Home page logo
/

fulldisclosure logo Full Disclosure mailing list archives

Re: Evilgrade 2.0 - the update explotation framework is back
From: "[lesh] Ivan Nikolic" <lesh () sysphere org>
Date: Sun, 31 Oct 2010 17:07:06 +0100

Hm, I'm new to this list. so I find this a bit strange.

Christian, Vladis, are you the same person?
what are your motives?
do you really believe the things you are saying? 
you seem to be just generally negative, jumping from point to point and being very silly.

"Just signing the update packages prevents this attack, so it's not that hard to fix."

In my opinion, all in all, you're creating a yet another overly complex
system with as yet more possible flaws.
Don't forget tat each new line of code is a potential attack vector which
affects any system.

there is a REAL attack vector that needs to be fixed, and you are saying that it shouldn't be fixed as every 
line of code creates a POTENTIAL attack vector?

Only thing, there's the danger of someone using stolen certificates.

a signing key might be stolen, so we shouldn't use it?
do you use passwords chris? why? they might be stolen?
you can't possibly believe that?

Amen to that.

A more subtle issue is the tradeoff issue:  Any time they have a code engineer
spending time building and feeding that code-signing infrastructure is time that
code engineer *isn't* spending writing actual new features the users *want*.

code-signing infrastructure? ofcourse, code for those things is well known, packed in libraries, 
and trivial to use. ofcourse. and...
and bla.
I could go on, but probbably the whole list is aware of those things.

I'm wondering what's going on?
are you payed list-posters from an evil rival company? this is the only idea I have.

* Valdis.Kletnieks () vt edu (Valdis.Kletnieks () vt edu) wrote:
On Sun, 31 Oct 2010 14:24:59 BST, Christian Sciberras said:

In my opinion, all in all, you're creating a yet another overly complex
system with as yet more possible flaws.
Don't forget tat each new line of code is a potential attack vector which
affects any system.

Amen to that.

A more subtle issue is the tradeoff issue:  Any time they have a code engineer
spending time building and feeding that code-signing infrastructure is time that
code engineer *isn't* spending writing actual new features the users *want*.

Which user-requested feature are you going to heave over the side in order to
do code-signing instead?  That question has to enter into the calculus as well.



_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


-- 
PGP 0x96085C00 http://lesh.sysphere.org

Attachment: _bin
Description:

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]