There’s been an interesting follow-up to the Firesheep incident, in which an attack tool was released which allows “sidejacking” of Firefox sessions.
Eric Butler and Ian Gallagher created the extension to draw attention to the risky practice whereby many sites do not encrypt cookies. With Firesheep installed, a user could potentially capture cookies from other users of an open Wi-Fi network, and use them to hijack their sessions at supposedly secure sites such as Facebook and Twitter.
But they seem to have a strange view of the inherent value of Firesheep.
Microsoft has updated its malware database to label Firesheep as a potential threat, which of course, from the point of view of the system it is installed on, is untrue. Firesheep does not actually harm the system it runs on – but it can be used to harm other systems.
So Microsoft is removing temptation rather than danger – and the Firesheep authors don’t like it.
“Censorship does not offer a solution to these underlying issues,” said Cutler in his blog, “and will only cause further problems. For many people, code is a form of speech, and the freedom of speech must remain protected. If Microsoft wants to improve security with censorship, it would be more appropriate to block the insecure websites that are exposing user information in the first place.”
Seems to me it’s pretty sensible for Microsoft to offer IT people a way to remove this tool from the systems they look after – as their company might be responsible for any misbehaviour by staff using it.
The right to free speech doesn’t extend to inciting criminal action, or providing tools to help break the law. Cutler claims there are plenty of legitimate uses of Firesheep – though he doesn’t provide an actual list. We know that sidejacking is possible, and it doesn’t need to be checked more than once.
Sophos’ Paul Ducklin pointed out in a blog, the original Firesheep tool somewhat over-achieved if its aim was to increase awareness of a security risk.
“Just because you can write code to prove a point doesn’t mean you have to release it,” said Ducklin. “If you do release it, you don’t have to package it with a one-click install and a use-it-without-understanding-it GUI.”
European Commission says it will review Apple's iPad compliance with DMA rules as it seeks…
James Dyson delivers most high-profile criticism so far of Labour's first Budget that raises £40bn…
Nvidia, Meta bring cases before US Supreme Court this month seeking tighter limits on investors'…
Nvidia to replace Intel this week on Dow Jones Industrial Average after years of turmoil…
Joby Aviation and Toyota Motor complete demonstration flight in Shizuoka as companies prepare to bring…
SK Hynix says Nvidia chief executive Jensen Huang asked if production of next-gen HBM4 memory…
View Comments
Does that means wireshark, tcpdump and similar tools have to be classified as "virus" by antivirus?
Perhaps he should not have released it and made it such an easy tool to use. However, he is also showing how easy it is to sniff traffic! And how easy it is to fool people into believing that they are safe, and how easy it is to defeat this tool (TLS).
But MS, FB, and others are definitely not reacting the way they should be reacting. And websites are definitely not built the way they should be built. and security is definitely not taken seriously enough.