> > Maybe he is right, maybe not.
... It is on the EvLog home page with an IMPORTANT label next to it. I almost expected him to finish-up with, "bfytw". -- Espi On Wed, Feb 22, 2017 at 10:56 AM, Sean Martin <[email protected]> wrote: > The response from the company spokesperson doesn't reflect well on the > organization. > > The comments are often more enlightening than the article itself: > > ================================================ > Yeah, like I just said. > > https://www.ssllabs.com/ssltest/analyze.html?d=www.eventid.net > > HTTP server signature Microsoft-IIS/6.0 > > Windows Server 2003 on the Internet almost two years after it became > unpatchable because it went EOL. > > But it’s got a SHA256 cert on it so we’re good, right? > > ================================================ > > After further reading, the man himself commented on the article: > > I am the owner of the site that Brian is highlighting in his blog entry. > He sent me an email on Feb 9 asking for details about our security notice. > I was preparing an answer, though RSA had not yet released their article > and I was under NDA with them and I had to think about can be disclosed. > This morning I received another email from Brian: “contact me today or > else” – I was adding more info to my response for his Feb 9 email and I did > a quick check to see if RSA made their whitepaper public (it wasn’t a few > days ago) when I found that Brian went ahead and published this, though I > think it is still “today”. I doubt that any answer would’ve made any > difference. > > We worked with RSA and provided a relevant part of the information in > their Kingslayer whitepaper . I’ve been in contact with the author and > discussed many aspects of the attack and its aftermath. We didn’t make any > “deal” with RSA, they asked us to sign an NDA about their research and > volunteered not to mention the company name though anyone can easily find > it by searching some of the details in their document (and this blog post > is living proof). I was asked to review the whitepaper before being > published and I had no problem with it – what happened, happened. If Brian > did talk to the authors, he didn’t mention that we fully cooperated with > RSA and did all that’s been asked from us (but that would’ve been against > the spirit of this blog post). The notification on the site is what RSA > recommended. We don’t keep a list of EvLog users, anyone can download it. > It is easy for a bank, for a social site, etc. to identify their users. Not > so easy when your software is free to download. How many of us are using > Linux and when is the last direct email that we received about a security > problem with it? > > Other software is mentioned in the blog as “potentially” compromised. It > was not compromised – is there a notification? No. This was an attack > strictly directed at EvLog from what RSA estimated to be a state-sponsored > threat actor. > > Of course we were not perfect in handling this. In hindsight is much > easier to criticize. Should we now start plastering our sites with pop-ups > about EvLog being the victim of an attack in 2015? Brian thinks that unless > you do this, you are trying to “bury” an attack. Maybe he is right, maybe > not. I don’t see any notices on Yahoo’s main page, on Target, on government > sites, etc. RSA itself was breached – can anyone navigate to a security > notice from their main page? Unless you heard about it and Google it you > cannot find any notification. Is there a complain about this? On our site, > the security notice is surely not buried. It is on the EvLog home page with > an IMPORTANT label next to it. We didn’t have to do this. > > Whoever feels like throwing the first stone, good for you, you are a > better company. We are still learning from our mistakes. > > On Wed, Feb 22, 2017 at 9:24 AM, Micheal Espinola Jr < > [email protected]> wrote: > >> Eye openingly scary. >> >> -- >> Espi >> >> >> On Tue, Feb 21, 2017 at 10:37 PM, Kurt Buff <[email protected]> wrote: >> >>> https://krebsonsecurity.com/2017/02/how-to-bury-a-major-brea >>> ch-notification/ >>> >> >> >

