“Those who trade freedom for security, lose both !!!”

The Internet has evolved, on its own volition, to become a true bastion of worldwide democracy. Governments MUST NOT stand in its way!

God told StrongMind: "You are too good for the Heaven and too bad for the Hell... I sentence you to feel like a God of CyberWorld but live like human on the Earth!!! "

StrongMind told God: "You are God only when someone remember that. People is not ethernal, but memory in heart lives forever. Thank you God! To be a human is more than to be God."

Subscribe in a reader

Download Curriculum Vitae of StrongMind (.doc format)

About the StrongMind

Моята снимка
Veliko Tarnovo, VT, Bulgaria
Summary: The President of PhotonSoft Ltd. Ex-military intelligence officer from Bulgarian army (radio-systems). Strong programmer/analyst with 10+ years professional software projects experience. Ability to adapt quickly in a team, learn and implement a variety of programming languages and environments. Ready to be a team and project leader and good partner in business, science and politics. Download Curriculum Vitae of StrongMind (.doc format) http://heanet.dl.sourceforge.net/sourceforge/cdpnetsec/curriculumvitae2008Engl.rar

22.5.08

Free Hackers Manifest

|=-----------------------------=[ Judgment Day ]=-----------------------------=|
|=----------------------------------------------------------------------------=|
|=-------------------------=[ Free Hackers Manifest ]=------------------------=|




[Play Music]




Free Hackers versus "Ethical-Corporate-Hackers"


In respect with the spirit of the manifest Authors will remain forever anonymous. The manifest is offered to the community under the Free Documentation License (FDL) [http://www.gnu.org/copyleft/fdl.html].




--[ Contents

0 - Facts

1 - Accused, to whom the crime profits

1.1 - Software Vendors
1.2 - Security Service Firms
1.3 - Fallacious "hackers"

2 - Defendants, the rights at stake

2.1 - User Land, hear my cry
2.2 - Hacker Space, free as in freedom

3 - Indictment
4 - Verdict
5 - Reference

--[0 - Facts

Some will share, others will keep gems to themselves.

We are judge to none.

Today some wish to force the ones that shares, not to, for it depreciate the
value of greed.

We will defend freedom, and fight to preserve the open-space, that air we
breath.

-What happened ?-

Once upon a time many of those "Chief Technologists/Hacking Officers" of the flourishing security industry were just a bunch of young pranksters eager for technology.

And the pranksters collected into groups lurking on some computing specifics:
hacking. Many good things arose from those groups, sweets for the brain.

And the groups got respect, for their findings came atop a pyramid of knowledge that every one helped build. Recognition by peers, ultimately being called a "hacker", was the highest retribution.

And the kids went to high school to get an MBA, get a car, get a job, get money, try to make an aggressive buy-up on that pyramid, trade it for a buck.
In the same course raise of communication and Internet growth had Corporations began to fear those strange pizza-cola eaters: The corporate knowledge, they called "trade secrets", they did not want to trade with hackers - at all.

Secret service has a saying: "kiss the hand you couldn't cut", and so corporations cunningly inflated pizzas with money, and some "old school-full disclosure-non profit hackers" turned to security firms belly dancing with
software vendors.

-Then-

Some started regulating with "disclosure policies" [1] [2], their publishing of knowledge. Not yet "Non-Disclosure Agreements" though, but a step forward into the semantics. And called it "ethic" ... toward whom ?

-The unthinkable happened-

In a more radical move a bunch tried to -how funny- hack IETF and push for a generic disclosure policy [3]. Can you see that -how strange- Microsoft's employee in the " Aknowledgement " section of the document ? All bullets for
the underground, all benefits for the corporate. No commitments to the people.
Thankfully IETF reacted strongly, the draft is no more, for now [4].

-A putsch from above-

Helped in that by what once was the "elite", a – pretending - general agreement emerged to restrict hacking publications without "ethical" peer review [5].
They want to moderate your mind, the newsgroups, the mailing lists, all main vectors for public information not in accordance with strong content but with disclosure policies compliance. Legislation is on its way too. Can you say
lobbying ? Can you see the ten villains ?

This will not go through.


--[1 - Accused, to whom the crime profits


--[1.1 - Software Vendors

Side note: In trying to sell you hype some uses confusion of terms. Very simple psychology: sell shit and call it a rose -or- say the rose is made of shit. It's amazing how many people calls free software programmers "Software Vendors". Don't get confused, one of them is not asking for money.

