![]() |
Quote:
@marco adding fuel to fire should be left to trolls ;) thanks jammiegirl for a level headed approach :D as mentioned hopefully this can be avoided in the future |
Quote:
Quote:
You're welcome...I try!:D Hehe...you called me "jammiegirl"...how cute!:D |
Quote:
|
Quote:
vbulletin.org do not own/control/write the modifications so they advise you to uninstall - whether you take that advice is entirely up to you. Quote:
|
Wouldn't it be much better for the people involved to do this:
1) Modification is reported with an exploit and it is verified. 2) Staff member puts a "Exploit found" flag on the modification. Within a notes field, the staff member can document the exploit and add any other necessary comments. When they save it, an email is fired off to the Author(s) of the addon. 3) The flag above also puts a notice on the addon and prohibits new users from downloading it until a new version is uploaded by the author. People who have already marked it as installed can still download it but a warning is shown on the first post in nice bright, eye-catching letters. This could also send the email out to users who have installed it. The text of which could be modified to something like: Quote:
4) Staff looks at new version, if okay then flag is removed and everyone goes about their merry business. This would prevent moving addons to the "graveyard", give authors time to fix the problem and not make the exploit available to new users. Current customers can continue to get support. Addon authors keep their work and such and less work overall for the staff here. Seems likes it would be win-win-win all-around. It seems most of this system is in place. Just a little different way of handling it |
Quote:
|
That would be much better but as the author I still want to have the opportunity to FIX the issue and send the security issue message at the SAME TIME. Rather than leaving users waiting for a fix! If I don't update it yeh sure send the message but the opportunity needs to be there.
|
i think wayne should be running things here because his ideas make alot more sense than whats happening right now
|
Please leave the install .txt file on graveyarded modifications and a list of files that would have been added to the server and their location.
If it's a file that causes the problem, then by removing the plugin only will not stop the risk, IMO. |
Quote:
|
Quote:
i have just ran into a problem uninstalling one in the graveyard, i uninstalled but it left a graphic behind that now i cannot find how to remove, searching for it in templates does not find it and the thread is locked so i cant ask questions and its a hack so vB.com wont support my problem come on vB.org, this was not thought through :confused: |
Quote:
|
Quote:
|
@quiklink;
ok, so WILL you uninstall vbulletin if it had a security issue? yes or no? will you uninstall a hack or no? please don't answer! Why don't Jeloft inform me about security issues when discovered but only when they have published the fix? Do you feel the same way about vbulletin as a standalone product? You have to understand the issue was reported privately hence no one knows about it (or very few) so the author has the opportunity to fix it and tell users at the same time. Now if someone made the security issue public, fair enough you would inform as many users as possible, since someone will now try to exploit the issue no doubt. Now if you ask users to uninstall mods, e.g. if you had articles mod, six months later there is a security issue, by now the site might have plenty of articles etc and on uninstall everything will be lost, would you want that? you have to understand not everyone is technically minded or even simple things like uninstalling or disabling would mean the same thing to them... as always there are pro/cons to every procedure. |
Quote:
Quote:
Quote:
Quote:
Quote:
|
Quote:
So its fine for Jelsoft not to inform its users but not me? you don't seem to make sense, you are asking me to inform all my hack users, then why not Jelsoft? Quote:
Quote:
Quote:
Quote:
I'm sorry for using Jelsoft as a example I'm sure theres more out there. |
Quote:
@Sniper: I'd focus your arguments on staff and not get sidetracked by posts from members, for what my opinion is worth :) |
Quote:
its a shame there are narrow minded people out there...doh. |
Quote:
|
Quote:
Quote:
Quote:
Quote:
Quote:
Quote:
I've been programming for better than 20 years and I'm quite aware that stuff happens and vulnerabilities occur. It's a fact of life when programming. What I have an issue with are those coders who are willing to leave their users hanging and at risk rather than notify them immediately of the risk and then working to get a fix out as fast as possible. That's just plain irresponsible. I have a lot more respect for the coder who thinks of their users first and their reputations second. |
Quote:
You were defending Jelsoft policy. Since you don't work for them, doing much more than noting your opinion on the subject and moving on, isn't very productive to the discussion. |
Quote:
I have yet to see a reasonable justification for leaving the mod users vulnerable to attack. |
Quote:
1) Calling attention to a vulnerability before a fix is available actually increases the risk to the end-user. 2) Not giving clear instructions, but simply saying 'disable' or 'uninstall' will likely not remove the vulnerability is many cases, since file edits and template edits may have been made. 3) Sending these notices out over and over again, as is starting to happen now, creates an atmosphere in which the users will simply begin to ignore them, once again increasing their risk. Now, if a fix is not provided by the author within a reasonable time frame, then pulling the hack and notifying the users is the only logical choice. But, it is not the best choice as a first line of defense. There are reasons why Jelsoft and other companies don't operate that way. It is logical to assume they don't want to harm their customers because that's bad for business. So to believe that the policy being used here is the correct policy, you have to believe that everyone else in the industry got it wrong. |
Quote:
Quote:
Quote:
Quote:
Quote:
Sorry but all I am seeing from this is an attempt by the mod developers to cover their reputations at the risk and expense of the user. |
Quote:
|
Quote:
If a hack is marked as a security risk, the files should still be left so people can deal with the above issues. If they install it to use normally, that's their own bloody fault as they don't read or listen to the risks. Can someone from vB.org please let me know if this will be possible? |
If news of an exploit has been made public (by whatever route) and the modification moved to the GY, then the files will no longer be downloadable. This means all files in the thread, we cannot seperate out individual files because they happen to be instructions - in most cases there is only one zip file anyway (containing everything).
