Neal Pollack wrote:
>
> This case, and all the following discussion, brings up a very good
> question;
>
> When an ARC case is filed for what seems like potentially controversial
> software (software that may carry competitive, legal, product strategy,
> or customer perception/relations kind of issues), is it the domain
> of ARC, Marketing, Legal, or Solaris PMT to determine what gets
> accepted and not?  In other words, is ARC really the proper body
> to decide the above type issues, or is it simply appropriate for
> ARC to derail, and suggest returning to ARC after a decision is
> rendered by the Solaris Portfolio Mgmt Team?

ARC can't decide these business issues, but it is incumbent on a member 
when significantly controversial issues are noticed, to point these out 
and ask for review by the appropriate body.  (In this case Sun legal, 
for example.)

I have architectural concerns about what it is we're providing here as 
well, which probably mirror some of the same "legal" considerations.  I 
don't understand the architectural vision for integrating a piece of 
software that is essentially a tool designed as way to launch hostile 
attacks on network infrastructure.

    - Garrett

>
> Neal
>
>
>
> Garrett D'Amore wrote:
>> Darren Reed wrote:
>>> On 11/25/09 10:45, Garrett D'Amore wrote:
>>>> ...
>>>>
>>>> This is totally different from nmap, btw.  IIUC, nmap does scans to 
>>>> passively identify potential weaknesses.  I don't think it actually 
>>>> has any *exploits* for them.  (Put another way, I don't think 
>>>> "nmap" used solely by itself can do serious harm.  I think yersinia 
>>>> is quite different.  I think their choice of name is suitably 
>>>> apropos -- naming after the black plague.)
>>>>
>>>> I feel strongly enough about this that I'm going to derail.
>>>
>>> Let me summarise the differences that I see:
>>>
>>> * I can use nmap from my workstation at Sun to remotely probe and 
>>> test a host connected to the Internet anywhere in the world for 
>>> services that it provides and might be vulnerable, all the while 
>>> looking like it is Sun doing that;
>>>
>>> * I can use yersinia to at most disrupt traffic on SWAN but more 
>>> likely this would be restricted to the LAN segment I'm on at Sun.
>>>
>>> Whilst the primary raison d'etre for both might be different, so too 
>>> is the scope of their aid to someone undertaking nefarious activity.
>>>
>>> yersnia isn't going to help you break into a remote host but it 
>>> might help you become the man in the middle when you others wouldn't 
>>> have. Even then it only threatens unencrypted traffic or encrypted 
>>> traffic without peer authentication. It also a possible threat when 
>>> the trust relationship between two hosts does not involve cryptography.
>>>
>>> I think that derailing this case is an over-reaction primarily 
>>> because it has been seen as an "attack" tool without properly 
>>> considering what the scope of its potential targets is.
>>
>> Are you saying that the attacks that yersinia provides can't take 
>> down router infrastructure?
>>
>> To me it sure looks like they can.   While its likely that these 
>> attacks will be confined to just your enterprise (be it Sun, or 
>> elsewhere on your corporate network), it still seems like they have 
>> an active component that nmap lacks.
>>
>> Picture an attach launched on a lan segment against a large corporate 
>> router which just happens to have an interface on your segment.  If 
>> this brings down critical router infrastructure for a trading house, 
>> the cost can amount to millions of dollars.  While clearly the 
>> (ab)user of the tool should bear the bulk of the blame and 
>> responsibility, I'm not comfortable with the idea that our actions 
>> here might have been overly facilitating for that user.
>>
>> I actually think the fact that other distros have included this in 
>> there Linux bits was a poor choice as well.   This is an area where I 
>> believe that other considerations probably trump "familiarity".  
>> (Further, I'd sincerely hope that anyone using this kind of tool for 
>> non-nefarious purposes would know enough to understand how to 
>> download and install it from source!)
>>
>> For the record, I'm not entirely convinced that including nmap was a 
>> good idea either, but at least its probes are non-destructive in nature.
>>
>> I stand by my decision; this case is derailed.
>>
>> The project team now has three options:
>>
>>    a) present a full case to the ARC and get a vote on it
>>    b) withdraw the case.
>>    c) seek an appeal on the derailment.  Although, I suspect that 
>> since we have no established process for this, it would probably take 
>> more effort than just going with option "a".
>>
>>    - Garrett
>>
>

Reply via email to