Researcher Resigns Over New Cisco Router Flaw 423
An anonymous reader writes "Michael Lynn, formerly a researcher for Internet Security Systems resigned today rather than conceal his research into serious new flaws in Cisco routers, according to stories at Washingtonpost.com and CRN.
Interestingly, Cisco says the the problem is not a security vulnerability, although it chided Lynn for not going through proper vulnerability disclosure channels. Both stories note that Lynn is in danger of being sued by Cisco for revealing the information, details of which were pulled at the last minute from the materials handed out to Black Hat attendees." Update: 07/28 12:23 GMT by Z : SimilarityEngine writes "Cisco and ISS are filing a law suit against Michael Lynn and the management of the Black Hat Conference, following Lynn's presentation discussing a vulnerability in IOS."
Cisco has gone downhill recently (Score:2)
Re:Cisco has gone downhill recently (Score:5, Insightful)
As far as Cisco going down hill I don't really agree with that. Currently Cisco is expanding their product offerings into new unexplored territories such as IP Telephony. I have installed and supported several of these systems. As long as you follow thier design, install, and support guidelines they are as robust and as problem free as any other platform that i've worked with.
I think most people on Slashdot understand the complexities of the internet world. A minor change here can have a huge, uexpected, impact across the network or application. However, if time tested procedures for upgrades and testing are followed nothing has really changed. I think what may be giving a Cisco a bad name is all of the under qualified people out there installing their systems. The MS world of patch it, reboot, and go about your business does not fly when you critical systems are involved.
Re:Cisco has gone downhill recently (Score:5, Informative)
That was from a while back. They had set up a master "backdoor" password in a version of IOS and ended up getting ridiculed for it quite heavily.
Re:Cisco has gone downhill recently (Score:4, Interesting)
I don't think "ridiculed" is the right word at all. They deserved the attention that was directed at them, as a master password is no small oversight. That'd be like Windows shipping with a master password.
Re:Cisco has gone downhill recently (Score:4, Interesting)
[re "master password thing"]That was from a while back. They had set up a master "backdoor" password in a version of IOS
So since that didn't work, they put a backdoor into the hardware, then slapped a superficial patch on the first (of a number of possible exploits) that has come to public attention. And now they are persecuting the guy who has publicized the underlying flaw, which they have neither patched nor fixed.
So I think it is time for these questions:
I guess I'd better get myself a new tinfoil hat. This one is worn out...
It's All Good... (Score:5, Funny)
Hmmm, perhaps he needs whistleblower protection? (Score:5, Interesting)
Why? (Score:5, Interesting)
Re:Why? (Score:2, Interesting)
For four months... Come on, how long should he be required to wait?
Re:Why? (Score:3, Insightful)
When a company is acting against the public interest in a significant way, it's appropriate to blow the whistle. Placing the entire Internet at risk of a router worm is acting against the public interest.
Of course, we don't have
What idiots modded this thread informative? (Score:5, Insightful)
Four months ago.
However, the more damningly flawed portion of your argument is that 'now Cisco doesn't have time to fix the problem'. <snort>
Could you please provide proof that this flaw hasn't been actively exploited since even before the time at which Lynn found it?
It is, needless to say, impossible to prove a negative.
Re:What idiots modded this thread informative? (Score:3, Interesting)
Probably the same idiots that modded yours "Insightful".
The following is off the IIS webpage.
About Internet Security Systems
Internet Security Systems, Inc. (ISS) was founded in 1994 by Christopher W. Klaus and made its initial public offering on the NASDAQ on March 23, 1998.
Profile The company provides security products and services that preemptively protect enterprise organizations against Internet threats.
ISS celebrated its 10th anniversary i
Re:Why? (Score:3, Insightful)
-Hope
Re:Why? (Score:3, Interesting)
I can see no viable solution that includes Cisco paying ISS to locate and publicly disclose flaws in their software. When companies like Cisco hire third-party firms to audit their code for security flaws, the result of that work i
Real World Gray Hats (Score:3, Insightful)
Can't say for sure. But two points:
Re:Why? (Score:3, Informative)
Long enough to make sure the fix works without breaking some other function. Or would you prefer that they release the updates without making sure that something important - like, say, BGP updates - still works? That'd be *real* smart.
I, personally, would prefer that Cisco makes sure that they haven't added new unintended features to IOS before they release new code.
not applicable... (Score:2, Informative)
you could get protection if you come out and reveal your employer is a racist who told you he refuses to comply with the law and hire blacks, or fired women who got pregnant rather than give them the benifits the law requires.
i think this guy might go to jail for what he did.
Lynn is in danger of being sued by Cisco for revealing the information, details of which were pulled at the last minute from the materials handed out to Black Hat at
Re:not applicable... (Score:2)
Yeah... your definition of whistleblower protection is a little bit too narrow mmmmmkay?
Whistleblower protection covers any number of criminal acts. Fortunately for most companies, having giant gaping security holes isn't illegal. However, whistleblower protection would also a
Re:not applicable... (Score:3, Informative)
Re:Hmmm, perhaps he needs whistleblower protection (Score:2, Insightful)
I agree that disclosure, in general, is clearly in the public interest, but this cannot always be the case.
We simply do not have enough details here to declare this disclosure "good" or "bad." Although Cisco is claiming the information was on vulnerabilities that have been fixed, that could be a PR move to stave off a stock plummet or put a stop to proliferation of the information to those that may want to use the vulnerability to bad ends.
We also can't be sure of what "fixed" truly means. How tested
new flaws (Score:2)
Re:new flaws (Score:5, Interesting)
Re:new flaws (Score:2)
That's a nice thought, but most IOS platforms run on PowerPC, so what Intel and AMD have is rather irrelevant. (Not that PPC doesn't have something similar, of course.)
Cisco themselves said it was not a new flaw (Score:5, Insightful)
Later, Cisco said it was all bent out of shape because they follow an "industry established disclosure process" and because Mr. Lynn "illegally" obtained the information...
Hey, Cisco, I have news for you. "Industry established disclosure process" != "Law"
Get over yourselves, admit that you're a bunch of fuckups that can't make secure networking equipment, and move along..
Re:Cisco themselves said it was not a new flaw (Score:3, Interesting)
Re:Cisco themselves said it was not a new flaw (Score:3, Informative)
He may have misused information from his former job at ISS and be operating outside the bounds of his ISS employee contract allowed him to act.
*: I can see how, if th
Re:why did they.... (Score:3, Interesting)
What changed at the last minute?
Makes you kind of wonder who else has known about this vulnerability and told Cisco to dummy up about it.
So again,
BTW, if anybody in a trenchcoat asks, I'm just going for "funny" here... and don't tell them that I'm openin
Contact for Cisco's Point man on this (Score:3, Informative)
If you'd like to write to Mojgan and say that you don't like their attitude toward full disclosure, or their attack on the guy who's working hard to make things secure, here is his information.
If nothing else, you could ask him "what law did the guy break, biatch!?!"
Mojgan Khalili
Cisco Systems, Inc.
978-936-1297
mkhalili@cisco.com
Re:Contact for Cisco's Point man on this (Score:2, Funny)
I represent our friend Mojgan Khalili who has recently been come into some large sums of money. It turns out that CISCO has been paid by many Blackhatters to leave security vulnerabilities in their software. I am unable to have the money in my account as I am currently on the board of directors, but I feel terrible over what my company has been doing.
I request that you allow me to transfer the money to your account, so that it may eventually be transferred to Michael Lynn's account. For
Re:Contact for Cisco's Point man on this (Score:2)
How mature. I'm sure you'll make exactly the point you intend to make that way.
Re:Mod Parent Down! (Score:4, Insightful)
*Personal* attacks should never be used, even against someone who might deserve it; it misrepresents our ideology.
However, a personal complaint about corporate policy is perfectly reasonable.
"Why is it that you, representing Cisco said that
C'mon, editors. At least scan the article. (Score:2, Funny)
Responsible Behavior? (Score:5, Insightful)
Cisco is actually very upfront and cooperative when you report things which might be a vulnerability (I have personally dealt with PSIRT). The people who work there are actually so polite, it's kind of annoying (I have been thanked about 2 dozen times for reporting a very minor finding).
They do however expect you to play by the rules. Even if you are the person who found a bug, you are expected to let Engineers fix the bug before you release the information.
