lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
From: kernelpenguin at hot.ee (Elver Loho)
Subject: THCIISSLame exploit

: >Publishing the binary is VX-ing and is criminal. That is very clear.
: Again, you assume this is illegal in every country. This is the Internet,
: there are no laws here. ;)

Do you think the Internet should be regulated by laws? Or do you think we 
should rely on self-regulation in the form of moderation and common decency? 
Because the latter isn't working out as you can see. I'd like to take Ian 
Clarke's view of freedom of speech and say that I don't mind seeing kiddy 
porn on the net, but hell, some of that stuff truly IS sick. Cultivating it 
by giving it the status of freedom of speech would just have unfortunate 
effects on the society as a whole and on the well-being of its various 
current and future members. While I don't think the Internet should (or 
indeed, could) be regulated as a whole, I believe that it would be possible 
and good to apply laws of the poster's country of origin. What it comes down 
to in this case: is the release of (binary) exploits allowed in Germany or 
not?

: >To share knowledge with security researchers does not require
: >releasing binary executables, professional testers can compile the
: >source code for themselves.
: Not everyone has a C/C++ compiler. Even if you do have a C/C++ compiler,
: you may have to port the code to your OS which takes time. If you also
: compile the exploit, everyone can test it. You assume a script kiddie can't
: compile an exploit and that the script kidde can't use any of the exploits
: sent to this list if it's only in source form. Nice protection, but it
: doesn't work.

I think you missed the point here. C/C++ compilers are available for free and 
anyone doing any kind of professional computer security work will have one. 
You also assume that porting the code to one's OS of choice takes time. 
However, if the exploit is released as a binary, porting the code to 
someone's OS of choice is impossible with the exception of being able to run 
some Windows binaries on Linux and a few other OSes. Besides, this is what we 
have standards for. Writing source code that will compile on a multitude of 
operating systems is easy. And with the advent of good interpreted languages 
such as Python and Perl, it's trivial.
As for script kiddies, then they are an unfortunate by-product of our society. 
They will eventually grow up and join the ranks of blackhats, whitehats or 
leave the computer security field entirely. Having been one in the past 
myself, and not being proud of it, I can tell you that nothing will protect 
such exploits from script kiddies. Some of them have big brains on them and 
if one of them figures it out, everyone will figure it out. It's a society 
where the only currency is respect earned by showing other members your level 
of intelligence. Surprisingly, people like that fit nicely into Eric S. 
Raymond's mindset of an open-source hacker as portrayed in his collection of 
essays titled "The Cathedral and the Bazaar."

: >Avoid releasing binaries and you will not have problems with the
: >authorities.
: I assume you meant to say "Avoid releasing EXPLOIT binaries ..."

That sentence was in context. Ripping it out of context to point out such 
things is pointless.


Elver Loho


Powered by blists - more mailing lists