Security Basics mailing list archives
Re: Cyber attacks "escalating" on irresponsible Tavis Ormandydisclosure
From: "Sandeep Cheema " <51l3n7 () live in>
Date: Wed, 7 Jul 2010 18:53:23 +0000
To put my thoughts: 1) There's more from Security point of view to disclose. Vendor has to react, there's no choice given. Otherwise, if you work with the vendor it can take anything from some days to 6 months or more. And when it's patched, they fail to acknowledge your report publicly. Not all perhaps. Just my personal experiences have been bitter. 2) There's no law that can prevent you from disclosing the vulnerability. Exploiting it of course is but that's not being discussed here. 3) Sometimes the vendor takes long to acknowledge the initial communication which builds up the frustration like we say from a search engine employee against a software giant. 4) Very few vendors, apart the major one's have teams dedicated to working with independent researchers. So, the good guy tries to find the correct contact to report but is unsuccessful and unfortunately has to blog about it. 5) I propose a system in which there is considerable monetary benefit by the vendor and not just credit. White hats should know underground is all about money and lack of it and money again. Regards, Sandeep Sent from BlackBerry® on Airtel -----Original Message----- From: iamherevivek () gmail com Date: Wed, 7 Jul 2010 15:20:50 To: <fyne_ugo () yahoo com>; <noloader () gmail com>; <murdamcloud () bigpond com> Cc: <security-basics () securityfocus com> Subject: Re: Cyber attacks "escalating" on irresponsible Tavis Ormandy disclosure Hola, I dunt agree that hackers are the only ones benefited. I see it as the part of a bigger cycle of worldwide security growth. Till someone breaks his/her head on a stuff hack it and share, the industry will stagnate with useless stuff. The disclosures are one of many things that keep the wheel of security and hacking turning. We should also remember that anyone disclosing vulnerability informs the writer/publisher of the app(s) affected first, initiating a permanent upgrade of specific approach that was flawed before it(the knowledge sharing is still nt at an appreciatable level). The users/ systems that aren't fixed will/might get hacked. Well, dunt we call it human negligence. My understanding is a very small amount of computer users are affected by the worms and viruses using the disclosures. At the same time, I would like to recall the fact that few combination of disclosures might bring a set of worms that make into the big league. Well, to wrap it up, everything(vulnerability disclosures) that has a beginning has an end (patches and upgrade security understanding of developers). It has its life time, some learn it the hard way during it. I think it will take tons of suggestions and open discussions to come up with a process that improves collective vulnerability, exploit and security research. My 2 cents Dead brain Sent on my BlackBerry® from Vodafone -----Original Message----- From: fyne_ugo () yahoo com Sender: listbounce () securityfocus com Date: Tue, 6 Jul 2010 21:14:20 To: <noloader () gmail com>; Murda<murdamcloud () bigpond com> Reply-To: fyne_ugo () yahoo com Cc: <security-basics () securityfocus com> Subject: Re: Cyber attacks "escalating" on irresponsible Tavis Ormandy disclosure Vulnerabilities shouldn't be disclosed publicly. Its only hackers that would benefit from them. There should be bodies that will follow up and check them. Sent from my BlackBerry wireless device from MTN -----Original Message----- From: Jeffrey Walton <noloader () gmail com> Sender: listbounce () securityfocus com Date: Tue, 6 Jul 2010 14:31:19 To: Murda<murdamcloud () bigpond com> Reply-To: noloader () gmail com Cc: <security-basics () securityfocus com> Subject: Re: Cyber attacks "escalating" on irresponsible Tavis Ormandy disclosure
Personally, I think that a huge fist of economics may at some point render some of these points moot. Companies may well not be able to afford to care about holes...especially when those companies are reliant on over-leveraged financial systems.
I'd settle for some sort of product liability. Its not hard to imagine the discovery phase of litigation revealing that a vendor sat on a bug for years.... On Mon, Jul 5, 2010 at 7:29 PM, Murda <murdamcloud () bigpond com> wrote:
So this seems to boil down to the two arguments(in my mind at least): "The action of disclosing vulnerabilities may increase the risk of a breach but may increase the likelihood of the vendor fixing the hole," Versus: "The inaction of not disclosing the vulnerability may decrease the risk of a breach but does not increase the likelihood of a vendor fixing the hole," Does that sound right? Anyone who has the ability to quantify those arguments in a meaningful manner wins the right to tell me how the stock market will fluctuate in the next six months... Perhaps the thread name could (just as justifiably?) be "Cyber Attacks "escalating" after irresponsible MS not fixing hole". Personally, I think that a huge fist of economics may at some point render some of these points moot. Companies may well not be able to afford to care about holes...especially when those companies are reliant on over-leveraged financial systems. [SNIP]
------------------------------------------------------------------------ Securing Apache Web Server with thawte Digital Certificate In this guide we examine the importance of Apache-SSL and who needs an SSL certificate. We look at how SSL works, how it benefits your company and how your customers can tell if a site is secure. You will find out how to test, purchase, install and use a thawte Digital Certificate on your Apache web server. Throughout, best practices for set-up are highlighted to help you ensure efficient ongoing management of your encryption keys and digital certificates. http://www.dinclinx.com/Redirect.aspx?36;4175;25;1371;0;5;946;e13b6be442f727d1 ------------------------------------------------------------------------ ------------------------------------------------------------------------ Securing Apache Web Server with thawte Digital Certificate In this guide we examine the importance of Apache-SSL and who needs an SSL certificate. We look at how SSL works, how it benefits your company and how your customers can tell if a site is secure. You will find out how to test, purchase, install and use a thawte Digital Certificate on your Apache web server. Throughout, best practices for set-up are highlighted to help you ensure efficient ongoing management of your encryption keys and digital certificates. http://www.dinclinx.com/Redirect.aspx?36;4175;25;1371;0;5;946;e13b6be442f727d1 ------------------------------------------------------------------------
Current thread:
- Re: Cyber attacks "escalating" on irresponsible Tavis Ormandydisclosure Sandeep Cheema (Jul 07)