Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Security News IT

Researcher Resigns Over New Cisco Router Flaw 423

An anonymous reader writes "Michael Lynn, formerly a researcher for Internet Security Systems resigned today rather than conceal his research into serious new flaws in Cisco routers, according to stories at Washingtonpost.com and CRN. Interestingly, Cisco says the the problem is not a security vulnerability, although it chided Lynn for not going through proper vulnerability disclosure channels. Both stories note that Lynn is in danger of being sued by Cisco for revealing the information, details of which were pulled at the last minute from the materials handed out to Black Hat attendees." Update: 07/28 12:23 GMT by Z : SimilarityEngine writes "Cisco and ISS are filing a law suit against Michael Lynn and the management of the Black Hat Conference, following Lynn's presentation discussing a vulnerability in IOS."
This discussion has been archived. No new comments can be posted.

Researcher Resigns Over New Cisco Router Flaw

Comments Filter:
  • Re:I wonder... (Score:5, Insightful)

    by lordkuri ( 514498 ) on Thursday July 28, 2005 @08:09AM (#13184324)
    but couldn't he at least have waited a few weeks to see how Cisco responds

    Cisco seems to suffer from the same stupidity that most other large corporations do. They'll take a report, and sit on it for weeks, and sometimes months. Full Disclosure is usually the only way to get them to actually fix the issues in a timely manner.
  • by EmagGeek ( 574360 ) on Thursday July 28, 2005 @08:12AM (#13184336) Journal
    In TFA, Cisco themselves said that he did not disclose any new vulnerabilies... so... what is the BFD?

    Later, Cisco said it was all bent out of shape because they follow an "industry established disclosure process" and because Mr. Lynn "illegally" obtained the information...

    Hey, Cisco, I have news for you. "Industry established disclosure process" != "Law"

    Get over yourselves, admit that you're a bunch of fuckups that can't make secure networking equipment, and move along..
  • Re:I wonder... (Score:5, Insightful)

    by xappax ( 876447 ) on Thursday July 28, 2005 @08:13AM (#13184337)
    Companies like Cisco, Microsoft, etc. are generally made to look really bad when security flaws are exposed in their products.

    The way they prefer it to go is that someone contacts them secretly, tells them the hole, and they can have it fixed all up by the time the vulnerability is published.

    Then they get to look super-secure, since they were "too quick" for the bad hackers.

    Some people, however, think that the only thing that'll get companies to take security more seriously is if they are actually made to look really bad, and maybe some of their products actually get hacked.

    Unfortunately, when you're dealing with some giant businesses cost/benefit analysis, the only thing that can get them to take notice is a little carnage.

    Is it worth it? I dunno, but it's certainly arguable.
  • Re:I wonder... (Score:5, Insightful)

    by Tet ( 2721 ) <.ku.oc.enydartsa. .ta. .todhsals.> on Thursday July 28, 2005 @08:13AM (#13184340) Homepage Journal
    couldn't he at least have waited a few weeks to see how Cisco responds

    Yes, he could. But then again, I suspect he already did. The traditional approach was to tell the vendor, and announce the flaw publicly 28 days later. That gave a vendor sufficient time to code and test a patch. However, many vendors (and Cisco seem to be particularly bad about this) sit on problems like this for several months and take no immediate action. I'd be far from surprised to hear Cisco were notified of this 3 months ago, hence Lynn's frustration and his decision to publicly talk about the flaw. I don't actually know what happened, and the above is just speculation. I suspect there's more than a grain of truth to it, though.

  • by wikki ( 13091 ) on Thursday July 28, 2005 @08:13AM (#13184342)
    I must have missed the "master password" thing.

    As far as Cisco going down hill I don't really agree with that. Currently Cisco is expanding their product offerings into new unexplored territories such as IP Telephony. I have installed and supported several of these systems. As long as you follow thier design, install, and support guidelines they are as robust and as problem free as any other platform that i've worked with.

    I think most people on Slashdot understand the complexities of the internet world. A minor change here can have a huge, uexpected, impact across the network or application. However, if time tested procedures for upgrades and testing are followed nothing has really changed. I think what may be giving a Cisco a bad name is all of the under qualified people out there installing their systems. The MS world of patch it, reboot, and go about your business does not fly when you critical systems are involved.
  • Re:I wonder... (Score:4, Insightful)

    by leonmergen ( 807379 ) * <lmergenNO@SPAMgmail.com> on Thursday July 28, 2005 @08:17AM (#13184355) Homepage

    Yes, he could. But then again, I suspect he already did.

    From the article:

    "The decision was made on Monday to pull the presentation because we wanted to make sure the research was fully baked."

