Re: Security information for dollars?

2001-02-04 Thread Paul A Vixie

 From: Peter Jeremy [EMAIL PROTECTED]

 What does the community think of this change in direction?

 Given the importance of BIND to the Internet, I can see the benefits
 in having a closed group to handle security-related issues.  As long
 as the membership is intended to provide a forum where security
 problems can be diagnosed and corrected without premature disclosure,
 it would seem to be a good idea.

That's the plan.

 If the intent is to provide a closed group with access to an `enhanced'
 BIND (and I don't believe it is), then I would be opposed to it.

That's NOT the plan.

 Overall, I have no problems with the creation of a "bind-members" group
 as long as:
 - The 'free' Unices (*BSD, various Linux distributions) are not
   (effectively) prevented from participating by requiring more than
   a nominal membership fee or other impediments.

That's the plan.

 - BIND source code remains freely available (at least for RELEASE and
   maybe BETA versions).

That's the plan.

 - Membership benefits do not include access to enhancements that are
   not publicly available

That's the plan.

 - Security fixes and announcements are made publicly available in a
   timely manner.

That's the plan.  (Same as now: via CERT).

 - The NDA requirements only cover details of bugs prior to their
   public announcement.  Once a fix has been publicly announced,
   members are free to discuss the details of the problem.

That's the plan.



Re: Security information for dollars?

2001-02-03 Thread Lincoln Yeoh

At 07:06 AM 2/2/01 -0600, Shalon Wood wrote:
Cooper [EMAIL PROTECTED] writes:

 Now, could someone explain to me why a select list of individuals should
 get an earlier warning?

I think this is the crux of the matter. Before you can say that this
is a good idea, you first have to show that some people should get
early notice. Quite frankly, I can see a *very* strong argument in
favor of the root servers, CCTLD, c operators getting advance

Sure, but how will they actually get early notice?

Unless ISC _pays_ people who announce security issues to the closed list
exclusively, I don't see how it's really going to work significantly
better. Why announce to the closed list, vs Bugtraq?

So how about:
The listeners pay.
The bug announcers get paid.
ISC gets what's left.

The more bugs the less ISC gets.

One way to cut costs would be to pay using fancy cheques (stating what
exploit it's for) which would be more likely to be framed up than cashed. ;).

Cheerio,
Link.



Re: Security information for dollars?

2001-02-02 Thread Michael Bryan

Ben Greenbaum wrote:

 As I expected, there has been a flood of responses to the news about ISC's
 plan for a bind-members program. Rather than approve each, I have
 summarized many of them here.

Personally, from what I'm seeing in these responses, a lot of people are
jumping to conclusions, and trying to make this a much bigger issue than
it really is.  I get the feeling people saw "members only" and "fee-based",
and immediately assumed -everything- was changing.  But it's not.  Some
key points:

1) Nowhere in the announcement did it say that they intend to close up
any existing mailing lists, nor did it say anything about making the existing
source tarballs no longer available.  All of that is going to stay the same
as it is currently.

2) Nowhere in the announcement did it say that they would not continue to
provide general security announcements and product releases to the community
at large.

3) The "members only" early notification list is already something that is
done on an ad-hoc basis.  ISC developers knew about the bugs when they were
first notified about it.  They worked on fixes for them, and got releases
ready to go.  They also notified key vendors that a security hole existed
and that the updates were on the way.  (The FreeBSD security officer said
they were notified sometime last week, days before the releases were available
and the CERT announcement was made.)  This is just a formalization of that
process.

4) As for the NDAs, I don't think that's a bad idea, given all of the above.
As with all things it's difficult to form a totally valid opinion without all
the facts in evidence, but to me it looks much more like this:  "We will give
you early access to information about pending releases and security announcements
so that you can get your products updated and releases ready for your customers.
In return, we will require you to keep this early information to yourself until
we make our official public announcement."  I know there are different opinions
on the issue of full/immediate disclosure vs. delayed disclosure and giving a
vendor a chance to get fixes ready, and -that- issue will never reach a point
where everybody agrees.  But really, the ISC announcement is just making the
"delayed disclosure to allow fixes to be ready" issue a bit more formalized,
and the NDA allows them to "safely" extend it to cover not just ISC, but the
vendors that depend on ISC for their own products.

