F
forceten32
I have been resisting this compression. Are there any security concerns?
What's the easiest way to read it?
Thanks,
Fred
What's the easiest way to read it?
Thanks,
Fred
forceten32 said:I have been resisting this compression. Are there any security concerns?
What's the easiest way to read it?
Thanks,
Fred
TDP said:Fred, As far as I am aware its more of an encoding/encription
programme used by some rather unsavoury newsgroups to disguise the
content of binary and movie files.
The only newsreader that I am aware of that can unencrypt these files
is XNews..
Read "Why yEnc is bad..." by one of the developers of the system, then makeforceten32 said:I have been resisting this compression. Are there any security concerns?
What's the easiest way to read it?
Thanks,
Fred
Jone Doe said:Read "Why yEnc is bad..." by one of the developers of the system, then make
your decision.
http://www.exit109.com/~jeremy/news/yenc.html
David H. Lipman said:From: "Don Taylor" <[email protected]>
| None of the responses to the original question that I've seen,
| and none of the handful of web searches I've done on my own,
| seem to address the original question...
|
| Are there any known security holes in yEnc? ....
It's not an encryption methodology. Its an encoding methodology.
Therefore where do security concerns even come into play ?
|| "David H. Lipman said:|> None of the responses to the original question that I've seen,
|> and none of the handful of web searches I've done on my own,
|> seem to address the original question...
|>
|> Are there any known security holes in yEnc? | ...
David H. Lipman said:|
| That one I can answer with a recent example of exactly this problem.
|
| In this
| http://msdn.microsoft.com/library/default.asp?url=/library/en-us/gdi/sec_gdi.asp
| Microsoft claimed
| GDI generally has few security concerns because it deals with display
| rather than input. However, here are a few issues that you should consider.
|
| Then in
| http://www.microsoft.com/athome/security/update/bulletins/200409_jpeg_tool.mspx
| they had to backpeddle when they discovered
| The GDI+ security update for September 2004 addresses a security
| issue in JPEG processing technology.
|
| Now jpg display isn't an encryption methodology, it too is just one
| more way of encoding non-executable information, so this analogy
| seems very close to the yEnc encoding of non-executable information.
|
| So, it doesn't have to be an encryption tool for some little net vandal
| to expose a security problem on your system, almost any program that
| wasn't carefully written by someone highly skilled in considering all
| the ways that a system can be subverted could be used to compromise
| your security.
|
| To be clear, I am NOT claiming that there are any security holes in
| yEnc or yDec.
The GDI+ isn't a communication protocol. It is a software
implementation for rendering graphics and is common amongst many
Microsoft products. I problem can occur where a spcecially crafted
GIF or JPEG graphic can cause a buffer overflow situation in the
GDI+ rendering engine and thus could be used to compramise the
system by executing some code.
In this case, the yEnc is a protocol for encoding and decoding an
encapsulted file(s) and I don't see how a buffer overflow or other
situation could cause a security problem. In that case, the file
would fail to be encoded or fail to be decoded.
Ask elsewhere. Yenc has nothing to do with the OS.I have been resisting this compression. Are there any security concerns?
What's the easiest way to read it?
Thanks,
Fred