#106984 - 2003-11-13 01:38 AM
Re: exe vs non-exe -- Which is more secure?
|
ShaneEP
MM club member
   
Registered: 2002-11-29
Posts: 2127
Loc: Tulsa, OK
|
Ok...I lied. I could have swore it worked when I tried it earlier. Maybe I was still logged in as domain admin or something. Oh well...It was a nice bit of hope while it lasted.
|
|
Top
|
|
|
|
#106990 - 2003-11-13 03:15 PM
Re: exe vs non-exe -- Which is more secure?
|
Stevie
Starting to like KiXtart
   
Registered: 2002-01-09
Posts: 199
|
quote: Since the entire script is read into local memory, it can then be perused with a memory reading utility. Still not secure.
By an extension of that logic then, obviously there is no program that can't be reverse engineered, hacked, hi-jacked, etc. I hope that was your point.
Since nothing is hack-proof the question really becomes, "How much effort do we put into script protection?" If you're in an office full of secretaries, what passes for secure for you will be different than someone working in an IT shop or a government facility, etc. It's different not only because of the people involved, but also of what you're protecting.
If protecting your IP (intellectual property, not address ) or your passwords or sensitive data is of critical importance, I would argue that any scripting language will ultimately leave you less satisfied than a fully compiled solution.
Having said that, most of the problems that people seem to have with kix and security is that they're trying to run scripts in the user's logon session with an administrative-level security context (via SU for example).
As has been pointed out on this board, oh about 10,000 times, the best way to deal with this is not to run those scripts in the user's logon session, but rather use the Task Scheduler, or a custom service, etc.
So the answer to the original question is that it depends on your enviroment, the level of saavy of your users, what you're trying to protect, the likelihood of malicious intent, etc. etc. etc.
Ultimately, whether packaging an EXE will provide enough protection depends on the answers to the previous questions. Even here there is an issue of degrees. The KiXscripts Editor EXE packager was never designed as a mechanism to allow users to run scripts with elevated privileges. It's only designed for simplicity and convenience in a scripting environment. Being able to pack all necessary files together is just a convenience tool.
KiXcrypt on the other hand provides that same level of convenience but also takes an eye toward security. Is it hacker-proof? No, but it does provide a higher level of security that will be sufficient for certain environments.
So, basically, I have no answer to the question.
_________________________
Stevie
|
|
Top
|
|
|
|
#106992 - 2003-11-13 03:55 PM
Re: exe vs non-exe -- Which is more secure?
|
Richard H.
Administrator
   
Registered: 2000-01-24
Posts: 4946
Loc: Leatherhead, Surrey, UK
|
I'm with Stevie on this one.
There are techniques you may employ when using KiXcrypt (or indeed the KiXscripts editor) to pass things like account information, passwords or even vital script code on the command line as variables rather than in the unpacked/crypted script itself.
However, in any program which is executing on a local machine all data are visible.
It doesn't make much difference whether the code was written as a script, VB, C++ or assembler. Any half-decent cracker will be able to step though compiled code and examine memory and stack information.
Again there are tricks you can use to make this more difficult but the only way to keep a password safe in a file is:
- Don't allow anyone who can read the file to have access to any tool which can be used to crack it.
- Don't allow anyone who can read the file to have any mechanism by which they can transporta copy of the file (floppy, email, http post, ftp etc)
- Don't allow any backup containing the file to leave secured areas
Not surprisingly this is very hard to do, which is why the better solution is to rely on security tokens and hand-shaking. Still not an absolutley secure environment, but damned hard to get anything useful from in time for it to still be of use. Back in the real world, you normally have two "audiences" for your efforts to secure password.
The first are your users. If you are unlucky enough to have staff who view security as an interesting challenge, you have to pitch your security high enough that it is beyond their competence or persistance. If the prize is not interesting enough it won't be chased.
The second are the people you answer to - in my case this will be internal security auditors. You have to pitch your security high enough that you can convince them that a breach is unlikely. There is usually a cost / benefit balance you need to find.
In summary, security is what you make it.
You don't need the latest, greatest corneal/fingerprint recognition hardware backed up with lethal force counter-measures to protect your data.
You do need to understand what security is available and what the limitations and weaknesses are in your own security. If you think you haven't got any, you've missed something
|
|
Top
|
|
|
|
#106993 - 2003-11-13 04:31 PM
Re: exe vs non-exe -- Which is more secure?
|
stooz
Fresh Scripter
Registered: 2003-05-19
Posts: 11
|
Hi guys,
Stuff like visual KIX, scriptlogic and NetInstall use a service that starts up with a domain admin account for authentication, thus doesn't need a password sent on the network.....
Has anyone thought about doing the same for regular KIX?
Wouldn't that be a more secure way of doin' it than with a script or an EXE?
I'm not a programmer and quite new to kix, but it's only a suggestion!!
Any comments on this??
cheers
StooZ
|
|
Top
|
|
|
|
#106995 - 2003-11-13 04:46 PM
Re: exe vs non-exe -- Which is more secure?
|
stooz
Fresh Scripter
Registered: 2003-05-19
Posts: 11
|
What do you mean sealeopard??
|
|
Top
|
|
|
|
Moderator: Arend_, Allen, Jochen, Radimus, Glenn Barnas, ShaneEP, Ruud van Velsen, Mart
|
0 registered
and 1179 anonymous users online.
|
|
|