1 |
On 11:11 Mon 21 Mar , Lindsay Haisley wrote: |
2 |
> I'm putting this in a separate thread because IMHO it has nothing to do |
3 |
> with any problems I'm having, but with desktop security in general. |
4 |
> |
5 |
> On Mon, 2011-03-21 at 09:57 +0100, Roman Zilka wrote: |
6 |
> > The third suggestion is probably the most important one: being NAT'd |
7 |
> > and being behind any iptables configuration (that allows for operations |
8 |
> > such as sending mail and browsing the web) doesn't make your PC |
9 |
> > invulnerable or anything near that. In other words, active break-in |
10 |
> > attempts via open ports is by far not the only option hackers have. |
11 |
> |
12 |
> So give me an example, Roman, assuming one's firewall is intact and |
13 |
> functioning as designed. The only such class of possible exploits I can |
14 |
> think of is the possibility of importing a virus, trojan, worm, etc. via |
15 |
> email, or possibly via a web script. Linux viruses propagated via email |
16 |
> are scarcer than hen's teeth, and an exploit imported thusly which would |
17 |
> leverage a vulnerability in a specific problem kernel is almost |
18 |
> certainly rare enough to be considered nonexistent in the wild as a |
19 |
> practical matter. Please cite specific viruses/trojans, and if you can, |
20 |
> reported cases of such exploits. In other words, don't blow smoke at me |
21 |
> or throw out generalized assertions without citing evidence to support |
22 |
> them. |
23 |
|
24 |
Web-based vulnerabilities in Firefox or apps it uses for filetype |
25 |
support (e.g. Evince for PDF has had vulnerabilities lately) would be |
26 |
the most common, assuming you can convince people to visit a web server |
27 |
that's rooted or compromised by XSRF/XSS. |
28 |
|
29 |
-- |
30 |
Thanks, |
31 |
Donnie |
32 |
|
33 |
Donnie Berkholz |
34 |
Desktop project lead |
35 |
Gentoo Linux |
36 |
Blog: http://dberkholz.com |