Article Categories
» Arts & Entertainment
» Automotive
» Business
» Careers & Jobs
» Education & Reference
» Finance
» Food & Drink
» Health & Fitness
» Home & Family
» Internet & Online Businesses
» Miscellaneous
» Self Improvement
» Shopping
» Society & News
» Sports & Recreation
» Technology
» Travel & Leisure
» Writing & Speaking

  Listed Article

  Category: Articles » Technology » Computer Security » Article
 

RSS Security




By Sharon Housley

Copyright 2005 Sharon Housley

RSS Security
RSS is growing at a lightening speed. What was once only known as a "techie tool", RSS is becoming a tool that is continuously being used by the general population. Along with the good comes, the not so good. And while some have mentioned the emergence of RSS spam, where content publishers dynamically generate nonsensical feeds stuffed with keywords, the real concern relates to security. While an annoyance to the search engines, spam in RSS feeds pales in comparison to the possible security concerns that could be in RSS' future.

Security Implications Related to RSS.
As RSS gains momentum security fears loom large. As publishers are quickly finding innovative uses for RSS feeds, hackers are taking notice. The power and extendibility of RSS in its simplest form is also its achilles heel. The expansion capabilities of the RSS specification, specifically the "enclosure" field which has launched the podcasting phenomenon, is where the vulnerabilities lie. The enclosure field in itself is not the problem, in fact the majority of RSS feeds do not even use the enclosure tag. The enclosure tag is essentially used to link to file types, things like images, word documents, mp3 files, power point presentations, and executables and can be thought of in similar terms to email attachments.

The fact that RSS can be used to distribute these file types has opened a myriad of doors to users of the syndication standard, but also has created cause for concern. Most people do not feel that the risk is significant because people "choose" the content that they receive, and while it might make the distribution of malware, viruses and spy applications via RSS less prevalent, their is still the inherent risk of a infected file being distributed.

The problem is one of both technology and lack of education.
The danger lies in the fact that many RSS readers, news aggregators, or pod-catchers automatically download the information contained in the enclosure field regardless of its file type or source.

Most RSS developers acknowledge the risks associated with the enclosure field, but few have had the forethought to include filtering, screening or authentication capabilities and many automatically download enclosures.

Nick Bradbury of Bradsoft/NewsGator seems to be proactive, designing FeedDemon with security in mind. FeedDemon uses an editable safelist of file types as well as allowing users to monitor what files are automatically downloaded. FeedDemon also contains hard-coded warnings related to specific file types.

Developers of ByteScout took a different approach to the handling of enclosure files, ByteScout does not automatically download anything without user intervention for each download.

Unfortunately, not all RSS readers, aggregators and podcatchers consider the possible security implications associated with RSS feeds and podcasts, some will automatically download enclosures without warning or any thoughts of security. Be sure to examine how your RSS reader handles files contained in the enclosure field of an RSS feed.

With the increased use of RSS and podcasting, the security risks increase with it. Their is cause for concern, however proactive users and conscientious developers can easily subvert the risk by taking precautions seriously. Computer viruses and malware are cause for legitimate concern, there is ample time and action that can avert potential problems.

 
 
About the Author
Sharon Housley manages marketing for FeedForAll http://www.feedforall.com software for creating, editing, publishing RSS feeds and podcasts. In addition Sharon manages marketing for FeedForDev http://www.feedfordev.com an RSS component for developers.


Article Source: http://www.simplysearch4it.com/article/13153.html
 
If you wish to add the above article to your website or newsletters then please include the "Article Source: http://www.simplysearch4it.com/article/13153.html" as shown above and make it hyperlinked.



  Some other articles by Sharon Housley
Develop Quality Content to Rule the Web
Copyright 2005 Sharon Housley Fresh content. The age old question keeps coming up, how do you retain website visitors, how do you make visitors return to your website? ...

Advertising in RSS Feeds
Copyright 2005 Sharon Housley As publishers have moved towards monetizing RSS feeds, their have been vibrant discussions as to whether ...

Instant Podcasts Without Saying a Word
Copyright 2005 Sharon Housley Instant Content; Converting a Text Article to a Podcast We are taught to recycle paper, cans, bottles and plastic but ...

What is Creative Commons
Copyright 2005 Sharon Housley Creative Commons is a nonprofit organization that allows artists, authors, publishers and musicians the option of creating and defining a flexible copyright for their creative works. Creative ...

RSS Ego Searches
Copyright 2005 Sharon Housley Ego searches are free and simple searches designed to monitor blogs and news portals for mentions of your company, product, competitors or other specific keywords. Conducting ego ...

  
  Recent Articles
Say Goodbye To Adware
by Josh George

Where to Find Free Spyware Removal
by Christopher Smith

Search Technologies to Solve the Problem of Information Security
by Alena Siameshka

Antivirus Software and Intrusion Prevention Solutions
by Joe Cohen

Conducting Information Systems Audit
by Wale Wahab

How to Speed Up Your Computer: Part 2
by Nathan Segal

Spyware Remover
by Greg Martinez

Antivirus Software - A Must For Your Computer
by Jakob Culver

Virus Alertness Tricks
by Andrew Corner

Viruses And Worms: Your System Needs Protection
by Garry Allen

Boost your Security with Biometry
by David Casper

Handheld Devices: Client Security and Connectivity Issues
by Joshua Feinberg

Network security journal guide
by Mansi gupta

Can't connect to database