[SC-L] Goodbye to faulty software?

2008-07-19 Thread Jeremy Epstein
Saw this article: http://cordis.europa.eu/ictresults/popup.cfm?section=newstpl=articleID=89864AutoPrint=True, and was wondering if anyone on this list knows anything about the project or Dr Bengt Nordström at Chalmers University in Göteborg Sweden. Sounds to me like they're reinventing all the

[SC-L] Animations for training

2008-07-15 Thread Gary McGraw
hi sc-l, Markus Schumacher of Virtual Forge (a German firm specializing in software security and SAP) has created a set of animations to help train technical people about common Web attacks. Cigital is now hosting some of the videos (which you may find useful in your work). You can find

[SC-L] Silver Bullet: ches

2008-07-15 Thread Gary McGraw
hi sc-l, Bill Cheswick is the Silver Bullet victim for episode 28. ches and I had plenty of fun discussing many aspects of security, including his opinion that we haven't made much progress in software security! Interesting. Have a listen and please feel free to hop on the website and post a

[SC-L] online game security

2008-07-10 Thread Gary McGraw
hi sc-l, Those of you who read Exploiting Online Games http://www.exploitingonlinegames.com know why I believe online games are a harbinger of software security issues to come. IEEE SP magazine will publish a special issue on online game security next year. You can find the CFP here:

Re: [SC-L] InternetNews Realtime IT News - Merchants Cope With PCI Compliance

2008-07-02 Thread Michael Gavin
Hi Stephen, Yes, organizations must resolve the issues discovered by the automated tools, at least to the extent that the tool no longer complains. While implementing both options of requirement 6.6 is recommended, it is not required by PCI DSS. Instead of doing what you propose, I

Re: [SC-L] InternetNews Realtime IT News - Merchants Cope With PCI Compliance

2008-07-01 Thread Arian J. Evans
Gunnar -- agreed. And for all the fake security in the name of PCI going on right now out there -- let's also keep in mind that it is completely valid and legitimate to attempt to operationalize software security. We scoff because to date it hasn't been done well (at all). That is just as much a

Re: [SC-L] InternetNews Realtime IT News - Merchants Cope With PCI Compliance

2008-07-01 Thread Stephen Craig Evans
Hi Michael, So, unfortunately for the WAF vendors, people can just use a static source code analysis tool or a web application vulnerability scanner instead of purchasing and deploying a WAF. I don't know much about PCI 6.6 (yet), but don't the organizations have to mitigate the

Re: [SC-L] Root Canal Treatment vs Source Code Review

2008-07-01 Thread ljknews
At 10:43 PM -0400 6/30/08, Mary and Glenn Everhart wrote: There is another reason I have seen quite often: you can't readily ask the designer of the code what it does when he is dead, or when he has left the company (esp. if he works for a competitor). When I participated (as author) in

[SC-L] InternetNews Realtime IT News - Merchants Cope With PCI Compliance

2008-06-30 Thread Kenneth Van Wyk
Happy PCI-DSS 6.6 day, everyone. (Wow, that's a sentence you don't hear often.) http://www.internetnews.com/ec-news/article.php/3755916 In talking with my customers over the past several months, I always find it interesting that the vast majority would sooner have root canal than submit

Re: [SC-L] InternetNews Realtime IT News - Merchants Cope With PCI Compliance

2008-06-30 Thread ljknews
At 9:44 AM -0400 6/30/08, Kenneth Van Wyk wrote: Happy PCI-DSS 6.6 day, everyone. (Wow, that's a sentence you don't hear often.) http://www.internetnews.com/ec-news/article.php/3755916 In talking with my customers over the past several months, I always find it interesting that the

Re: [SC-L] InternetNews Realtime IT News - Merchants Cope With PCICompliance

2008-06-30 Thread Chris Wysopal
Ken, Customers not wanting to part with source code is one of the reasons, at Veracode, we decided to take our static binary analysis technology to market as SaaS. You get the benefit of both automation, as with static source code analysis, and an external assessment, yet you don't have to part

Re: [SC-L] InternetNews Realtime IT News - Merchants Cope With PCI Compliance

2008-06-30 Thread Michael Gavin
I too was wondering how much of a boon 6.6 would be to the WAF vendors and/or the companies that do security code reviews. That is, until 4/22, when the PCI SSC issued a press release (https://www.pcisecuritystandards.org/pdfs/04-22-08.pdf) announcing an information supplement clarifying

