El 16 ag 2017, a les 6:17, Mike West <mk...@google.com> va escriure:
> In the commit linked above, I've adopted the second and third paragraphs with 
> minor wording changes. It's not really clear to me where the crux of the 
> first paragraph lies. IMO, malware is pretty clearly out of scope for 
> software's security decisions, as anything running on the local machine with 
> privilege equal to (or exceeding!) your own is basically impossible to 
> defeat. Are there scenarios in which you think that's not the case, at least 
> insofar as this draft is concerned?

That's why I mentioned sandboxing.   A process running on the local host, 
inside a sandbox, listening on a local port, could be reachable by processes 
that aren't sandboxed, or are running in other sandboxes.   So trusting 
localhost provides a way for a sandboxed process to screw you, basically.   I 
don't know how serious a threat this is, but I think the idea that the set of 
trust zones on a single host is flat is not valid, and that's why I actually 
don't think that, even with this document published and in wide use, 
"localhost" should be considered trustworthy.

A slightly less vulnerable approach would be to allow reserved ports on 
localhost to be trusted, but to not trust other ports, on the basis that 
something that can get a reserved port has privileges.   This is still 
questionable, since a trusted sandboxed app could be compromised, but it's at 
least a smaller attack surface.

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to