This is the exact scenario mentioned earlier as to why using the process name is bad. Anyone can create a process called WORD.
For you to claim you have a filter that allows WORD to read the documents but not other applications is no protection since anyone can rename an image file to word.exe, run it, and then read the documents you are trying to protect.
You claim you also have “other” ways to tell it is WORD. If those other ways are legitimate then use them but comparing against process name has absolutely no “security” value whatsoever.
Neal Christiansen
?
This posting is provided “AS IS” with no warranties, and confers no rights.
-----Original Message-----
From: Dejan Maksimovic [mailto:xxxxx@alfasp.com]
Sent: Saturday, May 04, 2002 03:16 AM
To: File Systems Developers
Subject: [ntfsd] Re: Process Name
The two do have something in common. I can give you one example of why
people need process name as part of the protection in my AFP module.
Most of the customers make document distribution system, where they need
to allow only Word to read the file, but it mustn’t be able to write the
file. Other applications have no access to the file. This case uses process
names very well, and even though you shouldn’t use it for trusting an
application, it does have another cheek.
Regards, Dejan.
Benson Margulies wrote:
I have never understood how anyone can mention ‘process name’ and
‘security’ in the same breath. The NT kernel is not designed to view a
PE file name or process name as the identifier of a security
subject/principal, and so it makes no efforts to guarantee the integrity
of this data.
Anyone can spoof anything in the way of a process or executable name
with a certain amount of effort.
If you are trying to grant access to a particular function in the kernel
only when mediated by a particular piece of code outside the kernel,
then you need to use privileges or something like them. You could, for
example, arrange some sort of cryptographic handshake. A process could
pass a token into the kernel, where it could be stored in association
with a unique id of the process. Or you could require a specific user or
group to be in the token, and run a service as that user that accepts
requests from ordinary folk via, say, shared memory, and then passes the
acceptable ones down to the kernel.
You are currently subscribed to ntfsd as: xxxxx@alfasp.com
To unsubscribe send a blank email to %%email.unsub%%
–
Kind regards, Dejan M. www.alfasp.com
E-mail: xxxxx@alfasp.com ICQ#: 56570367
Alfa File Monitor - File monitoring library for Win32 developers.
Alfa File Protector - File protection and hiding library for Win32
developers.
Alfa Registry Monitor - Registry monitoring library for Win32 developers.
Alfa Registry Protector - Registry protection library for Win32 developers.
You are currently subscribed to ntfsd as: xxxxx@Windows.Microsoft.com
To unsubscribe send a blank email to %%email.unsub%%