Vulnerabilities are not like passwords. Passwords cannot be discovered by experimentation and analysis (well, not if they are good passwords). Passwords provide no risk unless actively disclosed.

Vulnerabilities _do_ constitute an active risk regardless of whether they are disclosed or not, as people looking for them can (and will) find them eventually, and once they have, the details will spread explosively. Exposing them before they are fixed at least gives users the chance to defend themselves before this happens, even if that means closing down systems.

If there is a vulnerability in SL which was not already widely known - and how can one tell? - and which LL knew that they could fix quite shortly, then it would be best to err towards keeping it quiet until it was fixed. If there is not progress on fixing a vulnerability then it needs to be publicised so that people can account for it.

On 26 Dec 2008, at 19:08, Sheet Spotter wrote:

I made a few assumptions that may not be shared by everyone:
1. Vulnerabilities must not be publicly disclosed before they are corrected.

2. Vulnerabilities must be promptly assessed and mitigated by as small a
group as possible (i.e., on a need-to-know basis).
3. Any limited disclosure of vulnerabilities is shortly followed by a
broader, more public disclosure.

I see the disclosure of vulnerabilities as similar to the disclosure of your password. Publicly disclosing or sharing your password before you can change
it is unwise.

Failure to publicly disclose a vulnerability (or your password) is not an example of "security through obscurity"; it's simply prudent to protect that
information.

Vulnerabilities that are under investigation must be kept under wraps.
Keeping them under wraps is not intended to deceive anyone or to deprive anyone of critical information. It is a necessary step until the problem can be resolved, just as maintaining the confidentiality of your password is
necessary.

Limited disclosure of security bulletins is also an important step towards
the public disclosure. It does not replace the public disclosure.

Limited disclosure ensures all products -- not just LL products -- have an
opportunity to address the vulnerability before it's widely known.

Ideally any limited disclosure would only occur once LL was capable of
identifying anyone attempting to use the vulnerability.

If there ever was a truly exceptional case where a vulnerability was so severe that it needed to be publicly disclosed before it was corrected, then
the system should be shut down until the issue was resolved.

I have always taken security and vulnerabilities very seriously. I would love to know about them in advance, but I recognize and accept that it's not appropriate for me to know about them in advance. I *want* to know about
them, I don't *need* to know about them.


Sheet Spotter

-----Original Message-----
From: [email protected]
[mailto:[email protected]] On Behalf Of
[email protected]
Sent: December 26, 2008 11:02 AM
To: Boy Lane
Cc: [email protected]
Subject: Re: [sldev] Viewer security vulnerability disclosure group

[...]

"telling everybody about a security vulnerability before remediation is
available is bad."

So who decides who is "good" or "bad" to receive or
not to receive security
bulletins? [...]

I think the only way to properly handle security issues
detected is to make everybody aware of them. [...]

Merry Xmas!

Boy


_______________________________________________
Policies and (un)subscribe information available here:
http://wiki.secondlife.com/wiki/SLDev
Please read the policies before posting to keep unmoderated posting privileges

_______________________________________________
Policies and (un)subscribe information available here:
http://wiki.secondlife.com/wiki/SLDev
Please read the policies before posting to keep unmoderated posting privileges

Reply via email to