[10280] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: A risk with using MD5 for software package fingerprinting

daemon@ATHENA.MIT.EDU (David Honig)
Sun Jan 27 14:05:53 2002

Message-Id: <3.0.6.32.20020127105355.00838850@mail.orng1.occa.home.com>
Date: Sun, 27 Jan 2002 10:53:55 -0800
To: "Arnold G. Reinhold" <reinhold@world.std.com>,
	cryptography@wasabisystems.com
From: David Honig <dahonig@home.com>
In-Reply-To: <v04210103b879cf361c1d@[192.168.0.2]>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"

At 12:07 PM 1/27/02 -0500, Arnold G. Reinhold wrote:
> if 
>an attacker had an agent working inside the organization that 
>produced the package, the agent could simply insert the Trojan 
>software patch in the original package. However such an insertion is 
>very risky. A sophisticated software company would likely have code 
>reviews that would make introduction of the Trojan code difficult.

Um, right.  A good company would have *design* reviews, but would it really
spend time having skilled engineers review *all* the actual codelines
(given time to market pressure, tedium limits, etc.)?  An individual with 
write access to their part of a source-control-system is all
you need.  Remember, you could buy Aldrich Ames (wife included) or 
Hanssen (just him) for under 1.5 mill $USD each.  Perhaps certain
core operations are studied with >2 eyeballs, but all you need is
one breach to undermine security.

I would like to learn about *code* review practices in whatever
is considered a 'sophisticated' software company.

Cheers














 






  







---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

home help back first fref pref prev next nref lref last post