> That's not the question. Is it to his advantage for the discussion 
> to be private, between the reporter and the developer? The only 
> situations in which I would go public with a security hole are when 
> it is a generic problem affected a whole community of developers or 
> when the developers refuse to fix it.

I agree that the discussion between the reporter and developer should be
secret, at least until the developer provides a solution or refuses. But
that's not the question I was trying to comment on. I was more interested in
the disclosure that IBM (or software vendor) has with their customers. How
do they convince their customers to apply the fix, upgrade their software,
etc. 

I used to believe that non-disclosure was a good strategy and customers
would blindly apply all integrity APARs. Here are just a few points to
consider. 

1. Some sites may believe that obscurity of flaws is sufficient protection.
That plan works most of time; or rather until a clever attacker comes along.
So as long as the flaw seems obscure, they feel safe. However, what seems
obscure to one person, may be obvious to another.

2. Some sites don't fix things, if they aren't broke. Applying fixes takes
time and effort and frequently introduces other problems. They want to avoid
unnecessary effort. So they'll wait to fix the problem when it occurs in
their environment. Or someone shows strong evidence that it is likely to. In
other words, just saying that it is a security issue is not enough to
convince them.

3. Some sites ignore security because it costs too much or is too hard to
maintain, esp. when they have little at stake. For example, a service
provider may have an exclusion or waiver of liability in the "fine print" of
their contracts. Their customers may have concerns, but they agree to the
risks when they sign the contract. 

4. No one has a fool-proof method to separate the "good" guys from "bad"
guys. Or in other words, IBM cannot discuss security issues with only the
"good" guys, because they can't be sure whether they are talking to the
good, the bad, or just the ugly.

Open discussion reduces the effectiveness of security by obscurity. Open
discussion may provide the strong evidence needed to show that security is
broken. Open discussion may force security issues to be heeded, even when
they have little at stake. Open discussion does not care whether or not the
parties involved are "good" guys or "bad" guys. 

Of course, these points have faults, too; but so far, I'm leaning toward
them anyway.

Don Williams

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to