tarzeauand debian? and the hurd?
reneand microsoft? :)
tarzeauhah :)
tarzeauno i meant the hurd has it different
tarzeaunothing i could explain with a few sentences on irc here and now, but check #hurd on opn/fn
renefair enough
Stingraysarnold: AFAIK microsoft have 50M lines of code, most of it was written in early 90s and never read in past 5 years :) yes they need a whole army of auditors!
sarnoldStingray :)
fernand0there is another problem: auditing code is not easy
jose_nfernand0: sometimes it is enough to simply question a code snippet :)
reneembrace and extend also doesn't help... not sticking to proven protocols and continually inventing your own additions (see IE, for example) also means you introduce *a lot* of bugs
fernand0question ?
jose_nfernand0: yeah, like saying "hey, this doesn't look right". forces the programmer to look at it again and justify it
fernand0ah
tarzeau... my boss doesn't see the difference between freeware and free software..
fernand0but it'll become af the history of the shepherd and the wolf
fernand0;)
fernand0some companies act if it were like this even with actual problems
renesarnold: to open-sourec specifically I believe there is also another problem. sometimes when I find a bug, I end up not reporting it, bacause I was fixing it myself (I have the source after all ...) then get to far into that, reqrite loads, get stuck halfway, and drop it
renerewrite
docelicThere should a lot of effort be put into advising existing/new programmers how to write new code with at least basic security aspects in mind (in addition to just working on fixing bugs someone made who-knows-when in the past).
tarzeaurene: to that problem debian has a solution, the bug tracking system
tarzeaurene: but that's to debian users/developers only..
renesarnold: good plan, I'll keep that in mind :-)
jose_ndoes sardonix also score vendors? ie "-1: not responsive" or "+5: rapid response, worked closely with community to develop a fix."
jose_ndocelic: there are various guides, the sardonix.org site has a few listed.
docelicok
rielsarnold: one problem I am seeing is that people copy code with security bugs from books and online examples.  Do you know of any effort to audit educational material for security bugs ?
renethe "copying bugs" problem gets even worse with todays (visual-style) click-em-together programs. people just glue existing stuff together, rather than writing it themselves
forkwasn't that Stevens paying for pointing out for errors in his books?
forkyes, he was it, sorry
forknevertheless, quiet a grateful move
docelicconcerning the bugs in online examples and/or books... maybe some people would gather around sardonix to volunteer to audit the code intended for publishing.. so if the original author focuses on functionality, we could add a grain of correctness into it, and prevent mistakes from happening both at the author's and the readers side
tarzeaui'd love to read some old mid eighties unix books...
docelichehe definitely ;) sarnold, prepare a list
tarzeausometimes secure programming isn't that important...
tarzeauor it's not easy to have the border between secure and buggy
tarzeaulike games.. i mean
tarzeauof course it's important to make sure input data is valid
tarzeauand won't cause problems
tarzeaubut that i'd call defenesive/careful programming
docelicwell that's exactly the point.. I wouldnt want programmers to become so paranoid they never finish their application because they think about security too much.. but just eliminating bad software practices surely helps along the way
docelichehe sarnold ;-))
tarzeausarnold: very nice saying :)
rielsarnold: don't forget about games on multiuser machines, that have a shared highscore file
tarzeaui have one too (found on dp.o, debianplanet.org that is) (it's about secure operating systems)
tarzeau"secure by default is only good for good press - that way clueless users get<br>'secure' install. It's the admin that makes system secure, not having closed everything<br>in base system - when you install debian and get only kernel+ash, it won't help anyone."
BorjaI disagree, sarnold ;-)
forki think an example of games is not actually that good. Popular network-capable games (i.e. quake) were leaking in past, and that was really bad and abused
BorjaEven games must be made secure, if they are intended to be exposed to the Internet.
forkoh...
tarzeauthat bad input is with webservers and cgi a thing i guess...
tarzeauwell anything that's networked
BorjaIn fact, gaming machines could become an excellent army of zombies for a DoS being easy targets.
docelicgood point (#linux)
tarzeaui find it not critical if software isn't secure which would cause death/harm to human or other lifeforms
tarzeaulike software in hospitals/devices and airplanes
blackkoaldefine security in application as you understood
blackkoalok thanks
tarzeauwasn't debian used in some nasa project, space shuttle projects? well
tarzeaui don't know how critical that systems were...
sarnoldtarzeau: almost certainly only experimental systems :)
tarzeauopen source *is* used at some places where you wouldn't expect it
tarzeauso sardonix.org is kinda like slashdot.org, advogato.org, freshmeat.net ? where to make an account? what can i do?
blackkoalhttps://sardonix.org/Become_an_Auditor.html
BorjaAnyway, I don't think auditing is the main point.
BorjaSoftware should be stronger by design.
renesarnold: sorry for being clueless, but what is this "karma whore" stuff?
blackkoalpeople who only do anything if the became respect (i think)
docelicrene:  gaining public recognition ;)
BorjaDesign errors are much more serious, and much more difficult to detect in an audit.
renemmm
BorjaYes, it's a great book. Unfortunately few people nowadays has read it :-(
BorjaAnd it was written at a time when security was not an important concern
tarzeauthe goats.cx guy is a karma whore?
BorjaYes, that is what I meant. Audits are not effective against "intrinsic" bugs (I prefer to call them design flaws)
BorjaThat's the point! Education.
BorjaAnd not thinking of software development as an assembly line, a fashionable concept in software engineering
sToneheAdtarzeau, lol
renestrlcpy?
tarzeauand strfry!
sarnoldhehe :)
Beregornmy favorite one ;)
renesarnold: mmm, not a manpage not glib manual entry for it, so I guess we don't have it on linux? :)
renenor
reneglibc
sarnoldrene: indeed, ulrich (glibc maintainer) isn't interested in having Yet Another String Function. Bummer. But it is small enough that it could be autoconfigured or similar.
fernand0there is a nice paper explaining it, iirc
reneI see, thanks...
blackkoalanother question: is there anywhere a website how to write clean code (i mean with clean and good comments, ...? especially how to write comments)
fernand0http://www.openbsd.org/papers/strlcpy-paper.ps
renefernand0: thanks
tarzeaublackkoal: c language?
fernand0it's not long ...
MJesusplease answerd in #linux
tarzeaublackkoal: k&r's is nice and k's practice of programming
tarzeaublackkoal: see linuxbrit.co.uk 's recommended books
blackkoalc, php
blackkoalok
tarzeauomg... don't write c and php on one line
blackkoalwhy?
tarzeauwww.gnu.org/fun/jokes/declarations.html
viZardthat was deep
blackkoallol
sh0nXhehe
sh0nXyou can use aliases too to replace functions ;-)
sh0nXer to
majeuhow can one avoid the problems with the LD_PRELOAD, besides compiling statically
mcpmajeu: using grsecurity features :)
majeui don't use linux
mcpah
mcpwhat then?
mcpbsd?
mcpsunos?
tarzeauhurd?
tarzeauopenstep?
tarzeaudos?
majeuI use several bsds
sarnoldthen hopefully whoever provided your system libraries has put effort into cleaning the environment when setuid/setgid applications get executed :)
mcphehe dos ;)
docelictarzeau: all viable options ;-))))
tarzeauamigaos i forgot!
majeueros
majeu:)
sarnoldmajeu :)
mcpmajeu: there is a project for openbsd which should avoid this kind of things
mcpI wish I remember the name
sarnold"stephanie" ?
majeustefanie?
sh0nXNEVER compile QT and install it when in KDE;-)
majeuI recall that name from somewhere
sh0nXheh
mcphmm, no, it was not stefahnie :)
mcpmom
mcpsarnold: wooohoo
sh0nXhmm
sh0nXquestions
sh0nXhow much of standard open source utils (like core GNU tools) and such get audited?
tarzeaudoes someone audit nethack too?
sh0nXthats pretty bad
crispinSteven Christey's list is a richer form of the pathology list that sardonix already has.
crispinbut there's a defect in the sardonix organization: that list is burried in the audit submission form, and you can't see it until you go to submit an audit.
sh0nXI'd like to see an open source auditing group/consortium
sh0nXbut it takes time/money
sh0nXI see.
sh0nXhow about automated tools that look for things
sh0nXlike buffer overflows
sh0nXintelligent tools that can help us find exploits?
forkok, given we have to live with that whole lot of insecure software, and even that whole lot of years was not enough to fix the tar, there is no hope we get for example xchat straight
sh0nXnice!
forkor any other new and complex application
pflanzeIt would probably be a good idea to use "sandboxing" for applications like browsers, icq or irc clients.
pflanzei.e. running under another user, plus maybe in a chroot.
forkhow about make that sandboxing simple enough to encourage the usage of them?
tarzeaudoes someone know linux se, err selinux?
tarzeaufork: or fast enough
forkyes
sh0nXwith the introduction of LSM to Linux, we can take advantage of Privilage separation. Which can help lower/eliminate exploits even if they are present in code?
forksh0nX: it will not eliminate them. They just will be ineffective in a particalr configuration
sh0nXhmm
sh0nXit's a start though :-)
pflanzeRe 'proving code does not have security flaws is an unsolvable problem': It's only unproveable as long as you don't depart from the view that features are more important than correctness. :)
pflanzei.e. when you are careful from the beginning (like DJB), it should be possible to write 100% secure software.
ijuzwhat is about scanning the source for calls and create corresponding rules for the sandboxing environment?
forkijuz: isn't the count of possible combinations too impossible to cover?
ijuzfork: not for relative small applications, the little daemon has not to unlink files, what was just a silly thought
pflanzeijuz: there are scripts that use strace for this (I've begun writing one myself once), but for big apps: when do you know the app has done all actions it will ever do?
pflanze(Maybe after some point, an interactive "allow this" and "disallow that" would be possible, à la firewalls known from Mswindows)
ijuzpflanze: therefor scanning the source
pflanzeah, misread your statement
docelicsarnold: secure from start? how about that DARPA-funded openssh audit, did you hear about it ? From what I've seen, the resulting patch was as usual, testing size of some variable on few places...
fernand0Thank you to all for comming, and to Seth Arnold for this interesting talk
sarnolddocelic: ah, openssl audit, and yeah, it was pretty usual. :)
sarnolddocelic: it found several errors, which wasn't surprising; i'm surprised it didn't find more. :)

Generated by irclog2html.pl 2.1 by Jeff Waugh - find it at freshmeat.net!