: http://www.cigital.com/justiceleague
Papers: http://www.cigital.com/papers/jsteven

http://www.cigital.com
Software Confidence. Achieved.


From: [EMAIL PROTECTED] [EMAIL PROTECTED] On Behalf Of Gunnar Peterson [EMAIL 
PROTECTED]

I agree this is a big issue, there is no cotton picking way that the
security people are solving these problems, it has to come from the
developers. I put together a track for QCon which included Brian Chess
on Static Analysis, John Steven on Threat Modeling, and Jeff Williams on
ESAPI and Web 2.0 security. The presentations were great, the audience
was engaged and enthusiastic but small; it turns that it is hard to
compete with the likes of Martin Fowler, Joshua Bloch, and Richard
Gabriel. Even when what they are talking about is some nth level
refinement and what we are talking about is all the gaping holes in the
previous a-m refinements and how to close some of them.

http://jaoo.dk/sanfrancisco/tracks/show_track.jsp?trackOID=73

___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
___


Re: [SC-L] quick question - SXSW

2008-03-14 Thread Mike Lyman
Arian J. Evans wrote:
> Overall security is not a feature or a function that you can monetarize.
> It's not even cool or sexy. It's an emergent behavior that is only
> observed when it is making your software harder to use.
>   

Maybe it is just the US Department of Defense environment where I am 
currently working but I see developers start to see this as cool and 
sexy. Most are picking it up quickly and a few are even interested in 
diving in deep into the security world. They ask great questions and are 
doing a lot of independent research on it. We are in an environment 
where they get security awareness training a few times a year and are 
constantly bombarded with security messages but some of them really are 
getting into it. It gives them something new to learn and it is driving 
them to go deeper into some development subjects that they normally 
would not ever be allowed to look at due to delivery schedules. Security 
is giving them a good excuse to go learn more.
-- 

Mike Lyman
[EMAIL PROTECTED]

___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
___


Re: [SC-L] quick question - SXSW

2008-03-13 Thread Arian J. Evans
On Wed, Mar 12, 2008 at 3:05 PM, Andy Steingruebl <[EMAIL PROTECTED]> wrote:

>  On a related note a quick perusal of the JavaOne conference tracks
>  doesn't show a lot of content in this area either.  Is this due to a
>  lack of interest, or people in the security world not pitching talks
>  to the development conference organizer?

Both.

Java is a tricky one. There were security sessions early on in
Java conferences, but they were about the stuff no one on the
planet actually does -- e.g. container security, code signing,
and JVM/applet permissions.

I think that turned a lot of devs off of security in Java-land.

In related news we're building J2EE courseware in a "by developers,
for developers" fashion and Anurag will be releasing some APIs
for java developers to actually do things like output encoding,
where Java/J2EE is about 4 years behind the rest of the world.

I imaged later this year or next year you'll see a few of us focusing
on developer (versus security) conferences, though I don't think
this changes the business problem/reality at all.

-- 
Arian Evans
software security stuff
___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
___


Re: [SC-L] quick question - SXSW

2008-03-12 Thread Benjamin Tomhave
I think you misunderstood my points a little bit. SXSW was just a 
current conference example. As Gary's pointed out, there are many 
conferences. It's possible SXSW wasn't a good example, but it was meant 
more symbolically. More comments inline...

Arian J. Evans wrote:
> 1. This is largely the wrong crowd. Designers of small web2.0 stuffs,
> particularly the domain of widgets and WS interfaces for all the usual
> suspect platforms (flickr, facebook etc.) as well as most startups:
> 
> They just don't care.
> 
> They will never care.
> 
I fundamentally disagree. Everybody is the right crowd, assuming the 
message is tailored appropriately. It's precisely the perspective you 
espouse that concerns me greatly. I don't believe the security industry 
_as_a_whole_ has maintained momentum, and I attribute that directly to 
the SEP* effect. This goes directly to my larger point about ingraining 
security considerations/thoughtfulness/practices into all aspects of the 
business (not just coding, btw).

*See http://en.wikipedia.org/wiki/Somebody_Else%27s_Problem_field

> 2. This "security DNA" notion -- I don't really buy it. I don't think
> there's a big tipping point coming for "all hands in for writing secure
> software" in our near future. Maybe if people start dying because
> of insecure software, this will change, but until then ...
> 
If everyone starts coding more responsibly, then at some point the genre 
of "secure coding" goes away, because it's inherent in everything that's 
written. Today, I'd settle for all externally-facing apps being coded to 
address the OWASP Top 10, and to get developers to think for a change 
before doing silly things like implementing client-side filtering in the 
client code.

> I do see increasing awareness is mid to large size organizations
> (fortune 2000 +). Developers are more aware and more interested
> in security, but mostly in organizations that penalize (fire or
> domote) individuals involved in public security blunders.
> 
Hard-earned gains. How do we institutionalize these practices and get 
beyond playing the role of Law Enforcement for the security department?

