Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Security Bug Encryption Google

Heartbleed Sparks 'Responsible' Disclosure Debate 188

bennyboy64 writes: "IT security industry experts are beginning to turn on Google and OpenSSL, questioning whether the Heartbleed bug was disclosed 'responsibly.' A number of selective leaks to Facebook, Akamai, and CloudFlare occurred prior to disclosure on April 7. A separate, informal pre-notification program run by Red Hat on behalf OpenSSL to Linux and Unix operating system distributions also occurred. But router manufacturers and VPN appliance makers Cisco and Juniper had no heads up. Nor did large web entities such as Amazon Web Services, Twitter, Yahoo, Tumblr and GoDaddy, just to name a few. The Sydney Morning Herald has spoken to many people who think Google should've told OpenSSL as soon as it uncovered the critical OpenSSL bug in March, and not as late as it did on April 1. The National Cyber Security Centre Finland (NCSC-FI), which reported the bug to OpenSSL after Google, on April 7, which spurred the rushed public disclosure by OpenSSL, also thinks it was handled incorrectly. Jussi Eronen, of NCSC-FI, said Heartbleed should have continued to remain a secret and be shared only in security circles when OpenSSL received a second bug report from the Finnish cyber security center that it was passing on from security testing firm Codenomicon. 'This would have minimized the exposure to the vulnerability for end users,' Mr. Eronen said, adding that 'many websites would already have patched' by the time it was made public if this procedure was followed."
This discussion has been archived. No new comments can be posted.

Heartbleed Sparks 'Responsible' Disclosure Debate

Comments Filter:
  • No Good Solution. (Score:5, Insightful)

    by jythie ( 914043 ) on Friday April 18, 2014 @08:54AM (#46786737)
    This really strikes me as the type of problem that will never have a good solution. There will always be competing interests and some of them will be mutually exclusive while still being valid concerns.
  • WTF? (Score:5, Insightful)

    by gweihir ( 88907 ) on Friday April 18, 2014 @08:58AM (#46786757)

    The only possible way is to disclose to the responsible manufacturer (OpenSSL) and nobody else first, then, after a delay given to the manufacturer to fix the issue, disclose to everybody. Nothing else works. All disclosures to others have a high risk of leaking. (The one to the manufacturer also has a risk of leaking, but that cannot be avoided.)

    The other thing is that as soon as a patch is out, the problem needs to be disclosed immediately by the manufacturer to everybody (just saying "fixed critical security bug" is fine), as the black-hats watch patches and will start exploiting very soon after.

    All this is well known. Why is this even being discussed? Are people so terminally stupid that they need to tell some "buddies"? Nobody giving out advance warnings to anybody besides the manufacturer deserves to be in the security industry in the first place as they do not get it at all or do not care about security in the first place.

  • by gweihir ( 88907 ) on Friday April 18, 2014 @09:03AM (#46786777)

    Indeed. But there is a _standard_ solution. Doing it in various ways is far worse than picking the one accepted bad solution.

  • As bad ideas go... (Score:4, Insightful)

    by ClayDowling ( 629804 ) on Friday April 18, 2014 @09:05AM (#46786793) Homepage

    This notion ranks right up there. Manufacturer was told. Everybody else was then told. That's how it's supposed to work. This notion of "let's just tell our close friends and leave everybody else in the dark" is silly. You'd only wind up leaving most people open to exploit, because if you think your secret squirrel society of researchers doesn't have leaks, you're deluding yourself.

  • by Anonymous Coward on Friday April 18, 2014 @09:08AM (#46786809)

    There should have been a public advisory telling everybody with an OpenSSL based server to shut down the server, wait for an update, install the update and only then put the server online again. The biggest mistake was to keep vulnerable servers running for even a short while after the vulnerability was published.

  • Issue? (Score:5, Insightful)

    by silanea ( 1241518 ) on Friday April 18, 2014 @09:14AM (#46786839)

    What exactly is the issue here? Maybe I misread TFS and the linked articles, but as I understand the chief complaint - apart from Google's delay in reporting to OpenSSL - is that some large commercial entities did not receive a notification before public disclosure. I did not dig all too deep into the whole issue, but as far as I can tell OpenSSL issued their advisory in lieu with a patched version. What more do they expect? And why should "Cisco[,] Juniper[,] Amazon Web Services, Twitter, Yahoo, Tumblr and GoDaddy" get a heads-up on the public disclosure? I did not get a heads-up either. Neither did the dozens or so websites not named above that I use. Neither did the governmental agency I serve with. Nor the bank whose online-banking portal I use. Are we all second-class citizens? Does our security matter less simply because we provide services to fewer people, or bring lower or no value to the exchange?

