Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Mozilla The Internet Security

Opera Screeches at Mozilla Over Security Disclosure 208

The Register is reporting that Mozilla's handling of a recent security exploit that affected both browsers has drawn an unhappy response from the Opera team. "Claudio Santambrogio, an Opera desktop developer, said the Mozilla team notified it of a security issue only a day before publishing an advisory. This gave the Norwegian software developers insufficient time to make an evaluation. [...] Santambrogio goes on to attack Mozilla's handling of the issue, arguing that it places Opera users at unnecessary risk."
This discussion has been archived. No new comments can be posted.

Opera Screeches at Mozilla Over Security Disclosure

Comments Filter:
  • by neonmonk ( 467567 ) on Monday February 18, 2008 @06:35PM (#22468448)
    At least Mozilla told them of the issue. I personally don't think it's their ultimate responsibility. Definitely obligated to do something... but imagine the kind of action Opera would have if Microsoft found the security flaw.
  • by moderatorrater ( 1095745 ) on Monday February 18, 2008 @06:38PM (#22468492)
    As far as I can tell, Firefox had a flaw, they fixed it and notified Opera that they had the same flaw the day before Firefox's fix was announced. Sounds to me like the only thing that Firefox did wrong was notice that it affected Opera at all, because if they hadn't Opera would have been left with egg on their face and nothing to bitch about.
  • overreaction (Score:2, Insightful)

    by kongit ( 758125 ) on Monday February 18, 2008 @06:39PM (#22468500)
    While I do not know all of the details behind this I suspect that Mozilla did not have to notify Opera of any bug, in other words they did it as a heads up but were not obligated, I could be wrong though. The article is rather short and does not explain anything. For all I know Mozilla gave Opera the info as soon as they knew it, I highly doubt this, but just from the article it is hard to tell. While Mozilla could have waited, I would bet that people with malevolent intent are not overly concerned with the small Opera user base. I think that the over all the risk to the end user of the Opera browser is not much, and that the developer needs a chill pill. I know that Mozilla is not perfect, but I think that they had a good reason for releasing details about the problem. I do not know the reason, but knowing that there is a problem and that there is an update might make people more inclined to update to the safer version. So Opera fix the problem on your browser too, guess what you can look at Firefox's source code to see how the Mozilla developer's fixed theirs, and the developer with an pineapple stuck up somewhere needs to take a laxative or something.
  • by allcar ( 1111567 ) on Monday February 18, 2008 @06:39PM (#22468502)
    I agree that they probably fulfilled their minimum obligation, but it would be great to see a much higher degree of co-operation between the vendors of minority browsers. By all means attack MS in this way, but play nice amongst the good guys.
  • by rsw ( 70577 ) on Monday February 18, 2008 @06:44PM (#22468550) Homepage
    Let's imagine that the Mozilla developers had modified the release notes for 2.0.0.12 so that it wasn't obvious what they'd fixed. Would that have been any better? Of course not. I can grab the code, diff against 2.0.0.11, take note of the changes, and presumably figure out why they were made. Now I can craft a working exploit against 2.0.0.11. After testing it on Firefox, what's the first thing I might try? How about... see if other browsers have the same problem?

    So keeping in the fix but not mentioning it in the release notes is out. What, then... not patch the flaw? Yeah. Right.

    Opera might be a nifty browser, but apparently its authors are whiny bitches.

    -=rsw
  • by Anonymous Coward on Monday February 18, 2008 @06:47PM (#22468578)
    No, what Mozilla did wrong was immediately announce it in some sort of lameass attempt to smear Opera as being as insecure as Firefox has proven to be.

    Proper security response has always been to NOT release data until the vendor has had a chance to response. Mozilla DIDN'T DO THAT, and released the information anyway.

    The should have given Opera time to fix the flaw BEFORE announcing it to the world.

