2014-04-09 20:51 GMT+02:00 Paul Pearce <pea...@cs.berkeley.edu>:

> > * Should authorities scan for bad OpenSSL versions and force their weight
> > down to 20?
>
> I'd be interested in hearing people's thoughts on how to do such
> scanning ethically (and perhaps legally). I was under the impression
> the only way to do this right now is to actually trigger the bounds
> bug and export some quantity (at least 1 byte) of memory from the
> vulnerable machine.
>

Considering the consequences of having (a lot of) vulnerable machines in
the network, wouldn't it be unethical NOT to do such kind of testing? I
mean, basically every vulnerable relay endangers its users by making it
possible to decrypt their communications. I strongly feel that the benefits
(securing the network) outweigh the costs (exploiting the vulnerable
machines and reading 1 byte of memory, but discarding them). Especially
seeing that anybody would be able to perform the exploit, I don't see moral
problems in such an aproach.

How this works out legally I of course have no idea.
_______________________________________________
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Reply via email to