RE: Re: Cryptome: NSA has real-time access to Hushmail servers

2008-01-03 Thread M. Burnett
It is important to note that CALEA only applies to telecommunications services and explicitly exempts information services. Furthermore, there is this exception: (3) ENCRYPTION- A telecommunications carrier shall not be responsible for decrypting, or ensuring the government's

RE: Cryptome: NSA has real-time access to Hushmail servers

2007-12-26 Thread M. Burnett
Concerning the credibility of recent cryptome posts, I did some research on the NSA IP address list they have been updating and found out some really interesting stuff. Here's my post on what I found: The NSA controls most of the Internet, or at least that's what they want you to think

RE: More on VMWare poor guest isolation design

2007-08-27 Thread M. Burnett
the same thing about a VM. Mark -Original Message- From: Tim Newsham [mailto:[EMAIL PROTECTED] Sent: Saturday, August 25, 2007 1:05 PM To: M. Burnett Cc: 'Arthur Corliss'; 'Jonathan Yu'; bugtraq@securityfocus.com Subject: Re: More on VMWare poor guest isolation design 2

More on VMWare poor guest isolation design

2007-08-25 Thread M. Burnett
I hate writing such a long post here, but I think it's important that I clarify some points: 1. Of course this won't issue won't affect everyone, especially if you are using vmware mainly for hosting server roles and especially if you do not run the client utilities, but even if it affects 10% of

RE: VMWare poor guest isolation design

2007-08-24 Thread M. Burnett
://xato.net -Original Message- From: Arthur Corliss [mailto:[EMAIL PROTECTED] Sent: Thursday, August 23, 2007 10:49 AM To: M. Burnett Cc: bugtraq@securityfocus.com Subject: Re: VMWare poor guest isolation design On Wed, 22 Aug 2007, M. Burnett wrote: I have run across a design

VMWare poor guest isolation design

2007-08-23 Thread M. Burnett
I have run across a design issue in VMware's scripting automation API that diminishes VM guest/host isolation in such a manner to facilitate privilege escalation, spreading of malware, and compromise of guest operating systems. VMware's scripting API allows a malicious script on the host machine

RE: RDP TLS downgrade

2007-05-09 Thread M. Burnett
This is such a widespread problem with so many applications that I always prefer using STunnel (stunnel.org) rather than an application's built-in SSL features. Many apps do not properly restrict--despite my many complaints--the use of insecure ciphers and SSL/TLS versions, they use self-signed

RE: Microsoft Windows Vista/2003/XP/2000 file management security issues

2007-03-09 Thread M. Burnett
3APA3A, I just wanted to say that is very clever research you have done. It's true that this does require some re-thinking of security practices, but I don't think it's accurate to say it's impossible to secure a private folder in a public one--I believe there is a way to do it securely. There

RE: Re[2]: Microsoft Windows Vista/2003/XP/2000 file management security issues

2007-03-09 Thread M. Burnett
But we'll have to agree to disagree. Your security scenarios are just bizarre. It's a lot easier to hack people then going through all the interations you suggest. Roger, don't be so hard on 3APA3A for this. You can't judge a vulnerability based on current scenarios because we really can't

Re: URLScan detection

2003-06-04 Thread M. Burnett
One problem with using UseFastPathReject, as Microsoft recommends, is that it too can be used to identify URLScan. UseFastPathReject just sends back a generic 404 message. However, If a site normally uses a custom 404 message, but rejects attacks with a generic message, it will be pretty easy

Internet Explorer URL spoofing threat

2003-06-02 Thread M. Burnett
Recently I advised Microsoft of a vulnerability in Internet Explorer that would cause the browser to browse to one web site but display a completely different URL in the address bar. Due to inconsistent handling of authentication credentials in a URL, IE will parse the URL one way when browsing