<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: It&#8217;s Not a Bug, It&#8217;s a Feature</title>
	<atom:link href="http://spiresecurity.com/?feed=rss2&#038;p=512" rel="self" type="application/rss+xml" />
	<link>http://spiresecurity.com/?p=512</link>
	<description>Risk and Cybersecurity Analysis</description>
	<lastBuildDate>Wed, 21 Aug 2013 23:28:51 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.5.1</generator>
	<item>
		<title>By: PaulM</title>
		<link>http://spiresecurity.com/?p=512&#038;cpage=1#comment-797</link>
		<dc:creator>PaulM</dc:creator>
		<pubDate>Mon, 07 Nov 2005 21:08:39 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=512#comment-797</guid>
		<description><![CDATA[Quoting Peter:  &quot;Anyone that has worked in a large company knows that the real risks associated with passwords are social engineering and attacks against the account owner.&quot;

Except when they&#039;re not.  The fact that weak crypto and hashing are viable channels for exploitation is proven through history (WEP, MSCHAP/LEAP, and so on).  You go on to excuse these flaws through mitigation strategies.  At the same time, buffer overflows can be prevented by implementing a host-agent product like Entercept or kernel patches or through any number of other mitigation strategies.

You&#039;ve failed to substantiate the difference between the two because in the end there&#039;s no difference between one attack that leads to a system compromise and another.

PS - I got a good laugh when you accused Thomas Ptacek and Chris Wysopal of lacking experience.  You&#039;re a funny man!  Keep up the good work!


]]></description>
		<content:encoded><![CDATA[<p>Quoting Peter:  &#8220;Anyone that has worked in a large company knows that the real risks associated with passwords are social engineering and attacks against the account owner.&#8221;</p>
<p>Except when they&#8217;re not.  The fact that weak crypto and hashing are viable channels for exploitation is proven through history (WEP, MSCHAP/LEAP, and so on).  You go on to excuse these flaws through mitigation strategies.  At the same time, buffer overflows can be prevented by implementing a host-agent product like Entercept or kernel patches or through any number of other mitigation strategies.</p>
<p>You&#8217;ve failed to substantiate the difference between the two because in the end there&#8217;s no difference between one attack that leads to a system compromise and another.</p>
<p>PS &#8211; I got a good laugh when you accused Thomas Ptacek and Chris Wysopal of lacking experience.  You&#8217;re a funny man!  Keep up the good work!</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Thomas H. Ptacek</title>
		<link>http://spiresecurity.com/?p=512&#038;cpage=1#comment-796</link>
		<dc:creator>Thomas H. Ptacek</dc:creator>
		<pubDate>Mon, 07 Nov 2005 18:52:34 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=512#comment-796</guid>
		<description><![CDATA[Does anyone else who reads this blog see the difference between the buffer overflow disclosure that Lindstrom condemns and the weak hash disclosure he defends?


]]></description>
		<content:encoded><![CDATA[<p>Does anyone else who reads this blog see the difference between the buffer overflow disclosure that Lindstrom condemns and the weak hash disclosure he defends?</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Pete</title>
		<link>http://spiresecurity.com/?p=512&#038;cpage=1#comment-795</link>
		<dc:creator>Pete</dc:creator>
		<pubDate>Mon, 07 Nov 2005 18:01:18 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=512#comment-795</guid>
		<description><![CDATA[@Thomas -

I would characterize my &quot;appreciation&quot; more as ambivalent than appreciative. You are welcome to try to equate the two to make yourself feel better, but they simply don&#039;t equate. More later on tradeoffs and cost/benefit analysis in security.

]]></description>
		<content:encoded><![CDATA[<p>@Thomas -</p>
<p>I would characterize my &#8220;appreciation&#8221; more as ambivalent than appreciative. You are welcome to try to equate the two to make yourself feel better, but they simply don&#8217;t equate. More later on tradeoffs and cost/benefit analysis in security.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Thomas H. Ptacek</title>
		<link>http://spiresecurity.com/?p=512&#038;cpage=1#comment-794</link>
		<dc:creator>Thomas H. Ptacek</dc:creator>
		<pubDate>Mon, 07 Nov 2005 17:38:00 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=512#comment-794</guid>
		<description><![CDATA[I think the only difference between a new buffer overflow and a new demonstration of a weak cryptographic construction is that Peter Lindstrom scorns one and appreciates the other.

Never mind the fact that, all meandering about &quot;by design&quot; and &quot;functional use&quot; aside, the end result is the same. Or the fact that, in the &quot;implementation weakness, not bug&quot; case, the solution requires rearchitecting, and in the &quot;just a bug&quot; case, the solution is simply a patch.

In other words: two pieces of information with the same effect (a problem, previously unknown, now exposed to black-hat attackers), with the only difference being the difficulty of solving the Lindstrom-approved disclosure.

]]></description>
		<content:encoded><![CDATA[<p>I think the only difference between a new buffer overflow and a new demonstration of a weak cryptographic construction is that Peter Lindstrom scorns one and appreciates the other.</p>
<p>Never mind the fact that, all meandering about &#8220;by design&#8221; and &#8220;functional use&#8221; aside, the end result is the same. Or the fact that, in the &#8220;implementation weakness, not bug&#8221; case, the solution requires rearchitecting, and in the &#8220;just a bug&#8221; case, the solution is simply a patch.</p>
<p>In other words: two pieces of information with the same effect (a problem, previously unknown, now exposed to black-hat attackers), with the only difference being the difficulty of solving the Lindstrom-approved disclosure.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
