Apple’s new iPhone bug-hunting scheme branded a “poison pill"
Researchers baulk at hefty restrictions such as being bound to silence during a limitless disclosure window
Researchers have expressed frustration at the terms of an Apple bug bounty scheme in which special iPhones will be shipped out in the hope device and iOS vulnerabilities can be fixed more effectively.
Some voices in the security community have lamented restrictions in the Security Research Device Program (SRDP) which prevent them from publicly or privately disclosing any flaws until Apple sets its own disclosure date. This restriction, in addition to strict rules on how the iPhones can be used, has led some to describe the scheme as a "poison pill".
This SRDP was first announced in August last year at the Black Hat security conference, with no suggestion as to why it’s taken so long for the programme to be launched. Apple said at the time that it wanted to attract some of the most exceptional researchers that have been focusing their time on other platforms.
These devices are “dedicated exclusively to security research”, with unique code execution and containment policies. They also behave as closely to standard iPhones as possible, although shell access is available and researchers can run any tools on them.
They are not meant for personal use or daily carry, however, and must remain on the premises of participants at all times. All verified vulnerabilities, meanwhile, are legally required to be reported to Apple immediately, or the appropriate third party if the bug is found in third-party code.
Apple will then provide participants with a publication date, up to which point participants are restricted from discussing the vulnerability with anybody else, let alone in public.
This aspect of the scheme is proving to be a major sticking point for many, given Apple hasn’t committed to any particular disclosure window or timeline. Effectively, that means researchers can be ‘gagged’ for an indefinite period until Apple decides to set a publication date.
Introducing VMDR: Vulnerability Management, Detection and Response
The all-in-one vulnerability management serviceDownload now
“Apple has no reason to give you a publication date until they decide they want to give you one,” one iOS jailbreaker told IT Pro, adding in a tweet that that participation was “a poison pill”.
“They could take as long as they want. You could be under NDA essentially forever. Disclosure deadlines are standard practice in the industry. They give vendors an incentive to address issues promptly.”
They also highlighted an explanation from Google as to why its Project Zero research programme has a 90-day disclosure window, chiefly, that it incentivises developers to fix vulnerabilities found in their code at a much faster pace.
Apple insists that it will work in good faith to resolve each vulnerability as soon as is practical, and that it will usually provide participating researchers with a publication date.
Researchers who are already a member of the Apple Developer Program can apply to participate in the programme, and will soon begin receiving special iPhones on a 12-month renewable loan should they qualify.