Assuring Security by testing

Michael Osipov ossipov at inf.fu-berlin.de
Wed Apr 30 10:15:51 UTC 2008


Hi devs,

I've been investigating Bugzilla within my Bachelor's thesis "Application
of security test tools in open source" at the Free University of Berlin
(FU Berlin) [1].
Basically, I am looking for security measures which have been taken to
prevent security leaks/vulnerabilities especially with security test
tools which provide fuzzing capabilities for SQL injection, parameter
tampering, path traversal etc.

So far, I have searched the repository, the homepage, the wiki and the 
mailing list.
Those resources revealed some very interesting information:

1. You do have a test suite [2] which works like a lint tool.
2. You require to run Perl in taint mode [3]
3. You do have a section on "secure" programming [4]
4. You claim you have "excellent security" [5]

I am not trying to judge any of your statements, I am merely trying to 
reaveal some useful brackground information.

Requiring perl's taint mode and filterting any input is a very good 
measure to keep out a lot of security issues but can you rely 100 % on 
it? No api or any develoer is as secure as 100 %. Additonally to this 
you are trying to design your system from the ground up with security in 
mind.

The interesting point is that after going thru all these steps do you 
test the security measures by any security-dedicated test plan 
especially with security test tools? E.g., there are sql injections 
fuzzers, parameter fuzzers and so forth.

Hope you can tell me what is going behind the scene.

Thanks in advance,

Michael


[1] https://www.inf.fu-berlin.de/w/SE/ThesisFOSSSecurityTools
[2] http://www.bugzilla.org/docs/developer.html#testsuite
[3] http://www.bugzilla.org/docs/developer.html#perl-taint
[4] http://www.bugzilla.org/docs/developer.html#security
[5] http://www.bugzilla.org/features/#security
-- 
<NO> OOXML - Say NO To Microsoft Office broken standard
http://www.noooxml.org



More information about the developers mailing list