On 7/05/2014 9:27 PM, Julien Goodwin wrote:
> On 07/05/14 12:31, Trent W. Buck wrote:
>> The *only* reason heartbleed is getting mainstream media attention, is
>> because the researchers invested more effort into registering a catchy
>> domain name and designing a cute logo, than on responsible disclosure.
> 
> Given they're my coworkers I take umbrage to that. The Finnish team who
> (apparently) rediscovered this after it was already disclosed to the
> OpenSSL team by researchers at Google did do some of the publicity, but
> by that point the patch was already ready, the openssl team were simply
> taking time on the release to try and coordinate it.
> 
> I've seen nothing showing anything but responsible disclosure from all
> sides on this issue (others, even others involving Google researchers sure).

I have no problem with how the disclosure was handled.  In fact I think
it was handled very, very well.

There have been reports and denials about the NSA using the bug....
guess we'll never know the answer to that.  But I did hear about one
server/service that somehow manages to keep every single data packet
to/from them -- they analyzed those packets and found evidence of the
exploit in play.  Wish I had the reference, but that makes it more
interesting and scary.  Ordinarily no such traffic capture is available
and the logs themselves don't give any hint of an exploit having been
attempted (success or failure).

Cheers
A.
_______________________________________________
luv-main mailing list
[email protected]
http://lists.luv.asn.au/listinfo/luv-main

Reply via email to