Article of C|NET

Actively defending ActiveX

By Nick Wingfield
February 19, 1997, 1 p.m. PT

Microsoft (MSFT) wants to remind users that ActiveX isn't the only tool for writing malicious programs.

Today, the company set up a Web site, the Web Executable Security Advisor, to spread word of the power and pitfalls of other Internet programming technologies, including Java. The company decided to set up the site after a highly publicized incident in which a group of German hackers showed how an ActiveX control could be used to trigger unauthorized bank transactions.

Microsoft officials argue that any executable code, be it a Java applet, a Netscape plug-in, or a macro program, brings security risks. With these technologies, it is technically possible to do "malicious" things like reformatting a user's hard drive or installing a virus on their systems.

However, Microsoft acknowledges that Sun Microsystems has made it much more difficult to perform malicious acts through Java by creating a virtual "sandbox." The sandbox prevents applets from potentially risky maneuvers such as reading or writing files on a hard disk. However, Microsoft said that some Java developers, those at [14]Marimba among them, are beginning to break through the sandbox so that they can store their programs on a user's computer, something that could compromise the security of a PC.

"While the Java sandbox enforces a high degree of security, it does not let users download and run exciting multimedia games or other full-featured programs on their computers," a statement on Microsoft's security site reads. "As a result, users may want to download code that has full access to their computers' resources."

Unlike Java, ActiveX controls--programs that run mainly inside of Microsoft's Internet Explorer browser--are not cordoned off by a sandbox. Instead, Microsoft has created an "accountability" security system called Authenticode that allows software publishers to stamp their controls with a digital signature.

If a control does something bad to a user's computer, the publisher can then be tracked down and prosecuted. In other words, the Authenticode system does not protect against malicious code; it simply makes it easier to find out who wrote it. Microsoft urges users to shy away from publishers that haven't signed their code.

"If people let a stranger in the house and the stranger tied them up and stole their VCR," asked Tod Nielsen, general manager of developer relations at Microsoft, "do they go to the police or move into another house? Executable software holds the potential to do great things, but it also holds the potential to some malicious things."

So far though, most of the "malicious" code written either with Java or ActiveX does not appear to have been created by malicious programmers. Perhaps as a result, many users do seem panicked by the Chaos Computer Club's recent ActiveX demonstration.

"If you are worried about someone putting a malicious program on your machine you better remove your modem, CD-ROM and floppy drive from your machine and let only yourself use your keyboard," wrote one user in Microsoft's microsoft.public.activex.controls.webbrowser newsgroup. "This is the only way of protecting your machine completely."

Still, other users expressed more concern that programs might inadvertently hurt their computers.

"The thing that scares me about [ActiveX] is not malicious people so much as incompetent ones," wrote another user on the same newsgroup. "Look at what [Microsoft] betas can do to an installation, look at the questions of Visual Basic authors on the newsgroups, and imagine those people installing [ActiveX] controls onto your machine."

Microsoft's security Web site also said that it would host a discussion with customers in mid-spring to discuss Internet security.

zur ckzurück © 1996-2024 Lutz Donnerhacke @ IKS GmbH Jena Friday | 19.Apr.2024