When Oy Online Solutions Ltd discovered that a flaw in Microsoft's Internet Explorer could let hackers steal private user information from Web files known as "cookies," the Finnish company faced a difficult decision.
Should it whisper the news to Microsoft so the software giant could fix the problem? Or should it announce the so-called "bug" to the world so Explorer users could protect themselves before a hacker discovered the same vulnerability?
This dilemma has intensified recently, with Microsoft promoting a campaign to persuade security companies to keep quiet for a month when a potentially damaging flaw in software is found.
PHOTO: AP
Some security experts are skeptical of Microsoft's motives -- and the campaign itself.
The company argues that devastating computer worms such as Code Red and Nimda were unleashed by hackers who learned details of Microsoft vulnerabilities on the Web -- then picked up "exploit tools" -- blueprints for how to exploit the flaws.
"For a very long time there has been an argument about whether releasing exploit tools is helpful or harmful, but it's largely been a theoretical discussion," said Scott Culp, who manages Microsoft's company's security response center. "We've now got proof."
Microsoft's campaign won the support of five security companies at the "Trusted Computing" forum it hosted on its campus here last week. But many other computer experts say the concept is unlikely to gain momentum.
They contend that keeping flaws quiet would be more damaging to online security -- even if announcing details sometimes plays into the hands of malevolent hackers.
For example, Oy Online Solutions at first consulted with Microsoft but ultimately opted to disclose details of the Internet Explorer bug on Nov. 9. The security company said Microsoft was taking too long to make a patch that could fix the problem, leaving millions of users at risk.
Opponents of Microsoft's stance say such "full disclosure" is the only way system administrators can be sure that a patch successfully closes a breach in security -- and the only way consumers can take proper precautions.
"Full disclosure is a necessary evil. I don't think anybody likes it, even the advocates of it, simply because we know what the results are," said Elias Levy, chief technology officer of Security Focus Inc. The company, based in San Mateo, California, hosts Bugtraq, a Web forum devoted to programming errors such as the Internet Explorer flaw.
Some critics believe Microsoft's ulterior goal is to improve its image by quashing news of its products' failings.
Microsoft put out 60 patches to fix security problems in 1999, 100 last year and 55 this year. Some of the flaws have been in such important programs as Windows XP and Microsoft's Internet server software, known as IIS. After Nimda and Code Red attacked holes in IIS, an influential Gartner analyst advised clients to look for alternatives.
"They don't take security seriously. They treat security as a public relations problem," said Bruce Schneier, chief technical officer of Counterpane Technologies Inc, an online security services company. "It's much easier to hide the information than to fix the problem. That's their motivation here."
Just about every computer program in the world has defects. For years, computer scientists followed a protocol of "bug secrecy," notifying only the programmers that their work needed to be fixed. But that offered little incentive to completely fix problems or alert customers.
By the early 1990s, "you could literally break into every single computer on the Internet ... because security wasn't taken seriously," Levy said.
So researchers began publicizing flaws they discovered -- and releasing detailed information, including in some cases tools that could be used to exploit the flaw, so companies could not dismiss the findings as theoretical or inaccurate.
Now Microsoft's Culp believes the pendulum has swung too far, creating what he calls "information anarchy." A proposal developed at Trusted Computing calls for researchers to be careful "not to disclose details that can be directly used to exploit the vulnerability." If a software vendor fails to fix a problem within 30 days, more details could be disseminated. Many bugs are fixed well within 30 days.
"We're not saying full disclosure goes away -- we're saying, is there a responsible way to provide this information, to minimize its ability to be a hacker tool?" said Chris Klaus, founder of Atlanta-based Internet Security Systems Inc, which is pushing for the new standard.
Klaus dismissed the claim that Microsoft just wants to cover up its bug problems, and said those who want to publicize vulnerabilities are interested mainly in attracting attention to themselves.
"Our priority is to help the customer, and I think this thing solves that," Klaus said.
"Whether it helps or hurts Microsoft is not the intention of the security group."
RISK REMAINS: An official said that with the US presidential elections so close, it is unclear if China would hold war games or keep its reaction to angry words The Ministry of National Defense said it was “on alert” as it detected a Chinese aircraft carrier group to Taiwan’s south yesterday amid concerns in Taiwan about the possibility of a new round of Chinese war games. The ministry said in a statement that a Chinese navy group led by the carrier Liaoning had entered waters near the Bashi Channel, which connects the South China Sea and the Pacific Ocean and separates Taiwan from the Philippines. It said the carrier group was expected to enter the Western Pacific. The military is keeping a close watch on developments and “exercising an
FIVE-YEAR WINDOW? A defense institute CEO said a timeline for a potential Chinese invasion was based on expected ‘tough measures’ when Xi Jinping seeks a new term Most Taiwanese are willing to defend the nation against a Chinese attack, but the majority believe Beijing is unlikely to invade within the next five years, a poll showed yesterday. The poll carried out last month was commissioned by the Institute for National Defense and Security Research, a Taipei-based think tank, and released ahead of Double Ten National Day today, when President William Lai (賴清德) is to deliver a speech. China maintains a near-daily military presence around Taiwan and has held three rounds of war games in the past two years. CIA Director William Burns last year said that Chinese President Xi Jinping
REACTION TO LAI: A former US official said William Lai took a step toward stability with his National Day speech and the question was how Beijing would respond US Secretary of State Antony Blinken yesterday warned China against taking any “provocative” action on Taiwan after Beijing’s reaction to President William Lai’s (賴清德) speech on Double Ten National Day on Thursday. Blinken, speaking in Laos after an ASEAN East Asia Summit, called the speech by Lai, in which he vowed to “resist annexation,” a “regular exercise.” “China should not use it in any fashion as a pretext for provocative actions,” Blinken told reporters. “On the contrary, we want to reinforce — and many other countries want to reinforce — the imperative of preserving the status quo, and neither party taking any
President William Lai (賴清德) yesterday said that China has “no right to represent Taiwan,” but stressed that the nation was willing to work with Beijing on issues of mutual interest. “The Republic of China has already put down roots in Taiwan, Penghu, Kinmen and Matsu,” Lai said in his first Double Ten National Day address outside the Presidential Office Building in Taipei. “And the Republic of China and the People’s Republic of China [PRC] are not subordinate to each other.” “The People’s Republic of China has no right to represent Taiwan,” he said at the event marking the 113th National Day of