Feeds

Microsoft to banish 'responsible' from disclosure debate

Google, too

The Power of One eBook: Top reasons to choose HP BladeSystem

Microsoft has submitted a proposal aimed at quelling one of the oldest debates in security circles: retiring the use of the term “responsible disclosure”.

The software maker wants to replace the term with the less pejorative phrase “coordinated vulnerability disclosure.” The hope is that software makers and researchers can put aside decade-old differences about the best way to handle critical defects so that end users are best protected.

“We don't want an emotionally laden term clouding the debate, and that's definitely gotten in the way of a lot of good discussions between like-minded people in security,” said Katie Moussouris, senior security strategist in the Microsoft Security Response Center. “We're really trying to reach out across the disclosure dividing lines and find the common ground where we all are. We all want to protect customers and users.”

The modest proposal comes a month after the public disclosure of an unpatched vulnerability took the debate to new highs. On June 9, Researcher Tavis Ormandy dropped detailed information about a critical bug in older versions of Windows that allowed attackers to take full control of a PC by luring its user to a booby-trapped website. Ormandy said he had notified Microsoft of the vulnerability just five days earlier, on a Saturday, and decided to take his advisory public when Microsoft didn't commit to fixing the flaw within two months.

Moussouris told The Register the company was unable to give Ormandy a timeline until it had finished investigating the bug, which resides in the Help Center of Windows XP and Server 2003 and was fixed earlier this month. Ormandy didn't respond to a request to comment by time of publication. Within days of the disclosure, reports began circulating that the previously undocumented flaw was being exploited by attackers.

Some people in security circles, including those at Microsoft, responded by noting that Ormandy worked for Google, and criticized him for releasing the details before Microsoft had a chance to fix the vulnerability, as the tenets of responsible disclosure hold.

On Tuesday, this Google blog post, which was co-written by Ormandy, criticized the term.

“The important implication of referring to this process as 'responsible' is that researchers who do not comply are seen as behaving improperly,” the post stated. “However, the inverse situation is often true: it can be irresponsible to permit a flaw to remain live for such an extended period of time.”

In Ormandy's post on the Full-disclosure forum — which he said represented his private opinion — he went further.

“This is another example of the problems with bug secrecy (or in PR speak, 'responsible disclosure'),” he wrote. “Those of us who work hard to keep networks safe are forced to work in isolation without the open collaboration with our peers that we need, especially in complex cases like this, where creative thinking and input from experts in multiple disciplines is required to join the dots.”

Moussouris said the move to retire the term started long before the most recent firestorm ignited and noted that an International Standards Organization committee in April unanimously voted to drop the word “responsible” from its discussion on vulnerability reporting. Indeed, Steve Christey, who helped release the 'Responsible Disclosure' draft for the Internet Engineering Task Force in 2002, said the term has outlived its usefulness.

“I fully support an active push for more objective terminology within the industry,” he told El Reg. “This may help keep the long-running debate more focused on results instead of name-calling.”

In essence, coordinated vulnerability disclosure would work much like responsible disclosure: Researchers would be encouraged to report security bugs to the responsible software maker or other trusted organization and agree to keep all details private until a mutually agreed-upon time. But in the event the two sides don't see eye to eye, they would continue talking. In the event the finder decides to make the vulnerability public, he would communicate those plans to the software maker ahead of time.

“Even if you don't share disclosure philosophies with us — for example, if you're a proponent of full disclosure — we still want to talk to you,” Moussouris said. “Even if you believe in full disclosure, it is definitely worth it to come to us and let us know. Anything that helps us get a head start against attackers is what we want.”

More about Microsoft's proposal is here and here. ®

The Power of One eBook: Top reasons to choose HP BladeSystem

More from The Register

next story
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
BMW's ConnectedDrive falls over, bosses blame upgrade snafu
Traffic flows up 20% as motorway middle lanes miraculously unclog
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Putin: Crack Tor for me and I'll make you a MILLIONAIRE
Russian Interior Ministry offers big pile o' roubles for busting pro-privacy browser
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.