Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Security

Defending Open Source Security 260

dpilgrim writes "DevX's A. Russell Jones as thrown down the gauntlet, questioning the security of Open Source software. I've picked up the gauntlet and posted a response over on the O'Reilly Network. As previously discussed on /. Jones' comments are too controversial to ignore."
This discussion has been archived. No new comments can be posted.

Defending Open Source Security

Comments Filter:
  • by heironymouscoward ( 683461 ) <heironymouscowar ... .com minus punct> on Saturday February 14, 2004 @07:09AM (#8278732) Journal
    Heironymous' Prime Law of Journalism:

    Opions are valued in inverse relation to the amount of money paid to produce them.

    In this case, the opinion that transparency is bad for security is of so little value that it's difficult to answer it with a serious tone.

    After all, Windows is remarkable for its security wrt to something like, OpenBSD, known for its secretive and opaque practices.

    lol.
  • by darnok ( 650458 ) on Saturday February 14, 2004 @07:14AM (#8278742)
    Now that the MS source for NT 4 and Win2k is "out there", even if only in part, we'll have a good chance to see exactly how secure it is over the next several months.

    Anyone want to bet that the number of exploited Windows security holes is NOT gonna soar?
  • by file-exists-p ( 681756 ) on Saturday February 14, 2004 @07:22AM (#8278763)
    There is no doubt it may help someone to break into your system if he has the source code or your OS and various deamons. Fortunately, when it's open-source, we can hope bugs allowing bad guys to break in may have been spotted by nice guys before and patched.

    The real problem would be if only bad guys had your source code .... that would really suck. If for instance there was a leak of your source code on the internet, and of course only bad guys would look at it (because others do not give a shit) and thus you would get only the bad part of the opennes ...

    Yeah, that would suck. That would really suck.

    --
    Go Debian!!!
  • Re:Huh? (Score:3, Interesting)

    by TrancePhreak ( 576593 ) on Saturday February 14, 2004 @07:24AM (#8278774)
    What about like what happened when the source tree was compromised and someone added a line of code that didn't look all that bad until further investigation when it gave programs root access? I remember they asked for MD5 sums and they were able to track down the root of the problem, but what if someone better was able to modify something on a system such as that without notice?
  • He might be right... (Score:2, Interesting)

    by kyshtock ( 608605 ) on Saturday February 14, 2004 @07:26AM (#8278780)
    I believe he's right... if he means proprietary source code that finally goes in the wild. The moment code opens, troubles are waiting to happen. If some recent events ring a bell, that's not my fault :)

    On the other hand, if he means code that's been built openly... damn, what's better than having the software AND the source code for inspection? how do you beat that?

  • by tigress ( 48157 ) <rot13.fcnzgenc03@8in.net> on Saturday February 14, 2004 @07:31AM (#8278794)
    I was recently involved in a project where a large Swedish car manufacturer migrated to a corporate wide client platform. The operating system was supplied by a major American software company, packaged by a major American computer manufacturer, reviewed and further packaged by the car manufacturer's mother company and finally tailored for local requirements by one of our teams.

    At any one of those stages, a hacked binary could've been introduced into the operating system. To modify a binary, even without access to the source code for said binary, is a trivial task for anyone with a rudimentary knowledge of assembler.

    Proprietary code does not, in any way, prevent malicious code from entering the system. One of the points in the original article was that a malicious distribution could be specifically tailored for and marketed to, for instance, a government. My example above shows how a proprietary code operating system can be used in a similar way, and this time without any source code to check against.
  • by tigress ( 48157 ) <rot13.fcnzgenc03@8in.net> on Saturday February 14, 2004 @07:35AM (#8278803)
    Playing the devil's advocate here, you can trust source from Apache yes, but can you trust a precompiled Apache HTTPD from ACME GPU/Linxu?
  • Feeding trolls... (Score:4, Interesting)

    by yoshi_mon ( 172895 ) on Saturday February 14, 2004 @08:03AM (#8278869)
    To be quite honest I never gave that Dev X's troll any thought. But apparently /. seems to feel that this very poorly written piece of work deserves not one but two front page storys. So be it. (I sure hope to hell that OSDN is not getting any cash from those losers. It would really ruin my day.)

    Bottom line for me is that FUD is FUD is FUD is FUD. There are several ways to combat it and one of them is to just let those that want to FUD away while we continue to build, create, use, and accept that OSS is a good thing for everyone. Those with small minds are scared, good. I don't want those people involved with me and it makes me actually feel good when I see that they have to resort to such lies and FUD to try to defend what they see as "the only way".

