> ----------
From: xxxxx@dchbk.us[SMTP:xxxxx@dchbk.us]
Reply To: xxxxx@lists.osr.com
Sent: Friday, August 08, 2003 10:57 PM
To: xxxxx@lists.osr.com
Subject: [ntdev] Re: Regmon(a new puzzle)Responsible companies don’t try to change fundamental design decisions of
the Windows security model, and don’t try to make money by claiming to do
the impossible.There’s only about 20 years of literature on this topic. The Orange Book
being a noteworthy example.A system is secure against an attack when (give or take bugs) it is
impossible to perform the attack. Not hard. Not ‘impossible except on
Wednesdays.’ In some cases, there’s value by making an attack merely
extremely difficult. There’s no value in taking an attack that is already
difficult and making it slightly more difficult.
Sure but we aren’t living in black&write world. OS bugs play very important
role. This week a worm utilizing RPC buffer overflow was able to run code
with local system privileges and installed itself using Run registry key. If
there is a driver protecting this key as Antony wants, it would stop worm
from spreading. Now the question is if it makes sense to write such a
software. From security standpoint the answer is clear: no. Code running
with local system privileges can do virtually anything and can be always
targeted against such a protection and the overall security isn’t improved
at all. On the other hand, the same is true for any existing antivirus. For
privileged code there is always a way how to avoid them. Does it mean
running antivirus or any kind of local protection doesn’t make sense? I
don’t think so. Most of worms, trojans and viruses are written by clueless
script kiddies who modify already existing virus code or exploit. System
protected this way is always vulnerable to targeted sophisticated attack but
can stop most of existing fauna and new mutations. Yes, it can make false
sense of security and probability of targeted attack raises with number of
user of a product. It means, more products, lesser chance of attack. It is
similar with browsers and mailers: most users use IE and Outlook / OE and
most HTML exploits are targeted against this software. With Mozilla there is
much better chance user won’t be infected. Not because Mozilla is better but
because it isn’t so widely used. So if there is a lot of different
“security” software which don’t improve real security and only makes attacks
harder, it can be an improvement for whole 'Net. MS was successful to create
Windows monoculture and monocultures are susceptible to epidemies. Products
of this type can add necessary differences. Developers and users just have
to understand limitations and don’t speak about security when only make
things more obscure.
The other problem is when an inexperienced developer tries to write
something like this and his driver makes system unstable. Then all possible
positive effects are destroyed.
Best regards,
Michal Vodicka
STMicroelectronics Design and Application s.r.o.
[michal.vodicka@st.com, http:://www.st.com]