When Oy Online Solutions Ltd discovered that a flaw in Microsoft's Internet Explorer could let hackers steal private user information from Web files known as "cookies," the Finnish company faced a difficult decision.
Should it whisper the news to Microsoft so the software giant could fix the problem? Or should it announce the so-called "bug" to the world so Explorer users could protect themselves before a hacker discovered the same vulnerability?
This dilemma has intensified recently, with Microsoft promoting a campaign to persuade security companies to keep quiet for a month when a potentially damaging flaw in software is found.
PHOTO: AP
Some security experts are skeptical of Microsoft's motives -- and the campaign itself.
The company argues that devastating computer worms such as Code Red and Nimda were unleashed by hackers who learned details of Microsoft vulnerabilities on the Web -- then picked up "exploit tools" -- blueprints for how to exploit the flaws.
"For a very long time there has been an argument about whether releasing exploit tools is helpful or harmful, but it's largely been a theoretical discussion," said Scott Culp, who manages Microsoft's company's security response center. "We've now got proof."
Microsoft's campaign won the support of five security companies at the "Trusted Computing" forum it hosted on its campus here last week. But many other computer experts say the concept is unlikely to gain momentum.
They contend that keeping flaws quiet would be more damaging to online security -- even if announcing details sometimes plays into the hands of malevolent hackers.
For example, Oy Online Solutions at first consulted with Microsoft but ultimately opted to disclose details of the Internet Explorer bug on Nov. 9. The security company said Microsoft was taking too long to make a patch that could fix the problem, leaving millions of users at risk.
Opponents of Microsoft's stance say such "full disclosure" is the only way system administrators can be sure that a patch successfully closes a breach in security -- and the only way consumers can take proper precautions.
"Full disclosure is a necessary evil. I don't think anybody likes it, even the advocates of it, simply because we know what the results are," said Elias Levy, chief technology officer of Security Focus Inc. The company, based in San Mateo, California, hosts Bugtraq, a Web forum devoted to programming errors such as the Internet Explorer flaw.
Some critics believe Microsoft's ulterior goal is to improve its image by quashing news of its products' failings.
Microsoft put out 60 patches to fix security problems in 1999, 100 last year and 55 this year. Some of the flaws have been in such important programs as Windows XP and Microsoft's Internet server software, known as IIS. After Nimda and Code Red attacked holes in IIS, an influential Gartner analyst advised clients to look for alternatives.
"They don't take security seriously. They treat security as a public relations problem," said Bruce Schneier, chief technical officer of Counterpane Technologies Inc, an online security services company. "It's much easier to hide the information than to fix the problem. That's their motivation here."
Just about every computer program in the world has defects. For years, computer scientists followed a protocol of "bug secrecy," notifying only the programmers that their work needed to be fixed. But that offered little incentive to completely fix problems or alert customers.
By the early 1990s, "you could literally break into every single computer on the Internet ... because security wasn't taken seriously," Levy said.
So researchers began publicizing flaws they discovered -- and releasing detailed information, including in some cases tools that could be used to exploit the flaw, so companies could not dismiss the findings as theoretical or inaccurate.
Now Microsoft's Culp believes the pendulum has swung too far, creating what he calls "information anarchy." A proposal developed at Trusted Computing calls for researchers to be careful "not to disclose details that can be directly used to exploit the vulnerability." If a software vendor fails to fix a problem within 30 days, more details could be disseminated. Many bugs are fixed well within 30 days.
"We're not saying full disclosure goes away -- we're saying, is there a responsible way to provide this information, to minimize its ability to be a hacker tool?" said Chris Klaus, founder of Atlanta-based Internet Security Systems Inc, which is pushing for the new standard.
Klaus dismissed the claim that Microsoft just wants to cover up its bug problems, and said those who want to publicize vulnerabilities are interested mainly in attracting attention to themselves.
"Our priority is to help the customer, and I think this thing solves that," Klaus said.
"Whether it helps or hurts Microsoft is not the intention of the security group."
NO HUMAN ERROR: After the incident, the Coast Guard Administration said it would obtain uncrewed aerial vehicles and vessels to boost its detection capacity Authorities would improve border control to prevent unlawful entry into Taiwan’s waters and safeguard national security, the Mainland Affairs Council (MAC) said yesterday after a Chinese man reached the nation’s coast on an inflatable boat, saying he “defected to freedom.” The man was found on a rubber boat when he was about to set foot on Taiwan at the estuary of Houkeng River (後坑溪) near Taiping Borough (太平) in New Taipei City’s Linkou District (林口), authorities said. The Coast Guard Administration’s (CGA) northern branch said it received a report at 6:30am yesterday morning from the New Taipei City Fire Department about a
IN BEIJING’S FAVOR: A China Coast Guard spokesperson said that the Chinese maritime police would continue to carry out law enforcement activities in waters it claims The Philippines withdrew its coast guard vessel from a South China Sea shoal that has recently been at the center of tensions with Beijing. BRP Teresa Magbanua “was compelled to return to port” from Sabina Shoal (Xianbin Shoal, 仙濱暗沙) due to bad weather, depleted supplies and the need to evacuate personnel requiring medical care, the Philippine Coast Guard (PCG) spokesman Jay Tarriela said yesterday in a post on X. The Philippine vessel “will be in tiptop shape to resume her mission” after it has been resupplied and repaired, Philippine Executive Secretary Lucas Bersamin, who heads the nation’s maritime council, said
REGIONAL STABILITY: Taipei thanked the Biden administration for authorizing its 16th sale of military goods and services to uphold Taiwan’s defense and safety The US Department of State has approved the sale of US$228 million of military goods and services to Taiwan, the US Department of Defense said on Monday. The state department “made a determination approving a possible Foreign Military Sale” to the Taipei Economic and Cultural Representative Office in the US for “return, repair and reshipment of spare parts and related equipment,” the defense department’s Defense Security Cooperation Agency said in a news release. Taiwan had requested the purchase of items and services which include the “return, repair and reshipment of classified and unclassified spare parts for aircraft and related equipment; US Government
More than 500 people on Saturday marched in New York in support of Taiwan’s entry to the UN, significantly more people than previous years. The march, coinciding with the ongoing 79th session of the UN General Assembly, comes close on the heels of growing international discourse regarding the meaning of UN Resolution 2758. Resolution 2758, adopted by the UN General Assembly in 1971, recognizes the People’s Republic of China (PRC) as the “only lawful representative of China.” It resulted in the Republic of China (ROC) losing its seat at the UN to the PRC. Taiwan has since been excluded from