[13564] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: An attack on paypal

daemon@ATHENA.MIT.EDU (Bill Frantz)
Tue Jun 10 22:26:36 2003

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
In-Reply-To: <4.2.2.20030608173129.00a99bb0@mail.earthlink.net>
Date: Tue, 10 Jun 2003 15:39:38 -0700
To: Anne & Lynn Wheeler <lynn@garlic.com>
From: Bill Frantz <frantz@pwpconsult.com>
Cc: "Email List: Cypherpunks" <cypherpunks@lne.com>,
	"Email List: Cryptography" <cryptography@metzdowd.com>

At 5:12 PM -0700 6/8/03, Anne & Lynn Wheeler wrote:
>somebody (else) commented (in the thread) that anybody that currently
>(still) writes code resulting in buffer overflow exploit maybe should be
>thrown in jail.

A nice essay, partially on the need to include technological protections
against human error, included the above paragraph.

IMHO, the problem is that the C language is just too error prone to be used
for most software.  In "Thirty Years Later:  Lessons from the Multics
Security Evaluation",  Paul A. Karger and Roger R. Schell
<www.acsac.org/2002/papers/classic-multics.pdf> credit the use of PL/I for
the lack of buffer overruns in Multics.  However, in the Unix/Linux/PC/Mac
world, a successor language has not yet appeared.

YMMV - Bill


-------------------------------------------------------------------------
Bill Frantz           | Due process for all    | Periwinkle -- Consulting
(408)356-8506         | used to be the         | 16345 Englewood Ave.
frantz@pwpconsult.com | American way.          | Los Gatos, CA 95032, USA



---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post