[Info-vax] DCL crashing bug update

Stephen Hoffman seaohveh at hoffmanlabs.invalid
Thu Jul 27 10:40:26 EDT 2017


On 2017-07-27 00:58:51 +0000, clair.grant at vmssoftware.com said:

> OK, I'll give this a shot. Whenever a code change is proposed, however 
> big or small, bug fix or new feature, we try to evaluate everything 
> that could be affected. Original intent (design) is a factor but the 
> bottom line is how the existing code gets changed. People with relevant 
> expertise review code and discuss. Sounds simplistic but that's what 
> happens, has for years. Obviously, every situation is different but 
> generally that's the way it works. Also, everything is reviewed by the 
> test engineers to see if existing tests or new tests are need to 
> properly exercise the changes.

There's a corollary to this design and review process, too.

Years ago, we were dealing with the sorts of shenanigans arising just 
from local and locally-connected folks, and most servers had staff 
assigned.   Our servers ran code written locally, or purchased from 
vendors or third-parties.  Our servers communicated locally with other 
servers we controlled, over a network we controlled.   Then we got 
dial-up.   Our servers started connecting remotely.  The number of 
folks accessing our servers got larger, and we were on the receiving 
end of war-dialing.   Which led to some of us using the "system" 
system-wide password mechanism, too.  Now we have planetary-scale 
access to many of our servers and whether that's directly or 
indirectly, and with far fewer staff covering far more servers.   Our 
servers are parts of massively-connected and networked systems.   We're 
increasingly running code from open-source archives and pre-built 
images from repositories, and it's routine to be running code on 
various of our local networked systems that has been loaded from remote 
servers and variously from servers we don't control.   Some of the 
networks we're connecting to or through and even some of the servers 
we're accessing can be accessible to attackers.   And botnets with 
massive resources continuously probing and testing our security 
continuously, and with ever more sophisticated networking and reversing 
tools available.

For some of us and what we're doing with our servers, we're already in 
a position where we can't trust what's running on our servers, and 
we're increasingly in an environment when we can't trust ourselves and 
what's in our source code repositories and our installed system and 
application configurations, and that's an even larger shift.  Where we 
have to design some of our own systems such that we can't get into them.

All code and all designs that haven't been reviewed in response to 
these changes are suspect.  Code that hasn't been fuzzed is suspect, 
and system and application installations that aren't or can't be 
cryptographically verified are all suspect.   Why?   Because somebody 
is inevitably going to review and fuzz the code.   If that's not us 
reviewing our own code looking for these latent assumptions and these 
now-mistakes, and verifying that our hardware and software and network 
environments are as intended, well, that can be a Bad Day for us.   
Because attackers don't care what combination of vulnerabilities they 
chain together — some down-revision printer exploit gets the attacker 
network access, network access sniffs SCS packets or private DECnet or 
telnet traffic or ARP spoofs and MITM's some HTTP traffic, and those 
unencrypted packets expose the known-weak Purdy password hash (yes, VSI 
is reportedly addressing that) or cleartext credentials or some other 
authentication, and....

I routinely end up working in source code that's ten and twenty years 
and variously older.    Code that was well-designed and that's been 
stable for a decade or two can now be operating in system and network 
environments that it was never designed nor intended nor tested for.   
Some other code was vulnerable as originally designed, but was 
supposedly isolated and all it takes is one bad coffee pot connected on 
the supposedly-still isolated network.

Beyond design reviews and testing reviews and source code reviews and 
fuzzing, we all certainly remember to actively review the state of our 
supposedly-isolated and secure private networks, right?   We've all 
checked our switch and firewall firmware revisions?   For our own 
access control and badge readers, we've all retired and replaced any 
125 KHz or Mifare NFC hardware, right?

Environments and vulnerabilities and risks change.   So must our 
responses and our implementations.  So must our designs, reviews and 
testing.





-- 
Pure Personal Opinion | HoffmanLabs LLC 




More information about the Info-vax mailing list