1. Plans for the rest of the quarter meeting (Matt)
Goals for this term
Papers to be written
schedule of topics: SGML, symbolic links as a cause of security problems, what is taxonomy, Cowan's Stack Guard, etc.
discussion of projects,statuses
This includes items for the next meetings agenda, including when to meet next.
- Goals - get Vulnerabilities Database redone by setting up a couple of templates and then checking it out. Basically what we had done before, template could be html or ref, ascii, etc.. Number of different formats could put parts of it on web.
- Maybe database should contain more of an analysis.
- Database contains description. Enough information to do a full breakdown of a vulnerability. A number of the vulnerabilities are for windows, not UNIX, so that will be nice.
- I'd like to get going quickly.
- Symbolic links-like to explore and see if more than race conditions. Why do they seem to be so fruitful.
- Stackguard Paper- by Chrispain Cowan, checks to see if random numbers are modified.
- we should test Stackguard and see if ways around it.
- Is this special?
- Yes,because of use of randomness and unpredictability is a mechanism for preventing exploits.
- Some work presented in Anapolis, MD modified the Gnu compiler.
- That was Chrispain.
- I'd like to write paper on randomness.
- Used time of day to find out probablility to predict what canary would be.
- If its pushed on to the stack..memory has to be stored somewhere. If program memory is stored in certain place then it would return into your code. Would like to look at more closely, and techniques for handling randomness.
- how does that affect breaking down vulnerabilities?
- still need to get Isolated Network up and running.
- We need to order long cables. Monitor cables and keyboard cables for SPARCS. (could be $200 each.)
- Been working on NT vulnerabilities. Hard to find anything. UNIX is dime a dozen. Found professor in Australia who has some code.
- What about Vulnerabilities with MIDS?
- Do something w/ TCP wrappers- modify to speak IDIP to detect a signature.
- Might be able to set up a tool or monitoring system.
- Do a fork and start off telnet daemon. Wrapper is replaced. Continue to analyze data string. Let it come in so by the time it gets your wrapper it's plain text. Have wrapper stay in middle of daemon and connection.
- Could have stream wrapper..wouldn't have to change and could read it.
- Eventually, we will want to see more and more encrypted messages. They don't want you to replace their login daemons w/ something else.
- It would be a good idea to put MIDS vulnerabilities in too.
- New guys for the quarter might be David Knotts and Earl Barr.
- Do ls of your account..
- I could give a talk.
- Cert was giving out free attacks. We should at least look at it.
- Would like to get a couple of papers out there. Anyone willing to look at Chrispain's stuff?
- I know him, so I can talk to him about it.
- Next week. Vulnerabilities Database
- Circulate projects
- Searchable Database?
- Yes. Maybe SGML. Special search engine tools, so a collection of SGML.
- AGREP uses fuzzy matching.
- Try to bring in other students.
- One MURPS student. I'll bring him next week.
- Vulnerabilities database
-bring in one MURPS student too
-discuss Chrispain's paper.(Peter will get it.)
Meeting adjourned at 11:50AM
Send email to
Department of Computer Science
University of California at Davis
Davis, CA 95616-8562
Page last modified on 4/8/98