5) Fees.  This is probably the most questionable of things, but unless the fees
are sky-high, I don't think it's totally unreasonable.  A more formalized structure,
with extra benefits such as security training and such, virtually requires cash
to be able to run efficiently.  And the fee exception for non-profits is a good
compromise, too.


It really isn't that drastic of a change, people.  Nothing that you currently have
is going to change or go away.  They're just adding a new service and channel of
information for certain classes of entities.  I don't think that's bad at all.  And
frankly, I like the idea of formalizing the process, and letting vendors who use
BIND get product updates and their own security announcements ready to go all at
once, so that when the "big" public announcement is made, patches and such are
fully ready to go.



Re: Security information for dollars?

2001-02-02 Thread C. Cooke

On Wed, 31 Jan 2001, Theo de Raadt wrote:

 What does the community think of this change in direction?

 (Myself, I think it is a terrible idea to charge money for security
 information access, and that closing BIND up like this is also going
 to be harmful)

Ok, just some comments that I haven't seen made anywhere else (If I'm
wrong in this, please accept apologies - I just think they should be
made, and a reasonably diligent search has not found them)

snip included message from Paul Vixie. We've all seen it already

Right. I can see both good and bad interpretations of this, but there are
some key facts that would make life on the internet that bit more
unpleasant for a lot of us.

Good points:

Well, the overall effect of the strategy, leaving ideology outside
the consideration, is to make the process of BIND bugs a lot more like
what happens to regular companies software - report a bug, and make it
public if it's not fixed within a reasonable period. I know this is
roughly the case already, but what is being talked of is a much more
formal way of doing this...
In this, I can't fault the idea. The root servers are *important*,
and a certain amount more effort put into protecting them than any old
server is perfectly valid.

Bad points:

This is more in the way of *results* of the suggestion that I can
see plausible - again, leaving the ideology out of the question.

The scenario described is something like this, I believe:

1) person reports a bug to list member (where person may or
may not be a list member)
2) list members prepare a patch
3) list members repair their servers
4) patch is released to the world, with appropriate information.

Now. Between (2) and (3) (inclusive) , the list members *CANNOT*
distribute any notice whatsoever of the patch existing. Binary patches are
insufficient, and can be compared against existing binaries to provide
tips on where the hole is. Source patches will highlight the problem.
The NDA will mean such hints cannot be dropped.

But the list members will not allow the patch to be distributed
until *all* their servers are safe. This increases the time an exploit is
wild, to the detriment of the entire internet community. The larger the
list, the larger the portion of the net that will be as safe as it would
be under the *current* system. But, the larger the list, the longer it
will take to organise a changeover - and if list members are paying for
subscriptions, they will want those subscriptions to mean patches are not
released without their OK. A longer period when the internet is
susceptible to such widespread cracking is a Bad Thing.

Secondly, as evidenced by a similar thread on Bugtraq currently,
bind can be fingerprinte - and it is current practice to avoid obfuscating
the version number. If people can read the version number of *any* list
member's server, they can see when an upgrade happened. If the rest of the
world doesn't know about that upgrade, then you can be pretty sure there's
a big exploit coming down the wire. And I don't know about you, but if *I*
were presented that information, about *my* servers, I would be getting
highly worried about who might be cracking my box. If I were interested in
cracking other people's boxes, I'd monitor version numbers too - if I
*know* there's an exploit in general, finding it can be easier.

Lastly... legality. IANAL, but does anyone with a little legal
experience know what position somebody contracted to keep a set of servers
for which non-list members have access to secure would be in, signing an
NDA which forbids him/her from patching those servers because other people
might see them?


Anyway, just some thoughts to throw into the discussion. I'm not sure
which way I'd go, given the choice - although I think the proposal could
do with a good few changes. Strictly, it's not my business, since I don't
admin a DNS server right this minute... but for all I know, that could
change within the week.

