![]() |
Freethought & Rationalism ArchiveThe archives are read only. |
![]() |
#11 | |
Veteran Member
Join Date: Apr 2003
Location: San Francisco Bay
Posts: 1,144
|
![]() Quote:
|
|
![]() |
![]() |
#12 | |
Veteran Member
Join Date: Feb 2001
Location: Hiding from Julian ;)
Posts: 5,368
|
![]() Quote:
|
|
![]() |
![]() |
#13 | |
Veteran
Join Date: Jan 2002
Location: Washington, the least religious state
Posts: 5,334
|
![]() Quote:
If you haven't heard of Unix exploits since Morrison then you haven't been listening very hard. There were a large number of exploits after the Morrison worm, and exploits continue to be found in various popular UNIX systems such as Solaris (Sun). A system administrators life is not an easy one (sung to the tune of Gilbert & Sullivan.) A very quick search shows a Linux root vunerability found this January. (No I won't post a link because I don't believe in making hacker's life easier.) I consider the very basic problem to be that both Unix, Linux and much of Microsoft were written in C/C++ which has no boundary checking on arrays. Unchecked array bounds are a major area of exploits and it requires a great deal of care on the programmer's part to avoid making such a hole. Some C runtime library functions don't even let you pass the size of the array that they fill as an argument, meaning that you were automatically open to a buffer overrun. In the early C days stuff didn't work well enough that it was even an interesting exercise to try to crash programs. I say this as an expert C/C++ programmer who has worked with (and liked) those languages for well over a decade. hw |
|
![]() |
![]() |
#14 |
Veteran Member
Join Date: Nov 2001
Location: South Africa
Posts: 2,194
|
![]()
If more programs are written in platform-independent languages and technologies like Java and SOAP, and even multi-platform compilable code like Kylix/Delphi, a wider spectrum of OSs would be possible (and, I think, beneficial).
If my memory serves me correctly the most unhackable Web server in the world is as a bottom-up web server. Its a Web server OS rather than a Web server on Linux or a Web server on Windoze. So theres a case to be made for more specialised operating systems. More widespread use and support of platform-independent technologies would encourage this, I think. Also, PC's have reached the point where sandboxing is more feasable. A number of my associates, for instance, run security-risk tasks such as internet activities in sandbox environments like VMWare. If the sandbox environment is sufficiently well coded to prevent things like buffer overruns, even high-risk programs with such bugs can't "see" resources outside of the sandbox or affect them. |
![]() |
![]() |
#15 | |
Junior Member
Join Date: Dec 2002
Location: Boston, MA
Posts: 64
|
![]() Quote:
I love C++ ~ToM |
|
![]() |
![]() |
#16 | ||||||
Veteran Member
Join Date: Feb 2001
Location: Hiding from Julian ;)
Posts: 5,368
|
![]() Quote:
Quote:
![]() Quote:
Quote:
Quote:
Quote:
Heard of inline assembler? This stuff had inline pascal. INLINE PASCAL! I'm serious, 75% of the code was inline pascal, and not even GOOD pascal. Whoever wrote that code, or the compiler that accepted that code, should be taken out and shot. Or at least pied repeatedly. That obviously wasn't C's fault, it was the programmers that abused it. |
||||||
![]() |
![]() |
#17 | |
Veteran Member
Join Date: Feb 2001
Location: Hiding from Julian ;)
Posts: 5,368
|
![]() Quote:
|
|
![]() |
![]() |
#18 |
Veteran Member
Join Date: Jun 2000
Location: Montreal, Canada
Posts: 3,832
|
![]()
Most information security professional believe that Linux will suffer security problems similar to Windows as its market share grows. The open source nature of Linux will not necessarely help it in this field, as long as serious auditing is not systematicly done on the code (the way OpenBDS does it).
As for the "it's the role of programers to ensure security in their code", I personnaly don't believe it's a realistic solution. For 95% of the projects out there, it's much more efficient to simply move development to programming languages supporting array boundaries checking. |
![]() |
![]() |
#19 | ||
Senior Member
Join Date: Mar 2003
Location: Canada
Posts: 792
|
![]() Quote:
Linux will probably never reach the level of insecurity that Windows has reached, regardless of its popularity. Windows will probably never again be as insecure as it has been in recent years because the threat of some semblance of competition has finally forced Redmond to treat security as more than just a public relations problem. We have probably seen the worst of insecure design in operating systems, though the actual frequency of attempts to exploit these flaws, and the damage done by exploiting security flaws could easily be higher than anything we've seen to date, especially as long as untrained users remain a major source of insecurity. But the basic design philosophy of Unix insulates it from a lot of the sources of insecurity that plagues Windows. A lot of the problems with Windows are related to intentional operating system features that are being used in the way they were intended, but for malicious purposes. (For example, a lot of worms propagate using a feature of Windows and Outlook. No one intended for the feature to be used for the purpose of spreading a worm, but the feature is being used the way it was designed to work; there's no buffer overflow or heap corruption or other bugs being exploited.) In principle, you could make Linux behave that way, but you would really have to work at it. It's not something the operating system was designed to do out of the box. Even Microsoft is starting to take this tack with new versions of Windows: potentially exploitable features that were once turned on by default (like IIS) are now disabled by default and must be explicitly turned on by the end user. Quote:
|
||
![]() |
![]() |
#20 | |||
Junior Member
Join Date: Feb 2004
Location: Pennsylvania
Posts: 84
|
![]() Quote:
Quote:
Quote:
One of the biggest problems faced is the buffer overflow, which allows malicious data to be inserted into memory that may cause security leaks. As I stated before, it's impossible to design any secure program. In order for a computer system to be 100% secure, every portion of the program must be 100% secure, and this requires having every piece of code that runs on that machine checked for flaws and compatability with the rest of the machine. One single line of flawed code can result in a malicious attack opening a connection to your computer and modifying any other piece of code. The way I see making secure computers is not in spending the time to design secure software (because it is mostly secure), but to provide a public awareness system to warn users of attacks and how to protect themselves. This may involve updating your virus scanner or implementing an advanced firewall, or just telling the person not to download the coolPic.jpg.exe file in their e-mail. |
|||
![]() |
Thread Tools | Search this Thread |
|