    I read a comment here the other day about how someone viewed OSS OSes as the ultimate capitalist leveling field. By making not only the hardware but the base software, the OS, open you then allow everyone to create things as they wish and without any strings. They even can make them closed source if they so wish but the hooks, protocals, and standards are open such that you can make the software work correctly, regardless of platform.

    As has been sited here many times MS has not even given that freedom to it's programmers with it's lack of API documentation in addition to it's lack of standards (Unless you think that they are alone in being able to set them. Go away then you shrill.) and numerous changes in even their own types of file standards. (Why does MS Word docs have to change so often? Hello, forced upgrades.)

    I really could care less about such FUD from some lame ass website that I personally have never visisted or even heard of until reading the inital /. artical. They can go toil in obscurity imo and we are ill served by even giving them the time of day.
  • by Anonymous Coward on Saturday February 14, 2004 @08:12AM (#8278890)
    In fact attempts to prove it have backfired:

    Linux security site abandoned

    Is Linux security good enough or does no-one actually care?

    http://www.techworld.com/news/index.cfm?fuseacti on =displaynews&NewsID=971

    It seemed like a good idea at the time. Set up a website that allows users and developers alike to check which pieces of Linux code have been checked for security holes. The project, dubbed Sardonix, was a classic open source solution to a clear problem.

    The scheme's originator Crispin Cowan, chief research scientist at WireX Communications, said: "Auditing is needed not just because some developers refuse to read, or follow such standards, but also because humans make mistakes and may fail to completely, or correctly, follow all rules perfectly."

    Yet few became involved because, according to Cowan, there's no glory in auditing security holes.

    Funded initially by the US defence establishment body Defense Advanced Research Projects Agency (DARPA), the research grant aiming to centralise what was, and remains, a fairly loosely structured review process dried up nine months ago.

    The plan was that volunteer code auditors would be ranked according to the volume of code they examined and the number of security holes discovered. Points would be lost if holes were subsequently discovered in code passed as clean.

    But, said Cowan, "I got a great deal of participation from people who had opinions on how the rankings should work, and then squat from anybody actually reviewing code."

    Cowan added: "The Bugtraq model is: find a bug, win a prize - a modest amount of fame," says Cowen. "Our model is: review a whole body of code, eventually finding no bugs, and receive a deeper level of appreciation from people who use the code. It seems the Sardonix lesson is people don't want to play this game, they want to play the Bugtraq game."

    Some have commented that few people can both code and have sufficient expertise to spot buried security bugs for no reward, while others moot a lack of visibility and marketing as the reason for the site's demise.

    Only 22 pieces of code are listed on the site as having been audited, 14 as unaudited.

  • by I confirm I'm not a ( 720413 ) on Saturday February 14, 2004 @08:14AM (#8278895) Journal

    The impression I formed from the DevX article was that it was aimed at government (and I suppose you could article that that might influence large corporations, too).

    In my experience government and corporate IT admins are *not* trusting souls. As an example, I once worked as a contractor for an agency that built software for the UK health service: everything I built was then reviewed and recompiled by in-house staff. The manager told me that they preferred open-source precisely because of the ability to review source code. Cost was only a secondary factor.

    The same manager also commented that security-through-obscurity - relying on closed-source to deter evil-doers - was not an acceptable option as it placed to much reliance on third-parties.

  • by gweihir ( 88907 ) on Saturday February 14, 2004 @08:17AM (#8278902)
    Now that the MS source for NT 4 and Win2k is "out there", even if only in part, we'll have a good chance to see exactly how secure it is over the next several months.

    To tell you the truth, I am not interested. Why should I look at parts of a badly structured, feature infested, bug infested monolith of an OS? When I can at the same time find out how to do it right by looking at the sources of the Linux kernel or one of the open sourced BSD's? Why would I actually want to read bad code?

    True, some people will actually spend the time to find vulnerabilities. Some of them (especially those in military and commercial espionage) will not publish what they find. But I suspect these people already had this kind of access before. And the usual script-baby loosers do not have the competences to understand the sources anyway.

