[29005] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Bypassing Personal Firewalls

daemon@ATHENA.MIT.EDU (Johan Verrept)
Mon Feb 24 12:54:46 2003

Message-ID: <3E592B76.9080707@exelsys.be>
Date: Sun, 23 Feb 2003 21:13:42 +0100
From: Johan Verrept <jove@exelsys.be>
MIME-Version: 1.0
To: Shaun Clowes <shaun@securereality.com.au>
In-Reply-To: <5.2.0.9.0.20030222125953.00acd338@mail.securereality.com.au>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit

Shaun Clowes wrote:

> Why do you believe that the responsibility of protecting users from 
> themselves should be bourne by the operating system? People who are 
> using Personal Firewall systems may indeed want to be protected in 
> this fashion but I suspect that for most people this is a non issue.

Actually, this has little to do with protecting a user from himself, 
this has to do with protecting one process from another. How do you 
trust any process you have running if malicious code could have embedded 
itself and you have no way of detecting this?

> When all is said and done, if malicious code can run under your user 
> ID then everything you do is compromised, I can't see much point in 
> giving ourselves a false sense of security.

Perhaps not. But do you see a good reason to allow any process this much 
power over another unrelated process? If this kind of power is needed by 
one process over another, it should be implemented implicitly in both 
processes or the  process should run under superuser UID.

regards,

    J.



home help back first fref pref prev next nref lref last post