lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <242a0a8f0603290730j753878d7g730a81e2ad056a1@mail.gmail.com>
Date: Wed Mar 29 16:30:39 2006
From: eaton.lists at gmail.com (Brian Eaton)
Subject: 4 Questions: Latest IE vulnerability,
	Firefox vs IE security, User vs Admin risk profile,
	and browsers coded in 100% Managed Verifiable code

On 3/28/06, Pavel Kankovsky <peak@...o.troja.mff.cuni.cz> wrote:
> On Mon, 27 Mar 2006, Brian Eaton wrote:
> > You lost me here.  How would you design a MAC policy that lets firefox
> > remember my password for a web site, but doesn't let arbitrary code
> > running via a buffer overflow get at that same password?
>
> Let's call the object where the password is stored P, the subject
> representing the site where P is used X, and the subject representing an
> arbitrary evil site Y.
>
> The (partial) mandatory policy is as follows:
> 1. X has "need to know" for P and is allowed to read it.
> 2. Y (or any other site) is not allowed to read P.
>
> As soon as the browser process reads P, its (potential) ability to send
> any data to Y is lost forever because information flow from P to Y is
> prohibited by the mandatory policy. This is a dynamic variant of the
> *-property of the Bell-LaPadula security model.

Ah, OK, I see what you're talking about now.  I hadn't considered the
possibility of applying ACLs to network connections.  The policy
design would be fairly tricky.

For one thing, you have proxy servers.  When using a proxy, nearly all
of the connections are going to the same host.

Also, you have to deal with the many-to-many mapping of web sites to
IP addresses on the web.  The ACL policy needs to say that the site
"www.example.com" has access to the password, but it is entirely
possible that "www.example.com" shares an IP address with several
other sites.

Regards,
Brian

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