The problem is that virtually no legit users will ever look, but the
hackers 
definitely will.  I'll admit (being a geek) that I checked once when
logging 
into my banking site for the first time many years ago.  So maybe I was 
'benefitted' that one time (and my case is definitely not typical), but
the 
hackers could be 'benefitting' over and over with internal knowledge.  

The same arguments (showing that I'm trustworthy) could be made for
posting 
company network diagrams, physical site security procedures, backup
courier,
etc, but nobody does that.  

The risk/reward ratio doesn't justify giving the information out in my
opinion.


[EMAIL PROTECTED] wrote on 08/21/2006 03:15:33 PM:

> 
> > The OP, however, is right.  Why report the version at all to the
user of
> > a website?  There is no need to let them know you are even running
> > OpenSSL let alone the version being run.  I'm not talking about
security
> > through obscurity.  I'm referring to common sense.  Don't tell
people
> > what you are running unless it is absolutely necessary for proper
> > operation.  Since version information is "metadata", it is not
necessary
> > for the proper operation of OpenSSL.  The only thing it does is
waste a
> > few bytes of bandwidth every time someone connects.  Just a thought.
> 
>    We've come along way from the time when banks posted their reserve
ratios
> in the window.
> 
>    If you have fixed the latest vulnerabilities, why would you want to
keep
> this a secret from the people you are asking to trust you? And if you
have
> not, what right do you have to keep that secret? The main reason you
run SSL
> is because you are going to ask other people to trust you with their
> personal data.
> 
>    It comes down to that fundamental question, "why should I trust
you?" If
> the answer is because you do things securely, fixing vulnerabilities
and
> choosing proven products, why should that need to be a secret? And if
a new
> vulnerability appears and you haven't had a chance to fix it yet,
shouldn't
> I at least have a chance to know that before I trust you with
sensitive
> information?
> 
>    Security through obscurity is wrong for more than just one reason.
But a
> big one is that it robs the people you interoperate with of the chance
to
> judge for themself whether you are trustworthy. They may just find
someone
> else who is more transparent.
> 
>    So here's my primary answer: suppose a new SSL bug is discovered.
It's
> fixed in version Y but not version X. I need to put a million dollar
order
> through to your server. What should I do? Should I not give you the
order
> until I can somehow confirm you have version Y? (Which, according to
you, I
> should never be able to do. So in this case you don't get the order.)
Or
> should I just assume you do, because you're typically on the ball?
(Which
> might not be what you want, depending on what the consequences are to
*you*
> if the data leaks to a competitor.)
> 
>    Why force the people you are asking to trust you into such
craziness? Why
> not reassure them, assuming you do things right. And if you do things
wrong,
> is it really in your interest to dupe people into trusting you. Think
long
> and hard about that -- it may not be.
> 
>    DS
> 
> 
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    openssl-users@openssl.org
> Automated List Manager                           [EMAIL PROTECTED]



To find out more about Reuters visit www.about.reuters.com

Any views expressed in this message are those of the individual sender, except 
where the sender specifically states them to be the views of Reuters Ltd.

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to