[Info-vax] FTP FYI
Stephen Hoffman
seaohveh at hoffmanlabs.invalid
Wed Nov 25 15:35:07 EST 2020
On 2020-11-25 19:55:33 +0000, Dave Froble said:
> On 11/25/2020 11:24 AM, Stephen Hoffman wrote:
>> On 2020-11-25 14:46:00 +0000, Dave Froble said:
>>
>>> Perhaps we should be a bit more focused on the issue?
>>>
>>> From what I was reading, the issue was catching data corruptions, not
>>> security. Isn't it sort of silly to introduce security into another
>>> issue? A checksum either works, or it doesn't. If it works, doesn't
>>> that solve the potential issue?
>>>
>>> Or maybe I don't understand the issue ...
>>
>> OpenVMS is "the most secure operating system on the planet" 🤣, which
>> means that vendor and third-party developers have thought about both
>> non-malicious corruptions and about actively-malicious corruptions,
>> right?
>>
>> Same applies for the default choice for random-number generation: use a
>> cryptographically secure random number generator, absent very specific
>> reasons to use a lesser generator. Or a lesser message digest hash.
>>
>> Or somewhat more succinctly, choose and use and offer and work toward
>> secure defaults, absent specific reasons not to.
>>
>> We are all working toward actually living up to that "the most secure
>> operating system on the planet" claim, right?
>
> Actually, no.
>
> Why, because security is so much more than an OS, or any other single thing.
>
> I find it irritating when security is not the topic, that some feel
> that they have to introduce it into a topic, where it is not an issue.
>
> If it ain't broke, don't fix it ...
>
> YMMV
We should all have bad checksums, bad defaults, bad designs, bad APIs,
and bad documentation, right?
telnet, FTP, DECnet, AUTODIN-2 CRC32, MD5, that was good enough for our
ancestors, so it's good enough for us, right?
Do I like that we're increasingly forced to choose insecurity or to
update our app code? No. I've commented around frameworks to help
incrementally isolate some of that, as have others.
But change is the development world that we're increasingly all
residing within. With the occasional breaking changes and/or source
code changes, yes.
And awful defaults and sentiments including "you should have known
better than to use the defaults" don't help our app development and
maintenance efforts.
Put differently... If the data here is important enough, then MD5 and
AUTODIN-2 CRC32 and ilk are broken.
And if the data is not important, the defaults should still be reliable
and robust.
--
Pure Personal Opinion | HoffmanLabs LLC
More information about the Info-vax
mailing list