lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20031009211834.GT28415@surreal.seattlefenix.net>
From: benjamin at seattlefenix.net (Benjamin Krueger)
Subject: Weak response from RH

* Gregory A. Gilliss (ggilliss@...publishing.com) [031007 00:10]:
> Remember last Wednesday's post labeled "Red Hat Certification for..."?
> Red Hat set up their training site so that the training price is displayed
> in the URL?
> 
> Well, Red Hat responded! Here's how: they added a line to the Web page. 
> They didn't change the URL or the price mechanism (you still can amuse
> yourself by making it look like Red Hat will pay you a gazillion dollars
> to take their course). Here's what it say now:
> 
> >Note: Please do not alter the price, date, or location indicated for your
> >selected enrollment or it will not be processed. Thank you!
> 
> In other words, we know that you can screw with our poorly coded Web site,
> and we can't be bothered to fix it, so if you try and fool us we will just
> ignore you.
> 
> Security by Condescension! Go Red Hat - maybe M$ can try this next: please
> do not overflow the buffers in our application or we will not honor your
> EULA <G>
> 
> FreeBSD rules!
> 
> G

Remember that part of your CISSP training where they told you that risk
evaluation is a critical aspect of infosec? I assume you did actually take
that class because you've proudly mounted the title in your signature.

Does this issue pose a big enough risk to divert web development resources
from another project? They've mitigated the problem, making the associated
parties aware of the issue and what to watch for. This seems like a reasonable
approach. What justifies Redhat dedicating more resources to a problem that
they obviously believe has been sufficiently mitigated?

-- 
Benjamin Krueger

"Nothing disables a giant space monkey quicker than an atomic wedgie"

ps. Condescension. How does a request for users to refrain from fooling with
    the web form constitute condescension?


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