Re: [SC-L] auditing

2004-05-03 Thread Crispin Cowan
jnf wrote: Someone just suggested ctags, I've never heard of ctags or cscope- I will look at them. I don't really know what I was looking for, ctags kind turns C source code into hypertext: you put your cursor on a function call in a source file, press the magic key, and vi[m] jumps to the app

Re: [SC-L] auditing

2004-05-03 Thread Jose Nazario
some advice ... look for tools to generate callgraphs from dynamic (runtime) analysis and static (run them over the compiler binary or the source code) analysis. graphing those relationships can be useful. one example: http://monkey.org/~jose/graphing/syscalls/ look for tools to do contr

Re: [SC-L] auditing

2004-05-03 Thread Paco Hope
On 5/3/04 11:48 AM, "ljknews" <[EMAIL PROTECTED]> wrote: > At 10:04 AM -0500 5/3/04, jnf wrote: > >> Someone just suggested ctags, I've never heard of ctags or cscope- I will >> look at them. I don't really know what I was looking for, I often find it >> quite furstrating trying to keep track of

RE: [SC-L] Re: White paper: "Many Eyes" - No Assurance Against Ma ny Spies

2004-05-03 Thread Jeremy Epstein
Crispin said: > But taking the remark seriously, it says that you must not trust > anything that you don't have source code for. The point of > Thompson's > paper is that this includes the compiler; having the source > code for the > applications and the OS is not enough, and even having the

Re: [SC-L] auditing

2004-05-03 Thread ljknews
At 10:04 AM -0500 5/3/04, jnf wrote: >Someone just suggested ctags, I've never heard of ctags or cscope- I will >look at them. I don't really know what I was looking for, I often find it >quite furstrating trying to keep track of whats going on across XX global >variables inside of XX internal

Re: [SC-L] auditing

2004-05-03 Thread ljknews
At 5:53 PM -0500 4/30/04, jnf wrote: hi, simple question that is not very technicla in itself- when auditing >software, I often find it had to stay focused and follow the code so to >speak, especially when jumping across X source files and Y functions >inside of each source file, I was just cur

Re: [SC-L] auditing

2004-05-03 Thread jnf
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Someone just suggested ctags, I've never heard of ctags or cscope- I will look at them. I don't really know what I was looking for, I often find it quite furstrating trying to keep track of whats going on across XX global variables inside of XX inte

Re: [SC-L] auditing

2004-05-03 Thread James Walden
jnf wrote: hi, simple question that is not very technicla in itself- when auditing software, I often find it had to stay focused and follow the code so to speak, especially when jumping across X source files and Y functions inside of each source file, I was just curious how others cope with such

Re: [SC-L] Python, Ruby, Perl & PHP

2004-05-03 Thread James Walden
Fabien wrote: I'm on the list since more or less one month and I have seen a lot of discussion about the "safety" of a language. And since I use language like Python or PHP, I would like to have your opinion about such language. Your question is quite broad, so I'll give some quick answers along

Re: [SC-L] Re: White paper: "Many Eyes" - No Assurance Against Many Spies

2004-05-03 Thread Glenn and Mary Everhart
Tad Anhalt wrote: Jeremy Epstein wrote: I agree with much of what he says about the potential for infiltration of bad stuff into Linux, but he's comparing apples and oranges. He's comparing a large, complex open source product to a small, simple closed source product. I claim that if you ig

Re: [SC-L] Re: White paper: "Many Eyes" - No Assurance Against Many Spies

2004-05-03 Thread Crispin Cowan
Tad Anhalt wrote: Jeremy Epstein wrote: I agree with much of what he says about the potential for infiltration of bad stuff into Linux, but he's comparing apples and oranges. He's comparing a large, complex open source product to a small, simple closed source product. I claim that if you

[SC-L] Vulnerability Auditing Checklist

2004-05-03 Thread Mads Rasmussen
This is a repost of a email I found on vuln-dev from last year. I thought it could season some fruitful discussions here Maybe Steven have a newer version available? Would be nice with some illustrations to each vulnerability listed. I for one have difficulties understanding the "off-by-one" v

[SC-L] auditing

2004-05-03 Thread jnf
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 hi, simple question that is not very technicla in itself- when auditing software, I often find it had to stay focused and follow the code so to speak, especially when jumping across X source files and Y functions inside of each source file, I was ju