    In other words, the research was not even finished yet. Isn't that a little impatient, and might there be a little chance that the researcher in question would have liked the attention he would've gotten if he presented this information at Black Hat, which was part of why he made the decision to pull out the information anyway ?

  • How do you apt-get hardware?

    The point of buying a router is efficiency. Otherwise get a switch and a 386 running BSD or Linux... Having hardware move packets is almost certainly going to be faster (and efficient) then having a general purpose processor do it.

    That said you have firmware that controls the hardware which could be "apt-get" though in reality I'd rather see an open source firmware that was also provided as binary images you could just upload.

    Do you really want some MCSE throw-back building a firmware image when they can hardly manage cmd.exe?

    hehehee sick.

    Tom
  • Re:I wonder... (Score:3, Insightful)

    by Lumpy ( 12016 ) on Thursday July 28, 2005 @08:23AM (#13184387) Homepage
    Well if you worked for the Secret service and knew that the president was having young girls kidnapped so he could rape them would you keep your mouth shut? It's about scruples. These flaws seriousally bother this man to the point that he is willing to give up his career and life as he knows it to get the information out.

    this means it is very big, probably one of those one person can disable the whole net easily or snoop on all internet traffic without traceability.

    I know of people that quit their jobs to blow the whistle and these men and women need to be held up as the heros of our time as they are the ones who not only have lots more guts that the rest of us, but are certianly more driven to not violate their core values.

    I commend this man, he should be look up to.

  • by soma_0806 ( 893202 ) on Thursday July 28, 2005 @08:23AM (#13184389)

    I agree that disclosure, in general, is clearly in the public interest, but this cannot always be the case.

    We simply do not have enough details here to declare this disclosure "good" or "bad." Although Cisco is claiming the information was on vulnerabilities that have been fixed, that could be a PR move to stave off a stock plummet or put a stop to proliferation of the information to those that may want to use the vulnerability to bad ends.

    We also can't be sure of what "fixed" truly means. How tested are these fixes? Are they complete fixes or do some variations on the vulnerabilities revealed still exist? The questions go on and on.

    I'm all for protecting Whistleblowers, but only if they have done all they could to ensure that they are not causing more damage by revealing information that can still be used against current users. I'm not saying that this is clearly not the case here, only that we need more time before we declare this guy our champion.

  • by Cmdr. Marille ( 189584 ) on Thursday July 28, 2005 @08:26AM (#13184407)
    I can't help but wonder, if this in the end really about gaining some publicity and in the end making more money.

    Cisco is actually very upfront and cooperative when you report things which might be a vulnerability (I have personally dealt with PSIRT). The people who work there are actually so polite, it's kind of annoying (I have been thanked about 2 dozen times for reporting a very minor finding).

    They do however expect you to play by the rules. Even if you are the person who found a bug, you are expected to let Engineers fix the bug before you release the information.
    Also, there is policy in place, which makes sure major ISPs (Carriers) are informed first, so they can do upgrades before the PSIRT release is made public.

    All that makes sense, since we are really talking about essential infrastructure.

    Of course, all that kind of takes away the coolness of reporting a vulnerability and you will get a lot less publicity (cisco credits you) than what you would get, if you just post to some mailing list.

    If he really released information he researched at ISS without consent, well, he should face consequences. Because I obviously was to gain from it (getting a new job, making a name or himself). Hopefully he wasn't just doing it for the publicity.
  • by Overzeetop ( 214511 ) on Thursday July 28, 2005 @08:30AM (#13184427) Journal
    Okay, this sounds pretty simple. Michael Lynn finds a (new) explit of Cisco routers and its a doosey. He informs ISS, who informs Cisco. Cisco management can't believe that such a serious flaw exists, since they've know about the possibility, but its been written off as minor in the past. Lynn presses his case to his supers, and they get down and dirty with Cicso. Cisco craps its pants because the flaw is everywhere, and it's going to cost real money to fix, and could hurt company Q results.

    Cisco agrees with ISS taht they're going to do something about it, but it's going to take a bunch of resesarch and time. They'll keep it quiet for a few years while they put th fix in the pipline for new models. They'll work on a firmware fix, but its back burner as long as the explot isn't public. If ISS keeps its mouth shut, they can still do work for Cisco.

    Lynn hears that his research is to be hush-hush, and that Cisco will work on it, but it could be a while before there's an actual patch. No arguing that the flaw is critical will make ISS management, with a financial gun to its head, budge.

    Lynn flips ISS the bird, 'cause he thinks its a major security issue, and presents his research anyway. Cisco and ISS claim they're working ont it, and that its and old flaw, and nothing really serious. And they're quietly looking for a man to fir Lynn with concrete shoes for blowing their cover.

