Feeds

RIP Full Disclosure: Security world reacts to key mailing list's death

'I realised that I'm done' sighs co-admin of vulnerability clearing house

Seven Steps to Software Security

The legendary Full Disclosure mailing list, where security researchers posted details of exploits and software vulnerabilities, is shutting down.

The service, which had been running for nearly 12 years since July 2002, has been suspended indefinitely after list admin John Cartwright was no longer prepared to put up with the hassle of running the thing. He reached breaking point when an unnamed researcher demanded he delete multiple posts from the archive, as Cartwright explained in a post to the list on Wednesday:

When Len [Rose] and I created the Full-Disclosure list way back in July 2002, we knew that we'd have our fair share of legal troubles along the way. We were right. To date we've had all sorts of requests to delete things, requests not to delete things, and a variety of legal threats both valid or otherwise.

However, I always assumed that the turning point would be a sweeping request for large-scale deletion of information that some vendor or other had taken exception to.

I never imagined that request might come from a researcher within the 'community' itself (and I use that word loosely in modern times). But today, having spent a fair amount of time dealing with complaints from a particular individual (who shall remain nameless) I realised that I'm done. The list has had its fair share of trolling, flooding, furry porn, fake exploits and DoS attacks over the years, but none of those things really affected the integrity of the list itself.

However, taking a virtual hatchet to the list archives on the whim of an individual just doesn't feel right. That 'one of our own' would undermine the efforts of the last 12 years is really the straw that broke the camel's back.

I'm not willing to fight this fight any longer. It's getting harder to operate an open forum in today's legal climate, let alone a security-related one. There is no honour amongst hackers any more. There is no real community. There is precious little skill. The entire security game is becoming more and more regulated. This is all a sign of things to come, and a reflection on the sad state of an industry that should never have become an industry.

I'm suspending service indefinitely. Thanks for playing.

The Full Disclosure list served an important role in quickly alerting IT and infosec professionals to newly discovered computer security vulnerabilities: some holes were documented on the list with zero days' notice for the affected vendor; some were disclosed after patches had been developed and distributed. In either case, the threat of disclosure was seen as enough to encourage vendors to take shoring up security seriously.

But the emergence of exploit brokers and the ability to making money through selling zero-day exploits to governments has changed everything. In some ways Full Disclosure is a relic of a more innocent age of internet security.

Even though it has been the place to find Oracle Database, Apache web server and Linux kernel zero-days, in recent years it's admittedly carried a lot of posts revealing cross-site scripting flaws in blogs and similar low hanging fruit. Yet, its demise attracted strong reaction from the security industry.

Russ Spitler, veep for product strategy at AlienVault, commented: "This is a real step backwards for the security community. While the loss of a news source like Full Disclosure will be replaced, the reason for the shutdown is the real loss for the community.

"For years security by obscurity was the prevalent approach even among large software vendors – pressure from forums such as Full Disclosure helped changed that approach. The large vendors took charge of their security problems, established private disclosure processes, created communication channels about their security issues and formalized their approach to addressing the root causes.

"Microsoft has to be given credit and can be taken as an example of how the largest of companies can create and establish security programs to head off these problems."

Mobile application security vulnerability report

More from The Register

next story
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you been on YouPorn lately, perhaps? White House website?
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
BMW's ConnectedDrive falls over, bosses blame upgrade snafu
Traffic flows up 20% as motorway middle lanes miraculously unclog
Attackers raid SWISS BANKS with DNS and malware bombs
'Retefe' trojan uses clever spin on old attacks to grant total control of bank accounts
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.