[15602] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Is finding security holes a good idea?

daemon@ATHENA.MIT.EDU (Eric Rescorla)
Sun Jun 13 18:53:31 2004

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
To: lists@notatla.org.uk
Cc: cryptography@metzdowd.com
Reply-To: EKR <ekr@rtfm.com>
From: Eric Rescorla <ekr@rtfm.com>
Date: Fri, 11 Jun 2004 15:15:17 -0700
In-Reply-To: <20040611211315.D0D1D8559@notatla.org.uk> (lists@notatla.org.uk's
 message of "Fri, 11 Jun 2004 22:13:15 +0100 (BST)")

lists@notatla.org.uk writes:

> From: Eric Rescorla <ekr@rtfm.com>
>
>>    Is finding security holes a good idea?
>  
>>Paper:    http://www.dtc.umn.edu/weis2004/rescorla.pdf
>>Slides:   http://www.dtc.umn.edu/weis2004/weis-rescorla.pdf
>
> In section 1 there's a crucial phrase not properly followed up:
>     "significant opportunity cost since these researchers
>      could be doing other security work instead of finding
>      vulnerabilities".
> What "other security work" is being used for comparison ?
>     - finding and fixing non-program flaws (such as in configuration)
>           I do a lot of this - and I'm not about to run out of it.
>           I know that _finding_ the flaws is easy.  Even finding
>           many of them systematically is easy.  Fixing them is
>           often gets stuck on the problem of that's Fred's piece
>           of work and he doesn't feel like doing it.
>     - fixing long-known and neglected bugs (are there many ?)
>     - accelerating patch uptake
>     - technical work on tolerant architectures/languages etc
>     - advocacy work on tolerant architectures/languages etc
>           (Where's Howard Aitken when you need him ?)
>     - forensics
>     - other ?
All of the above? Probably my favorite would be finding mechanical
ways to make programs more secure--e.g. stuff like Stackguard,
etc. As you say, moving to non-C languages would be a really
good start!

> Footnote 1 mentions an indirect effect of vulnerability research.
> Another one would be programmer education - but reporting yet
> another bug of a common type seems to have low value.  People
> do need to be aware that (their!) software can be faulty and in
> roughly what ways.
Good point.

> In 3.4 if proactive WHD is not worth the effort because the bugs
> get discovered anyway when they are widely exploited what does
> this say about finding vulnerabilities through their use in the
> wild ? Is this more costly but better aimed at the bugs that matter ?
> Are there cost-effective ways to do this reactive discovery ?  What
> tools would simplify it ?
Excellent point. There's no real data on this topic but my 
intuition would be that better IDS/anomaly detection would be
a useful tool here. Also, some kind of automated
forensic network recording so that when intrusions are
detected it's easy to backfigure what happened.

-Ekr

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post