Re: [GENERAL] [pgsql-advocacy] MySQL worm attacks Windows servers

Lists: pgsql-advocacypgsql-generalpgsql-www
From: Christopher Kings-Lynne <chriskl(at)familyhealth(dot)com(dot)au>
To: pgsql-advocacy(at)postgresql(dot)org
Subject: MySQL worm attacks Windows servers
Date: 2005-01-28 13:46:00
Message-ID: 41FA4218.6070203@familyhealth.com.au
Views: Raw Message | Whole Thread | Download mbox | Resend email
Lists: pgsql-advocacy pgsql-general pgsql-www

From: Josh Berkus <josh(at)agliodbs(dot)com>
To: pgsql-advocacy(at)postgresql(dot)org
Cc: Christopher Kings-Lynne <chriskl(at)familyhealth(dot)com(dot)au>
Subject: Re: MySQL worm attacks Windows servers
Date: 2005-01-28 17:04:35
Message-ID: 200501280904.36174.josh@agliodbs.com
Views: Raw Message | Whole Thread | Download mbox | Resend email
Lists: pgsql-advocacy pgsql-general pgsql-www

Chris,

> http://www.theregister.co.uk/2005/01/28/mysql_worm/

Yep. And each time someone asks you "But why can't I install PostgreSQL as
Administrator" you can point them to that worm ....

--
Josh Berkus
Aglio Database Solutions
San Francisco


From: Chris Travers <chris(at)travelamericas(dot)com>
To: Josh Berkus <josh(at)agliodbs(dot)com>, PostgreSQL advocacy <pgsql-advocacy(at)postgresql(dot)org>, pgsql-general <pgsql-general(at)postgresql(dot)org>
Subject: Re: MySQL worm attacks Windows servers
Date: 2005-01-29 08:34:07
Message-ID: 41FB4A7F.1000208@travelamericas.com
Views: Raw Message | Whole Thread | Download mbox | Resend email
Lists: pgsql-advocacy pgsql-general pgsql-www

Cross-posting to general due to more general nature of response

Josh Berkus wrote:

>Chris,
>
>
>
>>http://www.theregister.co.uk/2005/01/28/mysql_worm/
>>
>>
>
>Yep. And each time someone asks you "But why can't I install PostgreSQL as
>Administrator" you can point them to that worm ....
>
>
>
Now, if PostgreSQL is installed with TRUST authentication for remote
ports, can't one try to create an untrusted language and function that
will cause the sustem to scan for other such servers and connect,
thereby spreading a worm? Of course most of the PostgreSQL instances I
have seen are behind firewalls, but I don't think we are that invulnerable.

Maybe we should set the default authentication to only use TRUST on
local sockets only. At least as of 7.4, the default was to trust
network ports.

Best Wishes,
Chris Travers
Metatron Technology Consulting


From: Bruno Wolff III <bruno(at)wolff(dot)to>
To: Chris Travers <chris(at)travelamericas(dot)com>
Cc: Josh Berkus <josh(at)agliodbs(dot)com>, PostgreSQL advocacy <pgsql-advocacy(at)postgresql(dot)org>, pgsql-general <pgsql-general(at)postgresql(dot)org>
Subject: Re: MySQL worm attacks Windows servers
Date: 2005-01-29 11:45:00
Message-ID: 20050129114500.GA18205@wolff.to
Views: Raw Message | Whole Thread | Download mbox | Resend email
Lists: pgsql-advocacy pgsql-general pgsql-www

On Sat, Jan 29, 2005 at 00:34:07 -0800,
Chris Travers <chris(at)travelamericas(dot)com> wrote:
>
> Maybe we should set the default authentication to only use TRUST on
> local sockets only. At least as of 7.4, the default was to trust
> network ports.

I believe the previous default was not to allow network connections
by default. For 8.0 only network connections from localhost are allowed
by default.

No one in their right mind is going to use trust authentication on
connections from random IP addresses. And in most cases they aren't
even going to allow connections from random IP addresses.