[SC-L] Code Testing Tools Could Be Acquisition Targets in '08

2008-06-27 Thread Tom Brennan
That is not a bad thing ;) Management, Developers, Security Professionals - can only result in one thing.. better security. http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference Sept

[SC-L] International Symposium on Engineering Secure Software and Systems (ESSoS)

2008-06-26 Thread Brian Chess
CALL FOR PAPERS === International Symposium on Engineering Secure Software and Systems (ESSoS) February 04-06, 2009 Leuven, Belgium http://distrinet.cs.kuleuven.be/events/essos2009/ CONTEXT AND MOTIVATION Trustworthy, secure software is a core ingredient of the modern world.

[SC-L] Any SC-Lers going to FIRST in Vancouver next week?

2008-06-19 Thread Kenneth Van Wyk
Subject says it all. Any of you going to be at the FIRST conference? If you are and want to hook up for a chat--perhaps over a beer--then drop me a note. Cheers, Ken - Kenneth R. van Wyk SC-L Moderator KRvW Associates, LLC http://www.KRvW.com smime.p7s Description: S/MIME

[SC-L] Silver Bullet: Gunnar Peterson

2008-06-18 Thread Gary McGraw
hi sc-l, I'm sitting on my porch this morning talking with Ken about the book he and Mark Graff are working on for the software security series. Ken says hi (we'll see if he approves this posting). You guys all know Gunnar Peterson who not only has an active blog that often covers software

[SC-L] Security Bonuses for Vista Programmers

2008-06-16 Thread Kenneth Van Wyk
FYI, interesting eWeek article on some of Vista's security features that are provided to developers. (I misinterpreted the article's title a bit, but it quickly becomes clear in the article. At first, I thought it was about giving $$ bonuses to vista programmers -- it reminded me of an

[SC-L] OWASP: The Application Security Desk Reference

2008-06-16 Thread McGovern, James F (HTSC, IT)
OWASP needs your help with a new important project. We're creating the OWASP Application Security Desk Reference (ASDR) to capture and organize all the foundational knowledge in application security. Like the Physicians' Desk Reference for doctors, this book is a well-organized reference work

[SC-L] Search Security video

2008-06-09 Thread Gary McGraw
hi sc-l, At RSA this year, I did a quick video interview with Dennis Fisher an old friend who is now the lead editor of Search Security. The resulting video is here: http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1316612,00.html Here are the questions I answered during

[SC-L] new book

2008-06-06 Thread Jason Grembi
Ken, I wanted to announce my book to you and your subscribers. The book Building A Secure Software Construction: A Security Programmer's Guide is written for college students (undergraduate or community) as a guide of how to create a development process that focuses on both quality and security

[SC-L] DistriNet Research Group

2008-06-04 Thread Kenneth Van Wyk
FYI, interesting announcement out of KU Leuven in Belgium and the SANS institute: http://distrinet.cs.kuleuven.be/news/2008/2008-05-09%20SANSandDistriNetUnite.jsp Cheers, Ken - Kenneth R. van Wyk SC-L Moderator KRvW Associates, LLC http://www.KRvW.com smime.p7s Description:

[SC-L] Silver Bullet (transcripts)

2008-05-29 Thread Gary McGraw
hi sc-l, As some of you may know, selected Silver Bullet episodes are published in IEEE Security privacy magazine as the interview column. We recently placed the entire set of available transcripts on the Silver Bullet web page as pdf files. As an example, USA Today reporter Jon Swartz's

[SC-L] Coverity to Buy Codefast

2008-05-22 Thread Kenneth Van Wyk
FYI, a bit of MA activity going on in the software security (product) space: http://www.eweek.com/c/a/Application-Development/Coverity-to-Buy-Codefast/ Cheers, Ken - Kenneth R. van Wyk SC-L Moderator KRvW Associates, LLC http://www.KRvW.com smime.p7s Description: S/MIME

[SC-L] informIT: web 3.0 security

2008-05-19 Thread Gary McGraw
hi sc-l, I started thinking about web 3.0 (sometimes called the semantic web) around RSA to prep for a video shoot that the CNBC was doing. Brian Sletten helped bring me up to speed in a series of conversations about what's going on technically. Not much is available yet on the security

[SC-L] Silver Bullet 26: Adam Shostack

2008-05-15 Thread Gary McGraw
hi sc-l, Silver Bullet episode 26 just went live: http://www.cigital.com/silverbullet/show-026/ This episode has the best sound quality we've achieved to date. (Sorry about episode 25 sound problems. Dell has been banished from the loop!) Adam and I have a particularly interesting

[SC-L] No general-purpose computer, or everything under surveillance?