--
d=(1 0 6 0 1 0 5 5 41 5 3 12 4 5 15 1 4 -2 5 5 0 5 4 24 3 5 27 1 3 -2 1 3 6)
a=0;f(){ c=$a;((v=c+3));((x=${d[${d[$a]}]}- ${d[${d[$a+1]}]}));d[${d[$a]}]=$x;(\
(a=((${d[${d[$a]}]})0)?${d[$a+2]}:$v));case $a in -1)read d[${d[$c]}];a=$v;;-2\
)echo ${d[${d[$c+1]}]};a=$v;;0)exit;;esac;f;};f 2- # Charles Cooke, sysadmin



Re: Security information for dollars?

2001-02-02 Thread Drew Whittle

It would be interesting to see how many of the bugs in BIND have been found
by Whitehats and how many have been found by Blackhats.

Any bug that has been found by a Blackhat should be made public instantly,
because by the time Whitehats find out about the bug, it is already being used.

IMHO, all bugs should be released disclosed ASAP, and waiting for some
vendor to fix their version is just plain wrong.

1. My Company runs Company A's BIND implementation.
2. A bug is found that affects all versions of BIND.
3. BMF notify their members, and give them 2 weeks to fix before the
annoucement.
4. Company A fix their implementation immediately, but can't make an
announcement because of BMF rules.
5. I know nothing about the bug so do nothing.
6. My Company gets hacked using an exploit for the bug.
7. We spend lots of time recovering from the hack.
8. BMF finally give the ok for the announcements.
9. My Company installs the fixed version that was "available" before we got
hacked.
10. In the tradition of the good old USA we start a class action law suit
and sue the pants off of the BMF, Members, and the ISC.

Drew.


One - just ONE - of the features suggested - only suggested - for the
BIND Members Forum (BMF) is that members get advance warning of
security problems. This is not unreasonable given that members are
likely to be folks running root, gTLD and ccTLD name servers or
vendors who have to prepare and ship security patches to their
customers. Or do you think that critical Internet infrastructure
should just take their chances that the script kiddies don't get to
them first? Another membership constituency are the companies who
build products on top of BIND. They need time to incorporate any
security fix too. Many of them were taken by surprise by Monday's
announcement.



Re: Security information for dollars?

2001-02-02 Thread Jeffery L. Vogt

Michael Bryan wrote:

 I get the feeling people saw "members only" and "fee-based",
 and immediately assumed -everything- was changing.  But it's not.

In discussions with my colleagues, the concern isn't that "everything is
changing"... the concern is the "slippery slope".

- Arf, JT
--
   "There are two major products that come out of Berkeley: LSD and
UNIX.  We don't believe this to be a coincidence."
  - Jeremy S. Anderson

Unix, Networking and ISP Consulting [EMAIL PROTECTED]
FurryMUCK (muck.furry.org ): S'A'Alis MSTie# 21756



Re: Security information for dollars?

2001-02-02 Thread Shalon Wood

Cooper [EMAIL PROTECTED] writes:

 Now, could someone explain to me why a select list of individuals should
 get an earlier warning?

I think this is the crux of the matter. Before you can say that this
is a good idea, you first have to show that some people should get
early notice. Quite frankly, I can see a *very* strong argument in
favor of the root servers, CCTLD, c operators getting advance
notice. I can't think of *any* good reason for anyone else to get
it. Sun, HP, IBM -- none of those are critical infrastructure.

So, my question to Paul and company is: Why *should* anyone other than
critical infrastructure get that notice? I'm willing to be convinced;
I just haven't seen an answer to this question yet. And note that
'They bitched and screamed because we didn't notify them this time'
isn't a good enough reason.

Shalon Wood
--



Re: Security information for dollars?

2001-02-02 Thread Kristofer Coward

 1. Inform the BIND developers.

 They will privately handle the issue, create some sort of patch or
 update and then send out a notification so that people know they need to
 upgrade. A day or so later the exploit for the problem can go public and
 everybody's happy. This is probably the way most people on this list
 would like things to be.

 Now, could someone explain to me why a select list of individuals should
 get an earlier warning?
 Where, given the above options (and include more if you think there are
 any), is there a real advantage in having a select few be aware of the
 problem in order to whip out a fix?

