CERT To Charge For 'Timely Alerts' 67
thrillbert writes: "There is a story at c|net about how CERT is going to start charging anywhere from $2,500 to $70,000 for security alerts (depending on the size of the organization). They claim that subscribers are going to receive the alerts up to 45 days before anyone else does. However, from personal experience, I know that CERT is usually 60 days behind in releasing their 'alerts'. I have seen postings in BugTraq at least 2 months before I ever got a CERT advisory. And in the advisories I have received, I have never seen CERT giving credit to the bug hunters who found the vulnerability. I wonder if they are planning on compensating the bug hunters whose advisories they recycle." And as mr.nicholas puts it, pointing to an AP story, "Looks like a Federally funded services is trying to go private."
Re:And why on Earth not? (Score:2)
Where am I going with this? Well, CERT isn't proposing something like that. They're proposing keeping the information hidden until later unless you donate to them. But if I don't know what the CERT is putting out, I don't know if I need it or not, so I don't know if I want to buy it or not.
The problem with selling information is that you don't know if it's worth the price until after you have it already. You can't take it out for a test drive. Once you give out information, you can't make someone forget it afterward.
Re:And why on Earth not? (Score:5)
Besides that, they are federally funded. Either leave it public, or stop spending my tax money on it if it wants to run itself like a private business.
CERT is an inexpensive place for banner ads... (Score:1)
"My" Linux distro has found an important security hole and has made a patch. (insinuating not the other distro
And why on Earth not? (Score:2)
Jesus, why on Earth can't these people charge for a timely and useful service they provide to people? Is there really anything wrong with... making money! Come on, this isn't Cuba people, and providing a service, especially a real-time service like bug notifications and security updates that require significant technical expertise, cost money to run. Technical people do seem to need large sums of cash before they'll move their pizza-bloated backsides after all.
And as for the complaining about delayed advisories. Simply put, CERT spend their time validating what they produce rather than posting at the first opportunity. This is why they are the top resource for security people online, and why amateur offerings like BugTraq don't get the same recognition from serious organisations.
Honestly, shame on /. for running such a biased story slamming CERT. We're in a free market economy, and expecting things for free is tantamount to socialism. And we all know how that has worked, don't we :)
Dumb (Score:1)
So lets hope the .coms have more money to spare then the carders. ;-)
But then again this news is about as relevant as CERT is themselves these days.
Re:So is the national weather service... (Score:3)
Considering the cost of weather forecasts (launching enough satellites to monitor the entire planet + clusters of computers to run the models) versus the cost of running a bug database (a computer + MySQL + bandwidth + volunteer bug hunters), I'd say that the price of a severe weather warning should be significantly more than CERT's measly $70K.
Re:And why on Earth not? (Score:5)
Well, the first question is whether or not they *pay* for the information in the first case. As they don't even credit their sources, it's questionable whether the bug hunters are gonna get a cut of this money.
The second reason is that CERT is federally funded. CERT was founded to provide security alerts to the government, and the government has (and continues) to pay them. Since I've paid my taxes, I've already paid them for this information.
Hmmmm (Score:4)
That being the case, I imagine that they will find that their pricing structure is just too damn high, if the article is right about those prices. I can't imagine companies paying $70k a year for the service of validating information that the company already possesses from other sources. Particularly given the rapidity with which many companies are now trying to respond to Bugtraq posted bugs. It used to be Sun, HP, CISCO and the other big players didn't do jack unless CERT published their bugs. But that has changed over the years. Now a Bugtraq posted vulnerability will almost always get a vendor patch fairly quickly. (Often not quick enough for some, but still, faster than they used to be!) So who is going to pay 70k for validation of information that the vendors will likely have already claimed to be valid?! I think a flat price of a few thousand a year for anyone interested would be much more realistic.
OT: PeopleSoft (Score:2)
Yeah, what the heck is up with PeopleSoft? The schools here in Wisconsin are migrating to it as well. I talked to people on the migration team and they don't have a single good word to say about it. They would much rather leave their finantials and class management software on their IBM mainframe where it belongs. They seem to spend all their time tracking down obscure but fatal bugs in the server software and the client. All I see them do is applying fixes and recompiling COBOL. And last I checked they were months behind on the fixes. They have tried to talk to PeopleSoft tech support but everyone at the PeopleSoft help desk appear to be idiots.