2008-05-13 Thread David A. Wheeler
Dan Geer said: The general-purpose computer must die or we must put everything under surveillance. Either option is ugly, but 'all of the above' would be lights-out for people like me, people like you, people like us. We're playing for keeps now.

Re: [SC-L] No general-purpose computer, or everything under surveillance?

2008-05-13 Thread Andy Steingruebl
On Tue, May 13, 2008 at 1:51 PM, David A. Wheeler [EMAIL PROTECTED] wrote: If you interpret the definition of these terms of general purpose and surveillance differently, i.e., limit applications to least privilege, and locally monitor their behavior, then I'd agree. But this is another

Re: [SC-L] No general-purpose computer, or everything under surveillance?

2008-05-13 Thread Gunnar Peterson
But the difference is who is in final control. In the end, the users of computers should be in final control, not their makers, or we have given up essential liberty. We can develop systems which provide suites of more specialized privileges to particular functions, without giving up

Re: [SC-L] Microsoft's message at RSA

2008-05-10 Thread Gunnar Peterson
Hi Andy, Great post. I especially like the part about making choices. Having users type passwords into websites that protect all their assets pretty clearly isn't working. Cardspace is pretty clearly a massive improvement. That said, I don't think the choice is between perfect liberty and

Re: [SC-L] Microsoft's message at RSA

2008-05-09 Thread Gary McGraw
Hi andy (and everybody), Indeed. I vote for personal computer liberty over guaranteed iron clad security any day. For amusing and shocking rants on this subject google up some classic Ross Anderson. Or heck, I'll do it for you: http://www.cl.cam.ac.uk/~rja14/tcpa-faq.html A related and more

Re: [SC-L] Microsoft's message at RSA

2008-05-09 Thread Andy Steingruebl
On Mon, May 5, 2008 at 10:24 AM, Gary McGraw [EMAIL PROTECTED] wrote: hi sc-l, Here's an article about Mundie's keynote at RSA. It's worth a read from a software security perspective. Somehow I ended up playing the foil in this article...go figure.

Re: [SC-L] GCC and pointer overflows

2008-05-06 Thread karger
It's taken me some time to draft a reply, for which I must apologize, but since Jeremy Epstein mentioned me by name, I must respond. This is actually responding to four messages from Jeremy Epstein, Larry Kilgallen, and Jerry Leichter. From: Epstein, Jeremy [EMAIL PROTECTED] Subject: Re:

[SC-L] Microsoft's message at RSA

2008-05-05 Thread Gary McGraw
hi sc-l, Here's an article about Mundie's keynote at RSA. It's worth a read from a software security perspective. Somehow I ended up playing the foil in this article...go figure. http://reddevnews.com/features/article.aspx?editorialsid=2470 So what do you guys think? Is this end-to-end

Re: [SC-L] Microsoft's message at RSA

2008-05-05 Thread Gunnar Peterson
Hi Gary, I think they are doing it, Cardspace is the key enabling technology to making it happen. Given how many enterprises are federation-enabled (and how simply the rest can be), the biggest missing piece right now is that we need an Identity Provider for the Internets. Of course this only

Re: [SC-L] Microsoft's message at RSA

2008-05-05 Thread Susan Bradley, CPA aka Ebitz - SBS Rocks [MVP]
http://media.omediaweb.com/rsa2008/mediaplayerVO.htm?speaker=1_4 And if you want to listen to it, there it is as well. Gunnar Peterson wrote: Hi Gary, I think they are doing it, Cardspace is the key enabling technology to making it happen. Given how many enterprises are federation-enabled

[SC-L] Invitation - OWASP AppSec Europe May 19-22 2008 - Belgium

2008-05-05 Thread Sebastien Deleersnyder
Hi, 2 weeks left for the conference! We would like to invite you to the European OWASP Application Security Conference! After successful OWASP Conferences in the United States (San Jose), Europe (Milan), Asia (Taiwan) and Australia (Queensland), we are back in Belgium: 5 tutorials and 2

[SC-L] GCC and pointer overflows [LWN.net]