From: Tom Lane <tgl(at)sss(dot)pgh(dot)pa(dot)us>
To: Chris Travers <chris(at)travelamericas(dot)com>
Cc: Josh Berkus <josh(at)agliodbs(dot)com>, PostgreSQL advocacy <pgsql-advocacy(at)postgresql(dot)org>, pgsql-general <pgsql-general(at)postgresql(dot)org>
Subject: Re: [GENERAL] MySQL worm attacks Windows servers
Date: 2005-01-29 15:44:13
Message-ID: 3688.1107013453@sss.pgh.pa.us
Views: Raw Message | Whole Thread | Download mbox | Resend email
Lists: pgsql-advocacy pgsql-general pgsql-www

Chris Travers <chris(at)travelamericas(dot)com> writes:
> Maybe we should set the default authentication to only use TRUST on
> local sockets only. At least as of 7.4, the default was to trust
> network ports.

Perhaps you should check your facts before posting.

regards, tom lane


From: Josh Berkus <josh(at)agliodbs(dot)com>
To: pgsql-advocacy(at)postgresql(dot)org
Cc: Chris Travers <chris(at)travelamericas(dot)com>, pgsql-general <pgsql-general(at)postgresql(dot)org>
Subject: Re: MySQL worm attacks Windows servers
Date: 2005-01-29 18:25:13
Message-ID: 200501291025.13703.josh@agliodbs.com
Views: Raw Message | Whole Thread | Download mbox | Resend email
Lists: pgsql-advocacy pgsql-general pgsql-www

Chris,

> Maybe we should set the default authentication to only use TRUST on
> local sockets only. At least as of 7.4, the default was to trust
> network ports.

If you know of a PostgreSQL package, from any source, that installs with trust
on network ports, please notify Core (and Core only, please).

--
Josh Berkus
Aglio Database Solutions
San Francisco


From: Chris Travers <chris(at)travelamericas(dot)com>
To: Tom Lane <tgl(at)sss(dot)pgh(dot)pa(dot)us>, pgsql-general <pgsql-general(at)postgresql(dot)org>
Subject: Re: [pgsql-advocacy] MySQL worm attacks Windows servers
Date: 2005-01-30 00:39:11
Message-ID: 41FC2CAF.3000908@travelamericas.com
Views: Raw Message | Whole Thread | Download mbox | Resend email
Lists: pgsql-advocacy pgsql-general pgsql-www

Tom Lane wrote:

>Chris Travers <chris(at)travelamericas(dot)com> writes:
>
>
>>Maybe we should set the default authentication to only use TRUST on
>>local sockets only. At least as of 7.4, the default was to trust
>>network ports.
>>
>>
>
>Perhaps you should check your facts before posting.
>
>

Ok. Pardon me. I misread the file. I apologize.

Best Wishes,
Chris Travers


From: Neil Conway <neilc(at)samurai(dot)com>
To: Josh Berkus <josh(at)agliodbs(dot)com>
Cc: pgsql-advocacy(at)postgresql(dot)org, Chris Travers <chris(at)travelamericas(dot)com>, pgsql-general <pgsql-general(at)postgresql(dot)org>
Subject: Re: MySQL worm attacks Windows servers
Date: 2005-01-30 09:23:15
Message-ID: 41FCA783.1010903@samurai.com
Views: Raw Message | Whole Thread | Download mbox | Resend email
Lists: pgsql-advocacy pgsql-general pgsql-www

Josh Berkus wrote:
> If you know of a PostgreSQL package, from any source, that installs with trust
> on network ports, please notify Core (and Core only, please).

Why only -core?

-Neil


From: Dawid Kuroczko <qnex42(at)gmail(dot)com>
To: Neil Conway <neilc(at)samurai(dot)com>
Cc: Josh Berkus <josh(at)agliodbs(dot)com>, pgsql-advocacy(at)postgresql(dot)org, Chris Travers <chris(at)travelamericas(dot)com>, pgsql-general <pgsql-general(at)postgresql(dot)org>
Subject: Re: [GENERAL] MySQL worm attacks Windows servers
Date: 2005-01-30 14:55:56
Message-ID: 758d5e7f050130065562ce5b3c@mail.gmail.com
Views: Raw Message | Whole Thread | Download mbox | Resend email
Lists: pgsql-advocacy pgsql-general pgsql-www

On Sun, 30 Jan 2005 20:23:15 +1100, Neil Conway <neilc(at)samurai(dot)com> wrote:
> Josh Berkus wrote:
> > If you know of a PostgreSQL package, from any source, that installs with trust
> > on network ports, please notify Core (and Core only, please).
>
> Why only -core?

