r3wp [groups: 83 posts: 189283]
  • Home
  • Script library
  • AltME Archive
  • Mailing list
  • Articles Index
  • Site search
 

World: r3wp

[!REBOL3]

Ladislav
9-Oct-2011
[9633]
(Even though the BIND function is "crippled*, but, as proven by the 
above statement, unreasonably so.)
BrianH
9-Oct-2011
[9634]
I am asking something really specific (see my last message).
Ladislav
9-Oct-2011
[9635]
Yes, but I never offered the answer to your question.
BrianH
9-Oct-2011
[9636]
Ah, but that is the only question I was asking.
Ladislav
9-Oct-2011
[9637]
Yes, but my intent was to prove, that the BIND crippling is unreasonable, 
which is provable.
BrianH
9-Oct-2011
[9638]
We can plug one hole at a time. What you are requesting is something 
that we are trying to prohibit, and we have good reasons for doing 
so. If there are also other means of doing it, we can address those 
issues later. One issue at a time.
Ladislav
9-Oct-2011
[9639x2]
What you are requesting is something that we are trying to prohibit, 
and we have good reasons for doing so. 
 - by the above, I just proved, that you do not
...have good reasons
BrianH
9-Oct-2011
[9641]
We are trying to prevent functions from being modified from the outside 
without changing the function (SAME? test), and to allow functions 
to work on information that we want to keep hidden from other code, 
such as when a variable has an unencrypted password in it or other 
sensitive information. Or we could just give up on being able to 
run untrusted code because it's futile, as you are requesting.
Ladislav
9-Oct-2011
[9642x2]
Above you mentioned, that the reson is this:


- if I had access to a 'var-a variable bound to the F's context, 
and if I were able to do "some harm" having another variable 'var-b 
bound to the F's context, then that is a good reason why to cripple 
BIND, to not give me the access to the 'var-b bound to the F's context 
as well when the function is not running.

 As stated, I can disprove that as a reason.
Thus, the purported reason is not a reason at all, surely not "good".
BrianH
9-Oct-2011
[9644]
My last message had the reasons. What you are talking about are the 
means.
Ladislav
9-Oct-2011
[9645x3]
OK, I will cite you exactly:


Sure it is, in some cases. What if 'a is harmless, but 'b refers 
to a password? If you can only CHANGE, not BIND, then leaking a word 
is only as dangerous as leaking what that word refers to. If you 
can BIND using that word as a context, you can get access to *every* 
value referred to by that context, not just the one. So it's still 
potentially a problem to leak a single word (depending on what gets 
assigned to that one word), but not as bad a problem as it could 
be.
That can be easily disproved.
Do you want me to?
BrianH
9-Oct-2011
[9648]
OK, prove it without having access to the original body code (a separate 
issue), and while the function isn't running (another separate issue).
Ladislav
9-Oct-2011
[9649]
Yes, it is easy
BrianH
9-Oct-2011
[9650]
Just with access to a reference to the function itself, and and a 
word bound to its context.
Ladislav
9-Oct-2011
[9651x3]
Sure, still trivial
Proof:


1) Due to the way how the function contexts are implemented in R3, 
the word 'b in F's context does not refer to a password when F is 
not running.

2) Because of that, I either cannot read the password at all, or 
have to be able to read it somehow, which is possible *only* when 
the function is running. (oherwise, there is no danger of me reading 
the password as is well known)
3) do I have to continue?
Sorry for using the power of logic, but I just am unable to see illogical 
statements as "good reasons".
BrianH
9-Oct-2011
[9654]
OK, so you don't have a solution to that problem (darn, I was looking 
forward to that), but you have a proposed proof that it doesn't matter 
because you can't exploit it until the function is running. And since 
the BIND restriction when the function isn't running doesn't apply 
when the function *is* running later, even when applied to the same 
word, then the ban on BIND to a function-context-bound word when 
the function isn't running has no security benefit.


But the ban on BIND to the function! value *itself* still has value, 
because it would defeat the efforts to prevent any bound words from 
leaking out of the function from helping. Otherwise it would be unsafe 
to let untrusted code call safe functions because they would need 
to have a reference to the function in order to call it.
Ladislav
9-Oct-2011
[9655x2]
I do have a proof, which disproves your exact citation
But the ban on BIND to the function! value *itself* still has value, 
because it would defeat the efforts to prevent any bound words from 
leaking out of the function from helping. 
 - another disprovable statement
BrianH
9-Oct-2011
[9657]
OK, get access to a function context with just a reference to the 
function itself. It doesn't matter if you run the function, because 
the function doesn't leak any bound words.
Ladislav
9-Oct-2011
[9658]
Why are you stating disprovable statements, and when I call them 
as such, you invent completely unrelated statements requiring me 
to prove them?
BrianH
9-Oct-2011
[9659]
And no, using STACK still doesn't count because it's known, and blocked 
if SECURE works.
Ladislav
9-Oct-2011
[9660]
And, regarding to your "password problem", you are still trying to 
impose unrelated conditions. As is obvious, nobody can read a password 
from a function not referring to it when the function is not running. 
Thus, you cannot purport, that for the security of said password 
it is necessary to forbid something when the function is not running. 
It is not.
BrianH
9-Oct-2011
[9661]
The "But the ban on BIND to the function! value *itself*..." statement 
refers to this:
>> not find second types-of :bind function!
== true


The BIND function doesn't accept function! values for its context 
argument. The reason for this is so that functions can prevent access 
to their context from leaking to code *that the function calls* that 
could be exploited while the function is running. All the function 
has to do is not leak bound words, and it's safe. If that doesn't 
work, please show how.
Ladislav
9-Oct-2011
[9662]
To remind you, I am and was always referring to this:

>> f: func [a b] ['a]
>> bind [b] f 1 2
** Script error: none word is not bound to a context
** Where: bind
** Near: bind [b] f 1 2

The above is unrelated
BrianH
9-Oct-2011
[9663]
No, the above is the exact reason for:
>> not find second types-of :bind function!
== true
Ladislav
9-Oct-2011
[9664x2]
No...
 - still unrelated
But, the reasons for disallowing the functions as the BIND arguments 
have actually a similar flaw.
BrianH
9-Oct-2011
[9666]
a: func [code /stuff] [stuff: "something secret, not a literal string" 
code]


With just a reference to :a, bind 'stuff to the function context. 
The function could be running or not when you get access to the bound 
word 'stuff. The exploit code can then be passed to the function 
in its code argument, which would then have access to the contents 
of 'stuff because the function is running.
Ladislav
9-Oct-2011
[9667]
your example is too trivial. I get the access to the "something secret..." 
too easily, jut by examining the function body. Don't you have anything 
more complicated?
BrianH
9-Oct-2011
[9668x2]
This is the reason for that particular restriction. If there's a 
workaround that we don't yet know about, let us know so we can plug 
it.
That was just a placeholder. The stuff variable could be the results 
of a prompt to the user for their password, or of a native function 
that decrypts something. One problem at a time.
Ladislav
9-Oct-2011
[9670]
As said, problem solved. You need something nontrivial to throw at 
me.
BrianH
9-Oct-2011
[9671]
No, seriously, I meant it. How do you do this without BIND 'stuff 
:a ?
Ladislav
9-Oct-2011
[9672x2]
As said, I do not have to. The string is already there for me to 
read.
Your trouble is, that you do not see, that the triviality of your 
problem matters.
BrianH
9-Oct-2011
[9674]
Ignore the particular literal value there, and substitute it with 
something that outside code can't otherwise get access to, like the 
results of a call to a function that is referred to by a PROTECT/hide 
variable.
Ladislav
9-Oct-2011
[9675x2]
I cannot, it is up to you to find *any* meaningful example, which 
I am maintaining is impossible.
It is you failing to provide a reason, and, I am actually able to 
prove there is none.
BrianH
9-Oct-2011
[9677]
If getting access to 'stuff is the only way to get access to what 
it refers to, how do you get access to 'stuff if all you have is 
:a ?
Ladislav
9-Oct-2011
[9678x2]
Any example?
As said, using the properties of REBOL functions, I can easily prove 
you wrong in any case you invent.
BrianH
9-Oct-2011
[9680]
blah: module [] [hidden hidden-stuff: "something you want" a: func 
[code /stuff] [stuff: hidden-stuff code]]
blah/a func [] [do something to get access to hidden-stuff]
Ladislav
9-Oct-2011
[9681x2]
OK, fine, an example that looks meaningful to you.
So, do I assume correctly, that I cannot examine the BLAH module 
to get the HIDDEN-STUFF value?