2008-05-01 Thread Kenneth Van Wyk
FYI, here's an interesting article (and follow-on discussions) about a recent bug in the GCC compiler collection. http://lwn.net/Articles/278137/ The bug, which has been documented in a CERT advisory, affects C code in which, under some circumstances, buffer bounds checking can be

Re: [SC-L] GCC and pointer overflows [LWN.net]

2008-05-01 Thread Robert C. Seacord
Ken, Comment below. FYI, here's an interesting article (and follow-on discussions) about a recent bug in the GCC compiler collection. http://lwn.net/Articles/278137/ The bug, which has been documented in a CERT advisory, affects C code in which, under some circumstances, buffer bounds

Re: [SC-L] GCC and pointer overflows [LWN.net]

2008-05-01 Thread der Mouse
The bug, which has been documented in a CERT advisory, affects C code in which, under some circumstances, buffer bounds checking can be optimized out to produce binaries that are susceptible to buffer overflows. [...] Of course, many/most SC-Lers will no doubt jump on this as another

Re: [SC-L] GCC and pointer overflows [LWN.net]

2008-05-01 Thread Epstein, Jeremy
Ken, a good example. For those of you who want to reach much further back, Paul Karger told me of a similar problem in the compiler (I don't remember the language) used for compiling the A1 VAX VMM kernel, that optimized out a check in the Mandatory Access Control enforcement, which separates

Re: [SC-L] GCC and pointer overflows [LWN.net]

2008-05-01 Thread ljknews
At 1:00 PM -0400 5/1/08, Epstein, Jeremy wrote: Ken, a good example. For those of you who want to reach much further back, Paul Karger told me of a similar problem in the compiler (I don't remember the language) VAX Pascal, before VMS was on Alpha (and long before Itanium). used for

Re: [SC-L] GCC and pointer overflows [LWN.net]

2008-05-01 Thread ljknews
At 3:12 PM -0400 5/1/08, Leichter, Jerry wrote: The VAX VMM effort died with the announcement of the Alpha, in late 1992 - though obviously the death was decided internally once the move to Alpha was decided, which would have been somewhat earlier. The origins of the VAX VMM effort date back

Re: [SC-L] Lateral SQL injection paper

2008-04-30 Thread Mary and Glenn Everhart
Let me suggest something a little differently: Perhaps when speaking of web app security, an already enormous area, it is not so useful to enlarge it still more, but fools rush in. One way to look at web code (and many other kinds) is that we are sending strings to an interpreter and it does

Re: [SC-L] Lateral SQL injection paper

2008-04-29 Thread Joe Teff
If I use Parameterized queries w/ binding of all variables, I'm 100% immune to SQL Injection. Sure. You've protected one app and transferred risk to any other process/app that uses the data. If they use that data to create dynamic sql, then what? jt -Original Message- From: Jim

Re: [SC-L] Lateral SQL injection paper

2008-04-29 Thread Steven M. Christey
On Tue, 29 Apr 2008, Joe Teff wrote: If I use Parameterized queries w/ binding of all variables, I'm 100% immune to SQL Injection. Sure. You've protected one app and transferred risk to any other process/app that uses the data. If they use that data to create dynamic sql, then what?

Re: [SC-L] Lateral SQL injection paper

2008-04-29 Thread Pascal Meunier
If I understand this correctly, it's difficult to exploit because if you can alter database types, you probably can send arbitrary SQL statements to the database somehow already. In that case, what extra capabilities does this attack give you? When I design applications using Postgresql, I

Re: [SC-L] Lateral SQL injection paper

2008-04-29 Thread Arian J. Evans
So I'd like to pull this back to a few salient points. Weirdly, some folks seem quick to dismiss the paper with a didactic shot of folks shouldn't code that way anyway which has nothing to do with the subject. 1. I think everyone on SC-L gets the idea of strong patterns and implementations, and

[SC-L] Lateral SQL injection paper

2008-04-28 Thread Kenneth Van Wyk
Greetings SC-Lers, Things have been pretty quiet here on the SC-L list... I hope everyone saw David Litchfield's recent announcement of a new category of SQL attacks. (Full paper available at http://www.databasesecurity.com/dbsec/lateral-sql-injection.pdf) He refers to this new category as

Re: [SC-L] Lateral SQL injection paper

2008-04-28 Thread Arian J. Evans
David's papers are always interesting, but I think the most interesting thing is that we are starting to see advanced SQL injection like his recent work on cursor attacks/snarfing being used in the wild in mass-SQL injection exploits. Attackers are using multiple layers of encoding for both