    If Microsoft did the same thing to Firefox, people would be calling for blood. The same standards should apply to open source projects!
  • Re:Sheesh... (Score:5, Insightful)

    by drinkypoo ( 153816 ) <drink@hyperlogos.org> on Monday February 18, 2008 @06:53PM (#22468620) Homepage Journal

    Opera was only notified the day before a public advisory was published, and since that time the Mozilla foundation have opened most of the bug reports containing exploitation details to the general public. Judging from the emoticons on Opera's blog, the latter action by the Mozilla foundation is the primary issue here, not that they published the advisory.

    I think we all know already that disclosing the exploit is what brings the motivation to fix the hole.

    The fact that they hid the bug reports at all should be enough to make the Opera kids grateful. After all, the Mozilla foundation operates in a pretty open and transparent fashion. The most honest (and destructive) way to go would be to never hide the bug reports.

    But just to cover that old ground once again; when code changes, diffs happen automatically, and people know just precisely what changed. You can be sure that some of those people are malicious hackers looking for new ways to screw us all; there's good money in it. So by hiding the details of the exploit, you make sure that only the more skillful and malicious hackers have the exploit. Does that sound like a good idea to you?

  • by Hatta ( 162192 ) on Monday February 18, 2008 @06:54PM (#22468634) Journal
    Exactly. Not only does this story bring to light the fact that there's a bug in Opera, but it illustrates how Opera prefers to handle security bugs: by covering them up.
  • by sholden ( 12227 ) on Monday February 18, 2008 @06:55PM (#22468642) Homepage
    So mozilla should have left their users open to the big for longer, by delaying the fix so that Opera can catch up?

    Or are you saying they should have released the fix and not mention what it was fixing - making it less likely people would apply the fix (plus it's open source not saying what it's fixing doesn't really keep it secret)?

    Note that mozilla never mentioned Opera in the advisory anyway.

    So what you're really saying is that Mozilla should pass all it's security fixes past Opera and IE and Safari and Konqueror and etc and not release them until all of those competitors have said "OK we've fixed it too".
  • by moderatorrater ( 1095745 ) on Monday February 18, 2008 @06:59PM (#22468698)
    I don't see it as an attack. It sounds like Opera didn't respond to Mozilla's notification at all. In addition, it's not Mozilla's obligation to make sure that Opera's secure, and it is their obligation to be open with the community to the extent that they can be while still being secure. Sometimes waiting to disclose can bite you in the end like it did with php a few months back. Add to that the bullshit excuse that you can't evaluate a security risk in one day and I think that Opera's just lashing out because they're embarrassed that they have a security flaw.
  • by Otter ( 3800 ) on Monday February 18, 2008 @06:59PM (#22468702) Journal
    Clearly, the Mozilla team should be performing full regression testing on every bug they fix against every browser known to man.

    I think the point is that they *did* know that this particular vulnerability affected Opera and took their time about telling them.

    It still doesn't seem like a huge deal, but on the other hand if you read what the Opera guy actually wrote, it also doesn't seem like a huge deal. "Screeches" seems a bit excessive.

  • Re:Sheesh... (Score:5, Insightful)

    by NMagic ( 982573 ) on Monday February 18, 2008 @07:03PM (#22468750)
    You know, looking at Mozilla's release, they didn't seem to mention anything to anybody about Opera having a problem too. Looks more like Opera screwed themselves.
  • by pthisis ( 27352 ) on Monday February 18, 2008 @07:08PM (#22468792) Homepage Journal
    I agree that they probably fulfilled their minimum obligation, but it would be great to see a much higher degree of co-operation between the vendors of minority browsers. By all means attack MS in this way, but play nice amongst the good guys.

    Full public disclosure of security bugs is generally considered the best way to get rapid fixes, and was the entire reason that places like BugTraq were founded. Following standard protocol is not an "attack". Vendors like to assume that you're just maliciously publishing things that would be no problem for their users until you did so. That's untrue.

    Many bugs are well-known by black hats before they are found by the good guys. The safest thing for users is to assume that all severe bugs are well-known by the bad guys; when you disclose publically, you give the users a chance to protect themselves even if the software is not yet fixed. I'm not sure of the details of this exploit, but they may be able to protect themselves by limiting their surfing to well-known trusted sites, using an alternate browser, or turning off javascript or whatever. In other cases, some sort of external wrapper or proxy, tighter firewall rules, limiting access to DMZs, or other external steps can help prevent big security problems even without a full vendor fix available yet. It may even be worth it to some users just to forgo using an application for a few days until it's fixed.

