[148714] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [Cryptography] how reliably do audits spot backdoors?

daemon@ATHENA.MIT.EDU (James A. Donald)
Wed Dec 25 15:03:07 2013

X-Original-To: cryptography@metzdowd.com
Date: Thu, 26 Dec 2013 04:44:07 +1000
From: "James A. Donald" <jamesd@echeque.com>
To: Phillip Hallam-Baker <hallam@gmail.com>
In-Reply-To: <CAMm+Lwg8iLVCVCH-OgNQn2TFkNk8TJt0XwYRv5rW0d_1hyQFhg@mail.gmail.com>
Cc: "cryptography@metzdowd.com" <cryptography@metzdowd.com>
Reply-To: jamesd@echeque.com
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com

On Tue, Dec 24, 2013 at 2:42 AM, James A. Donald <jamesd@echeque.com
>     So, the underhanded C examples would have failed code review, not
>     because their terribly sneaky measures would have been detected in
>     code review, but for being unidiomatic, obfuscated, uglified, or
>     complexified.

On 2013-12-26 03:09, Phillip Hallam-Baker wrote:
> I can't slap the authors of OpenSSL and tell them to document their
> stuff, let alone force a rewrite

Not having the developer in front of one, merely means one has to fix 
obfuscated and complexified code oneself.  As, in the example case, I did.

_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography

home help back first fref pref prev next nref lref last post