420 likes | 665 Views
Sander Temme <Sander.Temme@thalesesec.com>. Security Aspects of Open Source Software. Thales Core Businesses. Aerospace. Defense. 30%. 40%. Security. 68,000 employees € 12.7 B annual revenues Presence in 50 countries. 30%. Thales ISS Solutions. Identity management.
E N D
Sander Temme <Sander.Temme@thalesesec.com> Security Aspects of Open Source Software
Thales Core Businesses Aerospace Defense 30% 40% Security • 68,000 employees • €12.7 B annual revenues • Presence in 50 countries 30%
Thales ISS Solutions Identity management Payments security Data encryption Network encryption Storage security
Your Presenter • Member, Apache Software Foundation • Contributor, Apache HTTP Server • Sales Engineer & Consultant • Open Source Integration Expert
Agenda • Open Source Software • Security Process • Security Implications • Development Model
Three Questions • How does open source respond when security problems occur? • How does the open source development process affect software quality? • Is open source software more susceptible to security problems?
About Open Source • Closed Source • Microsoft, Adobe, Oracle, Symantec, Check Point, … • Open Source • Apache, Debian, FreeBSD, Mozilla, Python, FSF, … • Hybrid • Red Hat, Springsource, Sun, Apple, SugarCRM, … • Inclusion • Oracle, IBM, Apple, Sun, Cisco, NetApp, …
Open Source Is Not… • Freeware • Trialware • Shareware • Abandonware (hopefully) • Public Domain
Where is Open Source Used • Server side • Operating Systems • Application Stack • Web Facing • In the line of fire
Open Source Myths • Given enough eyeballs, all bugs are shallow
Open Source Myths • Given enough eyeballs, all bugs are shallow • Open Source is Communist!
Open Source Myths • Given enough eyeballs, all bugs are shallow • Open Source is Communist! • Bad guys have the code, too!
Open Source Myths • Given enough eyeballs, all bugs are shallow • Open Source is Communist! • Bad guys have the code, too! • Open Source is more secure than Closed Source
Open Source Software Security Case Study: Apache
Example: Apache • #1 Web Server • Non-profit Foundation • Contributors • Sun, IBM, Novell, Springsource, Red Hat, Google • Many individual contributors • http://httpd.apache.org • Many packagers http://people.apache.org/~coar/mlists.html
Apache is Secure • Very few vulnerabilities reported • No critical vulnerabilities in 2.2.x • Upgrade to any new release • announce@httpd.apache.org • Default installation locked down • But it doesn’t do a whole lot • http://httpd.apache.org/security/vulnerabilities-oval.xml
Apache Security Process • Report security problems to security@apache.org • Real vulnerabilities are assigned CVE number • Vulnerabilities are classified, fixed • New httpd version released http://httpd.apache.org/security_report.htmlhttp://cve.mitre.org/http://httpd.apache.org/security/impact_levels.html announce@apache.org
Security Implications • Developed by programmers • Provenance? • Liabilities? • Support?
Developed by Programmers • Not security experts • Get it running
Database Privileges Bugzilla: GRANT SELECT, INSERT, UPDATE, DELETE, INDEX, ALTER, CREATE, LOCK TABLES, CREATE TEMPORARY TABLES, DROP, REFERENCES ON bugs.* TO bugs@localhost IDENTIFIED BY '$db_pass'; Wordpress: GRANT ALL PRIVILEGES ON databasename.* TO "wordpressusername"@"hostname” IDENTIFIED BY "password"; Joomla 1.5: GRANT ALL PRIVILEGES ON Joomla.* TO nobody@localhost IDENTIFIED BY 'password'; Drupal: SELECT, INSERT, UPDATE, DELETE, CREATE, DROP, INDEX, ALTER, CREATE TEMPORARY TABLES, LOCK TABLES Gallery 2:mysql gallery2 -uroot -e"GRANT ALL ON gallery2.* TO username@localhost IDENTIFIED BY 'password'”;
Provenance • Source Integrity • Intellectual Property • Apache: • Digital signatures • Committer License Agreement • Patent Grant
Liabilities • Open Source • No warranty • Closed Source • No warranty
Support • Often community based • You can be part of it • Visible to the world • Don’t post confidential information! • Support contracts available • From third party companies
Open Development • Mailing lists • Source code changes • Releases • Bus Factor
Mailing Lists • All communication by e-mail • Several lists • announce@<project>.apache.org • users@<project>.apache.org • dev@<project>.apache.org • cvs@<project>.apache.org
Code Changes: Transparency • Source history available • Every modification posted • Instant code review • Etiquette
Bus Factor • Development Community • Project Survival • Closed Source Equivalent • Vendor out of business • Product end-of-life
Tips • Get on announce mailinglist • Check out community • Get involved
Conclusion • Open Source responds proactively to security issues • Open Development encourages clean and secure code • Security Issues are universal and not specific to Open or Closed Source Software