Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Microsoft Software

Few of OOXML's Flaws Have Been Addressed 162

I Don't Believe in Imaginary Property writes "IBM's Rob Weir has done a study on how many flaws were addressed by the OOXML Ballot Resolution Meeting. So far, using a random sampling technique, he has yet to find a flaw that was addressed, making the upper bound a paltry 1.5%. Even so, he's found a number of new flaws, including a security vulnerability: OOXML stores passwords in database connection strings in plain text. At least there were no mistakes on five of the first twenty five random pages he reviewed."
This discussion has been archived. No new comments can be posted.

Few of OOXML's Flaws Have Been Addressed

Comments Filter:
  • Re:huh? (Score:5, Informative)

    by Shados ( 741919 ) on Wednesday March 19, 2008 @01:57PM (#22797858)
    Because people actually do work with Office Suites, and they are an integral part of the workflow and ecosystem of significant companies IT.

    For example, a spreadsheet is often the favored client for an OLAP system, and complex spreadsheets will get reused a lot, so connection strings may be part of the overall "application" that the document has become.

    People like me and (probably) you tend to use documents as just that: documents. But in the big boy's world, they're far more important than that.
  • Re:huh? (Score:3, Informative)

    by jfclavette ( 961511 ) on Wednesday March 19, 2008 @01:58PM (#22797870)
    They're there for data bindings to databases, which can be used for anything from mass mailing clients to generate a list of items with pricing.

    I'd be interested in what is the alternative to storing them in plaintext in the document format. See, the database is going to be wanting that password, and it must be stored somewhere in the document in a stand-alone way or remembered by the user. If you encrypt it, you need to provide the keys in the same document or use a constant well-known key across all instance of the software. Hardly good security. The users might be willing to remember them, and I'm sure that's an option. In a lot of instances, credentials stored as plaintext with read-only permissions on specific tables is a fine solution, and you can do the security at the file access rights level. I would hardly call that a 'security hole'.
  • by pipatron ( 966506 ) <pipatron@gmail.com> on Wednesday March 19, 2008 @02:05PM (#22797952) Homepage

    It was Miguel de Icaza [wikipedia.org], and he is paid money indirectly from Microsoft since he works for Novell.

    One of the reasons I stopped using GNOME, I don't want anything to do with the Mono project.

  • Re:Small bias? (Score:3, Informative)

    by misleb ( 129952 ) on Wednesday March 19, 2008 @02:15PM (#22798066)
    Man, I'm really getting sick and tired of people abusing the "ad hominem" charge. Ad hom refers specifically to an attack on ones character which is used to discredit an argument. Simply questioning a persons motives and biases is not necessarily an ad hominem attack. It is important to make any potential biases clear. Though in this particular case, I'm not seeing it.

    Also, attacks on ones character may not be considered "ad hominem" unless it is being use to refute an argument. This is probably the most common misuse of the term. For example, I can call someone an asshole and it wouldn't necessarily be an "ad hominem" attack. It might just mean I think the person is an asshole. It is a valid opinion. It just isn't relevant to any logical argument.

    -matthew

  • Re:huh? (Score:3, Informative)

    by RobBebop ( 947356 ) on Wednesday March 19, 2008 @02:32PM (#22798230) Homepage Journal

    But in the big boy's world, they're far more important than that.

    I acknowledge that hooking documents into databases to subvert them into workflow process template beasties is a common practice, but I think the simple question "Why are there database passwords in the document?" kind of highlights that this is a bad practice.

    If security is a concern, "Document Applications" are a mistake.

    This also violates the (good) Model/View/Controller [wikipedia.org] software architectural model by kludging the view and controller together in the same product. And - despite claims that it cuts development time in half and saves a business money - it is a disaster to maintain and costs significantly more to re-write when opportunities to upgrade to better Office Productivity Suites arise.

    Unless you WANT to periodically rewrite your companies homespun IT applications, you should probably avoid hitching your Office Documents to Databases.

