Re: [Full-disclosure] security industry software license

2008-10-15 Thread AaRoNg11
On Wed, Oct 15, 2008 at 7:37 AM, AaRoNg11 [EMAIL PROTECTED] wrote:

 Society doesn't care, just n3td3v :P


 Why does society care about doing this?

 Or is it just that you can't figure out how to use it, so you don't want
 others to have access to it?


 --
 Aaron Goulden




-- 
Aaron Goulden
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] security industry software license

2008-10-11 Thread AaRoNg11
The only thing this would serve to do is cause cracked versions of tools
such as Metasploit and other security scanners to be put up on sites like
the pirate bay. Then, what about if somebody coded their own security
tool? Would they have to have a license to use it?

This whole idea goes against the idea of open source and free software.
Sure, let the large corporate vulnerability scanners do whatever the hell
they want with their software, but try telling an open source project that
they have to close their source so that the bad guys can't get hold of
their tools.

A licensing system of this size would cost millions, if not billions to
implement. This, along with the fact that it would be completely
unenforceable when implemented makes it clear that you really haven't
thought this through properly. It's like the government springing up and
saying you must have a license to own a computer. Virtually every home in
every MEDc has a computer already, that was bought before the licensing.
There are no records of who owns a computer. Must the government go round to
each home and search for a computer? If the owner hasn't got a license what
do they do? Remove the computer? Sorry for this crappy metaphor, but it's
something of a simillar scale and it's all I could think of to represent the
absurdity of the idea.

On Fri, Oct 10, 2008 at 2:31 AM, n3td3v [EMAIL PROTECTED] wrote:

 there should be a central license that people apply for to use
 software like metasploit.

 all the *respected* programmers would require the license before you
 get to download.

 anyone can apply for a licence, however only those who meet the
 criteria get given the licence.

 background checks are done on you to see you are who you say you are.

 that you're not a cyber criminal or terrorist, and that you're going
 to be using the software for the intentions of which the product was
 designed.

 verbal contracts never hold ground, saying, this software is for
 testing purposes isn't any guarantee that the bad guys won't use the
 software.

 we need a centralised security industry software license scheme so the
 good guys can take full advantage of the tools made by creators of
 security software, while shuttering the bad guys out.

 to rely on a verbal contract for security software as a safe guard
 is no longer enough for the security industry in light of metasploit
 and other borderline evil purpose software.

 its time that members of the industry work together to form such a
 scheme, to insure a streamline programme that all the good guys can be
 part of, only letting the good guys use the software for good
 purposes.

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/




-- 
Aaron Goulden
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] security industry software license

2008-10-11 Thread AaRoNg11
I really don't understand how you even think this idea has any chance of
succeeding. You obviously didn't read my response properly; not only did I
address issues of money, but also the fact that it would be absolutely
impossible to implement such a system due to existing infrastructures and
lack of records. Please read the rest of my response properly.

On Sat, Oct 11, 2008 at 5:47 PM, n3td3v [EMAIL PROTECTED] wrote:

 On Sat, Oct 11, 2008 at 9:47 AM, AaRoNg11 [EMAIL PROTECTED] wrote:
  A licensing system of this size would cost millions, if not billions to
 implement.

 What's a few million here, a few billion there in the name of national
 security? Money hasn't stopped the Department of Homeland Security
 implement far more stupider things in the past. No, I don't think
 money is the issue here, what the issue here is, is ironing out the
 details to make this whole thing workable and effective, and getting
 cross-government, cross-sector cooperation with rolling the scheme out
 and it be made an industry standard that everyone is agreed upon. That
 is the real challenge that faces us, not how much money its going to
 cost. We can talk about the money later, let's just get the proposal
 details worked out and put on the table first and see if its got a
 chance for any funding.

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/




-- 
Aaron Goulden
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] To disclose or not to disclose

2008-09-27 Thread AaRoNg11
On Sat, Sep 27, 2008 at 9:13 AM, AaRoNg11 [EMAIL PROTECTED] wrote:

 Hey, this is a situation that occurs quite frequently within the security
 industry. (Bad) Vendors often refuse to fix bugs or ignore them completely
 until it's too late.

 You should ideally assess each situation on a case by case basis. Ideally,
 the first step should be to notify the vendor giving them as much technical
 information about the bug as possible. You should also document the severity
 of the bug, and give the vendor some examples of what a malicious user would
 be able to do.

 If the vendor has not responded within 5 weeks, the second step should be
 to create an extremely generic public advisory. This advisory should explain
 what the bug allows a malicious user to do, while not detailing the
 technical aspects. By doing this, you are letting the industry know that the
 software is vulnerable, and it would be a good idea to start looking at
 possible alternatives. It is at this point that you should set a deadline
 for your public disclosure of the full advisory. This will put pressure on
 the vendor to get a patch out ASAP.

 A few days before the deadline, you should try to release a fix for the
 affected product yourself. Obviously this is only possible with open source
 software. Most people that use mission critical software (such as hospitals
 etc) will be signed up to at least one security mailing list. By doing this,
 you give them a chance to patch the bug before the script kiddies get in.
 While it may be possible to recreate the exploit from the patched code, it
 is unlikely that anybody will be able to rush anything out in the few days
 before the public advisory.


 On Sat, Sep 27, 2008 at 4:39 AM, Simon Smith [EMAIL PROTECTED] wrote:

 Greetings,
I have a theoretical question of ethics for other security
 professionals that participate in this list. This is not an actual
 situation, but it is a potentially realistic situation that I'm
 interested in exploring and finding an acceptable solution to.

Supposed a penetration testing company delivers a service to a
 customer. That customer uses a technology that was created by a third
 party to host a critical component of their infrastructure. The
 penetration testing company identifies several critical flaws in the
 technology and notifies the customer, and the vendor.

One year passes and the vendor had done nothing to fix the issue.
 The
 customer is still vulnerable and they have done nothing to change their
 level of risk and exposure. In fact, lets say that the vendor flat out
 refuses to do anything about the issue even though they have been
 notified of the problem. Lets also assume that this issue affects
 thousands of customers in the financial and medical industry and puts
 them at dire risk.

What should the security company do?

 1-) Create a formal advisory, contact the vendor and notify them of the
 intent to release the advisory in a period of n days? If the vendor
 refuses to fix the issue does the security company still release the
 advisory in n days? Is that protecting the customer or putting the
 customer at risk? Or does it even change the risk level as their risk
 still exists.

 2-) Does the security company collect a list of users of the technology
 and notify those users one by one? The process might be very time
 consuming but by doing that the security company might not increase the
 risk faced by the users of the technology, will they?

 3-) Does the security company release a low level advisory that notifies
 users of the technology to contact the vendor in order to gain access to
 the technical details about the issue?

 4-) Does the security company do something else? If so, what is the
 appropriate course of action?

 5-) Does the security company do nothing?

 I'm very interested to hear what people thin the responsible action
 would be here. It appears that this is a challenge that will at some
 level create risk for the customer. Is it impossible to do this without
 creating an unacceptable level of risk?

 Looking forward to real responses (and troll responses too... especially
 n3td3v).

 --

 - simon

 --
 http://www.snosoft.com

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/




 --
 Aaron Goulden




-- 
Aaron Goulden
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] To disclose or not to disclose

2008-09-27 Thread AaRoNg11
Well, if you've already warned your client that their software is vulnerable
and they haven't changed to an alternative, then it's fine to release an
advisory with all of the details.

I really don't understand why they'd pay for a penetration test to not take
action if their software was vulnerable. If the vendor is extremely
unresponsive to any information, it may be the case that releasing the
technical details to the public are the only way to get them to take notice.
Just think, you might not be the only person who has found out about the
exploit. There might be some black hat hacker somewhere using it to meet
their own ends. Some vendors are just like that though; they refuse to do
anything until it's too late. Maybe they'll start taking notice of bug
reports after this happening a few times and losing half of their clients.

On Sat, Sep 27, 2008 at 6:25 PM, Simon Smith [EMAIL PROTECTED] wrote:

 Great replies guys!

So lets take this a step further. Lets suppose (again just theory)
 that
 the security company did notify the software vendor and did tell the
 vendor where the security issues were in their technology, how to
 exploit the issues, provided a proof of concept, and provided clear and
 actionable methods for remediation. Lets then say that the software
 vendor flat out, point blank, rejected that information and refused to
 implement any fixes.

Just to make this more interesting, lets say that this all happened
 over one year ago. Lets also say that the customer who was being tested
 by the security company and that is using the vulnerable software has
 yet to address the vulnerability in their own network too.

Is it the ethical duity of the security company to release an
 advisory?
 Does that advisory put the customer at risk? It is clearly unethical to
 do nothing and to leave everyone else at risk. How to proceed?

 --

 - simon

 --
 http://www.snosoft.com


-- 
Aaron Goulden
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] The new 'cyber politica' mailing list thats planned for the non-technical elite

2008-09-21 Thread AaRoNg11
Hi, my comment wasn't meant to flame you. I was basically trying to say that
if you used your email for sensitive stuff, and it had been compromised, the
intruder finding out your IP address is the least of your worries. I'm sorry
if it was interpreted as a flame.

Anyway, I like the idea of a non-technical mailing list. I'd be sure to sign
up :)

On Sun, Sep 21, 2008 at 7:02 PM, n3td3v [EMAIL PROTECTED] wrote:

 On Sun, Sep 21, 2008 at 12:34 PM, n3td3v [EMAIL PROTECTED] wrote:
  On Sun, Sep 21, 2008 at 4:01 AM,  [EMAIL PROTECTED] wrote:
  On Sat, 20 Sep 2008 21:47:55 BST, AaRoNg11 said:
 
  If the job was that sensitive of a job, do you really think they'd be
 using
  gmail to send important information?
 
  Remember - n3td3v is in the British Isles, where clusterfuck IT is
 rampant in
  the government sector.  You know, like Let's lose the financial details
 of
  *EVERY SINGLE FRIKKING FAMILY IN THE COUNTRY on an UNENCRYPTED DISK.
 
  Oh, why was the disk unencrypted? Because the policy on how to securely
  transfer the data was deemed so sensitive that it was only accessible to
  upper management - the people *doing* the work didn't have access to the
  policy of how to do it right.
 
 
  Maybe we can take this over to [EMAIL PROTECTED] or
  whatever name he gives the new mailing list when John Cartwright
  finally gets the finger out.
 
  We need a non-technical, unbiased, unmoderated version of
  full-disclosure where people can post rants, raves, speeches, ideas,
  views, opinons, news items, the dirty on employees, gossip, security
  conferences, or other intelligence thats non-technical.
 
  A place where people like n3td3v don't get made to feel bad for
  posting their views on whats going on in the security community.
 
  There seems to be a feeling that anyone who is non-technical is
  unwelcome on full-disclosure and end up getting written about on
  securityfocus by robert lemos and made to feel a bad person. :(
 
  This is unfair, in the bigger scope of things, there just isn't
  anywhere to go to post non-technical stuff thats unmoderated.
 
  So instead of being nasty to n3td3v and writing about him on
  securityfocus and declaring a hunt for n3td3v, let's just create a new
  mailing list where people like me won't get made uncomfortable for
  posting.
 
  The bottom line is, there is no non-technical, unbiased, unmoderated
  version of full-disclosure and there should be one.
 
  We need a cyber political mailing list, where anything goes, right now
  it just seems that people don't really want n3td3v around, but thats
  not because n3td3v has done something wrong, its just because there is
  no where else suitable to post about cyber politics thats
  non-technical, unbiased, unmoderated.
 
  I don't like posting to full-disclosure if I feel unwelcome, but I
  don't want to be muzzled, I want John Cartwright to setup a new
  mailing list for the non-technical issues.
 
  This is my proposal im putting forward, so let's talk about it.
 

 I say 'cyber-politica' is a decent name for it we can have.

 Although im concerned the 'cyber' might go out of fashion over the
 years, so if you have cyber in the name it might get outdated.

 I think the new mailing list will be perfect for me and gadi types,
 then we won't be annoying the list anymore about what we think of
 everyone and cyber security.

 I think full-disclosure has had enough of opinionated people like me
 and gadi who chime in when we feel like it, it appears to upset the
 full-disclosure crowd, so a new mailing list would be brilliant for
 the non-technical crowd who still want to chime in when we're not
 happy about something.

 When people like me and gadi types post our opinionated views about
 people and cyber security, folks don't always reply and give their
 views, because they think the mailing list isn't supposed to be about
 the non-technical subject, so are reluctant to get involved incase it
 increases the 'noise'.

 What's needed is a non-technical mailing list where the non-technical
 elite can hang out.

 US-CERT.gov website already have technical and non-technical sections,
 so why can't full-disclosure be split in two?

 Its obvious me and gadi are not welcome on the current format
 full-disclosure, so we need a new mailing list for the non-technical
 elite.

 I was very upset to be bashed by robert lemos and his friends via news
 articles and blogs, so now its time for a place we can go and not
 upset people anymore. It was never my intention to upset folks but
 thats what seems to have happened. They seem to think the
 full-disclosure list is being destroyed by the non-technical elite. So
 why not give the non-technical elite a mailing list of their own, so
 people won't get upset because we post an email that hasn't got a
 vulnerability or exploit in it.

 We should leave the full-disclosure list for technical users, and the
 non-technical users have their own mailing list to post on, then
 nobody can be accused

Re: [Full-disclosure] The new 'cyber politica' mailing list thats planned for the non-technical elite

2008-09-21 Thread AaRoNg11
It refers to neither. I'm sorry, i'm new to this list so I assumed that
n3td3v's post was serious.

On Sun, Sep 21, 2008 at 7:48 PM, Razi Shaban [EMAIL PROTECTED] wrote:

 Aaron, there's something you don't seem to get here. n3td3v is a
 troll. I'm hoping that eleven refers to your college graduation year
 and not your high school graduation; if it's the first you might know
 what a troll is. If not, look it up.

 --
 Razi




-- 
Aaron Goulden
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/