L0pht Heavy Industries in NY Times Magazine 77
Billy Joe Bob writes "This Sunday's (10/03/99) New York Times Magazine features an article about L0pht Heavy Industries." Not a bad piece for a mainstream pub - good writeup about the personalities involved, how they work, etc. (free NYT reg. required to read.)
Re:Irresponsible? (Score:3)
This approach has a few nice effects: First, it gives L0pht full credit for the hack without immediately giving the script kiddies access to it. Second, it gives vendors a fighting chance to get fixes made. Third, it gives (astute) users of the product fair warning about the coming exploit allowing them to contact (pressure) the vendor.
How about releasing the fix before the hack? (Score:1)
Only answer I can think of is they feel that would push them towards the realm of white-hat, which they don't want to do.
Re:Irresponsible? (Score:1)
they basically make good software, we should help them - not smack them down
L0pht != Nader (Score:1)
Re:Accessing the NYT article (Score:1)
Hmm... I think I will create an account on one of my UNIX boxen, create an NYT account with that, ask to receive all the spam, and set up a forward to send all the spam to a whole bunch of nytimes.com addresses...
Is that Gates quote true? (Score:1)
Re:Is that Gates quote true? (Score:1)
It seems to be true (check yourself in his book) but I hadn't any copy of the book myself.
Don't forget that anybody make stupid errors sometimes...except me of course
Re:Or we all have the same registration :) (Score:1)
Re:How about releasing the fix before the hack? (Score:1)
Re:use Free software (Score:1)
I'm with the AC that said l0pht should post a warning of impending security hole announcement at the same time as notifying the vendor on this.
This isn't a tirade against OSS at all, I agree it is easier to audit - all i'm saying is their are valid reasons to go proprietary.
Re:Irresponsible? (Score:1)
They have every right to do what the want to, however I stand by my initial assertation that the way they go about displaying their knowledge is irresponsible.
I'm fairly sure they'd get more respect from the majority if they did, whether they want this respect or not is another matter entirely.
how does L0pht *afford* this? (Score:3)
Where do they get their financial backing for all of this hardware/service/location? Maybe they get a little advertising money and sell a few shirts, but how about the rest of the money? Does L0pht do paid consulting, or what?
That electicity bill must be through the roof.
Re:how does L0pht *afford* this? (Score:1)
Of course 8-9 people could easily share the costs of this, but it would be superior to have it pay for itself.
Re:One funny sentences (Score:2)
Re:Accessing the NYT article (Score:1)
NYT was (for some reason) the direct subject of the item, and L0pht merely the object.
Tool neutrality (Score:2)
However, an analogy would have served them well. "Yes, our activities can have negative consequences. This is similar to the case of a kitchen knife manufacturer whose products can lead to domestic murder or to excellence in the kitchen. But you don't criminalize such a company for the negative use of its products, nor indeed do you praise it when you enjoy a well-prepared meal. The tool is neutral."
Likewise, a nuclear tipped missile can be used to deflect an Earth-destroying asteroid or to wipe out another country. The tool itself does not determine the morality of the people that use it.
I stopped paying attention when... (Score:1)
Besides, the "BeamCrack" they posted there that supposedly defeats the beam copy protection doesn't since it only works on databases (PDBs) and the real security issue is with beaming copy protected programs (PRCs)...
Not so infantile if it slips under l0pht's radar, is it?
Oh well...there are better security sites, IMHO...but I really, really liked the hippie Palm graphic that l0pht had on theirs...
- JoeShmoe
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
One funny sentences (Score:3)
Buying windows is already asking for being a victim.
Accessing the NYT article (Score:2)
Somebody mirror the article for us, please, so that we can retain our sanity!
Irresponsible? (Score:3)
"We were trained by the vendors to go public," says Mudge, "to give them a black eye."
This was in relation to the coldfusion 'sploit. Not only did it give the vendors a black eye, but also a lot of customers who use coldfusion for whatever reason. They didn't deserve a black eye for it.
Hypothetical:
An ISP provided Coldfusion hosting for many high profile sites, these all got hacked due to this exploit and the ISP's reputation suffered. They went bust. Could happen. (Maybe it did?)
Surely the responsible action would have been to notify Allaire of the exploit and warn them that they were posting it in a week? This would have given Allaire time to fix it and notify their customers. Allaire's reputation suffers a little & only the lazy / stupid customers are damaged.
From comments later in the article it seems they may be heading in this direction. I hope they do.
Or we all have the same registration :) (Score:3)
username - password
test - test
testuser - testuser
test_user - test_user (This one works on the NYT)
test@user.org - test
test@user.org - testuser
cypherpunk - cypherpunk
cyberpunk - cyberpunk
Re:a thought... (Score:1)
Free NYT Registration (Score:1)
Re:Irresponsible? (Score:2)
First, I agree that yes...it is only fair to give a company advance warning. It's pretty much standard for news organizations (newspapers and television, etc) to call a company, drop the bomb on them and then ask for a comment.
L0pht argues that companies just will "sweep it under the rug"...so? BFD? You now get to add "I told you so" to the end of your advisory. Not every company is Microsoft and some would go running to their customers with patch CDs in their hands if they knew about serious bugs.
The real issue...what they aren't saying is that the reason they don't warn companies is because:
A) There is the risk that the company will make it public before they do...either by
1) posting the fix and thus making it look like l0pht is taking credit for something they didn't find or by
2) talking about it with someone who has connections with another security group, who publishes the information first.
and
B) If the resulting fallout is bad enough...there is more attention given to l0pht. Who the hell has heard of lopht besides IT professionals? Ah...but if they get blamed because they were "irresponsible" well, it's more hits to their website. It's like children who want attention...good or bad.
The best thing to do would be to draft a legal agreement and fax it to a company that they find released an insecure product. The draft would basically tell the company they can sign it, giving full credit to l0pht for the discovery of said insecurity and promising to give l0pht exclusing rights to information about how to fix said insecurity...or they can throw it away because they don't believe the hole exists and then take the fallout when it is posted in public.
- JoeShmoe
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Re:Accessing the NYT article (Score:2)
A more important question...how many people do you think type absolute crap whenever they get prompted for this @#$@##@% stupid NYT login crap?
I've read maybe ten articles at NYT that were slashdotted...and every time I typed something like name:asdfda email:fddffasd@fdsaf.com and was greatly amused when NYT asked me to take asdfda1129 because asdfda was already taken.
With all the SlashDot readers probably doing the same thing every time there is a NYT article...think how much mail must bounce from that mailing list and how much crap is in the user database.
I am a big fan of user registeration (points proudly to
Any website that FORCES you to register to even evaluate if you are interested in their goods is going to end up with an awful lot of hateful swear words as user name.
What do you all think? Is there anyone who actually writes all these thousands of worthless logins down in case they clear our their cookie jar?
- JoeShmoe
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Re:Irresponsible? (Score:1)
Thanks (Score:1)
--
Re:Or we all have the same registration :) (Score:2)
I could also say if life was fair then the password for "foo" would always be "bar" and the password for "test" would always be "test" but the sad truth is that most times, the password for "foo" is "chow" and the password for "test" is "account"
You can spend all day trying to find which key on your keyring will work...I'll just punch a new one.
But I like the idea of posting login/pass...note to Rob: put "test_user" "test_user" in the tagline of any article from NYT...
You can call it "an alert to inform NYT that their passsword security has been breached"
Quick! Before l0pht does it! =)
- JoeShmoe
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Re: (Score:2)
Re:Irresponsible? (Score:1)
"So why didn't L0pht contact Allaire, the small Cambridge, Mass., software firm that makes Cold Fusion, before releasing an advisory? The reason, say Weld and the other L0phties, is that vendors usually sweep tips from hackers under the rug. Vendors, claims L0pht, don't want customers to think software has flaws. "We were trained by the vendors to go public," says Mudge, "to give them a black eye."
They realize the damages it might do, but don't try to warn a company because they are a vendor that probably won't listen anyway. That's a policy I don't like. Warn them, give 'm a week or so and only then publish it.
I'd hate to be on the company side of an advisory, especially smaller companies will suffer of even go out of business because of such an attitude.
Hacking is not white or grey anymore when people suffer - customers, employees - because someone found a hole and didn't give them time to fix it.
I think they are doing some very cool stuff though, wouldn't mind having a similarly equipped warehouse. Like the one in 'Sneakers'. Or paying L0pht a visit :)
Jobs and Woz created Blue Box??? (Score:1)
Re:Jobs and Woz created Blue Box??? (Score:2)
If so, I bet Jobs spent six months picking the perfect shade of blue.
--
QDMerge [rmci.net] 0.21!
Re:Accessing the NYT article (Score:1)
--
U.S. Government not too Stupid. (Score:3)
(Ceck out IMDB [imdb.com] if you don't know who Fred Thompson was, although they don't mention that he is now a Senator, go figure)
Anyway, just a quick question. To me, it seems that the Hacker Ethic and Open Source Philosophy end up at the same place. The simple idea that information shared is worth more, intrinsically, than information hidden. Can an *expert* (self-appointed would qualify) show me how the two differ?
Re:Irresponsible? (Score:1)
Just because you assert that it is "wonderfully stupid" and "purely irresponsible" doesn't make it so.
Vendors like Microsoft don't care about security, the care about making money and their corporate image. They will keep shovelling buggy, insecure crap out the door until they discover that there are consequences for their actions.
If publishing an exploit puts a vendor out of business or causes them serious damage, I will be very happy.
Hammurabi's Building Code
229 If a builder build a house for some one, and does not construct it properly, and the house which he built fall in and kill its owner, then that builder shall be put to death.
230. If it kill the son of the owner the son of that builder shall be put to death.
231. If it kill a slave of the owner, then he shall pay slave for slave to the owner of the house.
232. If it ruin goods, he shall make compensation for all that has been ruined, and inasmuch as he did not construct properly this house which he built and it fell, he shall re-erect the house from his own means.
233. If a builder build a house for some one, even though he has not yet completed it; if then the walls seem toppling, the builder must make the walls solid from his own means.
Re:Jobs and Woz created Blue Box??? (Score:1)
Re:Irresponsible? (Score:1)
then they could notify the company, and if the company hadn't done anything after a couple weeks, release the key to the encrypted advisory along with the plaintext advisory. with the right kind of encryption it would prove they did, in fact, find it first..
Re:Pronuciation? (Score:1)
Fred Dalton Thompson (Score:1)
Re:Pronuciation? (Score:1)
See "cypher", "trophy", "graph"...
What happened to the CYPHPERPUNK login/password? (Score:1)
Re:Brief history of Jobs and Woz (Score:1)
[OT]The preview page lies (Score:1)
Aaaah. I see. When you go to the preview, the text in the input box is changed (the html entity is changed into the symbol it stands for) and if you submit from the preview page rather than backing up and then submitting, this is what happens. Let's see what happens when I submit directly. <test>
--
Re:[OT]Confirmed (Score:1)
--
Surprisingly good article (Score:3)
That said, I think that the computing world needs L0pht, and they need the CDC, for that matter. Hacking should be an above-ground activity, and the information returned should be to help others pursue their knowledge of the systems. L0pht goes out and finds information, then they make it free to all. That's the Right Thing. CDC makes tools to exploit the dumb things vendors do - the tools themselves are not good _or_ evil, but the users may be.
The only negative that sometimes comes from the activities of these groups is the legions of script kiddies racing off to put their k00l d00dz signatures on websites before the holes get plugged. But on the other hand, the script kiddies will be therre regardless, and get in eventually, anyways - it's the Infinite Monkeys Theorem come to life.
- -Josh Turiel
Re:Jobs and Woz created Blue Box??? (Score:1)
the blue box, though I don't believe he invented it.
Captain Crunch got his name from a toy whistle
procured from the cereal of the same name, which emitted a perfect 2600-cycle tone that the phone company used to shuttle long distance traffic back in the stone age. It's where alt.2600 came from too....though most of you all probably know all this.
--------------------------
Your Favorite OS Sucks.
^D
Re:Or we all have the same registration :) (Score:1)
Credit where credit is due (Score:1)
Re:Irresponsible? (Score:1)
Re:Tool neutrality (Score:1)
The gun can help people defend themselves and feel more secure, but it is just as likely to be abused by a child or burglar.
That said... on the balance are guns and lOpht equally important in preserving freedom?
I dunno...
Re:Irresponsible? (Score:1)
If publishing an exploit puts a vendor out of business or causes them serious damage, I will be very happy.
I tired, very tired of Slashdot kiddies obsession about Microsoft. There is more to software than Microsoft, and in the case of ColdFusion, it has nothing to do with them.
What you are saying, is that when an exploit will be released for RedHat for instance, you will be very happy if they get out of business.
Because no software in the galaxy, is without bugs, and finding an exploit in any system is just a matter of working hard enough at it.
Hammurabi's Building Code
229 If a builder build a house for some one, and does not construct it properly, and the house which he built fall in and kill its owner, then that builder shall be put to death.
That's ok for building, because house solidity is a big imperative and can be achieved by respecting standards (yes, they do have big books with rules that you must respect).
This miss completly the point of software. With software it is impossible to make a program without bugs. There are no rules, no standard, nothing, that could give you a secure software. Even the most checked code (with millions of dollars of checking), such as Space Shuttle program is evaluated to have about still 10 uncovered bugs.
Re:Irresponsible? (Score:2)
AT&T has done a lot of work in this area. See "Software Reliability Engineering" by John Musa.
The problem is that testing takes time, discipline and money.
Pronuciation? (Score:1)
Re:Or we all have the same registration :) (Score:1)
And not to forget, sknuprehpyc - sknuprehpyc
needless to say, it's backwards.. but it does work on NYT, too.
use Free software (Score:2)
Maybe the hypothetical ISP should have considered this. Most of IBM's internal network runs on free software because security and IGS can sift through the code.
Maybe ISPs are in a competitive enough environment that a bad decision like that is enough to kill one. What do you think?