I think it is in good taste that when you find a bug/vulnerability/etc
first you contact the author (in this case: core), leave them some
time to fix the problem and then go on announcing it to the
world.

I think it is perfectly reasonable!

Regards,
Dawid


From: Peter Eisentraut <peter_e(at)gmx(dot)net>
To: Dawid Kuroczko <qnex42(at)gmail(dot)com>
Cc: Neil Conway <neilc(at)samurai(dot)com>, Josh Berkus <josh(at)agliodbs(dot)com>, pgsql-advocacy(at)postgresql(dot)org, Chris Travers <chris(at)travelamericas(dot)com>, pgsql-general <pgsql-general(at)postgresql(dot)org>
Subject: Re: [GENERAL] MySQL worm attacks Windows servers
Date: 2005-01-30 15:18:53
Message-ID: 200501301618.54246.peter_e@gmx.net
Views: Raw Message | Whole Thread | Download mbox | Resend email
Lists: pgsql-advocacy pgsql-general pgsql-www

Dawid Kuroczko wrote:
> I think it is in good taste that when you find a
> bug/vulnerability/etc first you contact the author (in this case:
> core), leave them some time to fix the problem and then go on
> announcing it to the
> world.

In this case, core is not the author of the object in question. And of
course, to report a "bug/vulnerability/etc" you would write to
pgsql-bugs, not core.

--
Peter Eisentraut
http://developer.postgresql.org/~petere/


From: Dawid Kuroczko <qnex42(at)gmail(dot)com>
To: Peter Eisentraut <peter_e(at)gmx(dot)net>
Cc: pgsql-advocacy(at)postgresql(dot)org
Subject: Re: [GENERAL] MySQL worm attacks Windows servers
Date: 2005-01-30 16:41:08
Message-ID: 758d5e7f0501300841be3ff4c@mail.gmail.com
Views: Raw Message | Whole Thread | Download mbox | Resend email
Lists: pgsql-advocacy pgsql-general pgsql-www

On Sun, 30 Jan 2005 16:18:53 +0100, Peter Eisentraut <peter_e(at)gmx(dot)net> wrote:
> Dawid Kuroczko wrote:
> > I think it is in good taste that when you find a
> > bug/vulnerability/etc first you contact the author (in this case:
> > core), leave them some time to fix the problem and then go on
> > announcing it to the
> > world.
>
> In this case, core is not the author of the object in question. And of
> course, to report a "bug/vulnerability/etc" you would write to
> pgsql-bugs, not core.

Well, if some pgsql distribution (say a Foo Package Manager packet
for FooBar *nix) has a modified pg_hba.conf then indeed this
FooBar *nix can be considered as pg_hba.conf's author.
Anyhow I still think >>core<< can be considered as original
author of pg_hba.conf default contents.

...and right you are, pgsql-bugs is the right place.

But all this discussion is getting pointless so I shall from now on
abstain from sending to this thread. ;)

Regards,
Dawid


From: Tom Lane <tgl(at)sss(dot)pgh(dot)pa(dot)us>
To: Peter Eisentraut <peter_e(at)gmx(dot)net>
Cc: Dawid Kuroczko <qnex42(at)gmail(dot)com>, Neil Conway <neilc(at)samurai(dot)com>, Josh Berkus <josh(at)agliodbs(dot)com>, pgsql-advocacy(at)postgresql(dot)org, Chris Travers <chris(at)travelamericas(dot)com>, pgsql-general <pgsql-general(at)postgresql(dot)org>
Subject: Re: [GENERAL] MySQL worm attacks Windows servers
Date: 2005-01-30 17:55:28
Message-ID: 3703.1107107728@sss.pgh.pa.us
Views: Raw Message | Whole Thread | Download mbox | Resend email
Lists: pgsql-advocacy pgsql-general pgsql-www

Peter Eisentraut <peter_e(at)gmx(dot)net> writes:
> Dawid Kuroczko wrote:
>> I think it is in good taste that when you find a
>> bug/vulnerability/etc first you contact the author (in this case:
>> core), leave them some time to fix the problem and then go on
>> announcing it to the
>> world.

> In this case, core is not the author of the object in question. And of
> course, to report a "bug/vulnerability/etc" you would write to
> pgsql-bugs, not core.

Josh's point is that if you don't want to publicize a vulnerability
to the entire world in advance of there being any chance to fix it,
you don't send your report to an open, publicly-archived bugs list.

We don't really have an official security contact. The next best thing
is to send such reports to pgsql-core, which is not an open list, but
will reach a good chunk of those with an interest in fixing such
problems.

regards, tom lane


From: Alvaro Herrera <alvherre(at)dcc(dot)uchile(dot)cl>
To: Tom Lane <tgl(at)sss(dot)pgh(dot)pa(dot)us>
Cc: Peter Eisentraut <peter_e(at)gmx(dot)net>, Dawid Kuroczko <qnex42(at)gmail(dot)com>, Neil Conway <neilc(at)samurai(dot)com>, Josh Berkus <josh(at)agliodbs(dot)com>, pgsql-advocacy(at)postgresql(dot)org, Chris Travers <chris(at)travelamericas(dot)com>, pgsql-general <pgsql-general(at)postgresql(dot)org>, pgsql-www(at)postgresql(dot)org
Subject: Re: [GENERAL] [pgsql-advocacy] MySQL worm attacks Windows servers
Date: 2005-01-30 19:44:59
Message-ID: 20050130194459.GB6222@dcc.uchile.cl
Views: Raw Message | Whole Thread | Download mbox | Resend email
Lists: pgsql-advocacy pgsql-general pgsql-www

On Sun, Jan 30, 2005 at 12:55:28PM -0500, Tom Lane wrote:

> We don't really have an official security contact. The next best thing
> is to send such reports to pgsql-core, which is not an open list, but
> will reach a good chunk of those with an interest in fixing such
> problems.

IMHO this fact should be more clearly announced somewhere on the
website. A little phrase like "Please send security vulnerability
reports to pgsql-core(at)postgresql(dot)org" at the top of the developer's page
should do.

--
Alvaro Herrera (<alvherre[(at)]dcc(dot)uchile(dot)cl>)
"Some men are heterosexual, and some are bisexual, and some
men don't think about sex at all... they become lawyers" (Woody Allen)


From: Josh Berkus <josh(at)agliodbs(dot)com>
To: pgsql-advocacy(at)postgresql(dot)org
Cc: pgsql-general <pgsql-general(at)postgresql(dot)org>
Subject: Re: [GENERAL] MySQL worm attacks Windows servers
Date: 2005-01-30 20:38:31
Message-ID: 200501301238.31699.josh@agliodbs.com
Views: Raw Message | Whole Thread | Download mbox | Resend email
Lists: pgsql-advocacy pgsql-general pgsql-www

Tom,

> We don't really have an official security contact. The next best thing
> is to send such reports to pgsql-core, which is not an open list, but
> will reach a good chunk of those with an interest in fixing such
> problems.

Is there any reason not to set up a "security(at)postgresql(dot)org" mail alias?

--
Josh Berkus
Aglio Database Solutions
San Francisco


From: "Marc G(dot) Fournier" <scrappy(at)postgresql(dot)org>
To: Josh Berkus <josh(at)agliodbs(dot)com>
Cc: pgsql-advocacy(at)postgresql(dot)org, pgsql-general <pgsql-general(at)postgresql(dot)org>
Subject: Re: [GENERAL] MySQL worm attacks Windows servers
Date: 2005-01-30 20:59:38
Message-ID: 20050130165926.A92643@ganymede.hub.org
Views: Raw Message | Whole Thread | Download mbox | Resend email
Lists: pgsql-advocacy pgsql-general pgsql-www


where should it be aliased to? pgsql-core?