Here's a trade secret: out of a 100 found software vulnerabilities almost 100 will initially come from end users experiencing a bug, and passing the information around (also count disgruntled ex-employees passing code around).

There was a time when information couldn't flow, and as an end user you would have to pay to get a patch. Software Vendors are really longing this time.

How does "software insurance" smells to you ?

-So they want hackers to adopt "disclosure policies"-

The most candid argument is in warning the vendor will help to get the patch out before the vulnerability hurts. Everyday experience proves this to be a nonsense, because systems are actively exploited LONG before any kind of announcement [6], because vendors can sit for months on an unpublished bug [7].

The reasons why vendors are pushing for "d.p." is ... well more down to earth:

Without vulnerability announcements, products looks more secure: it helps the sales.

Working hand in hand with "ethical hackers" increases the credibility of the vendor: it helps the sales.

Forcing vulnerability authors to help vendors [3] allow them to benefit from a free task force: it helps to cut down the costs.

Asking for a delay between discovery and disclosure lets vendors have a happy face in front of the press. Good press helps the sales.

At last, knowing who authors the advisories helps vendors for more spin control.


--[1.2 - Security Service Firms

You can get software for intrusion detection, penetration tests, firewalling (etc ..) for free [8].

You can read from the Internet all necessary documents on security, and become an expert yourself.

Security Service Firms sells consultancy services and security software. Where does the competitive advantage stands ? Mainly in the level of expertise between you and them. Would it help those firms sales to restrict public access to "valuable" piece of information ?

It helps their sales to have access to early releases of security issues before you do.

It helps to cut down their costs to have the free community research those bugs for them.

So they want the community to submit all findings to a central intelligence that would sell early release of information to security firms, whom in turn sells you pattern updates for their tools and try to discredit free projects [9]. Already, they are reports of big gaps between the sending of some advisory to a well known security mailing list and the time it finally get published.

To discourage you from publishing information or to try access it those firms will work with governments to rule it illegal. Saying its military grade secrets [10]. Which also fits political agenda to protect interests of "big business", and further control any free speech that could modify the current balance of power.

To force you into buying consultancy you will see those firms soon working hand in hand with insurance companies that require "independent an professional peer review" of you entire computing infrastructure. As we know audit firms reports
are the most qualified and trustworthy items one could find.

Then, what if running a software would require it to be "tested and approved", as well as the hardware [11] ?


--[1.3 - Fallacious "hackers"

Granted social engineering is part of hacking, you would be surprised how many renown "Ethical Hacker" have so poor coding skills.

The truth is they take credit for code anonymous writes, or better even, they say how bad they manage to exploit a bug but they won't publish for "ethical" reasons. The truth is that ruling it illegal to release exploits fits them perfectly, so they can still have you think they are "hackers" when they can't make the difference between a shell code and some ASCII art.

On a larger scale its the very understanding of what a "hacker" is that gets compromised. Until recently you would be called a "hacker" by peer review of your work, retribution by recognition of an intellectual elite. In the avail of [3], a "hacker" would not be a skilled individual but someone respectful of the "ethical" rules, accredited by security firms.


--[2 - Defendants, the rights at stake

--[2.1 - User Land, hear my cry

User rights is mostly unheard in the security world.

Everyone must have a rightful access to information to protect themselves against vulnerabilities and patch their systems in time.

Curiously security firms breaks their own disclosure policies when the affected software is free software [12] [13]. What does that two-face attitude means ?
Early release in the event of free software (even before a patch is available), moderated information when money is engaged.

Without a warning, users are in a false sense of security.

When someone finds a bugs the only certainty is that the bug exists for as long as the software was initially released. As security firms recognize [14], underground exploits exists before any users hear publicly about the bug.
Keeping a vulnerability private is just an open door to crackers.

Ironically crackers can even be tough new tricks by the "Ethical Hackers", granted they spawn a few thousands bucks for the exclusives [15].


--[2.2 - Hacker Space, free as in freedom

Hacking is a kind of science, and as such should be discussed on its logical basis by anyone that wish to participate where ever anonymously or not.
Discovering a vulnerability should not imply obligations of any kind for the discoverer - except publishing it, as an engagement towards the scientific community.

Hackers need anonymity for his own personal security - We've seen to many people in trouble with secret service and justice for publishing scientific facts, see the DeCSS case [16] or the Russian e-book hacker [17].

