Navigation

Home
Issues & Papers
My Writings
My Music
My Photo Portfolio
Travel Schedule
Administrivia
Random Bytes
blogTrivia
Pop
Byte.org

 

See Also
Tucows
ICANN
R'rar Constituency
My Hotlinks...
My Yahoo!
ICANNWatch
ICANN Blog
Slashdot
That Nasty Site
NewsHub

The Archives
August 2002
Sun Mon Tue Wed Thu Fri Sat
        1 2 3
4 5 6 7 8 9 10
11 12 13 14 15 16 17
18 19 20 21 22 23 24
25 26 27 28 29 30 31
Jul   Sep

Send Me Email

All the news that's... whatever.

Welcome to Random Bytes...

Tuesday, August 06, 2002
 
U.S. Postmaster also investigating Verisign?    

Also interesting...I've always thought that stock bull boards were rather useless. Yahoo's board on VRSN has proven me wrong. Links to copies of the actual letters themselves can be found here and here.

    11:22:00 PM
MS the new industry leader in security?    "Analyst: Microsoft on verge of security blitz. Move could displace sector leaders" says Infoworld. And this one on the heels of Shatter. I suppose things could be stranger today...    10:54:26 PM
FTC Probes Verisign Marketing - Take II    

An updated story has been filed by Reuters that sorts out some of the vaguaries concerning the source of the story...Verisign's comments still pretty much confirm the facts that the story lays out, so I'm still saying "hold on to your hats ladies and gents, this is about to get interesting..."

Unfortunately, no original editorial at this point - other than the standard regurgi-fed items...

    10:39:48 PM
FTC Probes VeriSign Marketing    

Not much to say about this one other than the obvious which is to note that the FTC web site doesn't have much to say on the subject...

On one hand, Reuters is a very credible source for this story, but on the other, "a source close to the probe" doesn't really make it a "fact" in my mind.

Regardless, my personal conjecture is that this story is spot on (Verisign pretty much confirms it in the article). It will be interesting to see what further commentary develops within industry circles.

If it is true, it will be interesting to see what the findings are and whether or not Verisign re-uses their "government contractor immunity" defence that has served them very well in the past (or whether it would even be relevant as my layman's understanding of the pgMedia case is that it was anti-trust specific...come to think of it...would they qualify for anti-trust immunity now? The Interland reference is also interesting, especially given some of the prior associations that the news media has made. (Hmm...let's hope a lawyer with some insight decides to fire up his or her blog machinery and answer some of these tough questions...:).

There is one thing for certain, there is going to be much to be said on the subject over the coming months...

(Hmm...I suppose that there was a bit to say on this one ;)

    10:12:16 PM
    Sorry for the lack of updates over the last few days...I was purposely out of range of my computer for three straight days. Anyways, nice to be back....

Slashdot is running an interesting essay entitled "Exploiting design flaws in the Win32 API for privilege escalation. Or...Shatter Attacks - How to break Windows."

As the paper states, "The flaws presented in this paper are, at the time of writing, unfixable. The only reliable solution to these attacks requires functionality that is not present in Windows, as well as efforts on the part of every single Windows software vendor. This research was sparked by comments made by Microsoft VP Jim Allchin who stated, under oath, that there were flaws in Windows so great that they would threaten national security if the Windows source code were to be disclosed. He mentioned Message Queueing, and immediately regretted it. However, given the quantity of research currently taking place around the world after Mr Allchin's comments, it is about time the white hat ? community saw what is actually possible."

Microsoft's response?

"...if I understand things correctly, the attack you describe either requires the user to run an attacker's program on their system or the attacker needs to have access to the user's system. I would recommend that you contact the program's owner and let them know of your report. There may or may not be a vulnerability for them to address, but the program's owner should determine that."

It makes me wonder whether or not there is any connection between the publication of this note and Microsoft's recent move to release their source and API's prior to the formal final settlement approval or if its just a coincidence. Presumably, issuing API and source documentation that refutes this protects the "integrity" of the product...if it's a coincidence and Chris is right, then the Windows world is in for a whole mess of trouble...    4:52:44 PM


 

© Copyright 2003 Ross Wm. Rader. The opinions expressed in this weblog are solely those of the respective authors.
Last update: 1/27/2003; 11:35:00 PM.