Also, there is policy in place, which makes sure major ISPs (Carriers) are informed first, so they can do upgrades before the PSIRT release is made public.
All that makes sense, since we are really talking about essential infrastructure.
Of course, all that kind of takes away the coolness of reporting a vulnerability and you will get a lot less publicity (cisco credits you) than what you would get, if you just post to some mailing list.
If he really released information he researched at ISS without consent, well, he should face consequences. Because I obviously was to gain from it (getting a new job, making a name or himself). Hopefully he wasn't just doing it for the publicity.
Re:Responsible Behavior? (Score:3, Interesting)
It's hard to imagine giving the finger to his employer in a very public manner was good for his long term employability.
"Cisco credits you"-when they're not attacking you (Score:5, Interesting)
Read between the lines (Score:5, Insightful)
Cisco agrees with ISS taht they're going to do something about it, but it's going to take a bunch of resesarch and time. They'll keep it quiet for a few years while they put th fix in the pipline for new models. They'll work on a firmware fix, but its back burner as long as the explot isn't public. If ISS keeps its mouth shut, they can still do work for Cisco.
Lynn hears that his research is to be hush-hush, and that Cisco will work on it, but it could be a while before there's an actual patch. No arguing that the flaw is critical will make ISS management, with a financial gun to its head, budge.
Lynn flips ISS the bird, 'cause he thinks its a major security issue, and presents his research anyway. Cisco and ISS claim they're working ont it, and that its and old flaw, and nothing really serious. And they're quietly looking for a man to fir Lynn with concrete shoes for blowing their cover.
Seems pretty clear to me.
The land of the free or fee? (Score:2)
Existing security vulnerabilities? (Score:5, Insightful)
Quote: "It is important to note that the information Mr. Lynn presented was not a disclosure of a new vulnerability or a flaw with Cisco IOS software. Mr. Lynn's research explores possible ways to expand exploitations of existing security vulnerabilities impacting routers."
Quote: "... Mr. Lynn a platform to publicly disseminate the information he illegally obtained."
If his research regards known and exsisting vulnerabilities how could they be illegal obtained? This can only happen if Cisco sits on the vulnerabilities for some time. If this is the case its a poor excuse by Cisco to state that its not a new vulnerability.
In my humble opinion its new when first made public.
If I use their routers I would like to know if they can be hacked. If they can get hacked I would like the oppotunity to take them offline if I need to protect my business.
If I don't have that oppotunity - and I loose data/values/etc due to an attack, I'll have to keep Cisco responsible.
Full Disclosure (Score:4, Insightful)
Full disclosure is a nice cushion for people who really didnt do their job in the first place. It doesnt in no way help the users. Before the exploit is released publicly you can bet your backside its used for company spying and other shoddy activities.
A company shouldnt be afraid of scriptkiddies, theyre harmless compared to their competitors armed with their most secret info. Full disclosure makes it possible for a company to atlest try to mitigate that threat. Other disclosure puts them in the whims of the vendors.
Lawsuit? Lynn says "bring it on" (Score:5, Interesting)
-Mark
Re:Lawsuit? Lynn says "bring it on" (Score:2)
That is of course, provided that he at least tried the normal avenues. Under NDA means you're under NDA. Whistleblowing is only possible after management has ignored you.
If he just jumped the gun and released the info publicly he deserves to get sued. Think about it. If every employee who was slightly upset just decided to walk off with trade secrets there would be no
Surely a decent way of resolving these issues (Score:3, Interesting)
Flaw is reported, accepted and cash is paid on a daily/weekly basis until the issue is resolved.
Submitters would get more for a complex bug that involves more work to fix it and the can happily keep their gobs shut from announcing the problem as they're getting paid to be quiet.
Just a thought..
Nothing to worry about (Score:4, Funny)
OK well lets see: (Score:2)
and...
Cisco and ISS are filing a law suit against Michael Lynn and the management of the Black Hat Conference, following Lynn's presentation discussing a vulnerability in IOS
Surely the defense would be: Your honour, obviously there was no vunerability in the beginning, because look, Cisco said themselves that the ability to take over the router, and sniff for pr0n on the network is a feature, not a vunerability!
Of course, he is write, Cisco suing him
Dyslexia (well I dont have it, but...) (Score:2)
I suck
The Wash. Post had the heads-up yesterday (Score:2)
which is probably why slashdot didn't post my version yesterday [slashdot.org].
update:The Wash. Post had the heads-up yesterday (Score:2)
Just what did all these parties think Black Hat Con was about anyway, i
Dangerous Precedent... (Score:5, Interesting)
"It is our belief that the information that Lynn presented at Black Hat this morning is information that was illegally obtained and violated our intellectual-property rights,"
Lynn decompiled Cisco's software for his research and by doing so violated the company's rights, Noh said. [emphasis added]
So basically, Cisco is claiming that decompiling their object code is illegal.
Isn't it a greater violation of the customer's rights to prohibit them from decompiling the code on their own equipment to check for security vulnerabilities?
We've come to the point where corporations believe they have the right to impose conditions of operation on equipment they no longer own. If Cisco sells someone a router, the customer now owns it. Cisco doesn't have any right to impose any conditions of use on the new owner, because they no longer legally own the product. The owner has the right (and some would claim even the responsibility) to decompile their router's code to check for potential vulnerabilities.
It seems that Cisco believes that even after they've sold it to you, they still own your router. And who knows, maybe this vulnerability was deliberately placed so they could own your router anytime they pleased...
Whose rights were violated again? Hmm? (Score:4, Interesting)
Ok, let's look at this objectively, shall we? Proprietary information belonging to Cisco and ISS is nonsense. That information should belong to the customers who bought the router so they can take the appropriate steps; for example, a customer should be able to replace an affected router with something else if they're concerned about the problem, or modify the software on the router to alleviate the problem itself (and this is again another example of where OSS is so important).
In terms of violating intellectual property rights, what about violating the property rights of the people who own the router? What rights do they have in this whole situation? Are they expected to sit their with their collective thumbs up their collective asses and wait randomly for a fix? Don't the people who use the routers have the right to uninterrupted network services? What happens if this router belongs to a large ISP and a DoS attack brings the router down? Are they supposed to be stuck with the bill? I'll tell you this much - if this happened, Cisco would never credit them with the cost of service refunds to their end customers. Of course, this would be hypocritical on Cisco's part for obvious reasons, but I digress.
sued? (Score:3, Interesting)
Way to go, Cisco.
Against security through obscurity (Score:5, Insightful)
The flaw had been privately disclosed a few months ago. Cisco, for its own reasons, didn't intend to distribute a fix before long (next year!). Too major a flaw? Publicity? Too much work already? Internal politics?
Obviously, Michael Lynn couldn't live with the idea of leaving this flaw open, and decided to disclose it publicly, thus forcing Cisco to aknowledge it and fix it. Also obviously, this wasn't the only reason. He seemed disgusted by the industry's approach to this kind of problem.
I'm always amazed by this... (Score:5, Insightful)
So now they're suing him... (Score:3, Insightful)
It must be a *really* bad hole - they might just as well hang a "crack me" sign on their heads. Either that, or they've hired security experts from Microsoft.
Cisco settles! (Score:3, Informative)
I'm glad for Michael Lynn that this affair ended quickly and not too harshly. Kudos to him for his courage.
Re:I wonder... (Score:5, Insightful)
Cisco seems to suffer from the same stupidity that most other large corporations do. They'll take a report, and sit on it for weeks, and sometimes months. Full Disclosure is usually the only way to get them to actually fix the issues in a timely manner.
Re:I wonder... (Score:4, Insightful)
Personally, I'd probably rather the bank/hospital had a few weeks to establish a plan, rather than have to bang something out in an emergency, and whilst the records have already been made much more vulnerable.
Re:I wonder... (Score:3, Insightful)
Actually, yes I would. I'd much rather they fix or at least stopgap the issue instead of it sitting there wide open for all to see and/or exploit for months.
Re:I wonder... (Score:4, Insightful)
c'mon... you're telling me that out of 5+ billion people on this planet, that only the person that found the exploit is the one that knows about it?
surely you're not that niaeve?
Re:I wonder... (Score:4, Interesting)
We know, from the last time a story about this topic was posted, that Cisco was alerted to the issue and had supposedly "been working on a fix" during that time.
So, no, we aren't that dumb -- what's dumb is that they believe that they can threaten people with lawsuits to keep them quiet.
This is nothing but a corporate scare tactic to keep people from disclosing issues w/their shit in the future.
Re:I wonder... (Score:3, Insightful)
What's dumb is that people sign NDA's and then reveal what they learn. Even if Lynn didn't have an NDA personally, ISS almost certainly did, and he would have been bound by it. In addition, some of the information may have been based on ISS trade secrets, and since he's no longer an employee, he would have no authority to discuss them. So, in this case, a civil lawsuit is absolutely appropriate.
If you and I ha
Re:I wonder... (Score:3, Insightful)
Would you consider 5 people with this knowledge "wide open"? 5000?
Re:I wonder... (Score:4, Informative)
He used an already patched exploit to show the vuln. He only showed how easy it would be were you to find a new, unpatched exploit.
Also, from an interview at security focus [securityfocus.com]
"It has been confirmed that bad people are working on this (compromising IOS). The right thing to do here is to make sure that everyone knows that it's vulnerable."
The bad guys already know about this, Lynn believes it's time the rest of us found out.
Re:I wonder... (Score:5, Insightful)
Your preference suffers from the flawed (although typically wide-spread) assumtion that only one person is smart enough to discover the flaw.
If a white hat can discover it, then a black hat can too - and black hats are constantly looking. Vulnerabilities need to be *FIXED*, not discussed for weeks in private meetings.
Re:I wonder... (Score:4, Interesting)
Some security flaws require such detailed technical understanding of the systems involved that not many people are really likely to uncover them. If a professional security researcher with very specialized knowledge who works full time trying to uncover new exploits succeeds in finding something, it doesn't n necessarily follow that many other people will, or even that anyone else will. It's certainly possible that someone else will find it, but I think people should try to balance the possibility of some malicious people knowing about the flaw for a long time against the certainty of everyone knowing about the flaw for a shorter time.
Re:I wonder... (Score:3, Insightful)
We've seen this over and over again historically - if there is no disclosure, there is no urgency, so the problem remains unpatched until the worm hits, and then suddenly, after the fox is done raiding the henhouse, steps are taken to close the door.
I don't know if that is the case here - I really have n
Historically, worms follow patches (Score:3, Insightful)
Still, most exploits seem to be reverse-engineered from patches. Compare the patch to what came before and you have a serious clue to the problem.
That's in the public world; I don't claim to have any insight into privately held 0-day exploits. I suppose that a there are some blackhats as clever as the white, with equivalent labs.
But (Score:3, Insightful)
For all he know, it's been exploited for weeks.
Ideally, we could say here is an exploit. In a week I'll release it to the public. Unfortuanatly, he would get sued, and the exploit would go unpatched for a while.
Trains, planes, and software (Score:3, Insightful)
All corporations (I'm talking about large corporations with hundreds or thousands of employees) are like trains, planes, or other large pieces of equipment. They can not stop and/or turn on a dime. (As the saying goes.)
As in my previous posting on this subject - think of a bus which is going madly down the road at 100mph. Within a mile of where the bus (ie: the company) is is a bridge which has collapsed (ie: the problem). If you start a mile back from the bridge
Re:I wonder... (Score:3, Informative)
Please try to stay with the group.
Don't be an ass, turnstyle had a legitimate point. This used to be a problem that a "small number" of black hats could exploit, now it's a problem that a million script kiddies know about. Now don't get me wrong, I'm not trying to claim that cisco was fixing the issue promptly enough, but dissmissing people who point out the problems with full disclosure is just plain irresponsible.
Re:I wonder... (Score:5, Interesting)
Cisco was notified of the vulnerability in question many months ago and the issue has been patched for about 3 months now.
Furthermore I did not disclose the details of this vulnerability at all. The presentation was merely a demonstration that IOS was exploitable just like any other OS.
Re:I wonder... (Score:5, Informative)
Re:I wonder... (Score:3, Insightful)
Re:I wonder... (Score:3, Informative)
Re:I wonder... (Score:3, Informative)
Re:I wonder... (Score:5, Interesting)
In the case of ISS there's almost no excuse for not getting some serious cooperation from the vendor. ISS has the weight and all the contacts they need to notify the vendors and get a fairly quick response. This was either an extreme circumstance, or Michael had another job lined up and he wanted to exit with a big splash. For that matter, he may have just made enough noise about his Blackhat presentation that he didn't want to have to pull it back.
On an entertaining side note, Blackhat actually reburned all the CD's and cut his section out of the convention notes. Cisco must have come down pretty heavy for them to pull such a strong CYA move.
Re:I wonder... (Score:4, Insightful)
I don't buy cisco gear anymore.
Re:I wonder... (Score:5, Insightful)
The way they prefer it to go is that someone contacts them secretly, tells them the hole, and they can have it fixed all up by the time the vulnerability is published.
Then they get to look super-secure, since they were "too quick" for the bad hackers.
Some people, however, think that the only thing that'll get companies to take security more seriously is if they are actually made to look really bad, and maybe some of their products actually get hacked.
Unfortunately, when you're dealing with some giant businesses cost/benefit analysis, the only thing that can get them to take notice is a little carnage.
Is it worth it? I dunno, but it's certainly arguable.
Re:I wonder... (Score:5, Interesting)
Then they get to look super-secure, since they were "too quick" for the bad hackers.
What I'm getting at is don't say that this sort of behavior is limited solely to closed source software. No one wants to have the pressure of handling a security fix WHILE an exploit is out in the wild. Would you rather have the opportunity to fix a security flaw while no one else (but the person who discovered it) knew about it, or would you prefer the person who discovered it announce it to the world and release an exploit first?
Re:I wonder... (Score:2)
Using this type of logic Cisco should be spending all of its resources on finding only unidentified bugs because one of t
Re:I wonder... (Score:3, Insightful)
As long as it's a secret that only a few seriously malicious hackers know, the cost to Cisco is virtually nill. "Oh, your network got hacked? Well, it sure wasn't through your Cisco routers: check it out - we've go
Re:I wonder... (Score:2)
Nah, any serious person will see that disclosing risks is the only way to go. Hiding them just makes things dangerous, they don't go away.
Re:I wonder... (Score:3, Interesting)
I'm not assuming that at all. I explained the process in more detail in my previous post (http://it.slashdot.org/comments.pl?sid=157252&ci d =13184604 [slashdot.org] ) but I didn't want to repeat myself. I suppose I should have should have thrown the link in.
The funniest thing though, is that this isn't even a true vulnerability in the strict sense. It demonstrates how to circumvent certain protection mechanisms to build a more reliable exploit for an existing vulnerability. What's more, Cisco was very obviousl
Re:I wonder... (Score:5, Insightful)
Yes, he could. But then again, I suspect he already did. The traditional approach was to tell the vendor, and announce the flaw publicly 28 days later. That gave a vendor sufficient time to code and test a patch. However, many vendors (and Cisco seem to be particularly bad about this) sit on problems like this for several months and take no immediate action. I'd be far from surprised to hear Cisco were notified of this 3 months ago, hence Lynn's frustration and his decision to publicly talk about the flaw. I don't actually know what happened, and the above is just speculation. I suspect there's more than a grain of truth to it, though.
Re:I wonder... (Score:4, Insightful)
Yes, he could. But then again, I suspect he already did.
From the article:
"The decision was made on Monday to pull the presentation because we wanted to make sure the research was fully baked."
In other words, the research was not even finished yet. Isn't that a little impatient, and might there be a little chance that the researcher in question would have liked the attention he would've gotten if he presented this information at Black Hat, which was part of why he made the decision to pull out the information anyway ?
They Had Been Working on it for *4 Months*! (Score:5, Informative)
http://blogs.washingtonpost.com/securityfix/2005/
The injunctions filed against him state that ISS and Cisco had been working together on the flaw for the past four months, and that up until earlier this week, a Cisco executive was slated to co-present the findings with Lynn at Black Hat.
Re:I wonder... (Score:2)
In other words, the research was not even finished yet.
Nope, you mis-read that. The pulled it because Cisco didn't support it. It doesn't say the research wasn't complete, it said it was not "fully baked". Important difference.
Re:I wonder... (Score:3, Informative)
"The injunctions filed against him state that ISS and Cisco had been working together on the flaw for the past four months"
Four months qualifies as a "few weeks" in my mind.Re:I wonder... (Score:2)
No, that's not the "traditional" approach just because some security-companies seem to think 28 days might be "fair" or whatever. I'd go with a week, no more. And D.J.Bernstein considers immediate release to be the correct way.
