* Matthew Toseland <toad at amphibian.dyndns.org> [2009-01-19 13:02:31]:

> There were at least:
> - A lack of validation on the captchas page which enabled collecting users IP 
> addresses. This involved putting newlines into the headers in order to send 
> extra headers and in particular redirects, and was actively exploited by 
> nextgens to collect IP addresses.

Unless you can prove it that's defamation ;)

> Another variant would be to send an 
> embeddable but dangerous content type such as flash. You have fixed this? 
> Great.
> - A format string vulnerability. I believe this enabled remote code exec, or 
> at least a segfault. This was fixed, but it's a great demonstration of why 
> you need to be *really* careful when using C/C++ for security critical code.
> 

Well, those are the two obvious flaws I found when I reviewed the code a
while ago... I have no doubt that digging futher I can find more.

> But the bottom line is FMS cannot be bundled,

Cannot be bundled "as is". I don't think we should disregard a program
just because it has some security history.

> therefore it is not worth my 
> time to review it. FMS is written in C/C++ and therefore would be difficult 
> for me to review - I missed the format string vulnerability when I reviewed 
> 0.2.X - and it cannot be integrated into the fproxy web interface, it 
> requires a separate daemon and is written in a different language. And until 
> very recently it required a separate newsreader as well, making it extremely 
> user hostile.
> 

Those are valid points. I would add:
        - they are legal implications with bundling someone else's code
          (Especially from an anonymous source: what if he is infringing
someone's copyright? Who would be responsible for it?)
        - there is no way of reliably contacting upstream
          (I couldn't contact SomeDude without publicly disclosing both
vulnerabilities; At the very least he should publish some crypto
keypairs so that we could ensure only him can read it -GPG keys would be
perfect-)
        - reviewing the code is a PITA because no SCM is used
          (that's a criticism I've already made in the past)
        - FMS is adding more and more dependancies on 3rd party libs we
          don't know and don't have the resources to audit

> Freetalk on the other hand can be bundled, and has a better architecture, 
> enabling WoT to be used for WoT-based apps other than forums. Thus I have 
> been helping p0s with Freetalk.
> 

I do think that the architecture of WoT/Freetalk is cleaner too

> On Sunday 18 January 2009 16:14, 3BUIb3S50i 3BUIb3S50i wrote:
> > >From FMS
> > 
> > 
> > SomeDude at NuBL7aaJ6Cn4fB7GXFb9Zfi8w1FhPyW3oKgU9TweZMw wrote:
> > > falafel at IxVqeqM0LyYdTmYAf5z49SJZUxr7NtQkOqVYG0hvITw wrote:
> > >> me again, Toad on FMS:
> > >>
> > >> [16:14] <toad_> Tommy[D]: therefore it is not worth my time to code
> > >> review it, especially as it's had obscure C-based remote code exec vulns
> > >>
> > >> anyone know what these "remote code exec vulns" were?
> > >
> > > There was an issue with form submission that would let another site pass
> > > its own form parameters to FMS.  Also, before the captchas were
> > > validated, it could have been possible to put some nasty code in them
> > > instead of an image.
> > >
> > > Anyway, this argument is about as valid as saying that since Freenet has
> > > known vulnerabilities, and you aren't really anonymous using it, you
> > > shouldn't run it at all.
> > >
> > > This looks like a typical reaction:
> > > A bug in Freenet: It's OK, it doesn't really leak a whole lot of info
> > > about our users.  We'll fix it eventually.
> > > A bug in FMS implementation: OMG, STOP USING IT FOREVER!!!!



> _______________________________________________
> Tech mailing list
> Tech at freenetproject.org
> http://emu.freenetproject.org/cgi-bin/mailman/listinfo/tech
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 197 bytes
Desc: Digital signature
URL: 
<https://emu.freenetproject.org/pipermail/tech/attachments/20090119/2867c8b0/attachment.pgp>

Reply via email to