|
Quote:
|
Well, they are advised to disable/uninstall it. If they don't do that, it's their problem really.
IMHO it's better to inform users imediately rather than having them run vulnerable code without knowing. If they know, they can take appropriate actions - if they don't they cant. |
As a user of a lot of modifications on this site, I say that we should be warned of the problem with a modification as soon as the problem is highlighted. If we then opt to still use the affected modification and something happens to our site then this is our problem but if we disable or remove it then we know that we are safe.
Imagine for a minute that you buy a tin of beans from a shop. Now the next day the manufactorer finds that a bit has broke off the machine. They check the batch numbers of the beans produced since the last known time that the piece was there and then issue a recall notice with the product, description, and batch details and tell you not to eat them. Now in the same way, vB.org has told us about the product and the version that is affected by security issues. This is something that needs to be done right away. Proper testing of modifications before they are released to the trusting non-coders should be done by the coders to make sure that this doesn't happen, although there will always be some that get through anyway. Coders then can fix the problem, or not, as they decide while the people using the modification can see it, or not, at their own risk as they are aware that there is an issue. Really it's like everything - if you know something is dangerous would you still do it? If going down a mountain do you take the path, the cable car or jump from the top? If you opt for the cablecar then find out that the cable is frayed, would you still use it while waiting for it to be fixed? |
Quote:
Nothing on this site will kill you. |
But it might kill the data that took you years to get on your site.....
|
Quote:
Our priority is to protect our members. Can we find a balance between protecting members and making our coders happy? We are discussing the matter. I would like to hear more SOLUTIONS - instead of what's better and for whom it should favor. Who knows .. it may be something we haven't thought about. |
Quote:
|
One of the improvements we are currently discussing (and i think this has already been mentioned in this thread) is if we can give a more tailored advice based on the type of vulnerability and the modification in question to the users. This might however not be possible as we can not be aware of all the ins and outs of a modification and how to block only access to vulnerable locations in the modification.
|
<i>This is just my opinion, but I think the current solution is acceptable.</i>
|
asking users to disable is fair enough but no doubt the same doesn't apply to hacks which require file uploads as mentioned before.
I would rather, considering the mods are are aware of the issue, when sending out the email suggest a temp fix. e.g. The vulnerability has been discovered for hack xx, in order to fix the the vulnerability please follow these steps (write steps) or disable the product and wait for the author to upload the fixed version. I can understand it would not be possible if there are many locations within the code but if its only two or three, it isnt much work. |
Suggestion:
Though, this provides more information about the type of vulnerbilitie - information that could be abused for searching the vulnerbilitie and exploiting it. |
MY SOLUTION: a PR technician...
one of the guys upthere is reserved for community/coders contacts... that person is the one to contact coders when something goes wrong with any code, that person also is the one moderating these releases when things go wrong... if the author can't be reached, the hack is stored and members alerted. if the author is reached, the PR guy is the one to contact the coder, in the minute a exploit/problem is found, and if a solution come, they all update the release... i would suggest 24 hours, but as said earlier, usually when an exploit is found the solution came with it... we all know how to code here!... there is 2 switches actually: 1- problem fixed: we alert everybody who have downloaded the hack to update 2- problem not fixed / author unreached: we alert everybody who download to disable the tool it's just a question of what to say to everybody... not only the ones who clicked the INSTALL button... i never click these, and i downloaded most of the hacks released here... maybe i would miss the alert. when Ford have to recall the entire line of a car, they do not contact only the persons who signed a newsletter, they contact all the buyers, and even make an announcement in the News... |
Quote:
|
All times are GMT. The time now is 02:33 AM. |
Powered by vBulletin® Version 3.8.12 by vBS
Copyright ©2000 - 2025, vBulletin Solutions Inc.
X vBulletin 3.8.12 by vBS Debug Information | |
---|---|
|
|
![]() |
|
Template Usage:
Phrase Groups Available:
|
Included Files:
Hooks Called:
|