lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Mon, 27 Jun 2005 11:07:31 -0400
From: "David A. Wheeler" <dwheeler@....org>
To: bugtraq@...urityfocus.com
Subject: Re: Phishing - feature or flaw


Secure Science Corporation Bugtraq <bugtraq@...urescience.net> said:
> Regarding certain vulnerabilities that are being discovered such as 
> http://secunia.com/multiple_browsers_dialog_origin_vulnerability_test
> 
> Are these really features, or are they flaws now because of the phishing 
> threat vector. Originally javascript/DHTML/DOM is pretty powerful and 
> can do a lot of nasty stuff if someone were inclined. But phishing has 
> caused us to take a look at the once dubbed features of DHTML, and 
> possibly put responsibility onto the browser vendors for fixing these 
> now dubbed "flaws".
> 
> For example, is this a flaw - 
> https://slam.securescience.com/threats/mixed.html

As has been often noted, "without a specification, the behavior
of a system cannot be wrong, it can only be surprising".

In the long term, it would be good idea for the
browser makers to get together, agree on, and _write down_ what
security properties users can count on in their browsers.  E.G., what
threats are they designed to counter? What are their security
objectives & requirements? What countermeasures are the bare minimum?
Then, if a browser did or didn't do something related to
security, people could appeal to that "minimum standard".
If Microsoft (IE), Mozilla (Firefox), Opera, Apple (Safari),
and KDE (Konqueror) agreed on something, it'd probably go somewhere.
That would at least create some sort of basic "floor" people
could more-or-less count on.

But right now, dancing on the head of the pin of whether something
is a "flaw" is pointless.  Browsers are widely used by
ordinary users who simply don't understand this "computer stuff"..
and they won't gain that understanding tomorrow, either.
So, if an ordinary low-knowledge user can be easily tricked into
dangerous behavior by the brower's actions, AND there is a reasonable
countermeasure that the browser could deploy, THEN the browser
should incorporate such a protective measure.  Yes,
'easily' and 'reasonable' and other terms are really ambiguous,
but since there's no real security specification for browsers,
that's where we are at right now. (Yes, I'm fully aware that
these naive users wouldn't read a spec.)


--- David A. Wheeler




Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