On Sun, 30 Jan 2005, Josh Berkus wrote:

> Tom,
>
>> We don't really have an official security contact. The next best thing
>> is to send such reports to pgsql-core, which is not an open list, but
>> will reach a good chunk of those with an interest in fixing such
>> problems.
>
> Is there any reason not to set up a "security(at)postgresql(dot)org" mail alias?
>
> --
> Josh Berkus
> Aglio Database Solutions
> San Francisco
>
> ---------------------------(end of broadcast)---------------------------
> TIP 4: Don't 'kill -9' the postmaster
>

----
Marc G. Fournier Hub.Org Networking Services (http://www.hub.org)
Email: scrappy(at)hub(dot)org Yahoo!: yscrappy ICQ: 7615664


From: Tom Lane <tgl(at)sss(dot)pgh(dot)pa(dot)us>
To: Josh Berkus <josh(at)agliodbs(dot)com>
Cc: pgsql-advocacy(at)postgresql(dot)org, Marc Fournier <scrappy(at)hub(dot)org>, pgsql-general <pgsql-general(at)postgresql(dot)org>
Subject: Re: [GENERAL] MySQL worm attacks Windows servers
Date: 2005-01-30 21:02:13
Message-ID: 18875.1107118933@sss.pgh.pa.us
Views: Raw Message | Whole Thread | Download mbox | Resend email
Lists: pgsql-advocacy pgsql-general pgsql-www

Josh Berkus <josh(at)agliodbs(dot)com> writes:
>> We don't really have an official security contact. The next best thing
>> is to send such reports to pgsql-core, which is not an open list, but
>> will reach a good chunk of those with an interest in fixing such
>> problems.

> Is there any reason not to set up a "security(at)postgresql(dot)org" mail alias?

Probably not --- Marc, do you want to do that (and make it point to
pgsql-core for now)?

I was just in the middle of adding notes to problems.sgml and
bug.template to tell people to send security issues to pgsql-core,
but I can make it say security@ instead.

regards, tom lane


From: Peter Eisentraut <peter_e(at)gmx(dot)net>
To: Tom Lane <tgl(at)sss(dot)pgh(dot)pa(dot)us>
Cc: Josh Berkus <josh(at)agliodbs(dot)com>, pgsql-advocacy(at)postgresql(dot)org, Marc Fournier <scrappy(at)hub(dot)org>
Subject: Re: [GENERAL] MySQL worm attacks Windows servers
Date: 2005-01-30 21:16:50
Message-ID: 200501302216.51730.peter_e@gmx.net
Views: Raw Message | Whole Thread | Download mbox | Resend email
Lists: pgsql-advocacy pgsql-general pgsql-www

Tom Lane wrote:
> > Is there any reason not to set up a "security(at)postgresql(dot)org" mail
> > alias?
>
> Probably not --- Marc, do you want to do that (and make it point to
> pgsql-core for now)?

I think this is a good idea. But note that mail addressed to pgsql-core
will be held up in the moderator queue. I'm not sure that we want that
for mail addressed to security(at)(dot)

--
Peter Eisentraut
http://developer.postgresql.org/~petere/


From: Tom Lane <tgl(at)sss(dot)pgh(dot)pa(dot)us>
To: Peter Eisentraut <peter_e(at)gmx(dot)net>
Cc: Josh Berkus <josh(at)agliodbs(dot)com>, pgsql-advocacy(at)postgresql(dot)org, Marc Fournier <scrappy(at)hub(dot)org>
Subject: Re: [GENERAL] MySQL worm attacks Windows servers
Date: 2005-01-30 21:30:53
Message-ID: 22859.1107120653@sss.pgh.pa.us
Views: Raw Message | Whole Thread | Download mbox | Resend email
Lists: pgsql-advocacy pgsql-general pgsql-www

Peter Eisentraut <peter_e(at)gmx(dot)net> writes:
>> Probably not --- Marc, do you want to do that (and make it point to
>> pgsql-core for now)?

> I think this is a good idea. But note that mail addressed to pgsql-core
> will be held up in the moderator queue. I'm not sure that we want that
> for mail addressed to security(at)(dot)

That's something that can and should be dealt with behind the scenes,
though. The immediate point is to agree on having this alias.

