Re: [SC-L] Functional Correctness

2009-08-25 Thread Pravir Chandra
Well, this topic gets muddy pretty quickly since I agree with many of
the comments made on this thread. We have to be careful with hype and
claims made by new models (BSIMM and OpenSAMM in particular) since
depending on how the 'rest of the world' sees them speaks directly to
our credibility as industry experts.

I've tried hard when presenting OpenSAMM to fully claim that the model
is chocked full of value judgements about what organizations SHOULD be
doing to make a justified argument (qualitatively) that the software
they produce has a degree of assurance built-in. Is it a guarantee?
No. Is it still valuable? Absolutely. Before, we had no ability to
make an apples-to-apples comparison between two organizations, and the
model helps that. We also didn't know how to quantify iterative
improvement very well or explain the breadth of the software security
problem to people either, and OpenSAMM helps that too. I disagree with
the remark that maturity models are only useful to companies starting
with nothing, because I've seen firsthand how OpenSAMM has helped
people (already doing a lot for assurance) think through aspects of
the software security problem that fell outside their tunnel-vision.

Now, on to the sticky topic of value judgements. Based on how I've
seen the BSIMM presented, one might think that at face value, it is
somehow more free of author/contributor value judgements than OpenSAMM
or other secure SDLC models (I've read several articles referring to
these as 'alchemy'). This is simply not true. I, for one, agree with
Brad that claims of a scientific nature need to be extremely carefully
qualified. At the end of the day, we don't yet know enough about
practical methods for improving software security that have much
justification beyond what experts think amounts to a 'good thing'
(excepting formal methods, of course, but I did say practical :). This
is the case for both BSIMM and OpenSAMM.

I welcome comments/questions/flames.

p.





On 8/22/09, Cassidy, Colin (GE Infra, Energy)  wrote:
>
>
> Brad Andrews Writes:
>
>> After all, we can just "implement this maturity model and eliminate
>> all our security problems, at least in the application,
>> right?"  That
>> is likely to end up resulting in even more resistance in the future
>> when management questions why they need to keep spending more for
>> software security, a secure architecture, etc.  Don't people learn
>> what they need to know at some point?
>
> I don't thinks that's ever been the case that you can just apply your model
> and all will be well Microsoft didn`t release their SDL and said "there all
> our software will now be secure", they're constantly evolving their
> processes.
>
> Also some of the activities within the BSIMM are about constant improvement
> and keeping up with the latest trends, so even just following the BSIMM your
> processes are never static.
>
>> I don't think we will ever be static.  As soon as we remove the low
>> hanging fruit, the fruit higher up the tree will be the problem.
>
> Or, the fruit on another tree :) who's attacking the OS now when the apps
> are so easy to attack
>
>> This isn't to say a maturity model is useless, but I remain
>> skeptical
>> that it will live up to the "hype" (low key now, but there) it is
>> being presented with.
>
> I think that the models (both BSIMM and OSAMM) help to provide a framework
> and a direction to those that have no real security practices at all.  Or
> allow a measurement of existing process and see where their weaknesses are.
> That and the senior management like the pretty graphs even if they don't
> know what it means :D
>
> CJC
>


-- 
~ ~  ~ ~~~ ~~ ~
Pravir Chandra  chandralistorg
PGP:CE60 0E10 9207 7290 06EB   5107 4032 63FC 338E 16E4
~ ~~ ~~~ ~  ~ ~
___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
___


Re: [SC-L] Functional Correctness

2009-08-24 Thread Cassidy, Colin (GE Infra, Energy)
 

Brad Andrews Writes:

> After all, we can just "implement this maturity model and eliminate  
> all our security problems, at least in the application, 
> right?"  That  
> is likely to end up resulting in even more resistance in the future  
> when management questions why they need to keep spending more for  
> software security, a secure architecture, etc.  Don't people learn  
> what they need to know at some point?

I don't thinks that's ever been the case that you can just apply your model
and all will be well Microsoft didn`t release their SDL and said "there all
our software will now be secure", they're constantly evolving their
processes.

Also some of the activities within the BSIMM are about constant improvement
and keeping up with the latest trends, so even just following the BSIMM your
processes are never static.
 
> I don't think we will ever be static.  As soon as we remove the low  
> hanging fruit, the fruit higher up the tree will be the problem.

Or, the fruit on another tree :) who's attacking the OS now when the apps
are so easy to attack

> This isn't to say a maturity model is useless, but I remain 
> skeptical  
> that it will live up to the "hype" (low key now, but there) it is  
> being presented with.

