I don't think it was bugtraq. It was Full Disclosure.

On Fri, Apr 11, 2014 at 7:00 PM, Zak Elep <zak...@gmail.com> wrote:

> Reminds me of that bugtraq shutdown and resurrection in the last few
> weeks. Check it on lwn.
> On Apr 11, 2014 6:18 PM, "Rogelio Serrano" <rogelio.serr...@gmail.com>
> wrote:
>
>>
>> On 11 Apr 2014 05:06, "fooler mail" <fooler.m...@gmail.com> wrote:
>> >
>> > there is no point between open and closed source when it comes to
>> > security because of the premise there is no bullet proof system..
>> >
>> > what im saying below that others claimed open source is much more
>> > secure  than closed source is a big lie.. my point neither the open
>>
>> Can the open source community harass the reporter of the bug? Can the
>> open source community suppress the information?
>>
>> Have you ever been threatened with a lawsuit for finding a security hole?
>>
>> It's not nice at all. Usually they tell you you can't afford to say you
>> are right.
>>
>> It is for that reason alone they I trust open source more.
>>
>> Is it really about which is more secure? What matters is that discovery
>> and corrective action is transparent and possible.
>>
>> How can you fix a security hole when you don't have the code? Even a
>> website has proprietary code in it and cannot be ordinarily patched by
>> anyone willing to fix the html or whatever scripting language is used.
>>
>> > source nor closed source is more secure.. what ever security model you
>> > have... still human is the weakest link in the security chain...
>> >
>> > fooler.
>> >
>> > On Thu, Apr 10, 2014 at 10:27 PM, Kelsey Hartigan Go
>> > <kelsey.hartigan...@gmail.com> wrote:
>> > > Exactly my point.  Regardless whether open source or proprietary.
>> > >
>> > > On Apr 11, 2014 10:06 AM, "fooler mail" <fooler.m...@gmail.com>
>> wrote:
>> > >>
>> > >> sql injection is not a bug on *any* sql server but on the application
>> > >> side not properly handle the parameter(s) as well as forgot to
>> > >> implement the principle of least privilege... adobe acrobat is
>> another
>> > >> story... that's the reason why steve jobs against adobe products
>> > >> getting into ios because of the company closeness to malaking
>> > >> brother...unfortunately a year after job died... masansas joins papa
>> > >> rey in shouting match..
>> > >>
>> > >> just keep in mind that there is no such thing as 100% bullet proof
>> > >> security system... whatever technique you implemented either security
>> > >> by obscurity or open security...
>> > >>
>> > >> fooler.
>> > >>
>> > >> On Thu, Apr 10, 2014 at 8:26 PM, Kelsey Hartigan Go
>> > >> <kelsey.hartigan...@gmail.com> wrote:
>> > >> > It might be believed that big companies have security teams but
>> there
>> > >> > are a
>> > >> > number of security holes discoveries made by third parties instead
>> of
>> > >> > coming
>> > >> > from the companies.  In some cases it also took a significantly
>> long
>> > >> > time
>> > >> > for some to patch these holes.
>> > >> > Sql injection bug of sql server 2000 and Adobe acrobat pdf
>> vulnerability
>> > >> > comes to mind.
>> > >> > It is nice that a lot of these big companies release patches to
>> their
>> > >> > products but the frequency of these happening is quite high,
>> making me
>> > >> > feel
>> > >> > that they don't do sufficient security QA before product is
>> released.
>> > >> >
>> > >> > On Apr 11, 2014 7:54 AM, "fooler mail" <fooler.m...@gmail.com>
>> wrote:
>> > >> >>
>> > >> >> big companies have their own security team who assess and protect
>> > >> >> their proprietary products... from the start of code development..
>> > >> >> they integrated code scanner to see any vulnerabilities in the
>> code
>> > >> >> and other security tools till it reach to a complete product...
>> > >> >>
>> > >> >> their reputation is based not only on the quality of the product
>> but
>> > >> >> on the security side as well...
>> > >> >>
>> > >> >> fooler.
>> > >> >>
>> > >> >> On Thu, Apr 10, 2014 at 7:16 AM, Kelsey Hartigan Go
>> > >> >> <kelsey.hartigan...@gmail.com> wrote:
>> > >> >> > On the other hand since this is open source someone is bound to
>> find
>> > >> >> > the
>> > >> >> > hole. What about proprietary systems?
>> > >> >> >
>> > >> >> > On Apr 10, 2014 6:37 PM, "fooler mail" <fooler.m...@gmail.com>
>> wrote:
>> > >> >> >>
>> > >> >> >> pluggers,
>> > >> >> >>
>> > >> >> >> another action needed from you... if those sites  listed in
>> the link
>> > >> >> >> below that you use their service, then you need to change your
>> > >> >> >> password...
>> > >> >> >>
>> > >> >> >>
>> > >> >> >>
>> > >> >> >>
>> > >> >> >>
>> http://mashable.com/2014/04/09/heartbleed-bug-websites-affected/?utm_cid=mash-com-fb-main-link
>> > >> >> >>
>> > >> >> >> its time to realize why opensource is not secured as what
>> others
>> > >> >> >> claims to be... but of course... there are still plenty of
>> > >> >> >> undiscovered security holes waiting to be discovered by
>> security
>> > >> >> >> engineers... when this heartbeat outbreak last Monday... I
>> spoke to
>> > >> >> >> my
>> > >> >> >> colleague yesterday as this is one of the projects of malaking
>> > >> >> >> brother
>> > >> >> >> who paid opensource developer working with a specific
>> application to
>> > >> >> >> insert backdoor codes... ( I have to use other words para hindi
>> > >> >> >> makita
>> > >> >> >> ni  malaking brother scanner)... to my surprise.. he mentioned
>> to me
>> > >> >> >> that he worked at noviembre sierra alfa previously and he can
>> > >> >> >> confirmed on that but he wont go into the details... I also
>> said to
>> > >> >> >> him that I saw one backdoor in Linux kernel until now it is
>> still in
>> > >> >> >> there... you cant see by a normal cli command but it is there
>> > >> >> >> sitting
>> > >> >> >> innocently...
>> > >> >> >>
>> > >> >> >> I made a statement in ph-cyberview a year or so ago that we
>> are not
>> > >> >> >> safe anymore...  much worse if you are inside china....
>> > >> >> >>
>> > >> >> >>
>> > >> >> >> fooler.
>> > >> >> >>
>> > >> >> >> On Wed, Apr 9, 2014 at 3:36 PM, fooler mail <
>> fooler.m...@gmail.com>
>> > >> >> >> wrote:
>> > >> >> >> >  hi drexx,
>> > >> >> >> >
>> > >> >> >> > google security guy is the one who found the bug and google
>> fixed
>> > >> >> >> > their sites before sending the info to the community...
>> > >> >> >> >
>> > >> >> >> > below is the site to test the bug vulnerability..
>> > >> >> >> >
>> > >> >> >> > http://packetstormsecurity.com/files/author/11160/
>> > >> >> >> >
>> > >> >> >> > fooler.
>> > >> >> >> >
>> > >> >> >> > On Wed, Apr 9, 2014 at 9:06 AM, Drexx Laggui [personal]
>> > >> >> >> > <dre...@gmail.com> wrote:
>> > >> >> >> >> 09Apr2014 (UTC +8)
>> > >> >> >> >>
>> > >> >> >> >> Here's a quick test on your localhost, & you don't even
>> need to
>> > >> >> >> >> be
>> > >> >> >> >> root...
>> > >> >> >> >>
>> > >> >> >> >>
>> > >> >> >> >> drexx@MACHINE:~$ echo -e "quit\n" | openssl s_client
>> -connect
>> > >> >> >> >> google.com:443 -tlsextdebug 2>&1 |  grep 'TLS server
>> extension
>> > >> >> >> >> "heartbeat" (id=15), len=1'
>> > >> >> >> >>
>> > >> >> >> >> TLS server extension "heartbeat" (id=15), len=1
>> > >> >> >> >>
>> > >> >> >> >> drexx@MACHINE:~$ date;
>> > >> >> >> >> Wed Apr  9 21:02:58 PHT 2014
>> > >> >> >> >>
>> > >> >> >> >> drexx@MACHINE:~$ uname -a
>> > >> >> >> >> Linux MACHINE 3.11.0-19-generic #33~precise1-Ubuntu SMP Wed
>> Mar
>> > >> >> >> >> 12
>> > >> >> >> >> 21:16:27 UTC 2014 x86_64 x86_64 x86_64 GNU/Linux
>> > >> >> >> >>
>> > >> >> >> >>
>> > >> >> >> >> Drexx Laggui  -- CISA, CISSP, CFE Associate, ISO27001 LA,
>> CCSI,
>> > >> >> >> >> CSA
>> > >> >> >> >> http://www.laggui.com  ( Manila & California )
>> > >> >> >> >> Computer forensics; Penetration testing; QMS & ISMS
>> developers;
>> > >> >> >> >> K-Transfer
>> > >> >> >> >> PGP fingerprint = 0117 15C5 F3B1 6564 59EA  6013 1308 9A66
>> 41A2
>> > >> >> >> >> 3F9B
>> > >> >> >> >>
>> > >> >> >> >>
>> > >> >> >> >> On Wed, Apr 9, 2014 at 10:42 AM, Rudel Saldivar
>> > >> >> >> >> <rudelsaldi...@gmail.com> wrote:
>> > >> >> >> >>>
>> > >> >> >> >>> And I may add this link for the exact patch version since
>> > >> >> >> >>> different
>> > >> >> >> >>> package
>> > >> >> >> >>> revision exist for different versions of Ubuntu -
>> > >> >> >> >>> http://www.ubuntu.com/usn/usn-2165-1/
>> > >> >> >> >>>
>> > >> >> >> >>> Ubuntu 13.10:
>> > >> >> >> >>>     libssl1.0.0 1.0.1e-3ubuntu1.2
>> > >> >> >> >>> Ubuntu 12.10:
>> > >> >> >> >>>     libssl1.0.0 1.0.1c-3ubuntu2.7
>> > >> >> >> >>> Ubuntu 12.04 LTS:
>> > >> >> >> >>>     libssl1.0.0 1.0.1-4ubuntu5.12
>> > >> >> >> >>>
>> > >> >> >> >>> As for CentOS 6, they haven't release a patch version but
>> the
>> > >> >> >> >>> latest
>> > >> >> >> >>> available in the update repo have the heartbeat feature
>> disable,
>> > >> >> >> >>> interim
>> > >> >> >> >>> workaround so upgrade when you can:
>> > >> >> >> >>> http://www.spinics.net/lists/centos-announce/msg04910.html
>> > >> >> >> >>> http://www.spinics.net/lists/centos-announce/msg04910.html
>> > >> >> >> >>>
>> > >> >> >> >>>
>> > >> >> >> >>> -----
>> > >> >> >> >>>
>> > >> >> >> >>> -[ OpenSource, Open Ideas ]-
>> > >> >> >> >>>
>> > >> >> >> >>>
>> > >> >> >> >>> On Wed, Apr 9, 2014 at 8:42 AM, fooler mail
>> > >> >> >> >>> <fooler.m...@gmail.com>
>> > >> >> >> >>> wrote:
>> > >> >> >> >>>>
>> > >> >> >> >>>> pluggers,
>> > >> >> >> >>>>
>> > >> >> >> >>>> action needed from you if you are not aware with this
>> serious
>> > >> >> >> >>>> security
>> > >> >> >> >>>> hole...
