Reading about the recent SMTP and SSH vulnerabilities, I get the impression that open source projects, proprietary vendors and government agencies such as @certbund don't know how to talk to each other. They should at least have something like a red phone.
Please comment here if you have a constructive idea on how to improve the situation! #SECconsulting seems to assume that everyone uses #VINCE, a CMU service I had never heard of.
#SMTP:
https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/
https://www.postfix.org/smtp-smuggling.html
@chpietsch @certbund maybe I misunderstood something, but the terrapin stuff seems a good approach: taking list of implementations and contact them. Took me < 10 seconds from SMTP Wikipedia to Software list https://en.m.wikipedia.org/wiki/List_of_mail_server_software#SMTP of course this is an extra workload, but acting responsible is always more work, otherwise anyone would always act responsible.
@Lurkars Yes, they tried hard but still were not able to contact some important actors. From the screenshot:
“Due to the lack of proper security contacts and response, we were not able to disclose our findings to some of them.
AbsoluteTelnet (Celestial Software)
Amazon AWS
CERT-Bund
Cisco
Ericsson
Microsoft
Mikrotik
Partnered CERTs of CERT-Bund (via CERT-Bund)
SSH Server for Windows (Georgia Softworks)
Tectia SSH (SSH Communications Security, Inc.)
Termius (Termius Corporation)”
/cc @certbund
@chpietsch @certbund haha okay, yes than I misunderstood/misread. Thought they contacted them AND the list. Of course those are still two different problems:
- who to contact
- how to contact/reach e.g. how to act if not reachable
Thanks for clarification.