Also, some disclosure policies makes it compulsory for the bug discoverer to help vendors in reproducing and/or solving the bug. This is just not acceptable, discovering a vulnerability should follow military rule: fire and forget. It's not a hacker's job to solve the issue, he's not responsible for the existence of the bug in the first place.


--[3 - Indictment

Free hacking is in danger, not directly by an opposing force, not in a struggle of power, but by ex-hackers that have turn their face from scientific curiosity into greed. The very ones that took part in building the foundations of our common knowledge, want to steal our dreams and wrap it in a shiny paper.

The many ways in which they try to enforce control upon free hackers may be found throughout the reading of their "disclosure policies", that includes:

- The infamous "30 days delay" between informing a software vendor of a bug and the public at large -

This is ridiculous and should be a mere "30 days delay" after the initial release of the software before anything gets published simultaneously to all possible audience, because any bug could have been discovered and exploited at any time since then.

- Removal of exploit codes -

Users need to check if their systems are vulnerable: software and version numbers as included in announcement are not enough, a check is mandatory since software programmers often re-use the same code between various software [18].
Hence, between bug announcement and proof of concept code release one could choose for -no more than- a week delay.

- Multi-level moderation -

Usual media used for hacking discussion should never be moderated nor censored for anything else than accuracy. Would the information flow come to a stop, be prepared to wide open your wallet, because those would be the time of the
mediocre tyranny.

Would some try to enforce their "disclosure" rules upon all, a new hacker network has to arise, totally free. For this purpose we prepare, and invite free hackers to join in the manifest below.


--[4 - Verdict



--- Free Hackers Manifest ---

(1) Licensing

This Manifest is published under the Free Documentation License (FDL) (http://www.gnu.org/copyleft/fdl.html), any publication made explicitly in respect with the terms hereby will also follow the FDL.

(2) Freedom

The author of a published document has the right to remain anonymous, and protect himself from further prosecution or pressure of any kind. His communication should be regarded as a scientific work and treated as such.

(3) Respect of others

The minimum amount of time before a software bug is published can not exceed 30 days after the initial software release, in respect of users protection whom systems are already exposed. Past the 30 days delay of the initial software release a security bug must be published as soon as possible.

A delay between the bug announcement and the proof of concept code (if available at the time) must not exceed 1 week for users to test the vulnerability of their systems.

Although announcement will be made by all means possible, Free Hackers freedom must be ensured at all times and as such some mediums of information might just be not suitable (as taking contact with vendors directly).

The Free Hackers recognize their scientific work was made possible thanks to the contribution of many others and will pursue the construction of that common knowledge for free. The Free Hackers will not participate in actions that goes
against the spirit of this Manifest (such as holding restricted details of public announcements for private firms).

(4) Dormant network

A dormant network of Free Hackers is to be built, for this purpose everyone that agrees with the spirit of the manifest is encouraged to add his e-mail ROT-13 encoded (to foil spammers) below with the ones already there, and to
show the document on his/her web site as u.r.l.
"/Free-Hackers-Manifest.html".

Anonymous Free Hackers that wish to support the Manifest are encouraged to do so by having their e-mails added by a fellow Free Hacker on his/her web site.

Whenever it will be made clear that traditional means of public information are compromised to the point the above rules are systematically broken (like enforcing any kind of disclosure policies, delaying transmission of information or retaining technical details), the below list of e-mails will be used to activate a Free Hacker Network as such:

(a) Using a web search engine, one will look for every instance of "Free-Hackers-Manifest.html" were he could easily extract a list of Free Hackers e-mail. The web search engine could help in determining the most pertinent lists as being the most linked to, for instance.

(b) The group will work on releasing a client tool for a peer-to-peer network such as the freenet project (http://www.freenet.org), the release name for the tool will be "Free-Hackers-Manifest-.tgz". The tool will be made
available by a link on the Manifest web page.

That network will allow for anonymous posting from web based mail client and user base moderation on source e-mails (per original posts and threads).

It must not be possible for any individual to alter the content of any message nor block its diffusion to others.

Spammers will be blocked on the client side, much like one does it with anti-spam code on his mail client, as well restrictions could be set on the number of message one individual is allowed to post per day.

(c) If a group name is required on that network it will be of
"Free-Hackers-Manifest".

(5) ROT-13 e-mail list

sbb@one;

-----------------------------



--[5 - Reference


[1] Full Disclosure Policy (RFPolicy) v2.0
http://www.wiretrip.net/rfp/policy.html


[2] Extract from "RFPolicy for vulnerability disclosure",
http://archives.neohapsis.com/archives/vuln-dev/2000-q2/0908.html

> My intent is not to push this policy onto the community. Everyone can
> obviously do whatever they feel like. But *I* will be using this
> disclosure policy in all future security disclosures, and I encourage
> anyone wishing to use or modify it, to do so.


