STE WILLIAMS

New Bucks For Bugs Program Focuses On Open Source Software, Internet Infrastructure

Nov
08

Programs that pay security researchers for finding flaws in software have become all the rage, and a new bug bounty program launched this week rewards finding vulnerabilities in key open-source software platforms as well as the underlying Internet infrastructure.

Microsoft and Facebook — under the auspices of HackerOne — are co-sponsoring The Internet Bug Bounty, a program that pays anywhere from $300 to $2,500 for a new vulnerability found in key open-source platforms such as OpenSSL, Python, Ruby, PHP, Django, Rails, Perl, Phabricator, Ngix, and Apache httpd. The program also rewards a minimum of $5,000 to researchers who find working flaws in sandbox technologies, and a minimum of $5,000 for bugs found in the Internet’s underlying infrastructure, such as DNS, SSL, or PKI, for example.

“I’m really happy about this program,” says renowned security researcher Dan Kaminsky, who discovered a key DNS bug in 2008 that affected a large portion of the Internet. “The black market has gotten so hot because there are so many players doing criminal activities … more accurately, they are out to compromise systems, and that takes a lot of work even to identify a flaw [to exploit].

“If nothing else, this program provides direct incentive for people to raise the quality of [software] flaw analysis,” he says, pointing to the program’s emphasis on quality vulnerability finds that pose real risks to the Internet community and its well-defined guidelines that promote responsible hacking.

Not all bug discoveries will actually qualify for a bounty payment, either, according to the program’s disclaimer. In the case of Internet bugs, for example, the criteria for a paid flaw is one that affects multiple products or affects a significant number of users, is “severe” or “novel,” for instance.

Both Microsoft and Facebook, like many major vendors today, have established their own bug bounty programs that pay researchers who find flaws in their products.

[How Microsoft’s new bug bounty program will play in the quest for more secure software. See Microsoft’s Big Bucks For Bugs Ups The Ante .]

A panel of volunteers from the security community is charged with managing The Internet Bug Bounty, including Microsoft’s Katie Moussouris, Matt Miller, Roman Porter, and Arthur Wongtschowski; Facebook’s Alex Rice, Neal Poole, and Colin Greene; Chrome’s Chris Evans; iSec Partners’ Jesse Burns; and Etsy’s Zane Lackey.

“The Internet Bug Bounty is accessible to a broad pool of security researchers and has the potential to improve security for a wide variety of technology users,” says Moussouris, senior security strategy lead for Microsoft Trustworthy Security. “This bounty is a great way to support coordinated disclosure of critical vulnerabilities in shared components of the Internet stack.”

Countering the black market for bugs indeed is the main incentive for heavy-hitters like Microsoft and Facebook to team up and sponsor a vulnerability reward program for open-source platforms, says Chris Wysopal, CTO at Veracode. “This is a reaction to that” black market for bugs, he says. “This is really trying to disrupt the offensive market. As the offensive side of vulnerability finding has grown, this is counter-balancing it.”

And more secure open software platforms also benefit those vendors, as well as the entire Internet community, security experts say. “This is definitely helping out those open source projects,” Veracode’s Wysopal says. “And [the vendors involved] are also helping themselves because they use these products. It’s a win for them and a win for the Internet in general.”

The closest thing to a bug bounty for finding flaws in open source software is Google’s new patch bounty, announced earlier this month. Google launched an experimental program that offers rewards for coming up with security improvements to key open-source projects such as OpenSSH, BIND, Chromium, and KVM.

Open source software is often considered the weak link in applications, as flaws in open source code have been targeted by attackers looking for the quickest and simplest way to break into systems. Community software projects typically lack sufficient resources to stay on top of bugs and patches, so the new HackerOne program should help.

Whether this newfound abundance of bug bounty programs will boost or dilute efforts to secure software remains to be seen. Kaminsky, chief scientist and co-founder of fraud prevention startup WhiteOps, says the bigger problem with many bug bounty programs has been lesser-quality bug finds, and this new program should raise the bar to avoid that. “What’s good about having this overarching program is that it very much puts a stake in the ground that this is what a program should look like, these are the types of good bugs to pay for,” he says.

The new program has inspired Wysopal to rethink Veracode’s informal bug bounty program for its own software. The secure code firm currently sends a “thank you package” to a researcher who finds any flaws in its code: it has no official funding for a bounty program at this time. Wysopal says he thinks The Internet Bug Bounty may pressure other vendors to pony up with monetary awards for bugs found in their software, even at Veracode: “Maybe I’ll see if I can get some” funding now, he says.

Have a comment on this story? Please click “Add Your Comment” below. If you’d like to contact Dark Reading’s editors directly, send us a message.

Article source: http://www.darkreading.com/vulnerability/new-bucks-for-bugs-program-focuses-on-op/240163714

Comments

Comments are closed.