    One thing could happen though: Too many published and still current vulnerabilities for MS to fix. Or even worse, vulnerabilities they cannot fix because they made bad design decisions. Will be interesting to watch.
  • by mattyrobinson69 ( 751521 ) on Saturday February 14, 2004 @08:34AM (#8278941)
    in light of what happened this week (NT4 & Win2k's source being leaked (therefore much of XP and longhorn), microsoft cant claim that their source isn't available to 'bad people' anymore. My friend downloaded the source himself a couple of days ago, i didn't have a look because to be honest, i dont care. Microsoft's source being available is far worse for security than linux/BSD etc source being available because microsoft chose "security through obscurity" - OSS OS's dont. Since NO Firewall/Virus scanner can prevent you from holes in services that are supposed to run (MSN Messenger for example [was that leaked?]) there's going to be some bad stuff happening this week to companies running windows. Hopefully, this will give them reason to choose a more secure platform next time they change software, instead of just upgrading to the latest windows.
  • by Anonymous Coward on Saturday February 14, 2004 @09:03AM (#8278998)
    and compared the result to your own compiled versions and how did you do the comparing? Just curious...
  • Follow the $ (Score:2, Interesting)

    by sosegumu ( 696957 ) on Saturday February 14, 2004 @10:14AM (#8279223)
    Funny thing is that I just checked the devX webpage with this story on it and, of course, there's an ad for Microsoft .Net right next to it.

    So much for objectivity.

  • by fizbin ( 2046 ) <martinNO@SPAMsnowplow.org> on Saturday February 14, 2004 @10:58AM (#8279416) Homepage
    There's this guy I know from college who's written a free (as in beer) game for Windows. (Maybe you've heard of it [jardinains.com]; he also spends too much time on slashdot [slashdot.org]). Tens of thousands of windows users have downloaded it (according to webserver logs) and (presumably) run it on their machines, almost all of them (presumably) while logged in as administrator or equivalent. (At one point, it got farked [fark.com], and is still getting referer hits from there)

    Sure, you've found a patch of very trusting FreeBSD users. However, I'll bet that this one stupid windows game is downloaded and run with full privleges with no safety checks at all by a hundred times as many people.
  • by Anonymous Coward on Saturday February 14, 2004 @11:33AM (#8279608)
    I think you guys should know that many areas of government are already demanding Linux solutions whenever possible and has been for quite some time. I know of other contractors who haven't sold a Win 2000 license to the gov in well over a year, all Redhat. Sometimes we even get requests for Gentoo and Debian systems.
  • by Anonymous Coward on Saturday February 14, 2004 @12:23PM (#8279913)
    Overall, good points. However, I think there are a few grains of truth in the original article.

    When running commercial distros, I've never been sure that the source I have actually matches the (precompiled) binaries that the distro provides. In more than one case, I've found that patches that have obviously been applied to the kernel I'm running aren't in the source provided with the distro.

    This doesn't inspire confidence.

    The solution, of course, is to throw out the commercial providers altogether and compile everything from inspected source stored in a secured repository. This isn't something a small company could do, but would be eminently practical for a large enough organization or a government.
  • Ad hominem (Score:3, Interesting)

    by Salamander ( 33735 ) <jeff AT pl DOT atyp DOT us> on Saturday February 14, 2004 @12:37PM (#8279993) Homepage Journal

    The accusation of bias at the end does open source no credit; someone writing for O'Reilly could be accused of bias as easily as someone writing for DevX. Stone would have done better to leave that out, and read one of the advocacy FAQs instead. DevX itself hosts a better rebuttal [devx.com] than his.

  • by roman_mir ( 125474 ) on Saturday February 14, 2004 @01:06PM (#8280158) Homepage Journal
    (I wrote this yesterday and tried to post it as an article on /., but apparently there are so many more interesting and better written articles posted on the front page here that mine did not meet the qualifications to be posted. Or maybe it is just so off-topic and does not represent any real new ideas or news for nerds, you know, no stuff that matters is expressed in it, so don't read it.) I am sure that all of you would agree that the free software community has been facing some bad publicity since the entire SCO incident started about a year ago. I am also sure that when the SCO goes away another publicity stunt will be performed by some other corporation or an entity that could potentially cause more trouble. An earlier article [slashdot.org] on /. reminded us that there are other dangers that could stall the development of free software projects - an illegally distributed application source base can become the next battlefield for the free source community. Whether this source code could be distributed with an intent to contaminate is not the issue, the issue is that it is important to convey the message to the public that this community does not want to contaminate its source code with proprietary software. We know that the Linux kernel for example is maintained by a group of people who would never want to be faced with the problem of proving in the court of law that their creation is really their own code. What about other projects? How many lawsuits are comming towards this community? I do not know that. But I understand that some preventative measures should be taken, some measures that will clearly display that this community wants free software and free software will not be stolen from other source bases.

