<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: I am Served and TQBF gets Drunk</title>
	<atom:link href="http://spiresecurity.com/?feed=rss2&#038;p=559" rel="self" type="application/rss+xml" />
	<link>http://spiresecurity.com/?p=559</link>
	<description>Risk and Cybersecurity Analysis</description>
	<lastBuildDate>Wed, 21 Aug 2013 23:28:51 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.5.1</generator>
	<item>
		<title>By: Dwayne</title>
		<link>http://spiresecurity.com/?p=559&#038;cpage=1#comment-849</link>
		<dc:creator>Dwayne</dc:creator>
		<pubDate>Thu, 26 Jul 2007 15:58:21 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=559#comment-849</guid>
		<description><![CDATA[
]]></description>
		<content:encoded><![CDATA[]]></content:encoded>
	</item>
	<item>
		<title>By: Iang</title>
		<link>http://spiresecurity.com/?p=559&#038;cpage=1#comment-848</link>
		<dc:creator>Iang</dc:creator>
		<pubDate>Thu, 18 Aug 2005 11:32:22 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=559#comment-848</guid>
		<description><![CDATA[I&#039;m with you on this issue.  The underlying issue is that there is no data on which to separate out the truth from the fluff.  The security community has grown up in so much of a secrecy environment that all claims are suspect, and all products are based on hype.

We need data, data, and more data.  We need to unravel this attitude of not trusting anyone else with the things we&#039;ve learnt.  50 beers is a cheap price to get the data.
]]></description>
		<content:encoded><![CDATA[<p>I&#8217;m with you on this issue.  The underlying issue is that there is no data on which to separate out the truth from the fluff.  The security community has grown up in so much of a secrecy environment that all claims are suspect, and all products are based on hype.</p>
<p>We need data, data, and more data.  We need to unravel this attitude of not trusting anyone else with the things we&#8217;ve learnt.  50 beers is a cheap price to get the data.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Emergent Chaos</title>
		<link>http://spiresecurity.com/?p=559&#038;cpage=1#comment-850</link>
		<dc:creator>Emergent Chaos</dc:creator>
		<pubDate>Thu, 18 Aug 2005 04:05:02 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=559#comment-850</guid>
		<description><![CDATA[&lt;strong&gt;Where&#039;s the Evidence?&lt;/strong&gt;

Tom Ptacek offers up unsubstantiated rumors, and Lindstrom caves? Shoot. I did my chrooting DNS work when a customer&#039;s DNS servers came under attack. Can I get beer without naming the customer? I thought Pete was demanding full details....
]]></description>
		<content:encoded><![CDATA[<p><strong>Where&#8217;s the Evidence?</strong></p>
<p>Tom Ptacek offers up unsubstantiated rumors, and Lindstrom caves? Shoot. I did my chrooting DNS work when a customer&#8217;s DNS servers came under attack. Can I get beer without naming the customer? I thought Pete was demanding full details&#8230;.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Pete</title>
		<link>http://spiresecurity.com/?p=559&#038;cpage=1#comment-847</link>
		<dc:creator>Pete</dc:creator>
		<pubDate>Tue, 16 Aug 2005 14:47:27 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=559#comment-847</guid>
		<description><![CDATA[@David: that link is the honey monkey one that we discussed here: http://spiresecurity.typepad.com/spire_security_viewpoint/2005/08/thank_god_for_h.html. Bottom line: not a zero-day by my definition.
]]></description>
		<content:encoded><![CDATA[<p>@David: that link is the honey monkey one that we discussed here: <a href="http://spiresecurity.typepad.com/spire_security_viewpoint/2005/08/thank_god_for_h.html" rel="nofollow">http://spiresecurity.typepad.com/spire_security_viewpoint/2005/08/thank_god_for_h.html</a>. Bottom line: not a zero-day by my definition.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: David Maynor</title>
		<link>http://spiresecurity.com/?p=559&#038;cpage=1#comment-846</link>
		<dc:creator>David Maynor</dc:creator>
		<pubDate>Mon, 15 Aug 2005 13:30:46 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=559#comment-846</guid>
		<description><![CDATA[http://www.securityfocus.com/news/11273/2
]]></description>
		<content:encoded><![CDATA[<p><a href="http://www.securityfocus.com/news/11273/2" rel="nofollow">http://www.securityfocus.com/news/11273/2</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Not Bad For a Cubicle</title>
		<link>http://spiresecurity.com/?p=559&#038;cpage=1#comment-851</link>
		<dc:creator>Not Bad For a Cubicle</dc:creator>
		<pubDate>Fri, 12 Aug 2005 20:40:57 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=559#comment-851</guid>
		<description><![CDATA[&lt;strong&gt;0day&#8217;s don&#8217;t excite me but beer always gets my attention&lt;/strong&gt;

There&#8217;s been a lot of back-and-forth between Pete Lindstrom, Adam Shostack, and TQBF regarding the benefits (or lack thereof) of vulnerability research and disclosure, culminating in Pete saying he&#8217;d buy beer&#8230;

C&#8217;mon, just poi...
]]></description>
		<content:encoded><![CDATA[<p><strong>0day&#8217;s don&#8217;t excite me but beer always gets my attention</strong></p>
<p>There&#8217;s been a lot of back-and-forth between Pete Lindstrom, Adam Shostack, and TQBF regarding the benefits (or lack thereof) of vulnerability research and disclosure, culminating in Pete saying he&#8217;d buy beer&#8230;</p>
<p>C&#8217;mon, just poi&#8230;</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Chris Walsh</title>
		<link>http://spiresecurity.com/?p=559&#038;cpage=1#comment-845</link>
		<dc:creator>Chris Walsh</dc:creator>
		<pubDate>Fri, 12 Aug 2005 20:31:00 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=559#comment-845</guid>
		<description><![CDATA[If I buy a round, can I sit in for the floor show?  After 25 beers apiece, I anticipate quite a barnburner.