Re: [SC-L] Lateral SQL injection paper

2008-04-28 Thread Jim Manico
Anyone else have a take on this new attack method? If I use Parameterized queries w/ binding of all variables, I'm 100% immune to SQL Injection. In Java (for Insert/Update/etc) just use PreparedStatement + variable binding. There are similar constructs in all languages. Although the

Re: [SC-L] InformIT: budgeting for software security

2008-04-12 Thread Jim Manico
No, there is not a direct connection but Green and InfoSec do have a few degrees of connection. InfoSec - Is a part of - IT - manages - Datacenters - suck up 3% of word power - is becoming more expensive - Green - Al Gore RSA conferences *were *focused on infosec, and on cryptography in

Re: [SC-L] InformIT: budgeting for software security

2008-04-11 Thread ljknews
At 8:14 AM -0500 4/11/08, Wall, Kevin wrote: In the context, I think his concern was that in the past, the RSA conferences were focused on infosec, and on cryptography in particular. Apparently, based on Stephen and gem's comments, it seems to have lost its focus. I think that's all that

Re: [SC-L] InformIT: budgeting for software security

2008-04-11 Thread Gary McGraw
Hi all, Larry has it right. There was very little technical content at RSA this year. All of the vendors on the show floor had pitches that sounded exactly the same. Last year there was much more software security presence. The good news for our field is that at the (small) executive forum,

[SC-L] InformIT: budgeting for software security

2008-04-09 Thread Gary McGraw
Hi sc-l, Greetings from RSA. This year the marketing people outnumber the technical people 1000 to 1. There are over 18,000 people here. You do the math. I recently moved my monthly security column from darkreading to informIT. I am refocusing the column on software security and business.

[SC-L] Invitation - OWASP AppSec Europe May 19-22 2008 - Belgium

2008-04-07 Thread Sebastien Deleersnyder
Hi, We would like to invite you to the European OWASP Application Security Conference! After successful OWASP Conferences in the United States (San Jose), Europe (Milan), Asia (Taiwan) and Australia (Queensland), we are back in Belgium: 5 tutorials and 2 conference tracks in the historic center

Re: [SC-L] Silver Bullet turns 2: Mary Ann Davidson

2008-04-04 Thread Gary McGraw
Thanks for the feedback Stephen. It's been a blast doing Silver Bullet for the last two years. For our next episode, I'm going to interview Jon Swartz who covers security for USA Today. That should be a twist! We're also planning to syndicate Silver Bullet through informIT soon. gem p.s.

Re: [SC-L] Silver Bullet turns 2: Mary Ann Davidson

2008-04-04 Thread Arian J. Evans
Mary -- Thank you for your reply and clarification. I am 100% on board with you about folks inventing taxonomies and then telling business owners and developers what artifacts they need to look for, measure, etc. without any real cost or business justification with regards to to your costs vs.

Re: [SC-L] Silver Bullet turns 2: Mary Ann Davidson

2008-04-04 Thread Arian J. Evans
I'll second this Gary. You've done nice work here. I think Mary Ann's comments are some of the most interesting concerning what our industry needs to focus on in the near future. (and I'd love to see you focus on this with your series) Her comments reminded me of a discussion on this list with

Re: [SC-L] quick question - SXSW

2008-03-26 Thread Andrew van der Stock
Hi all, I have been specifically targeting developer conferences these last twelve months. I've had rejections from the likes of OSCON, and in fact, I was rejected from BlackHat, too. I have worked out the pattern to these conferences. You gotta SEX IT UP. Instead of submitting talks like

Re: [SC-L] Silver Bullet turns 2: Mary Ann Davidson

2008-03-26 Thread Andrew van der Stock
Gary, Good interview. The discussion on being unable to develop trust relationships with contractors who release exploits was interesting, and I wished that there was more discussion on that point. I would have thought signing a contract made it easier to sue for breach of contract than

[SC-L] 0x000000.com SuiGenchi Demonstration

2008-03-16 Thread Benjamin Tomhave
Has anybody had opportunity to look at this tool for PHP source code analysis? Just wondering about the relative merits vs other tools already available. http://www.0x00.com/?i=530 -- Benjamin Tomhave, MS, CISSP [EMAIL PROTECTED] LI: http://www.linkedin.com/in/btomhave Blog:

[SC-L] Secure Development World ?

