Re: head off email viruses: distinguishing documents from executables?
- From: Julien Olivier <julo altern org>
- To: stevenj mit edu
- Cc: nautilus-list gnome org
- Subject: Re: head off email viruses: distinguishing documents from executables?
- Date: Tue, 04 Nov 2003 10:24:56 +0000
On Tue, 2003-11-04 at 02:26, Steven G. Johnson wrote:
> As usual, I have been getting lots of MS email viruses on my GNU/Linux
> email account. Occasionally, however, instead of trashing them, I marvel
> at the evil social engineering that goes into them, and I think about how
> a similar attack might be aimed at other systems, e.g. Linux.
>
> One of the tricks seems to be to attach a .zip file of something that
> purports to be a document, but is actually an executable (readme.doc.scr),
> combined with an email ("Read this for our meeting tomorrow") that tricks
> the user into opening it. One could conceivably do a similar trick with
> Linux (attaching a .tar.gz).
>
> The basic problem is this: simply *reading* a file, no matter whom it is
> from, *should* always be safe...at least there is no technical reason it
> can't be, and this is what people expect from the real-world metaphor.
> But, of course, with MS, you open a document and launch an executable in
> the same way (double-click). Similarly on a Mac. And similarly (last I
> checked, admittedly a long time ago) with GNOME. The only exception is
> the command line. How does Nautilus handle this?
>
> As a basic safety feature, when you double-click on an executable file,
> before you execute it you might pop up a dialog saying "This is an
> executable program, not a document, and it may run arbitrary commands; are
> you sure you want to launch it?" (with a check box to disable the warning
> for *that file* in the future). By default, you may even want to disable
> click-to-run executables entirely, except for specially-created desktop
> shortcuts, since most people only need to launch executables from the
> menu, by drag-and-drop, or by double-clicking an associated document.
>
> Sorry to bother you if you've already thought about this, but I figured it
> wouldn't hurt to be pro-active.
>
> Cordially,
> Steven G. Johnson
>
> PS. There are of course, other attacks if you can trick a user into
> opening a file, such as evil .tar.gz files that create dotfiles (or write
> in dot-directories), etcetera, when they are uncompressed from a known
> location (e.g. $HOME).
>
> PPS. Sorry if this is misdirected; I couldn't find any kind of GNOME
> security list (which might be a nice idea if it doesn't exist).
Hmm.. isn't it exactly what Nautilus already does ?
--
Julien Olivier <julo altern org>
[
Date Prev][
Date Next] [
Thread Prev][
Thread Next]
[
Thread Index]
[
Date Index]
[
Author Index]