From owner-freebsd-security Fri Jul 17 09:26:30 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id JAA08026 for freebsd-security-outgoing; Fri, 17 Jul 1998 09:26:30 -0700 (PDT) (envelope-from owner-freebsd-security@FreeBSD.ORG) Received: from obie.softweyr.com ([204.68.178.33]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id JAA08017 for ; Fri, 17 Jul 1998 09:26:27 -0700 (PDT) (envelope-from wes@softweyr.com) Received: from obie.softweyr.com (zaphod.softweyr.com [204.68.178.35]) by obie.softweyr.com (8.8.8/8.8.8) with SMTP id KAA19389; Fri, 17 Jul 1998 10:25:54 -0600 (MDT) (envelope-from wes@softweyr.com) Date: Fri, 17 Jul 1998 10:25:54 -0600 (MDT) Message-Id: <199807171625.KAA19389@obie.softweyr.com> Subject: Re: EMERGENCY: new remote root exploit in UW imapd From: Wes Peters To: freebsd-security@FreeBSD.ORG, cts@internetcds.com Reply-To: Wes Peters In-Reply-To: <199807170035.RAA05041@bangkok.office.cdsnet.net> References: <199807170035.RAA05041@bangkok.office.cdsnet.net> X-Priority: 3 (Normal) X-Mailer: BeatWare Mail-It 1.6 X-BeOS-Platform: Intel or clone Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by hub.freebsd.org id JAA08022 Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org My hidden microphone recorded Craig Spannring (cts@internetcds.com) saying: % C should not be used for trusted programs. The lack of true arrays % with array bounds checking alone makes it too hazardous. How many % buffer overflow attacks would we hear about if the trusted server % programs were written using a language with bounds checking like % Modula-2 or Ada? Zero. And thus we hear from another Luddite. The use of Modula-2 or Ada doesn't guarantee the programmers will take the time to design their programs, does it? These languages don't require you to enter the requirements document and the design document and compile them, nor do they eliminate coding mistakes from the program. They supply some tools, which are also available to C and C++ programmers, in the form of strncpy, snprintf, etc. The ONLY sure way to security is to carefully monitor the performance of your system, and to make sure the developers and maintainers of your system are responsive to the inevitable attacks and compromises. These episodes are the best argument for Open Source systems I can think of. How long would it take Microsoft or Sun to distribute a patched server to their installed base? I'll bet {Free,Open,Net}BSD and Linux get them out much faster. ;^) -- "Where am I, and what am I doing in this handbasket?" Wes Peters Softweyr LLC http://www.softweyr.com/~softweyr wes@softweyr.com To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe security" in the body of the message