]]></description>
		<content:encoded><![CDATA[<p>If I buy a round, can I sit in for the floor show?  After 25 beers apiece, I anticipate quite a barnburner.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: J.J.</title>
		<link>http://spiresecurity.com/?p=559&#038;cpage=1#comment-844</link>
		<dc:creator>J.J.</dc:creator>
		<pubDate>Fri, 12 Aug 2005 13:49:57 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=559#comment-844</guid>
		<description><![CDATA[Why does the truth/myth of zero-days matter? The issue is merely academic.  If we base any security design on the assumption that a given system is secure, then we have failed.

Whether through a sys admin not applying a patch/triage config quickly enough, carelessness in a configuration or the dancing pigs problem, every system has the potential to be compromised at some point once it&#039;s deployed.

IDS detection of the attack has the same troubles.

Reference Matt Blaze&#039;s whitepaper on safelocks.   The best safe you can buy on the market can only be expected to deny a safecracker for 60 minutes.   Blaze&#039;s ultimate conclusion:

&quot;Perhaps we would do better learning instead to design systems that recognize the inevitability of software errors, tolerating them as safe locks tolerate inevitable mechanical imperfections. &quot;

Maybe I&#039;m missing a larger picture, but if we&#039;re not building systems that assume the inevitability of compromise, then we&#039;re failing to secure the systems.

Of course, you won&#039;t know that, because it&#039;s self-enforcing mindset.  Since you&#039;re not building systems that monitor secure systems for unexpected breaches, you&#039;ll never see them.  Since you never see them, they don&#039;t exist - right?

J.J.

links:
dancing pigs: http://en.wikipedia.org/wiki/Dancing_pigs
matt blaze: http://www.crypto.com/papers/

]]></description>
		<content:encoded><![CDATA[<p>Why does the truth/myth of zero-days matter? The issue is merely academic.  If we base any security design on the assumption that a given system is secure, then we have failed.</p>
<p>Whether through a sys admin not applying a patch/triage config quickly enough, carelessness in a configuration or the dancing pigs problem, every system has the potential to be compromised at some point once it&#8217;s deployed.</p>
<p>IDS detection of the attack has the same troubles.</p>
<p>Reference Matt Blaze&#8217;s whitepaper on safelocks.   The best safe you can buy on the market can only be expected to deny a safecracker for 60 minutes.   Blaze&#8217;s ultimate conclusion:</p>
<p>&#8220;Perhaps we would do better learning instead to design systems that recognize the inevitability of software errors, tolerating them as safe locks tolerate inevitable mechanical imperfections. &#8221;</p>
<p>Maybe I&#8217;m missing a larger picture, but if we&#8217;re not building systems that assume the inevitability of compromise, then we&#8217;re failing to secure the systems.</p>
<p>Of course, you won&#8217;t know that, because it&#8217;s self-enforcing mindset.  Since you&#8217;re not building systems that monitor secure systems for unexpected breaches, you&#8217;ll never see them.  Since you never see them, they don&#8217;t exist &#8211; right?</p>
<p>J.J.</p>
<p>links:<br />
dancing pigs: <a href="http://en.wikipedia.org/wiki/Dancing_pigs" rel="nofollow">http://en.wikipedia.org/wiki/Dancing_pigs</a><br />
matt blaze: <a href="http://www.crypto.com/papers/" rel="nofollow">http://www.crypto.com/papers/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Dave Aitel</title>
		<link>http://spiresecurity.com/?p=559&#038;cpage=1#comment-843</link>
		<dc:creator>Dave Aitel</dc:creator>
		<pubDate>Fri, 12 Aug 2005 12:47:05 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=559#comment-843</guid>
		<description><![CDATA[Or, for more examples:
o RealServer ../../../ overflow
o Any of the Immunity VSC releases (Mac OS X  Kernel Local, anyone?)
o Samba bug that HDM got hacked with

The list goes on and on. Exploits being used as 0day is the rule, not the exception. If you were on DD you&#039;d get to see a few more examples...


]]></description>
		<content:encoded><![CDATA[<p>Or, for more examples:<br />
o RealServer ../../../ overflow<br />
o Any of the Immunity VSC releases (Mac OS X  Kernel Local, anyone?)<br />
o Samba bug that HDM got hacked with</p>
<p>The list goes on and on. Exploits being used as 0day is the rule, not the exception. If you were on DD you&#8217;d get to see a few more examples&#8230;</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Thomas Ptacek</title>
		<link>http://spiresecurity.com/?p=559&#038;cpage=1#comment-842</link>
		<dc:creator>Thomas Ptacek</dc:creator>
		<pubDate>Fri, 12 Aug 2005 01:29:58 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=559#comment-842</guid>
		<description><![CDATA[You&#039;re on. I&#039;m 5 minutes away from there.

=)

]]></description>
		<content:encoded><![CDATA[<p>You&#8217;re on. I&#8217;m 5 minutes away from there.</p>
<p>=)</p>
]]></content:encoded>
	</item>
</channel>
</rss>
