On Thursday 13 November 2003 01:28, Boaz Rymland wrote:
>
> Further more, don't get me wrong. I did not conclude my "verdict" on OSS
> security from this simple demonstration of a weak point. Not at all.
> Without going into details I think the opposite - I prefer openess over
> obscurity, taking in mind the price we have to pay for defending against
> OSS weak points such as the one demonstrated.
>
Without saying whether that's a "good" demonstration or a "bad" demonstration, 
lets remember what the demonstration actually was.
- Someone broke into an account authorized of making changes to the kernel 
source
- They than changed a line of code in the kernel source using that account
- This code was comitted to the source tree
- This was rejected because of inproper procedure, and also because it looked 
"suspicious" (the comments weren't filled in)
- It was stopped at that point; there was never a snapshot of the kernel with 
that code, not to mention an official release

The analogy to a commercial company is:
- Someone breaks into an account that has access to the product CVS tree
- That attacker changes the source to insert a Trojan
- The break-in is detected, the offending code removes
- Nobody ever hears about it - this stays within the company. The security 
hole is found and plugged and none of the company's customers are aware of 
this (almost) breach

The difference is, you will never hear of the latter case, since it is solved 
within the company. Therefore there is no way to assess whether these 
situations appear more on OS projects than on commercial projects.

BTW, when I say "never hear", I mean never hear officially. Rumours are always 
there, but nobody can be certain:
http://www.securiteam.com/securitynews/6E00L2000E.html

-- 
- Aviram


=================================================================
To unsubscribe, send mail to [EMAIL PROTECTED] with
the word "unsubscribe" in the message body, e.g., run the command
echo unsubscribe | mail [EMAIL PROTECTED]

Reply via email to