    A bug was reported, a fix was issued, recommendations for threat mitigation were published. There will need to be consequences for the FLOSS development model to reduce the risk for future issues of the sort, but beyond that I do not quite understand the fuss. Can someone enlighten me please?

  • Re:Not that good (Score:4, Insightful)

    by Opportunist ( 166417 ) on Friday April 18, 2014 @09:15AM (#46786841)

    Would you put your life on closed source software not having any bugs that we just don't know about because it's closed source and hence can NOT be reviewed sensibly?

    Closed source and open source share one problem: Both can and will have bugs. Open source only has the advantage that they will be found and published. In closed source, usually NDAs keep you from publishing anything you might come across, ensuring that knowledge about these bugs stays within certain groups that have a special interest in not only knowing about it but abusing them.

  • Re:WTF? (Score:4, Insightful)

    by Anonymous Coward on Friday April 18, 2014 @09:32AM (#46786933)

    If no fix is available yet, they're still being broken into - but you've just added the thousands of hackers who *didn't* know about it to the list of those exploiting it.

  • by xxxJonBoyxxx ( 565205 ) on Friday April 18, 2014 @09:41AM (#46786979)

    >> are we seriously blaming google and not NSA who found the bug 4 years ago when the bug was first introduced?

    Yes. The NSA is the US gov's lead black hat. Google's an advertising company that depends on people trusting the Internet for information and commerce. I'd expect the NSA to hoard information to assist their black-hatting, and I'd expect Google to quickly share anything they know so security vulnerabilities can be patched and people don't lose faith in the Internet*.

    * = (Seriously, when people have asked me what to do about Heartbleed, I've said "don't buy anything you don't need, and try to avoid paying any bills online or doing any online checking for a week or two - then change your password as soon as you sign on.")

  • Re:wtf ? (Score:4, Insightful)

    by MrL0G1C ( 867445 ) on Friday April 18, 2014 @10:04AM (#46787083) Journal

    As an end-user I'm glad it was shouted about because it gave me the chance to check that any software that could affect me financially was updated or invulnerable.

    So, can you tell me why I shouldn't be notified?

  • Blame Game. (Score:5, Insightful)

    by jellomizer ( 103300 ) on Friday April 18, 2014 @10:08AM (#46787111)

    That is the biggest problem. Other then rewarding the people who fix the problem, we try to figure out who is to blame for every freaking thing.

    Oh look a flood hit the city unexpected, well lets blame the mayor for not thinking about this unexpected incident.

    Or a random guy blew up something, why didn't the CIA/NSA/FBI know that he was doing this...

    We are trying to point blame on too many things, and less time trying to solve the problem.

  • by Opportunist ( 166417 ) on Friday April 18, 2014 @11:26AM (#46787699)

    The whole point of OSS is that I do not need to trust it. I can review it if I please.

    Trustworthiness is only a matter with closed source. Because there all I can really do is trust its maker.

  • by raymorris ( 2726007 ) on Friday April 18, 2014 @01:14PM (#46788677) Journal

    > they had a whole day to attack everyone who wasn't blessed with the early knowledge, instead of a couple of hours

    Years, not hours. Assuming the bad guys knew about it, they had two YEARS to attack people. If we told people that there was an issue on Monday, that doesn't protect them - they just know that their vulnerable. They couldn't do anything about it until the update packages were available on Tuesday.

    On the other hand, had we made it public on Monday, we would have GUARANTEED that lots of bad guys knew about it, during a period in which everyone was vulnerable.

    I'm talking about what we did here. It appears to me that Google definitely screwed up by not telling the right people on the OpenSSL team much sooner. (Apparently they told _someone_ involved with OpenSSL right away, but not the right soemone.)

    > you protect some large sites, but those large sites are run by large groups of people. For one thing, they probably have full time security staff who will get the notification as soon as it's published, understand its significance, and act on it immediately.

    ROTFL. Yep, large corporate bureaucracies, they ALWAYS do exactly the right thing, in a matter of hours.

"May your future be limited only by your dreams." -- Christa McAuliffe

Working...