[comp.protocols.tcp-ip] Getting Vendors To Fix Bugs

bukys@CS.ROCHESTER.EDU (11/07/88)

The never-ending debate in computer security circles is whether to
publicize bugs, or to hide them, hoping the vendor will fix them, someday.

Whatever ones opinions are in this matter, it is clear that the widespread
public embarrassment caused by the worm escapade will lead to a quick response
from the vendors.  Failure to act doesn't look very good when "the network
is the computer".

In light of the power of public embarrassment, here is a modest proposal.
It does NOT address the problem of a malevolent cracker discovering a hole
and instantly exploiting it.  It does address the problem of any vendor's
reluctance to fix bugs or publicize them within a reasonable time.

(1)  Set up an Internet Security Accountability (ISA) organization.  Vendors
subscribe to its services for some reasonable amount.  Failure to subscribe
brands a vendor as one which does not care about security lapses.

(2)  Vendor subscription requires that vendor supply access (to ISA) to
complete source code to every release of software, and in a timely manner.

(3)  ISA employs a crack team of crackers to find security holes in the
systems.  When a hole is found, the bug is reported back to the vendor.
Vendor has two weeks in privacy to produce official patches, which are to
be made immediately available to ISA and the user community.  (Patches
should have no restriction on copying.)  A vendor response of "upgrade
to release X.Y" is not adequate when the previous release is not all that
old.

(4)  Whether or not the vendor produces the patches, when the two weeks is
up, ISA announces the existence of the bug, its ramifications, and the vendor's
patches, if any.  If there aren't any patches yet, the vendor's phone rings
off the hook, and various customers get steamed and cancel orders, etc.

(5)  At the end of that hot two weeks, ISA announces any workarounds that it
has devised, or pronounces the system and vendor hopeless for now.  One hopes
that the stigma attached to the latter is painful enough that vendors will
avoid it.

ISA could publish a newsletter, containing the current inventory of known bugs
and official patches.  Available by anonymous ftp, of course.

Maybe this is all too grandiose.  On the other hand, I think that there are
plenty of responsible people out there who would love to submit bugs reports,
if only there were someplace they could send them where they would have some
effect.  So the crack staff wouldn't have to be very large, since the community
would be providing a lot of "free" expertise.  As to whether vendors could be
made to go for it:  there are lots of things that vendors don't like that they
submit themselves to because the market requires it.  Certification of X.25
protocol implementations, for instance.

Now, will the market require it?

Liudvikas Bukys
<bukys@cs.rochester.edu>

BILLW@MATHOM.CISCO.COM (William Westfield) (11/08/88)

Interesting that you should mention X.25 certification as an example.
It is true that the market requires X.25 certification, but the procedures
and tests them selves are pretty much a joke.

The other problem is that I doubt whether you can get "a crack team of
crackers" to spend weeks or months pouring over the source code of some
random operating system looking for security flaws, and still get vendors
to pay only "a reasonable amount".  I don't see how this could cost any
less than $100K/release.

There is always the current practice of "beta test at a university", or
"put it on the internet", which is a pretty reasonable test.  The weakest
point is still the users..

The sad part about this particular incident is that the sendmail hole
has apparently been known to quite a large number of people for a long
time.  (After all, sendmail is not proprietary to any vendor, and
source are widely available.)  No one did anything about it.  It is
approximately true that the Internet is NOT overly concerned with
security.  The current incident has pointed out that perhaps we should
be somewhat more concerned.

Bill Westfield
cisco Systems.
-------

fair@APPLE.COM (11/08/88)

This has a flaw: suppose a member company sues ISA for defamation (or
whatever else their legal department thinks up)? ISA had better have a
very good legal department to go over all its public pronouncements,
and defend it against litigation.

Also, if ISA goofs...

	Erik E. Fair    apple!fair      fair@apple.com

avolio@decuac.dec.com (Frederick M. Avolio) (11/08/88)

Just thought I'd mention that there is a corporation called ISA ...  Don't
remember what ISA means (isavax.isa.com would know).  Anyway, this talk --
hypothetic to be sure -- of suing ISA, etc is going to make one cheif
scientist of ISA real nervous if he ever saw these notes :-).

fma

hd@kappa.rice.edu (Hubert D.) (11/09/88)

I'm on the other side of the fence.  The death bell of 
commercial network software may be tolling.  I wonder
if my site will install ANY code we don't have source for.

