Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Study: Open source poses security risks
ZDNet ^ | May 31, 2002, 9:30 AM PT | Matthew Broersma

Posted on 05/31/2002 3:15:28 PM PDT by Bush2000

A conservative U.S. think tank suggests in an upcoming report that open-source software is inherently less secure than proprietary software, and warns governments against relying on it for national security.

The white paper, Opening the Open Source Debate, from the Alexis de Tocqueville Institution (ADTI) will suggest that open source opens the gates to hackers and terrorists.

"Terrorists trying to hack or disrupt U.S. computer networks might find it easier if the federal government attempts to switch to 'open source' as some groups propose," ADTI said in a statement released ahead of the report.

Open-source software is freely available for distribution and modification, as long as the modified software is itself available under open-source terms. The Linux operating system is the best-known example of open source, having become popular in the Web server market because of its stability and low cost.

Many researchers have also suggested that since a large community contributes to and scrutinizes open-source code, security holes are less likely to occur than in proprietary software, and can be caught and fixed more quickly.

The ADTI white paper, to be released next week, will take the opposite line, outlining "how open source might facilitate efforts to disrupt or sabotage electronic commerce, air traffic control or even sensitive surveillance systems," the institute said.

"Computer systems are the backbone to U.S. national security," said ADTI Chairman Gregory Fossedal. "Before the Pentagon and other federal agencies make uninformed decisions to alter the very foundation of computer security, they should study the potential consequences carefully."


TOPICS: Business/Economy; Technical
KEYWORDS: opensource
Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-80 ... 161-178 next last
To: TomServo
Tags off?
21 posted on 05/31/2002 4:18:06 PM PDT by TomServo
[ Post Reply | Private Reply | To 20 | View Replies]

To: Bush2000; ThePythonicCow
That's a nice boat you've got (on your FR homepage), Mr Bush2000. Is that Seattle in the background? I take it that Microsoft has been good to you. Congratulations on your good fortune

A. It's not my boat. I rented it for a day.

B. It's Miami Beach, not Seattle.

C. Stuff your congratulations.

I do realize that in a "debate" one needs to cavil with minor faults of the other side so as to deflect examination, but you haven't denied that you work for Microsoft, but I'll assume that since you don't want the congratulations for Pythonic, you do indeed work for Microsoft.

The Miami Beach thing is a small mistake, your profile page has "Location: Seattle" and a flag of Washington.

22 posted on 05/31/2002 4:23:23 PM PDT by Shermy
[ Post Reply | Private Reply | To 12 | View Replies]

To: Bush2000
Prove it ... idiot. /sarcasm

Funny thing is they don't disclose their funding.

I can only infer it. They seem to wuv micosoft and MCSEs. At least half the MCSEs I've delt with are oxygen thieves (about the same ratio as CNEs and, I'm sorry to say, only slightly worse then BSEEs). Theirs study 'shows' that MCSEs are good at what they do. Ergo their credibilty is suspect.

Another interesting quote found on slashdot. Senior MS exec. 'We can't disclose source because some of it is so flawed (Message queing and others not listed,) that is would be a national security issue to release it.'

23 posted on 05/31/2002 4:29:20 PM PDT by Dinsdale
[ Post Reply | Private Reply | To 7 | View Replies]

To: gitmo
It's intuitively obvious. Open source for a hacker / terrorist is analogous to having the blueprints for Fort Knox, the US attack plan for Iraq, or the schematics on how our missile targeting systems work. Yes, as someone posted above, it can be decompiled and deduced. But that's a pretty tedious and difficult process. You can also deduce our missile targeting systems with adequate access and time.

if it was intuitively obvious there would be no need for a report from a think tank, now would there?

[anyone care to wager that gregory fossedal of adti will have an op-ed in the wall street journal in the next two weeks about this?]

24 posted on 05/31/2002 4:35:26 PM PDT by danelectro
[ Post Reply | Private Reply | To 9 | View Replies]

Comment #25 Removed by Moderator

Comment #26 Removed by Moderator

To: danelectro
if it was intuitively obvious there would be no need for a report from a think tank, now would there?

Sort of like the Time article reporting the scientists who recently discovered there are differences between men and women and in fact they may even be born different?

