Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. The Lounge
  3. Open source security

Open source security

Scheduled Pinned Locked Moved The Lounge
security
23 Posts 11 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • M MatthysDT

    I'm in search of a website or online knowledge base with an extensive record of security issues, known breaches and vulnerabilities in known open source projects. Many open source projects don't openly make this information available. . you can't forget something you never knew...

    C Offline
    C Offline
    Christopher Duncan
    wrote on last edited by
    #4

    Seems to me that there's no such thing as "secure" open source. By definition, the source code is readily available, which is the best blueprint you can get for those who wish to do bad things. Author of The Career Programmer and Unite the Tribes Know someone who desperately needs to get a clue? Visit www.DownloadAClue.com and send them one!

    J M 2 Replies Last reply
    0
    • C Christopher Duncan

      Seems to me that there's no such thing as "secure" open source. By definition, the source code is readily available, which is the best blueprint you can get for those who wish to do bad things. Author of The Career Programmer and Unite the Tribes Know someone who desperately needs to get a clue? Visit www.DownloadAClue.com and send them one!

      J Offline
      J Offline
      James R Twine
      wrote on last edited by
      #5

      FWIW, that is actually one of the definitions of a secure cryptographic system, IIRC.  "Your cryptographic system is secure if potential attackers having access to its source code does not decrease its security or increase their chances of breaking it" - or something kinda-sorta-almost like that...    Peace! -=- James


      If you think it costs a lot to do it right, just wait until you find out how much it costs to do it wrong!
      Avoid driving a vehicle taller than you and remember that Professional Driver on Closed Course does not mean your Dumb Ass on a Public Road!
      DeleteFXPFiles & CheckFavorites (Please rate this post!)

      C 1 Reply Last reply
      0
      • J James R Twine

        FWIW, that is actually one of the definitions of a secure cryptographic system, IIRC.  "Your cryptographic system is secure if potential attackers having access to its source code does not decrease its security or increase their chances of breaking it" - or something kinda-sorta-almost like that...    Peace! -=- James


        If you think it costs a lot to do it right, just wait until you find out how much it costs to do it wrong!
        Avoid driving a vehicle taller than you and remember that Professional Driver on Closed Course does not mean your Dumb Ass on a Public Road!
        DeleteFXPFiles & CheckFavorites (Please rate this post!)

        C Offline
        C Offline
        Christopher Duncan
        wrote on last edited by
        #6

        True enough. Meanwhile, out here in the real world... :) I mean, can you imagine how many attacks there would be on IE if people had the source code? :rolleyes: Author of The Career Programmer and Unite the Tribes Know someone who desperately needs to get a clue? Visit www.DownloadAClue.com and send them one!

        Z S 2 Replies Last reply
        0
        • C Christopher Duncan

          True enough. Meanwhile, out here in the real world... :) I mean, can you imagine how many attacks there would be on IE if people had the source code? :rolleyes: Author of The Career Programmer and Unite the Tribes Know someone who desperately needs to get a clue? Visit www.DownloadAClue.com and send them one!

          Z Offline
          Z Offline
          Zac Howland
          wrote on last edited by
          #7

          Christopher Duncan wrote:

          I mean, can you imagine how many attacks there would be on IE if people had the source code?

          Few to none because by the time someone figured out how to exploit a bug in the code, a thousand other people would have already fixed the issue and either submitted the fix to online forums, Microsoft, or both. It would be a simple matter of downloading a patched source file (or making the change yourself) and recompiling. FYI, this is exactly what happens in the *Nix world. Many of the most secure servers on the planet run on open source operating systems and software. If you decide to become a software engineer, you are signing up to have a 1/2" piece of silicon tell you exactly how stupid you really are for 8 hours a day, 5 days a week Zac

          R B J 3 Replies Last reply
          0
          • C Christopher Duncan

            Seems to me that there's no such thing as "secure" open source. By definition, the source code is readily available, which is the best blueprint you can get for those who wish to do bad things. Author of The Career Programmer and Unite the Tribes Know someone who desperately needs to get a clue? Visit www.DownloadAClue.com and send them one!

