[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

ActiveX



Hi all:

I just found an interesting article about ActiveX. Below is the section 
about the security issue. The whole Acrobat Reader’s file can be 
downloaded from http://www.cutter.com/ads/adssamp.htm.

Enjoy,
Thanh-Tung Truong

====================

++The security issue++
 
For people building Internet-based systems that int-eract with the 
external marketplace, security is obvi-ously a relevant issue; and for 
those building electronic
commerce systems, it’s obviously a key issue. But for intranet-based 
applications, security may be interpret-ed as the “usual stuff” 
concerning passwords and pro-tection of database records.
Thus, the question of whether security features rep-resent a strength or 
a weakness for ActiveX is a rela-tive one; perhaps more important, it’s a 
dynamic one, as the tools, technologies, and strategies for Internet 
security are changing on an almost daily basis. Thus, if I had to make a 
tactical choice between ActiveX or Java for a project today, I might or 
might not be satis-fied with the approach taken by ActiveX; but if I were 
making a long-term strategic decision about what kind of Internet-based 
component technology I want my company to use for the next several years, 
I wouldn’t be so concerned about the differences that exist between the 
two approaches — for they may well merge into a common approach.
As things stand today, there are differences; as mentioned earlier, Java 
relies on “built-in” security when an applet is loaded into the client 
Web browser; ActiveX relies more on a digital signature to authenti-cate 
the component’s author and the fact that the com-ponent hasn’t been 
modified during transmission. However, the current ActiveX strategy does 
not elimi-nate the possibility of the component’s author insert-ing a 
virus (or various other forms of “rogue” behav-ior), nor does it 
eliminate that possibility that a hacker may have altered the component 
after it was devel-oped, but before it was transmitted across the 
Internet.
On the other hand, there is no widespread agree-ment yet that Java’s 
security approach is foolproof either. A few months ago, it became 
apparent that a hacker could construct a “legal” Java applet that could 
be downloaded into a client Web browser (and thus inside whatever 
“firewall” the organization might have constructed), after which point it 
could (a) read direc-tories and scan the machines on the network inside 
the firewall, and (b) compose and transmit e-mail mes-sages (perhaps 
containing information about what it found) back across the firewall. Not 
only that, a Java applet can go into an infinite loop and thus cause a 
“denial of service” attack on the client machine.
While these two Java problems may well have been solved by now, I suspect 
that there will be others; after all, Java is only a year old, and we’re 
just now begin-ning to build “serious” Java applications on the Internet. 
Similarly, ActiveX is so new that many parts of it don’t even exist in an 
official capacity, and it’s almost inevitable that various security 
problems will emerge over the next year. But while all of this is going 
on, Microsoft has been very active and aggres-sive about working with 
various banks and credit card companies to provide industrial-strength 
encryption and security technology for electronic commerce applications 
on the Internet. I have no doubt that Microsoft will incorporate that 
technology into its ActiveX product offerings as the marketplace 
express-es a need and desire for such technology.

====================