[67] in WWW Security List Archive

home help back first fref pref prev next nref lref last post

Re: GSS API (as a DLL)...

daemon@ATHENA.MIT.EDU (Fisher Mark)
Thu Aug 18 08:41:37 1994

Reply-To: tcemail!FisherM@is3.indy.tce.com
Date: Thu, 18 Aug 94 04:47:00 PDT
From: Fisher Mark <tcemail!is3.indy.tce.com!FisherM@uunet.uu.net>
To: www-security <uunet!nsmx.rutgers.edu!www-security@tcemail.indy.tce.com>


John Ludeman writes in <9408172232.AA17736@netmail2.microsoft.com>:
>| From: "Alec H. Peterson"  <chuckie@panix.com>
>| Date: Wednesday, August 17, 1994 4:46PM
>|
>| Ramin Firoozye writes:
>| [...]
>| >
>| >The BIG problem specific to security DLL's is that someone bent on 
breaking
>| >security can write a "wrapper" DLL around a security DLL, store all the
>| >stuff it gets from the caller, pass on the result onto the actual DLL 
and
>| >store away the replies as well before passing the reply back up to the
>| >caller. In other words, it becomes much easier to implement a "spoof the
>| >login" type scheme.
>|
>| This is one of the reasons why most (if not all) applications that deal 
with
>| secure data (like /bin/login and /bin/su) should be statically linked.
>
>No, this is not a valid reason.  The above argument implies there is no
>security. If a sysadmin doesn't want this to happen, they must take the
>appropriate security percautions.  If they do not, then *nothing* in
>the system is secure and any program the system might run can do bad
>things.  This again gets into site security issues which is beyond the
>topic of this alias.

My 0.02$US before we drop this...

Just as you must be able to walk before you can run, you must have security 
on the basic system features before you address "www-security".  If any user 
can mount any kind of attack against another user, the system is compromised 
such that WWW security features may be irrelevant.  No user should be able 
modify any executables or paths to executables except for their own private 
programs.

I am not saying that this is necessarily easy or convenient -- just that 
this is what must be done before you can expect that your WWW security 
measures will be effective.
======================================================================
Mark Fisher                            Thomson Consumer Electronics
fisherm@tcemail.indy.tce.com           Indianapolis, IN

"Just as you should not underestimate the bandwidth of a station wagon
traveling 65 mph filled with 8mm tapes, you should not overestimate
the bandwidth of FTP by mail."

home help back first fref pref prev next nref lref last post