<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: Now It&#8217;s Over (For Now)</title>
	<atom:link href="http://spiresecurity.com/?feed=rss2&#038;p=385" rel="self" type="application/rss+xml" />
	<link>http://spiresecurity.com/?p=385</link>
	<description>Risk and Cybersecurity Analysis</description>
	<lastBuildDate>Wed, 21 Aug 2013 23:28:51 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.5.1</generator>
	<item>
		<title>By: Pete</title>
		<link>http://spiresecurity.com/?p=385&#038;cpage=1#comment-586</link>
		<dc:creator>Pete</dc:creator>
		<pubDate>Thu, 07 Sep 2006 15:11:20 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=385#comment-586</guid>
		<description><![CDATA[@Thomas -

- You have the opportunity to try to manipulate your readers however you see fit.

- Software developers and users (the people whose opinions bugfinders completely ignore) didn&#039;t care about buffer overflows for seven years, and what did it get them? Nothing (in a good way). You&#039;re vulnerable now in lots of ways you don&#039;t know. You&#039;re really going to have to accept it because there is nothing anyone is doing to protect against this REAL vulnerability except distract potential victims. Go to McDonald&#039;s every day - food there is really tasty.

- I am confident that Sendmail would be &quot;secure enough&quot; to users regardless of what was discovered and disclosed. Since we can&#039;t change the past, we&#039;ll never know. Regardless, for every SendMail out there, there are 10 other applications with vulnerabilities.

- Glad to see you can protect against one type of attack. If you want to keep track of sprintf() vulns, you go for it. If I can get the same result with another vuln, it doesn&#039;t matter.


]]></description>
		<content:encoded><![CDATA[<p>@Thomas -</p>
<p>- You have the opportunity to try to manipulate your readers however you see fit.</p>
<p>- Software developers and users (the people whose opinions bugfinders completely ignore) didn&#8217;t care about buffer overflows for seven years, and what did it get them? Nothing (in a good way). You&#8217;re vulnerable now in lots of ways you don&#8217;t know. You&#8217;re really going to have to accept it because there is nothing anyone is doing to protect against this REAL vulnerability except distract potential victims. Go to McDonald&#8217;s every day &#8211; food there is really tasty.</p>
<p>- I am confident that Sendmail would be &#8220;secure enough&#8221; to users regardless of what was discovered and disclosed. Since we can&#8217;t change the past, we&#8217;ll never know. Regardless, for every SendMail out there, there are 10 other applications with vulnerabilities.</p>
<p>- Glad to see you can protect against one type of attack. If you want to keep track of sprintf() vulns, you go for it. If I can get the same result with another vuln, it doesn&#8217;t matter.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Pete</title>
		<link>http://spiresecurity.com/?p=385&#038;cpage=1#comment-585</link>
		<dc:creator>Pete</dc:creator>
		<pubDate>Thu, 07 Sep 2006 14:57:05 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=385#comment-585</guid>
		<description><![CDATA[@Robert - I think of bugfinders as arrogant Don Quixotes - they think they are doing the right thing and have decided to force it on us. (That&#039;s one of the strange things about online risk - we&#039;re all connected).

re: Disclosure - simply a smokescreen and completely out of the control of any individual (who is always the victim of the attack). To the extent people can control it, no disclosure is better. Even better is to not bother looking for another buffer overflow and (to answer your question) come up with techniques to stop all of them, regardless of whether we know about them or not.
]]></description>
		<content:encoded><![CDATA[<p>@Robert &#8211; I think of bugfinders as arrogant Don Quixotes &#8211; they think they are doing the right thing and have decided to force it on us. (That&#8217;s one of the strange things about online risk &#8211; we&#8217;re all connected).</p>
<p>re: Disclosure &#8211; simply a smokescreen and completely out of the control of any individual (who is always the victim of the attack). To the extent people can control it, no disclosure is better. Even better is to not bother looking for another buffer overflow and (to answer your question) come up with techniques to stop all of them, regardless of whether we know about them or not.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Robert E. Lee</title>
		<link>http://spiresecurity.com/?p=385&#038;cpage=1#comment-584</link>
		<dc:creator>Robert E. Lee</dc:creator>
		<pubDate>Thu, 07 Sep 2006 07:49:58 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=385#comment-584</guid>
		<description><![CDATA[Some more opinions on the subject of full-disclosure vs responsible disclosure are available here - http://www.securityfocus.com/columnists/415/1

@Pete - Do you have the same disdain for so-called responsible disclosure as you do for full and immediate disclosure?

If I understand your position correctly, you would rather the industry focus on preventative solutions rather than looking for or tracking vulnerabilities at all.

Robert
]]></description>
		<content:encoded><![CDATA[<p>Some more opinions on the subject of full-disclosure vs responsible disclosure are available here &#8211; <a href="http://www.securityfocus.com/columnists/415/1" rel="nofollow">http://www.securityfocus.com/columnists/415/1</a></p>
<p>@Pete &#8211; Do you have the same disdain for so-called responsible disclosure as you do for full and immediate disclosure?</p>
<p>If I understand your position correctly, you would rather the industry focus on preventative solutions rather than looking for or tracking vulnerabilities at all.</p>
<p>Robert</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Thomas H. Ptacek</title>
		<link>http://spiresecurity.com/?p=385&#038;cpage=1#comment-583</link>
		<dc:creator>Thomas H. Ptacek</dc:creator>
		<pubDate>Wed, 06 Sep 2006 18:47:00 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=385#comment-583</guid>
		<description><![CDATA[You&#039;re grossly misrepresenting my comments and making points you don&#039;t even agree with (you&#039;re contradicting yourself) in order to get attention. That&#039;s fine, I do it too, but I&#039;m not going to penalize my readers with it. =)

As for point (8): we &quot;knew about&quot; buffer overflows for over 7 years, but until individual buffer overflows began to be disclosed, virtually every piece of network software deployed on the Internet was vulnerable. That, also, is not a &quot;suggestion&quot;; it&#039;s a fact, which you can verify in a bug database.

The fact that there isn&#039;t a continuing stream of buffer overflow in (for example) Sendmail is another fact. It&#039;s a direct result of discovery and disclosure (Sendmail vulnerabilities fixed after 3rd party disclosure outnumber those fixed internally).

We will never run out of vulnerabilities. But we WILL, for example, run out of stack overflows triggered by insecure usage of sprintf(). You are conflating those two facts in your syllogism about why &quot;bugfinding&quot; is pointless.


]]></description>
		<content:encoded><![CDATA[<p>You&#8217;re grossly misrepresenting my comments and making points you don&#8217;t even agree with (you&#8217;re contradicting yourself) in order to get attention. That&#8217;s fine, I do it too, but I&#8217;m not going to penalize my readers with it. =)</p>
<p>As for point (8): we &#8220;knew about&#8221; buffer overflows for over 7 years, but until individual buffer overflows began to be disclosed, virtually every piece of network software deployed on the Internet was vulnerable. That, also, is not a &#8220;suggestion&#8221;; it&#8217;s a fact, which you can verify in a bug database.</p>
<p>The fact that there isn&#8217;t a continuing stream of buffer overflow in (for example) Sendmail is another fact. It&#8217;s a direct result of discovery and disclosure (Sendmail vulnerabilities fixed after 3rd party disclosure outnumber those fixed internally).</p>
<p>We will never run out of vulnerabilities. But we WILL, for example, run out of stack overflows triggered by insecure usage of sprintf(). You are conflating those two facts in your syllogism about why &#8220;bugfinding&#8221; is pointless.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Pete</title>
		<link>http://spiresecurity.com/?p=385&#038;cpage=1#comment-582</link>
		<dc:creator>Pete</dc:creator>
		<pubDate>Wed, 06 Sep 2006 18:39:21 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=385#comment-582</guid>
		<description><![CDATA[@Thomas -

Regarding (8), I don&#039;t have any evidence to the contrary so I definitely don&#039;t dispute that point. However, maybe I missed your reasoning for using it in response to my question. I assumed you were saying that people were being compromised left and right yet nobody knew about it. If that is a bogus assumption, my mistake. In that case, if you are suggesting that for a 7 year period there weren&#039;t any attacks going on, then I would be a very happy camper with that situation. Are you suggesting that 7 years without attacks is a bad thing or they really happened and nobody noticed?

Regarding my deceptiveness - I am happy to clarify any point I made above. I agree it is brief, but I am willing to explain myself if it would make things clearer. I am still looking for any evidence other than opinions that vulnerability research is a good idea and the benefits derived could not have come without it.

Regarding your &quot;not linking&quot; and my trolling of my own site... come again?

Just to clarify, I didn&#039;t bring up this issue again, Rich Mogull did. I am happy to respond anytime it is brought up just to ensure that the other side of the argument is heard (it is lonely over here, yes indeed).
]]></description>
		<content:encoded><![CDATA[<p>@Thomas -</p>
<p>Regarding (8), I don&#8217;t have any evidence to the contrary so I definitely don&#8217;t dispute that point. However, maybe I missed your reasoning for using it in response to my question. I assumed you were saying that people were being compromised left and right yet nobody knew about it. If that is a bogus assumption, my mistake. In that case, if you are suggesting that for a 7 year period there weren&#8217;t any attacks going on, then I would be a very happy camper with that situation. Are you suggesting that 7 years without attacks is a bad thing or they really happened and nobody noticed?</p>
<p>Regarding my deceptiveness &#8211; I am happy to clarify any point I made above. I agree it is brief, but I am willing to explain myself if it would make things clearer. I am still looking for any evidence other than opinions that vulnerability research is a good idea and the benefits derived could not have come without it.</p>
<p>Regarding your &#8220;not linking&#8221; and my trolling of my own site&#8230; come again?</p>
<p>Just to clarify, I didn&#8217;t bring up this issue again, Rich Mogull did. I am happy to respond anytime it is brought up just to ensure that the other side of the argument is heard (it is lonely over here, yes indeed).</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Thomas H. Ptacek</title>
		<link>http://spiresecurity.com/?p=385&#038;cpage=1#comment-581</link>
		<dc:creator>Thomas H. Ptacek</dc:creator>
		<pubDate>Wed, 06 Sep 2006 16:42:07 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=385#comment-581</guid>
		<description><![CDATA[BTW, you can be as deceptive contrarian as you want; I&#039;m not linking to these posts. You&#039;re not arguing. You&#039;re trolling.

]]></description>
		<content:encoded><![CDATA[<p>BTW, you can be as deceptive contrarian as you want; I&#8217;m not linking to these posts. You&#8217;re not arguing. You&#8217;re trolling.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Thomas H. Ptacek</title>
		<link>http://spiresecurity.com/?p=385&#038;cpage=1#comment-580</link>
		<dc:creator>Thomas H. Ptacek</dc:creator>
		<pubDate>Wed, 06 Sep 2006 16:40:47 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=385#comment-580</guid>
		<description><![CDATA[Regarding (8), I&#039;m not &quot;suggesting&quot; anything. I said, &quot;Because from 1988 to 1995 there wasn&#039;t a single buffer overflow advisory, despite the fact that the Morris worm exploited one.&quot; That&#039;s fact. Can you to refute?


]]></description>
		<content:encoded><![CDATA[<p>Regarding (8), I&#8217;m not &#8220;suggesting&#8221; anything. I said, &#8220;Because from 1988 to 1995 there wasn&#8217;t a single buffer overflow advisory, despite the fact that the Morris worm exploited one.&#8221; That&#8217;s fact. Can you to refute?</p>
]]></content:encoded>
	</item>
</channel>
</rss>