I think that the models (both BSIMM and OSAMM) help to provide a framework
and a direction to those that have no real security practices at all.  Or
allow a measurement of existing process and see where their weaknesses are.
That and the senior management like the pretty graphs even if they don't
know what it means :D

CJC


smime.p7s
Description: S/MIME cryptographic signature
___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
___


Re: [SC-L] Functional Correctness

2009-08-22 Thread Jim Manico
We are approaching huge industry-wide application security critical  
mass for the first time. Now is the time to strike. If all we teach is  
input validation+canonicalization, query parameterization, and output  
encoding, we stop xss and sqli via education


Jim Manico

On Aug 21, 2009, at 11:54 AM, Brad Andrews  wrote:



I completely agree, though how are we really going to reach this  
point?  We have been talking about this at least since I got into  
development in the early 1980s.  We are not anywhere closer, though  
we have lots of neat tools that do lots of neat stuff.   
Unfortunately, our programs are also a lot more complicated, making  
the "correct" proof much more difficult.


Can we really believe it is "just around the corner" to prove this?

--

Brad Andrews
RBA Communications
CISM, CSSLP, SANS/GIAC GSEC, GCFW, GCIH, GPCI


Quoting "Cassidy, Colin (GE Infra, Energy)" :


Martin Gilje Jaatun wrote:


Karen, Matt & all,

Goertzel, Karen [USA] wrote:
> I'm more devious. I think what needs to happen is that we
need to redefine what we mean by "functionally correct" or
"quality" code.

___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com 
)

as a free, non-commercial service to the software security community.
___

___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
___


Re: [SC-L] Functional Correctness

2009-08-22 Thread Brad Andrews


Now that you mention it

I was listening to the CERT podcast where you and a couple of others  
discussed the BSIMM (probably a while back since I am well behind on  
those).  You made a statement along these lines and I immediately  
thought that I disagreed!  :)


I don't think software security is as simple as that.  I do agree that  
companies can (and should) do far more than they do and that many  
things could be eliminated with very mechanical fixes, but I don't  
think that gives a good long-term perspective.  I also think that it  
will set management's expectation at a level that will ultimately be  
harmful.


After all, we can just "implement this maturity model and eliminate  
all our security problems, at least in the application, right?"  That  
is likely to end up resulting in even more resistance in the future  
when management questions why they need to keep spending more for  
software security, a secure architecture, etc.  Don't people learn  
what they need to know at some point?


I don't think we will ever be static.  As soon as we remove the low  
hanging fruit, the fruit higher up the tree will be the problem.


This isn't to say a maturity model is useless, but I remain skeptical  
that it will live up to the "hype" (low key now, but there) it is  
being presented with.


I am sure this is not as smoothly presented as it needs to be, but I  
am fairly certain of the general thrust of my conviction.  I suppose  
20+ in software development helps.


--

Brad Andrews
RBA Communications
CISM, CSSLP, SANS/GIAC GSEC, GCFW, GCIH, GPCI


Quoting Gary McGraw :

Software security is an intensely practical problem that will   
require a practical approach.  By studying organizations that are   
doing a decent job, perhaps we can draw some practical lessons.
That's precisely what we're up to with the BSIMM .


___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
___


Re: [SC-L] Functional Correctness

2009-08-22 Thread Gary McGraw
hi sc-l,

There are many important security researchers who have given up on proving 
things about software as non-practical.  Among them: Ross Anderson, Virgil 
Gligor, Bob Blakely, and Fred Schneider.   All four of those guys have been 
past silver bullet victims, and each time we discussed the antiquated notion of 
formal approaches to software development.

Software security is an intensely practical problem that will require a 
practical approach.  By studying organizations that are doing a decent job, 
perhaps we can draw some practical lessons.  That's precisely what we're up to 
with the BSIMM .

gem

http://www.cigital.com/~gem

On 8/21/09 11:54 AM, "Brad Andrews"  wrote:



I completely agree, though how are we really going to reach this
point?  We have been talking about this at least since I got into
development in the early 1980s.  We are not anywhere closer, though we
have lots of neat tools that do lots of neat stuff.  Unfortunately,
our programs are also a lot more complicated, making the "correct"
proof much more difficult.

Can we really believe it is "just around the corner" to prove this?

--

Brad Andrews
RBA Communications
CISM, CSSLP, SANS/GIAC GSEC, GCFW, GCIH, GPCI


Quoting "Cassidy, Colin (GE Infra, Energy)" :

> Martin Gilje Jaatun wrote:
>
>> Karen, Matt & all,
>>
>> Goertzel, Karen [USA] wrote:
>> > I'm more devious. I think what needs to happen is that we
>> need to redefine what we mean by "functionally correct" or
>> "quality" code.
___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
___


___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
___