Feeds

RIP Full Disclosure: Security world reacts to key mailing list's death

'I realised that I'm done' sighs co-admin of vulnerability clearing house

Protecting against web application threats using SSL

The legendary Full Disclosure mailing list, where security researchers posted details of exploits and software vulnerabilities, is shutting down.

The service, which had been running for nearly 12 years since July 2002, has been suspended indefinitely after list admin John Cartwright was no longer prepared to put up with the hassle of running the thing. He reached breaking point when an unnamed researcher demanded he delete multiple posts from the archive, as Cartwright explained in a post to the list on Wednesday:

When Len [Rose] and I created the Full-Disclosure list way back in July 2002, we knew that we'd have our fair share of legal troubles along the way. We were right. To date we've had all sorts of requests to delete things, requests not to delete things, and a variety of legal threats both valid or otherwise.

However, I always assumed that the turning point would be a sweeping request for large-scale deletion of information that some vendor or other had taken exception to.

I never imagined that request might come from a researcher within the 'community' itself (and I use that word loosely in modern times). But today, having spent a fair amount of time dealing with complaints from a particular individual (who shall remain nameless) I realised that I'm done. The list has had its fair share of trolling, flooding, furry porn, fake exploits and DoS attacks over the years, but none of those things really affected the integrity of the list itself.

However, taking a virtual hatchet to the list archives on the whim of an individual just doesn't feel right. That 'one of our own' would undermine the efforts of the last 12 years is really the straw that broke the camel's back.

I'm not willing to fight this fight any longer. It's getting harder to operate an open forum in today's legal climate, let alone a security-related one. There is no honour amongst hackers any more. There is no real community. There is precious little skill. The entire security game is becoming more and more regulated. This is all a sign of things to come, and a reflection on the sad state of an industry that should never have become an industry.

I'm suspending service indefinitely. Thanks for playing.

The Full Disclosure list served an important role in quickly alerting IT and infosec professionals to newly discovered computer security vulnerabilities: some holes were documented on the list with zero days' notice for the affected vendor; some were disclosed after patches had been developed and distributed. In either case, the threat of disclosure was seen as enough to encourage vendors to take shoring up security seriously.

But the emergence of exploit brokers and the ability to making money through selling zero-day exploits to governments has changed everything. In some ways Full Disclosure is a relic of a more innocent age of internet security.

Even though it has been the place to find Oracle Database, Apache web server and Linux kernel zero-days, in recent years it's admittedly carried a lot of posts revealing cross-site scripting flaws in blogs and similar low hanging fruit. Yet, its demise attracted strong reaction from the security industry.

Russ Spitler, veep for product strategy at AlienVault, commented: "This is a real step backwards for the security community. While the loss of a news source like Full Disclosure will be replaced, the reason for the shutdown is the real loss for the community.

"For years security by obscurity was the prevalent approach even among large software vendors – pressure from forums such as Full Disclosure helped changed that approach. The large vendors took charge of their security problems, established private disclosure processes, created communication channels about their security issues and formalized their approach to addressing the root causes.

"Microsoft has to be given credit and can be taken as an example of how the largest of companies can create and establish security programs to head off these problems."

Reducing the cost and complexity of web vulnerability management

More from The Register

next story
Infosec geniuses hack a Canon PRINTER and install DOOM
Internet of Stuff securo-cockups strike yet again
Apple Pay is a tidy payday for Apple with 0.15% cut, sources say
Cupertino slurps 15 cents from every $100 purchase
Spies would need SUPER POWERS to tap undersea cables
Why mess with armoured 10kV cables when land-based, and legal, snoop tools are easier?
Israeli spies rebel over mass-snooping on innocent Palestinians
'Disciplinary treatment will be sharp and clear' vow spy-chiefs
YouTube, Amazon and Yahoo! caught in malvertising mess
Cisco says 'Kyle and Stan' attack is spreading through compromised ad networks
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
Greater dev access to iOS 8 will put us AT RISK from HACKERS
Knocking holes in Apple's walled garden could backfire, says securo-chap
Microsoft to patch ASP.NET mess even if you don't
We know what's good for you, because we made the mess says Redmond
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.