The administration of U.S. President Barack Obama favors disclosing to the public vulnerabilities in commercial and open source software in the national interest, unless there is a national security or law enforcement need, the country's spy agency said.
The government on Friday countered a news report that said the U.S. National Security Agency knew about the recently identified Heartbleed vulnerability for at least two years and had used it for surveillance purposes.
[ Get your websites up to speed with HTML5 today using the techniques in InfoWorld's HTML5 Deep Dive PDF how-to report. | Cut to the key news for technology development and IT management with the InfoWorld Daily newsletter, our summary of the top tech happenings. ]
The administration said the NSA was not aware of Heartbleed until it was made public in a private sector cybersecurity report.
"When Federal agencies discover a new vulnerability in commercial and open source software -- a so-called 'Zero day' vulnerability because the developers of the vulnerable software have had zero days to fix it -- it is in the national interest to responsibly disclose the vulnerability rather than to hold it for an investigative or intelligence purpose," the Office of the Director of National Intelligence said in a statement Friday.
The ODNI statement added that the White House had reviewed its policies in response to the recommendations of the President's Review Group on Intelligence and Communications Technologies, set up to review the surveillance practices of the NSA.
Under an inter-agency process called the Vulnerabilities Equities Process, unless there is a clear national security or law enforcement need, the process is "biased toward responsibly disclosing such vulnerabilities," according to the spy agency.
One of the recommendations in December of the review group was that U.S. policy should ensure that zero-day vulnerabilities are quickly blocked and the underlying vulnerabilities are patched on U.S. government and other networks. The group allowed that in "rare instances," the policy of the government may briefly authorize using a zero-day flaw for intelligence collection after inter-agency review involving all relevant departments at a senior level.
Referring to allegations that the U.S. government introduced "backdoors" into commercially available software, enabling the decryption of apparently secure software, the review group said it was not aware of any such incidents, but advised that the US Government should make it clear that the NSA will not engineer vulnerabilities into "encryption algorithms that guard global commerce."
The Heartbleed vulnerability takes advantage of a problem in certain versions of OpenSSL, a set of encryption tools used for securing Web connections, and could allow a remote attacker to expose critical data such as user authentication credentials and secret keys.
Internet companies rushed to fix the problem, while the Canada Revenue Agency halted online filing of tax returns by the country's citizens as a preventive measure. The CRA's systems were restored on Sunday after applying a "patch" that addresses the vulnerability. "We could not allow these systems back online until we were fully confident they were safe and secure for Canadian taxpayers," said CRA Commissioner Andrew Treusch in a statement. The U.S. Internal Revenue Service said it continued to accept tax returns ahead of an April 15 deadline, as its systems were not affected by Heartbleed