This was last year so they have probably completed their integration by now but they would probably be happier and more efficient with the same old app running on the IBM.
TrecTools.com (Score:4)
but what if a group started developing intrusion tools targeted at CERT alerts. All of a sudden, certs alerts would be like opening the doors to thousands of script kiddies everywhere who would find a whole bunch of easy GUI tools available for their use every time CERT released an alert.
It'll be interesting to see how this pans out....
Re:And why on Earth not? (Score:3)
I guess I know where you're posting from... but you can't say the same for all of us ;)
I think that if there were actually a free market (and, even in the good ol' US of A, there ain't nothin' of the sort), we'd see the market correct itself. Unfortunately, as we've seen with companies like Network Solutions, the transition of Government-funded organizations into corporations yields the worst of both worlds: monopolistic bureaucracies with horrible customer service.
Unlike Network Solutions, though, you'll find that the security industry won't be a monopoly. The alternatives will step up to fill the void, and CERT will find itself without subscribers. In fact, this has already begun with professional security firms like securityfocus.com who use public resources like BugTraq to provide high-speed responses.
(I am not affiliated with any of the named companies except as a service consumer)
bukra fil mish mish
-
Monitor the Web, or Track your site!
This'll be -1, Offtopic... (Score:1)
Just in passing, imagine actually receiving a copy of that book as a gift.
"Umm... yeah. Thanks. Slashdot comments on paper. Just what I needed."
Re:What's next? (Score:1)
What, like the one from Windows 95 to Windows 98?
:/
(IIRC, all the components of that were freely downloadable, but that didn't stop a massive marketing push to sell it at full price...)
Re:And why on Earth not? (Score:1)
>serious organisations
Top resource for security people online? WTF are you talking about? If security people only followed CERT they'd be rooted in the first 2 months it takes CERT to post an advisory. Bugtraq is the top resource, or one of them, for security people who are competent enough to figure out wether or not an exploit or possible bug applies to them.
Re:And why on Earth not? (Score:1)
CERT spend their time validating what they produce rather than posting at the first opportunity. This is why they are the top resource for security people online, and why amateur offerings like BugTraq don't get the same recognition from serious organisations.
Hooey.
I am a security professional (I get paid for writing IDS signatures) and traditionally CERT would be the LAST place I would expect to find out about a vulnerability. It's changed dramatically in the last six months, though. They've even scooped bugtraq once or twice.
Now we know why they've picked up the pace. Expect to see them become a dotcom and go public.
Re:And why on Earth not? (Score:1)
I can imagine CERT becoming like PBS. They get some gov't funding, but also need public support. When they need money, they run fundraisers, pumping out all the good and useful alerts in the middle. When they don't need money, they don't run the fundraisers, and they pump out "Microsoft Windows ME for Children!" how-tos.
--
Re:Hmmmm (Score:1)
Why a large company that might want a person on the board.
An once a large corp. has somebody on the board they could (in theory) slow the releases of certain warnings.
Fine. US Gov should pay $70000, then. (Score:3)
Since the government current pays CERT $3,500,000 each year, I say that entitles us taxpayers to FREE UP-TO-DATE alerts.
CERT can't have it both ways. They can piss off if they want to use my tax dollars and give me nothing in return.
The advisories we see are already delayed? (Score:2)
Err. This is new? (Score:1)
That said, if you were subtly looking to make a point about paying for what you should already know if you're keeping your eyes open, good show.
Two questions (Score:3)
2. Along the same lines as above, this "service" is only "valuable" if it really does provide "early" information. All it takes is one mischievous (or pissed) net admin who gets the early releases from his boss at one of these companies, and the information would be released to everyone, regardless of whether the prescribed interval has passed or not. So... how does this "service" protect the security of the companies who pay for it, either, now that anybody and their brother among their customer base could be a potential security threat? Will the companies that sign on have to sign agreements or waivers to promise not to tell anyone about the security holes CERT tells them about? And if so... how screwed up is that??
Incidentally, the copyrights on CERT advisories are held by Carnegie Mellon University, unless I'm mistaken. Does a cut of the proceeds to this go to them? If so (being a CMU grad myself), well, okay then. :-)
One more thing, the ISA has a FAQ [isalliance.org] (which doesn't address any of the above).
Re:So is the post office... (Score:2)
Whether that will continue is in doubt, since the USPS's profits are steadily declining as the years go by, but at least for the time being...
This is a good thing. (Score:1)
I realize that this is all highly speculative, and your own views may prevent you from seeing the reason in my comments, but I shall not hold that a gainst you, as each is entitled to their own opinion, their own viewpoint, and yes --their own prejudice.
May goatse.cx live forever in the minds of those unfortunate enough to have the experience without ample protection.
Re:Well... (Score:1)
Re:Security clearance now... (Score:1)
Hmm..
Actually, I just walked in to SEI two days ago for a job interview. I had to sign in and get a visitor's pass; that's it.
So is the post office... (Score:2)
I'd rather that corporations pay for it than my tax dollars. =)
Re:Well... (Score:1)
Hmmm... do you also get the public CERT releases? I've never compared the times that items on Slashdot appear in the CERT Advisory emails. Other people in this discussion have suggested the difference is like a month.
--
Re:Well... (Score:2)
According to the articles linked to from the story, the stuff on their site and the emails are intentionally behind. Right now, only the government gets immediate notification of security concerns. The information is then delayed atleast 45 days before it is released elsewhere.
Perhaps they're at risk of loosing their Federal funding and want to sell the service they've been exclusively selling to the government to the public.
Also, I have never gotten a CERT advisory that didn't say how to fix the problem. Perhaps this earlier notification will simply be that there is a problem
--
Re:Well... (Score:2)
If they're behind, and they try to charge, nobody will use them.
According to the articles linked to from the story, the stuff on their site and the emails are intentionally behind. Right now, only the government gets immediate notification of security concerns. The information is then delayed atleast 45 days before it is released elsewhere.
Perhaps they're at risk of loosing their Federal funding and want to sell the service they've been exclusively selling to the government to the public.
Also, I have never gotten a CERT advisory that didn't say how to fix the problem. Perhaps this earlier notification will simply be that there is a problem
--
Federally subsidized lobbying? (Score:1)
So the money they'll take in isn't just targeted to pay the hard-working folks checking security holes, it seems.
Re:wtf?! (Score:2)
--
Re:Would it possible.... (Score:2)
--
Re:here's what I'm gonna do... (Score:2)
--
Re:And why on Earth not? (Score:1)
So, with the lack of private clinics, I'm not *allowed* to opt to pay for the test just because some can't afford it. I'm to the point now where I will probably have no choice but to go to the US for treatment since our health care system won't allow me to pay for it here. It's a nice idea in theory, but in practice it flat out fails.
Matt
Re:Isn't CERT a government agency? (Score:1)
Oh wait... doesn't it cost 20 bucks to see the Grand Canyon?
Re:Well... (Score:1)
Re:Geez, what do you expect from the school of... (Score:1)
Re:Isn't CERT a government agency? (Score:3)
Well... (Score:3)
As a side note, Slashdot is laggin' bad. The trolls reload the front page one too many times?
Isn't CERT a government agency? (Score:4)
Isn't CERT a government agency? Isn't it charging for updates somewhat akin to having to tip the fire department extra to get to your house before it burns down?
Re:And why on Earth not? (Score:2)
Heh. Remember CDDB?
I set any CDDBP-aware app I come across to use FreeDB [freedb.org].
Any organization that rapes the enthusiasm of volunteers deserves to die a quick and painful death.
--
Copyleft? (Score:1)
If a bugtraq poster uses the copyleft?
Compensating the bug hunters (Score:2)
I wonder if they are planning on compensating the bug hunters whose advisories they recycle
This from the website that brought you "Voices from the Hellmouth", all without thinking about compensating the people who posted the comments that made up the content of the book.
Security clearance now... (Score:1)
Re:What's next? (Score:1)
New Slashdot Competition idea (Score:3)
Same rules could apply... include an ISO format string (YYYY-MM-DD HH:MM:SS) in the body of your post, times in EST and a Slashdot T-Shirt goes to the winner.
We might have to invent a rule such as "The official time will be taken as the time on the header added by the first mailserver the message goes through" to avoid CERT getting wind of it and setting their system clocks back a year, and winning, but I'm sure the powers that be could agree on a fair system. :)
A funnier competition would be "how many passwords are cracked as a result of SMBRelay before CERT gets around to posting it" of course, but I can imagine that would be somewhat more difficult to judge :) Either way, if word about the competion gets around, we'll have made our point.
Dave
wtf?! (Score:1)
Re:And why on Earth not? (Score:3)
And, for the record, socialism has worked out pretty well. Just ask the developed world. Or hadn't you noticed the socialist aspects of all modern industrialized nations? Welfare, unemployment benefits, social security, government funded roadways, medicare, medicaid, government grants to college students, the list goes on and on. And in Europe and Canada they are even more socialist! With their nationalized health care and whatnot. The majority of the government budgets for all industrialized nations is for "socialist" programs.
Communism however is a different ball of wax.
Imagine that, a slashdot troll who doesn't know his ass from a hole in the ground.
Conflict of interest (Score:1)
If the customer where worth $70k to you, would you deny them that request?
By charging for these alerts you have a conflict of interest. Personally, I would never trust security from a for-profit business. As a result, there are a lot of security sites that have lost my trust because they've gone commercial.
Re:And why on Earth not? (Score:1)
And since you've paid for assorted classified military research via your taxes, should you also have access to it?
Good, I hope this is just a first step... (Score:2)
Humor (Score:1)
My .02,
Re:And why on Earth not? (Score:1)
Plagarism and Credit and CERT (Score:4)
Needless to say this struck me as a bit off since a private consultant has a much bigger need to get credit for their work than a tenured academic and every bit as much right.
I sent a registered letter to the Director of CERT telling him that if I saw another similar complaint of not giving credit in an alert on Bugtraq I would make a formal complaint to the CMU board of plagarism. Shortly thereafter the alerts started to give credits. If they have slipped call CMU and complain.
Security types tend to be very smart and very paranoid, why the CERT git thought plagarising their work would be a good plan is beyond me.
CERT are entirely dependent on the quality of the information they are provided. The main complaint of CERT is that they have in the past waited to long for the vendor to put out a fix to issue an alert. Restricted publication of early alerts could be a good way to put vendors feet to the fire without full disclosure.
Money well spent. (Score:1)
Wow, what a model... (Score:2)
peoples choice (Score:2)
I see no problem with CERT charging people for information, what I think about this is pretty straightfoward...
If a company is going to dish out mega bucks for this service, it could be part of a business write off of some sorts, which if this is the case, its a good move.
On the other hand, CERT isn't as up-to-date with advisories as is Security Focus, which is FREE. So if companies are as stated looking to save money its a bad move, since the information is already freely posted on other security forums.
What I find slightly disturbing is, now I question whether security incidents will not be reported because someone is not a paying customer of CERT, which is totally shady.
Will CERT's new venture withhold information which could hinder the security of products?... Only time will tell...
AntiOffline Advisories [antioffline.com] (no charge)
norton CERT (Score:1)
Re:And why on Earth not? (Score:5)
Infraguard (Score:2)
The FBI and NIPC have also started a system called Infraguard [fbi.gov], which is designed to be a bridge to the private sector. It's a pretty recent development.
-Keslin [keslin.com], the naked nerd girl
Re:And why on Earth not? (Score:1)
here's what I'm gonna do... (Score:1)
I will be mirroring bugtraq soon and selling subscriptions for $10k/yr, no matter how big the organization is. Pass this on to any of those MCSE types you know. Thanks.
--
Re:norton CERT (Score:1)
Peter Norton hasn't been anything but a bitmap on the box in ages.
What's next? (Score:1)
I can see it now...
"Microsoft to charge for Windows updates."
"Dynamix/Sierra to charge for Tribes 2 patches."
"DoubleClick to charge for banner ads."
Re:What's next? (Score:1)
relevance (Score:1)
Subjectification (Score:1)