Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Open Source Encryption Must Get Smarter
Newest First  |  Oldest First  |  Threaded View
Matt_Little
100%
0%
Matt_Little,
User Rank: Author
12/18/2014 | 8:33:02 AM
Re: Good points - but what about the next generation?

I've followed the Snowden leaks closely. He's certainly done wonders for those outside of the InfoSec community when it comes to general knowledge about the necessity for encryption. As for how Snowden relates to not trusting proprietary encryption code, are you referring to the intentional weakening of RSA's DUAL EC? Something else? I ask because most of the other leaks detail exploiting vulnerabilities surrounding implementation, not actually breaking crypto. Have I missed something?

I do agree that "you have no idea who has been putting trapdoors into your software" but that applies to open source as well. How deeply must we inspect the code? What about the language used? The libraries that shipped with your OS? What about the compilers? The firmware? Hardware?

The rigor required to write good security software is more often found within established companies. They have processes in place that make the variables mentioned above as consistent as possible.  There's also more control over the team and the talent. A high degree of certainty in all of these areas are critical when it comes to building security applications.

At the end of the day, this game is about trust. We're all making decisions about which products to trust. Just because you can look at the code yourself doesn't mean you're capable of understanding it and just because a "security" expert said the code is fine, doesn't mean it is.

The Ada point is relevant. I don't think it's the solution but if anyone is intereted in more information about some of the security shortcomings of popular native languages and how Ada addresses them there's a free e-book you can grab from AdaCore: http://www.adacore.com/uploads_gems/Ada_Safe_and_Secure_Booklet.pdf

 

 

fustbariclation
50%
50%
fustbariclation,
User Rank: Apprentice
12/15/2014 | 4:15:12 AM
Good points - but what about the next generation?
These are good and important points to bear in mind.

Importantly, though, we now know, through Snowden, that proprietary code, particularly encryption code, can never be trusted - you have no idea who has been putting trapdoors in and it's highly unlikely the very best people you can hire will be able to find them.

It is sad that open source cryptography has been neglected. What you should demand of your encryption software is:

 

- It is open source

- It is easy to understand (if not, you'll find it difficult to spot trapdoors)

- The cryptographic method hasn't been approved by a dubious authority

- It doesn't have any strange, aribtrary blocks of numbers in it

- It is reliabe

 

Naturally, if you're using a proprietary system, like Microsoft Windows, then there's no point in bothering - you are compromised.

The open source community should be providing security software that satisfies these requirements.

To satisfy them all, it should be written in Ada.
Stratustician
50%
50%
Stratustician,
User Rank: Moderator
12/8/2014 | 3:38:55 PM
Great Points!
Some real great advice here, especially since I've seen some of the downsides to having folks in-house work with both out of box and open source software.  As stated here, one of the biggest things is to be honest with your security requirements.  If you don't have the in-house expertise to properly vet an application, getting an outside resource is going to be critical.  Just because open source comes with a nice price tag attached, it doesn't mean you don't have to do due diligence.  You need to make sure that you are aware of any limitations both in functionality AND in security and be honest about it.


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Enterprise Cybersecurity Plans in a Post-Pandemic World
Download the Enterprise Cybersecurity Plans in a Post-Pandemic World report to understand how security leaders are maintaining pace with pandemic-related challenges, and where there is room for improvement.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-41392
PUBLISHED: 2021-09-17
static/main-preload.js in Boost Note through 0.22.0 allows remote command execution. A remote attacker may send a crafted IPC message to the exposed vulnerable ipcRenderer IPC interface, which invokes the dangerous openExternal Electron API.
CVE-2020-21547
PUBLISHED: 2021-09-17
Libsixel 1.8.2 contains a heap-based buffer overflow in the dither_func_fs function in tosixel.c.
CVE-2020-21548
PUBLISHED: 2021-09-17
Libsixel 1.8.3 contains a heap-based buffer overflow in the sixel_encode_highcolor function in tosixel.c.
CVE-2021-39218
PUBLISHED: 2021-09-17
Wasmtime is an open source runtime for WebAssembly & WASI. In Wasmtime from version 0.26.0 and before version 0.30.0 is affected by a memory unsoundness vulnerability. There was an invalid free and out-of-bounds read and write bug when running Wasm that uses `externref`s in Wasmtime. To trigger ...
CVE-2021-41387
PUBLISHED: 2021-09-17
seatd-launch in seatd 0.6.x before 0.6.2 allows privilege escalation because it uses execlp and may be installed setuid root.