[14625] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Trusting the Tools - was Re: Open Source ...

daemon@ATHENA.MIT.EDU (kent@songbird.com)
Mon Oct 13 12:12:42 2003

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
From: kent@songbird.com
Date: Sun, 12 Oct 2003 22:29:06 -0700
To: Anne & Lynn Wheeler <lynn@garlic.com>
Cc: kent@songbird.com, Bill Frantz <frantz@pwpconsult.com>,
	cryptography@metzdowd.com
Mail-Followup-To: Anne & Lynn Wheeler <lynn@garlic.com>,
	kent@songbird.com, Bill Frantz <frantz@pwpconsult.com>,
	cryptography@metzdowd.com
In-Reply-To: <4.2.2.20031012170211.00b27980@mail.earthlink.net>

On Sun, Oct 12, 2003 at 05:13:06PM -0600, Anne & Lynn Wheeler wrote:
> well ...  you can take and compare the listing file against the "txt"
> deck output of the assembler listing for each module.
[...]
> then the issue isn't if the assembler has been compromised ...  it is
> whether the loader has been compromised.

You seem to be describing the characteristics of a particular assembler. 
Though I may not have expressed it well, my point was really at a
different level.  The entire program building system, of which the the
loader, assembler, and compiler are all parts, is susceptible. 
Thompson's paper described a very clever way of embedding a trojan in a
compiler, but there are multiple places in the program building system
where compromises of a similar flavor could occur -- my favorite
hypothetical has been the binary library manager (I worked on one for
the Cray-1 series, many years ago). 

> then you compare the memory
> image file against the aggregate of the txt decks ...  if you've done
> the assembler listing comparison against the txt deck correctly .... 
> then the memory image comparison is looking for a loader compromise ... 
> not an assembler compromise. 

The process you describe is a rather daunting task, especially given
that all that is really necessary is a very small bit of code to load
more code from a different file.

Kent

-- 
Kent Crispin                               "Be good, and you will be
crispin@icann.org,kent@songbird.com         lonesome."
p: +1 310 823 9358  f: +1 310 823 8649               -- Mark Twain

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post