On the Other hand: Re: [ISN] Auditors warn of foreign risks to
weapons software
InfoSec News
isn at c4i.org
Wed Jun 2 04:44:05 EDT 2004
Forwarded from: security curmudgeon <jericho at attrition.org>
Cc: Hope This Works <dano at ghs.com>, Or This One <odowd at ghs.com>, Maybe This One <dan at ghs.com>
: Dan O'Dowd Reminds World of UNIX Creator Ken Thompson's Security Stunt
: "We must not entrust national security to Linux," he declares.
: April 11, 2004, http://linuxworld.com/story/44468.htm
: In a speech intended to serve us a wake-up call to anyone relying on the
: "many eyes" that look at the Linux source code to quickly find any
: subversions, the CEO of Green Hills Software last week reminded his
: audience how UNIX's creator Ken Thompson installed a back door in the
: binary code of UNIX that automatically added his user name and password
: to every UNIX system - a secret he revealed only 14 years later.
: "The very nature of the open source process should rule Linux out of
: defense applications," O'Dowd said.
How is this any different than Windows or Solaris (or a dozen others)
then? Both should be ruled out just as fast since each has shared its
source code with the world. Solaris source has been available for
years (and was available for years before they willingly made it
public). Microsoft has shared huge portions of Windows source code
with the Chinese government, and i'm sure we can trust them to report
vulnerabilities they find .. right?
: "The open source process violates every principle of security. It
: welcomes everyone to contribute to Linux. Now that foreign intelligence
: agencies and terrorists know that Linux is going to control our most
: advanced defense systems, they can use fake identities to contribute
: subversive software that will soon be incorporated into our most
: advanced defense systems," he continued.
They can also use those fake identities to get a job at Microsoft (or
Green Hills) where the code is reviewed by significantly less people,
then pushed out to millions of customers world wide. Is this any
different than O'Dowd's scenario?
: "If Linux is compromised, our defenses could be disabled, spied on, or
: commandeered. Every day new code is added to Linux in Russia, China and
: elsewhere throughout the world. Every day that code is incorporated into
: our command, control, communications and weapons systems. This must
: stop," he added, before continuing:
And if these systems are running Windows or Solaris, it's magically
better? Because those two operating systems don't have vulnerabilities
or something? Microsoft has proven it doesn't need foreign agents to
code gaping holes in its products. Or is this some obscure argument
that the world needs to move to proprietary RTOSs and self-serving
advertising?
: "Linux in the defense environment is the classic Trojan horse scenario -
: a gift of 'free' software is being brought inside our critical defenses.
: If we proceed with plans to allow Linux to run these defense systems
: without demanding proof that it contains no subversive or dangerous code
: waiting to emerge after we bring it inside, then we invite the fate of
: Troy."
You demand proof? You have the source, audit it. Find all the
malicious backdoors and trojans in it. Quit grandstanding and spouting
this crap and *prove* it beyond doubt. That would seal your argument.
: One of O'Dowd's most telling points came when he debunked the claim by
: Linux advocates that its security can be assured by the openness of its
: source code, arguing that "many eyes" looking at the Linux source code
: will quickly find any subversions.
:
: Ken Thompson, the original developer of the Unix operating system (which
: heavily influenced Linux) proved that this just isn't true, O'Dowd
: argued. Thompson installed a back door in the binary code of UNIX that
: automatically added his user name and password to every UNIX system.
:
: O'Dowd told his audience that, when Thompson revealed the secret 14
: years later, he declared:
:
: "The moral is obvious. You can't trust code that you did not create
: yourself. No amount of source-level verification or scrutiny will
: protect you from using untrusted code."
:
: "Before most Linux developers were born, Ken Thompson had already
: proven that 'many eyes' looking at the source code can't prevent
: subversion," said O'Dowd. "Linux is being used in defense applications
: even though there are operating systems available today that are
: designed to meet the most stringent level of security evaluation in
: use by the National Security Agency, Common Criteria Evaluation
: Assurance Level 7 (EAL 7)."
This is worthy of a used car salesman. Two major points here, and I
get to paraphrase since others have seen through this..
http://www.a42.com/node/view/149
Huh? Since when was Unix Open Source? Notice the technique here: first,
make an association between Linux and Unix. Then, tell an anecdote about
how Unix, a Closed Source project, was infected with a security leak.
Then...voil! Linux joins the Axis of Evil. This is a classic non
sequitur. It's another example of the deconstruction of both the English
language and the logical thought processes of the general population.
http://www.networkmagazine.com/article/NMG20020826S0005
Backdoors also have a long history in Unix software. Ken Thompson, a
designer of the Unix OS, explained his magic password, a password that
once allowed him to log in as any user on any Unix system, during his
award acceptance speech at the Association for Computing Machinery (ACM)
meeting in 1984. Thompson had included a backdoor in the password
checking function that gets included in the login program. The backdoor
would get installed in new versions of the Unix system because the
compiler had Trojan Horse code that propagated the backdoor code to new
versions of the compiler. Thompson's magic password is the best known,
and most complex in distribution, backdoor code.
So first, O'Dowd is trying to say that old UNIX is magically Linux and was
open source, when it most certainly was not. Second, he says that Thompson
revealed this fact 14 years later, yet the talk that disclosed it was
presented in 1984, long before Linux was even a notion in Torvalds' mind
(http://www.li.org/linuxhistory.php). You can read details of Thompson's
tomfoolery in his presentation (http://vx.netlux.org/lib/mkt00.html).
Third, the backdoor wasn't in the UNIX operating system, but the
closed source compiler being used at the time (which was also used by
Microsoft very early on.. trust issues and tin foil hats!), not the
GNU C compiler. Further, his backdoor *was* discovered by people
working on UNIX and by one professional's guess (no, not mine), it was
around for six years before being discovered, in a closed source
system, much like some of the nasty Windows bugs we see these days.
O'Dowd's entire argument is a practical joke that some reporters fell for.
All of that said, if it's really that bad, why does O'Dowd's company boast
about its impressive sales and mentions that they sell embedded Linux?
http://www.ghs.com/news/220304v.html
In its latest study, entitled "Embedded Software Strategic Market
Intelligence Program: Volume IV," published February, 2002, VDC reports
on the worldwide market for all embedded operating systems for the year
2001. According to the VDC report, the embedded operating system market
is estimated to top $663.8 million in 2001 shipments. This includes
shipments of embedded operating systems from Microsoft (Windows XP
Embedded, Windows CE), Palm (PalmOS), VenturCom (Windows), Symbian
(SymbianOS), Sun (Solaris) and several vendors of embedded Linux.
Despite this, Green Hills is on a recent anti-Linux crusade:
http://www.ghs.com/news/index.html
17-May-2004: Green Hills Software Issues White Paper: Linux in
Defense: An Urgent Threat to National Security
10-May-2004: Green Hills Software Issues White Paper: Linux in
Defense: Free Software Is Just Too Expensive
3-May-2004: Green Hills Software Issues White Paper: Linux Security:
Unfit for Retrofit
26-Apr-2004: Green Hills Software Issues Linux Security White Paper:
Many Eyes No Assurance Against Many Spies
19-Apr-2004: Green Hills Software CEO Responds to Linux Security
Controversy
8-Apr-2004: Using Linux Software in Defense Systems Violates Every
Principle of Security Says Green Hills Software's CEO and Founder
I'm not defending Linux as some magic solution to insecure operating
systems, i'm not touting it as a secure alternative to any other
operating system. However, I am tired of a few clowns conveniently
bashing Linux and Open-Source for their own gain, especially when they
use paid-for research (ADTI) or arguments that are easily shot down by
third graders (GHS).
So O'Dowd .. what's your real motivation here? Have anything remotely
substantial to back these claims? Or is this a convenient media frenzy
designed to get attention for your company? Just a way to scuttle your
competition (MontaVista Software)?
Jericho
Security Curmudgeon
Another Rebuttal: http://www.madpenguin.org/Article1182.html
More information about the ISN
mailing list