Dailydave mailing list archives
Concerns of a Security Researcher in a DMCA world
From: "mplsmith () gmail com" <mplsmith () gmail com>
Date: Thu, 16 Feb 2006 21:16:17 -0800
I've recently been confronted with a question worthy of public debate. According to the DMCA Copyright Law (http://tinyurl.com/cqdft ) TITLE 17,CHAPTER 12,§1201 Subsection (J) the law permits copyright law exceptions for security researchers. I assume we are all aware or at least heard of this section of the law however it contains wording which is confusing in general and even more when interpreted into real life scenarios. A copyright according to what I've personally researched is "a limited license to exploit an idea for commercial purposes" which I interpret as an exclusive right to profit from an idea which seems to be straight forward and fair in its simplest form. Software vendors are not successfully identifying and fixing vulnerabilities in software. As described by Richard Clark ( http://news.com.com/2100-1001-947409.html), independent security researchers have a major and ever growing role in the security of software used by consumer, businesses, government, and other critical infrastructures. If copyright laws were originally designed to only ensure their owners exclusive rights to profit from a copyrighted item, and DMCA specifically permits exceptions for security testing then what exact actions/behavior are researchers permitted to do? In my experience as a security researcher I have reviewed software as a consultant for customers, reviewing their software under contract and been paid for my services. I've also reviewed software on personal interest which has successfully led to patches and security improvements which is the focus of concern. A problem arises when we review publicly released software not under direct request by the vendor. A simple example is software such as Winamp; its basic version can be downloaded freely without any cost to us and therefore making it easy to obtain, and review. The Winamp PRO version is a different story; this version requires consumers to pay $19.95 thus making it difficult for security researcher to easily obtain a copy and therefore unable (without wasted expenses) to have the capability to review this popular product in any reasonable way. The security exception portion of the current copyright law was designed to ensure that the copyright law does not restrict, hinder or impact the ability for vulnerability research to be performed regarding copyright restricted items. What method of acquiring software is ethical, legal, and most importantly realistic for researchers to succeed in performing much needed research? Should security researchers be required to pay for software that they only review but never use? Is there a different between borrowing a copy of software vs downloading it from "other" sources? Should vendors be able to deny researchers from reviewing their software either by requiring permission or forcing researchers to pay for the software without ever using it as it is intended? I have spent a lot of money acquiring software which I have no interest in owning only to permit the capability to review software for the benefit of improving or security. I commonly find myself in legal uncertainty regarding what software I can legally review and how it can be obtained. The question is, why should security researchers need to pay full price and maintain huge budgets to obtain all software which they reviewed. If this is the only legal way then how can a researcher realistically review software such as Oracle without paying unrealistic/impossible amounts to money simply to do research? According to the DMCA law many exceptions are permitted, the Reverse Engineering exception (TITLE 17,CHAPTER 12,§1201 Subsection (F)) states "a person who has lawfully obtained the right to use a copy of a computer program may circumvent a technological measure" which makes total sense to ensure cracking of software is illegal. In contrast to the Reverse Engineering exception requiring lawful obtaining of a program, the Security Testing copyright exception (TITLE 17,CHAPTER 12,§1201 Subsection (J)) does not state anything about how the software is obtained. Security testing is also incorrectly defined as "accessing a computer, computer system, or computer network, solely for the purpose of good faith testing, investigating, or correcting, a security flaw or vulnerability, with the authorization of the owner or operator of such computer, computer system, or computer network". This definition as it is could never describe a valid copyrighted item and also has nothing to do with reviewing applications/programs for vulnerabilities. Vulnerabilities are specifically found in "computers, computer systems, or computer networks" they are found within software applications which execute. on a computer (such as BIOS software), execute on a computer system (such as software applications), or execute on devices (such as IOS software) which when inner connect makeup a computer network. How can security researchers succeed in this situation without being performing actions which may be construed as illegal due to the confusing (grey area) of the law? Are we expected to pay out unreasonable amounts of revenue to software vendors without a return thus forcing the research industry into a negatively profitable line of work? Is the industry permitted to research only at the mercy of the software vendors which truly receives no positive return from independent security research?
Current thread:
- Concerns of a Security Researcher in a DMCA world mplsmith () gmail com (Feb 17)
- RE: Concerns of a Security Researcher in a DMCA world Dave Korn (Feb 18)
