Announcement

Collapse
No announcement yet.

The FBI Paid OpenBSD Developers For Backdoors?

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • #21
    If we can't trust OpenBSD to be secure...

    Also, anyone know how this affects linux? Is the same code used somewhere?

    Comment


    • #22
      Originally posted by curaga View Post
      If we can't trust OpenBSD to be secure...

      Also, anyone know how this affects linux? Is the same code used somewhere?
      This affects all open-source projects by implication, even if they do not use the same source-code. The main issue is that the open-source model is based on trust (or the illusion of trust). Take that away and it doesn't work nearly as well.

      The linux kernel weights at 13500000 lines of code developed by hundreds (if not thousands) of individuals, so even with peer-reviewed patches and dedicated commiters, attackers have a good chance of hiding compromising code somewhere in there. (It doesn't help that C is insecure and unverifiable by default, either).

      I'm not sure what can be done about this. It might be interesting to have a few high-profile contributors inject "evil" code to test the peer-review system and then use the results to tighten security - but this also involves a loss of trust in the process.

      Comment


      • #23
        Originally posted by BlackStar View Post
        The main issue is that the open-source model is based on trust (or the illusion of trust). Take that away and it doesn't work nearly as well.
        Every model is based on trust. The same thing can become/be in proprietary/closed code as well, though then you have no hope to ever learn it.

        Comment


        • #24
          Edit: someone should really file for a patent on backdoors. Steps:

          1. file for a nice, vague patent, e.g. "a secure software system or module for enabling and managing system communication" (sounds good, doesn't it?)
          2. set up a troll company
          3. sue FBI, CIA, M5, Microsoft, Crypto AG and everyone else you can think of
          4. deny rape allegations
          5. profit!

          Comment


          • #25
            Originally posted by Apopas View Post
            Every model is based on trust. The same thing can become/be in proprietary/closed code as well, though then you have no hope to ever learn it.
            No, not really.

            though then you have no hope to ever learn it
            This means you can't trust it, period.

            Comment


            • #26
              Wow the kind of story that matters. Thanks for reporting this.

              Comment


              • #27
                It's been said that OpenSwan and FreeSwan do not contain this code.

                @Blackstar:

                Sex by surprise charges, not rape

                Comment


                • #28
                  Originally posted by BlackStar View Post
                  No, not really.
                  Why not? Who can stop me from adding backdoors in my proprietary code?

                  This means you can't trust it, period.
                  Exactly. That's what we get from that. If such things happen in open code, we can not, never ever, trust code we can't see. That's why is the most stupid thing ever that the greek army (and a lot of others) uses windows as it's main platform

                  Comment


                  • #29
                    Originally posted by Apopas View Post
                    Why not? Who can stop me from adding backdoors in my proprietary code?
                    The only difference is that you (the evil attacker) cannot submit a patch directly to Microsoft unless you work there already.

                    The fact is that users with high security requirements cannot reasonably trust either open-source or closed-source code without a security audit. This is generally simpler to perform on open-source software and you benefit from the fact that multiple eyes have looked at the source code before (security through transparency, all crypto is based on this).

                    Exactly. That's what we get from that. If such things happen in open code, we can not, never ever, trust code we can't see. That's why is the most stupid thing ever that the greek army (and a lot of others) uses windows as it's main platform
                    I'd say that the OS is the least of the problems with this army but yeah, building all government infrastructure on closed-source code controlled by another country is probably not the brightest idea.

                    Comment


                    • #30
                      One thing everyone should do is learn how useless SELinux is.

                      Here is one video:

                      "Linux 2.6.31 perf_counter x86/x64 Local Root Exploit with SELinux user_u defeat and disabling"
                      In this video I demonstrate a different method of exploiting the recent perf_counter vulnerability where it doesn't require a NULL mapping. The technique is...


                      and here is the guys Youtube channel. Phoronix should interview him.

                      Share your videos with friends, family, and the world

                      Comment

                      Working...
                      X