            M Offline
            M Offline
            MatthysDT
            wrote on last edited by
            #8

            True, but when a project applies decent quality control to code contributions, software can be safe even with the security alogorithms available. What i'm looking for is excepetions to this case and especially events where code contributors managed to sneak a backdoor past community's all seeing eyes. you can't forget something you never knew...

            Z 1 Reply Last reply
            0
            • M MatthysDT

              I'm in search of a website or online knowledge base with an extensive record of security issues, known breaches and vulnerabilities in known open source projects. Many open source projects don't openly make this information available. . you can't forget something you never knew...

              L Offline
              L Offline
              Lost User
              wrote on last edited by
              #9

              These may help www.bitpipe.com www.searchsecurity.com

              1 Reply Last reply
              0
              • M MatthysDT

                True, but when a project applies decent quality control to code contributions, software can be safe even with the security alogorithms available. What i'm looking for is excepetions to this case and especially events where code contributors managed to sneak a backdoor past community's all seeing eyes. you can't forget something you never knew...

                Z Offline
                Z Offline
                Zac Howland
                wrote on last edited by
                #10

                For commonly used open source projects (e.g. linux), Cert.org reports bugs/exploits and the status of their fixes. If you decide to become a software engineer, you are signing up to have a 1/2" piece of silicon tell you exactly how stupid you really are for 8 hours a day, 5 days a week Zac

                1 Reply Last reply
                0
                • Z Zac Howland

                  Christopher Duncan wrote:

                  I mean, can you imagine how many attacks there would be on IE if people had the source code?

                  Few to none because by the time someone figured out how to exploit a bug in the code, a thousand other people would have already fixed the issue and either submitted the fix to online forums, Microsoft, or both. It would be a simple matter of downloading a patched source file (or making the change yourself) and recompiling. FYI, this is exactly what happens in the *Nix world. Many of the most secure servers on the planet run on open source operating systems and software. If you decide to become a software engineer, you are signing up to have a 1/2" piece of silicon tell you exactly how stupid you really are for 8 hours a day, 5 days a week Zac

                  R Offline
                  R Offline
                  Rob Graham
                  wrote on last edited by
                  #11

                  Zac Howland wrote:

                  It would be a simple matter of downloading a patched source file (or making the change yourself) and recompiling.

                  Umm.. I really don't think my 80 year old mother can manage that "simple matter" on her own.:rolleyes:

                  Z 1 Reply Last reply
                  0
                  • R Rob Graham

                    Zac Howland wrote:

                    It would be a simple matter of downloading a patched source file (or making the change yourself) and recompiling.

                    Umm.. I really don't think my 80 year old mother can manage that "simple matter" on her own.:rolleyes:

                    Z Offline
                    Z Offline
                    Zac Howland
                    wrote on last edited by
                    #12

                    Rob Graham wrote:

                    Umm.. I really don't think my 80 year old mother can manage that "simple matter" on her own.

                    I'm guessing that you do the service support for your 80-year-old mother's PC, so you should be able to handle it quite well. :P If you decide to become a software engineer, you are signing up to have a 1/2" piece of silicon tell you exactly how stupid you really are for 8 hours a day, 5 days a week Zac

                    1 Reply Last reply
                    0
                    • C Christopher Duncan

                      True enough. Meanwhile, out here in the real world... :) I mean, can you imagine how many attacks there would be on IE if people had the source code? :rolleyes: Author of The Career Programmer and Unite the Tribes Know someone who desperately needs to get a clue? Visit www.DownloadAClue.com and send them one!

