Opinion: Thanks, Mike Lynn -- Thanks for Nothing
- By Keith Ward
- August 11, 2005
Mike Lynn is being hailed in some quarters as a hero, but I don't buy
it. I'm sure his heart was in the right place when he discussed a serious
vulnerability in Cisco routers at the recent Black Hat USA conference, and his
courage in quitting his job, rather than be censored by Cisco and his
own employer, is admirable.
But that still doesn't make what he did right. My main concern is that
now, hackers are working overtime to figure out how to break into these
routers and wreak their havoc. Here's what Brian Krebs, the Washington
Post's excellent computer security reporter, said in a blog from the
"One DefCon attendee who asked not to be named told me today that an
international consortium of hackers is now working around the clock to
write software code that could be used to exploit the flaw Lynn
These hackers did not have this target before; if Lynn hadn't
presented his findings, many, or most of them would likely not even
know about it. (All indications are that it will be an exceptionally
difficult flaw to exploit, and took Lynn years of research to find. On
the other hand, a large group of hackers working in concert could
substantially reduce that time). But now that Lynn's blown the lid off
of it, every hacker from Boise to Shanghai knows about it. That's
simply not smart.
There's a scene in Steven Spielberg's movie "Saving Private Ryan" where
a soldier warns a new member of his team not to salute the team's
captain. "Every time you salute him, you make him a target, so don't do
it; especially when he's next to me" says the soldier. What Lynn's done
here is salute the captain, letting everyone know where to train their
It's a shame that all parties involved have reached a legal settlement
to not discuss the case, apparently forever. I'd like to hear what
Cisco has to say (its response to the situation has been called
thuggish by security guru Bruce Schneier, among others), and Lynn's
rationale as well. I'm also not against announcing vulnerabilities; I
strongly favor it, when researchers and vendors work together. Maybe
Lynn tried to work with Cisco, and the company ignored him;
unfortunately, it looks like we won't know. Krebs, in the blog, quoted
an ISS spokesman as saying that the companies are working together to
develop a solution to the problem, and a Cisco press release implied
that Lynn didn't follow industry-standard processes for releasing
information on vulnerabilities.
However it happened, the end result is this: the bad guys have now
turned their attention to the backbone of the Internet. Let's hope it's
made of strong stuff.
Keith Ward is editor of the Security Watch newsletter and managing editor of Redmond magazine.
Keith Ward is the editor in chief of Virtualization & Cloud Review. Follow him on Twitter @VirtReviewKeith.