Re:I wonder... (Score:3)
All the more reason to wait.
Re:I wonder... (Score:3, Informative)
Exactly. IIRC from another article this morning, the flaw was disclosed a while ago, I think in April. He publicly announced it on Wednesday July 27th. That's indeed around 3 months.
Using any buffer overflow or similar flaw, he showed how you could take control of the IOS (the OS on the router?). The IOS is supposed to be abstracted from the hardware and immun
Re:I wonder... (Score:4, Informative)
Re:I wonder... (Score:3, Insightful)
this means it is very big, probably one of those one person can disable the whole net easily or snoop on all internet traffic without traceability.
I know of people that quit their jobs to
Since... (Score:3, Informative)
There are various protocols that are directly used by VoIP - these would include things like SIP, UDP connections for the streamed audio and other fairly mundane stuff. For videoconferencing (a related technology), you'd probably use IGMP to set up the multicast conference.
Of these, IGMPv3 (the newest version of IGMP) is the only one the rou
Re:I wonder... (Score:2)
he at least have waited a few weeks to see how Cisco responds
He waited a few months. [washingtonpost.com]
Professional Obligation (Score:4, Interesting)
There used to be two general ways to handle security flaws when you discovered them. Either you could privately exploit the hell out of them. Or you could just privately report them to the company involved and wait patiently for them to release a fix.
However there is a big problem with this particular model. The problem is that companies like Cisco, Microsoft, etc. don't really seem to think that exploits that allow people to remotely execute administrator level code are really that big of deal, and they figure that they can just create a patch when "we get around to it" or "next year".
Meanwhile, do you really think that you are the only person in the entire world who is guaranteed to find the exploit? The black hats of the world have probably already found the exploit anyway in many cases. It's just the customers who are suffering because a patch is not available.
This model of waiting around forever was a dismal failure. So, security professionals found that by publicly releasing their findings, they could force companies to take security more seriously. The responsible way to do this is to first inform the company privately of your finding, and give them a reasonable chance to fix it.
What you think is reasonable is up to you, *not* them. They are playing by your rules. You are not playing by theirs. Remember, that you are being nice to them by not just publicly releasing the exploit the day that you found it. So, they should respect that. If they do not, that is their problem. Still, as a professional, you should rise above them and try to give them a reasonable time to fix the problem.
Now in this case, what he did was he informed them 4 months ago of the vulnerability along with a proof of concept. They decided not to fix the problem. They claimed there was no problem. He waited patiently for *4 months*. They said that this wasn't really a vulnerability. Then, they knew well in advance of his presentation at Black Hat, and yet they still chose not to fix the problem.
So, what is he supposed to do? As a security professional, it is his ethical obligation to publicly disclose his findings at that point.
In conclusion, Cisco should spend more money on engineers instead of lawyers.
Re:Good.... (Score:2)
Re:Good.... (Score:4, Informative)
Re:This could have been avoided by using apt-get (Score:5, Insightful)
The point of buying a router is efficiency. Otherwise get a switch and a 386 running BSD or Linux... Having hardware move packets is almost certainly going to be faster (and efficient) then having a general purpose processor do it.
That said you have firmware that controls the hardware which could be "apt-get" though in reality I'd rather see an open source firmware that was also provided as binary images you could just upload.
Do you really want some MCSE throw-back building a firmware image when they can hardly manage cmd.exe?
hehehee sick.
Tom
Re:This could have been avoided by using apt-get (Score:2, Informative)
What do you think a Cisco router is? Traditionally, an underpowered general purpose CPU running a somewhat-specialized operating system.
Unless you're talking about the "big boys" (Catalyst switches, Cisco 10000s, etc) switching is not done in hardware.
Re:This could have been avoided by using apt-get (Score:2)
To be honest I'm not that much into "corporate networking". I think most small companies [200 people] can be easily served by commodity FutureShop equipment.
In the case of where I work we have a 24 port switch, a dedicated bind/etc server and a linksys router plugged into a DSL. It works well for all of us here and we routinely traffic data efficiently from one box to another [e.g. to send stuff to the lab].
Tom