Jump to navigation

Poupou's Corner of the Web

Looking for perfect security? Try a wireless brick.
Otherwise you may find some unperfect stuff here...

Weblog

Stretching trust transitiveness

As a glass of wine (personal preference, any liquid should do ;-) can be "half full" or "half empty" I'm offering you this announcement in two shades...

If you totally trust :
  • me,
  • Mono,
  • SVN (right now), tarballs or RPM[S] (later),
  • TCP/IP over the Internet,
  • LXR,
  • Mozilla (people, servers, infrastructure...)
  • everyone who Mozilla trust enough to add their root certificates in their products,
  • and probably a few others, like yourself
then, without doubts, the new mozroots tool is for you!.

A future version of the certificate manager will provide a GUI for this so people that not trusting their own typing skills can use it as well.

Open a terminal and type:

mozroots --import --sync --quiet

place your finger on the Enter, close your eyes, press the Enter key and be happy.

Hopefully everyone realize that real life tends to be between extremes. The mozroots tool is a nice addition to Mono and makes it easier to install the most common roots certificates that most people will need. Now trusting too much (either people or certificates) also have it's dangers. I suggest that you read the mozroot's man page before using it. The tool has some options, like addition/removal confirmations, that can be helpful in different situations. So use mozroots like (you should use) an hammer: find nails not fingers ;-)

While we are on the trust subject I also wrote a small article on Mono's wiki about using using trusted roots respectfully when developing .NET applications (mostly runtime independant suggestions). Comments welcomed!


10/26/2005 09:23:53 | Comments | Permalink

Pumpkins

Each year we take the kids to the Genest's farm to get our pumpkins. Kids loves it because they are always new things to look at or, better, play with. This time I was surprised by the pinguins (which are probably a gentle, if not subtle, remainder of the temperature we'll soon have in Quebec). One of them was looking very familiar...

The two other pinguins were also, less known, celebrities.


10/22/2005 23:21:04 | Comments | Permalink

CAS - where do we go from here

Now that we know where we stand on Code Access Security (CAS) let's see where we are going...

On the short-term, i.e. starting right now and with results partially visible in the Mono 1.2 release, the main focus will be to add more permissions into the class libraries. That will allow better testing of the features already in the runtime without requiring large changes in the runtime (as it will get more difficult as we get nearer the release) and make the class library more useful to people who want to try/test Code Access Security.

By itself, adding permissions isn't really difficult. Adding them so they are meaningful (i.e. adding security without under or over protection) is harder and will (later) require a careful, tool assisted, audit of all class libraries. Another difficult aspect is that Mono's source code is still evolving (e.g. new features, bug fixes, optimizations...) so we must ensure that permissions added today (and/or reviewed later) will still be effective when a new version of Mono is released months or years later.

So the typical "code-review-ship" trinity won't cut it - at least not if we try to do it in sequence. Neither trying to review all incoming changes (e.g. mono-patches) will likely (alone) yield good results. We need to ensure that most security efforts we put in place will somehow stick there - not quite the holy grail but not a very common situation either.

If this sounds somewhat familiar, and it should, it's because security and quality are very similar attributes in software. So we can reuse most of the same techniques for, a part, of the sticky plan.

Unit tests

Mono use NUnit for it's unit testing. Currently we have more than 13k tests on the default profile (fx 1.1) of our class libraries - and this number exclude the CAS specific tests which are presently excluded from the default execution. The NUnit framework makes it easy to write CAS specific tests and to reuse existing unit tests into CAS tests (e.g. testing execution under no, or near minimal, permissions).

Pros

  • Perfect to catch regressions;
  • Automated (e.g. Makefile target and buildbot);

Cons

  • It only (well mostly) test existing (old) code, i.e. new code requires new tests;
  • It's difficult to get 100% coverage;
  • Current Mono coverage by unit tests vary a lot between assemblies / namespaces. Some parts are very high, some parts are not tested;

Rule tests

Some tools, like Microsoft's fxcop, use a different approach - it ensure that the code (source or binary depending on the tool) follows a set of rules. There are many categories of rules: interop, performance, localization... and, of course, there are security rules.

Pros

  • Existing rules catch problems in new, or modified, code;
  • Adding new rules may find multiple problems in existing code;

Cons

  • Rules aren't all PASS or FAIL - they requires some contextual interpretation;
  • Some rule violations can't be fixed and retain compatibility with the MS framework (i.e. that's also true for fxcop-versus-MS BCL, most rules were "invented" after the BCL code was written and, in many cases, compatibility is more important that satisfying a rule);

Some may recall I encouraged people to create an fxcop-like tool based on Cecil a while back. Sadly that didn't yield much results - except that Duncan found a very cool name for such a tool: Gendarme. I can't wait anymore so I'm transforming my old Cecil-based code into (mostly security) rules. Expect more details about this later...

Are other tests required ?

No (in theory). With perfect/complete unit tests (or rule tests) you'll not need anything more. However there's no easy way to know if the tests are complete (don't confuse that with 100% coverage) and even less ways to know if they are perfect. So, even if reality sucks, we must deal with this as best as possible...

Yes (in practice). Unit and rule tests aren't complete because sometimes you:

  • don't know where a problem may exists, making it impossible to write a unit test;
  • can't make a rule clear and simple enough to catch a problem, which also rules out tools like fxcop/Gendarme.

Such cases cannot be automated by unit tests and rules. Finding and understanding the ultimate/missing tests requires a human mind. This is where we generally stop talking about testx and start talking about reviewing. It's a manual process but it doesn't have to be totally manual - which makes it but funnier and faster. This is why I've been using Cecil to generates lists, e.g. hints where errors are more likely or more dangereous (p/invokes, internal calls, unsafe code...) and to visualize the code (my cecil / dot graphs). Visualization helps me, and hopefully others, to find patterns that may later be turned into rules and, for specific cases, into unit tests (to avoid future regression).

As for the long-term activities I'll likely blog about them after, or nearer to, the release of Mono 1.2. But don't hesitate to contact me if you have any interest in them!


10/11/2005 10:58:44 | Comments | Permalink

CAS - where we stand

Mono's security manager, the core of Code Access Security (CAS), has been available for testing purpose since version 1.1.4 and was gradually upgraded ever since (with each release I update the bug #52606 and the CAS wiki page).

Today, actually this has been true for quite a while, we are able to run all of corlib's unit tests without any failure, including an additional 301 CAS specifc tests (i.e. that aren't normally executed). We can also execute all System.Drawing.dll unit tests without requiring, or even demanding, UnmanagedCode permissions. We also have a great coverage (including 2450 CAS specific tests) for System.Web.dll with perfect results (except for a small mcs bug on partial classes) and a few more tests (18) for System.Xml.dll.

So what are we lacking exactly ?

Very few features, at least for the 1.x (default) profile. Most missing features, like verification, aren't really in the security manager themselves but they are still very important features (up to the point of making CAS useless). So most of them do not block testing the security manager (you'll need a better excuse here ;-) but they do block it's use for day to day production.

Applications that use, or better require, CAS. So far the only real, open-source and CAS-aware application has been NRobot. It's great one but it doesn't cover the full spectrum of what CAS can accomplish. An easy thing anyone can do is to use the security manager (still at FullTrust), e.g. mono --security app.exe, from time to time and report any problem on bugzilla.

Feedback! I had few questions about CAS and most of them were very general (i.e. they didn't give me much clue on how people wants to use it). I'm particuliary interested in custom policies people/enterprise are using and any uncommon configuration they use .NET applications (assuming this affects security). Of course more feedback will be greatly welcome ;).

Permissions in the class libraries. Great progress has been made recently but it's still far from complete. A lot more tests and reviewing needs to be done - more on this later...

Support for Fx 2.0 as it introduce new features, additions and changes in the class libraries - althought this isn't, globally, a very high priority some features are easier to add right now than later (mostly for test related reasons).

I'm actually updating my CAS planning, which will be part of another entry, but feel free to contact me or the mono-dev mailing list with your feedback and/or suggestions. Thanks :-)


10/5/2005 15:14:00 | Comments | Permalink

The views expressed on this website/weblog are mine alone and do not necessarily reflect the views of my employer.