  • by vtscott ( 1089271 ) on Wednesday March 19, 2008 @03:07PM (#22798612)
    No, this is a perfect example of an ad hominem attack... This particular type of ad hominem is an ad hominem circumstantial [wikipedia.org]:

    Ad hominem circumstantial involves pointing out that someone is in circumstances such that he is disposed to take a particular position. Essentially, ad hominem circumstantial constitutes an attack on the bias of a person. The reason that this is fallacious in syllogistic logic is that pointing out that one's opponent is disposed to make a certain argument does not make the argument, from a logical point of view, any less credible; this overlaps with the genetic fallacy (an argument that a claim is incorrect due to its source).

    One example given by wikipedia is:

    Tobacco company representatives should not be believed when they say smoking doesn't seriously affect your health, because they're just defending their own multi-million-dollar financial interests.

    Just replace the relevant references with words like IBM, OOXML, etc. and it's basically the same.

  • Re:Small bias? (Score:2, Informative)

    by LoyalOpposition ( 168041 ) on Wednesday March 19, 2008 @03:07PM (#22798614)
    Ad hom refers specifically to an attack on ones character which is used to discredit an argument. Simply questioning a persons motives and biases is not necessarily an ad hominem attack.

    You started to get it right, but then you fell by the wayside. The entire phrase is argumentum ad hominem which means "argument to the man." It includes any attempt to discredit an argument based on characteristics of the person advancing the argument. In the instant case, the argument goes something like--OOXML should be rejected if it's a bad standard. OOXML is a bad standard because it has many shortcomings that haven't been addressed. Therefore OOXML should be rejected. Mongoose Disciple chose not to dispute any of the premisses of the argument or the inference, but rather to claim that Rob Weir stands to gain if the conclusion is accepted. Thus Mongoose Disciple presented us with an excellent example of an argumentum ad hominem.

    Also, attacks on ones character may not be considered "ad hominem" unless it is being use to refute an argument. This is probably the most common misuse of the term. For example, I can call someone an asshole and it wouldn't necessarily be an "ad hominem" attack.

    Completely correct. However, it's irrelevant to the instant argument.

    -Loyal

  • by seandiggity ( 992657 ) on Wednesday March 19, 2008 @04:00PM (#22799188) Homepage
    Even though none of the substantial problems have been addressed, NIST has approved OOXML [nist.gov].
  • by Trestop ( 571707 ) on Wednesday March 19, 2008 @06:54PM (#22801246) Homepage Journal
    As well as with the original article. First thing - you can't really say "few flaws have been fixed" when the original article (and the post blurb) specifically say that no fixed flaws where actually found in the testing sample.

    On the other hand, the statistics used by Rob Weir are shoddy according to my local statistics semi-expert (my girlfriend who finished 2nd year BA stats A. with a perfect 100 score). Specifically his sample is incredibly small: 25 random pages out of a random selection of 200 pages out of 5220 pages of the original standard document, out of 6045 pages actually in the original document (not the amended document), of which he doesn't know how many defects where actually reported against each page (we know how many were reported totally, but we don't know what is their percentage in the first sampling or subsequent sampling), and as Rob Weir found new defects that were not reported to Microsoft in time for the BRM, he has no idea what is the actual density of (pre-BRM) reported defects in the total "defect population" (defects discovered before BRM, after BRM and defects that are yet undiscovered).

    As such a confidence interval of 1.5% +-3% (i.e. at worst 4.5%, which is not what the post reports) seems highly suspect. To clarify for non-statistics students, a confidence interval of 1.5% +-3% in a result of 0 hits out of a random sample, means that Rob Weir is at worst 95.5% confident and at best 100% confident that there were no defects addressed by Microsoft.

    This is awfully presumptuous, even if its Microsoft that we are talking about.
  • Re: ad hominem (Score:3, Informative)

    by holloway ( 46404 ) on Wednesday March 19, 2008 @11:56PM (#22803428) Homepage
    Hi ozbird, I'm not a Standards NZ representative. I am part of the NZ Open Source Society (NZOSS) and a techy on Docvert. I am part of the advisory group formed by Standards NZ for this process but like all others in the group I'm not paid and I'm basically an independent who gets invited to meetings every so often to debate OOXML, and stuff like that.

All seems condemned in the long run to approximate a state akin to Gaussian noise. -- James Martin

Working...