We've been looking at software to connect our PCs and MACs
to SUNs and VAXn.  Now, with the possibity of holes and 
backdoors left in place by software vendors,  I don't see
how one can trust object code for communications software
anymore.  I'm going to take a hard think on wheather to
go commercial or install/modify/develop public domain
packages such as KA9Q, NCSA or PCIP (MIT & CMU).

Hubert Daugherty
hd@rice.edu
References: <8811071557.AA03126@hamal.cs.rochester.edu>
Sender: 
Reply-To: hd@kappa.rice.edu (Hubert D.)
Followup-To: 
Distribution: 
Organization: Rice University, Houston
Keywords: 

root@sbcs.sunysb.edu (root) (11/09/88)

A quick comment on the distribution of bug fixes.  One hopes
that other vendors will NOT follow the example of SGI and
just post patched binaries to Usenet.  They had shipped a
complete uuencoded binary in comp.sys.sgi; such a practice
leaves entirely open the possibility that some could introduce
a trojan horse along the way.  Of course this leaves open
the question of whether any of us *really* read through the
various PD sources we import...  Scary this virus and what
it may lead to.

				Rick Spanbauer
				SUNY/Stony Brook

ron@ron.rutgers.edu (Ron Natalie) (11/10/88)

I don't know why you say that.  Many of the infected sites had source
for sendmail.  As a matter of fact, we had done some local modifications
to it and were mildly familiar with the code and we were still hit.
We were still hit after I had ripped out all the ifdef DEBUG code out
of an earlier release of sendmail due to an even more BLATENT security
bug that the one recently divulged.  We got a new release with the earlier
bug fixed and people figured that we didn't need to go to the effort of
ripping all that stuff out again.

-Ron

root@sbcs.sunysb.edu (root) (11/10/88)

In article <2120@kalliope.rice.edu>, hd@kappa.rice.edu (Hubert D.) writes:
> We've been looking at software to connect our PCs and MACs
> to SUNs and VAXn.  Now, with the possibity of holes and 
> backdoors left in place by software vendors,  I don't see
> how one can trust object code for communications software
> anymore.  I'm going to take a hard think on wheather to
> go commercial or install/modify/develop public domain
> packages such as KA9Q, NCSA or PCIP (MIT & CMU).

	Huh?  If you let anyone on your Ethernet cable with a PC you've
	basically just given up any hope for security.  Even active
	methods like Kerberos will not protect you from people who
	just listen to eg TCP sessions on the cable.  

> Hubert Daugherty
> hd@rice.edu

				Rick Spanbauer
				SUNY/Stony Brook

bet@dukeac.UUCP (Bennett Todd) (11/18/88)

In article <1801@sbcs.sunysb.edu> root@sbcs.sunysb.edu (root) writes:
->In article <2120@kalliope.rice.edu>, hd@kappa.rice.edu (Hubert D.) writes:
->> We've been looking at software to connect our PCs and MACs
->> to SUNs and [...]
->	Huh?  If you let anyone on your Ethernet cable with a PC you've
->	basically just given up any hope for security.  Even active
->	methods like Kerberos will not protect you from people who
->	just listen to eg TCP sessions on the cable.  

Are you sure about that? I thought I sorta understood Kerberos, and that it
was distinguished as the only authentication protocol that was robust and
secure in the face of hardware eavesdropping, interception, and injection of
messages. The "dialog" is pretty fun reading, and explains the contortions --
and the reasons for going through the contortions -- pretty clearly.

-Bennett

hwchoy@zpovc.DEC.COM (Heng-Wah Choy DEC Singapore SWS) (11/21/88)

Hi Hubert Daugherty {hd@kappa.rice.edu}

for a secure Ethernet, look at DEC's DESNC Ethernet encryption box.

Cheers
Heng-Wah Choy
Software Specialist
Singapore Software Services
{ZPOSWS|ZPOVC|ZPOACT}::HWCHOY
Heng-Wah Choy @ ZPO