Berkeley CSUA MOTD:Entry 20583
Berkeley CSUA MOTD
 
WIKI | FAQ | Tech FAQ
http://csua.com/feed/
2024/11/23 [General] UID:1000 Activity:popular
11/23   

2001/2/13-14 [Computer/SW/OS/Windows] UID:20583 Activity:high
2/12    I just read CERT Advisory CA-2001-03 and it seems that there
        is a new email virus out there, but it seems to be windows
        specific. I don't quite understand how a email message can
        be a virus? In general, do they exploit buffer overflows in
        the viewing program to start executing thier image rather
        than the viewing program? How does this work?
        \_ A lot of the windows ones are visual basic scripts auto-executed
           by MAPI mail clients, or stupid users who click on them.  Most
           of the email ones I've seen lately dump a bunch of hex strings
           into a file and run the ensuing binary which infects a bunch
           of files and/or sends copies of itself to people in your
           contact lists/address books.  -John
        \_ This one is just an executable; users tend to double-click
           on it, which runs the program.
           \_ So, this "virus" doesn't require any real coding
              skill or OS/App knowledge like the Internet Worm
              of the early 90s? Glad I don't use WinBlows.
              \_ Nope. These viruses depend on the idiocy of the
                 user for their survival. And since there exists
                 a plethora if idiots in the Windows world these
                        \_ Sir Hilfinger talking about condoms? *shudder*
                 viruses tend to spread quite rapidly.
                 \_ Love him or hate him, he's right about the
                    "sandbox" concept. It's not new since Java already
                    does it but it's a good safeguard against even
                    the most idiotic of users:
                    http://www.cs.berkeley.edu/~hilfingr/security.txt
                 \_ There's quite a plethora of idiots using real
                    OSen now too, but not enough to start the avalanche
                    of idiocy that the media calls a "virus" these, and
                    not enough with root access to cause real damage.
                    However, their numbers are quickly growing, and
                    the next big hole in RH may start an epidemic.
                    \_ So what if a virus takes out a RH box, based
                       on the level of people using RH these days
                       its just like a virus taking out a WinBlows
                       box.
                       Recent RH releases remind me more and more
                       of WinBlows. Gnome is just as ugly and slow
                       as M$'s offerings. RH without a gui is okay,
                       but no where near as good as v 4.2.
                       \_ A well designed OS (I'm not saying one
                          even exists) shouldn't depend on having
                          its superuser being a security expert. The
                          its superuser be a security expert. The
                          users shouldn't be a reason of it to
                          fact that there are a lot of newbie RH
                          users shouldn't be a reason for it to
                          schmos on soda to have root access without
                          be vulnerable. If it was well designed it
                          should let people like me and 98% of the
                          schmos on soda have root access without
                          the worries associated with system
                          administration. People still need to own
                          and take care of their own machines. You
                          can't expect every one of them to take a
                          sysadmin certification course, read 20
                          O'Reilly books on security, and constantly
                          monitor CERT advisories.
                          \_ Agreed. I find OpenBSD goes pretty
                             far in this regard.
              \_ Actually, these viruses depend on the greed of Microsoft
                 for their survival.  It is unquestionably dangerous to
                 execute code received by email, yet Windows mail programs
                 do this for you if you simply double-click on them.  And
                 it is well known that if you send 100 people, even
                 literate ones, such an executable, at least some of them
                 will click on it.  So a well-designed mailer won't
                 auto-execute (or offer to auto-execute) stuff that's
                 potentially dangerous.  And in the Microsoft world Java,
                 postscript, and PDF are about the only things that aren't
                 potentially dangerous (they even mis-designed Word to the
                 extent that you can embed worms in it!).

                 so where's the greed part come in, you ask (as opposed to
                 simple stupidity)?  these vulnerabilities have been well
                 known for over 20 years, and have been plaguing Microsoft
                 customers since the advent of the Microsoft Network.  Yet
                 they haven't fixed the problem (until recently).  I believe
                 it's part of Microsoft's strategy to force everyone to use
                 Windows software by encouraging folk to mail everything
                 around in Microsoft proprietary formats.  Look ma!  It's
                 so easy to use!  i can just send Word documents or even
                 programs to my friends and they can just run them!  and
                 those poor folks without Windows can't ... guess they'll
                 have to convert.

                 oh, the recent change i mentioned-- if you download
                 the latest security patch to Outlook (i think), it
                 absolutely prevents you from running all manner of Mo'soft
                 exeuctables:  .bat, .exe, .vbs, .com, ad nauseum.
                 \_ Anyone thinks we can put together a civil lawsuit against
                    Micro$oft for this?
                    \_ Easily. It will cost millions though and probably
                       end up just being a publicity stunt. A great one,
                       though.
2024/11/23 [General] UID:1000 Activity:popular
11/23   

You may also be interested in these entries...
2013/3/25-5/18 [Computer/SW/OS/Windows] UID:54639 Activity:nil
3/25    It's strange that only every other Windows version is a hit.
        NT 4.0: hit
        2000:   flop
        XP:     hit
        Vista:  flop
        7:      hit
	...
2013/2/19-3/26 [Computer/SW/OS/OsX] UID:54611 Activity:nil
2/19    I program a lot by sshing to a Linux cluster.  So I'm used to using
        Xemacs to code.  This works fine from a Linux or Windows workstation,
        but sometimes I have to use a Mac.  On Mac, the meta is usually
        bound to option, but that often doesn't work over ssh for some reason.
        This makes using emacs a real pain.  Any suggestions on how to fix it?
        (Other than "use vi")
	...
2012/3/15-6/1 [Computer/SW/Languages, Computer/SW/OS/Windows] UID:54340 Activity:nil
3/15    Why does MS put double-quotes around the '8' in Windows Server 8, like
        the following?
        - Windows 8
        - Windows Server "8"
        \_ Because when they didn't do it, code didn't see the '\0'
           and went over?  Looks better than '8','\0' *shrug*
	...
2012/2/23-3/26 [Computer/SW/OS/Windows] UID:54312 Activity:nil
2/23    fixboot wrote FAT boot sector to my WinXP hard drive.  How can I convert
        the drive back to NTFS?
        \_ Does C:\WINDOWS\system32\convert.exe work?
	...
2011/12/21-2012/2/6 [Computer/HW/Laptop, Computer/SW/Editors/Emacs] UID:54269 Activity:nil
12/21   In Emacs, how do I make it so that it will resize its screen
        when the maximum resolution of my monitor changes? When I
        use my laptop, my emacs is too big (and I can't resize it
        because the bottom-right corner is not accessible).
        \_ Which OS?  Can't you drag the top border (not a corner) to resize
           the height to be smaller?
	...
2011/12/23-2012/2/6 [Computer/Rants] UID:54271 Activity:nil
12/23   http://venturebeat.com/2011/12/22/uc-berkeley-google-apps
        Oh noes! What Would Bill Gates Do?
        \_ http://lauren.vortex.com/archive/000701.html
           Microsoft to Transition Corporate IT to Google Apps
	...
2011/11/27-2012/1/10 [Computer/HW/Drives] UID:54244 Activity:nil
11/27   CalMail has been down for a few days (hardware failure and database
        corruption -- sounds like fun!) and is starting to come back online.
        Looks like they're planning to outsource all campus mail to either
        Google Apps or Microsoft 365 as part of Operational Excellence.
        <DEAD>kb.berkeley.edu/jivekb/entry!default.jspa?externalID=2915<DEAD>
        \_ http://ist.berkeley.edu/ciocalmailupdates/november-30-2011
	...
2011/11/8-30 [Computer/SW/Security, Computer/SW/OS/Windows] UID:54218 Activity:nil
11/8    ObM$Sucks
        http://technet.microsoft.com/en-us/security/bulletin/ms11-083
        \_ How is this different from the hundreds of other M$ security
           vulnerabilities that people have been finding?
           \_ "The vulnerability could allow remote code execution if an
               attacker sends a continuous flow of specially crafted UDP
	...
2011/5/19-7/30 [Computer/SW/Security] UID:54110 Activity:nil
5/19    Uh, is anyone still using this? Please mark here if you post and
        haven't added this yet. I'll start:
        \_ person k
        \_ ausman, I check in about once a week.
        \_ erikred, twice a week or so.
        \_ mehlhaff, I login when I actually own my home directory instead of
	...
Cache (8192 bytes)
www.cs.berkeley.edu/~hilfingr/security.txt
A summary of comments on the subject of the Love Bug virus and related issues, starting with a flame from yours truly. Basically, their commentary implied (intentionally or not) that viral attacks of this nature are unavoidable, and when they (inevitably) occur, it requires active efforts on the part of the virus-scanning industry to produce countermeasures and users must be ever-vigilant to make use of the latest countermeasures as soon as they are available, and there will always be a window (hopefully narrow) during which the attacks succeed. As far as I can see, the truth of the matter is that (1') viral attacks of this nature are in principle entirely avoidable (even if one insists on having executable attachments), (2') their avoidance should not require ongoing active efforts, but (3') their avoidance DOES require some care and re-design on the part of software vendors (most notably Microsoft). As long as the public continues to believe 1-3, there will not be the pressure to accomplish 1'-3', so programs such as the one I cited are in fact detrimental to network security. I reluctantly contemplate getting publicly into the fray. First, though, I solicit your advice and comments on how most effectively to proceed. Although my remarks apply to a range of different applications, I was referring specfically to the content of the article in question: e-mail attachments. There is, of course, an obvious existence proof: I am NEVER infected by these viruses and never will be since I don't EVER look at (potentially) executable attachments except under duress and when I am very sure of their provenance. Personally, I doubt that the value added of executable attachments outweighs the risks. But let's, for the sake of argument, assume that there is some substantial value to them. Under the assumption that such attachments are valuable, there is nothing in principle that requires that, once executing, they must have unlimited access to one's system. This brings us to Joe's point: Joe Hellerstein writes: > I'm not sure I disagree with the experts. Until you show me a complete, > usable desktop computing system that's formally proven to be safe on all > inputs, I would concur with their analysis. If you don't analyze behavior > on all inputs in all states, you can't prove anything about opportunities > for exploitation. Now you can jump up and down that people > don't use well-known techniques to do that, but the spirit of their > comments is still mathematically correct. What you are saying is that because we are human, there will be bugs -- errors -- in our system security software. They were implying that successful infection by a virus is NOT the result of an error in our system software, but that our system software by its nature must inherently allow infection by novel viruses for at least the brief period before someone takes action --in effect that not even God could write a (usable) system that would keep out e-mail viruses. Remember the nature of the security systems these guys are advocating -- mutations of a virus performing a particular attack can get through. In contrast, the nature of errors in traditional OS security (as addressed, say, by security patches from Sun) is that when the error is patched, an infinite set of related attacks, regardless of mutational disguise, are forever prevented. That's what I meant by my remark concerning the pernicious nature of the biological metaphor at the retreat: we don't get infected because there are errors in our makeup, we get sick because given the design of our immune systems, we MUST be subject to attack by new (or modified) organisms. In contrast, OS's get "sick" because of buffer overruns, failures to encrypt, failures to evaluate things in the proper protection domain, and other (correctable) ERRORS. Even if we never reach perfection, we CAN get closer to it. These experts I am railing against, by contrast, imply that it is impossible EVER to get more secure. Granted, I don't know if they've actually thought about the implications of what they've said, or whether they'd change their tune when faced with my objections, but that's irrelevant to the fact that they have grievously misinformed the public. By the way, as one who dealt with his first security issue almost 30 years ago, I am not insensitive to how difficult the problem can be. In particular, I think that denial-of-service attacks are particularly sticky (although in the most recent example, the real issue was that there were systems that could be broken into to provide bases for attack). Nevertheless, in contrast to these experts, I know that the situation can be radically improved, and I believe it therefore irresponsible to suggest to the public that they might just as well shrug and accept the inevitable. These programs don't really need to be able to perform completely arbitrary operations without a user's knowledge, consent, or permission. With proper design, they could allow only certain operations (or access only to certain files) without explicit permission, and require "informed consent" for anything exotic. The burden, it seems to me, is on others to give me specific examples of what kinds of potentially dangerous operations really have to be allowed without fetter; I suspect that a careful examination will show that there aren't any such operations. Consider even the question of executing arbitrary shareware. Now in one sense there isn't much of a problem here, since a user presumably understands (in contrast to someone opening a Word document) that he is about to execute an arbitrary piece of code that can do anything, and so he shouldn't be surprised at anything that happens. However, with modern operating systems (even not-so-modern ones), the careful user could set up a special account for trying out shareware -- one with a quota and perhaps with limited net access, for example. Such "sandbox account" could be made to implement rather elaborate security policies. Of course, such treatment would not work for a utility program, but at least it is the user's decision -- as informed as he wants it to be --whether to use the utility. My point is that if relatively straightforward techniques like this can limit the damage done by rogue shareware, we ought to be able to do a really good job with Word documents. Poorly designed security is onerous, and apt to be circumvented, but well-designed security measures can be pretty convenient. I use ssh, for example, which allows very convenient access between machines. To make the security-is-too-much-trouble argument properly, one would have to produce examples of important classes of functionality that FUNDAMENTALLY require burdensome security measures to run safely. It's not enough even that they NOW require such measures, since I readily acknowledge that there is work to be done. I have yet to see a single example of an important functionality with insurmountable, INHERENT security problems. I wrote: >> Nevertheless, in contrast to these experts, I know that the >> situation can be radically improved, and I believe it therefore >> irresponsible to suggest to the public that they might just as well >> shrug and accept the inevitable. In response to which, Joe Hellerstein wrote: >Might this be the crux of your irritation? I >suppose your analogy in virus-land here would be to convene a group of family >planning "experts" to conclude that "AIDS happens", it's part of planetary >evolution that people will die from sex and drug use, and the hell with condoms >and clean needles. I agree that a little bit of >"safe computing" religion from our friends at the OS companies would go a long >way. Yes, this is the crux of my ire (it is stronger than irritation). Even here, though, beware of biological metaphor: in contrast to the situation with human sex, my point is that it is entirely reasonable to expect "automatic condoms" from vendors, so that users know when they do unsafe things and those unsafe things are pretty rare. The macro > facilities in Word and Excel are useful to some users, and because of the > way the applications are used, macros should travel with the under...