Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Open Source Encryption Must Get Smarter
Newest First  |  Oldest First  |  Threaded View
Matt_Little
100%
0%
Matt_Little,
User Rank: Author
12/18/2014 | 8:33:02 AM
Re: Good points - but what about the next generation?

I've followed the Snowden leaks closely. He's certainly done wonders for those outside of the InfoSec community when it comes to general knowledge about the necessity for encryption. As for how Snowden relates to not trusting proprietary encryption code, are you referring to the intentional weakening of RSA's DUAL EC? Something else? I ask because most of the other leaks detail exploiting vulnerabilities surrounding implementation, not actually breaking crypto. Have I missed something?

I do agree that "you have no idea who has been putting trapdoors into your software" but that applies to open source as well. How deeply must we inspect the code? What about the language used? The libraries that shipped with your OS? What about the compilers? The firmware? Hardware?

The rigor required to write good security software is more often found within established companies. They have processes in place that make the variables mentioned above as consistent as possible.  There's also more control over the team and the talent. A high degree of certainty in all of these areas are critical when it comes to building security applications.

At the end of the day, this game is about trust. We're all making decisions about which products to trust. Just because you can look at the code yourself doesn't mean you're capable of understanding it and just because a "security" expert said the code is fine, doesn't mean it is.

The Ada point is relevant. I don't think it's the solution but if anyone is intereted in more information about some of the security shortcomings of popular native languages and how Ada addresses them there's a free e-book you can grab from AdaCore: http://www.adacore.com/uploads_gems/Ada_Safe_and_Secure_Booklet.pdf

 

 

fustbariclation
50%
50%
fustbariclation,
User Rank: Apprentice
12/15/2014 | 4:15:12 AM
Good points - but what about the next generation?
These are good and important points to bear in mind.

Importantly, though, we now know, through Snowden, that proprietary code, particularly encryption code, can never be trusted - you have no idea who has been putting trapdoors in and it's highly unlikely the very best people you can hire will be able to find them.

It is sad that open source cryptography has been neglected. What you should demand of your encryption software is:

 

- It is open source

- It is easy to understand (if not, you'll find it difficult to spot trapdoors)

- The cryptographic method hasn't been approved by a dubious authority

- It doesn't have any strange, aribtrary blocks of numbers in it

- It is reliabe

 

Naturally, if you're using a proprietary system, like Microsoft Windows, then there's no point in bothering - you are compromised.

The open source community should be providing security software that satisfies these requirements.

To satisfy them all, it should be written in Ada.
Stratustician
50%
50%
Stratustician,
User Rank: Moderator
12/8/2014 | 3:38:55 PM
Great Points!
Some real great advice here, especially since I've seen some of the downsides to having folks in-house work with both out of box and open source software.  As stated here, one of the biggest things is to be honest with your security requirements.  If you don't have the in-house expertise to properly vet an application, getting an outside resource is going to be critical.  Just because open source comes with a nice price tag attached, it doesn't mean you don't have to do due diligence.  You need to make sure that you are aware of any limitations both in functionality AND in security and be honest about it.


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Enterprises Are Assessing Cybersecurity Risk in Today's Environment
The adoption of cloud services spurred by the COVID-19 pandemic has resulted in pressure on cyber-risk professionals to focus on vulnerabilities and new exposures that stem from pandemic-driven changes. Many cybersecurity pros expect fundamental, long-term changes to their organization's computing and data security due to the shift to more remote work and accelerated cloud adoption. Download this report from Dark Reading to learn more about their challenges and concerns.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-23850
PUBLISHED: 2022-01-23
xhtml_translate_entity in xhtml.c in epub2txt (aka epub2txt2) through 2.02 allows a stack-based buffer overflow via a crafted EPUB document.
CVE-2021-4103
PUBLISHED: 2022-01-23
Cross-site Scripting (XSS) - Stored in GitHub repository vanessa219/vditor prior to 1.0.34.
CVE-2021-4172
PUBLISHED: 2022-01-22
Cross-site Scripting (XSS) - Stored in GitHub repository star7th/showdoc prior to 2.10.2.
CVE-2022-23807
PUBLISHED: 2022-01-22
An issue was discovered in phpMyAdmin 4.9 before 4.9.8 and 5.1 before 5.1.2. A valid user who is already authenticated to phpMyAdmin can manipulate their account to bypass two-factor authentication for future login instances.
CVE-2022-23808
PUBLISHED: 2022-01-22
An issue was discovered in phpMyAdmin 5.1 before 5.1.2. An attacker can inject malicious code into aspects of the setup script, which can allow XSS or HTML injection.