Thread: Open Source and Security

Hybrid View

Previous Post Previous Post   Next Post Next Post
  1. #1
    Kernel hacker
    Join Date
    Jul 2007
    Location
    Farncombe, Surrey, England
    Posts
    15,677
    Quote Originally Posted by Thantos View Post
    Using closed source as a security measure isn't really security if that is all you have. A lot of attacks can be done without ever looking at the source.
    Not to mention that it doesn't take a lot of skill to understand some assembler code and from that derive a rough sketch of what the code looks like in the original source. If we combine that with some understanding of where the security hole may be located, it is likely that we can find the hole without an enormous amount of effort. Of course, traipsing through tons of disassembly is slightly more complex than doing the same with tons of source code, but it is not sufficient to make one secure and the other insecure in and of itself.

    --
    Mats
    Compilers can produce warnings - make the compiler programmers happy: Use them!
    Please don't PM me for help - and no, I don't do help over instant messengers.

  2. #2
    & the hat of GPL slaying Thantos's Avatar
    Join Date
    Sep 2001
    Posts
    5,681
    Quote Originally Posted by matsp View Post
    Not to mention that it doesn't take a lot of skill to understand some assembler code and from that derive a rough sketch of what the code looks like in the original source. If we combine that with some understanding of where the security hole may be located, it is likely that we can find the hole without an enormous amount of effort. Of course, traipsing through tons of disassembly is slightly more complex than doing the same with tons of source code, but it is not sufficient to make one secure and the other insecure in and of itself.

    --
    Mats
    Well not all software can be broken down that way. For example an type of interpreted code or code ran on a server that you can't get to (at least not without breaking the software in question).

    But yeah, a lot of the initial attempt is just trying known exploits to see what happens which can lead someone who knows what they are doing to break the software without ever looking at the code or assembly.

  3. #3
    Kernel hacker
    Join Date
    Jul 2007
    Location
    Farncombe, Surrey, England
    Posts
    15,677
    Quote Originally Posted by Thantos View Post
    Well not all software can be broken down that way. For example an type of interpreted code or code ran on a server that you can't get to (at least not without breaking the software in question).

    But yeah, a lot of the initial attempt is just trying known exploits to see what happens which can lead someone who knows what they are doing to break the software without ever looking at the code or assembly.
    I was more referring to code that is published as binary only vs. published as (or with) source - someone determined enough will break either. But of course, if the system is running on a server where you do not have access to the code in either binary or source form, it doesn't PREVENT someone from trying to break it - it just makes it a bit harder.

    Apparently, Alan Cox is using "security by obscurity" by running a firewall on a simulated Z/390 running Linux, based on the assumption that if there's a security hole in the firewall+OS, it's unlikely to be found/exploited first on Z/390....

    --
    Mats
    Compilers can produce warnings - make the compiler programmers happy: Use them!
    Please don't PM me for help - and no, I don't do help over instant messengers.

Popular pages Recent additions subscribe to a feed

Similar Threads

  1. Linux Security Modules Programming
    By vugluskr in forum Linux Programming
    Replies: 1
    Last Post: 02-17-2009, 11:10 AM
  2. Punkbuster / DRM / copy protection as Open Source?
    By sept in forum A Brief History of Cprogramming.com
    Replies: 30
    Last Post: 03-11-2008, 07:15 PM
  3. Is Linux More Secure Than Windows?
    By xErath in forum A Brief History of Cprogramming.com
    Replies: 69
    Last Post: 06-29-2005, 07:13 PM
  4. Switch security information
    By Sang-drax in forum Networking/Device Communication
    Replies: 0
    Last Post: 08-04-2004, 11:06 AM
  5. Open source: is it secure?
    By samGwilliam in forum Linux Programming
    Replies: 6
    Last Post: 02-28-2002, 09:58 AM