    How can this be ensured and how can it be easily shown in a court of law that this community takes copyright issues seriously? One way that I see is to set up a server that runs the comparator [catb.org] by ESR against any new submission to any open source project against any code released either by mistake on with malice by a closed source vendor.

    This will help to identify copyright problems before they arise. Of course to have a proprietary source code base on this server would probably be illegal in itself but it is unnecessary to have the proprietary source code, all that is needed is a set of hash-keys that identify that source code.

    How could this work? A copyright protection server (CPS) would have hash-keys supplied by different vendors of software that falls into various categories and the free software projects are also divided into these categories. Let's say there is a free software project that deals with image manipulations. The CPS would run a hash-key generator on the new code submission and then would compare the generated keys with the keys supplied by Adobe or other companies specialized in image manipulations. Of-course the closed source companies would have to run the hash-key generators on their code and supply their keys, and someone has to tell them to do that, but if it is done right then the following would happen:

    1. The Free Software community would have better protection from inappropriate code submissions.
    2. This can be publicised and shown that the Free Software community takes their work seriously and goes to the great length, much more than any corporations to make sure that their code is Free and free of inappropriate submissions.
    3. In a court of law this can be very useful, it shows good faith on the part of the free software community.
    4. This would make it easier to also figure out whether the closed source vendors are misusing GPLed software :)
    5. This makes a nice project that can be commercialized (with all the lates IP propaganda and lawsuites.)
    6. This hopefully will prevent many possible infringement claims.

    Well, this is just a thought, but I think this kind of verification will become part of reality at some point in the future, given more lawsuites.

    Any thoughts, comments, suggestions, ideas?

  • How many people work at software development companies that sacrifice quality to meet a deadline that sales or marketing proposed to the customer?

    How about a company [thescogroup.com] thats taken a new and possibly bad direction because one of the executives or a newly appointed CEO [thescogroup.com] wants to impress shareholders [sco.com] and make money for themselves?

    Point being, OSS projects are typically written on a timeline based on one requirement, is the project ready for the release?

    It has always been my opinion that publicly traded companies are ruined by their shareholders.


  • by sethamin ( 533611 ) on Saturday February 14, 2004 @03:28PM (#8281047)
    Okay, after reading through both the respone and the replies here on Slashdot I can honestly say that the vast majority of you are missing the point of the original article.

    Yes, it's true that closed, proprietary software can have malicious code introduced into them just as well as free software. But part of the original argument is that the barrier to entry to creating your own distribution of project X is extrememly low, probably even close to zero (the author never said this explicitly, but I think it was implied). So while, yes, closed systems could get infected, too, there is an underlying assumption that proprietary software has stricter screening of its employees for just such a reason. There is no screening in free software; it's basically a free-for-all.

    Also, I see a lot of responses saying varying degrees of "geez, they can just verify their binaries/source trees!". Well, once again, this is the classic Linux naivete of assuming too much on the part of the user. Sure, if we're talking about highly sensitive software then there will presumably be some auditing mechanism to make sure the software is legit. However, to assume that everyone has ready access to intelligent programmers to verify all their computer purchasing decisions is rather absurd, especially in the lower levels of government.

    In short, I didn't think the response was really responding to the argument at all. Of course closed software can have the same backdoors! But did the author even stop to ponder, "Hey, I wonder why he might have singled out free software as being more vulnerable? Hmmm, no reason I can think of!"

  • by geekee ( 591277 ) on Saturday February 14, 2004 @06:51PM (#8282255)
    The issue isn't whether or not secrecy provides security. The issue is, what is the motive for writing the code. If a company is writing the code, unless you're a conspiracy theorist, the company is writing the code to sell and make money. Adding security flaws purposely would harm this primary interest if caught, and cause the customer to find someone else, if possible. Therefore, it is not in a company's interest to introduce security flaws into code. Now, with open source code, the motive of a particular programmer is less clear. He's not getting paid, so he either wants to write code so he can use it for himself, gain some leel of fame, etc. It would be easier, however, if the motive was to compromise the security of a software product, to join an open source project and sabotage it, than to try and gain employment at a software company and do the same thing.

Remember to say hello to your bank teller.

Working...