    Keeping silent until the vendor fixes things might just hurt the user's security situation, and certainly doesn't give the user the option of evaluating the risk and determining whether it's worth ignoring it or not--it forces them to make their usage decision without good information.
  • Re:Sheesh... (Score:3, Insightful)

    by Jeff DeMaagd ( 2015 ) on Monday February 18, 2008 @07:08PM (#22468798) Homepage Journal
    But allowing only one day is excessive. Can you track down and fix security problems in your software within one day of notification?

    I think we all know already that disclosing the exploit is what brings the motivation to fix the hole.

    You haven't given a specific example of Opera needlessly hiding an exploit.
  • by saltydog56 ( 1135213 ) on Monday February 18, 2008 @07:09PM (#22468812)
    You know, maybe I am blind, or perhaps just a little slow today, but I looked at the actual advisory (did you?) and I see no mention of the fact that the same bug impacted the Opera browser.

    What I seem to get from the article is that a problem was found with Firefox, a fix was developed, and sometime prior to wrapping things up and deploying the fix, someone at Mozilla cared enough about the Internet environment we all share to do a quick regression test of Opera and when a problem was discovered, they PRIVATELY notified the Opera team.

    What more could you ask for in the way of good citizenship?
  • Re:Sheesh... (Score:5, Insightful)

    by moderatorrater ( 1095745 ) on Monday February 18, 2008 @07:09PM (#22468816)
    Unless for some reason they use the same engines, what's the problem with this practice? Opera's security isn't Firefox's responsibility. The fact that they notified opera at all went above and beyond what they needed to do, and asking firefox to be less open with their community is asking them to risk their image for the sake of opera and its users. Unless I'm missing something here, Firefox was being polite and Opera's throwing a world class hissy fit.
  • Re:Sheesh... (Score:5, Insightful)

    by pthisis ( 27352 ) on Monday February 18, 2008 @07:17PM (#22468872) Homepage Journal
    But never hiding bugs is silly. For example, if you provide an strace of ssh crashing, you'd want to mark that private at least.

    Maybe, maybe not. You never know what the black hats already know; as a _user_ of ssh, if you disclose then I can take steps to limit damage--e.g. if I'm allowing full ssh access from outside my network (so that employees can work on the go), I may decide that the small benefit of doing so doesn't merit the risk. I'd rather turn off external ssh access for a few days until there's a fix.

    When you hide the bug, you're hiding the ability for the users to take steps to protect themselves. You're forcing me to run with exposed systems for several days, and hoping that nobody "bad" knows about the bug. And you're making that judgement for your users rather than giving them the ability to make that call themselves; that's almost impossible given that the judgement might hinge heavily on whether I'm a large financial institute or a personal blog site that backs up daily. Just guessing that most users are happy with your security through obscurity is bound to be wrong in some cases, and those cases are likely to be some of the more financially significant ones.

    (That's on top of the pressure to issue a real fix that full disclosure brings. Before things like BugTraq, it was common for people to sit on severe security bugs for literally _years_.)
  • Crap article (Score:5, Insightful)

    by Tridus ( 79566 ) on Monday February 18, 2008 @07:26PM (#22468964) Homepage
    Somebody posting to Slashdot says that somebody at The Register says that an Opera blogger screeches about Mozilla. Even for Slashdot, this is a pretty weak title.

    What they actually say is that they only had a day between notification and public disclosure. He's actually happy that Mozilla told them at all (hence the :) ), but not happy that there was only a day before it was made public. Nobody is particularly happy when they only have a day from learning there's a security hole to everybody else learning about it, thats not enough time to get a fix rolled out, so this is hardly surprising.

    I know Mozilla can do no wrong around here, but come on. Even the Mozilla devs would be happier getting more then one day before public disclosure of a security hole.
  • by saltydog56 ( 1135213 ) on Monday February 18, 2008 @07:28PM (#22468980)
    Attack? How did any of the Mozilla devs attack Opera - from what I can see no public mention was ever made about Opera having the same issue.

    Further, why would you encourage others to "attack MS in this way?" - that is stupid and unprofessional. I am a committed Linux user, in my free time I build and test each kernel snapshot as it is released. Why, because I love to get into the guts of the system.

    Am I a Windows lover? Not really, but I do bring up an XP image from time to time as a guest on my Linux system. I have an older IBook running OSX which is the central core of my music system.

    I even have a system up and running IBM's MVS 3.8 for those days when I really miss the old days of mainframes punch cards.

    Each of these systems has its good points and its bad points, I stick with Linux because I CAN get into the guts of the system. I keep my thumb on the pulse of all these Operating Systems because I love being close to the hardware.

    That said I have NEVER seen any vendor come out and invite an attack on a rival OS by detailing a security hole in public. Balmer may be a fool with his rants on Microsoft's perceived superiority but even he doesn't come out and discuss the details of anyones security issues.

    So why would you encourage it?

  • by Allador ( 537449 ) on Monday February 18, 2008 @07:32PM (#22469012)
    The problem usually isnt coding time. It's organizational response and resource allocation issues.

    For example, Opera is on a very differen timezone from the US, so initial publication may happen overnight from the POV of the Opera staff.

    So then a day starts. When people start their day, they have a pile of things to respond to. The incoming messsages have to be triaged. Someone has to make a decision that this is important enough to escalate or take action on.

    Then you have to find people with the capability to test whether its a real problem. This may take a couple hours. People go on vacation, get sick, etc.

    Then you have to take the time to do the research, test whether this is a real problem, what versions it affects, etc. This takes a couple hours.

    Then yuou have to stop a coder from working on something else, bring them up to speed on the problem (if its not the same person doing the testing), and get them started on the fix.

    Then even with a fix you have to do regression tests. Not sure about Opera, but many mature apps have full test suites that can take a couple hours.

    Then you have to write release notes, update the web page, do a new deploy package, and update your update servers to notify Opera that there is a new update.

    As you can see, very little of the time here is coding.

    Many large orgs have taken steps to create a 'short path of decision making' to streamline this process, always have one coder on call who can do this work, etc. But even then if anything is out of whack or the wrong person is sick or on vacation or on another urgent item, a whole day could pass without response.
  • by Anonymous Coward on Monday February 18, 2008 @07:40PM (#22469086)
    > it's not Mozilla's obligation to make sure that Opera's secure

    True, but surely Mozilla has a moral obligation to ensure that other browsers (and ultimately, users) have as much time as possible to prepare for when the exploit becomes public domain?
  • by WhatAmIDoingHere ( 742870 ) * <sexwithanimals@gmail.com> on Monday February 18, 2008 @07:42PM (#22469110) Homepage
    Yes, because it means that people look HARDER for the bugs in both browsers and release information about them to the public faster, meaning they'll be patched MUCH faster than a bug report sent through some behind the scenes emails.
  • by mdwh2 ( 535323 ) on Monday February 18, 2008 @07:49PM (#22469182) Journal
    Fair enough. I think there are arguments to make on both sides - but whichever one's point of view is, both sides are reasonable positions I think. I just don't understand why one side of the argument here seems to get such contempt, just because Opera's involved.
  • Re:Fanboys (Score:3, Insightful)

    by mdwh2 ( 535323 ) on Monday February 18, 2008 @08:04PM (#22469302) Journal
    Yeah, it's not like Firefox has any fanboys...