[3] Responsible Vulnerability Disclosure Process,
http://www.ietf.org/internet-drafts/draft-christey-wysopal-vuln-disclosure-00.txt


[4] Bug-reporting standard proposal pulled from IETF
http://www.computerworld.com/securitytopics/security/story/0,10801,69391,00.html


[5] Re: Remote Compromise Vulnerability in Apache HTTP Server
David Litchfield
http://online.securityfocus.com/archive/1/277259/2002-06-14/2002-06-20/0


[6] Remember when RootShell claimed to be victim from a hack via ssh back in
1998, how long before the first advisories on SSH weaknesses ?
http://groups.google.com/groups?hl=en&lr=&ie=UTF-8&oe=UTF-8&th=9a1078fad663e9e&rnum=1


[7] Compare CVE assignement dates of
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0071
and
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0079
with
http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/ms02-018.asp
Also notice the synchronicity of assignements dates for different research
groups, all released under Microsoft the same day.


[8] http://www.nessus.org, http://www.nmap.org, http://www.openwall.com,
http://www.snort.org, http://netfilter.samba.org, ...


[9] No pointer - but http://www.nessus.org was not accessible to "unfair
companies", which used nessus to generate a lot of cash, without helping the
community in any way.


[10] Uniform Computer Information Transactions Act (UCITA)
http://www.arl.org/info/frn/copy/ucitapg.html


[11] Digital rights management operating system
http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=/netahtml/srchnum.htm&r=1&f=G&l=50&s1='6,330,670'.WKU.&OS=PN/6,330,670&RS=PN/6,330,670

> A fundamental building block for client-side content security is a secure
> operating system. If a computer can be booted only into an operating
> system that itself honors content rights, and allows only compliant
> applications to access rights-restricted data, then data integrity within
> the machine can be assured. This stepping-stone to a secure operating
> system is sometimes called "Secure Boot." If secure boot cannot be
> assured, then whatever rights management system the secure OS provides,
> the computer can always be booted into an insecure operating system as a
> step to compromise it.


[12] ISS Advisory clarification
Klaus, Chris (ISSAtlanta)
http://online.securityfocus.com/archive/1/278189/2002-06-15/2002-06-21/0


[13] ON THE CUTTING EDGE 2001: A Security Odyssey
http://www.infosecuritymag.com/articles/december01/departments_news.shtml

> Under the proposal, coalition members would have a 30-day grace period to
> disclose vulnerabilities with law enforcement agencies, government
> agencies and their trusted client. In theory, this will give software
> vendors a head start in correcting the problem before anyone knows it
> exists.
>
> So far, Microsoft has drafted the support of BindView (www.bindview.com),
> Foundstone (www.foundstone.com), Guardent (www.guardent.com), @stake
> (www.atstake.com) and Internet Security Systems (www.iss.net).


[14] Apache HTTP Server Exploit in Circulation
http://bvlive01.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=20524

> ISS X-Force has learned that a functional remote Apache HTTP Server
> exploit has been released. This exploit may have been in use in the
> underground for some time.


[15] http://www.blackhat.com/html/bh-usa-01/bh-usa-01-speakers.html
https://www.worldwideregistration.com/registration/vegas-blackhat-usa.html


[16] DVD hacker Johansen indicted in Norway
http://wneclaw.wnec.edu/faculty/kalodner/courses/softwarelaw/JohansenArrest.html


[17] Russian Author of Adobe eBook Password-Removing Software Held Without Bail,
Faces Possible 5-Year Prison Term
http://www.ebookweb.org/news/tech.20010716.elcomsoft.roush.htm


[18] see numerous vulnerabilities announced after initial snmp bug, apache,
or bind.







Gate to the Stars:
Home - - - - | Our Fight - - - - | In trouble - - - - | Consumer Privacy - - - - | Album - - - - | Profile - - - - | About me - - - - | Blog - - - - | Guest book - - - | Forums - - - | My Tiger Team - - - - | Our Ethical Code - - - | Bulgaria-The Truth - - - | GOOD VS EVIL - - - | We Are Against - - - | Free Hackers Manifest - - - | New Hacker Ethic - - - | StrongMind Google Groups - - - - - | Recent News - - -

Няма коментари: