Jump to content

Firesheep Not Evil, Says Snooping Tool's Maker


Recommended Posts

Computerworld - The security researcher who created the Firesheep snooping tool defended his work today, saying it's no one's business what software people run on their computers.

He also criticized Microsoft for adding detection of Firesheep to its antivirus software, calling the Redmond, Wash. company's move "censorship."

Eric Butler, the Seattle-based Web applications developer who released Firesheep more than a week ago, took to his blog Tuesday to counter claims that the tool, or more precisely, using the tool, is unethical and perhaps illegal.

Firesheep, which was released Oct. 24 and has been downloaded nearly 550,000 times since, is an add-on to Mozilla's Firefox browser that identifies users on an open network -- such as a coffee shop's public Wi-Fi hot spot -- who are visiting an unsecured Web site. A double-click in Firesheep gives its handler instant access to the accounts of others accessing Twitter and Facebook, among numerous other popular Web destinations.

Legal experts have split over Firesheep legality, with some believing using it to hijack accounts violates U.S. federal wiretapping laws while others see it differently. All agreed that the law is "unsettled" before the courts.

Others have said there is virtually no chance that Butler would face charges for distributing Firesheep, since creating tools like it are not illegal.

Butler said essentially the same thing today, although in much stronger language. "It is nobody's business telling you what software you can or cannot run on your own computer," he said, noting that Firesheep can be used for legitimate purposes, including security testing.

"A much more appropriate question is: 'Is it legal to access someone else's accounts without their permission?'" he wrote.

Butler again argued that he built Firesheep to raise awareness about sites that don't encrypt all traffic between users and Web services. "As I've said before, I reject the notion that something like Firesheep turns otherwise innocent people evil," said Butler.

In the eyes of the law, Butler's rationale is misplaced, said Joe DeMarco, a former Assistant U.S. Attorney and now a partner with the New York City-based law firm DeVore & DeMarco LLP. "Motive, as distinct from intent, generally is not an element of federal crimes, including federal computer crimes," said DeMarco.

"You can't rob a bank, give [the money] to the starving, and then claim you are not guilty of robbery," he said. "By the same token, you can't help others commit cybercrimes and escape liability. If you make software which enables unauthorized access to other people's accounts with the intention of facilitating that crime, you may very well be liable for violating the Computer Fraud and Abuse Act under established principles of aiding and abetting and conspiratorial liability."

Motive does, however, come into play when it comes to what DeMarco called "prosecutorial discretion."

By the latter, DeMarco meant that prosecutors may not chose to go after Butler, or the maker of any other hacking tool, simply for engaging in that activity even where they believe that a crime was committed. They haven't so far.

"I'm not aware of any federal prosecution for the mere creation of software that enables you to log on to other people's accounts," DeMarco aid. "There's almost always something else at play."

Butler also took Microsoft to task for adding Firesheep detection to its antivirus software, including Security Essentials, the free-of-charge consumer software, and its various enterprise-grade security programs.

Butler argued that Microsoft is violating users' trust by detecting Firesheep as malware.

"By installing antivirus, you grant a third party the ability to remove files from your system trusting that only malicious code will be targeted," he said. "Microsoft and other antivirus vendors abuse this trust and assert what they think you should or should not be doing with your computer." Butler also blasted Apple's App Store as another example of what he called "censorship."

"Code is a form of speech, and the freedom of speech must remain protected," Butler asserted. "If Microsoft wants to improve security with censorship, it would be more appropriate to block the insecure Web sites that are exposing user information in the first place."

Microsoft's Firesheep detection listing is extremely terse, and includes no technical information or details on what its security software does when it sniffs out the packet sniffer.

But Jeff Williams, a principal group program manager with the Microsoft malware center, filled in some of the blanks.

"Microsoft's anti-malware packages assign an alert level of 'Medium' to hacker tools such as Firesheep," Williams said in an e-mail reply to questions. "[That] rating applies to programs that might affect your privacy or make changes to your computer that could negatively impact your computing experience, for example, by collecting personal information or changing settings.

Medium-rated threats aren't scrubbed from a PC, Williams added, but are instead quarantined. Users are then asked whether they want to delete or retain the file. "Nearly half of our customers are choosing to remove [Firesheep]," said Williams.

As for Butler's assertion that software code is analogous to free speech, some of the people who added comments to his blog agreed, others did not.

"What Eric [butler] has done is publicly expose and drive awareness to an important security flaw that many large Web sites have knowingly ignored for years," said someone identified as "swindsor" in a comment posted Tuesday.

"Sometimes it is the government's business what software you run on your computer, if the sole purpose for something happens to be illegal, then it's a valid point to say that the software itself should be illegal," countered "instrum3nt."

Butler and his colleague, Ian Gallagher -- the two led a Firesheep presentation at the ToorCon security conference on Oct. 24 -- have declined Computerworld's requests for interviews in the past. Instead, Gallagher said in an e-mail last week, the pair plan to use Butler's blog to answer media inquiries.

Butler did not responded to another request for additional comment today.

Source: http://www.computerworld.com/s/article/919...mp;pageNumber=1

Link to comment
Share on other sites

I have no confirmation of this, but I swear I read a tweet someone put out about finding a backdoor into a machine via a flaw in firesheep, so another reason not to really use it for sidejacking as a full time tool.

The program was a POC, and made his point, so for the guy to get upset with people like Microsoft for taking action against the tool is kind of silly. I think he should take it as a good thing someone wants to flag it because it brings awareness more to the cause of what he was trying to show. Bad press is sometimes good press, and in this case, it only helps his add-on get more popular and bring awareness at the same time and not censor it like you posted above.

Link to comment
Share on other sites

He wanted to make the public aware of the implications of using this tool and now Microsoft responded their way, by adding detection signatures to their security software.

It was obvious that someone would sooner or later do something about Firesheep.

Link to comment
Share on other sites

He wanted to make the public aware of the implications of using this tool and now Microsoft responded their way, by adding detection signatures to their security software.

It was obvious that someone would sooner or later do something about Firesheep.

But to Microsoft's defense, many anti-virus programs flag tools, they aren't the only vendor to do this.

For instance, My anti-virus flags most nirsoft programs and things like netcat, which I use for personal testing. Even tftp programs and VNC get flagged, but you have the option to allow them to run and put them in your ignore list.

What Microsoft does with respct to allowing things to run or automatically quarantining them, I don't know. I doubt someone who uses firesheep to attack others is going to be concerned with using Microsoft's anti-virus as well.

For testing purposes, people who have legit concern or desire to use and learn from firesheep, would more than likely have knowledge of how to use it with no concern for treating it as malware. Not to mention its not like it infects a system, you have to take steps on your own to install it, by which most users wouldn't even be concerned with or know how. The ones who do, know what they are doing it for.

Edited by digip
Link to comment
Share on other sites

Exactly, if you know what you are doing, and know how these tools operate, then nothing can stop you from using them, doing it at own risk of course and taking precautions when using them very important.

Edited by Infiltrator
Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Recently Browsing   0 members

    • No registered users viewing this page.
  • Create New...