On The Internet, There Are No Secrets

One thing is true about the security research community, it is populated by people that don't like to be told what to do or how to act. Halvar Flake thought the way the DNS disclosure was handled was OK, but didn't think the discussion blackout would be useful. So setting off as a DNS novice, he spent a few hours figuring <a href="http://addxorrol.blogspot.com/2008/07/on-dans-request-for-no-speculation.html" target="blank">out the problem</a>. He got pretty close, too. So then Matasano Security

Mike Fratto, Former Network Computing Editor

July 22, 2008

3 Min Read

One thing is true about the security research community, it is populated by people that don't like to be told what to do or how to act. Halvar Flake thought the way the DNS disclosure was handled was OK, but didn't think the discussion blackout would be useful. So setting off as a DNS novice, he spent a few hours figuring out the problem. He got pretty close, too. So then Matasano Security disclosed and then pulled the details. By then it was too late.There has been this creeping silence in movement in responsible disclosure to keep information from the folks who need it. I have never been a fan of responsible disclosure, but I understand the arguments. Notify vendors about problems and allow them time to fix it, then when the patch is released, publish the details. The hope is that vendors will patch problems in a reasonable time frame and that IT administrators will patch. If they want, they also can review the technical details and maybe even develop a check.

That's all well and good, but Dan Kaminsky's recent advisory took the unusual step in that 1) the details weren't released at the time of the advisory/patch and 2) he asked others to keep the details quiet if they figured it out. The question is why? The stated reason is to give organizations the time to patch their DNS servers before the bad guys figured out the exploit. Well, that's just wishful thinking.

If you want to keep a secret, don't tell anyone. If you do tell someone a secret, chances are, they will tell someone else. Your secret is gone. It's amazing that Kaminsky and the vendors working on the patch were able to keep the secret for the 8 months they were coordinating the patch. But once the news is out, it's only a matter of time before the bad guys figure out what the problem is and how to exploit it. For that matter, once a patch is released, reverse engineering the patch to find the vulnerability is like leaving a trail of bread crumbs for anyone skilled enough to follow. There are even investigations by researchers at Carnegie Mellon, UC Berkeley, and University of Pittsburgh into automating the process.

Kaminsky violated rule #1 in security: obscurity doesn't work. Ever. In fact, the way this whole thing was managed, Kaminsky was practically begging for someone to come along and break the details. Does anyone think the bad guys were not working on this very problem the moment they saw the announcement and ensuing speculation? Or that they couldn't figure it out in a short time? Of course not.

I think the 30-day suppression period, time to fill Kaminsky's session at Black Hat in Vegas, hurt more than it helped. The backlash and speculation wasn't stemmed. The details still came out early. And really, if you hadn't patched your DNS by now, is this going to motivate you? Probably not. But next time, just come clean with the details when the advisory and patch is announced, lest you be outted by your peers.

One last thing. The details are being pulled from sites that have it posted. You can find the details on Slashdot. Or you can e-mail me and I will send it to you.

Read more about:

20082008

About the Author(s)

Mike Fratto

Former Network Computing Editor

Mike Fratto is a principal analyst at Current Analysis, covering the Enterprise Networking and Data Center Technology markets. Prior to that, Mike was with UBM Tech for 15 years, and served as editor of Network Computing. He was also lead analyst for InformationWeek Analytics and executive editor for Secure Enterprise. He has spoken at several conferences including Interop, MISTI, the Internet Security Conference, as well as to local groups. He served as the chair for Interop's datacenter and storage tracks. He also teaches a network security graduate course at Syracuse University. Prior to Network Computing, Mike was an independent consultant.

Never Miss a Beat: Get a snapshot of the issues affecting the IT industry straight to your inbox.

You May Also Like


More Insights