27 posted on 05/31/2002 4:49:05 PM PDT by gitmo
[ Post Reply | Private Reply | To 24 | View Replies]

Comment #28 Removed by Moderator

Comment #29 Removed by Moderator

To: Dinsdale
Funny thing is they don't disclose their funding.

Yeah, but somebody else does.

30 posted on 05/31/2002 5:00:43 PM PDT by TechJunkYard
[ Post Reply | Private Reply | To 23 | View Replies]

To: Bush2000
You also don't the get programmer comments when you decompile/ deduce...

Yep, and knowing the size of buffers and how they're parsed makes it that much easier to launch a buffer overrun attack on open source code...

Aha,, so explain how all of those buffer exploits in Microsoft's closed code get discovered.

31 posted on 05/31/2002 5:08:36 PM PDT by TechJunkYard
[ Post Reply | Private Reply | To 15 | View Replies]

To: Bush2000
Study: Open source poses security risks

Ah. That would explaing the Klez.H phenomenon.

32 posted on 05/31/2002 5:29:46 PM PDT by B Knotts
[ Post Reply | Private Reply | To 1 | View Replies]

To: Bush2000
BSA and Microsoft have new partners in the fight against copyright violation: Islamic clerics and anti-Semitic pop singers

"Copyright is my right. Buy a license or you'll have trouble with the police," croons Egyptian pop singer Shaban Abd el-Reheem on his latest album.

For those that don't remember, this is the guy who sang that catchy tune "I Hate Israel."

In February, the Business Software Alliance, the group that represents Microsoft, Adobe, and other software makers concerned about piracy, signed up another unusual partner -- the grand muftis at Al Azhar in Cairo. The highest religious authority in Sunni Islam, Sheikh Ibrahim Atta Allah, issued a fatwa, or edict, against piracy. "Piracy is the worst type of theft and is prohibited by Islam," Atta Allah declared.

This is unrelated to the current thread, but it's just too funny that they're actually signing up Islamic clerics to issue fatwas against unauthorized copying!

33 posted on 05/31/2002 6:08:04 PM PDT by B Knotts
[ Post Reply | Private Reply | To 1 | View Replies]

Comment #34 Removed by Moderator

To: Bush2000
Why don't you post the study when it comes out and we can see if there is anything to it. Until then you are just wasting bandwidth.
35 posted on 05/31/2002 6:20:23 PM PDT by Dan Cooper
[ Post Reply | Private Reply | To 1 | View Replies]

Comment #36 Removed by Moderator

To: discostu
You also don't the get programmer comments when you decompile/ deduce.

That takes the top-end proprietary package!

+=<)B^)

37 posted on 05/31/2002 6:46:12 PM PDT by Erasmus
[ Post Reply | Private Reply | To 13 | View Replies]

To: Bush2000
but before you post "this study was bought and paid for by Microsoft", try providing some references ...

Who can say that until the paper is released? All you can go on is what they've published previously and they seem to have a very sympathetic attitutde towards MSFT.

As for the underlying issue of open vs closed source, most tech people realize that closed source is no more or less secure than open source. Either approach has its drawbacks.

38 posted on 05/31/2002 7:00:27 PM PDT by bobwoodard
[ Post Reply | Private Reply | To 1 | View Replies]

To: Bush2000
DoD, NSA, CIA etc, use plenty of open source sw. BIND, Apache, ssh, perl, gcc, to name a few. These tools are bundled into even the most secure "proprietary" platforms like trusted solaris, tru64 that are staples for secret/SCI systems.

"Cyberterrorism" is on overplayed threat, imo. Fortunately our enemies tend to be primitivists with little education or love for technology. The possibility of these yoyos mounting a orchestrated attack of a magnitude to do serious damage to national security is probably pretty remote.

my two cents: the trick to good data security is not necessarily the tools you use, but the staff/policy implementing them. Good security procedure is something that tends to get overlooked when one starts obsessing over the tools.

Watch your network!

39 posted on 05/31/2002 7:07:05 PM PDT by mikenola
[ Post Reply | Private Reply | To 1 | View Replies]

To: discostu
Assuming the programmer actually commented his code...

Microsoft programmers don't comment their code. Take a look at the CRT source. Take a look at winnt.h if you have a copy of Visual C++. Of course that's just a header file.

40 posted on 05/31/2002 7:29:26 PM PDT by gcraig
[ Post Reply | Private Reply | To 13 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-80 ... 161-178 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson