
L0pht Joins MS As BUGTRAQ Outcasts 123
SmellyBrain writes: "As a follow up to the recent story of BUGTRAQ no longer publishing Microsoft advisories, it seems they are no longer publishing advisories by @stake (the company that brought the L0pht). ZDNet has an article about this here. It seems that just like Microsoft @stake changed their advisories to include minimal information and a link to their Web site. You can find the message by the moderator, Elias Levy, asking for the subscribers feedback here. This is a very dangerous new trend in the security industry."
Re:Monopolies rule! (Score:1)
Re:exactly how is this dangerous? (Score:1)
Re:Great. (Score:1)
Also, this really isn't l0pht we're talking about, its @stake. Once you sell out you are often forced to sumbit to things that you don't like. (like ads for PT Cruisers with your logo on the side)
Original post (Score:1)
Its the first step (Score:3)
That would be a big step in quieting your enemies. IF you can't legally install the software without agreeing to a license that prevents you from telling anyone about its shortfalls then I suppose there will be much less ammo for the competition. If you don't know whats wrong with something it is hard to position yourself as an alternative.
Re:L0pht? (Score:1)
Not that I agree with this approach, but it's not like they're hiding anything. They are disclosing everything, but asking you to visit their site. For what gain I don't know since it's a plaintext file without any links, let alone any advertising...(which is of course a good thing)
Re:spelling (Score:1)
Butt "brought" is a reel word, so a spell chequer wood knot half pict up on it.
Anonymous Moron
According to whom? (Score:1)
Ten bucks says "kludge" means what I thought it meant [tuxedo.org].
You dickhead.
Re:Its the first step (Score:2)
Intel could have gone the same way with RAMBUS (and might have even done so for a while) but they don't control all their customers the way Sun does.
What I'm getting at is this: some hardware has this nasty list non-disclosure wrapped around sharing bugs/exploits, so what is to stop industries like Oracle, Windows SERVERS, MS Certified Network Administrators and the like from being allowed to disclose system problems.
It wouldn't make reporting bugs illegal, but so much of the industry would have voluntarily signed the NDAs that no-one will report on anything but open-source software.
Re:Monopolies rule! (Score:2)
There are three types of hydrogen... there's your ordinary hydrogen, there's deuterium (with one neutron) and there's tritium (with two neutrons) - the last of these is also radioactive.
Re:Free / semi-legal version (Score:1)
Because, let's face it, if we were not meant to print out copies from web-pages, Netscape would not have a Print button.
Re:Not a big deal (Score:2)
Re:Why is this dangerous? (Score:3)
They're sending you to a link which they can update as more information is available.
If they were really interested in improving security service to their customers, they'd just post a second advisory and adorn the first with a link to it.
That way, you get the early information when it's available, you get the later information when it arrives (and it gets brought to your attention), and you have a history to peruse of what was known and done.
The other way, if they change the advisory on their page, you're not notified of the potentially valuable new information, so it's much easier to miss it. If asked to demonstrate why you did something, you could return and find your supporting evidence reversed. The changes could actually drop information you remain interested in.
The only advantage provided by the approach they did take is that it conceals the history of the report, giving the company more room to falsely polish its image - at your expense.
This fits Microsoft (and many of today's "businesses") to a T: promote the company, trip up the customer.
I'm amazed anew every day by the apparent willingness of the majority of customers to be harmed and then bamboozled by transparent excuses. Perhaps someone (I speak seriously) could explain this to me.
I wonder if some freenet-like project could be devoted to archiving useful information which would otherwise be so controlled. I think there would be a very stong case for fair use, especially as the primary value of the archive would be in the contained facts, not their expression.
IE Danger (Score:2)
There already are assorted non-IE irritants scattered throughout the site, and a month ago the main page went blank for two weeks with my Netscape version (due to bad Javascript in the Netscape-oriented page). They're already not supporting Netscape well, and if they made IE their only supported browser then things can easily break.
New statement from bugtraq (Score:1)
A full description of @Stake's response can be found here [l0pht.com].
A full description of Microsoft's response can be found here [microsoft.com].
Recommendations (Score:1)
Re:this is not a bad trend (Score:1)
Re:exactly how is this dangerous? (Score:3)
> allows the vendor to add/edit or delete the
> advisory *without* telling anyone.
While the most obvious problem, its not the major issue in my mind.
When a message goes to bugtraq, it is immortal. It never goes away, ever. Even if the BUGTRAQ main archives are wiped out, its replicated in so many place, under so many different points of control.
When its on a website, if the company folds, or redesigns their website, or has a hard drive failure and finds their backups weren't working...
The adviseries are gone. So in the future, if anyone has a reason to need them for any reason, they simply are not available.
Thats only part of the problem. Its an annoyance. BUGTRAQ is a single point of information. I go there and I can find out about all sorts of security problems, with in-depth information (usually) on how I can assess my vulnerability and reduce or eliminate exposure.
If one company (like M$) starts releaseing no content adviseries, and making me go to their website for the info (M$ is a bad example of course since NO M$ advisery could possibly effect a UNIX sysadmin like myself
It discourages active security monitoring. It makes more work for me...and the end result 90% of the time is finding out that its not a problem that affects me anyway (either due to specific version issues, or not being software I am actually using, or depending on features that I am not using).
This is just bad all around. It decreases the value of the list. It makes it harder and more time consuming to keep current - which translates directly into more people deciding that they just don't have the time/energy to do it. Not all of us have infinite time to keep up with this stuff.
-Steve
Re:exactly how is this dangerous? (Score:2)
The real problem is in the other way. If an advisory have been posted, that said that on Operating System X version 6.37, the software foo version 117.12 have a hole, I expect this information to stay here. Having a link to an external resource make this information at risk. If, 5 years after that, I need that info (for instance, because I happen to have a X-6.37 with foo-118.12) I need the correct link. (I expect security report to be mounted with the immutable flag, like any respectable root partition, or beeing in a append-only chflaged file
I agree in advance with the fact that, in the l0pht case, the probably don't plan to remove advisories (but M$ surely do).
There are a lot resources here that were only avalaible in deja usenet archives. I recall replying to technical cocoa questions with deja usenet links on next-progs. If someone now scans the mailing list archive, he'll be left with incomplete answers. This is why linking is sometimes a bad idea.
Cheers,
--fred
I hope this doesn't fragment bugtraq (Score:1)
This is definitely a struggle for control of information. bugtraq wants it all on their list and the vendor want's it back on their website. I honestly prefer to have the information available on a vendor-neutral site like bugtraq, but I fear trying to force vendors to do this may cause more problems than it solves.
I want to use bugtraq as my primary source for security updates - and if all of the posts are not sent to bugtraq. And especially if groups like l0pht or others stop sending them through bugtraq, I'll end up having to follow many more websites and mailing lists for my updates. This is not good for the security community at all.
--
Twivel
Re:exactly how is this dangerous? (Score:1)
THIS IS WHAT HAPPENS WHEN YOU SELL OUT! (Score:1)
What is L0pht thinking? (Score:1)
Ok, here's one I just don't get. Of course we all know that MS, et al don't like full disclosure because then everyone knows how easily they can be 0wn3d.
But if L0pht is so leet, then wouldn't they want everyone to know about all the 'sploits they found?
Resolving conflicting information (Score:1)
Surely this is counterproductive for the company? (Score:2)
Except that neither of them carry banner ads, so a hit _costs_ them money rather than making them money. There's a small argument that they might want people on their site to get them to click around on it and get some more information (and therefore, hopefully, buy something) but if you're going to want that then surely it won't make any difference where you read it - I mean, if you're interested you'll go there from the e-mail in all probability and if you aren't you're just going to jump straight out anyway.
So the logic of this decision on both of their parts rather falls down IMHO. Microsoft come across as wanting to stifle reporting and discussion of problems in their software (what a surprise there!) and @stake come across as a group new to the game who don't understand what they're doing. Neither is something I'd want people to percieve of me.
Re:exactly how is this dangerous? (Score:1)
Re:my post to bugtraq should help (Score:1)
From: Weld Pond
To: BUGTRAQ@SECURITYFOCUS.COM
Subject: @stake Advisory Notification Format
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
I think everyone out there knows that we [stake.com]are committed to full disclosure and the concept of freely available security advisories. Many vendors do not issue bulletins after we [stake.com]report problems to them, even after they subsequently fix the problems. Without advisories from independant researchers there is no check on product vendors. This is a service that we [stake.com]give to the security community because we [stake.com]think it is the right thing to do with the fruits of our [stake.com]research. With our [stake.com]new mailing list notification format we [stake.com]have not changed this one bit. we [stake.com]are giving out more information now in our [stake.com]advisories than we [stake.com]ever have before, so we [stake.com]are certainly not witholding anything. Quite the opposite. Over the past few months we [stake.com]have expanded our [stake.com]overview sections that allow non-technical people to scope the problem. we [stake.com]have expanded our [stake.com]detailed technical discussions of issues, many times including detailed source code examples. And, I think most importantly, we [stake.com]have greatly expanded our [stake.com]solutions discussion so that people are not always reliant on vendor patches. we [stake.com]need many was to mitigate vulnerabilities because there are many environments.
The advisory notifiction format we [stake.com]are using has about the same amount of information as the paraphrased advisories that Elias posted for the latest Microsoft advisories and the same amount of information that some other researchers post in their advisories. This is more than enough information to decide if the issue at hand effects you and you need to dive deeper into our [stake.com]analysis.
What we [stake.com]are doing is adding more information than we [stake.com]have in the past and we [stake.com]are adding it on our [stake.com]web site. There are plans to add much more. we [stake.com]think that our [stake.com]web site and its accompanying web technology is the best place to expand our [stake.com]free information dissemination into the future. we [stake.com]have many ideas in store that I know people will appreciate. Of course, notifications of important information releases will be made to mailing lists that accept them so everyone who wishes to can read and use the information. we [stake.com]may even set up our [stake.com]own notification list if there is a demand for that.
We have stayed away from cluttering up our [stake.com]advisories with marketing gorp, like ads about our [stake.com]services or ads about our [stake.com]company like many commercial research teams do. we [stake.com]pride ourselves in publishing our [stake.com]research on an academic level and always have. This will not change.
weld
-----BEGIN PGP SIGNATURE-----
Version: PGP 7.0
ib3tUth1nKtH15ofF3r5U50M3/3-leet/++m345Ur30fPr0t3
-----END PGP SIGNATURE-----
Re:Business as usual (Score:1)
Re:exactly how is this dangerous? (Score:5)
Let's say Microsoft decides to end of life NT 4.0. Since it's not supported anymore, they don't publish advisories or fixes for it. Then one day, boom. ALL NT advisories are simply deleted from Microsoft's website. The only thing left in BugTraq archives is a bunch of dead links. OR worse yet... they go through all 98/Me/2000 advisories that also mention NT, and just remove NT from the affected OS's line. They could certainly do this, and could justify it by saying "NT isn't supported anymore." This would certainly accelerate any Win2000 upgrade plans i had, and that's the whole point of this.
@stake's new format is not nearly as bad as Microsoft's, but i still firmly believe they need to post then entire advisory to BugTraq.
Re:exactly how is this dangerous? (Score:1)
Can't read em by email (Score:1)
This is bad. Now I can't see the details about a security hole without firing up a web browser and going round half a dozen sites... Or if I've already been hit by some denial-of-service, I won't be *able* to fire up a web browser to see which of the many security holes it might have been.
MS doing this doesn't bother me personally since I trust them so little I don't run their software, but if this becomes a trend, it'll be a blow for security... and that's something so fragile we can't afford to make it harder...
And yes, I think everyone's fear of companies rewriting earlier reports to make them seem less serious or "accidentally" moving them so the links are dead is a very real one.
- Muggins the Mad
Making a new security bug... (Score:1)
Let's think. L0pht or M$ find or get a new security exploit. Two ways go. One way is that the exploit is published ASAP. However links, bad communications, heavy traffic and this stupid copyright protection delay the spread of the news. In cases of serious and massive DoS or E-mail trojans this is a very serious possibility that some may exploit.
The second way. The notice is hold to avoid panic/bad publicity/exploits. Good if the bug came from inside. MAYDAY if the bug was found outside. RED ALERT if this is a crackers finding. Under such trend news will surely get quite slow. And meanwhile the underground may already attacking full arms somewhere. ut that's not the worst. Our good corps may try to force the white hats to shut their mouths on the basis of such copyrights and other things they may think. Then it will be a nightmare case. Imagine news roaming through the IRCs and underground chats and Bugtraq with a piece of material around its mouth. That will not be overkill. That will be the revival of Morrison's times.
Now L0pht may go the first way. M$ had already shown good examples of going the second way. Add the possibility of an UCITA on security issues and go get a cup of coffee. It may be the last you may calmly drink, without thinking too much about the work...
DANGER: info as a currency coming soon! (Score:2)
Personaly I think this will continue in the direction of "Security Breach/Bug information is actualy IP to be sold" unless the community at large takes note and says "NO MORE!"
So what do you think? Will this go too far and threaten the security of the Net at large or will the information somehow "make it way" onto the net in free forums?
Re:Microsoft knows best? (Score:1)
Microsoft allways makes the argument that when they don't have total control the consummer suffers.
But for all they crys for inovation.. Inovation dosn't happen in a vacume.
Microsoft dosn't trust it's users, dosn't trust develupers who code for them.. they don't even trust the Microsoft trainned SysAdm...
It's the SysAdms job to track this stuff.. Microsoft puts out the best patch they have.. They can update as submit new updates to bugtrap as things progress.. They don't need to retroactivly change bugtrap reports.. can they retroactivly change the work allready done? No.. they can't.. Change the bugfix and issue a NEW report..
Why dose anyone trust a company so clearly incapable of trust...
Re:Not a big deal (Score:1)
Could you really plausibly see this happening? I mean, I know there's some stupid laws around, and I know they have a habit of getting stupider, but the inability to point out software flaws? It's so easy to make comparisons to traditional industries like appliances, cars, food, and so on, and show how if you disallow software flaw reports, then you'd also have to disallow reports (including safety reports) in these traditional areas. Government agencies themselves will often produce these reports, consumer watch groups in particular. And the free speech is clear, the same as if you wrote a letter to a newspaper describing how some car can malfunction and kill you.
Sorry, but I just can't see this particular crazy thing happening, no matter how hard I try.
One example of the flaw of this approach (Score:2)
Can these guys, who care so much about their customers, hold up a
If they down the server and don't present the info somewhere else? And if some one drops some snake oil on a forum like
Note - BugTraq is a list. So, no matter the critical level the situation, the information already manages to get critical mass. Besides BugTraq does not restrict information of being spread. Now we have here one point. One single Pearl Harbor. Oh, hey, Pentagon! How do YOU think about this stuff? It seems you talked about such things, well in somewhat different context, quite recently... How is the feel that suddenly Big Money Corp creates you a whole new Arizona right on your backs?
Re:Less Accessible. (Score:2)
Date: Wed, 13 Dec 2000 16:24:53 -0500
From: Weld Pond
To: BUGTRAQ@SECURITYFOCUS.COM
Subject: @stake Advisory Notification Format
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
I think everyone out there knows that we are committed to full disclosure and the concept of freely available security advisories. Many vendors do not issue bulletins after we report problems to them, even after they subsequently fix the problems. Without advisories from independant researchers there is no check on product vendors. This is a service that we give to the security community because we think it is the right thing to do with the fruits of our research. With our new mailing list notification format we have not changed this one bit. We are giving out more information now in our advisories than we ever have before, so we are certainly not witholding anything. Quite the opposite. Over the past few months we have expanded our overview sections that allow non-technical people to scope the problem. We have expanded our detailed technical discussions of issues, many times including detailed source code examples. And, I think most importantly, we have greatly expanded our solutions discussion so that people are not always reliant on vendor patches. We need many was to mitigate vulnerabilities because there are many environments.
The advisory notifiction format we are using has about the same amount of information as the paraphrased advisories that Elias posted for the latest Microsoft advisories and the same amount of information that some other researchers post in their advisories. This is more than enough information to decide if the issue at hand effects you and you need to dive deeper into our analysis.
What we are doing is adding more information than we have in the past and we are adding it on our web site. There are plans to add much more. We think that our web site and its accompanying web technology is the best place to expand our free information dissemination into the future. We have many ideas in store that I know people will appreciate. Of course, notifications of important information releases will be made to mailing lists that accept them so everyone who wishes to can read and use the information. We may even set up our own notification list if there is a demand for that.
We have stayed away from cluttering up our advisories with marketing gorp, like ads about our services or ads about our company like many commercial research teams do. We pride ourselves in publishing our research on an academic level and always have. This will not change.
weld
-----BEGIN PGP SIGNATURE-----
q e2RtlSn7gAoOzg
Version: PGP 7.0
iQA/AwUBOjfpbaKvhX2AQSGyEQL27gCeKYX8tX++ormy4c/v1
C9aiKSrI694BEHvkh8uRE+mn
=MyCw
-----END PGP SIGNATURE-----
Re:Exactly! That's why we need multiple sources. (Score:1)
Crap. All they're doing is censoring their own information. The information you get from Bugtraq or on the MS web site will still be from the same source - MS. Noone elses opinion gets posted to the MS web site (and never has), but that doesn't mean that discussing the issue on other mailing lists is forbidden.
If anyone is censoring or restricting the flow of information it's Bugtraq.
Here's a policy (Score:1)
This way, stuff doesn't dissappear or get 1984'd.
Re:Hang on (Score:2)
From Weld's post:
The advisory notifiction format we are using has about the same amount of
information as the paraphrased advisories that Elias posted for the latest
Microsoft advisories and the same amount of information that some other
researchers post in their advisories. This is more than enough information
to decide if the issue at hand effects you and you need to dive deeper into
our analysis.
Now pick up their controversial post and see what is there. There is not a single hint about the exploit. Only that there is one exploit and that AOL fixed "thank you"... The only detail:
"We initially contacted AOL on 11/22/2000 regarding this issue. They have a
fixed version, 4.3.2229, dated 12/6/2000 available now. We appreciate
their timely response."
That's the only detail in the whole post! Everything else is so general that I could say ICQ with the same success...
Now if we pick the Weld's citation we see one thing. He justifies his moves. But not in the point on how and why they feel they are right. They justify its amount as:
"same amount of
information as the paraphrased advisories that Elias posted for the latest
Microsoft advisories and the same amount of information that some other
researchers post in their advisories"
So they step themselves in the same side of Microsoft. M$ does this, we also do. Good point.
No matter the yellowness of some
exactly how is this dangerous? (Score:3)
-lb
Re:Great. (Score:1)
Become a Library? (Score:1)
Incorrect info... (Score:5)
Re:Monopolies rule! (Score:2)
It requires more resources, however if your operation is of a critical nature, then a heterogenuous environment is absolutely neccessary, to prevent a single failure from taking down all systems.
For exceptionally important servers, (as an example), it's fairly standard to have two of them running in parallel, but with completely different hardware, running different operating systems. This way no one bug can take down the cluster. I've seen, more than once, a rack of Netfinitys, next to a rack of PowerEdges, and they all run the same apps.
As for interface risks, that's a bullshit argument made by somebody who either got bit by some minor incompatibility at some point, or who always runs homogenuous systems, blindly assuming that if they run the same OS, they must be more compatible. It's utterly and completely illogical, unless your inhouse coders haven't learned the word 'portable' yet.
Anyway, I shouldn't respond to trolls, it's a waste of time.
--
"Don't trolls get tired?"
bad for bugtraq (Score:1)
I think that sending links instead of full descriptions, M$ has made bugtraq less useful, and removing M$ from bugtraq, it gets still less usefull.
It's sad, but in this war M$ has less to lose than bugtraq. And I'm afraid that other companies will do something like that.
I think that Bugtraq has been severe wounded. It won't be the same anymore.
What is the security industry coming to? (Score:1)
The benifits to an agency that only posts links instead of the full advisory are mostly perceptual, so the image I've gotten from MS and AOL taking this stance is that they just want tracking (MS is (was?) using web bugs in articles). The l0pht doing this doesn't make any sense to me. What gives?
Anonymous Cowards need not reply.
Re:exactly how is this dangerous? (Score:1)
Free / semi-legal version (Score:3)
Question:
.ru or somewhere else untouchable for the greater good of the net?
How long would it take to kludge together a quick'n'dirty script to grab and parse those links to the main articles in the shortened advisories that they now publish, and then to run that script on some server in
Answer:
Not very long
Hopefully.
Hi weld (Score:1)
spelling (Score:1)
Re:exactly how is this dangerous? (Score:2)
Great. (Score:1)
Can we just shoot these people in the head for being retarded?
The solution (Score:1)
-Legion
Wouldn't it be scary... (Score:1)
--
Exactly! That's why we need multiple sources. (Score:1)
I try not to trust a single source, btw. If I find dissent among the experts, I'll look closer at it. But I want the option of looking at multiple sources. Though this may not be catastrophic, Microsoft is still trying to restrict information and move it onto their own servers that THEY control. If Microsoft was a government agency withdrawing previously public information, do you think the watchdog organizations would leave them alone? No? I didn't think so..
Less Accessible. (Score:2)
Re:exactly how is this dangerous? (Score:1)
And really, MS is not the only documentation for their bugs. As someone quite rightly pointed out in the previous discussion on this topic, most if not all holes in MS software are posted to BugTraq well before MS publish their advisories.
Re:Rewriting history (Score:1)
This is parallel to the quality of software in the "internet age" where the easy of shipping a fixpack or service release has greatly lowered the quality of "dot oh" or "point zero" releases. I know at least one company that has at least one, sometimes two fix releases in the pipeline at all times; usually there is a service pack ready for the web before the cds for initial release have made it to the customers.
Rewriting history (Score:4)
Re:Microsoft knows best? (Score:1)
Cheap trick. Put something like 123@bad.news in your address book.
Re:Flamebait? (Score:1)
You raise a scary scenario. Reality may well be worse.
Some observations from the LoveBug episode. It took Microsoft something like three (3) days to get anything searchable on their site, and what they put there was not particularly useful. Slashdot coverage was timely and informative enough to actually quickly fix a couple of hits, and Slashdot is neither a virus-alert nor a Microsoft site. If, ie when, disaster strikes, you want as many lines of communication open as possible, right, wrong, and indifferent. If the information is relevant, surely you verify or check more than one source.
Re:Liability!!! (Score:1)
Microsoft performance. (Score:1)
Re:spelling (Score:1)
Re:exactly how is this dangerous? (Score:4)
As a user of the web, I seek information. Old information is very valuable for me. This is why I loved deja usenet archives when they worked.
OTOH, information providers are marketing driven. They run. Their web site changes very very often to track the new trends. Take one of your old bookmarks (say 4 or 5 years ago). There should still be very valuable _information_ in there. I bet that 90% of the links are broken. The information is lost because the links have changed.
Copyrighting information and asking for links instead of copies is planned obsolescense of the information. This is a very very bad trend.
Unfortunately, it is just what marketing want. I bet that, in a few years, the concept of linking will disapear in comercial sites. URLs will probably be based on the value of personal cookies, ie: will only work for you. Other users will have to seek for the information for themselves. You will only be allowed to link to front pages. (I am already pretty depressed of the current state of the web. Lame articles, like the various P4 tests, that are splitted on 12 or 15 pages of 10 lines each make me vomit. Unfortunately, it can only go worse...)
Cheers,
--fred
Re:Free / semi-legal version (Score:1)
Moz.
When I write my operating system (Score:3)
In my liccens agreement I'll require that bugs in my operating system can only be published by me. The same with bug fixes.
I may issue liccens allowing a select few to publish bugs and bug patches but thats totally up to me.
All my bug reports and bug patches will be posted on my website. Nobody gets credit for finding bugs of course...
The goal of my operating system is to become the worlds crappyest operating system on the face of the earth....
(My spelling of course gose a long way to getting it there)
Re:Wouldn't it be scary... (Score:1)
It's nothing new, though. M$ is just taking it a little further then most...
Kierthos
Re:spelling (Score:1)
Kierthos
Goodbye audit trail and due diligence (Score:3)
Suppose I have a duty to demonstrate that I took appropriate measures given what was known at the time? Suppose I have to exercise "due diligence", and keep a record of what was done that can be verified by an auditor some time later. I may still be able to keep a record of what I did, but how can I show that it was reasonable given what was known at the time? If the details are on someone else's web site, with no assurance of a dated archive, and a copyright policy that prohibits me from taking snapshots and having them timestamped (by some independent notary), where does that leave me in producing some argument about what was known at the time? (Fortunately, I don't have to do this myself, but it is not such a crazy thing to expect.)
I understand the desire to provide the latest information, and it is a good idea, but it is not the only requirement. What would be so hard about putting a "latest information on this issue is here" link at the top of a full disclosure dated and signed bulletin? It may be uncomfortable to leave a fully detailed record of how long it took to deal with a problem, but I think companies that take that pain would get more respect once people got used to the idea, if it was allowed to run and not be killed by short-sighted liability claims.
Explanation - Data gathering (Score:1)
With the traditional email system, there is no feedback, other than the individual mailing list email address lists - which I hope are hidden even from list members.
With this method, most of the people who go to the trouble of reading the web page will be people who actually _use_ that piece of software. By making it _relatively_ difficult to read a bug report they are trimming off the "chaff". The rest of them will be crackers(90%) and some merely curious.
Now with the web logs, they can reverse lookup the IP and get company/organization name, location, approximate size (IP ranges) and even admin contact email address!!!!! Gee, those admins might even be the people reading the page!
Makes for a *damn* efficient database for targeted marketing campaigns, plus great statistical data for customers. The crackers and curious can be filtered out - dialup accounts, DSL @home, etc are probably crackers/curious and can be discarded without major impact on revinue.
Firstly, a company can see where people are using it's product. They can then choose to target those people for upgrades/other products. They can also save money by not trying to sell their product in a certain geographic area/market sector and concentrate on other, lagging market areas.
Second, and here's the kicker, a company can buy a compeditor's data - AND TARGET THEIR CUSTOMERS!
You can't buy that kind of information! Well, now you can. To have a list of companies who are almost certainly running a package with a security hole, and be able to contact either/both the Suits and the Admins with an alternative product within hours/days of the bug being announced - and it was announced by a trusted third party: bugtraq!
The market droids should be wetting themselves in anticipation!
Glen Harris
lgftsa + yahoo - com - au
Why is this dangerous? (Score:1)
i think that they were being sarcastic (Score:1)
follow the money (Score:2)
Re:exactly how is this dangerous? (Score:1)
Well.. (Score:2)
Re:Incorrect info... (Score:4)
--
Re:Not a big deal (Score:1)
Repeat after me: A computer is not like a car!
Shit happens in the computer world that has no parallels in the rest of the world.
--
Re:Monopolies rule! (Score:1)
None.
Heterogenity is simply another obscurity, adding interface risks.
Re:exactly how is this dangerous? (Score:1)
Central Point Of Failure (Score:4)
What about forwarding? (Score:1)
The whole reason for these bulletins is to notify customers of potential problems. The only reason I can see for the redirect to a website is so they can track who is actually looking at these things. Normally I wouldn't worry, but since it's MS I just have this creepy feeling that they're trying to doing something underhanded with the data they're going to collect. Lets face it, what could they possibly do to make the service better by knowing who's reading the bulletins. It can only get worse.
They'll probably do something like try to do a reverse lookup and find out who the customer is and give them a different synopsis so the bug doesn't sound that bad. Or maybe if nobody goes to a bulletin listing, they'll just stop reporting similar bugs so MS doesn't look as bad. Then it's just going to go back to where it was a year ago when everybody just posted the exploits. Then MS will try to use one of those new stupid laws that the techs understand better than the lawyers do, in order to halt posting of the code. Then it will infuriate everybody and they'll post it everywhere like DeCSS. They're just running around in circles. That's pretty normal for a company that can't innovate.
Re:exactly how is this dangerous? (Score:1)
Monopolies rule! (Score:2)
So - how do we tell our bosses that Microsoft is digging its own grave?
Since I'm on an honesty trip - are we sure it's wise to standardize on ANYTHING? If it's all standardized, the hackers usually get full access right away. However, if some work stations are macs, and some are win32 machines, with a couple of Linux-es in for good measure.. How many different OS-es will the kiddies need to master?
It's sort of like cloning. Sounds like a good idea, 'till a disease arises.
Maybe we can start suing them? Their software is not really malfunctioning, as much as their information policy. Could that be a way to attack them in court?
Hmm, bug.net (Score:2)
May be a good idea, for them
Welcome to Microsofts bug.net. Please only use IE, asNetscape has an unresolved issue which will cause your computer to catch fire when you click refresh-
This months new reported bugs -
MS Windows (All flavors) - 0!
Linux (All flavors) - 11,843
*BSD - 1,253
MacOS - 1
Commercial Unix (except IBM) - 27
IBM (All flavors) - 12,335,672
News
New Mindcraft show new bug.net as most relaible for bug reports.
You get the idea. We've seen it a million times before
Not a big deal (Score:4)
The real evil thing will happen when it will be ILLEGAL to report a security flaw to lists such as Bugtraq. UCITA has provisions for this right?
It could have been worse.
Microsoft knows best? (Score:2)
From the article:
So - now we're not gonna be able to inspect the change logs? What the hell, Microsoft! Those of us who take security seriously, really NEED to know this stuff. When. What. Who. How. Was it successfully remedied? What remedies were proposed? This is all essential information when you assess who to trust. Maybe that's why they won't let us know.
Re:But they're the natural choice (Score:2)
Hang on (Score:3)
First of all, you can see Weld's reply to Elias' post here:
http://www.securityfocus.com/archive/1/150706 [securityfocus.com]
I don't think anyone can accuse @stake of being anti full-disclosure.
Second, no individual or group has been "banned". Elias decides what to allow on a per-post basis. If someone sends a message without any detail, he won't allow it, as indicated. Doesn't matter if it's Microsoft, the L0pht, or me. If someone sends a message with some good detail, he will let it through.
Don't forget that Bugtraq is an e-mail list. People want to read the stuff in e-mail format. If folks want to see bugs on the web, they can look at our vulnerability database, or visit the MS or @stake website.
Worst case scenarios (Score:2)
On the other side - Trojans, diverted to other sites were either one gets a damn
Panick generation. One launches an exploit nd warns the app maker. Later, on the issuing of the exploit he passes the news through several sites. The app maker gets
War Games - Pearl Harbor attacks. Several scenarios where either the security issuer is taken down or his links diverted. In resume, the main information center is taken down. Meanwhile the attackers make another attack in other direction, the real objective. Among panick, chaos and desinformation, they get into it before anyone gets the point.
I recomend you people to concretize these ideas and some evolution of them... There are much worser case scenarios... Depending on some other issues...
Re:Its the first step (Score:2)
If I ever came across such stupidity as NDA reporting of a problem I'd let everyone know, and screw the NDA. It's probably illegal under some EU regulations anyway to restrict infomation in such a way.
Many a time I've come across serious problems in commercial software or hardware which the manufacturers have known about, yet not bothered to fix.
So what, listen to CERT (Score:2)
1984 (Score:2)
I'm being a little confusing here, but my point is that if the records are controlled by the company they're offending, and users aren't allowed to make copies of the advisories, other than ethics, which we all know that a certain company is in dire need of, there isn't any mechanism to keep the vendor honest.
Then again, is there anything stopping me from saying "Hey, I read on the [Microsoft/l0pht] site today that [package in question] has a buffer overflow, simple fix is to edit [file in question]." without actually quoting the site?
Flamebait? (Score:2)
If my considerations about response time are considered as "flame", then I ask this moderator to take the guts and tell where and what I'm flaming here. You wanna tell me that these sites will hold up if someone posts the news in BugTraq,
Ok flamebait again. Hope you hold enough moderator points. If not come up to the street man. Let's see how good you are...
Business as usual (Score:2)
It seems to me as though Weld Pond and the rest who used to be so dedicated to the security community have succumbed to the almighty dollar, as so many others have. Hackernews.com went seriously downhill when it turned into a revenue source. I find it hardly suprising though. If you owned @stake, wouldn't you be willing to sacrifice some respect for increased web traffic and advertising dollars? Probably.
-
Re:exactly how is this dangerous? (Score:2)
Convenient for the companies, but useless for "us". Why do the need to rely on power games every time? Let them get a clue. (cluetrain.com anyone?)
Big deal! (Score:2)
Re:exactly how is this dangerous? (Score:2)
It is an attack on our model. What was once open (thank BugTraq)is now going to much less open. The free flow of information is stiffled. I question whether this is to drive traffic or or to drive BugTraq into the ground.
This turn of events is a chipping away...one little chip is not so dangerous...but does make us less than we once were.
Re:Hang on (Score:2)
Were you disagreeing with something I said, or what Weld said?
I simply said that Elias would post advisories that are useful. I never said that the AOL advisory was. I believe Elias posted it as an example of a "problem" advisory, not that he felt it was in the right shape to go through. That's why it was attached to an administrivia message rather than sent through on its own.