I'm about to commit documentation updates into all the upcoming release
branches recommending security(at)postgresql(dot)org for security-sensitive
reports.

regards, tom lane


From: "Marc G(dot) Fournier" <scrappy(at)postgresql(dot)org>
To: Tom Lane <tgl(at)sss(dot)pgh(dot)pa(dot)us>
Cc: Josh Berkus <josh(at)agliodbs(dot)com>, pgsql-advocacy(at)postgresql(dot)org, pgsql-general <pgsql-general(at)postgresql(dot)org>
Subject: Re: [GENERAL] MySQL worm attacks Windows servers
Date: 2005-01-30 21:49:54
Message-ID: 20050130174945.J92643@ganymede.hub.org
Views: Raw Message | Whole Thread | Download mbox | Resend email
Lists: pgsql-advocacy pgsql-general pgsql-www

On Sun, 30 Jan 2005, Tom Lane wrote:

> Josh Berkus <josh(at)agliodbs(dot)com> writes:
>>> We don't really have an official security contact. The next best thing
>>> is to send such reports to pgsql-core, which is not an open list, but
>>> will reach a good chunk of those with an interest in fixing such
>>> problems.
>
>> Is there any reason not to set up a "security(at)postgresql(dot)org" mail alias?
>
> Probably not --- Marc, do you want to do that (and make it point to
> pgsql-core for now)?
>
> I was just in the middle of adding notes to problems.sgml and
> bug.template to tell people to send security issues to pgsql-core,
> but I can make it say security@ instead.

Consider it done ...

----
Marc G. Fournier Hub.Org Networking Services (http://www.hub.org)
Email: scrappy(at)hub(dot)org Yahoo!: yscrappy ICQ: 7615664


From: Greg Stark <gsstark(at)mit(dot)edu>
To: pgsql-general(at)postgresql(dot)org
Subject: Re: [pgsql-advocacy] MySQL worm attacks Windows servers
Date: 2005-01-30 23:05:37
Message-ID: 87brb6seke.fsf@stark.xeocode.com
Views: Raw Message | Whole Thread | Download mbox | Resend email
Lists: pgsql-advocacy pgsql-general pgsql-www


Dawid Kuroczko <qnex42(at)gmail(dot)com> writes:

> > Why only -core?
>
> I think it is in good taste that when you find a bug/vulnerability/etc
> first you contact the author (in this case: core), leave them some
> time to fix the problem and then go on announcing it to the
> world.
>
> I think it is perfectly reasonable!

In case there are some that are not aware, this is a matter of some
controversy. Many people believe it better to disclose vulnerabilities
publicly.

There are always ways for a sysadmin to close the vulnerability, even if it
means temporarily limiting access until the fix is available. How would you
like to be a sysadmin that finds his system exploited only to discover that
the vulnerability was known and he could have worked around it had he been
informed but those in the know kept it secret until a patch was published.

The only way keeping it secret is really justified is if a) You know no
malicious persons are aware of the vulnerability (which of course one never
really knows for certain) b) it's more reasonable for a sysadmin to run with
the vulnerability than to work around it using whatever means necessary (and
you feel comfortable making that decision for every sysadmin everywhere).

There are certainly others that disagree but I think history shows that when
vulnerabilities are disclosed in full sysadmins can react more effectively and
vendors release fixes faster and the net result is fewer compromises and
better software.

Of course in this case the argument that Postgres would have responded quicker
had the vulnerability been known is almost certainly baseless. And it may turn
out to be the case that there were no compromises because not a single
malicious user knew about the hole. It doesn't always work out that way
though.

--
greg


From: Martijn van Oosterhout <kleptog(at)svana(dot)org>
To: Greg Stark <gsstark(at)mit(dot)edu>
Cc: pgsql-general(at)postgresql(dot)org
Subject: Re: [pgsql-advocacy] MySQL worm attacks Windows servers
Date: 2005-01-31 00:05:13
Message-ID: 20050131000512.GD13273@svana.org
Views: Raw Message | Whole Thread | Download mbox | Resend email
Lists: pgsql-advocacy pgsql-general pgsql-www

On Sun, Jan 30, 2005 at 06:05:37PM -0500, Greg Stark wrote:
> There are always ways for a sysadmin to close the vulnerability, even if it
> means temporarily limiting access until the fix is available. How would you
> like to be a sysadmin that finds his system exploited only to discover that
> the vulnerability was known and he could have worked around it had he been
> informed but those in the know kept it secret until a patch was published.

While true, I think an argument can be made to notify as many people as
possible and posting to -core means a message is more likely to go
-announce where more PostgreSQL admins will see it. It's possible not
all admins will be reading -general.

> The only way keeping it secret is really justified is if a) You know no
> malicious persons are aware of the vulnerability (which of course one never
> really knows for certain) b) it's more reasonable for a sysadmin to run with
> the vulnerability than to work around it using whatever means necessary (and
> you feel comfortable making that decision for every sysadmin everywhere).

Sure. Actually for something as obvious as trusting network access I'd
actually assume the person posting it would be smart enough to point
out the solution as well. While I'm for public disclosure in general I
do think 24 hour notice is not too much to ask for.

And hey, given the volume of -general sending to security@ might get it
read a little earlier by people who can do something than just dumping
on the mailing list. My preferred scenario would be to actually ring
someone in -core on the phone and discuss it directly and work it out
from there. But I don't know the chances of that.

At the end of the day the people making the disclosure make the
decision, our discussing it won't make a difference there... :)

Have a nice day,
--
Martijn van Oosterhout <kleptog(at)svana(dot)org> http://svana.org/kleptog/
> Patent. n. Genius is 5% inspiration and 95% perspiration. A patent is a
> tool for doing 5% of the work and then sitting around waiting for someone
> else to do the other 95% so you can sue them.


From: Jan Wieck <JanWieck(at)Yahoo(dot)com>
To: Peter Eisentraut <peter_e(at)gmx(dot)net>
Cc: Dawid Kuroczko <qnex42(at)gmail(dot)com>, Neil Conway <neilc(at)samurai(dot)com>, Josh Berkus <josh(at)agliodbs(dot)com>, pgsql-advocacy(at)postgresql(dot)org, Chris Travers <chris(at)travelamericas(dot)com>, pgsql-general <pgsql-general(at)postgresql(dot)org>
Subject: Re: [GENERAL] MySQL worm attacks Windows servers
Date: 2005-02-06 15:33:30
Message-ID: 420638CA.8030601@Yahoo.com
Views: Raw Message | Whole Thread | Download mbox | Resend email
Lists: pgsql-advocacy pgsql-general pgsql-www

On 1/30/2005 10:18 AM, Peter Eisentraut wrote:

> Dawid Kuroczko wrote:
>> I think it is in good taste that when you find a
>> bug/vulnerability/etc first you contact the author (in this case:
>> core), leave them some time to fix the problem and then go on
>> announcing it to the
>> world.
>
> In this case, core is not the author of the object in question. And of
> course, to report a "bug/vulnerability/etc" you would write to
> pgsql-bugs, not core.
>

No, Peter.

Posting a vulnerability on a public mailing list "before" there is a
known fix for it means that you put everyone who has that vulnerability
into jeopardy. Vulnerabilities are a special breed of bugs and need to
be exterminated a little different.

Jan

--
#======================================================================#
# It's easier to get forgiveness for being wrong than for being right. #
# Let's break this rule - forgive me. #
#================================================== JanWieck(at)Yahoo(dot)com #


From: "J(dot) Greenlees" <jaqui(at)telus(dot)net>
To: pgsql-advocacy(at)postgresql(dot)org, pgsql-general(at)postgresql(dot)org
Subject: Re: [GENERAL] MySQL worm attacks Windows servers
Date: 2005-02-06 16:56:49
Message-ID: 42064C51.1020509@telus.net
Views: Raw Message | Whole Thread | Download mbox | Resend email
Lists: pgsql-advocacy pgsql-general pgsql-www

Jan Wieck wrote:
> On 1/30/2005 10:18 AM, Peter Eisentraut wrote:
>
>> Dawid Kuroczko wrote:
>>
>>> I think it is in good taste that when you find a
>>> bug/vulnerability/etc first you contact the author (in this case:
>>> core), leave them some time to fix the problem and then go on
>>> announcing it to the
>>> world.
>>
>>
>> In this case, core is not the author of the object in question. And
>> of course, to report a "bug/vulnerability/etc" you would write to
>> pgsql-bugs, not core.
>>
>
> No, Peter.
>
> Posting a vulnerability on a public mailing list "before" there is a
> known fix for it means that you put everyone who has that vulnerability
> into jeopardy. Vulnerabilities are a special breed of bugs and need to
> be exterminated a little different.
>
>
> Jan
>

ain't that the truth.
if a vulnerability is found, try to find a fix, or work around, post it
privately to the developer, give them an opportunity to get it fixed
before going public.

when dealing with open souurce, this system works great.
when dealing with proprietary / closed source [ specifically microsoft ]
expect that it's the public announcement that's going to start them
doing something about it.