                      S Offline
                      S Offline
                      Scott Lee
                      wrote on last edited by
                      #13

                      If the code is written properly in the first place then it will be secure regardless of whether it is open or closed source. Relying on security through obscurity is a very dangerous position to be in. It's not the bugs that security experts find in open source software and report that people should be worried about. Those sorts of bugs get patched within days (sometimes hours) of being discovered. The dangerous bugs are the ones that someone stumbles upon in a closed source application and chooses to keep to themselves in order to exploit for some type of gain. These bugs may provide an entry point to the system for years to come and no one would ever be the wiser.

                      K J M 3 Replies Last reply
                      0
                      • S Scott Lee

                        If the code is written properly in the first place then it will be secure regardless of whether it is open or closed source. Relying on security through obscurity is a very dangerous position to be in. It's not the bugs that security experts find in open source software and report that people should be worried about. Those sorts of bugs get patched within days (sometimes hours) of being discovered. The dangerous bugs are the ones that someone stumbles upon in a closed source application and chooses to keep to themselves in order to exploit for some type of gain. These bugs may provide an entry point to the system for years to come and no one would ever be the wiser.

                        K Offline
                        K Offline
                        Kevin McFarlane
                        wrote on last edited by
                        #14

                        Scott Lee wrote:

                        If the code is written properly in the first place then it will be secure regardless of whether it is open or closed source.

                        True - except that no software is secure, therefore none is written properly in the first place. Kevin

                        1 Reply Last reply
                        0
                        • M MatthysDT

                          I'm in search of a website or online knowledge base with an extensive record of security issues, known breaches and vulnerabilities in known open source projects. Many open source projects don't openly make this information available. . you can't forget something you never knew...

                          K Offline
                          K Offline
                          Kevin McFarlane
                          wrote on last edited by
                          #15

                          secunia.com covers both closed and open source. But perhaps you're looking for something deeper? Kevin

                          1 Reply Last reply
                          0
                          • Z Zac Howland

                            Christopher Duncan wrote:

                            I mean, can you imagine how many attacks there would be on IE if people had the source code?

                            Few to none because by the time someone figured out how to exploit a bug in the code, a thousand other people would have already fixed the issue and either submitted the fix to online forums, Microsoft, or both. It would be a simple matter of downloading a patched source file (or making the change yourself) and recompiling. FYI, this is exactly what happens in the *Nix world. Many of the most secure servers on the planet run on open source operating systems and software. If you decide to become a software engineer, you are signing up to have a 1/2" piece of silicon tell you exactly how stupid you really are for 8 hours a day, 5 days a week Zac

                            B Offline
                            B Offline
                            Brian Delahunty
                            wrote on last edited by
                            #16

                            Zac Howland wrote:

                            It would be a simple matter of downloading a patched source file (or making the change yourself) and recompiling.

                            Ok.. I'll echo what Christopher said in his post above... "and back in the real world"... I seriously can not see my mother, or the vast majority of non-techy computer user being able to "[make] tha change yourself", apply a patched source file, or recompile. Most non-techy computer users I know have extreme difficulty even figuring out how to get Windows/Microsoft update to work on Windows if it isn't set to auto-install everything and I find the same with non-techy people who use Linux. Regards, Brian Dela :-) Blog^ Co-author of The Outlook Answer Book... Go on, order^ it today! -- modified at 18:18 Thursday 1st June, 2006

                            Z 1 Reply Last reply
                            0
                            • B Brian Delahunty

                              Zac Howland wrote:

                              It would be a simple matter of downloading a patched source file (or making the change yourself) and recompiling.

                              Ok.. I'll echo what Christopher said in his post above... "and back in the real world"... I seriously can not see my mother, or the vast majority of non-techy computer user being able to "[make] tha change yourself", apply a patched source file, or recompile. Most non-techy computer users I know have extreme difficulty even figuring out how to get Windows/Microsoft update to work on Windows if it isn't set to auto-install everything and I find the same with non-techy people who use Linux. Regards, Brian Dela :-) Blog^ Co-author of The Outlook Answer Book... Go on, order^ it today! -- modified at 18:18 Thursday 1st June, 2006

                              Z Offline
                              Z Offline
                              Zac Howland
                              wrote on last edited by
                              #17

                              Brian Delahunty wrote:

                              I seriously can not see my mother, or the vast majority of non-techy computer user being able to "[make] tha change yourself", apply a patched source file, or recompile.

