[148633] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [Cryptography] RSA is dead.

daemon@ATHENA.MIT.EDU (Dirk-Willem van Gulik)
Mon Dec 23 18:09:06 2013

X-Original-To: cryptography@metzdowd.com
From: Dirk-Willem van Gulik <dirkx@webweaving.org>
In-Reply-To: <alpine.LFD.2.02.1312230912440.4039@laptop.kerry-linux.ie>
Date: Mon, 23 Dec 2013 17:05:44 +0100
To: Ralf Senderek <crypto@senderek.ie>
Cc: Cryptography <cryptography@metzdowd.com>, ianG <iang@iang.org>
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com


Op 23 dec. 2013, om 09:40 heeft Ralf Senderek <crypto@senderek.ie> het volg=
ende geschreven:

> On Mon, 23 Dec 2013, ianG wrote:
> =

>> Open Source as a guarantee of security is really just the marketing of
>> the open source folk.  It certainly helps but collecting those smart
>> eyeballs isn't as easy as saying it.
>> =

>> iang
> =

> Of course open source is never a guarantee, I didn't say that. We should
> not confuse a necessary condition with a sufficient one. But the RSA (Inc)
> marketing implied that closed-shop trusted expert crypto is superior to
> open source crypto products. And that is certainly false.
> =

> As Peter, Dirk-Willem and Jerry rightly pointed out, it is very difficult
> to find crafted backdoors even in open source products. But just because
> something is difficult, that doesn't mean it should not be done.
> =

> With open source it can be done. But some essential changes are needed.
> Those who have the ability to check crypto code must be actively engaged
> by the community / society. If there is no incentive nor any substantial
> acknowledgement of this important work, if code audit is mainly seen as p=
rivate activity with no financial rewards, then yes, we can forget
> security.

After thinking this over a bit - I am wondering though if the backdoor tell=
s the whole story. =


It may be good to consider this in the context of

	http://www.acsac.org/2010/openconf/modules/request.php?module=3Doc_program=
&action=3Dview.php&a=3D&id=3D69&type=3D2  (*)
	DOI 1920261.1920299

which shows that as software ages (open source or closed source) the "prope=
rties extrinsic to the software play a much greater role in the rate of vul=
nerability discovery than do intrinsic properties such as software quality=
=94. And that due to a difference in their early lives; open sources ends u=
p gradually faring better - and longer.

So if we assume that crypto code, by its nature, once implemented, is quite=
 stable - and if we assume that the early period after the first release, o=
pen source sees (as this article argues) more stable/reliable fixes; and we=
 add the assumption that groups of developers who are not in cahoots/from c=
ompeting interests/cultures/etc are likely/desirable - then one could concl=
ude that open source low level crypto libraries are about as =82good=92 as =
we, as an industry, know how to get.

Thanks,

Dw. =


* Abstract: Work on security vulnerabilities in software has primarily focu=
sed on three points in the software life-cycle: (1) finding and removing so=
ftware defects, (2) patching or hardening software after vulnerabilities ha=
ve been discovered, and (3) measuring the rate of vulnerability exploitatio=
n. This paper examines an earlier period in the software vulnerability life=
-cycle, starting from the release date of a version through to the disclosu=
re of the fourth vulnerability, with a particular focus on the time from re=
lease until the very first disclosed vulnerability.

Analysis of software vulnerability data, including up to a decade of data f=
or several versions of the most popular operating systems, server applicati=
ons and user applications (both open and closed source), shows that propert=
ies extrinsic to the software play a much greater role in the rate of vulne=
rability discovery than do intrinsic properties such as software quality. T=
his leads us to the observation that (at least in the first phase of a prod=
uct's existence), software vulnerabilities have different properties from s=
oftware defects.

We show that the length of the period after the release of a software produ=
ct (or version) and before the discovery of the first vulnerability (the 'H=
oneymoon' period) is primarily a function of familiarity with the system. I=
n addition, we demonstrate that legacy code resulting from code re-use is a=
 major contributor to both the rate of vulnerability discovery and the numb=
ers of vulnerabilities found; this has significant implications for softwar=
e engineering principles and practice.

_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography

home help back first fref pref prev next nref lref last post