> Overall security is not a feature or a function that you can monetarize.
> It's not even cool or sexy. It's an emergent behavior that is only
> observed when it is making your software harder to use.
> 
On the first sentence, I say "yes, exactly!" On the second sentence, I 
couldn't disagree more. Security should not be "making your software 
harder to use." Address XSS, CSRF, SQL injection, and input/output 
filtering/encoding should not diminish the end-user experience. Things 
like 2-factor authentication might have that result, but we're not 
really talking about that right now.

> Not until insurance or substantial penalties are the norm (if they are
> ever the norm) will we have meaningful quantitative data to drive a
> justification for security as a requirement in startup or most open
> source software projects. That's my opinion, anyway.
> 
I would really like for you to be wrong, but I can't really disagree 
with your base conclusion here. Hence my frustration. It provides a good 
case for shelving all security departments until the business starts 
taking major hits and they come begging for help. Honestly, I don't 
understand it. Businesses don't disagree that they need properly secured 
code/sites/etc. Yet, by the same token, they don't do what's necessary 
up front to secure their code/sites/etc. It's a truly bizarre disconnect 
that boggles my mind.

Thanks for the response! :)

-ben

-- 
Benjamin Tomhave, MS, CISSP
[EMAIL PROTECTED]
LI: http://www.linkedin.com/in/btomhave
Blog: http://www.secureconsulting.net/
Photos: http://photos.secureconsulting.net/
Web: http://falcon.secureconsulting.net/

[ Random Quote: ]
"A man without a goal is like a ship without a rudder."
Thomas Carlyle
___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
___


Re: [SC-L] quick question - SXSW

2008-03-12 Thread Gary McGraw
Hi again,

I rebooted the security track completely at SD West in 2003 (thanks to tami who 
I cc'ed here).  I'm on the advisory board.

We're slowly inching our way toward SDL/touchpoints/CLASP stuffs at SD West, 
though when I tried to cover the touchpoints and enterprise security in 2006, 
interest was weak.  After 5 years of pounding we're getting there though!

My suggestion?   Get involved organizing these conferences and helping with 
thought leadership.  And just for the record, having your PR dingbats submit 
(stupid)marketing talks does not count.

Others getting the same treatment;
SD Best Practices
STAR West
Better Software
MISTI
CSI
NDSS
Usenix security

Rock on

gem

- Original Message -
From: Andy Steingruebl <[EMAIL PROTECTED]>
To: Gary McGraw
Cc: [EMAIL PROTECTED] <[EMAIL PROTECTED]>; SC-L@securecoding.org 

Sent: Wed Mar 12 19:35:35 2008
Subject: Re: [SC-L] quick question - SXSW

On Wed, Mar 12, 2008 at 4:30 PM, Gary McGraw <[EMAIL PROTECTED]> wrote:
> Hey andy,
>
>  You mean AJAX one?   Last time I went there was zero interest and even less 
> clue about security among attendees.  The only shining light was a long 
> conversation I had with bill joy about security critical decisions those guys 
> screwed up with Java (especially with regards to closure).

>
>  A decade of evangelism only goes so far!   Do help!

Fair enough :)  I was looking at the program for the just finished SD
West and the security track actually looks to have been pretty good.
I think one thing we're missing from there is more emphasis on actual
SDL process, rather than focus on individual items within it.
Activities like how to form a steering group within a company, how to
bootstrap some of the practices, etc.

Do folks here have suggestions of conferences we ought to be targeting
with these sorts of presentations, papers, etc?  JavaOne seems like it
might have been a good place to target.  There are some smaller
developer conferences out there, some general security conferences,
and there has been discussion here and within OWASP as well of how we
can start better targeting these forums for our evangelizing...

Thoughts?

--
Andy Steingruebl
[EMAIL PROTECTED]

___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
___


Re: [SC-L] quick question - SXSW

2008-03-12 Thread Arian J. Evans
So two thoughts Ben, purely my 0.02 USD:

1. This is largely the wrong crowd. Designers of small web2.0 stuffs,
particularly the domain of widgets and WS interfaces for all the usual
suspect platforms (flickr, facebook etc.) as well as most startups:

They just don't care.

They will never care.

SXSW has "* long tail" and "* design pattern" 2007 buzzword
compliant presentations.

You could probably get a snazzy "top 5 web2.0 security mistakes
everyone is making" or "Top 5 Security Design-Patterns" in there,
but I don't think it's the right audience. OSCON might be a better
fit, if you praise Ruby and release some open source "security" project.

2. This "security DNA" notion -- I don't really buy it. I don't think
there's a big tipping point coming for "all hands in for writing secure
software" in our near future. Maybe if people start dying because
of insecure software, this will change, but until then ...

I do see increasing awareness is mid to large size organizations
(fortune 2000 +). Developers are more aware and more interested
in security, but mostly in organizations that penalize (fire or
domote) individuals involved in public security blunders.

Overall security is not a feature or a function that you can monetarize.
It's not even cool or sexy. It's an emergent behavior that is only
observed when it is making your software harder to use.

Not until insurance or substantial penalties are the norm (if they are
ever the norm) will we have meaningful quantitative data to drive a
justification for security as a requirement in startup or most open
source software projects. That's my opinion, anyway.

---
Arian J. Evans
Software Security Stuff


On Wed, Mar 12, 2008 at 2:31 PM, Benjamin Tomhave
<[EMAIL PROTECTED]> wrote:
> First, thanks for that Bill, it exemplifies my point perfectly. A couple
>  thoughts...
>
>  one, targeting designers is just as important as reaching out to the
>  developers themselves... if the designers can ensure that security
>  requirements are incorporated from the outset, then we receive an added
>  benefit...
>
>  two, a re-phrasing around my original thought... somehow we need to get
>  security thinking and considerations encoded into the DNA of everyone in
>  the business, whether they be designers, architects, coders, analysts,
>  PMs, sysadmins, etc, etc, etc. Every one of those topics you mention
>  could (should!) have had implicit and explicit security attributes
>  included... yet we're still at the point where secure coding has to be
>  explicitly requested/demanded (often as an afterthought or bolt-on)...
>
>  How do we as infosec professionals get people to the next phase of
>  including security thoughts in everything they do... with the end-goal
>  being that it is then integrated fully into practices and processes as a
>  bona fide genetic mutation that is passed along to future generations?
>
>  To me, this seems to be where infosec is stuck as an industry. There
>  seems to be a need for a catalyst to spur the mutation so that it can
>  have a life of its own. :)
>
>  fwiw.
>
>
>  -ben
>
>  --
>  Benjamin Tomhave, MS, CISSP
>  [EMAIL PROTECTED]
>  LI: http://www.linkedin.com/in/btomhave
>  Blog: http://www.secureconsulting.net/
>  Photos: http://photos.secureconsulting.net/
>  Web: http://falcon.secureconsulting.net/
>
>  [ Random Quote: ]
>  Augustine's Second Law of Socioscience: "For every scientific (or
>  engineering) action, there is an equal and opposite social reaction."
>  http://globalnerdy.com/2007/07/18/laws-of-software-development/
>
>
>
>  William L. Anderson wrote:
>  > Dear Ben, having just been at SXSW Interactive (I live in Austin, TX) I
>  > did not see many discussions that pay attention to security, or any
>  > other software engineering oriented concerns, explicitly.
>  >
>  > There was a discussion of scalability for web services that featured the
>  > developers from digg, Flickr, WordPress, and Media Temple. I got there
>  > about half-way through but the discussion with the audience was about
>  > tools and methods to handle high traffic loads. There was a question
>  > about build and deployment strategies and I asked about unit testing
>  > (mixed answers - some love it, some think it's strong-arm micro-mgt (go
>  > figure)).
>  >
>  > There was a session on OpenID and OAuth (open authorization) standards
>  > and implementation. These discussions kind of assume the use of secure
>  > transports but since I couldn't stay the whole time I don't know if
>  > secure coding was addressed explicitly.
>  >
>  > The main developer attendees at SXSW would call themselves designers and
>  > I would guess many of them are doing web development in PHP, Ruby, etc.
>  > I think the majority of attendees would not classify themselves as
>  > software programmers.
>  >
>  > To me it seems very much like at craft culture. That doesn't mean that a
>  > track on how to develop secure web services wouldn't be popular. In fact
>  > it might be worth

Re: [SC-L] quick question - SXSW

2008-03-12 Thread Gunnar Peterson
I agree this is a big issue, there is no cotton picking way that the 
security people are solving these problems, it has to come from the 
developers. I put together a track for QCon which included Brian Chess 
on Static Analysis, John Steven on Threat Modeling, and Jeff Williams on 
ESAPI and Web 2.0 security. The presentations were great, the audience 
was engaged and enthusiastic but small; it turns that it is hard to 
compete with the likes of Martin Fowler, Joshua Bloch, and Richard 
Gabriel. Even when what they are talking about is some nth level 
refinement and what we are talking about is all the gaping holes in the 
previous a-m refinements and how to close some of them.

http://jaoo.dk/sanfrancisco/tracks/show_track.jsp?trackOID=73

-gp

Kenneth Van Wyk wrote:
> Ben,
> 
> Your point is a good one -- the software security community needs to be 
> vigilant in reaching out to developers and spreading "the word".
> 
> FWIW, some dev conferences have done this.  I spoke at SD West in 2006, 
> and there was a significant security track there.  Still, it'd be great 
> to see that sort of thing at more dev-specific conferences.
> 
> Cheers,
> 
> Ken van Wyk
> SC-L Moderator
> 
> On Mar 12, 2008, at 5:31 PM, Benjamin Tomhave wrote:
> 
>> First, thanks for that Bill, it exemplifies my point perfectly. A couple
>> thoughts...
>>
>> one, targeting designers is just as important as reaching out to the
>> developers themselves... if the designers can ensure that security
>> requirements are incorporated from the outset, then we receive an added
>> benefit...
>>
>> two, a re-phrasing around my original thought... somehow we need to get
>> security thinking and considerations encoded into the DNA of everyone in
>> the business, whether they be designers, architects, coders, analysts,
>> PMs, sysadmins, etc, etc, etc. Every one of those topics you mention
>> could (should!) have had implicit and explicit security attributes
>> included... yet we're still at the point where secure coding has to be
>> explicitly requested/demanded (often as an afterthought or bolt-on)...
>>
>> How do we as infosec professionals get people to the next phase of
>> including security thoughts in everything they do... with the end-goal
>> being that it is then integrated fully into practices and processes as a
>> bona fide genetic mutation that is passed along to future generations?
>>
>> To me, this seems to be where infosec is stuck as an industry. There
>> seems to be a need for a catalyst to spur the mutation so that it can
>> have a life of its own. :)
>>
>> fwiw.
>>
>> -ben
>>
>> -- 
>> Benjamin Tomhave, MS, CISSP
>> [EMAIL PROTECTED]
>> LI: http://www.linkedin.com/in/btomhave
>> Blog: http://www.secureconsulting.net/
>> Photos: http://photos.secureconsulting.net/
>> Web: http://falcon.secureconsulting.net/
>>
>> [ Random Quote: ]
>> Augustine's Second Law of Socioscience: "For every scientific (or
>> engineering) action, there is an equal and opposite social reaction."
>> http://globalnerdy.com/2007/07/18/laws-of-software-development/
>>
>> William L. Anderson wrote:
>>> Dear Ben, having just been at SXSW Interactive (I live in Austin, TX) I
>>> did not see many discussions that pay attention to security, or any
>>> other software engineering oriented concerns, explicitly.
>>>
>>> There was a discussion of scalability for web services that featured the
>>> developers from digg, Flickr, WordPress, and Media Temple. I got there
>>> about half-way through but the discussion with the audience was about
>>> tools and methods to handle high traffic loads. There was a question
>>> about build and deployment strategies and I asked about unit testing
>>> (mixed answers - some love it, some think it's strong-arm micro-mgt (go
>>> figure)).
>>>
>>> There was a session on OpenID and OAuth (open authorization) standards
>>> and implementation. These discussions kind of assume the use of secure
>>> transports but since I couldn't stay the whole time I don't know if
>>> secure coding was addressed explicitly.
>>>
>>> The main developer attendees at SXSW would call themselves designers and
>>> I would guess many of them are doing web development in PHP, Ruby, etc.
>>> I think the majority of attendees would not classify themselves as
>>> software programmers.
>>>
>>> To me it seems very much like at craft culture. That doesn't mean that a
>>> track on how to develop secure web services wouldn't be popular. In fact
>>> it might be worth proposing one for next year.
>>>
>>> If you want to talk further, please get in touch.
>>>
>>> -Bill Anderson
>>> praxis101.com
>>>
>>> Benjamin Tomhave wrote:
 I had just a quick query for everyone out there, with an attached
 thought.

 How many security and/or secure coding professionals are prevalently
 involved with the SXSW conference this week? I know, I know... it's 
 a big
 party for developers - particularly the Web 2.0 clique - but I'm just
 curious.

 Here's why

Re: [SC-L] quick question - SXSW

2008-03-12 Thread Arian J. Evans


On Wed, Mar 12, 2008 at 6:08 PM, Benjamin Tomhave
<[EMAIL PROTECTED]> wrote:
> I think you misunderstood my points a little bit. SXSW was just a
>  current conference example. As Gary's pointed out, there are many
>  conferences. It's possible SXSW wasn't a good example, but it was meant
>  more symbolically. More comments inline...

Oh, I did miss your point. Overall, I agree. I've had mixed experiences
leading me to re-evaluate my stance.

A security-unaware dev friend recently told me about Microsoft coming
to some conference and demonstrating this new "SQL Injection" thing
to them, and he told me how amazing and cool it was. He asked if I
did SQL Injection.

That's the first time in several years he's responded to what I've primarily
worked on for 8+ years, and incidentally for over 10, and told him about
over god-knows how many Guinness. I don't blame the Guinness. (who can?)


>  > They just don't care.
>  >
>  > They will never care.
>  >
>  I fundamentally disagree. Everybody is the right crowd, assuming the
>  message is tailored appropriately. It's precisely the perspective you
>  espouse that concerns me greatly. I don't believe the security industry
>  _as_a_whole_ has maintained momentum, and I attribute that directly to
>  the SEP* effect. This goes directly to my larger point about ingraining
>  security considerations/thoughtfulness/practices into all aspects of the
>  business (not just coding, btw).

I think this approach is doomed to failure, though my thoughts and experiences
are mixed. Whilst I have quit evangelizing secure software, I do meet more
and more devs interested in software security -- whom were not merely 3 to
5 years ago. Something is definitely changing, but abstract interest in appsec
!= secure design & implementation.

While this isn't an argument -- just an observation -- I hear this
"build security in"
notion preached most often from the following:

(a) people new to the appsec "industry"
(b) academic-minded & PHD-type folks into taxonomies
(c) government folks/agencies out of touch with the business world
(d) eager kids just-out-of infosec college joining our "industry"
(e) people with livelyhood/agendas staked on these notions

Maybe I'm just jaded, but it doesn't seem to work in many, and
possibly most, cases. I think the the momentum is lost because
all these "build security in" and "Secure SDLC" things don't work
for a lot of people/organizations. I still have some suspicions
this may be due to implementation, but...

This industry cannot even get it's node-hierarchies right. Even
the mitre CWE is fraught with node-confusion betwixt attack
nodes, vulnerability nodes, and design & implementation weakness nodes.

But at the end of the day the business doesn't care.

"Will this model of car sell and will we get sued over defects in it?"

That's the world. If "building secure cars" was the answer Volvo
would have been a wild success many, many years ago.


>  If everyone starts coding more responsibly, then at some point the genre
>  of "secure coding" goes away, because it's inherent in everything that's
>  written. Today, I'd settle for all externally-facing apps being coded to
>  address the OWASP Top 10, and to get developers to think for a change
>  before doing silly things like implementing client-side filtering in the
>  client code.

Client-side filtering isn't silly. It's smart. You probably mean using it
as a security control, but it's that verbiage that arms legions of the
clueless appsec auditors now joining our industry that don't know
sh*t about software design or implementation, or business use-case,
and cause software professionals to scoff at our industry. I can't tell
you how many appsec reports I've seen that say "don't use client
side validation -- it's dangerous" and I start looking for more best
practice nonsense listed as "vulnerabilities".

"Don't allow dangerous characters in input". WTF?
"Insufficient input validation". For whom?

I think I see your perspective though.

I think the answer is: IDEs that make it harder to shoot oneself in the
foot, secure frameworks, and secure environments (for all us text-editor
types) and maybe even newer languages with some real notion of a
data/function boundary -- those are the keys. Leave "secure coding"
out of it.

Combine that with security controls that provide meaningful mis-use
case and fraud detection, instead of attack-vector blocking, and you
and can even allow weak password reset questions. Which is what
the business, and my mother, really wants.

I hesitate to say this, this is like fumbling with flame-bait, but over
the last two years I feel more and more like many in this industry,
including OWASP which you mentioned, are going astray down
this fantasy land of secure-coding and assurance.

The government (and contracting agencies by proxy) are into
assurance. The rest of the world is not.

The private sector is into mitigation, insurance, fraud detection
and incident response.

OWASP noti

Re: [SC-L] quick question - SXSW

2008-03-12 Thread Johan Peeters
I agree.

Reaching the development community, that's precisely what we are
trying to do at secappdev. Thanks for helping with that too, Ken.
I have also taken some security-related sessions to conferences such
as XP Days Benelux, XP Days France and SPA. Appearing soon at ACCU.
I would love to hear from anyone else in this niche.

kr,

Yo

On 3/12/08, Kenneth Van Wyk <[EMAIL PROTECTED]> wrote:
> Ben,
>
> Your point is a good one -- the software security community needs to
> be vigilant in reaching out to developers and spreading "the word".
>
> FWIW, some dev conferences have done this.  I spoke at SD West in
> 2006, and there was a significant security track there.  Still, it'd
> be great to see that sort of thing at more dev-specific conferences.
>
> Cheers,
>
> Ken van Wyk
> SC-L Moderator
>
> On Mar 12, 2008, at 5:31 PM, Benjamin Tomhave wrote:
>
> > First, thanks for that Bill, it exemplifies my point perfectly. A
> > couple
> > thoughts...
> >
> > one, targeting designers is just as important as reaching out to the
> > developers themselves... if the designers can ensure that security
> > requirements are incorporated from the outset, then we receive an
> > added
> > benefit...
> >
> > two, a re-phrasing around my original thought... somehow we need to
> > get
> > security thinking and considerations encoded into the DNA of
> > everyone in
> > the business, whether they be designers, architects, coders, analysts,
> > PMs, sysadmins, etc, etc, etc. Every one of those topics you mention
> > could (should!) have had implicit and explicit security attributes
> > included... yet we're still at the point where secure coding has to be
> > explicitly requested/demanded (often as an afterthought or bolt-on)...
> >
> > How do we as infosec professionals get people to the next phase of
> > including security thoughts in everything they do... with the end-goal
> > being that it is then integrated fully into practices and processes
> > as a
> > bona fide genetic mutation that is passed along to future generations?
> >
> > To me, this seems to be where infosec is stuck as an industry. There
> > seems to be a need for a catalyst to spur the mutation so that it can
> > have a life of its own. :)
> >
> > fwiw.
> >
> > -ben
> >
> > --
> > Benjamin Tomhave, MS, CISSP
> > [EMAIL PROTECTED]
> > LI: http://www.linkedin.com/in/btomhave
> > Blog: http://www.secureconsulting.net/
> > Photos: http://photos.secureconsulting.net/
> > Web: http://falcon.secureconsulting.net/
> >
> > [ Random Quote: ]
> > Augustine's Second Law of Socioscience: "For every scientific (or
> > engineering) action, there is an equal and opposite social reaction."
> > http://globalnerdy.com/2007/07/18/laws-of-software-development/
> >
> > William L. Anderson wrote:
> >> Dear Ben, having just been at SXSW Interactive (I live in Austin,
> >> TX) I
> >> did not see many discussions that pay attention to security, or any
> >> other software engineering oriented concerns, explicitly.
> >>
> >> There was a discussion of scalability for web services that
> >> featured the
> >> developers from digg, Flickr, WordPress, and Media Temple. I got
> >> there
> >> about half-way through but the discussion with the audience was about
> >> tools and methods to handle high traffic loads. There was a question
> >> about build and deployment strategies and I asked about unit testing
> >> (mixed answers - some love it, some think it's strong-arm micro-mgt
> >> (go
> >> figure)).
> >>
> >> There was a session on OpenID and OAuth (open authorization)
> >> standards
> >> and implementation. These discussions kind of assume the use of
> >> secure
> >> transports but since I couldn't stay the whole time I don't know if
> >> secure coding was addressed explicitly.
> >>
> >> The main developer attendees at SXSW would call themselves
> >> designers and
> >> I would guess many of them are doing web development in PHP, Ruby,
> >> etc.
> >> I think the majority of attendees would not classify themselves as
> >> software programmers.
> >>
> >> To me it seems very much like at craft culture. That doesn't mean
> >> that a
> >> track on how to develop secure web services wouldn't be popular. In
> >> fact
> >> it might be worth proposing one for next year.
> >>
> >> If you want to talk further, please get in touch.
> >>
> >> -Bill Anderson
> >> praxis101.com
> >>
> >> Benjamin Tomhave wrote:
> >>> I had just a quick query for everyone out there, with an attached
> >>> thought.
> >>>
> >>> How many security and/or secure coding professionals are prevalently
> >>> involved with the SXSW conference this week? I know, I know...
> >>> it's a big
> >>> party for developers - particularly the Web 2.0 clique - but I'm
> >>> just
> >>> curious.
> >>>
> >>> Here's why: I'm increasingly frustrated by the disconnect between
> >>> business/dev and security. I don't feel like we're being largely
> >>> successful in getting the business and developers to include
> >>> security as
> >>> part of their sta

Re: [SC-L] quick question - SXSW

2008-03-12 Thread Gary McGraw
Hey andy,

You mean AJAX one?   Last time I went there was zero interest and even less 
clue about security among attendees.  The only shining light was a long 
conversation I had with bill joy about security critical decisions those guys 
screwed up with Java (especially with regards to closure).

A decade of evangelism only goes so far!   Do help!

gem

www.cigital.com/~gem

- Original Message -
From: [EMAIL PROTECTED] <[EMAIL PROTECTED]>
To: Benjamin Tomhave <[EMAIL PROTECTED]>
Cc: SC-L@securecoding.org 
Sent: Wed Mar 12 18:05:53 2008
Subject: Re: [SC-L] quick question - SXSW

On Tue, Mar 11, 2008 at 6:43 AM, Benjamin Tomhave
<[EMAIL PROTECTED]> wrote:
> I had just a quick query for everyone out there, with an attached thought.
>
>  How many security and/or secure coding professionals are prevalently
>  involved with the SXSW conference this week? I know, I know... it's a big
>  party for developers - particularly the Web 2.0 clique - but I'm just
>  curious.
>

On a related note a quick perusal of the JavaOne conference tracks
doesn't show a lot of content in this area either.  Is this due to a
lack of interest, or people in the security world not pitching talks
to the development conference organizer?

--
Andy Steingruebl
[EMAIL PROTECTED]
___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
___

___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
___


Re: [SC-L] quick question - SXSW

2008-03-12 Thread Andy Steingruebl
On Wed, Mar 12, 2008 at 4:30 PM, Gary McGraw <[EMAIL PROTECTED]> wrote:
> Hey andy,
>
>  You mean AJAX one?   Last time I went there was zero interest and even less 
> clue about security among attendees.  The only shining light was a long 
> conversation I had with bill joy about security critical decisions those guys 
> screwed up with Java (especially with regards to closure).

>
>  A decade of evangelism only goes so far!   Do help!

Fair enough :)  I was looking at the program for the just finished SD
West and the security track actually looks to have been pretty good.
I think one thing we're missing from there is more emphasis on actual
SDL process, rather than focus on individual items within it.
Activities like how to form a steering group within a company, how to
bootstrap some of the practices, etc.

Do folks here have suggestions of conferences we ought to be targeting
with these sorts of presentations, papers, etc?  JavaOne seems like it
might have been a good place to target.  There are some smaller
developer conferences out there, some general security conferences,
and there has been discussion here and within OWASP as well of how we
can start better targeting these forums for our evangelizing...

Thoughts?

-- 
Andy Steingruebl
[EMAIL PROTECTED]
___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
___


Re: [SC-L] quick question - SXSW

2008-03-12 Thread Kenneth Van Wyk

Ben,

Your point is a good one -- the software security community needs to  
be vigilant in reaching out to developers and spreading "the word".


FWIW, some dev conferences have done this.  I spoke at SD West in  
2006, and there was a significant security track there.  Still, it'd  
be great to see that sort of thing at more dev-specific conferences.


Cheers,

Ken van Wyk
SC-L Moderator

On Mar 12, 2008, at 5:31 PM, Benjamin Tomhave wrote:

First, thanks for that Bill, it exemplifies my point perfectly. A  
couple

thoughts...

one, targeting designers is just as important as reaching out to the
developers themselves... if the designers can ensure that security
requirements are incorporated from the outset, then we receive an  
added

benefit...

two, a re-phrasing around my original thought... somehow we need to  
get
security thinking and considerations encoded into the DNA of  
everyone in

the business, whether they be designers, architects, coders, analysts,
PMs, sysadmins, etc, etc, etc. Every one of those topics you mention
could (should!) have had implicit and explicit security attributes
included... yet we're still at the point where secure coding has to be
explicitly requested/demanded (often as an afterthought or bolt-on)...

How do we as infosec professionals get people to the next phase of
including security thoughts in everything they do... with the end-goal
being that it is then integrated fully into practices and processes  
as a

bona fide genetic mutation that is passed along to future generations?

To me, this seems to be where infosec is stuck as an industry. There
seems to be a need for a catalyst to spur the mutation so that it can
have a life of its own. :)

fwiw.

-ben

--
Benjamin Tomhave, MS, CISSP
[EMAIL PROTECTED]
LI: http://www.linkedin.com/in/btomhave
Blog: http://www.secureconsulting.net/
Photos: http://photos.secureconsulting.net/
Web: http://falcon.secureconsulting.net/

[ Random Quote: ]
Augustine's Second Law of Socioscience: "For every scientific (or
engineering) action, there is an equal and opposite social reaction."
http://globalnerdy.com/2007/07/18/laws-of-software-development/

William L. Anderson wrote:
Dear Ben, having just been at SXSW Interactive (I live in Austin,  
TX) I

did not see many discussions that pay attention to security, or any
other software engineering oriented concerns, explicitly.

There was a discussion of scalability for web services that  
featured the
developers from digg, Flickr, WordPress, and Media Temple. I got  
there

about half-way through but the discussion with the audience was about
tools and methods to handle high traffic loads. There was a question
about build and deployment strategies and I asked about unit testing
(mixed answers - some love it, some think it's strong-arm micro-mgt  
(go

figure)).

There was a session on OpenID and OAuth (open authorization)  
standards
and implementation. These discussions kind of assume the use of  
secure

transports but since I couldn't stay the whole time I don't know if
secure coding was addressed explicitly.

The main developer attendees at SXSW would call themselves  
designers and
I would guess many of them are doing web development in PHP, Ruby,  
etc.

I think the majority of attendees would not classify themselves as
software programmers.

To me it seems very much like at craft culture. That doesn't mean  
that a
track on how to develop secure web services wouldn't be popular. In  
fact

it might be worth proposing one for next year.

If you want to talk further, please get in touch.

-Bill Anderson
praxis101.com

Benjamin Tomhave wrote:

I had just a quick query for everyone out there, with an attached
thought.

How many security and/or secure coding professionals are prevalently
involved with the SXSW conference this week? I know, I know...  
it's a big
party for developers - particularly the Web 2.0 clique - but I'm  
just

curious.

Here's why: I'm increasingly frustrated by the disconnect between
business/dev and security. I don't feel like we're being largely
successful in getting the business and developers to include  
security as

part of their standard operating procedures. Developers are still
oftentimes lazy and sloppy, creating XSS and CSRF and SQL injection
holes.

I then look at SXSW from afar and think: a) shouldn't I be there
evangelizing security? and, b) shouldn't a major thread to all these
conferences be about how security is integrating with dev  
processes and

practices, making it better?

Maybe I'm just too idealist. I'm curious what everyone else thinks.

cheers,

-ben



smime.p7s
Description: S/MIME cryptographic signature
___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a 

Re: [SC-L] quick question - SXSW

2008-03-12 Thread Andy Steingruebl
On Tue, Mar 11, 2008 at 6:43 AM, Benjamin Tomhave
<[EMAIL PROTECTED]> wrote:
> I had just a quick query for everyone out there, with an attached thought.
>
>  How many security and/or secure coding professionals are prevalently
>  involved with the SXSW conference this week? I know, I know... it's a big
>  party for developers - particularly the Web 2.0 clique - but I'm just
>  curious.
>

On a related note a quick perusal of the JavaOne conference tracks
doesn't show a lot of content in this area either.  Is this due to a
lack of interest, or people in the security world not pitching talks
to the development conference organizer?

-- 
Andy Steingruebl
[EMAIL PROTECTED]
___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
___


Re: [SC-L] quick question - SXSW

2008-03-12 Thread Benjamin Tomhave
First, thanks for that Bill, it exemplifies my point perfectly. A couple 
thoughts...

one, targeting designers is just as important as reaching out to the 
developers themselves... if the designers can ensure that security 
requirements are incorporated from the outset, then we receive an added 
benefit...

two, a re-phrasing around my original thought... somehow we need to get 
security thinking and considerations encoded into the DNA of everyone in 
the business, whether they be designers, architects, coders, analysts, 
PMs, sysadmins, etc, etc, etc. Every one of those topics you mention 
could (should!) have had implicit and explicit security attributes 
included... yet we're still at the point where secure coding has to be 
explicitly requested/demanded (often as an afterthought or bolt-on)...

How do we as infosec professionals get people to the next phase of 
including security thoughts in everything they do... with the end-goal 
being that it is then integrated fully into practices and processes as a 
bona fide genetic mutation that is passed along to future generations?

To me, this seems to be where infosec is stuck as an industry. There 
seems to be a need for a catalyst to spur the mutation so that it can 
have a life of its own. :)

fwiw.

-ben

-- 
Benjamin Tomhave, MS, CISSP
[EMAIL PROTECTED]
LI: http://www.linkedin.com/in/btomhave
Blog: http://www.secureconsulting.net/
Photos: http://photos.secureconsulting.net/
Web: http://falcon.secureconsulting.net/

[ Random Quote: ]
Augustine's Second Law of Socioscience: "For every scientific (or 
engineering) action, there is an equal and opposite social reaction."
http://globalnerdy.com/2007/07/18/laws-of-software-development/

William L. Anderson wrote:
> Dear Ben, having just been at SXSW Interactive (I live in Austin, TX) I 
> did not see many discussions that pay attention to security, or any 
> other software engineering oriented concerns, explicitly.
> 
> There was a discussion of scalability for web services that featured the 
> developers from digg, Flickr, WordPress, and Media Temple. I got there 
> about half-way through but the discussion with the audience was about 
> tools and methods to handle high traffic loads. There was a question 
> about build and deployment strategies and I asked about unit testing 
> (mixed answers - some love it, some think it's strong-arm micro-mgt (go 
> figure)).
> 
> There was a session on OpenID and OAuth (open authorization) standards 
> and implementation. These discussions kind of assume the use of secure 
> transports but since I couldn't stay the whole time I don't know if 
> secure coding was addressed explicitly.
> 
> The main developer attendees at SXSW would call themselves designers and 
> I would guess many of them are doing web development in PHP, Ruby, etc. 
> I think the majority of attendees would not classify themselves as 
> software programmers.
> 
> To me it seems very much like at craft culture. That doesn't mean that a 
> track on how to develop secure web services wouldn't be popular. In fact 
> it might be worth proposing one for next year.
> 
> If you want to talk further, please get in touch.
> 
> -Bill Anderson
> praxis101.com
> 
> Benjamin Tomhave wrote:
>> I had just a quick query for everyone out there, with an attached 
>> thought.
>>
>> How many security and/or secure coding professionals are prevalently
>> involved with the SXSW conference this week? I know, I know... it's a big
>> party for developers - particularly the Web 2.0 clique - but I'm just
>> curious.
>>
>> Here's why: I'm increasingly frustrated by the disconnect between
>> business/dev and security. I don't feel like we're being largely
>> successful in getting the business and developers to include security as
>> part of their standard operating procedures. Developers are still
>> oftentimes lazy and sloppy, creating XSS and CSRF and SQL injection 
>> holes.
>>
>> I then look at SXSW from afar and think: a) shouldn't I be there
>> evangelizing security? and, b) shouldn't a major thread to all these
>> conferences be about how security is integrating with dev processes and
>> practices, making it better?
>>
>> Maybe I'm just too idealist. I'm curious what everyone else thinks.
>>
>> cheers,
>>
>> -ben
>>
> 
> 

___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
___


Re: [SC-L] quick question - SXSW

2008-03-12 Thread William L. Anderson
Dear Ben, having just been at SXSW Interactive (I live in Austin, TX) I did not 
see many 
discussions that pay attention to security, or any other software engineering 
oriented concerns, 
explicitly.

There was a discussion of scalability for web services that featured the 
developers from digg, 
Flickr, WordPress, and Media Temple. I got there about half-way through but the 
discussion with 
the audience was about tools and methods to handle high traffic loads. There 
was a question 
about build and deployment strategies and I asked about unit testing (mixed 
answers - some love 
it, some think it's strong-arm micro-mgt (go figure)).

There was a session on OpenID and OAuth (open authorization) standards and 
implementation. These 
discussions kind of assume the use of secure transports but since I couldn't 
stay the whole time 
I don't know if secure coding was addressed explicitly.

The main developer attendees at SXSW would call themselves designers and I 
would guess many of 
them are doing web development in PHP, Ruby, etc. I think the majority of 
attendees would not 
classify themselves as software programmers.

To me it seems very much like at craft culture. That doesn't mean that a track 
on how to develop 
secure web services wouldn't be popular. In fact it might be worth proposing 
one for next year.

If you want to talk further, please get in touch.

-Bill Anderson
praxis101.com

Benjamin Tomhave wrote:
> I had just a quick query for everyone out there, with an attached thought.
> 
> How many security and/or secure coding professionals are prevalently
> involved with the SXSW conference this week? I know, I know... it's a big
> party for developers - particularly the Web 2.0 clique - but I'm just
> curious.
> 
> Here's why: I'm increasingly frustrated by the disconnect between
> business/dev and security. I don't feel like we're being largely
> successful in getting the business and developers to include security as
> part of their standard operating procedures. Developers are still
> oftentimes lazy and sloppy, creating XSS and CSRF and SQL injection holes.
> 
> I then look at SXSW from afar and think: a) shouldn't I be there
> evangelizing security? and, b) shouldn't a major thread to all these
> conferences be about how security is integrating with dev processes and
> practices, making it better?
> 
> Maybe I'm just too idealist. I'm curious what everyone else thinks.
> 
> cheers,
> 
> -ben
> 
___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
___