    Seems pretty clear to me.
  • by Anonymous Coward on Thursday July 28, 2005 @08:34AM (#13184448)
    Should a security problem be made public? Should it not? If you were driving a car that really needed to be recalled - wouldn't you want to know about it?

    Already some industries are copying the ridiculous EULA's the computer industry has come up with.

    How long before other companies with something to hide start screaming about trade secrets, etc. to shut someone up?
  • by Saggi ( 462624 ) on Thursday July 28, 2005 @08:38AM (#13184472) Homepage
    Contradiction?

    Quote: "It is important to note that the information Mr. Lynn presented was not a disclosure of a new vulnerability or a flaw with Cisco IOS software. Mr. Lynn's research explores possible ways to expand exploitations of existing security vulnerabilities impacting routers."

    Quote: "... Mr. Lynn a platform to publicly disseminate the information he illegally obtained."

    If his research regards known and exsisting vulnerabilities how could they be illegal obtained? This can only happen if Cisco sits on the vulnerabilities for some time. If this is the case its a poor excuse by Cisco to state that its not a new vulnerability.

    In my humble opinion its new when first made public. ... and I can never find out why pople can get sued for disclosure of something dangerous to a lot of costumers.

    If I use their routers I would like to know if they can be hacked. If they can get hacked I would like the oppotunity to take them offline if I need to protect my business.

    If I don't have that oppotunity - and I loose data/values/etc due to an attack, I'll have to keep Cisco responsible.
  • Mod Parent Down! (Score:1, Insightful)

    by Anonymous Coward on Thursday July 28, 2005 @08:39AM (#13184477)
    Calling for personal attacks and then giving out the person's personal number in a public forum is not appropriate to Slashdot.
  • Full Disclosure (Score:4, Insightful)

    by miffo.swe ( 547642 ) <daniel@hedblom.gmail@com> on Thursday July 28, 2005 @08:39AM (#13184480) Homepage Journal
    I dont believe in keeping an exploit away from the public until the vendor gets his thumbs out of the dark place that smells funny. First of all i really think much more work needs to be put down into securing the systems before they are released, this includes various linux vendors. Its insane today with the user being the Q&A and security department for the vendors.

    Full disclosure is a nice cushion for people who really didnt do their job in the first place. It doesnt in no way help the users. Before the exploit is released publicly you can bet your backside its used for company spying and other shoddy activities.

    A company shouldnt be afraid of scriptkiddies, theyre harmless compared to their competitors armed with their most secret info. Full disclosure makes it possible for a company to atlest try to mitigate that threat. Other disclosure puts them in the whims of the vendors.
  • by Anonymous Coward on Thursday July 28, 2005 @08:49AM (#13184535)
    CiscoIsSCO?
  • Re:I wonder... (Score:4, Insightful)

    by turnstyle ( 588788 ) on Thursday July 28, 2005 @08:51AM (#13184546) Homepage
    Would you similarly welcome the disclosure of a security flaw at your bank, hospital, etc. that granted access to your private/personal records?

    Personally, I'd probably rather the bank/hospital had a few weeks to establish a plan, rather than have to bang something out in an emergency, and whilst the records have already been made much more vulnerable.

  • Re:I wonder... (Score:3, Insightful)

    by lordkuri ( 514498 ) on Thursday July 28, 2005 @08:58AM (#13184601)
    Would you similarly welcome the disclosure of a security flaw at your bank, hospital, etc. that granted access to your private/personal records?

    Actually, yes I would. I'd much rather they fix or at least stopgap the issue instead of it sitting there wide open for all to see and/or exploit for months.
  • Re:I wonder... (Score:4, Insightful)

    by thogard ( 43403 ) on Thursday July 28, 2005 @09:01AM (#13184621) Homepage
    Months? There are outstanding issues on their 2900 switches that have been unfixed there for years.

    I don't buy cisco gear anymore.
  • Re:I wonder... (Score:4, Insightful)

    by lordkuri ( 514498 ) on Thursday July 28, 2005 @09:07AM (#13184675)
    But it only became "wide open" with the public disclosure of exactly how to exploit it.

    c'mon... you're telling me that out of 5+ billion people on this planet, that only the person that found the exploit is the one that knows about it?

    surely you're not that niaeve?
  • Re:I wonder... (Score:3, Insightful)

    by xappax ( 876447 ) on Thursday July 28, 2005 @09:07AM (#13184680)
    It seems like a pretty basic concept, but I guess it should be pointed out that just because an exploit hasn't been presented by a security professional at Black Hat doesn't mean there aren't some sleazy Croatian identity thieves (for example) who are abusing this vulnerability left and right.

    As long as it's a secret that only a few seriously malicious hackers know, the cost to Cisco is virtually nill. "Oh, your network got hacked? Well, it sure wasn't through your Cisco routers: check it out - we've got zero unpatched known vulnerabilities!" When security holes remain a secret, there is DEFINITELY a cost, but it's shouldered by the users of the product, not the designers. In general, the best way to get the designers to care is to demonstrate to the general public that Cisco is putting their networks at risk.

    Not hypothetically, not a month ago, but now. Your networks are being hacked right this minute because Cisco hires sloppy firmware programmers.

    Sad, but true.
  • Re:I wonder... (Score:5, Insightful)

    by schon ( 31600 ) on Thursday July 28, 2005 @09:09AM (#13184693)
    I'd probably rather the bank/hospital had a few weeks to establish a plan, rather than have to bang something out in an emergency, and whilst the records have already been made much more vulnerable.

    Your preference suffers from the flawed (although typically wide-spread) assumtion that only one person is smart enough to discover the flaw.

    If a white hat can discover it, then a black hat can too - and black hats are constantly looking. Vulnerabilities need to be *FIXED*, not discussed for weeks in private meetings.
  • Re:I wonder... (Score:1, Insightful)

    by turnstyle ( 588788 ) on Thursday July 28, 2005 @09:16AM (#13184767) Homepage
    "Your preference suffers from the flawed (although typically wide-spread) assumtion that only one person is smart enough to discover the flaw."

    And your preference suffers from the flawed (although typically wide-spread) assumption that having thousands of people with knowledge to exploit a flaw is no different than having one person with that knowledge.

  • by Anonymous Coward on Thursday July 28, 2005 @09:21AM (#13184800)

    From the (update) article:

    "It is our belief that the information that Lynn presented at Black Hat this morning is information that was illegally obtained and violated our intellectual-property rights," Noh added. Lynn decompiled Cisco's software for his research and by doing so violated the company's rights, Noh said.

    So, he reverse engineered their software (presumably using demonstrable decompilation techniques) to obtain all or part of the source code which he then studies to ascertain any potential vulnerabilities. Oh dear, this is a violation of their intellectual property.

    Please enlighten us Cisco:

    • How else do you suppose crackers work?
    • Do you think these crackers will respect your intellectual property in pursuit of their ends?
    • How does pursuing a group of researchers (Black Hat) who have found exploits in your products (and might actually be willing to improve defences against compromisability) protect us from the threat of crackers?

    Much obliged, do take your time...

  • Re:I wonder... (Score:3, Insightful)

    by turnstyle ( 588788 ) on Thursday July 28, 2005 @09:23AM (#13184827) Homepage
    "surely you're not that niaeve?" I'm not one to correct spelling, but if you're going to call someone "niaeve" you may as well spell it "naive."

    Would you consider 5 people with this knowledge "wide open"? 5000?

  • Re:I wonder... (Score:2, Insightful)

    by nolife ( 233813 ) on Thursday July 28, 2005 @09:31AM (#13184900) Homepage Journal
    I'd also like to add that knowing the seriousness and amount of flaws helps a consumer make an informed buying decision. Of course Cisco all but owns the networking market but there are quite a few vendors making inroads. Soon people will have a choice and people will need to rely on more then some PR marketing material supplied by the company to make a decision on what equipment to buy. Responsible disclosure (definition of which varies widely by opinion) is good for consumers and helps to maintain a good balance of power between the users and vendors.
    Using the legal system or using any type of mask to prevent or limit disclosure only helps the bottom line of the vendor.
  • by AceJohnny ( 253840 ) <jlargentaye&gmail,com> on Thursday July 28, 2005 @09:33AM (#13184925) Journal
    This is not a problem of disclosing a major vulnerabilty before the vulnerable company could react.

    The flaw had been privately disclosed a few months ago. Cisco, for its own reasons, didn't intend to distribute a fix before long (next year!). Too major a flaw? Publicity? Too much work already? Internal politics?

    Obviously, Michael Lynn couldn't live with the idea of leaving this flaw open, and decided to disclose it publicly, thus forcing Cisco to aknowledge it and fix it. Also obviously, this wasn't the only reason. He seemed disgusted by the industry's approach to this kind of problem.
  • by Anonymous Coward on Thursday July 28, 2005 @09:47AM (#13185031)
    I'm always amazed that companies think they have, or do have the right to sue someone for pointing out a flaw in their product. "Only in the software industry". If Chevy sells a new pickup that has seatbelts that don't work properly in a crash, and I find out, damn straight i'm telling the whole world. And if chevy tried to sue me for it they'd get laughed out of court. There should be absolutely no legal grounds for a company to sue someone over pointing out the flaws in their product. It's their own damn fault for not making a secure product in the first place.
  • by 4of12 ( 97621 ) on Thursday July 28, 2005 @09:50AM (#13185061) Homepage Journal
    uncovering corruption. Which does not appear to be the case here.

    Can't say for sure. But two points:

    1. It costs Cisco a lot of money to quickly put their best people onto researching the problem, coming up with a fix, testing, and distributing it to installed sites. The faster they have to do this, or even if they have to do it at all, costs them money. Since they're in business to make money (reduce costs) you can see where this line of reasoning might carry management that was completely focussed on the bottom line and considered ethical issues as window dressing.
    2. Meanwhile, it costs Cisco's customers real risk that they'll get cracked by an unscrupulous black hat in the interim while Cisco takes its time to fix the problem and distribute it to the customers. That might not be a cost those at-risk customers figured into the initial purchase price; it probably wasn't mentioned in Cisco's product sales pitch.

    A clear case of corruption would be if Cisco tried to "kill the messenger", bury the problem,conceal its existence, so they wouldn't have to spend more resources dealing with it.

    I'm not inclined to believe Cisco would do that. Rather, they'd attack the problem with as many resources as they think it deserves.

    But in the real world of shades of gray it's hard to determine whether Cisco is working on the bug with all necessary and sufficient expeditious diligence, or they are needlessly and carelessly dragging their feet because fixing the problem looks to be an expensive proposition.

    Personally, I think the annual reports of companies like Cisco, MS, Oracle, IBM, Sun, etc. should be required to provide an after-the-fact one-year history of their bug handling, notification, fix, distribution (with all the legal baggage that financial reporting and auditing requires), and how many of their customers' systems were vulnerable, and actually exploited (anonymous is OK there). That kind of full disclosure would provide potential customers with at least the historical information they need to make an informed decision in a functioning free market.

  • by Anonymous Coward on Thursday July 28, 2005 @09:55AM (#13185105)
    Calling for personal attacks and then giving out the person's personal number in a public forum is not appropriate to Slashdot.
    Translation: "I dictate Slashdot policy, but I don't have a single mod point".

    Moron...

  • by MikeBabcock ( 65886 ) <mtb-slashdot@mikebabcock.ca> on Thursday July 28, 2005 @10:18AM (#13185321) Homepage Journal
    Ok, how's this, its perfectly reasonable to put out publically his E-mail address at work, but I expect nobody to post photos or personal addresses or wife's name, or anything like that.

    *Personal* attacks should never be used, even against someone who might deserve it; it misrepresents our ideology.

    However, a personal complaint about corporate policy is perfectly reasonable.

    "Why is it that you, representing Cisco said that ... "

  • by toonworld ( 838479 ) on Thursday July 28, 2005 @10:21AM (#13185355)
    The Cisco statement, offered by Mojgan Khalili, senior manager for corporate public relations, went on to encourage customers to "upgrade their software to the latest available versions."

    It's really funny to see that quote because they ALWAYS tell you to upgrade the IOS no matter what problem is reported to them... classic response from Cisco!

  • by Debian Troll's Best ( 678194 ) on Thursday July 28, 2005 @10:30AM (#13185460) Journal
    Tom, Tom, Tom. I was the administrator of Nortel's network for quite a few years, and let me tell you a little secret. We ran the whole thing on an 8-port 3Com 10BaseT hub, a 486SX/33 running Debian, and a whole stack of splicing wire and duct tape. You see, I started out like you. Plucky...confident...inexperienced. I'd run a small LAN. It was easy. 6 PCs? No problem! I'll just throw in this 8-port and away we go. I've got plenty of room for expansion (2 ports), and besides...10Mbit/sec ethernet should be plenty fast enough for years to come.

    Sure enough, the little company that I'd joined soon grew and grew and grew. Soon, it was one of the largest telecoms suppliers in the world. So why didn't we just increase network capacity as we grew? Well...I was so confident with my little LAN that I formally requested that the networking budget be frozen until 2012. Imagine how silly I felt when I was trying to support a worldwide organisation of over 30,000 employees with an 8-port hub! There was only one thing I could do. Yes...splice the shit out of the ethernet cables coming out of the hub, and write some advanced packet management software to handle all the multiplexed data.

    My mother had an old 486SX system in her basement that she'd stopped using several years ago since it was completely fucking obsolete, but for Nortel, it was the perfect hardware solution. The only thing missing was software. I thought about the problem at hand. What do I have? TCP/IP packets flying everywhere on CAT5 cables, spliced around 7,500 times over. What do I need to do? Manage those packets. What's another name for a packet? A PACKAGE! And what manages packages? apt-get, fuck you Tom...apt-get!!!!!

    I spent the next few days furiously extending the source code to apt-get to deal with TCP/IP 'packages', as well as its native currency, the .deb package. It was no trivial feat. It required some very clever hardware tricks to get it to run at full speed on the ancient 486SX hardware, including full MMX, SSE and 3DNow! acceleration. I found out later that the Intel 486SX chip didn't actually support any of those instruction sets, so I had to spend an extra day writing an emulation layer.

    No matter. By the end of the week, I had my new Debian/apt-get package management system in place, busily apt-get installing TCP/IP packages across our entire network. Of course, given the restrictions of our hardware, we were bound to come across minor slowdowns from time to time. And that's what you experienced Tom. And for that I'm sorry. I really am. I could have done better. My co-workers suggested I could have used Gentoo's 'emerge' system to better optimise those TCP/IP packets better to the 486SX system. Maybe I could have. But Tom...you have to understand...I only did it because I had to. You do understand that Tom...Tom? Are you still there Tom?

  • Re:Why? (Score:2, Insightful)

    by Creep73 ( 647258 ) on Thursday July 28, 2005 @10:44AM (#13185634) Journal
    Lynn worked for Cisco. He did not work for the public. His loyalty should have been with protecting the interests of Cisco. With that said I think that the interest of Cisco would be served best by protecting its customers. That includes pushing for a fix to this.

    With any large company the bureaucracy tends to slow down progress on everything. This isn't to say that fixing the problem wasn't a priority at Cisco. I honestly couldn't tell you. I also don't know exactly what is involved in fixing the problem and testing the fix so that other problems don't pop up. Microsoft has, in several cases, released a fix quickly only to find out that it causes more problems than it repaired. Then they are stuck in the embarrassing situation of having to fix the fix. People have a fit when this occurs but if someone were to take a little time they want to complain about that too.

    Did Lynn do his job? Did Lynn protect Cisco and Cisco's customers? I would vote that he did not. I think he betrayed both. That may not have been his intent but I feel that is the case just the same. I think he got frustrated at how things were being handled and elevated the situation by making a Cisco vulnerability public knowledge but did that help out. One glaring problem I see is that his job did not include making strategy decisions for the company. That was someone else's job. I don't see anything in his qualifications to determine that he is the best person to determine how best to handle situations of this type. Lynn may or may not have had valid concerns but I can not imagine an instance where his actions could be justified.

    Cisco may have been taking a long time to fix the problem but they had the time to spend. Now they don't. Now we can only hope that they are close to having a properly tested repair almost ready to deploy.

    Handing over they keys to those that wish to hurt your companies customers is NEVER looking out for their best interests.
  • by njyoder ( 164804 ) on Thursday July 28, 2005 @10:50AM (#13185704) Journal
    I am appalled that this got modded up and I agree with the sentiment of the others criticizing you. It's surprising to see so many people overlook one key fact: this guy obtained his research information from a corporation he signed an NDA with. By revealing that information without permission, he is violating that NDA, which is *illegal*. My guess is that the people criticizing this haven't had a real job (as in one with a big company) in their life.
  • Re:I wonder... (Score:1, Insightful)

    by njyoder ( 164804 ) on Thursday July 28, 2005 @10:56AM (#13185764) Journal
    And you're working on the flawed assumption that the fix will be instantly created, tested and deployed. THere's a certain time frame that leaves all those institutions wide open to exploitation after the method that you're proposing is employed.

    I'm seriously getting sick of idiots like you on Slashdot. First you get your original premise obliterated (the assumption that two different people will discover an exploited VERY close together and that the single other black hat discovering it will use it on just as many institutions as would numerous black hats if it were publically released), now you your second premise (that fixes are instant) has been completely oblitered.

    Please, dear god, just admit that you're wrong already, so people don't keep wasting mod points on you only because they don't know any better.
  • by MECC ( 8478 ) * on Thursday July 28, 2005 @10:57AM (#13185782)

    It must be a *really* bad hole - they might just as well hang a "crack me" sign on their heads. Either that, or they've hired security experts from Microsoft.
  • Re:Why? (Score:3, Insightful)

    by mellon ( 7048 ) * on Thursday July 28, 2005 @11:41AM (#13186221) Homepage
    I don't necessarily disagree with your conclusions, but I do disagree with how you arrived at them. It's not wrong for a person to consider the good of others as well as the good of one's employer when making decisions about how to act. In fact, in many cases it's wrong not to.

    When a company is acting against the public interest in a significant way, it's appropriate to blow the whistle. Placing the entire Internet at risk of a router worm is acting against the public interest.

    Of course, we don't have enough information to know if Cisco was placing the entire internet at risk, or whether they were protecting the Internet by being secretive, and it was Mr. Lynn who increased the risk. So we really don't have enough information to even debate whether what Mr. Lynn did was appropriate or not.

    Maybe someone who was at Black Hat can comment?
  • Re:I wonder... (Score:3, Insightful)

    by badmammajamma ( 171260 ) on Thursday July 28, 2005 @11:50AM (#13186316)
    If it was already known and they've already fixed it then why are you being sued?
  • Re:I wonder... (Score:3, Insightful)

    by mellon ( 7048 ) * on Thursday July 28, 2005 @12:07PM (#13186511) Homepage
    The choice isn't between some malicious people possibly knowing, and the world definitely knowing. It's between some malicious people possibly knowing now, and some malicious people possibly knowing later.

    We've seen this over and over again historically - if there is no disclosure, there is no urgency, so the problem remains unpatched until the worm hits, and then suddenly, after the fox is done raiding the henhouse, steps are taken to close the door.

    I don't know if that is the case here - I really have no information at all about the vulnerability, and TFA doesn't tell us anything substantive. But that's the argument for rapid disclosure. The usual rule is to give the responsible party notice, and wait a while to see if they fix it. If they don't, disclose.

    If that's what happened here, I'd say Mr. Lynn did the right thing. But again, we really don't know, at least based on TFA, whether that's what actually happened.
  • Re:Why? (Score:3, Insightful)

    by HopeOS ( 74340 ) on Thursday July 28, 2005 @12:40PM (#13186900)
    Well, I'm not posting AC, and you are still incorrect. IIS is an independent research firm. They only "work with Cisco" in the sense that Cisco's product was the subject of their research, and Cisco was notified of a flaw in that product. This researcher has no obligation to Cisco. Rather, he apparently feels an obligation to the public interest and has expressed that by leaving IIS and presenting his knowledge directly to the security community.

    -Hope
  • by njyoder ( 164804 ) on Thursday July 28, 2005 @01:03PM (#13187214) Journal
    Uhm, have you ever heard of contract *law*? The only reason that contracts can be enforced is because law exists to enforce them. I would have thought that contract law being law would have been self-evident, but I guess that's not safe to assume on slashdot. See: http://straylight.law.cornell.edu/topics/contracts .html [cornell.edu]

    There is also specific state laws concerning NDAs and trade secrets, see:

    http://www.michbar.org/e-journal/bar_journal/bppja n02.html [michbar.org]
    http://www.nolo.com/article.cfm/ObjectID/2ECF62E6- B334-4E83-9A94FA20A3FAFD38/catID/1FBE2D95-203C-4D3 8-90A2A9A60C6FD618/310/119/ART/ [nolo.com]

    But hey, if want to believe that violating things that exist in the law books isn't illegal, go ahead.

    In any case, I'd question the validity of an NDA which required somebody to keep secret a piece of information contrary to a large public good.

    It's a good thing that you're not a judge nor lawyer then, because you can't violate an NDA just because you think it's not doing the public good. "Hey, I believe that keeping this technique for making super cheap LCD screens is against the public good, I'll just reveal it!"

    For example, if I found out under an NDA that my employer was putting out a product that was killing people, and keeping it quiet, I'd be ethically bound to blow the whistle.

    So Cisco is killing people? What's your point?

    Certainly an NDA that forces you to break the law (such as by concealing knowledge of a crime) would be void.

    What law is the NDA in question forcing the person to violate?

    However, I would feel justified in doing so if I had clear evidence that an employer was committing a crime, or harming people and not doing something about it.

    So do you actually have any reason to believe that Cisco/ISS are comitting a crime, or is that just 100% wild, rampant speculation?
  • by wcdw ( 179126 ) on Thursday July 28, 2005 @01:12PM (#13187345) Homepage
    As you've already been told, Lynn did NOT work for Cisco, nor does ISS work "for / with" them. The mutual effort was a result of Lynn finding the flaw in the first place, and notifying them about it.

    Four months ago.

    However, the more damningly flawed portion of your argument is that 'now Cisco doesn't have time to fix the problem'. <snort>

    Could you please provide proof that this flaw hasn't been actively exploited since even before the time at which Lynn found it?

    It is, needless to say, impossible to prove a negative.
  • But (Score:3, Insightful)

    by geekoid ( 135745 ) <dadinportland&yahoo,com> on Thursday July 28, 2005 @01:52PM (#13187834) Homepage Journal
    you are assuming that the security professional is the first one to discover it.

    For all he know, it's been exploited for weeks.

    Ideally, we could say here is an exploit. In a week I'll release it to the public. Unfortuanatly, he would get sued, and the exploit would go unpatched for a while.

  • Re:Why? (Score:2, Insightful)

    by baerm ( 163918 ) on Thursday July 28, 2005 @01:58PM (#13187907)
    Lynn worked for Cisco. He did not work for the public. His loyalty should have been with protecting the interests of Cisco. With that said I think that the interest of Cisco would be served best by protecting its customers. That includes pushing for a fix to this.

