<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: Allow me to Defend Michal Zalewski</title>
	<atom:link href="http://spiresecurity.com/?feed=rss2&#038;p=432" rel="self" type="application/rss+xml" />
	<link>http://spiresecurity.com/?p=432</link>
	<description>Risk and Cybersecurity Analysis</description>
	<lastBuildDate>Wed, 21 Aug 2013 23:28:51 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.5.1</generator>
	<item>
		<title>By: Tim Bilbro</title>
		<link>http://spiresecurity.com/?p=432&#038;cpage=1#comment-715</link>
		<dc:creator>Tim Bilbro</dc:creator>
		<pubDate>Mon, 01 May 2006 18:21:09 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=432#comment-715</guid>
		<description><![CDATA[Zalewski has stated that he is essentially targeting Microsoft for this type of disclosure. These guys refuse to accept any responsibility for the harm they are causing.  What&#039;s more, I am pretty sure that there are more than a handful of people who disagree with this philosophy.
]]></description>
		<content:encoded><![CDATA[<p>Zalewski has stated that he is essentially targeting Microsoft for this type of disclosure. These guys refuse to accept any responsibility for the harm they are causing.  What&#8217;s more, I am pretty sure that there are more than a handful of people who disagree with this philosophy.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tim Bilbro</title>
		<link>http://spiresecurity.com/?p=432&#038;cpage=1#comment-714</link>
		<dc:creator>Tim Bilbro</dc:creator>
		<pubDate>Mon, 01 May 2006 18:20:33 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=432#comment-714</guid>
		<description><![CDATA[Zalewski has stated that he is essentially targeting Microsoft for this type of disclosure. These guys refuse to accept any responsibility for the harm they are causing.  What&#039;s more, I am pretty sure that there are more than a handful of people who disagree with this philosophy.
]]></description>
		<content:encoded><![CDATA[<p>Zalewski has stated that he is essentially targeting Microsoft for this type of disclosure. These guys refuse to accept any responsibility for the harm they are causing.  What&#8217;s more, I am pretty sure that there are more than a handful of people who disagree with this philosophy.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: IA Inside the Beltway</title>
		<link>http://spiresecurity.com/?p=432&#038;cpage=1#comment-716</link>
		<dc:creator>IA Inside the Beltway</dc:creator>
		<pubDate>Mon, 01 May 2006 18:14:56 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=432#comment-716</guid>
		<description><![CDATA[&lt;strong&gt;More on Full Disclosure&lt;/strong&gt;

Zalewski is not ambivalent. His disclosure policy is targeted.
]]></description>
		<content:encoded><![CDATA[<p><strong>More on Full Disclosure</strong></p>
<p>Zalewski is not ambivalent. His disclosure policy is targeted.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Anton Chuvakin</title>
		<link>http://spiresecurity.com/?p=432&#038;cpage=1#comment-713</link>
		<dc:creator>Anton Chuvakin</dc:creator>
		<pubDate>Fri, 28 Apr 2006 19:13:19 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=432#comment-713</guid>
		<description><![CDATA[Good points, especially this one:  &quot; if it inspires a lot of &quot;shock and awe&quot; in you, then you are nowhere near able to protect your environment in a reasonable manner.&quot;
]]></description>
		<content:encoded><![CDATA[<p>Good points, especially this one:  &#8221; if it inspires a lot of &#8220;shock and awe&#8221; in you, then you are nowhere near able to protect your environment in a reasonable manner.&#8221;</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: kurt wismer</title>
		<link>http://spiresecurity.com/?p=432&#038;cpage=1#comment-712</link>
		<dc:creator>kurt wismer</dc:creator>
		<pubDate>Fri, 28 Apr 2006 15:22:51 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=432#comment-712</guid>
		<description><![CDATA[in retrospect to 5) - my answer was specific to the fixable type of vulnerability... different types of vulnerabilities have different disclosure considerations...
]]></description>
		<content:encoded><![CDATA[<p>in retrospect to 5) &#8211; my answer was specific to the fixable type of vulnerability&#8230; different types of vulnerabilities have different disclosure considerations&#8230;</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: kurt wismer</title>
		<link>http://spiresecurity.com/?p=432&#038;cpage=1#comment-711</link>
		<dc:creator>kurt wismer</dc:creator>
		<pubDate>Fri, 28 Apr 2006 14:58:42 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=432#comment-711</guid>
		<description><![CDATA[1) the time delay isn&#039;t a &#039;rule&#039; per se... there are guidelines about how long is a reasonable amount of time to wait for the vulnerability to be fixed... the rule simply requires that time delay to be greater than zero...

2) avoiding helping the bad guys is one of many (sometimes competing) goals... it is not the only goal a researcher needs to concern him/herself with, but it is one s/he should keep in mind...

3) i don&#039;t pretend to know what the bad guys know on their own, i&#039;m only speaking about the information that supposed good guys drop in their laps... you&#039;re calling him an ambivalent guy (aka greyhat) but that contradicts the very notion of defending him... if what he did was actually good instead of bad then he was acting as a good guy... somehow though, exposing explorer users to greater risk doesn&#039;t seem particularly good to me...

4) the fact that responsible disclosure hopes to close the window of exposure prior to public release of the information makes the opening of the window of exposure prior to public release of the information a given...

5) i support responsible disclosure... try to work with the vendor first, if that fails then release the info publicly... once a fix has been created then the info should also be released publicly so that the public knows why it should apply the fix...

6) the issue of vulnerabilities that the bad guys know about and we don&#039;t can be addressed by a number of different means... one is to try and find those vulnerabilities independently (what&#039;s so special about bad guys&#039;s abilities to find vulnerabilities?)... another is to try to detect active exploitation of those vulnerabilities generically (honeypots, various autonomous agents, etc)... still another is to develop assets in the bad guy camp who&#039;ll leak the info to you...

7) full disclosure prior to development of a fix is a last resort measure for trying to force the vendor to address the security concerns for the vulnerability in question... it places market pressure on the vendor by exposing their flaws to public scrutiny, but it also exposes their customers to increased risk...
]]></description>
		<content:encoded><![CDATA[<p>1) the time delay isn&#8217;t a &#8216;rule&#8217; per se&#8230; there are guidelines about how long is a reasonable amount of time to wait for the vulnerability to be fixed&#8230; the rule simply requires that time delay to be greater than zero&#8230;</p>
<p>2) avoiding helping the bad guys is one of many (sometimes competing) goals&#8230; it is not the only goal a researcher needs to concern him/herself with, but it is one s/he should keep in mind&#8230;</p>
<p>3) i don&#8217;t pretend to know what the bad guys know on their own, i&#8217;m only speaking about the information that supposed good guys drop in their laps&#8230; you&#8217;re calling him an ambivalent guy (aka greyhat) but that contradicts the very notion of defending him&#8230; if what he did was actually good instead of bad then he was acting as a good guy&#8230; somehow though, exposing explorer users to greater risk doesn&#8217;t seem particularly good to me&#8230;</p>
<p>4) the fact that responsible disclosure hopes to close the window of exposure prior to public release of the information makes the opening of the window of exposure prior to public release of the information a given&#8230;</p>
<p>5) i support responsible disclosure&#8230; try to work with the vendor first, if that fails then release the info publicly&#8230; once a fix has been created then the info should also be released publicly so that the public knows why it should apply the fix&#8230;</p>
<p>6) the issue of vulnerabilities that the bad guys know about and we don&#8217;t can be addressed by a number of different means&#8230; one is to try and find those vulnerabilities independently (what&#8217;s so special about bad guys&#8217;s abilities to find vulnerabilities?)&#8230; another is to try to detect active exploitation of those vulnerabilities generically (honeypots, various autonomous agents, etc)&#8230; still another is to develop assets in the bad guy camp who&#8217;ll leak the info to you&#8230;</p>
<p>7) full disclosure prior to development of a fix is a last resort measure for trying to force the vendor to address the security concerns for the vulnerability in question&#8230; it places market pressure on the vendor by exposing their flaws to public scrutiny, but it also exposes their customers to increased risk&#8230;</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Security Curve Weblog</title>
		<link>http://spiresecurity.com/?p=432&#038;cpage=1#comment-717</link>
		<dc:creator>Security Curve Weblog</dc:creator>
		<pubDate>Fri, 28 Apr 2006 13:22:47 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=432#comment-717</guid>
		<description><![CDATA[&lt;strong&gt;Great Post over at Spire&lt;/strong&gt;

There&#039;s a great post by Pete Lindstrom over at Spire today about Michal Zalewski and his recent disclosure of a zero-day IE vulnerability without notification to Microsoft. Pete takes the &quot;devils advocate&quot; position by saying that Zalewski&#039;s actions are...
]]></description>
		<content:encoded><![CDATA[<p><strong>Great Post over at Spire</strong></p>
<p>There&#8217;s a great post by Pete Lindstrom over at Spire today about Michal Zalewski and his recent disclosure of a zero-day IE vulnerability without notification to Microsoft. Pete takes the &#8220;devils advocate&#8221; position by saying that Zalewski&#8217;s actions are&#8230;</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Pete</title>
		<link>http://spiresecurity.com/?p=432&#038;cpage=1#comment-710</link>
		<dc:creator>Pete</dc:creator>
		<pubDate>Fri, 28 Apr 2006 02:50:08 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=432#comment-710</guid>
		<description><![CDATA[@Kurt -

1) If the time delay supported by &quot;responsible disclosure&quot; isn&#039;t arbitrary, what is the mathematical proof behind [whatever the time delay happens to be]?

