Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 18 May 1996 09:00:44 +1000
From:      Danny Smith <danny@auscert.org.au>
To:        invalid opcode <coredump@nervosa.com>
Cc:        Vladimir Jojic <vjojic@eunet.yu>, freebsd-security@freebsd.org
Subject:   Re: very bad 
Message-ID:  <199605172300.JAA15072@amethyst.auscert.org.au>
In-Reply-To: Your message of "Fri, 17 May 1996 09:52:26 MST." <Pine.BSF.3.91.960517095034.21586J-100000@onyx.nervosa.com> 

next in thread | previous in thread | raw e-mail | index | archive | help
invalid opcode writes:

> On Fri, 17 May 1996, Danny Smith wrote:
> 
> > Another unfortunate part is that it is approaching midnight in Australia
> > (and it is now past midnight in New Zealand) at the start of the weekend.
> > Posting vulnerbility information like this has not helped any system
> > administrators if they are all home for the weekend.  All it has done
> > is increase the exposure of their systems to attack by more poeple.
> 
> First off, I wouldn't have posted it had it been a secret little bug. But 
> it wasn't, it was already out on 2 mailing lists which probably have 
> close to 10,000 people on them, 50% of which are people who LOOK for 
> these types of bugs so they can login to their accounts running FreeBSD 
> and exploit it. At this point, the more exposure it gets, the more 
> root@vulnerablehost will hear about it and fix it.

Again, the debate of full disclosure arises.  I recognise that by mailing
on this again, I am inflaming the situation.  For the record, I am not
against full disclosure, but it must be done correctly.

Posting full "how to" instructions late on a Friday night is not the
"correct" way to do it.  I accept that the information was available
elsewhere initially.  The problem more lay in the original posting
to the first list, rather than the last.  I am not pointing fingers,
since the information is out now and the community must deal with that.

As suggested by others, once a suitable workaround can be developed,
then simply an acknowledgement of the problem and a supplied workaround
*at the same time* would suffice.  There is so much security information
available that it is difficult to know what is real, what is false,
and what will correctly fix the problem.  Everyone has an opinion.

Posting a notice like "There is a hole in FreeBSD.  Make /bin/sh SUID to
fix the current problem" is obviously false information.  Other subtle
code fixes presented to groups may contain either malicious fixes, or
may introduce further problems.  How is the poor system administrator
supposed to "know" what is correct and what isn't?  (the fix to this
problem obviously solves the problem - what does it break though?)

The other situation of "FreeBSD 2.1.0 is affected - I don't care about
anything else" is really just a selfish attitude.  How many other 
releases are affected?  What about other versions of BSD?  Are there
any other related programs?  Is it better to fix the code, workaround
the problem, disable the service?  What will I break?  These questions
really need answers before alerting the wider community with full
"how to" instructions.

It is unfortunate that there are system administators that are not as
talented as many of the readers on this list.  They need explicit
instructions for closing holes, and for binary-only operating systems,
these must often come from the vendor.  Many people choose to use FreeBSD
and similar simply because you get the source code.  So long as you
are able to use the source code, then you are way ahead of the rest.
Most are not in this enviable position though.

Enough of my wasting your time.  Again, I apologise for inflaming the
situation.  If anyone wants to continue this discussion off-line from
the mailing list, then I am happy to have a "sensible, mature"
discussion of some of the issues.

Danny Smith.

==========================================================================
 Danny Smith                      |  Fax:    +61 7 3365 4477
 AUSCERT                          |  Phone:  +61 7 3365 4417
 c/- Prentice Centre              |  (answered during business hours)
 The University of Queensland     |  (on call after hours for emergencies)
 Qld.  4072.  Australia           |  Internet:  auscert@auscert.org.au

Standard Disclaimer:  My opinions do not necessarily reflect the policy
                      of AUSCERT or The University of Queensland.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199605172300.JAA15072>