@derari said:
Aside from that, yes I think that SChannel has severe security bugs. Feel free to prove me wrong.
Of course, Blakey can't be expected to prove a negative here (particularly without access to the source for auditing purposes!), but if past experience is anything to go by, it's fairly likely that SChannel has bugs. Let's just refresh our memories:
[quote user="https://msisac.cisecurity.org/advisories/2010/2010-057.cfm"]A vulnerability has been discovered in Microsoft SChannel which could allow an attacker to take complete control of a vulnerable system. Microsoft SChannel, or Secure Channel, implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols. SSL and TLS are commonly used to implement secure communications for web browsing and other network services. Exploitation may occur if a user visits a web page which is specifically crafted to take advantage of this vulnerability. If successfully exploited, the attacker could gain SYSTEM level privileges and install programs, view, change, or delete data, or create new accounts with full user rights. Unsuccessful attempts to exploit this vulnerability will likely result in a denial-of-service condition.[/quote]
[quote user="http://blogs.technet.com/b/srd/archive/2009/03/10/assessing-the-risk-of-the-schannel-dll-vulnerability-ms09-007.aspx"]MS09-007 resolves an issue in which an attacker may be able to log onto an SSL protected server which is configured to use certificate based client authentication with only the public key component of a certificate, not the associated private key.[/quote]
[quote user="http://www.symantec.com/security_response/vulnerability.jsp?bid=24416"]The Microsoft Windows Schannel security package is prone to a remote code-execution vulnerability. This vulnerability occurs when processing and validating server-sent digital signatures by the client application. A remote attacker could exploit this issue by convincing a victim to visit a malicious website. Remote code execution is possible, but may be extremely difficult. In most cases, denial-of-service conditions will occur.[/quote]
[quote user="http://cvedetails.com/cve/2010-3229"]The Secure Channel (aka SChannel) security package in Microsoft Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7, when IIS 7.x is used, does not properly process client certificates during SSL and TLS handshakes, which allows remote attackers to cause a denial of service (LSASS outage and reboot) via a crafted packet, aka "TLSv1 Denial of Service Vulnerability."[/quote]
There you go. Remote privileged code execution, authentication bypass and DoS conditions.
Of course, Blakey won't point to these as proof that all proprietary software is bug-ridden shit, because his arguments are not based on logic, but on inconsistent emotional knee-jerk responses prompted by his arbitrary and irrational hatred of FOSS.