|
|
Subscribe / Log in / New account

Security

Big Ideas for saving the Internet

CIO magazine has run an article called How To Save The Internet. The core idea is that the Internet threatens to collapse under the load of spam, spyware, worms, etc., and that some sort of Big Ideas must be found to save the situation. A few of the suggested ideas merit a look...

The first is "hire a czar." The idea would seem to be that the appointment of a high-level (U.S.) "cybersecurity" official would do something to make our systems more secure. It looks mostly like a bully-pulpit role:

We propose a high-profile surgeon general for information security, who reports to the secretary of DHS. Imagine labels on software like those on cigarettes--Infosecurity General's Warning: The use of software and hardware that is not certified secure can harm your system and other people's systems, and you may be held liable for those damages.

Aside from the idea of how hardware and software would be "certified secure," one could imagine that people in the free software community could have a lot of fun creating warning labels.

Another suggestion is giving vendors incentives to create more secure software. Essentially, it is the return of the product liability idea. This approach may still offer some promise, but it is hard to see how to make it fit with the "no warranties" nature of free software.

Two related items are well described by the title applied to the first: "Treat End Users Like the Dummies They Are." The suggestion to have ISPs provide more filtering, detection, and response services to those who are willing to pay for them is fine. The other one, however, is more problematic:

Let's make all end user devices nonprogrammable.... No one can connect to the Internet on a machine that creates code. If you want a computer to do programming, you would have to be licensed. We could license software companies to purchase programmable machines, which would be completely traceable along with the code created on them.

The idea of "traceable code" would appear to pose some technical challenges of its own. But the idea that you could "save the Internet" by restricting access to programmable devices is truly frightening. There are a few of us out there who see the net as a bit more than a clothing-optional shopping mall. We would not react well to the idea that we would have to be licensed before getting a machine we could hack on.

There is an idea for the creation of reputation servers as an antidote to phishing problem (though, of course, it has to be expressed as "using XML and meta-data to tag websites with safety, reputation, past performance and other security ratings"). Something like that may yet be part of a solution to certain classes of problems. More likely, however, is that it would just become another variant of the (nearly useless) SSL certificate mechanism.

Almost as an afterthought, the article presents a couple of relevant Big Ideas: make a bigger effort to write error-free software, and think carefully about what features any given program should have. Maybe an email client really should not be able to execute code received in messages. One wonders why nobody ever thought of that before.

See the article for the full list of "Big Ideas." For the most part, this article can be dismissed as just another silly journalistic exercise. But the truth of the matter is that people are actually likely to try some of these ideas. Look for a "Code Traceability and Programmer Licensing" initiative in a legislature near you sometime soon.

Comments (16 posted)

New vulnerabilities

Ethereal: Multiple vulnerabilities

Package(s):ethereal CVE #(s):CAN-2005-0699 CAN-2005-0704 CAN-2005-0705
Created:March 14, 2005 Updated:March 28, 2005
Description: There are multiple vulnerabilities in versions of Ethereal earlier than 0.10.10, including:
The Etheric and 3GPP2 A11 dissectors are vulnerable to buffer overflows (CAN-2005-0704 and CAN-2005-0699), the GPRS-LLC could crash when the "ignore cipher bit" option is enabled (CAN-2005-0705) and various vulnerabilities in the IAPP, JXTA, and sFlow dissectors.
Alerts:
Conectiva CLA-2005:942 ethereal 2005-03-28
Red Hat RHSA-2005:306-01 Ethereal 2005-03-18
Mandrake MDKSA-2005:053 ethereal 2005-03-15
Fedora FEDORA-2005-212 ethereal 2005-03-16
Fedora FEDORA-2005-213 ethereal 2005-03-16
Gentoo 200503-16 ethereal 2005-03-12

Comments (none posted)

gnupg: information leak

Package(s):gnupg CVE #(s):CAN-2005-0366
Created:March 16, 2005 Updated:August 19, 2005
Description: GnuPG (and other PGP-like systems) suffers from an information leak which could, in some situations, be used by an attacker to obtain plain text from an encrypted message. See this message for a detailed explanation of the problem. "We know of no real-world application that is affected by this type of attack. It is an attack that requires the active participation of someone who holds the actual key required to decrypt a message. Thus, it is not something you are likely to see."
Alerts:
Ubuntu USN-170-1 gnupg 2005-08-19
Gentoo 200503-29 gnupg 2005-03-24
Mandrake MDKSA-2005:057 gnupg 2005-03-15

Comments (none posted)

grip: buffer overflow

Package(s):grip CVE #(s):CAN-2005-0706
Created:March 10, 2005 Updated:November 19, 2008
Description: Grip, a CD ripper, has a buffer overflow vulnerability that can occur when the CDDB server returns more than 16 matches.
Alerts:
Fedora FEDORA-2008-9604 grip 2008-11-19
Fedora FEDORA-2008-9521 grip 2008-11-19
Fedora-Legacy FLSA:152919 grip 2005-09-15
Mandriva MDKSA-2005:074 gnome-vfs2 2005-04-20
Mandriva MDKSA-2005:075 libcdaudio1 2005-04-20
Gentoo 200504-07 gnome-vfs 2005-04-08
Mandrake MDKSA-2005:066 grip 2005-04-01
Red Hat RHSA-2005:304-01 grip 2005-03-28
Gentoo 200503-21 grip 2005-03-17
Fedora FEDORA-2005-203 grip 2005-03-09
Fedora FEDORA-2005-202 grip 2005-03-09

Comments (none posted)

IPsec-Tools: denial of service

Package(s):ipsec-tools setkey racoon CVE #(s):CAN-2005-0398
Created:March 14, 2005 Updated:April 5, 2005
Description: The IPsec-Tools package is used to build other programs such as setkey and racoon. There is a potential denial of service vulnerability when parsing ISAKMP headers in racoon.
Alerts:
Ubuntu USN-107-1 ipsec-tools 2005-04-05
SuSE SUSE-SA:2005:020 ipsec-tools 2005-03-31
Mandrake MDKSA-2005:062 ipsec-tools 2005-03-31
Gentoo 200503-33 ipsec-tools 2005-03-25
Red Hat RHSA-2005:232-01 ipsec-tools 2005-03-23
Fedora FEDORA-2005-217 ipsec-tools 2005-03-14
Fedora FEDORA-2005-216 ipsec-tools 2005-03-14

Comments (none posted)

luxman: buffer overflow

Package(s):luxman CVE #(s):CAN-2005-0385
Created:March 14, 2005 Updated:March 16, 2005
Description: Kevin Finisterre discovered a buffer overflow in luxman, an SVGA based PacMan clone, that could lead to the execution of arbitrary commands as root.
Alerts:
Debian DSA-693-1 luxman 2005-03-14

Comments (none posted)

MySQL: input validation and temporary file vulnerabilities

Package(s):mysql CVE #(s):CAN-2005-0709 CAN-2005-0710 CAN-2005-0711
Created:March 16, 2005 Updated:July 19, 2005
Description: MySQL (prior to version 4.0.24) suffers from two input validation errors and a temporary file vulnerability.
Alerts:
Fedora-Legacy FLSA:152925 mysql 2005-07-15
OpenPKG OpenPKG-SA-2005.006 mysql 2005-04-20
Debian DSA-707-1 mysql 2005-04-13
Fedora FEDORA-2005-305 mysql 2005-04-05
Fedora FEDORA-2005-304 mysql 2005-04-05
Red Hat RHSA-2005:348-01 mysql-server 2005-04-05
Conectiva CLA-2005:946 MySQL 2005-04-04
Red Hat RHSA-2005:334-01 mysql 2005-03-28
SuSE SUSE-SA:2005:019 mysql 2005-03-24
Mandrake MDKSA-2005:060 MySQL 2005-03-21
Trustix TSLSA-2005-0009 kernel, 2005-03-21
Ubuntu USN-96-1 mysql-dfsg 2005-03-16
Gentoo 200503-19 mysql 2005-03-16

Comments (none posted)

openslp: buffer overflows

Package(s):openslp CVE #(s):
Created:March 14, 2005 Updated:March 21, 2005
Description: The SUSE Security Team reviewed critical parts of the OpenSLP package, an open source implementation of the Service Location Protocol (SLP). During the audit, various buffer overflows and out of bounds memory access have been fixed which can be triggered by remote attackers by sending malformed SLP packets.
Alerts:
Gentoo 200503-25 openslp 2005-03-20
Ubuntu USN-98-1 openslp 2005-03-17
Mandrake MDKSA-2005:055 openslp 2005-03-15
SuSE SUSE-SA:2005:015 openslp 2005-03-14

Comments (none posted)

Ringtone Tools: buffer overflow

Package(s):ringtonetools CVE #(s):
Created:March 15, 2005 Updated:March 16, 2005
Description: Qiao Zhang has discovered a buffer overflow vulnerability in the 'parse_emelody' function in 'parse_emelody.c'. A remote attacker could entice a Ringtone Tools user to open a specially crafted eMelody file, which would potentially lead to the execution of arbitrary code with the rights of the user running the application.
Alerts:
Gentoo 200503-18 ringtonetools 2005-03-15

Comments (none posted)

sylpheed: buffer overflow

Package(s):sylpheed CVE #(s):CAN-2005-0667
Created:March 15, 2005 Updated:April 15, 2005
Description: Buffer overflow in Sylpheed before 1.0.3 and other versions before 1.9.5 allows remote attackers to execute arbitrary code via an e-mail message with certain headers containing non-ASCII characters that are not properly handled when the user replies to the message.
Alerts:
SuSE SUSE-SR:2005:011 multi 2005-04-15
Gentoo 200503-26 sylpheed 2005-03-20
Red Hat RHSA-2005:303-01 sylpheed 2005-03-18
Fedora FEDORA-2005-224 sylpheed 2005-03-17
Fedora FEDORA-2005-211 sylpheed 2005-03-15

Comments (none posted)

Resources

March CRYPTO-GRAM newsletter

Bruce Schneier's CRYPTO-GRAM newsletter for March is out. Topics include the breaking of SHA-1, two-factor authentication, ChoicePoint, and Microsoft's "Ghostbuster" rootkit hunter. "This is too good an idea to abandon. Microsoft, if you're listening, you should release this tool to the world. Make it public domain. Make it open source, even. It's a great idea, and you deserve credit for coming up with it."

Full Story (comments: 1)

Events

Security Masters Dojo

The CanSecWest Security Masters Dojo is happening May 3 and 4 in Vancouver, BC, Canada. It is described as "Advanced and intermediate security training and technology enhancement for information security professionals." Click below for the course details.

Full Story (comments: none)

Page editor: Jonathan Corbet
Next page: Kernel development>>


Copyright © 2005, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds