Search /
Docfinder:
Advanced search  |  Help  |  Site map
RESEARCH CENTERS
SITE RESOURCES
Click for Layer 8! No, really, click NOW!
Networking for Small Business
TODAY'S NEWS
Report: US FCC to allow payments for speedier traffic
China working on Linux replacement for Windows XP
FCC adds $9 billion to broadband subsidy fund
Raspberry Pi alternatives emerge to fill need for speed
It's now possible to wirelessly charge 40 smartphones from 16 feet away
Ex-FCC commissioner to head CTIA in latest Washington shuffle
Go time traveling with Google Maps
While Heartbleed distracts, hackers hit US universities
Survey respondents shun much-hyped mobile shopping technologies
Survey respondents shun much-hyped mobile shopping technologies
7 Ways to Advance Your Project Management Career
How Apple's billion dollar sapphire bet will pay off
US to vote on sharp increase in broadband subsidies
iPhone 6 rumor rollup for the week ending April 18
NSA spying revelations have tired out China's Huawei
Arista co-founder may have switch maker by its jewels
Apple kicks off public OS X beta testing
Open source pitfalls – and how to avoid them
AT&T's expanded 1 Gbps fiber rollout could go head to head with Google
BlackBerry Releases BES 10 Security Update to Address 'Heartbleed' Flaw
Verizon: Web apps are the security punching bag of the Internet
Cisco announces security service linked with new operations centers
Dell launches virtual storage accelerator, aims to boost SAN performance
Free OS X Mavericks now powers half of all Macs
/

Debate erupts over disclosure of software security holes

Today's breaking news
Send to a friendFeedback


LAS VEGAS - In a contentious keynote speech that created an uproar at the Black Hat Briefings security conference here yesterday, security researcher Marcus Ranum charged that the full disclosure of software vulnerabilities isn't improving computer security. Instead, Ranum said, it only encourages attacks by what he called "armies of script kiddies."

Many security experts and corporate users believe that publicizing software flaws will improve security by forcing software vendors to improve the quality of their products and to quickly fix potentially damaging bugs - a point that was reiterated by several audience members and other speakers at the Black Hat conference.

But Ranum, CEO of security software vendor Network Flight Recorder Inc. in Rockville, Md., argued that neither of those things is happening. Declaring a "call to arms to change how we perceive security," Ranum took aim at the practice of posting detailed information about software flaws and security holes on the Internet.

Thus far, even with all that information being made available, there hasn't been "an appreciable impact" on the turnaround times for fixing bugs after they have been reported, Ranum said. He asked the audience, "If full disclosure is working, why isn't the state of security improving?"

Ranum claimed that many disclosures of security holes are "rock-throwing" incidents done by companies or individuals to attack vendors such as Microsoft Corp. or for the purposes of self-promotion, financial gain or ego gratification. And, he said, such disclosures give malicious attackers point-and-click tools that they can use to take down Web sites.

There are better ways to publicize software vulnerabilities than by releasing the information to the public, Ranum added. For example, he said, an increasing amount of software is becoming available with auto-update capabilities that could allow bug fixes and patches to be streamed directly to users.

But other attendees at the Black Hat conference - an annual precursor to the Defcon hackers convention that features sessions aimed at corporate users - said they're skeptical that limiting the disclosure of vulnerability information would benefit companies.

Mudge, a vice president at Cambridge, Mass.-based security consulting firm @Stake Inc. who uses only one name, rejected what he called the "metered dissemination of information" about potentially damaging security holes. While the number of exploits by so-called script kiddies and other attackers has increased, widespread publicity about the incidents have helped to raise security awareness in the business community, he said.

As much vulnerability information as possible should be disclosed in hopes that responsible users will employ it to protect their companies from being attacked, Mudge added. "If I took that [information] away from you, you wouldn't be able to defend your system," he said.

Other attendees seconded Mudge's comments. "How do you give information to people [so they can] manage risk without giving it to other people?" asked Eric Pulaski, chairman and chief technology officer at BindView, a Houston-based security consulting firm. "If the information and the tools aren't there, [companies] can't protect themselves."

And Sean Wray, an Internet security engineer at Kana Communications Inc. in Redwood City, Calif., said he doubts people could ever be stopped from distributing information about software holes and other security vulnerabilities.

Bruce Schneier, CTO at Counterpane Internet Security Inc. in San Jose, offered a different perspective on the growing challenge of securing systems during another keynote speech at the conference yesterday. Schneier said software is becoming more insecure because of the increasing complexity of products such as Windows 2000. "Increased complexity means increased errors," he said.

But Ranum insisted that poor security can be traced more to excessive disclosure than lack of resources or complex code. "We Americans have a lot of freedom of speech, but unfortunately we tend to execute [it] irresponsibly," he said. "And freedom of speech in computer security has created this huge gray area for people to carry out irresponsible activities."

At the end of his speech, Ranum urged attendees to turn their attentions from trying to find holes in software to building better defensive strategies for besieged users. "The Huns didn't know how to build Rome; they just knew how to sack it," he said. "Just show us that you have useful stuff [instead of] destroying other people's stuff.

For more enterprise computing news, visit Computerworld online. Story copyright 2000 Computerworld, Inc. All rights reserved.

RELATED LINKS


NWFusion offers more than 40 FREE technology-specific email newsletters in key network technology areas such as NSM, VPNs, Convergence, Security and more.
Click here to sign up!
New Event - WANs: Optimizing Your Network Now.
Hear from the experts about the innovations that are already starting to shake up the WAN world. Free Network World Technology Tour and Expo in Dallas, San Francisco, Washington DC, and New York.
Attend FREE
Your FREE Network World subscription will also include breaking news and information on wireless, storage, infrastructure, carriers and SPs, enterprise applications, videoconferencing, plus product reviews, technology insiders, management surveys and technology updates - GET IT NOW.