2008-03-14 Thread Gadi Evron
I am trying to understand if this conference is cancelled or not? ___ Secure Coding mailing list (SC-L) SC-L@securecoding.org List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l List charter available at -

Re: [SC-L] Secure Development World ?

2008-03-14 Thread Robert A. Martin
Yes it is cancelled. At 1:13 AM -0500 3/14/08, Gadi Evron wrote: I am trying to understand if this conference is cancelled or not? ___ Secure Coding mailing list (SC-L) SC-L@securecoding.org List information, subscriptions, etc -

Re: [SC-L] Software security definition(s)

2008-03-14 Thread Mike Lyman
Arian J. Evans wrote: What is secure software? It is one quality of an application that can be measured by the emergent behaviors of the software while trying to meet and enforce its use-case in a given run-time environment. Fairly new to the list so if I cover things discussed before or

[SC-L] Software security definition(s)

2008-03-13 Thread Arian J. Evans
I hate to start a random definition thread, but Ben asked me a good question and I'm curious if anyone else sees this matter in the same fashion that I do. Ben asked why I refer to software security as similar to artifacts identified by emergent behaviors: Software security is an emergent

Re: [SC-L] quick question - SXSW

2008-03-13 Thread Arian J. Evans
On Wed, Mar 12, 2008 at 3:05 PM, Andy Steingruebl [EMAIL PROTECTED] wrote: On a related note a quick perusal of the JavaOne conference tracks doesn't show a lot of content in this area either. Is this due to a lack of interest, or people in the security world not pitching talks to the

[SC-L] CERT C Secure Coding Standard - last call for reviewers

2008-03-13 Thread Robert C. Seacord
We would like to invite the community to review and comment on the current version of the CERT C Secure Coding Standard available online at www.securecoding.cert.org http://www.securecoding.cert.org before Version 1.0 is published. To comment, you can create an account on the Secure Coding wiki

Re: [SC-L] quick question - SXSW

2008-03-12 Thread William L. Anderson
Dear Ben, having just been at SXSW Interactive (I live in Austin, TX) I did not see many discussions that pay attention to security, or any other software engineering oriented concerns, explicitly. There was a discussion of scalability for web services that featured the developers from digg,

Re: [SC-L] quick question - SXSW

2008-03-12 Thread Benjamin Tomhave
First, thanks for that Bill, it exemplifies my point perfectly. A couple thoughts... one, targeting designers is just as important as reaching out to the developers themselves... if the designers can ensure that security requirements are incorporated from the outset, then we receive an added

Re: [SC-L] quick question - SXSW

2008-03-12 Thread Andy Steingruebl
On Tue, Mar 11, 2008 at 6:43 AM, Benjamin Tomhave [EMAIL PROTECTED] wrote: I had just a quick query for everyone out there, with an attached thought. How many security and/or secure coding professionals are prevalently involved with the SXSW conference this week? I know, I know... it's a big

Re: [SC-L] quick question - SXSW

2008-03-12 Thread Kenneth Van Wyk
Ben, Your point is a good one -- the software security community needs to be vigilant in reaching out to developers and spreading the word. FWIW, some dev conferences have done this. I spoke at SD West in 2006, and there was a significant security track there. Still, it'd be great to

Re: [SC-L] quick question - SXSW

2008-03-12 Thread Andy Steingruebl
On Wed, Mar 12, 2008 at 4:30 PM, Gary McGraw [EMAIL PROTECTED] wrote: Hey andy, You mean AJAX one? Last time I went there was zero interest and even less clue about security among attendees. The only shining light was a long conversation I had with bill joy about security critical

Re: [SC-L] quick question - SXSW

2008-03-12 Thread Johan Peeters
I agree. Reaching the development community, that's precisely what we are trying to do at secappdev. Thanks for helping with that too, Ken. I have also taken some security-related sessions to conferences such as XP Days Benelux, XP Days France and SPA. Appearing soon at ACCU. I would love to hear

Re: [SC-L] quick question - SXSW

2008-03-12 Thread Arian J. Evans
my responses inline On Wed, Mar 12, 2008 at 6:08 PM, Benjamin Tomhave [EMAIL PROTECTED] wrote: I think you misunderstood my points a little bit. SXSW was just a current conference example. As Gary's pointed out, there are many conferences. It's possible SXSW wasn't a good example, but it was

Re: [SC-L] quick question - SXSW

2008-03-12 Thread Gunnar Peterson
I agree this is a big issue, there is no cotton picking way that the security people are solving these problems, it has to come from the developers. I put together a track for QCon which included Brian Chess on Static Analysis, John Steven on Threat Modeling, and Jeff Williams on ESAPI and Web

Re: [SC-L] quick question - SXSW

2008-03-12 Thread Arian J. Evans
So two thoughts Ben, purely my 0.02 USD: 1. This is largely the wrong crowd. Designers of small web2.0 stuffs, particularly the domain of widgets and WS interfaces for all the usual suspect platforms (flickr, facebook etc.) as well as most startups: They just don't care. They will never care.

Re: [SC-L] quick question - SXSW

2008-03-12 Thread Gary McGraw
Hi again, I rebooted the security track completely at SD West in 2003 (thanks to tami who I cc'ed here). I'm on the advisory board. We're slowly inching our way toward SDL/touchpoints/CLASP stuffs at SD West, though when I tried to cover the touchpoints and enterprise security in 2006,

[SC-L] quick question - SXSW

2008-03-11 Thread Benjamin Tomhave
I had just a quick query for everyone out there, with an attached thought. How many security and/or secure coding professionals are prevalently involved with the SXSW conference this week? I know, I know... it's a big party for developers - particularly the Web 2.0 clique - but I'm just curious.

[SC-L] implementable process level secure development thoughts

2008-03-11 Thread Andy Murren
I have been working on developing a series of documents to turn the ideas encompassed on this list and in what I can find in books articles. I am not finding, and it may just be I am looking in the wrong places, for any information on how people are actually implementing the concepts. I have

Re: [SC-L] implementable process level secure development thoughts

2008-03-11 Thread Gary McGraw
Hi Andy, We build and then execute plans to do that kind of activity all the time at Cigital. Unfortunately, the plans are all highly tailored to the politics and operations of our specific customers, and they are proprietary. Basically they do involve several aspects in common if you step

Re: [SC-L] implementable process level secure development thoughts

2008-03-11 Thread Wall, Kevin
Andy, You wrote... I have been working on developing a series of documents to turn the ideas encompassed on this list and in what I can find in books articles. I am not finding, and it may just be I am looking in the wrong places, for any information on how people are actually

Re: [SC-L] Secure Coding Books

2008-03-08 Thread Sebastien Deleersnyder
There is a list on http://www.owasp.org/index.php/Education_Module_Good_WebAppSec_Resources I am currently reading a Secure Programming with Statical Analysi which I like. Regards Seba -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Jim Manico Sent:

Re: [SC-L] Secure Coding Books

2008-03-07 Thread Jim Manico
How to break web software is one of the best web security coder- centric books I have read. Its concise and useful. Sent from my iPhone On Mar 7, 2008, at 7:45 AM, Lawson, David L [EMAIL PROTECTED] wrote: I've read several secure coding books in the past, and was wondering if anyone has

Re: [SC-L] Secure Coding Books

2008-03-07 Thread Goertzel, Karen [USA]
Do you really mean secure coding only, or are you looking for books on secure software development more generally? -- Karen Mercedes Goertzel, CISSP Booz Allen Hamilton 703.902.6981 [EMAIL PROTECTED] -Original Message- From: [EMAIL PROTECTED] on behalf of Lawson, David L Sent: Fri

Re: [SC-L] Secure Coding Books

2008-03-07 Thread Neil Daswani
Hi David, There is a list of software security / secure coding books at: http://www.sans-ssi.org/references.php Gary McGraw has a blog post in which some of these references are chronologically ordered at:

Re: [SC-L] Secure Coding Books

2008-03-07 Thread Robert C. Seacord
David, I like Secure Coding in C and C++ (http://www.cert.org/books/secure-coding/) The guy who wrote it is a bit of a jerk, but it has a lot of good technical information. Another book I like is The Art of Software Security Assessment

Re: [SC-L] Secure Coding Books

2008-03-07 Thread Dean H. Saxe
I'd check out Security: What Every Programmer Needs to Know by Daswani, Kern and Kesavan. I haven't read it cover to cover yet, but it seems to cover the topics in a nice amount of detail. -dhs Dean H. Saxe, CISSP, CEH [EMAIL PROTECTED] Great spirits have often encountered violent

Re: [SC-L] Secure development after release

2008-03-05 Thread bugtraq
Hello Andy, Once an application is released or put into production, what are organizations doing to keep the applications secure? As new Some organizations purchase web application security scanners and perform periodic scanning (this could be done by the soc) or use a service such as

Re: [SC-L] PCI: Boon or bust for software security?

