<?xml version="1.0" encoding="utf-8"?>
<?xml-stylesheet type="text/xsl" href="../assets/xml/rss.xsl" media="all"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Bitbashing (Posts about security)</title><link>https://randombit.net/bitbashing/</link><description></description><atom:link href="https://randombit.net/bitbashing/categories/security.xml" rel="self" type="application/rss+xml"></atom:link><language>en</language><copyright>Contents © 2019 &lt;a href="mailto:jack@randombit.net"&gt;Jack Lloyd&lt;/a&gt; </copyright><lastBuildDate>Fri, 02 Aug 2019 22:27:07 GMT</lastBuildDate><generator>Nikola (getnikola.com)</generator><docs>http://blogs.law.harvard.edu/tech/rss</docs><item><title>Insurance, Evaluation, Risks</title><link>https://randombit.net/bitbashing/posts/insurance_and_evaluation.html</link><dc:creator>Jack Lloyd</dc:creator><description>&lt;div&gt;&lt;p&gt;The bond insurers MBIA and Ambac are going bankrupt because they
wrote insurance for mortgage backed securities which are now failing at
rates far higher than they had estimated. This is a pretty common
problem with insurance; humans tend to be really bad at estimating or
pricing risk.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://randombit.net/bitbashing/posts/insurance_and_evaluation.html"&gt;Read more…&lt;/a&gt; (2 min remaining to read)&lt;/p&gt;&lt;/div&gt;</description><category>security</category><guid>https://randombit.net/bitbashing/posts/insurance_and_evaluation.html</guid><pubDate>Mon, 16 Jun 2008 04:00:00 GMT</pubDate></item><item><title>Racing in Java</title><link>https://randombit.net/bitbashing/posts/java_ttctou.html</link><dc:creator>Jack Lloyd</dc:creator><description>&lt;div&gt;&lt;p&gt;Reading the documentation for Java's &lt;a class="reference external" href="http://java.sun.com/j2se/1.4.2/docs/api/java/io/File.html"&gt;File&lt;/a&gt;
object, I was astounded to find that the Java designers managed to
replicate one of the best known file system &lt;a class="reference external" href="http://www.dwheeler.com/secure-programs/Secure-Programs-HOWTO/avoid-race.html"&gt;race conditions&lt;/a&gt;
for no good reason: the functions &lt;tt class="docutils literal"&gt;canRead&lt;/tt&gt; and &lt;tt class="docutils literal"&gt;canWrite&lt;/tt&gt; are
essentially the Java equivalents of the &lt;tt class="docutils literal"&gt;access&lt;/tt&gt; function, which is
so well known to be a security hole that the Linux man page actually
warns that:&lt;/p&gt;
&lt;blockquote&gt;
Using access() to check if a user is authorized to e.g. open a file
before actually doing so using open(2) creates a security hole,
because the user might exploit the short time interval between
checking and opening the file to manipulate it.&lt;/blockquote&gt;
&lt;p&gt;While OpenBSD provides the less ambiguous caveat that:&lt;/p&gt;
&lt;blockquote&gt;
access() is a potential security hole and should never be used.&lt;/blockquote&gt;
&lt;p&gt;&lt;a href="https://randombit.net/bitbashing/posts/java_ttctou.html"&gt;Read more…&lt;/a&gt; (1 min remaining to read)&lt;/p&gt;&lt;/div&gt;</description><category>security</category><guid>https://randombit.net/bitbashing/posts/java_ttctou.html</guid><pubDate>Wed, 14 May 2008 04:00:00 GMT</pubDate></item><item><title>Adventures in Signal Handling</title><link>https://randombit.net/bitbashing/posts/f_notify.html</link><dc:creator>Jack Lloyd</dc:creator><description>&lt;div&gt;&lt;p&gt;I was reading the man page for Linux &lt;tt class="docutils literal"&gt;fcntl(2)&lt;/tt&gt;, because
I've never used it and was curious what exactly it could do. For
a couple of hours this afternoon, I thought I had perhaps found
a security vulnerability in the design, this post is to trace
my logic and describe what I learned.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://randombit.net/bitbashing/posts/f_notify.html"&gt;Read more…&lt;/a&gt; (3 min remaining to read)&lt;/p&gt;&lt;/div&gt;</description><category>programming</category><category>security</category><guid>https://randombit.net/bitbashing/posts/f_notify.html</guid><pubDate>Sun, 02 Mar 2008 05:00:00 GMT</pubDate></item><item><title>Algorithmic Complexity Attacks on Allocators</title><link>https://randombit.net/bitbashing/posts/allocation.html</link><dc:creator>Jack Lloyd</dc:creator><description>&lt;div&gt;&lt;p&gt;A few years back some researchers presented the concept of performing
denial of service through &lt;a class="reference external" href="http://www.cs.rice.edu/~scrosby/hash/"&gt;algorithmic complexity attacks&lt;/a&gt;, which essentially cause
pathological behavior in data structures like hash tables through
carefully chosen inputs.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://randombit.net/bitbashing/posts/allocation.html"&gt;Read more…&lt;/a&gt; (1 min remaining to read)&lt;/p&gt;&lt;/div&gt;</description><category>algorithms</category><category>security</category><guid>https://randombit.net/bitbashing/posts/allocation.html</guid><pubDate>Wed, 01 Nov 2006 05:00:00 GMT</pubDate></item></channel></rss>