I personally would only give ms a week at most to fix the problem before
going public.
since open source if usually fixed in that time frame.

Jaqui


From: Greg Stark <gsstark(at)mit(dot)edu>
To: pgsql-general(at)postgresql(dot)org
Subject: Re: [pgsql-advocacy] MySQL worm attacks Windows servers
Date: 2005-02-06 21:31:49
Message-ID: 87wttliddm.fsf@stark.xeocode.com
Views: Raw Message | Whole Thread | Download mbox | Resend email
Lists: pgsql-advocacy pgsql-general pgsql-www


Jan Wieck <JanWieck(at)Yahoo(dot)com> writes:

> No, Peter.
>
> Posting a vulnerability on a public mailing list "before" there is a known fix
> for it means that you put everyone who has that vulnerability into jeopardy.
> Vulnerabilities are a special breed of bugs and need to be exterminated a
> little different.

Many people disagree with this. Posting the vulnerability isn't what puts
people into jeopardy, the presence of the vulnerability puts people in
jeopardy. Posting it at least allows people to disable the feature or close
off access. Or at least monitor for possible intrusions. Not posting it leaves
people in jeopardy and in the dark about it.

If you think you're the first one to find the vulnerability you're probably
wrong. Often malicious hackers who search for vulnerabilities find them and
keep them secret long before they're reported.

How would you feel if your system was compromised and then you found out later
that it was a known security hole in a feature you had no need for and the
vulnerability had been kept secret?

This is really the wrong place to have such a debate. This is a long-standing
debate and one that you should at just recognize exists. Don't present one
side as dogma.

--
greg


From: Jan Wieck <JanWieck(at)Yahoo(dot)com>
To: Greg Stark <gsstark(at)mit(dot)edu>
Cc: pgsql-general(at)postgresql(dot)org
Subject: Re: [pgsql-advocacy] MySQL worm attacks Windows servers
Date: 2005-03-07 14:35:28
Message-ID: 422C66B0.2010907@Yahoo.com
Views: Raw Message | Whole Thread | Download mbox | Resend email
Lists: pgsql-advocacy pgsql-general pgsql-www

On 2/6/2005 4:31 PM, Greg Stark wrote:

> Jan Wieck <JanWieck(at)Yahoo(dot)com> writes:
>
>> No, Peter.
>>
>> Posting a vulnerability on a public mailing list "before" there is a known fix
>> for it means that you put everyone who has that vulnerability into jeopardy.
>> Vulnerabilities are a special breed of bugs and need to be exterminated a
>> little different.
>
> Many people disagree with this. Posting the vulnerability isn't what puts
> people into jeopardy, the presence of the vulnerability puts people in
> jeopardy. Posting it at least allows people to disable the feature or close
> off access. Or at least monitor for possible intrusions. Not posting it leaves
> people in jeopardy and in the dark about it.
>
> If you think you're the first one to find the vulnerability you're probably
> wrong. Often malicious hackers who search for vulnerabilities find them and
> keep them secret long before they're reported.
>
> How would you feel if your system was compromised and then you found out later
> that it was a known security hole in a feature you had no need for and the
> vulnerability had been kept secret?

It's interesting that everyone advocating for "immediate public report"
is allways talking about vulnerabilities that can be taken care of by
disabling some unused feature. What do you do if you find a
vulnerability in the text/varchar data type multibyte handling? Still
tell the world about it before having a fix?

Jan

--
#======================================================================#
# It's easier to get forgiveness for being wrong than for being right. #
# Let's break this rule - forgive me. #
#================================================== JanWieck(at)Yahoo(dot)com #