I suspect what is going on is that this select group of people is getting
counted among the developers for scenarios like the first ideal you
suggest. Only instead of contributing code (not to say they won't
contribute code) they pay (or are included because they run root
nameservers). I don't expect disclosure would be delayed for any of their
sake, they just get to start packaging (or applying in the case of root
and TLD nameservers) the fixes as soon as they hit the CVS tree instead of
as soon as they hit the mailing lists.
Basically, I think those of us in the rest of the world (i.e. not the ISC
or distributors) aren't going to see any difference apart from our vendors
providing update packages a few hours earlier.

Kris Coward



Re: Security information for dollars?

2001-02-02 Thread Ryan Waldron

On Fri, 2 Feb 2001, Shalon Wood wrote:

 Cooper [EMAIL PROTECTED] writes:

  Now, could someone explain to me why a select list of individuals should
  get an earlier warning?

 I think this is the crux of the matter. Before you can say that this
 is a good idea, you first have to show that some people should get
 early notice. ...

 So, my question to Paul and company is: Why *should* anyone other than
 critical infrastructure get that notice?

It certainly appears to me that the ultimate answer to this might turn
out to be, "Because they are likely to cough up the money for it."

And who, exactly, believes that once these companies *do* cough up
some bucks for whatever fuzzy benefit they might start out getting,
that they won't fight tooth and nail to keep any such benefits from
being given back to non-paying people, no matter how important they
might be?  Or worse yet, to expand the gap between the information
that non-members have vs. paying members.  Competitive advantage is a
VERY big deal to these people, even small ones.  That, after all, not
a big-hearted, humane concern for individual users' well-being, is
what will prompt them to pay-for-play under a system like ISC is
proposing.

Or am I just being cynical?

--
Ryan Waldron|||   http://www.erebor.com|||[EMAIL PROTECTED]

"The web goes ever, ever on, down from the site where it began..."



Re: Security information for dollars?

2001-02-02 Thread Patrick Lamb

Shalon Wood wrote:

 Cooper [EMAIL PROTECTED] writes:

  Now, could someone explain to me why a select list of individuals should
  get an earlier warning?

 I think this is the crux of the matter. Before you can say that this
 is a good idea, you first have to show that some people should get
 early notice. Quite frankly, I can see a *very* strong argument in
 favor of the root servers, CCTLD, c operators getting advance
 notice. I can't think of *any* good reason for anyone else to get
 it. Sun, HP, IBM -- none of those are critical infrastructure.

 So, my question to Paul and company is: Why *should* anyone other than
 critical infrastructure get that notice? I'm willing to be convinced;
 I just haven't seen an answer to this question yet. And note that
 'They bitched and screamed because we didn't notify them this time'
 isn't a good enough reason.

I think this is a start on the slippery slope others have mentioned.
Critical infrastructure to you may be the root servers and ISPs.  OK,
uu.net may be part of the critical infrastructure; how about
mylittle.net?  To somebody else it may include banks and brokers; since
we started on financial institutions, why not include Amazon and Ebay?
How about the DoE national labs with nuclear design information?  And if
you accept those, the key DoD installations that control the weapons are
probably key, but how do you know Fort Knot-on-a-Log, run by E-2's that
have some weird friends, isn't "key?"

(Oh, by the way, my internet access is critical infrastructure, at least
to me.  Your access probably isn't critical. ;)

Sun, HP, IBM that you mention, as well as BSD and some of the Linux
vendors, may test and/or patch the bind they distribute to their
customers, which include many of the "key" players above -- including
ISPs.  If you don't allow these vendors access, the work won't get done
before the news breaks.

And then you get down to the debian maintainers; volunteers.  How do you
know whether I'm a cracker or a maintainer?  You want to deny access to
one, and invite the other to access early patch information.

I think the argument you present boils down to "critical infrastructure
gets advance notice to defend against exploits."  What isn't clear is
(a) that all or most of the critical infrastructure can afford to, or
will, pay for early access; (b) that "money talks" won't overpower
"critical infrastructure"; (c) that, given wide enough access to allow
critical infrastructure to protect itself, enough information to exploit
a newly-discovered hole won't leak anyway; and (d) exactly where in the
spectrum outlined above ISC will draw the line.

It also isn't clear to me that the rest of us will be any better
protected.  What assurance do I have that I'm not left vulnerable for
another week when my vendor is prevented by the NDA from distributing a
patch because some other vendor hasn't finished theirs?

Pat
___
If my company has any ideas, it can tell you.  The above opinions are
all mine.



Re: Security information for dollars?

2001-02-02 Thread Ryan Russell

On Fri, 2 Feb 2001, Shalon Wood wrote:

 So, my question to Paul and company is: Why *should* anyone other than
 critical infrastructure get that notice? I'm willing to be convinced;
 I just haven't seen an answer to this question yet. And note that
 'They bitched and screamed because we didn't notify them this time'
 isn't a good enough reason.


It's awfully convienient to upgrade BIND via an RPM, PKG file, etc..
I'm a big fan of the up2date service w/Redhat and the windowsupdate.
microsoft.com website that lets people who don't know what they are doing
patch themselves.

Of course, lists like Bugtraq have never been about keeping the masses
safe, but rather keeping those who are willing to pay attention and who
can fend for themselves, safe.

I also feel that I should point out that this has been tried before.  A
couple of years ago, Microsoft had identified a bug on their own, and
released an advisory stating that they were only going to release the info
to those who "needed" it.  In that case, it was a professional
organization of remote vulnerability scanner vendors.  I believe Elias
forwarded the exploit to Bugtraq the next day.

Ryan



Re: Security information for dollars?

2001-02-01 Thread Jim Reid

 "Theo" == Theo de Raadt [EMAIL PROTECTED] writes:

Theo What does the community think of this change in direction?

What "change in direction"?

Theo (Myself, I think it is a terrible idea to charge money for
Theo security information access, and that closing BIND up like
Theo this is also going to be harmful)

Please re-read Paul Vixie's announcement. Nobody's suggesting BIND
will get "closed up", apart from a few misguided people who have
jumped to wrong/absurd conclusions without having all the facts at
their disposal. Probably Paul is the only one who has those facts,
though I believe I'm close enough to the action to know most of
them. I speak here only for myself, not my employer (Nominum) or as a
mouthpiece for the ISC or Paul Vixie (which I'm definitely not).

One - just ONE - of the features suggested - only suggested - for the
BIND Members Forum (BMF) is that members get advance warning of
security problems. This is not unreasonable given that members are
likely to be folks running root, gTLD and ccTLD name servers or
vendors who have to prepare and ship security patches to their
customers. Or do you think that critical Internet infrastructure
should just take their chances that the script kiddies don't get to
them first? Another membership constituency are the companies who
build products on top of BIND. They need time to incorporate any
security fix too. Many of them were taken by surprise by Monday's
announcement.

Other benefits that have been suggested for the proposed BMF are:
access to the CVS archives; in-person meetings (presumably to discuss
new features/requirements for the software or perhaps workshops on the
internals or contact with the developers); a mailing list. Where's the
harm in that?

I agree that Paul's announcement of the BNF could have been worded
better. [Hindsight is a wonderful thing.] But people should calm
down. Some of the claims that have been made are just ridiculous: like
BIND would no longer be open source. The BNF is simply a way for the
ISC to broaden its source of funds, get input from people who are
serious BIND users and co-ordinate the future development of
BIND. It's nothing more sinister than that.



Re: Security information for dollars?

2001-02-01 Thread Paul A Vixie

 This won't help anything other than giving the organizations with more
 money/resources an advantage over others. IMHO, if you want to stomp out the
 problem, you need to disseminate it far and wide (along with the solution),
 which will render the hole useless to those that would exploit it.

that's an important viewpoint and i thank you for airing it.

 However, decisions like these may lead to alternatives to BIND (some of
 which may work much better) - - so if they want to run themselves out of
 business, falling victim to people that understand the need for
 full-disclosure.. *shrug*

i am amazed at the continuous supply of dupes who are willing to believe
the kinds of factual errors promulgated by posts like theo's.  he said:

 What does the community think of this change in direction?

it's not a change in direction, as explained separately.

(there is no plan to stop doing what isc has always done, which is work with
cert to propagate security information to the public in responsible ways.
but, isc also needs direct relationships to the vendors involved.  this is it.)



Re: Security information for dollars?

2001-02-01 Thread Ben Greenbaum

As I expected, there has been a flood of responses to the news about ISC's
plan for a bind-members program. Rather than approve each, I have
summarized many of them here. I realize that this is an emotional issue
for many, but please remember that posts consisting of the entire original
message with the addition of "Yeah, this sucks!" or the like will not be
approved, so please don't bother :)

-
From: [EMAIL PROTECTED] (Andrew Church)

 I think it's a good excuse to get back to work on the DNS server
I was working on when I was at university...

 On a more serious note, while I think this is a stupid idea,
I'm not actually sure it will have much effect given the existence of
Bugtraq; ISC can't stop outsiders from releasing advisories and such.
The one thing I could see it doing would be shaking confidence and
trust in BIND and its developers.  Heck, even Microsoft publishes
security reports; if ISC can't, does that mean they maybe have
something to hide?

 Then again, another question is how many interested parties
would be willing to sign the "strong NDA" the message calls for...

---
From: Joshua Fritsch [EMAIL PROTECTED]

[ Blatantly obvious statement follows since it seems some people need a
reminder ]

This won't help anything other than giving the organizations with more
money/resources an advantage over others. IMHO, if you want to stomp out the
problem, you need to disseminate it far and wide (along with the solution),
which will render the hole useless to those that would exploit it.

However, decisions like these may lead to alternatives to BIND (some of
which may work much better) - - so if they want to run themselves out of
business, falling victim to people that understand the need for
full-disclosure.. *shrug*

--
From: Robert van der Meulen [EMAIL PROTECTED]

   1. Not-for-profit members can have their fees waived
This helps distributers of Free software, but closes it off for the rest.
Bad. Independent security consultants/interested parties and developers
whose company doesn't want to/can pay are denied information.

   2. Use of PGP (or possibly S/MIME) will be mandatory
Good. but it's open information, as far as i'm concerned ;)

   3. Members will receive information security training
Only trained members are allowed to talk? The next step might be
(paid) certification for the right to read about your own system's security.

   4. Members will sign strong nondisclosure agreements
_BAD_.
I'm allowed to read (if ofcourse, i'm a member, went trough the exam, did my
rites, and offered my firstborn) about security stuff that implicates me, my
ISP, and the internet in general - but i'm not allowed to share?
If my ISP, or a party i have to semi-trust for security runs buggy software,
i like to be able to tell them.
What happens if one of the members starts an 'underground' fan-out ?
exploits will be in the wild, but cannot be reported, fixed, or acknowledged
publicly - apart from ISC-originating messages, ofcourse.
The members will be bound on hands and feet, and will not be able to speak
about what they learn and know.

   1. Private access to the CVS pool where bind4, bind8 and bind9 live
   2. Reception of early warnings of security or other important flaws
'early warnings' ?? This means that buggy, insecure bind versions can be
running anywhere, and only the 'elite bind-members crew' is allowed to know?
Sick.

 If you are a BIND vendor, root or TLD server operator, or other interested
 party, I urge you to seek management approval for entry into this forum, and
 then either contact, or have a responsible party contact, [EMAIL PROTECTED]
I urge anyone with brains _not_ to participate. It probably won't do any
good, as people will value the knowledge more than the fact that the setup
sucks.
If i was the rebellious type, i would try to get a public fan-out
up-and-running as soon as possible (ofcourse implying nothing here, letting
ISC mess up their own mess will probably work out for the best in the end,
anyways)

---
From: "Larry W. Cashdollar" [EMAIL PROTECTED]

 This means only system crackers and paying parties will be aware of
security issues.  How is this model going to benifit the internet as a
whole and the security community?  I rely on free information from lists
like bugtraq and cert to keep my systems secure.  I now have to pay for
my own security?

--
From: antirez [EMAIL PROTECTED]

Yes, it sounds very terrible. Even worse BIND may be just the start,
(an emblematic one). Anyway all we know that the major part
of the security vulnerabilites are discovered by indipendent
groups or individuals, that will post the new security problems
discovered in publically accessible mailing lists like bugtraq,
so I feel that this can't have a very