100 likes | 239 Views
Security and Open Source: the 2-Edged Sword. Crispin Cowan, Ph.D WireX Communications, Inc wirex.com. Reliability and Security.
E N D
Security and Open Source:the 2-Edged Sword Crispin Cowan, Ph.DWireX Communications, Incwirex.com
Reliability and Security • •Reliable software does what it is supposedto do.•Secure software does what it is supposed todo … and nothing else.–Ivan Arce•Security is very simple: only run perfectsoftware … Oh, so we need a ‘plan B’.–Crispin
Open Source and Security: a2-Edged Sword • •Open source gives greater power to analyzesoftware for security … for good or bad–Attackers get enhanced capability to find holes to exploit–Defenders get enhanced capability to find holes to close•So if you do nothing then Open Source isdangerous•But if you leverage what Open Source gives you,then it is a defender’s advantage–… and there are tools to help you
Security Enhancing Toolsfor Software • Code Auditing: static or dynamic analysis ofprograms to detect flaws, e.g. ITS4 and friendsVulnerability Mitigation: compiled in defense thatblock vulnerability exploitation at run-time, e.g.StackGuard and friendsBehavior Management: OS features to control thebehavior of programsClassic: mandatory access controlsBehavior blockers: block known pathologies
Security Enhancing Toolsand Open Source • •Most of these tools operate on source code•Proprietary systems:–Only the vendor can apply the tools–Users must accept vendor’s level of diligence•Open source systems:–Users can raise the level of diligence themselves–Motivated vendors can sell the same system (e.g. BSD,Linux) with higher levels of diligence (e.g. OpenBSD,Open Wall Linux, Immunix)•Paper: to appear in the new IEEE Security andPrivacy magazine
Way Too Reasonable • •… time to get outrageous :-)
“Buffer Overflows: We’rePast That” • We’ll be “past that” when buffer overflowsstop being a majority of all CERT advisories•We’ll be well past it when buffer overflowsslip from the #1 position (plurality) of CERT advisories
“Full Disclosure Zealots” • •Perhaps the zealots have a point ...•“Timing the Application of Security Patchesfor Optimal Uptime”–Crispin + WireX staff + Adam Shostack–USENIX LISA 2002http://www.usenix.org/events/lisa02/tech/beattie.html
Main Result: When To Patch Penetration Risk • Not never: you’ll gethacked•Not immediately: patchmight be buggy•As time advances–Chance of gettinghacked rises–Chance of patch beingbuggy drops•Optimize • Bad patch risk
Hidden Result: “ResponsibleDisclosure” Does Not Help • •Some Microsoft security advisories politelyacknowledge the “investigators” who reported thebug–Done only when the investigator cooperated withMicrosoft•With 93% confidence interval, “acknowledged”security patches are more likely to be defectivethan unacknowledged patches•Conjecture: “responsible” disclosure does nothelp, and may in fact hurt