On Mon, Aug 21, 2006 at 04:15:46PM -0500, Doug Nebeker wrote:
>  
> The problem is that virtually no legit users will ever look, but the
> hackers 
> definitely will.  I'll admit (being a geek) that I checked once when
> logging 
> into my banking site for the first time many years ago.  So maybe I was 
> 'benefitted' that one time (and my case is definitely not typical), but
> the 
> hackers could be 'benefitting' over and over with internal knowledge.  
> 
> The same arguments (showing that I'm trustworthy) could be made for
> posting 
> company network diagrams, physical site security procedures, backup
> courier,
> etc, but nobody does that.  
> 
> The risk/reward ratio doesn't justify giving the information out in my
> opinion.

This discussion is useless:
* OpenSSL does not disclose its version to attackers coming from the
  network as the SSL/TLS protocol does not give any version information
  of the software used (it does give protocol compatibility information
  needed for interoperability wrt SSLv2, SSLv3 etc)
* It is the application using OpenSSL (in this case Apache) disclosing
  the information.
  -> Please complain to the Apache people.
* Both projects OpenSSL and Apache are Open Source projects. If you find
  anything about it annoying please feel free to make any modification
  you want.
* "Meta bullet point":
  This discussion about version information and security through obscurity
  has been seen often enough (have a look into the OpenSSH mailing list
  archives) and it finally leads nowhere.
  I will therefore not comment wrt my personal point of view.

Best regards,
        Lutz

> 
> 
> [EMAIL PROTECTED] wrote on 08/21/2006 03:15:33 PM:
> 
> > 
> > > The OP, however, is right.  Why report the version at all to the
> user of
> > > a website?  There is no need to let them know you are even running
> > > OpenSSL let alone the version being run.  I'm not talking about
> security
> > > through obscurity.  I'm referring to common sense.  Don't tell
> people
> > > what you are running unless it is absolutely necessary for proper
> > > operation.  Since version information is "metadata", it is not
> necessary
> > > for the proper operation of OpenSSL.  The only thing it does is
> waste a
> > > few bytes of bandwidth every time someone connects.  Just a thought.
> > 
> >    We've come along way from the time when banks posted their reserve
> ratios
> > in the window.
> > 
> >    If you have fixed the latest vulnerabilities, why would you want to
> keep
> > this a secret from the people you are asking to trust you? And if you
> have
> > not, what right do you have to keep that secret? The main reason you
> run SSL
> > is because you are going to ask other people to trust you with their
> > personal data.
> > 
> >    It comes down to that fundamental question, "why should I trust
> you?" If
> > the answer is because you do things securely, fixing vulnerabilities
> and
> > choosing proven products, why should that need to be a secret? And if
> a new
> > vulnerability appears and you haven't had a chance to fix it yet,
> shouldn't
> > I at least have a chance to know that before I trust you with
> sensitive
> > information?
> > 
> >    Security through obscurity is wrong for more than just one reason.
> But a
> > big one is that it robs the people you interoperate with of the chance
> to
> > judge for themself whether you are trustworthy. They may just find
> someone
> > else who is more transparent.
> > 
> >    So here's my primary answer: suppose a new SSL bug is discovered.
> It's
> > fixed in version Y but not version X. I need to put a million dollar
> order
> > through to your server. What should I do? Should I not give you the
> order
> > until I can somehow confirm you have version Y? (Which, according to
> you, I
> > should never be able to do. So in this case you don't get the order.)
> Or
> > should I just assume you do, because you're typically on the ball?
> (Which
> > might not be what you want, depending on what the consequences are to
> *you*
> > if the data leaks to a competitor.)
> > 
> >    Why force the people you are asking to trust you into such
> craziness? Why
> > not reassure them, assuming you do things right. And if you do things
> wrong,
> > is it really in your interest to dupe people into trusting you. Think
> long
> > and hard about that -- it may not be.
> > 
> >    DS
> > 
> > 
> > ______________________________________________________________________
> > OpenSSL Project                                 http://www.openssl.org
> > User Support Mailing List                    openssl-users@openssl.org
> > Automated List Manager                           [EMAIL PROTECTED]
> 
> 
> 
> To find out more about Reuters visit www.about.reuters.com
> 
> Any views expressed in this message are those of the individual sender, 
> except where the sender specifically states them to be the views of Reuters 
> Ltd.
> 
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    openssl-users@openssl.org
> Automated List Manager                           [EMAIL PROTECTED]

-- 
Lutz Jaenicke                             [EMAIL PROTECTED]
http://www.aet.TU-Cottbus.DE/personen/jaenicke/
BTU Cottbus, Allgemeine Elektrotechnik
Universitaetsplatz 3-4, D-03044 Cottbus
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to