![]() |
Quote:
You have some good suggestions, but adding to the inaccurate and inflammatory rhetoric of some others in this thread is not helpful. BTW: For what it's worth, I've been a professional programmer for 25+ years and written security procedures for major companies. If any of my advice gets me onto your no-hire list, then I'd consider that a positive thing. |
Quote:
It would be like a food processor saying 'lets wait a day or two and see if we can find the problem and get it fixed before we notify the public that our food has been contaminated. I doubt anyone will get sick'... Nobody likes to admit there is a problem, and yes it might even have a financial impact if you are selling the product. But you have an obligation to notify those who are at risk as soon as you find out about it. |
Quote:
As far as your recommendation of a delay, there is nothing positive about a delay period... Both the Author and end user should be informed as soon as the vulnerability is known. Its not your decision as a programmer whether the client wants to disable or remove the hack while you are coming up with a solution, but it is your responsibility to inform then about the vulnerability. Asking for vBorg to delay an announcement is doing just that. I've yet to see anyone provide one positive thing about a delay to the end user. Giving the programmer 24 hours to work on the solution before the end user is informed is NOT a positive thing. The only thing that a delay does is give the author time to work on the fix while the client doesn't know about it and sits there vulnerable. It seems like the attitude from some is "Who Cares about the client, its just one more day". Hambil, this is the point where we need to agree to disagree, cause Im not about to get into a pety argument with you over this. I made my recommendations and they included all 3 parties involved (Programmer, Client and vBorg). btw, for those that took my thread personal (since I wasn't pointing out anyone personally), you may want to take a long look in the mirror tonight as it obviously hit home. |
Quote:
Quote:
|
Quote:
|
Quote:
|
Quote:
I ask once again, who are you to decide upon the security of the end user's system? It is up to them to decide whether or not to continue to use the mod or to disable it or to uninstall it. I don't care who you have worked for or what you have written. I've been in this field just as long and sorry, I've never worked for any company willing putting themselves at further legal risk by not informing a customer of a security flaw immediately. Why? Because the notification can help limit potential damages that might arise should a breech occur due to the flaw. As for the slander comments, thanks for the laugh! Oh and it would be libel, not slander... |
Quote:
|
Quote:
I take it since you are so personally consumed with how I feel about this, you are feeling guilty otherwise you wouldn't be responding as such as It wouldn't pertain to you. I gave 7 recommendations (as requested by the vBorg Staff) that covered End users, Programmers and Vborg Staff and one of them is something that you don't like. Oh well. I highly doubt that vBorg is going to delay notification to end users because they understand the importance of security vulnerabilities and won't put themselves in a compromising position just to benefit the personal agenda of a few unprofessional hackers. Quote:
|
Quote:
1) Notification of a security flaw before a fix is available can actually help inform those who wish to do harm. This is why vBulletin.org has already changed the wording of the notification sent to be generic, instead of specifically stating the security flaw (as they did when I first got involved in this conversation). Why would they make such a change unless there was a danger inherent in the proliferation of knowledge about security flaws? They wouldn't, period. So, you may disagree with me on the details of this, but to call the idea that spreading information of security vulnerabilities carelessly is not dangerous unprofessional, is well... as I said - unprofessional. link Quote:
I could list several more reasons, and have already, but that one alone should be enough to show the subject is debatable - at least to anyone who is still being rational. @quiklink: slander, liable, either way it is wrong, and people on this board have been reprimanded for it before. I have not notified any staff or asked for their involvement, yet, because I am hoping you are mature enough to see the light on your own. Quote:
|
Quote:
Quote:
Quote:
Quote:
|
Quote:
|
Quote:
In addition, many more things are being discussed in this thread other than just to delay or not delay. That decision may be made for now, but we all seem to agree the process in general needs work, and probably will continue to need work and improvement. Discussion is good for that. |
I agree. It just seems that several people keep going back to whether or not users should be immediately notified when an exploit is discovered; I just wanted to make it clear that a decision on the matter was made, and it would therefore be better if they moved on to the other issues at hand.
|
Quote:
1.- First of all I nowhere wrote that you're not a good coder, or you dont have knownledge. What I wrote (in my other posts too), is that you don't have experiance to see deeply a situation. 2.- As for the photo, even if I believe that a photo is 1000 words, it's something that I wasn't the first one got this opinion. There is a post in my site, much more before my post, where someone has the same opinion. And finally a profile (anywhere) is for giving a general view for the person. |
as a Member or User:
i wish to be informed of a vulnerabilty... please and also i wish a little more information about the vulnerabilty: will it destroy the Server ? will it destroy the database ? will it destroy then vBulletin ? will it destroy the mod ? will it ..... ? or ist there only a theoretical chance that some one can inject or whatever without showing the real vulnerability. So i have a better chance to deside to deactivate, deinstall, or close my whole system thanks Alfred |
Quote:
https://vborg.vbsupport.ru/external/2007/07/5.jpg This is getting a little childish and unnecessarily personal not to mention approaching irrelevancy. Back to the subject at hand, as someone said there are good reason to notify before a fix is issued and afterwards and it's perfectly possible to take a strong and valid stance either way. I don't particularly agree with being subject to stricter standards than vBulletin themselves (or at least I think those who have marked their modifications as supported could be given an immediate opportunity to do so) but that's OK. It's not unreasonable. I think the most obvious change that could be made is allowing the modification authors (only) to post in the graveyard thread, which is a simple default switch to be flicked. They can then provide whatever information necessary if they so wish. If they don't, no problem. |
Well, this is most probably for Coder's Forum but as I rejected that title, I'm posting it here as it's relative to this thread.
Everything is ok, most posts are under logic, but seems that all we forgot something. That part about "Reported by a Member". And I'm wondering: "Has an average member the knowledge to check a mod for security risks? In my opinion checking for security risks it's much more difficult than programming. So, the reporter is not the average enduser who downloads the mod for his own use, but is a coder who download it for ....what really?" I thought about it seeing where my security risk was for vbDigiShop. It was in the file which hundles the post back from the payment gateway. So someone gave special attention to that file for one of the following reasons:
|
Maria,
Please calm down now. Quote:
A coder is also a regular member on this forum, as opposed to a staff member. Why the focus on who reported it? How does this knowledge help you or the users? In my view it is a non-issue who was the person that reported a vulnerability, all that counts is that someone found a possible vulnerability and took the time (luckily) to bring it under the attention of us so we can take actions to get things resolved. The result is all that counts. You (and the users of your work) should be glad that someone took the time. Quote:
Also you seem to have been jumping to some conclusions about how this person found the vulnerability and his intentions. I have no proof whatsoever that this person was trying to break your copyright. If you have such proof, please let me know and i will review this. You seem to forget that we also have members that maybe consider installing a modification on their site and have the habbit of first checking the code before putting any third-party coding on their website. |
Quote:
|
Quote:
Make a simple google search for "reporting vulnerabilities" and you'll find it as many other useful information. Among the others (there are real examples there) the Reporter (who can never been anonymus) must give details like:
|
Quote:
|
Just a random article as an example:
http://www.cerias.purdue.edu/weblogs...s-law/post-38/ |
Quote:
As for reviews - please show us this "review" law you refer to, becasue there is no such thing I know of (apart from which no review has been published anyway). |
Quote:
Quote:
|
Quote:
So, if a vulnerability of an mod is reported and i receive a e-mail to deinstall the mod, my decision must be, to deinstall the whole vBulletin itself ! Because i do not know and can not decide if the vulnerability of the mod also breaks (or has broken) a leak in vBulletin itself :eek: So, if you are not willing to give any (also low) detail to vulnerability of a modification - so as a part of informing the customers i appreciate to hear a loud and clear opinion that after deinstalling the mod (or what ever is to do) it has no harm to vBulletin and the system itself. Thats only a point of view from a customer... |
Quote:
|
Quote:
|
Quote:
|
Quote:
|
Quote:
Further, one need not modify your code to see that it contains vulnerabilities... |
Quote:
http://dictionary.cambridge.org/defi...7665&dict=CALD review verb [T] 1 to consider something in order to make changes to it, give an opinion on it or study it:If someone is looking into code, then obviously the word 'review' is used in the above meaning. 2 If critics review a book, play, film, etc. they write their opinion of it:This is the type of review that you are aiming your angre at. Nothing like that happened on this website. |
I have mentioned in the thread earlier that I have seen changes over the years on vb.org and how things ebb and flow
however what has been shown in this thread is how people with authority respond and their autocratic manner. At one point this thread had reached a solution and I recall posting, thanking everyone for making progress, since then it seems to have become a dog's breakfast which highlights the joys of such forums where so many persons with opinions get involved it also seems as though microhellas has certain gripes relating to the way she has been treated over time by vbulletin staff and its representatives and feels that she has been unfairly treated on a number of occasions, to her this may be perception however only time will show. It makes me wonder whether one can ask whether vbulletin have plans to launch add-ons very similar to what microhellas has already put out? because if this is indeed so then I suppose she had reason for her gripes only time will tell as for this thread, for me I have seen enough and actually don't really care much as its better the devil you know than the one you don't know mazel tov |
Quote:
|
This thread now seems to be moving into the realms of fantasy, vbulletin.org do not treat reports of an exploit in any modification differently beacuse of some vague possible future clash with a potential/posible/maybe future Jelsoft product, that's just ridiculous.
The last few pages of this topic have gone nowhere really (just in circles) and it's heading towards closure. |
it reached its climax around page 4 or 5 when Wayne Luke gave a solution
thereafter we have had a clear display of various behaviour from both sides no matter what one side may think |
Quote:
|
I just will like to say that i never install a hack to my board before checking the code. I also first install all mods to my test server and check possible bugs etc before making any change on my live server. Therefore i review all the codes i have in my board ( expect vBSEO because the code is not visible ) . The only point in here is there has been a vulnerability found in a coders mods. The coder also sell the same products . Because the vulnerability found in her mod and also her coding structure is not similar to vBulletin way she loose some money because of possible angry customers. And then she comes here and throws her anger all around which i believe she has no right to do. Because this site is based on sharing and the staff also have a responsibility about the members since lots of users data are on danger. The procedure can be developed but i believe the key point shall only be protecting members.
|
Quote:
I'm off on holiday now so my last action before leaving is to close it. |
All times are GMT. The time now is 07:53 PM. |
Powered by vBulletin® Version 3.8.12 by vBS
Copyright ©2000 - 2025, vBulletin Solutions Inc.
X vBulletin 3.8.12 by vBS Debug Information | |
---|---|
|
|
![]() |
|
Template Usage:
Phrase Groups Available:
|
Included Files:
Hooks Called:
|