2008-03-04 Thread Andy Murren
Overall I concur with Bruce on this. PCI has too broad of a constituent base to cover to be truly effective. Some fixes were added after the TJX breach, but look at how much TJX paid versus how much the laid aside to pay. I am betting that the TJX lawyers produced documents showing that they

[SC-L] Secure development after release

2008-03-04 Thread Andy Murren
Once an application is released or put into production, what are organizations doing to keep the applications secure? As new vulnerabilities and classes of exploits are released, how is that information being fed back to developers so they can update/patch in the software. At the network most

Re: [SC-L] PCI: Boon or bust for software security?

2008-03-04 Thread Benjamin Tomhave
Worse than that, I think that until businesses universally understand the value of secure coding practices, they will resist the up-front cost to take on such a transformational program. SOX vs PCI would make for a good case study. SOX is very high level and generic, which led to much confusion

[SC-L] PCI: Boon or bust for software security?

2008-03-03 Thread Kenneth Van Wyk
Greetings SC-L, So here's a question to ponder. Now that PCI DSS 1.1 is out there (save a couple June 2008 deadlines still looming), has it been good or bad for software security as a whole? It does require secure development processes (as prescribed by OWASP). It does require sensitive

[SC-L] SC-L Administrivia: How does the readership feel about sponsorships?

2008-02-19 Thread Kenneth Van Wyk
Greetings SC-L, So, I've always done my best to keep SC-L non-commercial since its inception in 2003. I'm curious, though, how you the readers would react to accepting sponsorships in the form of sponsored by: banners at the bottom of each posting. The banner presently points to the

[SC-L] Silver Bullet 23

2008-02-19 Thread Gary McGraw
Hi sc-l, Episode 23 of Silver Bullet just went up thid afternoon. In this episode, I have a conversation with Veracode founder and CTO Chris Wysopal (aka Weld Pond). We do lots of yabbering about software security as you might expect. Check it out:

[SC-L] Michael Howard's Web Log : Introducing SAFECode

2008-02-15 Thread Kenneth Van Wyk
FYI, from Michael Howard's blog: Today SAFECode, the Software Assurance Forum for Excellence in Code, introduced its first white paper, Software Assurance: An Overview of Current Industry Best Practices. The organization was founded by Microsoft, Symantec, EMC, SAP and Juniper to advance

Re: [SC-L] Programming language comparison?

2008-02-06 Thread Shea, Brian A
It seems like this exchange is focused on whether bug / flaw classes can be applied to All programming languages or not. Isn't the question at hand which languages have the property Subject to bug / flaw class XXX (true | false), and not whether you can find one or more class that fits the All

Re: [SC-L] Programming language comparison?

2008-02-05 Thread Vincent Verhagen
Gentleman, Thanks for the contributions to my question. They've been helpful! Vincent Vincent Verhagen wrote: Hi all, I was referred to this list by a fellow security consultant for this specific question. Please forgive me if this is the wrong forum :) We're in the process of creating

Re: [SC-L] Programming language comparison?

2008-02-05 Thread Steven M. Christey
On Mon, 4 Feb 2008, ljknews wrote: (%s to fill up disk or memory, anybody?), so it's marked with All and it's not in the C-specific view, even though there's a heavy concentration of format strings in C/C++. It is marked as All ? What is the construct in Ada that has such a

[SC-L] Silver Bullet: spaf transcript

2008-02-04 Thread Gary McGraw
hi sc-l, As you probably know, around half of the Silver Bullet podcasts are printed as the Interview department of IEEE Security Privacy magazine. We just put a transcript of the spaf (Gene Spafford) interview on the website:

[SC-L] Silver Bullet: Ed Amoroso

2008-01-31 Thread Gary McGraw
hi sc-l, Last week we released the 22nd edition of Silver Bullet. This time, I have a conversation with Ed Amoroso, CISO of ATT. Ed has a deep interest in software security and has been a high level executive champion for years. In the podcast we discuss software security, bugs/flaws,

<    7   8   9   10   11   12   13   14   15   16   >