Then, on May 9th 2005, NISCC made a High Severity Vulnerability Announcement about our IPSec work. This announcement was relayed by US-CERT, Aus-CERT, and other agencies, and picked up by the likes of zdnet, eweek, The Register, and cnet news. It then went on to generate plenty of speculation and conspiracy theory on slashdot and other on-line discussion sites. Also on May 9th, a research paper describing our attacks was circulated to selected researchers and submitted to a major international conference. A revised version of the research paper was later posted on the web; this improved version incorporated significant feedback from vendors, standards writers and the academic community.
From our perspective, working through NISCC gave us an improved understanding of the impact of our research. It also acted as a valuable relationship building exercise for us, both with NISCC and the Information Security industry. For vendors and users, our choice to work with NISCC ensured they had prior knowledge of the IPSec vulnerabilities before any public announcement was made, and gave them a head start in assessing the impact on their IPSec products and deployments.
This partnership approach required a bit more time and effort on our part. But with national and commercial security interests potentially at stake, applying a precautionary principle seemed to us to be the right way forward. Ultimately, the approach we took had the unexpected benefit of generating feedback that improved the quality our research. And we are now, literally and metaphorically, on the Christmas card lists of a few more important commercial and governmental organizations.
Reading our newsletter every Monday will keep you up-to-date with security news.
Receive a daily digest of the latest security news.