Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re: Fixed yesterday (Score 1) 85

No. We were talking about what impacts that particular security model has. Then people started getting personal. I said it's better to know sooner, even if would-be attackers find out as well. You disagree and would rather everyone fly on ignorance while the vendors (and possibly governments) dally about. You're welcome to your opinion.

Comment Re:Not a bad guess. Doesn't happen to be right (Score -1, Troll) 85

Backpedal with fallacies if you like.

Those vast majority of bad guys exploit things AFTER public release often don't even know there is a new exploit added to the toolkit.

Well then those admins aren't doing their jobs. They ought to be monitoring those public lists...oh right, they're all largely neutered now thanks to 'responsible' disclosure.

The immediate disclosure position depends on the argument that if there are a dozen people in the world who could theoretically find it, we should distribute an exploit to tens of thousands of bad guys.

Vs the knowledge remaining the exclusive domain of people who discover it, many of whom wish to weaponize it for their benefit, or worse, sell them to kiddies who will now use them against admins who still have no clue about the vulnerability. They can now operate with impunity until some admin discovers evidence of past attacks and makes it public. Of course, he will likely do so without the carnal knowledge required to mitigate because he doesn't know how it works. At that point, the damage is already done.

Comment Re:Absolutely. Take down Wikipedia with one packet (Score 1) 85

During that time the NSA knew about it and likely got away using it because it was not disclosed. It's not guaranteed that someone else will figure it out, but it grows more likely with time, especially for holy-grail vulnerabilities that crooks and state-actors crave. Eventually, someone will use it, or, worse, has been using it all this time. Full disclosure forces earliest-possible resolution, either from the vendor, by admin mitigation/workaround, or by user migration from the broken software. The latter two can't happen without it, and many vendors ARE slow to respond, especially if they feel they can ride on the shortsightedness of the 'responsible disclosure' culture. It also forces vendors to prioritize security in their development process. They'll want to avoid that mad darwinian rush you're talking about. As far as state-actors go, fuck them. They're no better than the ransomware crooks.

You can't operate on the assumption that everyone's a good guy who wants to work out the problem amicably. That's the thing with full disclosure, it doesn't matter what the motivators are for the release, it matters that people who need to know, now know.

I realize your position is the current consensus, but I don't agree with it. The current crop of 'wannacry' style malware is a perfect example. Microsoft is one of those who wants 'responsible disclosure' and yet still refuses to make the architectural changes needed to stop these kinds of attacks. All we get are shitty band-aids. Vendors need to feel the economic impacts from bad security that their users do in order to motivate change in their cultures.

Comment Re:Not a bad guess. Doesn't happen to be right (Score 0) 85

You're right, it does give kiddies access, but it also gives admins access too. The worst possible outcome is admins not knowing the hole is there when they're attacked by those who've decided to exploit the vulnerability themselves.

Depending on security through obscurity and vendor charity is foolish. If you've been working in this field as long as you say, you ought to know that. I remember the squabbles over full disclosure vs 'responsible' disclosure years ago. I'm not convinced the current consensus on the latter benefits anyone but lazy vendors and those who want to capitalize on vulnerabilities.

Comment Re:Absolutely. Take down Wikipedia with one packet (Score 0) 85

attackers don't wait weeks or months for the vendor to respond, and if you happen to be the first to figure it out, you can pretty much guarantee that someone else with less savory intentions is right behind you. If your goal is to help, the best way is to release publicly ASAP because it gives users the most time possible to mitigate incoming attacks as well as force the vendor to prioritize a fix.

The temporary "security through obscurity" of 'responsible disclosure' is a fool's game, and only works at all if the vendor happens to be responsible (and responsIVE). Many of them aren't and have long histories of ignoring reports for marketing reasons, dragging their heels with fixes (ego, or hoping to get people to pay for their next version), and suing the informants. Buffering vendors from this darwinian process does not help the would-be victims of their buggy software as it does not coerce them into prioritizing better development practices.

Slashdot Top Deals

"Unibus timeout fatal trap program lost sorry" - An error message printed by DEC's RSTS operating system for the PDP-11

Working...