[17650] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Xato Advisory: Multiple Cart32 Vulnerabilities

daemon@ATHENA.MIT.EDU (Colin Hart)
Tue Nov 14 11:20:47 2000

Mime-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
Message-Id:  <006b01c04e4c$10e68e00$0501020a@morpheus.theunderworld.com>
Date:         Tue, 14 Nov 2000 15:03:36 -0000
Reply-To: Colin Hart <info@COLINHART.COM>
From: Colin Hart <info@COLINHART.COM>
To: BUGTRAQ@SECURITYFOCUS.COM

<snip>On November 6, 2000 Colin Hart and Cart32 issued a joint advisory (BID
>195) addressing the issue of the weak encryption.  They also stated
>that they will not be releasing the actual algorithm.  Because we do
>not agree with the concept of security through obscurity, we have put
>together this snippet of VBScript code to demonstrate how a password
>can be unencrypted: <snip>

You managed to make the point about "security through obscurity" more
effectively than you are aware!! In my conversations with Cart32 I respected
their wishes to withhold the algorithm but pointed out to them that it was
only a matter of time before someone else posted it, which proved correct,
but also confirms your point that security through obscurity is a
non-starter. My personal opinion is that vendors need to decide whether they
want to manage a problem by communicating in full with their customers and
the security community or by hoping it will go away and letting the
information proliferate in a non-managed way on IRC, etc. The
"full-disclosure" v "non-disclosure" and every shade in between has been
discussed at length here but I'm sure the debate will roll on.

My $0.02

Cheers

Colin Hart
info@colinhart.com

home help back first fref pref prev next nref lref last post