[SC-L] Opinions on strcpy_s, strcat_s, etc.?

2004-09-01 Thread Jared W. Robinson
Who's had experience using the new strcpy_s, etc. functions? What are your opinions? http://msdn.microsoft.com/library/default.asp?url=/library/en-us/dncode/html/secure03102004.asp http://std.dkuug.dk/jtc1/sc22/wg14/www/docs/n1031.pdf - Jared

Re: [SC-L] Book review - Threat Modeling

2004-08-19 Thread Jared W. Robinson
While the book does have useful information, I'd also encourage people to read NIST publication 800-30 "Risk Management Guide for Information Technology Systems". I'd like it if the authors of "Threat Modeling" had learned a few things from that document -- it would have helped them improve their b

Re: [SC-L] Risk Analysis: Building Security In #3

2004-07-13 Thread Jared W. Robinson
I read the paper, and found it interesting. I read the statistic "50 percent of security problems are the result of design flaws". Where does that number come from? Experience? I also liked the statement, "few traditional methodologies adequately address the contextual variability of risk given ch

Re: [SC-L] opinion, ACM Queue: Buffer Overrun Madness

2004-06-10 Thread Jared W. Robinson
On Wed, Jun 09, 2004 at 03:34:52PM +0100, David Crocker wrote: > Apart from the obvious solution of choosing another language, there are at least > two ways to avoid these problems in C++: > > 1. Ban arrays (to quote Marshall Cline's "C++ FAQ Lite", arrays are evil!). Use > classes from the STL, o

[SC-L] Security ramifications of AOP and AspectJ

2004-05-18 Thread Jared W. Robinson
Does anyone know the security ramifications of using Aspect Oriented Programming such as AspectJ? (http://eclipse.org/aspectj/) Seems like it might make code injection and behavior modification easier, but it doesn't, by itself, make it easier to inject hostile code remotely as with SQL injection

Re: [SC-L] SD Magazine conversation with Bruce Schneier

2004-05-06 Thread Jared W. Robinson
Bruce Schneier frequently talks about the same things that he publishes in his books. So, you may want to get your hands on a copy of "Beyond Fear". I think you can read the last two chapters and get good value out of the book. Also subscribe to Crypto-Gram, his monthly newsletter, if you haven

Re: [SC-L] Missing the point?

2004-04-21 Thread Jared W. Robinson
> Does anyone know more about the Fortify product? Gary mentioned it in > his webcast the other day. Details are sketchy on the Fortify product. It's supposed to be able to analyze C, C++ and Java. See http://fortifysoftware.com and contact them directly if you want to evaluate their product. Se

Re: [SC-L] Report seeks more secure world for software development

2004-04-02 Thread Jared W. Robinson
Is the actual report this one? Security Across the Software Development Life Cycle http://www.cyberpartnership.org/init-soft.html - Jared

[SC-L] Re: Comparison of SubDomain, SELinux and systrace

2004-03-16 Thread Jared W. Robinson
Hi Crispin, Thanks for the detailed response and comparison of SubDomain to SELinux and systrace. As I understand it, if SubDomain-restricted program A starts program B, then B is governed by the SubDomain rules for B, and not by the rules of A. Correct? In theory, an attacker that compromise

Re: [SC-L] Re: Application Sandboxing, communication limiting, etc.

2004-03-16 Thread Jared W. Robinson
> This is exactly what Immunix SubDomain does: define the files and > network activities that each program may access. We use use regular > expressions to specify policy, so for instance, fingerd could be > permitted to read /home/*/.plan and not read anything else. I'm glad to hear that SubDomain

Re: [SC-L] Re: Application Sandboxing, communication limiting, etc.

2004-03-16 Thread Jared W. Robinson
On Fri, Mar 12, 2004 at 04:03:34PM -0800, Crispin Cowan wrote: > Jose Nazario wrote: > > >SELinux. LIDS. systrace (Linux, BSD, MacOS X). a few things on FreeBSD i > >can't recall. > > > SubDomain predates all of these except for SELinux (which has roots that > go back nearly 20 years) and LIDS go

[SC-L] Re: Java sandboxing not used much

2004-03-11 Thread Jared W. Robinson
My company outsourced a C to Java porting project to India, and we ended up having to help them salvage the project. It was obvious that the engineers were inexperienced. All user data (including authentication credentials) was stored in an application directory, completely world-writable. When I

[SC-L] Re: Java sandboxing not used much

2004-03-11 Thread Jared W. Robinson
> I'd go futher - I think it is extremley rare that anyone configures their > sandbox properly. I "do" Java development, and I would guess that less than > 10% of application server deployments are done with the Java security > manager enabled. Complex security systems are often completely ignored

[SC-L] Re: Application Sandboxing, communication limiting, etc.

2004-03-10 Thread Jared W. Robinson
On Tue, Mar 09, 2004 at 07:12:35PM -0500, Bill Cheswick wrote: > One of the things I'd like to see in Linux and Windows is better sandboxing > of user-level programs, like Outlook and the browsers. There have > been a number of approaches proposed over the years, and numerous papers, but > haven't