Secure Coding mailing list archives
Re: Hypothetical design question
From: "Greenarrow 1" <Greenarrow1 () msn com>
Date: Fri, 30 Jan 2004 14:17:33 +0000
I have been reading all the posts, inre: Hypothetical design question. It seems to me to be almost equally proportioned as to where the security break occurs. Mail client, OS, programmer, IT personnel or user. The crossover has occurred as I have received examples of the threat now on Linux machines as another variant which points towards not being OS confined. Instead of placing responsibility on others why isnt there any points towards overlapping amongst all involved. Ie, email client towards coding, OS, programmers and IT towards developing interlaced programs and finally a mass media blitz towards all users (ie, newspapers, TV, radio, Isp's, all connection medias). One point to make is no matter how secure ones makes the program if the individual user does not have the knowledge to enforce or use such program it is worthless. Eradicating attachments and zip files is about as impossible as getting rid of spam. Adding more security functions to the OS while being a supported idea lacks the fundamentals of anyone using them. In my field I get to see and talk to users (from corporate IT's down to the unknown small home user). Until there is a full educational advancement towards teaching all users the importance of a secured environment no matter what programmers, IT departments or OS makers do there will be a continous threat towards the internet. All this talk of better securing programs still lacks the basic fundamental of educating the common user and until this is accomplished it will not succeed. To make my point, babys are born and yes they learn by watching and copying what others do, but to succeed in life they also mush have educational teachings, schooling, whatever to survive in the world. If the parent(s) do not point the child towards this the child only learns the basic teachings of the parent. This is also true on the internet or of owning a computer. Regards, George Greenarrow1 InNetInvestigations-Forensics ----- Original Message ----- From: "Kenneth R. van Wyk" <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Sent: Tuesday, January 27, 2004 1:38 PM Subject: [SC-L] Hypothetical design question
It's been a quiet day here on SC-L -- most likely, many of us are busy blocking or deleting copies of the mydoom worm that's floating around... So here's a hypothetical but topical situation to consider. Say you're fed up with the email client that's installed throughout your company because it seems to provide little more than a virus/worm petri dish. So, you decide to design (yet another) alternative email client that will help alleviate at least some of the problems in the current one. However, you realize that there's an uphill challenge -- like trying to put whipped cream back into a can, the user community has grown very fond of some of the very features that viruses and worms thrive on (e.g., file attachments that can be executed with a single/double click of a mouse) and you're going to pretty much be forced to somehow design something that keeps the users happy as well as improves the state of email security. (Note that I am NOT referring to spam email; I'm only talking about email borne outbound viruses and worms.) Can it be done? What sort of design features would you put into the application to help prevent the system from being used to propagate viruses -- e.g., compartmentalizing or sandboxing the execution of attachments such that they have no network or file resources? What sort of design/feature trade-offs would you think need to be made? In other words, could an email client be designed and implemented that would satisfy both the users and the security requirements? Or, is the problem too difficult without sacrificing some functionality? Oh, and FWIW, when single-click executable attachments first started appearing in email clients, I vividly recall several people in the anti-virus community claiming that the "house of cards" would come tumbling down. I think that that was something like 10 years ago... Cheers, Ken van Wyk -- KRvW Associates, LLC http://www.KRvW.com
Current thread:
- Re: Re: Hypothetical design question, (continued)
- Re: Re: Hypothetical design question Jose Nazario (Jan 30)
- Re: Re: Hypothetical design question der Mouse (Jan 31)
- RE: Re: Hypothetical design question Michael S Hines (Jan 30)
- RE: Re: Hypothetical design question Ben Corneau (Jan 31)
- RE: Re: Hypothetical design question Alun Jones (Feb 01)
- RE: Hypothetical design question Nick Lothian (Jan 29)
- Re: Hypothetical design question der Mouse (Jan 30)
- Re: Hypothetical design question Glenn and Mary Everhart (Jan 30)
- Re: Hypothetical design question Fernando Schapachnik (Jan 30)
- RE: Re: Hypothetical design question Nick Lothian (Jan 29)
- Re: Hypothetical design question Greenarrow 1 (Jan 30)
- RE: Re: Hypothetical design question Carl G. Alphonce (Jan 30)
- RE: Hypothetical design question Jeremy Epstein (Jan 30)
- Re: Hypothetical design question der Mouse (Jan 31)
- RE: Hypothetical design question Shea, Brian A (Jan 31)
- RE: Hypothetical design question ljknews (Feb 01)
- RE: Hypothetical design question Alun Jones (Feb 02)
- RE: Hypothetical design question ljknews (Feb 03)
- Re: Hypothetical design question Crispin Cowan (Feb 04)
- RE: Hypothetical design question Alun Jones (Feb 04)
- RE: Hypothetical design question dtalk-ml (Feb 04)
- RE: Hypothetical design question ljknews (Feb 01)
