Anyone can push malware through Windows Update with little effort.
Microsoft doesn't perform a useful security audit of published binaries;
they simply rely on the fact that signing requires a slew of IDs and
secret handshakes which are difficult to fake (i.e. remain an anonymous
baddie).

I think Garrett's approach is okay. It's impossible to think of every
single possible security breach scenario therefore we should focus on
implementing various doodads to mitigate issues if/as they arise.
Killbits and revoking certificates are good examples.

/rafael

On 4/16/2010 1:08 PM, Garrett Serack wrote:
> What specifically do you mean by compromised?
> 
> If you mean defective, well, that is a small potential problem. It is in any 
> system.
> 
> If you mean that a package is published and someone is trying to pass it off 
> as someone else's package, well that's why we have a requirement for a 
> publisher to digitally signing the code.  If they lose control of their 
> signing keys, we laugh and all code published with their cert after the loss 
> of control can be killed by revoking the certificate, and/or implement a 
> killbit system (since we can identify WinSxS libraries uniquely). 
> 
> Actually, we should probably build a killbit system regardless, as it can 
> assist in the defective case too.
> 
> And, yes WU can install drivers and code from third parties; which is why 
> they require any binaries passing thru WU to be signed and run thru a bunch 
> of validation tools.
> 
> 
> 
> Garrett Serack | Open Source Software Developer | Microsoft Corporation 
> I don't make the software you use; I make the software you use better on 
> Windows.

_______________________________________________
Mailing list: https://launchpad.net/~coapp-developers
Post to     : coapp-developers@lists.launchpad.net
Unsubscribe : https://launchpad.net/~coapp-developers
More help   : https://help.launchpad.net/ListHelp

Reply via email to