2) If good guys wanted to prevent (themselves?) from helping the bad guys, they wouldn&#039;t disclose at all, as you imply in your comments about how the bad guys likely didn&#039;t know about Zalewski&#039;s vuln and how the window of exposure begins at disclosure.

3) You didn&#039;t actually note that the bad guys likely didn&#039;t know about Zalewski&#039;s vuln, but I know it and you know it - the chance that there was some sort of overlap between ambivalent guy research and bad guy research is very, very low.

4) The &quot;window of exposure&quot; for this vulnerability started when it was coded and delivered to customers, not when it was disclosed.

5) It appears you were happier before this disclosure - do you support complete secrecy like I do?

6) What are you doing about all those other vulnerabilities the bad guys currently know about and you (we) don&#039;t?

7) What exactly *is* disclosure a &quot;last resort&quot; to?

Btw, I like your blog (http://anti-virus-rants.blogspot.com).

Thanks for the comments,

Pete
]]></description>
		<content:encoded><![CDATA[<p>@Kurt -</p>
<p>1) If the time delay supported by &#8220;responsible disclosure&#8221; isn&#8217;t arbitrary, what is the mathematical proof behind [whatever the time delay happens to be]?</p>
<p>2) If good guys wanted to prevent (themselves?) from helping the bad guys, they wouldn&#8217;t disclose at all, as you imply in your comments about how the bad guys likely didn&#8217;t know about Zalewski&#8217;s vuln and how the window of exposure begins at disclosure.</p>
<p>3) You didn&#8217;t actually note that the bad guys likely didn&#8217;t know about Zalewski&#8217;s vuln, but I know it and you know it &#8211; the chance that there was some sort of overlap between ambivalent guy research and bad guy research is very, very low.</p>
<p>4) The &#8220;window of exposure&#8221; for this vulnerability started when it was coded and delivered to customers, not when it was disclosed.</p>
<p>5) It appears you were happier before this disclosure &#8211; do you support complete secrecy like I do?</p>
<p>6) What are you doing about all those other vulnerabilities the bad guys currently know about and you (we) don&#8217;t?</p>
<p>7) What exactly *is* disclosure a &#8220;last resort&#8221; to?</p>
<p>Btw, I like your blog (<a href="http://anti-virus-rants.blogspot.com" rel="nofollow">http://anti-virus-rants.blogspot.com</a>).</p>
<p>Thanks for the comments,</p>
<p>Pete</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: kurt wismer</title>
		<link>http://spiresecurity.com/?p=432&#038;cpage=1#comment-709</link>
		<dc:creator>kurt wismer</dc:creator>
		<pubDate>Fri, 28 Apr 2006 02:21:37 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=432#comment-709</guid>
		<description><![CDATA[the rules of responsible disclosure are not arbitary or hypocritical - they are there to prevent (as much as possible) the supposed good guys from helping the bad guys...

sure it&#039;s possible that the bad guys already knew about the vulnerability, but it&#039;s also possible that they didn&#039;t... by trying to work with microsoft first (with full disclosure as fall back position) the window of exposure for this vulnerability could potentially have been closed before details were given...

by practicing full disclosure before a fix is created the researcher makes the bad guys aware of a new and still effective avenue of attack and thereby increases the risk that they&#039;ll be able to use it against people... because of those costs this kind of disclosure should only be practiced as a last resort...
]]></description>
		<content:encoded><![CDATA[<p>the rules of responsible disclosure are not arbitary or hypocritical &#8211; they are there to prevent (as much as possible) the supposed good guys from helping the bad guys&#8230;</p>
<p>sure it&#8217;s possible that the bad guys already knew about the vulnerability, but it&#8217;s also possible that they didn&#8217;t&#8230; by trying to work with microsoft first (with full disclosure as fall back position) the window of exposure for this vulnerability could potentially have been closed before details were given&#8230;</p>
<p>by practicing full disclosure before a fix is created the researcher makes the bad guys aware of a new and still effective avenue of attack and thereby increases the risk that they&#8217;ll be able to use it against people&#8230; because of those costs this kind of disclosure should only be practiced as a last resort&#8230;</p>
]]></content:encoded>
	</item>
</channel>
</rss>