                              The "vast majority" of "non-techy computer user[s]" either don't worry about security or have someone they know maintain it for them. Those that don't care about it either assume that auto-updates fix everything or just don't bother with updates period. That leaves those that have no problem doing it themselves, and those that have friends do it for them. In either of those cases, open-source updates are not a problem. And hopefully, those non-techy people you know that are using *Nix systems do not have root permissions ... If you decide to become a software engineer, you are signing up to have a 1/2" piece of silicon tell you exactly how stupid you really are for 8 hours a day, 5 days a week Zac

                              M B 2 Replies Last reply
                              0
                              • S Scott Lee

                                If the code is written properly in the first place then it will be secure regardless of whether it is open or closed source. Relying on security through obscurity is a very dangerous position to be in. It's not the bugs that security experts find in open source software and report that people should be worried about. Those sorts of bugs get patched within days (sometimes hours) of being discovered. The dangerous bugs are the ones that someone stumbles upon in a closed source application and chooses to keep to themselves in order to exploit for some type of gain. These bugs may provide an entry point to the system for years to come and no one would ever be the wiser.

                                J Offline
                                J Offline
                                James R Twine
                                wrote on last edited by
                                #18

                                Correct.  Not sure why you were voted a 1 there.    But it is important to remember that not all software applications need to be secure.  Safe (and stable) maybe, but not necessarily secure.  -=- James


                                If you think it costs a lot to do it right, just wait until you find out how much it costs to do it wrong!
                                Avoid driving a vehicle taller than you and remember that Professional Driver on Closed Course does not mean your Dumb Ass on a Public Road!
                                DeleteFXPFiles & CheckFavorites (Please rate this post!)

                                1 Reply Last reply
                                0
                                • Z Zac Howland

                                  Christopher Duncan wrote:

                                  I mean, can you imagine how many attacks there would be on IE if people had the source code?

                                  Few to none because by the time someone figured out how to exploit a bug in the code, a thousand other people would have already fixed the issue and either submitted the fix to online forums, Microsoft, or both. It would be a simple matter of downloading a patched source file (or making the change yourself) and recompiling. FYI, this is exactly what happens in the *Nix world. Many of the most secure servers on the planet run on open source operating systems and software. If you decide to become a software engineer, you are signing up to have a 1/2" piece of silicon tell you exactly how stupid you really are for 8 hours a day, 5 days a week Zac

                                  J Offline
                                  J Offline
                                  James R Twine
                                  wrote on last edited by
                                  #19

                                  I do not believe that this is a safe assumption to make.  Many open-source projects have suffered attacks in the past.  Take PHP-based applications, sendmail, and some TCP/IP stack implementations for examples.  Lots of the more robust open source systems out there are more secure because of previous attacks on them and learning from that and/or learning from attacks on other systems.    It is not correct to assume that just because source code is available for talented and competent eyes to look at, does not mean that talented and competent eyes are looking at it.    Also, remember that there are always new kinds of bugs and exploits to discover.  For example, no one was looking out for how to prevent SQL Injection exploits until someone actually conceived, developed and successfully executed one.  You at least have to have people with the hacker mindset actively trying to break the code, not just looking at it and saying "it looks OK to me!"  While having the source code openly available is likely a move in the right direction, it is far from a complete solution on its own.    Just my $.02, take it or leave it...    Peace! -=- James


                                  If you think it costs a lot to do it right, just wait until you find out how much it costs to do it wrong!
                                  Avoid driving a vehicle taller than you and remember that Professional Driver on Closed Course does not mean your Dumb Ass on a Public Road!
                                  DeleteFXPFiles & CheckFavorites (Please rate this post!)

