Re: An attack on paypal

2003-06-10 Thread Bill Frantz
At 5:12 PM -0700 6/8/03, Anne  Lynn Wheeler wrote:
somebody (else) commented (in the thread) that anybody that currently
(still) writes code resulting in buffer overflow exploit maybe should be
thrown in jail.

A nice essay, partially on the need to include technological protections
against human error, included the above paragraph.

IMHO, the problem is that the C language is just too error prone to be used
for most software.  In Thirty Years Later:  Lessons from the Multics
Security Evaluation,  Paul A. Karger and Roger R. Schell
www.acsac.org/2002/papers/classic-multics.pdf credit the use of PL/I for
the lack of buffer overruns in Multics.  However, in the Unix/Linux/PC/Mac
world, a successor language has not yet appeared.

YMMV - Bill


-
Bill Frantz   | Due process for all| Periwinkle -- Consulting
(408)356-8506 | used to be the | 16345 Englewood Ave.
[EMAIL PROTECTED] | American way.  | Los Gatos, CA 95032, USA



-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


RE: Keyservers and Spam

2003-06-10 Thread David Honig
At 12:43 PM 6/10/03 -0400, Jeffrey Kay wrote:
number (which I now use Call Intercept to avoid telephone solicitors).

But for privacy reasons, some folks will not automatically forward
their phone number.  You either deny them access or require them 
to jump through extra hoops (redial w/ special control codes 
that send their ID).  Analogy w/ email  PGP left as an exercise..







-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


[ISN] Cryptography at the core of sound IT security

2003-06-10 Thread R. A. Hettinga

--- begin forwarded text


Status:  U
Date: Tue, 10 Jun 2003 00:22:02 -0500 (CDT)
From: InfoSec News [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: [ISN] Cryptography at the core of sound IT security 
Sender: [EMAIL PROTECTED]
Reply-To: InfoSec News [EMAIL PROTECTED]

http://www.computerworld.com/securitytopics/security/story/0,10801,81955,00.html

By Chris Conrath
ITWorldCanada.com
JUNE 09, 2003

TORONTO - Whitfield Diffie, chief security officer at Sun Microsystems
Inc., likes to dole out his first tenet of IT security -- one no one
should forget.

Whenever you have a secret, you have a vulnerability.

The tenet, given during the keynote at the Infosecurity Canada
conference in Toronto last week, points to one of cryptography's --
and IT security's, for that matter -- basic pillars: if you have
something you want to control, you have a problem.

Diffie, who is best known for his discovery of public key cryptography
more than a quarter century ago, spoke via satellite to a packed room
of IT experts, all of whom are trying to come to grips with their
growing difficulties controlling corporate information.

The problem has diversified out around the solutions, he said,
noting that increased use of cell phones, pagers and mobile computing
devices has made an already difficult situation worse. Regardless,
there is too much business value passing through these devices for the
security issues to be ignored, he added.

Part of the larger problem is that there is no one effective way to
channel cryptographic needs since there are so many different
protocols, he said.

Diffie traced the entire security issue back to the origins of
cryptography hundreds of years ago, but he keyed in on radio as the
first example of a new technology that made the dissemination of
information easy but the control proportionally more difficult.

It was a great way to communicate but everyone else had access to your
data, he explained.

Diffie asserted that companies will have to get a lot better at
protecting their proprietary data if they don't want to find
themselves in the position of the dress designer who hands a pattern
to a dress maker only to find knock-off copies being produced days
later.

The solution may lie in the use of the new advanced encryption
standard (AES) Rijndael, Diffie offered, If AES is as strong as it
appears.

Assuming we are correct and the system is sound we are looking at
tens of thousands of years before it could be cracked, he explained.

This assertion seems open for debate. In a Bruce Schneier CryptoGram
newsletter late last year, Schneier brought up the possibility that
AES could be cracked by techniques faster than brute force. However,
even Schneier -- himself a world renown cryptographer -- said there is
no need to panic, as the discussion around AES' vulnerability is
entirely theoretical.

Diffie added that even with the advent of quantum computing in the
near future, AES traffic is not going to be read in the foreseeable
future.



-
ISN is currently hosted by Attrition.org

To unsubscribe email [EMAIL PROTECTED] with 'unsubscribe isn'
in the BODY of the mail.

--- end forwarded text


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: An attack on paypal -- secure UI for browsers

2003-06-10 Thread Sunder
Yes, NOW if you can load yourself into kernel space, you can do anything
and everything - Thou Art God to quote Heinlein.  This is true of every
OS.  Except if you add that nice little TCPA bugger which can verify the
kernel image you're running is the right and approved one. Q.E.D.

Look at the XBox hacks for ideas as to why it's not a trival issue, but
even so, one James Bond like buffer overflow in something everyone will
have marked as trusted (say IE 8.0, or a specially crafted Word 2005
macro), and the 3v1l h4x0r party is back on and you iz ownz0red once more.

It's not enough to fear Microsoft, you must learn to love it.  Give us 2
minutes of hate for Linux now brother!


--Kaos-Keraunos-Kybernetos---
 + ^ + :25Kliters anthrax, 38K liters botulinum toxin, 500 tons of   /|\
  \|/  :sarin, mustard and VX gas, mobile bio-weapons labs, nukular /\|/\
--*--:weapons.. Reasons for war on Iraq - GWB 2003-01-28 speech.  \/|\/
  /|\  :Found to date: 0.  Cost of war: $800,000,000,000 USD.\|/
 + v + :   The look on Sadam's face - priceless!   
[EMAIL PROTECTED] http://www.sunder.net 

On Tue, 10 Jun 2003, Rich Salz wrote:

 But if the system is rooted, then the attacker merely has to find the
 today's secret word entry in the registry and do the same thing.
 Unless Windows is planning on getting real kernel-level kinds of protection.
 
  It was none other than Microsoft's NGSCB, nee Palladium.  See
  http://news.com.com/2100-1012_3-1000584.html?tag=fd_top:
 
 See previous sentence. :)