    So I took a look at the last story [slashdot.org] about Firefox bugs. And guess what - you have people criticising the person for making the bug public in a way not helpful to the developers [slashdot.org]. And do I hear "crybaby"? No, instead it gets modded up to +4.
  • by Anonymous Coward on Monday February 18, 2008 @08:07PM (#22469316)
    Central to the argument. Open source Firefox has to disclose the fix in order to fix it, closed-source Opera doesn't and the users could be unaware that anything even happened. Side note: Why is the real enemy IE? The enemy of my enemy is not always my friend.
  • by bigdavesmith ( 928732 ) on Monday February 18, 2008 @08:08PM (#22469332)
    Agreed, and I think it's a very poor way to handle the situation, from Opera's side. If I were Mozilla, and got this kind of junk after reporting the bug to them, next time around I wouldn't even bother. Someone at Opera owes someone at Mozilla an apology.
  • Re:Sheesh... (Score:3, Insightful)

    by Jugalator ( 259273 ) on Monday February 18, 2008 @08:25PM (#22469474) Journal

    When you hide the bug, you're hiding the ability for the users to take steps to protect themselves.
    Yes, it's definitely a case of finding an equilibrium when being curteous in giving software developers around the world affected by the same vulnerability a reasonable time to adapt.
  • Re:Opera users (Score:2, Insightful)

    by bmartin ( 1181965 ) on Monday February 18, 2008 @08:40PM (#22469634)
    I don't see why this is so funny. Opera's not that bad, and it does offer some things that aren't available by default in Firefox. Sure, it doesn't have the 400 extensions that FF does, but you don't have to screw around with it much. Opera has some really nifty features enabled OOTB that most people would overlook otherwise. It's also fast and it does a really good job with adhering to web standards.

    Yours is really a flamebait comment, and if there were a considerable number of Opera users with moderation points out there, I'm sure they'd overlook objectivity and mod you down.
  • by PlusFiveTroll ( 754249 ) on Monday February 18, 2008 @09:44PM (#22470210) Homepage
    Yep, it sucks to be big. If the person that found the exploit logs on to IRC and posts it, instead of mailing the authors of the code, how much time do you think they have before a new trojan or malicious attack websites are setup. I'd make a guess it's under an hour. As the application developer you have to take what you're given. Your enemy is not going to give you any quarter. They are not going to wait around for you to patch your apps and distribute them. The ball is in the blackhats hand, all you can hope to do is react fast enough.
  • by SETIGuy ( 33768 ) on Monday February 18, 2008 @09:49PM (#22470246) Homepage

    > it's not Mozilla's obligation to make sure that Opera's secure

    True, but surely Mozilla has a moral obligation to ensure that other browsers (and ultimately, users) have as much time as possible to prepare for when the exploit becomes public domain?
    That obligation is trumped by Mozilla's moral obligation to make sure that people who use Mozilla are not vulnerable to an exploit.
  • Re:Crap article (Score:3, Insightful)

    by martin-boundary ( 547041 ) on Monday February 18, 2008 @10:07PM (#22470414)
    The security hole has been there for a long time. It didn't just appear in a puff of smoke when the Mozilla devs discovered it.

    Not announcing it means that the black hats get to use it for longer, and that's bad for millions of users. By contrast, delaying the announcement merely saves two or three develpers some embarrassment, at the cost of increased damage to everybody else.

    However you look at it, the benefits of delayed announcements don't add up.

  • screeches? (Score:4, Insightful)

    by sentientbrendan ( 316150 ) on Monday February 18, 2008 @11:29PM (#22470928)
    >Opera Screeches at Mozilla Over Security Disclosure

    Common, can we get article titles and summaries that don't *immediately* tell us about how we should feel about an article before even telling us the circumstances?

    I mean, give me a break, this is a lower standard of reporting than even fox news uses. For *once* I'd like to see a slashdot editor try to be objective, and let the reader make up our own mind instead of trying to spoon feed us our opinions.
  • by nigelo ( 30096 ) on Tuesday February 19, 2008 @12:07AM (#22471220)
    Am I missing something?

    The problem was reported in November and fixed in early February.

    Clearly, this is longer than one day.
    Following the links in other posts to the mozilla issue tracking, it apparently took a while to fix.

    The Opera guys would have liked a little more heads-up than one day, that's all, and that doesn't seem unreasonable to me.

    Why all the high-and-mighty whining about 'if they really cared they would have fixed it'?
  • Re:Sheesh... (Score:1, Insightful)

    by Anonymous Coward on Tuesday February 19, 2008 @12:26AM (#22471358)
    True... but, advertising a bugfix in one browser does mean that attackers will test the others to see if they're vunerable for the same thing. And it does happen - remember that there was a SSL vunerablity that both Konquerer and Internet Explorer fell foul of. Two very different code-bases!

    There should be a standard protocol among significant web-browser vendors notifying each other of upcoming public annocements of vunerabilities. No more than, say two weeks notice (possibly less?) among each other to check for potential flaws. (One week should be enough for any browser that's not a one-man-band to at least do a 'are we vunerable?' investigation.)

    So, Mozilla notify Opera they've discovered a flaw in Mozilla, gives Opera two weeks to check they're not vunerable to the same thing. If any siginifcant browser is, maybe give another two weeks for a patch to be devloped. Then the information becomes public.

    Sure, MS might be lagging behind with their patch-tuesday, but hey.

    Still, Opera's security track-record does exceed Mozilla's.

  • by aussie_a ( 778472 ) on Tuesday February 19, 2008 @12:53AM (#22471500) Journal
    So you think Mozilla told Opera within 24 hours of finding out themselves? If not, then how is Mozilla's users made vulnerable by telling Opera earlier?
  • by Half-pint HAL ( 718102 ) on Tuesday February 19, 2008 @06:47AM (#22473032)

    That obligation is trumped by Mozilla's moral obligation to make sure that people who use Mozilla are not vulnerable to an exploit.

    No one is suggesting that Mozilla should have delayed the fix (in order to hold back disclosure).

    No, it would have been open and responsible and good if someone at Mozilla had thought to send an email to the Opera dev team a week or two ago saying:

    Roses are red, violets are blue
    We're fixing this exploit and think you should too.
    Lots of Love,
    Your secret big red monster Valentine.

    No need to coordinate releases, but given that it took them a while to patch it, they should assume it'll take Opera a wee while to, and in the meantime they're leaving members of the public open to exploit.

    Members of the public that used to use Firefox, but had to stop because Mozilla never fixed the memory leak and these users were using old machines (NT4, 32 meg RAM) and Open Source was supposed to mean never being obsolete, but it was only the non-open, free Opera browser that offered me a fully-patched, fully working browser.

    HAL.

  • by olehenning ( 1090423 ) on Tuesday February 19, 2008 @07:17AM (#22473202)
    I don't see how that obligation stands in the way of responsible disclosure. How would it take Mozilla any longer to fix the problem if they tell Opera about it in good time? Don't get me wrong. I'm not saying that Mozilla has done something extremely wrong here. I'm just saying they could have done it better, followed responsible disclosure properly and given Opera developers time to fix it before they went for full disclosure.
  • by Ash Vince ( 602485 ) on Tuesday February 19, 2008 @08:52AM (#22473658) Journal

    They can avoid mentioning the specifics, and if needed, they can hold back the source.
    I am certainly glad they did not do that. If they hald back the source those of us who use gentoo or build our browser from source would still be vulnerable until Opera got around to fixing it. Why should we be? Also note that most open source projects CVS tree is very much open, the whole point is that any user can download the source.

    In fact, you are a complete moron: The GNU licence means they HAVE to make the source code available on request at the very least.
  • by Ilgaz ( 86384 ) * on Wednesday February 20, 2008 @12:11AM (#22484324) Homepage

    I agree that they probably fulfilled their minimum obligation, but it would be great to see a much higher degree of co-operation between the vendors of minority browsers. By all means attack MS in this way, but play nice amongst the good guys.
    There are very advanced developers at Opera too, remember these guys manage to code a 90 KB J2ME single binary which may work in hundreds of millions of mobile phones (Opera Mini) or a browser small enough to run on various kinds of Symbian smart phones.

    Also these guys are browser developers, same job...

    I am near sure they see some potential issues on Mozilla source sometimes and silently inform them about them. If this happened, I can understand their frustration about a hit from "nice guys".

    Of course, these are guesses only and I don't even run Opera until they release 9.26/9.50 final on OS X Leopard.

Term, holidays, term, holidays, till we leave school, and then work, work, work till we die. -- C.S. Lewis

Working...