    I thought your post was well reasoned and interesting, but I had a problem with this part. You might want to consider that as a member of a society, particularly a democratic one, where in theory we're all (US citizens for US, but if you believe in a democratic world governance then as a citizen of the world as well) the top level of government. As such you have a responsibility or loyalty to the society you belong (family, friends, neighbors, etc...) before a loyalty to an employer. Exaggerated out, your statement makes the appropriate response when a company has you physically damage people (poison the water or even out right murder) be loyalty to the company first.
  • by JimmytheGeek ( 180805 ) <jamesaffeld@ya h o o .com> on Thursday July 28, 2005 @02:38PM (#13188378) Journal
    I am in favor of full responsible disclosur (give the vendor a deadline and stick to it unless you KNOW they are moving on it)

    Still, most exploits seem to be reverse-engineered from patches. Compare the patch to what came before and you have a serious clue to the problem.

    That's in the public world; I don't claim to have any insight into privately held 0-day exploits. I suppose that a there are some blackhats as clever as the white, with equivalent labs.

  • Re:I wonder... (Score:3, Insightful)

    by monkeydo ( 173558 ) on Thursday July 28, 2005 @02:51PM (#13188523) Homepage
    what's dumb is that they believe that they can threaten people with lawsuits to keep them quiet.

    What's dumb is that people sign NDA's and then reveal what they learn. Even if Lynn didn't have an NDA personally, ISS almost certainly did, and he would have been bound by it. In addition, some of the information may have been based on ISS trade secrets, and since he's no longer an employee, he would have no authority to discuss them. So, in this case, a civil lawsuit is absolutely appropriate.

    If you and I have a contract that you won't disclose X without my permission, and you tell me you are going to disclose X, what should my reaction be?
  • by Audacious ( 611811 ) on Thursday July 28, 2005 @03:34PM (#13188954) Homepage
    (As I posted about a year or two ago...)

    All corporations (I'm talking about large corporations with hundreds or thousands of employees) are like trains, planes, or other large pieces of equipment. They can not stop and/or turn on a dime. (As the saying goes.)

    As in my previous posting on this subject - think of a bus which is going madly down the road at 100mph. Within a mile of where the bus (ie: the company) is is a bridge which has collapsed (ie: the problem). If you start a mile back from the bridge you can easily stop the bus and save everyone (ie: anyone who uses the company's product). If you wait until there is only 1/2 of a mile the bus can still be saved but they might have to slow down a lot faster and they could blow some tires and maybe have an accident. (Thus hurting some of their customers.) Or you could wait until there is only 1/4 of a mile and try to stop the bus. Here, since a bus travelling 100mph travels 100 * (5280ft/60/60) = 146.6666ft per second. It means that the bus has less than 10 seconds to stop. Most porbably, unless the bus driver causes the bus to fall over onto its side - the bus will most likely go over the bridge and kill everyone.

    The same holds true for talking about problems in ANY WAY, SHAPE, or FORM when it comes to computer software or computer hardware. You can't just jump out there and start screaming there is a problem because the bus can't stop that fast to prevent disaster. Nor can you tell a company about a problem, wait a couple of hours, days, or even weeks and get mad because nothing has been done. It takes a while to bring the bus to a stop, pick up on what you have to say, and then to start back up again.

    What's a good rule of thumb? Three to six months minimum depending upon how severe the problem is. If it is just a one or two line coding problem - three months. If it is a major change due to parts of a program having to be either completely re-written or major portions having to be changed - six months. And remember - that is a MINIMUM requirement. Normal length of time to fix? More probably two to three times those minimums. That's because you are not the only person who may have found a problem as well as the fact that they are trying to put in new features that have been requested. The same people work on both things at the same time.

    So people who find problems need to think in months - not weeks, days, hours, minutes, or seconds. Because that is how long it will take to fix a problem. In fact, sometimes something that looks really simple turns out to be a real mess to fix. It all depends upon the way in which some software was originally written. So you can't base how fast the company fixes something by what you may think is a fair amount of time. You just need to be patient while the company does what it can to fix the problem.

    Now, as for the company - it is extremely important for companies to keep everyone up-to-date on any/all progress made to fix a certain problem. This can even be automated somewhat. But it is very important not to try to hide the problem because as anyone knows - that is what gets a company in trouble. Trying to hide things that is.
  • Comment removed (Score:2, Insightful)

    by account_deleted ( 4530225 ) on Thursday July 28, 2005 @05:19PM (#13190035)
    Comment removed based on user account deletion

"A car is just a big purse on wheels." -- Johanna Reynolds

Working...