                                  Z 1 Reply Last reply
                                  0
                                  • Z Zac Howland

                                    Brian Delahunty wrote:

                                    I seriously can not see my mother, or the vast majority of non-techy computer user being able to "[make] tha change yourself", apply a patched source file, or recompile.

                                    The "vast majority" of "non-techy computer user[s]" either don't worry about security or have someone they know maintain it for them. Those that don't care about it either assume that auto-updates fix everything or just don't bother with updates period. That leaves those that have no problem doing it themselves, and those that have friends do it for them. In either of those cases, open-source updates are not a problem. And hopefully, those non-techy people you know that are using *Nix systems do not have root permissions ... If you decide to become a software engineer, you are signing up to have a 1/2" piece of silicon tell you exactly how stupid you really are for 8 hours a day, 5 days a week Zac

                                    M Offline
                                    M Offline
                                    MatthysDT
                                    wrote on last edited by
                                    #20

                                    There comes a time when updates become just plain irritating and if it doesn't happen automatically, even I (as a technical person) wont lift a finger to update my system X| , irrespectively of the serious "risk my system now faces". (It's been facing that risk eversince the software was originally released anyway!) And don't even get me started on updates that need to reboot your system!!!!!:mad: you can't forget something you never knew...

                                    1 Reply Last reply
                                    0
                                    • S Scott Lee

                                      If the code is written properly in the first place then it will be secure regardless of whether it is open or closed source. Relying on security through obscurity is a very dangerous position to be in. It's not the bugs that security experts find in open source software and report that people should be worried about. Those sorts of bugs get patched within days (sometimes hours) of being discovered. The dangerous bugs are the ones that someone stumbles upon in a closed source application and chooses to keep to themselves in order to exploit for some type of gain. These bugs may provide an entry point to the system for years to come and no one would ever be the wiser.

                                      M Offline
                                      M Offline
                                      MatthysDT
                                      wrote on last edited by
                                      #21

                                      Scott Lee wrote:

                                      Those sorts of bugs get patched within days (sometimes hours) of being discovered

                                      Define "bugs being discovered". A. A developer does a double check on a certain piece of code and discovers a loop-hole. B. A user comes accross a loop-hole or glitch in the system. C. A hacker does a double check on a certain piece of code in search of weaknesses to exploit. Which of A, B or C will occur most often? Probably B, followed by C. Obscurity rules out C, thus reducing the security risk but it also significantly decreases the frequency that A occurs. So which is best? * Having none of C but very little of A. OR * Having a fair amount of C and alot of A. This totally depends on the project, if software requires a high level of security but the development team is small, it my be best to make the software (or at least the security code) proprietary. If the development community is large in number, by all means, open source the security code and let the developers and the hackers battle it out! you can't forget something you never knew...

                                      1 Reply Last reply
                                      0
                                      • Z Zac Howland

                                        Brian Delahunty wrote:

                                        I seriously can not see my mother, or the vast majority of non-techy computer user being able to "[make] tha change yourself", apply a patched source file, or recompile.

                                        The "vast majority" of "non-techy computer user[s]" either don't worry about security or have someone they know maintain it for them. Those that don't care about it either assume that auto-updates fix everything or just don't bother with updates period. That leaves those that have no problem doing it themselves, and those that have friends do it for them. In either of those cases, open-source updates are not a problem. And hopefully, those non-techy people you know that are using *Nix systems do not have root permissions ... If you decide to become a software engineer, you are signing up to have a 1/2" piece of silicon tell you exactly how stupid you really are for 8 hours a day, 5 days a week Zac

                                        B Offline
                                        B Offline
                                        Brian Delahunty
                                        wrote on last edited by
                                        #22

                                        Zac Howland wrote:

                                        The "vast majority" of "non-techy computer user[s]" either don't worry about security or have someone they know maintain it for them.

