Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    Where Does Truth Lie in Lynn/Cisco Case?

    Written by

    Larry Seltzer
    Published August 1, 2005
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Theres general agreement among security researchers that disclosure of security vulnerabilities is a good thing. There isnt, however, agreement in the industry as to what full disclosure is and what the best practices are.

      Some say that immediate and complete disclosure of all details, including exploit code, is the best thing. I hope most people recognize that this would be an insane path to tread. Instead, vendors generally subscribe to an even more ambiguously named standard, responsible disclosure. Fuzzily put, this means that researchers disclose their findings to the vendor/author of the product and give them a chance to investigate and fix problems and distribute the fixes before disclosing the vulnerability.

      But these arent the only valid concerns for a researcher, as was illustrated in the recent case of now-former Internet Security Systems researcher Michael Lynn in his Black Hat presentation last week, during which he discussed his ISS-funded research into flaws in Ciscos Internetwork Operating System. Contracts and confidentiality are important too, and all indications are that Lynn blew off his companys obligations. This was not his job to do, and whoever hires him next should know they cant trust him with confidential materials. If youve seen the presentation (Ciscos trying its best to clean it up, but its easily available) youll notice that he quit his job first, but then he went on to give a presentation with slides that had ISS copyright notices all over them. Is this purely legalism? I dont think so.

      I got the presentation off the Full-Disclosure list, where the person who sent it declared the old and trite motto “information wants to be free.” First, lets do away with the flowery metaphors: Information wants nothing. People want information to be free. Of course they do, especially if its valuable information. I want gasoline to be free too, but its harder to steal than information, so my cliches go unspoken.

      Second, theres a difference between binding people to confidentiality agreements and censorship, and its somewhere near the difference between civil and criminal liability. If the government had ordered Black Hat and ISS and Lynn not to disclose the information, that would be censorship. There was some noise during all this about the FBI investigating Lynn; were he to be criminally prosecuted for disclosing this information that would be censorship. (Although consider the contemporaneous issue of the investigation of the leak of Valerie Plames name and status at the CIA; didnt that information “want to be free”?)

      /zimages/1/28571.gifLynn defends his decision to reveal details of the IOS flaw. Click here to read more.

      Was there an attempt at responsible disclosure in the Lynn/Cisco case? Its hard to say, since there seems to be some obfuscation going on. I dont think Cisco is disclosing everything yet, even if, as we reported, they are disclosing a lot more than they had been. Cisco now discloses a vulnerability in IPv6 processing that could completely compromise a router. They list vulnerable and not vulnerable versions of their products.

      As I understand the issue that Lynn discussed in his presentation, the real problem is not this specific vulnerability, which his presentation never actually refers to, but the fact that once you find such a vulnerability you can create a shell internally and execute what you want through it.

      Lynn makes clear that conventional avenues of exploitation, like stack and heap overflows, are hard because Cisco is aware of them and goes to great lengths to avoid them. But its impossible to completely avoid them. Lynn is also clear that you can mitigate the problem by staying up to date on your IOS versions. This isnt because they fix the problem, just that newer versions make it harder to find and use known attack vectors, such as the IPv6 problem. Ciscos advisories dont really talk about the shell code problem, and they dont indicate that the “fixed” versions address it either.

      So its hard to say whether either Cisco or Lynn violated responsible disclosure. The real issue is how long it has been since Cisco and Lynn understood the full import of the issue and whether they know if there has been any actual exploitation out there. We on the outside dont really know enough to judge this aspect of the situation until someone publishes a timeline.

      Its also important to note that I dont actually know if any of Lynns claims are true. That Cisco is not directly denying them doesnt make them completely true, but it indicates that theres something to them and Cisco doesnt want to talk about it.

      You may have noticed that Im talking about the same vulnerabilities I criticized Lynn for disclosing. This is part of that same distinction between censorship and confidentiality. I have no confidentiality agreement with Cisco, and the information is out there. Its possible to talk about it responsibly or otherwise. Its also responsible to ask if Cisco, after all that has happened, is serving their customers best interests at this point. If IOS has an architectural flaw that is not easily fixed, as many researchers now speculate, what can Cisco do to protect their customers?

      Asking if Cisco is holding back on information, restricting myself to what I actually know and qualifying statements where necessary is, I hope, responsible and honest. Avoiding it would be like pretending Valerie Plame isnt really in the CIA.

      Security Center Editor Larry Seltzer has worked in and written about the computer industry since 1983.

      /zimages/1/28571.gifCheck out eWEEK.coms for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEK.com Security Center Editor Larry Seltzers Weblog.

      More from Larry Seltzer

      Larry Seltzer
      Larry Seltzer
      Larry Seltzer has been writing software for and English about computers ever since—,much to his own amazement— He was one of the authors of NPL and NPL-R, fourth-generation languages for microcomputers by the now-defunct DeskTop Software Corporation. (Larry is sad to find absolutely no hits on any of these +products on Google.) His work at Desktop Software included programming the UCSD p-System, a virtual machine-based operating system with portable binaries that pre-dated Java by more than 10 years.For several years, he wrote corporate software for Mathematica Policy Research (they're still in business!) and Chase Econometrics (not so lucky) before being forcibly thrown into the consulting market. He bummed around the Philadelphia consulting and contract-programming scenes for a year or two before taking a job at NSTL (National Software Testing Labs) developing product tests and managing contract testing for the computer industry, governments and publication.In 1991 Larry moved to Massachusetts to become Technical Director of PC Week Labs (now eWeek Labs). He moved within Ziff Davis to New York in 1994 to run testing at Windows Sources. In 1995, he became Technical Director for Internet product testing at PC Magazine and stayed there till 1998.Since then, he has been writing for numerous other publications, including Fortune Small Business, Windows 2000 Magazine (now Windows and .NET Magazine), ZDNet and Sam Whitmore's Media Survey.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×