TIP: Click on subject to list as thread! ANSI
echo: nthelp
to: Rich
from: Geo
date: 2005-09-15 06:27:28
subject: Re: how not to build a firewall

From: "Geo" 

This is a multi-part message in MIME format.

------=_NextPart_000_0091_01C5B9BE.8B7E1D30
Content-Type: text/plain;
        charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

I don't need a specific scenario, my point is the easier it is to defeat =
a firewall the more likely that it will be defeated and using clear text =
registry entries to allow programs to bypass the firewall is about as =
easy as I can imagine.

What exactly is the problem with having the firewall encrypt those =
entries or at the least when it detects a change to request a password =
from the user as authorization for the change as an on by default =
feature?

Or is it Microsoft needed a simple way to allow software vendors to = phone
home without the users permission?

Geo.
  "Rich"  wrote in message news:4328dd69$1{at}w3.nls.net...
     Just to make this clear.  You are not changing your complicated =
scenario from one where adobe pdf javascript can run an arbitrary EXE to =
one where it can run only tftp plus whatever exe you use tftp to =
download.  Wow.  Can you make this even more silly and still keep a =
straight face?

  Rich

    "Geo"  wrote in message =
news:4328dbce$1{at}w3.nls.net...
    tftp.exe is not arbitrary, it's a known executable in a known =
location. If
    Windows installed in a arbitrary directory (ie if it picked a random =
string
    for the directory name during install) this would not be the case =
and so it
    would make hacking via this technique a whole lot tougher. =
Encrypting the
    registry entry data for the firewall, even if it's only complicated
    obfuscation can make it a whole lot tougher as well.

    Windows doesn't need to be hackproof, it just needs to be a =
nightmare to
    hack, once it's not any fun to hack the hackers will move to =
something else.
    But if you make it easy, well then the path of least resistance..

    Geo.

    "Rich"  wrote in message news:4328c2cf{at}w3.nls.net...
       If you have code running that can run an arbitrary EXE like tftp =
than you
    already own the machine.  You are trying to contrive something =
complicated
    only to try and show that your complicated scenario is a sham.

    Rich




------=_NextPart_000_0091_01C5B9BE.8B7E1D30
Content-Type: text/html;
        charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable








I don't need a specific scenario, my =
point is the=20
easier it is to defeat a firewall the more likely that it will be = defeated and=20
using clear text registry entries to allow programs to bypass the = firewall is=20
about as easy as I can imagine.
 
What exactly is the problem
with having =
the=20
firewall encrypt those entries or at the least when it detects a change = to=20
request a password from the user as authorization for the change as an = on by=20
default feature?
 
Or is it Microsoft needed a =
simple way to=20
allow software vendors to phone home without the users =
permission?
 
Geo.
"Rich" <{at}> wrote in message news:4328dd69$1{at}w3.nls.net... Just to make this = clear. You=20 are not changing your complicated scenario from one where adobe pdf = javascript=20 can run an arbitrary EXE to one where it can run only tftp plus = whatever exe=20 you use tftp to download. Wow. Can you make this even more = silly=20 and still keep a straight face? Rich "Geo" <georger{at}nls.net>=20">mailto:georger{at}nls.net">georger{at}nls.net>=20 wrote in message news:4328dbce$1{at}w3.nls.net...tftp.exe=20 is not arbitrary, it's a known executable in a known location. = IfWindows=20 installed in a arbitrary directory (ie if it picked a random = stringfor=20 the directory name during install) this would not be the case and so = itwould make hacking via this technique a whole lot tougher. = Encrypting=20 theregistry entry data for the firewall, even if it's only=20 complicatedobfuscation can make it a whole lot tougher as=20 well.Windows doesn't need to be hackproof, it just needs to = be a=20 nightmare tohack, once it's not any fun to hack the hackers will = move to=20 something else.But if you make it easy, well then the path of = least=20 resistance..Geo."Rich" <{at}> wrote in message news:4328c2cf{at}w3.nls.net...&nbs= p; =20 If you have code running that can run an arbitrary EXE like tftp = than=20 youalready own the machine. You are trying to contrive = something=20 complicatedonly to try and show that your complicated scenario = is a=20 = sham.Rich= ------=_NextPart_000_0091_01C5B9BE.8B7E1D30-- --- BBBS/NT v4.01 Flag-5
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45)
SEEN-BY: 633/267 270 5030/786
@PATH: 379/45 1 106/2000 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.