>> > >> >> >> >>>>
>> > >> >> >> >>>> http://www.openssl.org/news/secadv_20140407.txt
>> > >> >> >> >>>>
>> > >> >> >> >>>>  update/patch your openssl package...  create a new
>> private key
>> > >> >> >> >>>> using
>> > >> >> >> >>>> updated/patched openssl... create a new CSR based on that
>> new
>> > >> >> >> >>>> private
>> > >> >> >> >>>> key and update your https site(s) with a new signed
>> certificate
>> > >> >> >> >>>> (this
>> > >> >> >> >>>> includes self-signed certificate as well)
>> > >> >> >> >> _________________________________________________
>> > >> >> >> >> Philippine Linux Users' Group (PLUG) Mailing List
>> > >> >> >> >> http://lists.linux.org.ph/mailman/listinfo/plug
>> > >> >> >> >> Searchable Archives: http://archives.free.net.ph
>> > >> >> >> _________________________________________________
>> > >> >> >> Philippine Linux Users' Group (PLUG) Mailing List
>> > >> >> >> http://lists.linux.org.ph/mailman/listinfo/plug
>> > >> >> >> Searchable Archives: http://archives.free.net.ph
>> > >> >> >
>> > >> >> >
>> > >> >> > _________________________________________________
>> > >> >> > Philippine Linux Users' Group (PLUG) Mailing List
>> > >> >> > http://lists.linux.org.ph/mailman/listinfo/plug
>> > >> >> > Searchable Archives: http://archives.free.net.ph
>> > >> >> _________________________________________________
>> > >> >> Philippine Linux Users' Group (PLUG) Mailing List
>> > >> >> http://lists.linux.org.ph/mailman/listinfo/plug
>> > >> >> Searchable Archives: http://archives.free.net.ph
>> > >> >
>> > >> >
>> > >> > _________________________________________________
>> > >> > Philippine Linux Users' Group (PLUG) Mailing List
>> > >> > http://lists.linux.org.ph/mailman/listinfo/plug
>> > >> > Searchable Archives: http://archives.free.net.ph
>> > >> _________________________________________________
>> > >> Philippine Linux Users' Group (PLUG) Mailing List
>> > >> http://lists.linux.org.ph/mailman/listinfo/plug
>> > >> Searchable Archives: http://archives.free.net.ph
>> > >
>> > >
>> > > _________________________________________________
>> > > Philippine Linux Users' Group (PLUG) Mailing List
>> > > http://lists.linux.org.ph/mailman/listinfo/plug
>> > > Searchable Archives: http://archives.free.net.ph
>> > _________________________________________________
>> > Philippine Linux Users' Group (PLUG) Mailing List
>> > http://lists.linux.org.ph/mailman/listinfo/plug
>> > Searchable Archives: http://archives.free.net.ph
>>
>> _________________________________________________
>> Philippine Linux Users' Group (PLUG) Mailing List
>> http://lists.linux.org.ph/mailman/listinfo/plug
>> Searchable Archives: http://archives.free.net.ph
>>
>
> _________________________________________________
> Philippine Linux Users' Group (PLUG) Mailing List
> http://lists.linux.org.ph/mailman/listinfo/plug
> Searchable Archives: http://archives.free.net.ph
>



-- 
-- Romar Micabalo (aka 'hardwyrd')
SysAdmin / Consultant / Linux & FOSS Evangelist
http://www.about.me/rmr.micabalo
-------------------------------------------------------------
"Penguin, penguin, and more penguin !"
_________________________________________________
Philippine Linux Users' Group (PLUG) Mailing List
http://lists.linux.org.ph/mailman/listinfo/plug
Searchable Archives: http://archives.free.net.ph

Reply via email to