                                        Ok. Where I come from, that is simply not the case. My manager and non-techy colleagues definitely care about security, both at home and in work. In work the machines are under the control of our IC department/team so that isn't a problem but at home it's up to them. That is the case for most non-techy people I know. I have yet to find one who isn't worried about their personal data being taken from their machines... be it PPS (SSN in the states), credit card, personal items etc, they are well aware of the security issues.

                                        Zac Howland wrote:

                                        Those that don't care about it either assume that auto-updates fix everything or just don't bother with updates period.

                                        lol.

                                        Zac Howland wrote:

                                        And hopefully, those non-techy people you know that are using *Nix systems do not have root permissions ..

                                        Of course. But there are still plenty of exploits for *nix systems and the software the runs on them. Lots in fact. Regards, Brian Dela :-) Blog^ Co-author of The Outlook Answer Book... Go on, order^ it today!

                                        1 Reply Last reply
                                        0
                                        • J James R Twine

                                          I do not believe that this is a safe assumption to make.  Many open-source projects have suffered attacks in the past.  Take PHP-based applications, sendmail, and some TCP/IP stack implementations for examples.  Lots of the more robust open source systems out there are more secure because of previous attacks on them and learning from that and/or learning from attacks on other systems.    It is not correct to assume that just because source code is available for talented and competent eyes to look at, does not mean that talented and competent eyes are looking at it.    Also, remember that there are always new kinds of bugs and exploits to discover.  For example, no one was looking out for how to prevent SQL Injection exploits until someone actually conceived, developed and successfully executed one.  You at least have to have people with the hacker mindset actively trying to break the code, not just looking at it and saying "it looks OK to me!"  While having the source code openly available is likely a move in the right direction, it is far from a complete solution on its own.    Just my $.02, take it or leave it...    Peace! -=- James


                                          If you think it costs a lot to do it right, just wait until you find out how much it costs to do it wrong!
                                          Avoid driving a vehicle taller than you and remember that Professional Driver on Closed Course does not mean your Dumb Ass on a Public Road!
                                          DeleteFXPFiles & CheckFavorites (Please rate this post!)

                                          Z Offline
                                          Z Offline
                                          Zac Howland
                                          wrote on last edited by
                                          #23

                                          James R. Twine wrote:

                                          I do not believe that this is a safe assumption to make. Many open-source projects have suffered attacks in the past. Take PHP-based applications, sendmail, and some TCP/IP stack implementations for examples. Lots of the more robust open source systems out there are more secure because of previous attacks on them and learning from that and/or learning from attacks on other systems.

                                          I don't disagree (in fact, you are basically reiterating my point).

                                          James R. Twine wrote:

                                          It is not correct to assume that just because source code is available for talented and competent eyes to look at, does not mean that talented and competent eyes are looking at it.

                                          Agreed. However, when you compare open-source to closed-source projects, you find that the probability of someone trying to fix an open-source bug is higher than a closed-source one. The reasoning is simple: for closed-source applications, your resources are limited to only those people that work for the company (and that work on that project). Lets say the team was 100 programmers. That means there is a maximum of 100 pairs of eyes looking for the bug and how to fix it. Compare that to thousands ...

                                          James R. Twine wrote:

                                          Also, remember that there are always new kinds of bugs and exploits to discover. For example, no one was looking out for how to prevent SQL Injection exploits until someone actually conceived, developed and successfully executed one. You at least have to have people with the hacker mindset actively trying to break the code, not just looking at it and saying "it looks OK to me!" While having the source code openly available is likely a move in the right direction, it is far from a complete solution on its own.

                                          Again, I don't disagree. I was simply comparing the security of open-source projects to that of closed-source ones. How you publish your software is only a small part of the process that affects the security of it. If you decide to become a software engineer, you are signing up to have a 1/2" piece of silicon tell you exactly how stupid you really are for 8 hours a day, 5 days a week Zac

                                          1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Don't have an account? Register

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups