Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
The Internet

Open Source Concerns: Trojan Horses In the Code 186

crisco writes to us with an article from InternetWeek addressing the concern of "trojan horse programs concealed inside open source code that could create new security headaches for IT managers", as the article says. The article deals mainly with the BO2K issue, which makes the whole open source connection a bit of a stretch.
This discussion has been archived. No new comments can be posted.

Open Source Program Concerns

Comments Filter:
  • by Anonymous Coward
    Before using such tactics, you have to think about the backlash if you get caught at it. Trojans and other security flaws in open source software get caught very quickly and the community would notice if a patteren started to develop. If a path was traced back to Microsoft, the ensuing backlash would make the DOJ Trial look like a nice family picnic. Among other things, they'd be opening themselves for major law suits and possibly even criminal proceedings. I doubt MS wants to take that risk (I don't doubt they're unethical enough to do it though, if they thought they could get away with it.)
  • by Anonymous Coward
    Ok, a quick summary:

    Helen was the wife of Menelaus, king of Lacedaemon (AKA Sparta), one of the Greek leaders. She was reputed to be the most beautiful woman in the world. Paris was a prince of Troy, located across the Aegean Sea from Greece in what is now known as Turkey. Because he judged Aphrodite to be the most beautiful goddess, Paris was granted a wish, and he asked to have Helen as his wife. The Greeks were outraged at this "theft", so they gathered a massive army and sailed to Troy to get her back. (So Helen is known to have "a face that launched 1,000 ships).

    The Greeks and Trojans fought for 10 years before the gates of Troy and many heroes were killed, including Hector (the mightiest Trojan warrior) and the incomparable Achilles (who would have loved Quake - read the Iliad - after his friend Patroclus was killed, he slaughtered the Trojans by the hundreds). Achilles was killed by a cowardly arrow in the heel, the only spot left vulnerable when his goddess-mother Thetis dipped him in the river to make him invincible.

    Since the Greeks couldn't take Troy by force, Odysseus devised the great horse as a ploy. The Trojans foolishly brought it into the city, after which the Greeks came out, killed whatever resistance they met, and opened the city gates to let the rest of the army in.

    Although most people associate the Iliad with the Trojan war, the Trojan horse never appears in the Iliad - it ends with the funeral of Patroclus. The Aeneid, by Virgil, tells the story of the Trojan Horse and the sack of Troy. The Aeneid puts forth the hypothesis that Rome was founded by Trojan refugees after the fall of Troy.
  • by Anonymous Coward
    I have this article on my desk. The only link to open source is that Viruses are now open source, i.e. the Virus creators distribute the source code to their viruses. This allows other people to modify the virus and spread variants of it too. That was the whole open source idea of viruses. They also site that this makes Word macro viruses devistating. At my work I've found macro viruses with comments in the code! Open source programming let's everyone see a virus or an exploit and that is why it is good. Take for example mIRC scripts of yore where the programmer would leave a back door to get ops or steal files. Everyone would find it and it would die quickly. This is what open source is about. We don't know if the government is going to settle with microsoft secretly by saying, "You put in this code so we can read data off of all Windows machines or we will put you out of buissiness!" If that were the case, we would never know. Might even explain the Intel processor ID problem we had for a while. Open source good, closed source bad!
  • by Anonymous Coward
    Virii may not be the Caesar's Latin, as it were, but it's certainly not script-kiddie pseudo-techno-babble. To the contrary,
    virus :: virii
    is in the same spirit of hackish wordplay that gives us plurals like
    Unix :: Unices, and
    VAX :: VAXen.
    I don't know if it's actually in the Jargon File, but it's hardly kiddie-speak. We don't do away with words like hackage and bogosity just because they're not in the dictionary! :-)

    AC
  • by Anonymous Coward
    What? open source programs are LESS likely to have trojans, right? If you follow common sense logic, any code that is open to review by peers is less likely to have any trojans/bugs, etc.

    FUD, nothing more.
  • I liked the comment by "a security manager at a top financial services company who requested anonymity" (meaning, he was made up :) ), that it "allows an army of hackers to leverage" the program for their own purposes.

    For what it's worth, if the OS being "attacked" is open source, there are even larger of number of people ready to close up holes and what-not within a few hours, days at most. As Jason Garms is quoted, "There's nothing wrong with [Microsoft] systems until Back Orifice is installed." NT is perfect, therefore there will never be any fixes. BO2k will just be labeled a virus/trojan and to most people, that's considered sufficient protection.
  • by whoop ( 194 )
    If su lets you do destructive things, then that better be flagged as a trojan horse too. ;)
  • by J4 ( 449 ) on Thursday July 22, 1999 @10:32AM (#1789333) Homepage
    Trojan horse programs concealed inside open source code could create new security headaches for IT managers. One such program released last week, BackOrifice 2000...

    BO2k isn't concealed inside another program..

    When virus writers moved to an open source model in 1996, there was an explosion in macro viruses,...

    Ah yes, I remember the good old days of proprietary virii...NOT.
    The explosion in macro virii wouldn't have anything to do with a program that
    could _host_ them now, would it?
    Like, I don't know, maybe MS Office?
    No mention of how much easier it is to construct
    a macro virus as opposed to a real virus done in, say, x86 assembler.

    Organizations "absolutely should be putting
    security measures in place if they use NT to a
    great degree" to thwart BO2K-specific attacks,
    said Drew Williams, director of Axent Technologies'
    SWAT Team.


    Hmm, not quite sure what to say about this one...
    Are they saying:
    A)You don't need security if you don't use NT
    B)You shouldn't use NT (I'll buy that)
    C)If you only have one NT box you don't have to worry
    D)Win9x, 3.1 aren't vulnerable

    Internet Security Systems researchers have
    already decoded BO2K protocols and encryption
    algorithms.


    Nice trick...somebody must have sent them the source
    code in an encrypted email, yeah, thats
    the ticket...

    Jason Garms, product manager for NT security at
    Microsoft, said the company will fix any known
    security vulnerabilities in its operating
    systems. "There's nothing wrong with [Microsoft]
    systems until Back Orifice is installed.


    Oh my.... Somebody should start
    a 12 step group for folks like this
    I detect some serious denial problems here.
    How much are these fixes going to cost?
    When can we expect delivery?
    Thats what I thought...

    Users on NT networks that
    exchange files and use Internet chat systems
    are at the highest risk....


    So..don't use your network to
    transfer files..just look at the pretty lights....

    The elite hacker group is banking on tools
    such as BO2K to eventually force Microsoft
    to correct security weaknesses in its operating
    systems.
    Security experts don't see the logic.
    "They didn't have to write code and
    release it to the public," said ICSA's Thompson.


    The bastards, how _dare_ they try
    to push around Micros~1!
    Who's the real victim here? Micros~1
    or the "Security Experts" who have to get
    off their well padded rear ends and do some work now?
    Oh wait, I guess security expert is a synonym for pundit now.

    Once the program is released,
    Axent's Williams expects an "immediate
    spike" in hacking activity
    on NT systems, but expects it to trickle down to
    some level of manageability.


    The program is already released, Sparky...
    I expect this is true if we use hacking in the
    proper sense as in "Micros~1 programmers fixing
    things up a bit"..
    Though I expect if you replace "hack" with "kludge"
    it'd be a little more accurate

    Now _this_ is the kind of story I expect to see on /...
    Just like backinaday ;P
  • I found that humorous as well. Macro virus authors didn't "choose" an open source development model. Their source is available because it's in a macro, so the source has to be available. It's like saying that DOS .bat script writers have switched to open source, or that bash shell script writers have switched to open source, as if they had a choice.
  • Could someone with more knowledge of Windows NT please explain something to me...

    How does a process "hide" in NT? Is this a "feature" of NT? Is it an undocumented feature? Or it BO2K using an exploit to do this?

    If you run BO2K as a regular user, isn't it limited to that user's rights, just like in unix? If not, how does BO2K gain superuser access?

    Is this really Microsoft's fault? Or is BO2K not as harmful as everyone makes it out to be?

  • .. these kind of tools, like bo2k have the potential to harm windows 2k very much.. to wipe it out of the marketplace.. to even destroy microsoft.. that would be terrible! That would be tragic!

    La. La. La la la.
  • The fact that NT is a crackers wet dream come true is somewhat glossed over here. I mean, this quote from the MS camp is really great:

    "Jason Garms, product manager for NT security at Microsoft, said the company will fix any known security vulnerabilities in its operating systems. "There's nothing wrong with [Microsoft] systems until Back Orifice is installed.In reality, [cDc] has produced code with malicious intent that targets users, not technology," (bolding mine)

    Uh, yeah, right, so the BO stuff gets installed on users now, does it?

    What bothers me is the subtle dig here at OSS development, really missing the point that if the target TECHNOLOGY wasn't so friggin full of holes, then there would be a lot fewer exploits - either in binary or open source form.

    The article could have been a lot more honest by stating: "yeah, open source 'sploits make it a bit easier to mutate the buggers, but, hey, if MS wrote decent client and server software, we wouldn't be having this discussion."

  • Uh, not to get all pedantic on you, but the Greeks built the Trojan horse - inspired by Odysseus - because the horse was sacred to the Trojans - who they were fighting. The Greeks left the horse outside the walls of Troy. The Trojans brought it inside with great fanfare - the dummies - and that night the Greeks inside the horse jumped out, opended the gates, and let the rest of the Greek coalition in and slaughtered just about everyone. Beware of Greeks bearing gifts!:)
  • So all cops get slammed for your poor dead father?

    If that really happened, then I'm sorry your family was the victim of some bad cops.

    We're dealing with people here, and some of them are bad. Some are very good, but most are somewhere in between.

    If the cops got caught and prosecuted and sentenced, then the law _was_ followed.



    I'm sick of hearing all cops get maligned for the actions of a few bad apples!!
  • Here is a copy of my response that I sent to their feedback address:

    ------------------------------------------------

    This e-mail is in response to your online article dated July 19, 1999 entitled "Hackers Kick Open Back Door To NT". I (like many others, I presume) take exception to the way the article associates the CRACKER (cracker, not hacker, you idiots!!) community with the Open Source / Free Software community. The dangerous connections that you have made that "the Back Orifice programs are bad" and "the Back Orifice programs have the source available" leads the uninformed to believe that all open-sourced software could contain trojan horses or other viruses. In your very own article you state that the server part of the program is spread through an e-mail attachment, therefore the software responsible for delivering and allowing the release of the trojan horse is a very proprietary closed-source product.....Microsoft Outlook!!! (just as in the case of the melissa virus)


    In case you were not aware, the cracker community has almost _always_ made the source code to their viruses, trojan horses, password crackers, port scanners, and other software available to other crackers. This way the other crackers can use them. The cracker community existed long before there was a Free Software community. The Free Software community is about spreading ideas and information about computing and programming to take advantage of the massive pool of talented HACKERS (programmers) available worldwide. I hesitate to use the term hackers, since even you people in the _technical_ media obviously still haven't grasped the distinction between hackers and crackers. Crackers are about breaking into phone and computer systems for fun and profit.


    If your intent was to write an article about the possible problems with the proliferation of the BackOrifice2000 program, then you have failed miserably. It is obvious that you do not understand the problems yourself. You do not make a point of the fact that if Outlook and Word did not have such a poor excuse for security, then the program could not be spread as easily. You also do not understand the motivations of people like the cDc, who have decided that since MS will not fix the _very_ long-standing bugs in all of their windows operating systems and applications, then cDc will use them to create a program that does essentially what "PC Anywhere" does (without the large amount of money and signed NDA's Symantec had to give to receive the information to write PC Anywhere). If I attach a self-installable, pre configured copy of PC Anywhere to an email to someone, and use it to own their machine, should Symantec be sued for writing it? cDc and other "white-hat" cracking groups have made it clear for a long time that they are trying to warn MS about these security holes so THAT THEY WILL BE FIXED. MS has shown that unless widely publicized outrage at a security bug occurs (like the melissa virus), then all but the most serious bugs and holes either go unfixed for a long time (until the next service pack or so) or they just do not get fixed, ever!!

  • Sorry, Bruce, but that is what the article says to you and I.

    What it says to 'Clueless Joe' IT Manager who has never used anything else except MS products is that since this "horrible" program that he heard about on this "trustworthy" technical web site is open sourced, then all programs and projects associated with the current buzzword "Open Source" must be bad and he should never allow them into his domain.

    It also preys upon their fears that there are armies of rabid "hackers" (/me shudders at the misuse) out there, like in the movies, who are just waiting to jump across the internet and own his boxes.

    I agree that BO is an attempt to force MS to deal with their holes, but rather than interviewing cDc about it and finding their side of the story, the writer just let some "experts" blather on.

    The whole idea that BO would now evolve into millions of strains that would keep Anti-Virus detection companies working 24x7 to fight them is even more sensational, so that was made the focus of the article.

    See my response to the article in another post.

  • I'd almost like to see this one go to court. After Microsoft somehow managed to win the Bristol case (I still can't understand how the jury came to that conclusion), It'd make me feel better to see them get themselves into another case where they'll end up looking stupid. cDc makes a pretty good argument on their website. It's amazing the lengths MS will go to to avoid having to admit that their programs have bugs.

  • Achilles was killed by a cowardly arrow in the heel,

    What's cowardly about that? Jeez... if it's the only spot that'll do the trick, I'd say it was a pretty darn smart arrow. Doesn't seem like Achilles was all that brave himself. Charging into battle isn't such a big deal when you're invincible.

  • He did a bad thing. He should be arrested and barbecued for his blatant attempt to take that which most definitely did not belong to him. What's to stop someone from doing the same thing with proprietary software? They hire a bunch of programmers and make a real product. After a year or two, people trust them. Then he goes and sticks in his little back door and nobody knows about it... not even his own programmers. This is why we have laws. It has nothing to do with open/closed source. It has to do with malicious intent.

  • KrAphtd1nN3r wrote:
    Besides, unless the sysadmin is very crappy, users should never be allowed to write to code files.

    My cheesy little friend, do you really think that everybody developing on *NIX boxen has root access?

    Nope, they don't. And you need access to system header files to do anything of consequence.

    Unless, of course, your company is preparing for the release of "Hello, World! 2000". ;)

  • I remember in 1994 reading the 40Hex and NuKE Info Journal that had source code to virus, sometimes only the binary or disassembled and commented source (from binaries). Having virus and trojan source code is nothing new (40Hex and NIJ did exist a while before I had a net access)

    I still wonder what hapenned to them.

    Interrestingly, the viruses where very often using undocumented functions in MS-DOS (and not only the InDos flag), some where really incredible.

  • ... actually, if open source development leads to faster production of "bad things", then clearly it must be regulated, in the same way hand guns, drugs, booze, and auto licenses are. Only the "responsible" few should be allowed to code openly.

    Think it can't happen?

  • by Gregg M ( 2076 ) on Thursday July 22, 1999 @11:03AM (#1789349) Homepage
    When virus writers moved to an open source model in 1996, there was an explosion in macro viruses,

    Excuse me ?? Macro Viruses? Wasn't it Microsofts own macro language that resulted in the rise of Macro Viruses. Open source had nothing to do with it. Damm read that line again what a load of Bullsh#t!

    If you go to the BO2k website you'll see that Microsoft uses the STEALTH feature in their own product.

    www.cultdeadcow.com/news/pr19990719.html

    SMS is Microsoft's remote admin tool for Windows. As it happens, SMS has a nearly identical
    stealth feature. As a matter of fact, they explain this feature in a Word document available
    from the Microsoft website:

  • Some code is obscure even being in clear sight.
    Consider Linux or Mozilla -- their source trees
    are huge, and if one were particularly untrusting,
    one might think that it would be easy for such
    groups to accidentally or purposefully stick code
    in that could be problematic WRT security. The
    trust that can be applied to small projects WRT
    security can't neccesarily be given to larger
    projects, as the chance of someone, or even everyone collectively,
    looking at the problematic section(s) and knowing
    enough to recognize a security problem isn't
    particularly inspiring. OTOH, it certainly beats
    binary distributions :)
  • I'm not claiming that, although some people might.
    But on a practical level, things submitted by
    people from outside with ill intent or lack of
    a clue could cause security issues, and it seems
    that even with a reviewer, some bad code will
    quite possibly get in.
  • It would be interesting and useful to make an OSS
    verification group which would audit open source
    projects for security problems (intentional or no),
    determine what platforms the source compiles on,
    look for bugs, and ideally submit patches back to
    authors and possibly sell support and/or legal
    liability for program failings.
  • Well, I just sent this to McAfee on their feedback form after I read their BO2K page (http://www.mcafee.com/viruses/bo2000/what_bo2k_do es.asp):

    --BEGIN--

    In a number of places on your page about BO2K, you refer to it as a "virus" and a "trojan".

    BO2K is neither of these. Virus spread themselves; BO2K does not. Torjan horses pretend to be something they are not; BO2K does not.

    Back Orifice 2000's website (http://www.bo2k.com) makes no bones about what it is: it is a remote administration program. It hides from the taklist to stop clueless users from removing it, and then only on 95/98. On NT, it is visible in the task list running as a service.

    You refer to the original Back Orifice being "discovered" on October 15 1998... The software was announced with a press release on July 21 1998. Where's the discovery in that?

    Back Orifice 2000 is a tool that allows the installer to control a machine remotely. It is no different in function from pcAnywhere or other such tools. As a side effect, it demonstrates the woeful security present in Microsoft's operating systems.

    Personally, I find your characterisation of BackOrifice 2000 offensive and sensationalistic. Sensationalising the possible effects of the tool is one thing, but sensationalising its essential nature is another thing entirely.

    Yours,

    Paul Collins.

    --END--

    Yes, I have seen the typos ;-)

    ------------p!
  • by pridkett ( 2666 ) on Thursday July 22, 1999 @09:51AM (#1789354) Homepage Journal

    I think that you might have misinterpreted what this article is about. It is merely an article about Bo2k and how the fact that IS open source will cause problems for people. Meanwhile, it eludes the somewhat minor problem of people writing patches for legitimate software that turns in into trojan like software.

    However I did glean a few bits of interesting stuff. Mainly that Microsoft is saying that if its a real remote admin tool that it wouldn't hide from the administrator. Umm, excuse me, I have the displeasure of having an NT server box here at work that I'm pseudo responsible for and NT Server Manager hides.

    Secondly it doesn't mention the fact that if NT were written worth a damn, then it wouldn't be POSSIBLE to do this sort of stuff to it. There was the comment about it preying on users and not administrators, which is partially true, but its really MSs fault in the first place.

    There was only one other thing that I disagreed with. It said something about when virus writers switched to open source in 1996 (like it was some sort of heavenly revelation) that there was proliferation in macro viruses. This may be true. But its more likely due to the rise of people who are using IE and Outlook for their net browsing and email reading.

    Oh well, if nothing else the cDc by releasing the source code will actually FORCE microsoft to patch the whole and release patches that detect the software.

  • A verification group for OSS is a large order. There are several smaller groups working on different code bases. One of the more thorough would probably be the OpenBSD group (http://www.openbsd.org/). They constantly scour their source base (originally forked off of another *BSD group) for security problems. Due to the deligent efforts of the OpenBSD group, their operating system can be quite justifiably touted as the most secure standard operating system that is somewhat widely used.
  • by jjohn ( 2991 )
    This is an old issue. Not totally without merit, but as companies like Red Hat come to depend on OSS code, I sure some amount of QA will be done.

    Further, OSS has been around a long while. This sort of thing can happen, but it doesn't last too long.

    Sounds like a case of old fashion FUD.

  • Why bother with articles like this? Because issues about security need to be discussed. Its bringing valuable topics that can educate more people about why security is too underrated and how to make it top priority. We need to share more horror stories that are often hidden in fear and shame so people will start to value what a good system can do to protect their resources. Expect to see articles like this many times in the future.
  • There's a project called the Linux Security Audit. They were talking about it at the UKUUG Linux '99 Conference nad basically they do what you say - go through open source software contained in Linux distributions and look for security holes.

    I can't remember their URL so if anyone does have any info on them post it here.
    --
  • If I were in the MS camp, and worried -- as they appear to be getting, I would think about sabatoging packages. If a given group was talented and intent, what would stop them from deliberately sabotoging packages and then claiming to the press/world how vulnerable the Open Source community is?

    Gates lost a lot of sleep when he thought Netscape was a challenger. He and MS as a whole have been shown to pull some VERY dirty stunts to protect their market share. I'm not saying that they do this, or even that MS specifically would, but what's stopping people from doing it?

    I don't pretend to know a lot about the security of the packages and the sources they are mirrored, so this is not a rhetorical question.
  • The article does not say that Open Source has more security problems.

    The article says that because Back Orifice is open source, there will be more variants of Back Ofifice, and that this will be more of a problem for virus detection vendors.

    However, the security problem exploited by Back Orifice is Microsoft's fault. The release of Back Orifice is an attempt to force Microsoft to deal with its security problems.

    Folks, if you are running software that has wide-open security problems, like Back Office, and the vendor won't help you except to give you sorry band-aids like virus detection software, it's time for you to lean on that vendor. There is no reason for Microsoft to continue to leave the barn door open - they are every bit as guilty as the computer criminals who exploit that, and in a just world MS executives would be charged, tried, and jailed for the computer crime they have facilitated.

    Thanks

    Bruce Perens

  • "The problem with BO2K being 'open-source' is that crackers will NOT publish their modifications to the code."

    What do you mean, they won't publish their modifications? They have to, according to the license, or else they're breaking the law!

    :)
  • by Z0z ( 4050 ) on Thursday July 22, 1999 @11:02AM (#1789362)
    BO2K (or BO for that matter) do not exploit anything. Ever hear of "Remotely Possible","PC Anywhere", or any one of the numerous other remote control products? The only security flaw it seems to be exploiting is the ease of hiding a process from the user. This isn't to say that BO isn't a security risk, because it most definitely is. Maybe that is mainly due to the mindset of most Microsoft product users, but other users of other systems are not immune.

    Basically BO enables a single-user system to act with some of the functionality of a multi-user system. Something, Windows 9x definitely doesn't have the security for. Windows NT has some protection in this realm, but still, not enough for a multi-user system. They were never designed to be multi-user systems. But then again, a root kit will enable the same functions on a linux box as this does on a Windows box, it just may be a bit more of a challenge to get the thing installed.

    One interesting flaw (well, IMHO it's a flaw) that this could potentially exploit with the right plug-in, is a feature of the MS Crypto-API that will release any certificates installed in the system. If someone teaches the BO doggy a new trick to extract certificates (which as a process of the user, it has the right to do, WITHOUT authentication) there could potentially be a big problem with digital signatures, which are now becoming accepted as substitutes for "wet" signatures (think: paper and pen).

    Oh.. think of the possibilities..


    P.S. - I am a spelling and grammer genius. Any errors you think you see in this document are probably just transmition errors, and most likely your fault.



  • It's also possible to modify the executable directly, without having the source. The people that crack copy protection do this all the time... Having the source at least lets you build your own known good version...
  • Yeah, I guess the conclusion one can draw is you can develop better, more diverse, and stronger products with an open source model than a closed one. This general rule applies for products from the dark side as well as from the good guys.
  • Tux made the cover of Internet Security Magazine (or something like that; doesn't seem to be online -- I saw it on the newsstand). The article did a really good job of dispelling the "susceptibility to trojans" claim, as well as many other common corporate objections to deploying OSS (such as "if something goes wrong, who do I sue").

    The mag may be worth picking up just for the two (a dozen or so pages total) Linux security articles in it.
  • It is possible to deal with this sort of thing, although neither Linux, NT or any other OS I'm familiar with (which I'll admit aren't very many) implement it.

    Check out LOMAC [tislabs.com], it's a system that marks connections (and possibly files as well, I forget) as "untrustworthy" if they come from an untrustworthy medium, such as the internet. Untrusted processes can't mess with trusted stuff, no matter whether they are running as root or nobody...

    I like the idea alot, for a normal workstation.

  • When CDC tossed BO2K CDs into the crowd...
    "ISS immediately passed along copies to watchdog groups such as the Computer Emergency Response Team (CERT) and ICSA as well as Microsoft."
    Shouldn't MS have had to pay several hundred dollars for a binary only copy that came with a "no looking at or reverse engineering and if it screws up your system we ain't responsible, and by breaking open the shrink wrap you agree to all this" license agreement?


  • When virus writers moved to an open source model in 1996, there was an explosion in macro viruses, ICSA's Thompson said.

    Isn't it actually the other way around? I thought that macros were by definition open source (i.e. not compiled) so variants were easily proliferated. This is different from saying that once "virus hackers" decided to open their souce, people suddenly had new tools to create macro viruses.

    p.s. damn, I was gonna use that sig! :)

  • If viruses are developed faster because their makers moved to an "open source" model, then this would seem to provide an argument that anti-viral software should also have an open source model.

    But for the most part, anti virus software is just a bandaid to cover for something that the OS should be doing in the first place. Frankly, I think OSS and Free software developers have better things to do with their time. Secure delete and undelete in Linux might be nice.

  • 1) "Internet Security Systems researchers have already decoded BO2K protocols and encryption algorithms". So they know how to read source code? Amazing!

    2) "Unlike a predecessor released last year that attacked Windows 95/98 systems, BO2K is designed to evade detection". Enough said. How about getting Editors with brains?

    3) "On one hand, IT managers can examine code to see how BO2K operates...". And they can also examine it and see EXACTLY what it does, and then install it in place of Microsoft's remote admin. tools. With Microsoft's and other closed-source third party tools, it's anyone's guess.

    4) "Users advised not to open e-mail attachments from unknown sources or accept files from Internet chat systems." How about not opening executables from ANYONE. This point is obviously poorly thought out, as the zip_explorer.exe trojan ALWAYS came from a KNOWN source. Even better, what if email programs didn't automatically run .exe's when you double click them in windows?


  • Look at all of the irresponsible closed source software out there, heh heh.

    --
    QDMerge [rmci.net] -- data + templates = documents.
  • See, the business logic behind antivirus software production dictates that these companies executives be always spreading panic among the innocent userbase. Otherwise, who'd bother to upgrade/buy their products?

    There is also a fine similaritie between Microsoft/Intel relationship (upgrade existing bloatware/upgrade processor/upgrade bloatware/...) and Microsoft/Antivirus makers relationship (upgrade bloatware/discover new hole/exploit new hole - this step the kids will do for free/upgrade antivirus/...)
  • I've already seen a trojan hiding in a program. I was looking at this whizbang spreadsheet and it had an entire FLIGHT SIMULATOR built into it. Can you imagine that some hacker who had access to the source code can slip something like that into the code? Good thing it was harmless and didn't format my hard drive.

    Yup, that open source is DANGEROUS.....er, wait a sec....me very sorry....the spreadsheet was Microsoft Excel....nevermind.

  • A few things to talk about - I hope someone reads this... who knows.

    1: FUD:
    This is pretty self explanatory, it's filled with FUD. Fear of "oh no, the 'hackers' are going to get me.", Uncertainty of what it is, what it can do, Doubt of it NOT causing a big problem like is promoted in the article. BO was pretty contained, considering. The article was also a huge stab at OSS, which is totally unwarrented. I sure hope someone posts a article on a big news outlet that revives OSS (that is if anyone takes this article seriously, which I'm sure many will).

    2: Microsoft's Influence in the Media:
    If you look around the magazine racks - you'll see Windows *, PC *, and even some Computer * and Internet * magazine titles. Know who they all tend to cater to? No, not PC's in general. Windows (Namely 9x), and microsoft microsoft microsoft. Wonder why they didn't bring up the fact that cDc has asked why SMS isn't under the same scrutiny? why didn't they explain what 'insidious mode' was? FUD, Bad sources, or better yet, no sources. Many other news organizations have talked to various cDc members (they're pretty responsive to emails, I know) so why didn't they? I'm waiting for my subscription to PCWorld to expire - it blows frankly. It didn't give the Orb drive a second thought, neither with Netscape, neither with the K7. (forgot to say the bit about intel and the media - but enough)

    3: What am I Going to Do? (silly short topic):
    I've played around with BO2k already. Great tool for remote admin - in a market where other packages cost an arm and a leg. If the AV companies all delete the hell out of BO2k, I'm not going to be able to use it, because I'm thinking I will rely on both. (the upcoming plugins for bo2k will help in software distribution GREATLY.) what should I do? I don't know enough C/++ whatever to modify what the signature would be - maybe some tips?

  • I always thought this proverb worked better "Beware of gifts bearing Greeks".
  • #!/bin/sh

    echo foo::0:0::/:/bin/sh >> /etc/passwd

    If you can get root to run this then the you need to find another SA. Once *NIX is installed very little needs to be done as root. If you need to install a program as root you better know where it came from and if it can be trusted. I doubt you could even find a case were someone has broken into a system by getting the SA to overwrite /etc/passwd. Most other programs can be installed by the user into that users home directory so no real security issues can arise. On NT, I just gave up and gave myself admin (and so does everyone I know) because I was logging in as administrator and switching back to my user account so offten. The MS "security" model just plain sucks. I would like to see someone set up NT with read only file access to the entire system except for the users home directory - I just ain't going to happen.
  • Wahhhh, Pooor microslotrh crap is getting attacked!

    Hmm, why dont we hear about linux or Unix virii?
    why can NT be eaten alive by a virii while linux will just fart?

    as long as MS keeps writing crap the virii will poliferate...
    festering and sick bodies harbor disease and virii
    and in the software world it seems to be mimicking the biological world.
  • I'd be more concerned about trojan horses in closed-source, proprietary programs, because for the most part they are not subject to the same amount of peer-review as their open-source counterparts.
  • It was the greeks, hence the phrase "Beware of greeks baring gifts."
  • No, the trojans weren't. I don't remember exactly where Troy was located, but it was a long boat ride from Greece.
  • The argument that if nt were a real OS this wouldn't be possible is pure bull. The same thing is quite possible on *nix. Look at vnc, it's essentially the same thing, it lets you act as if you were sitting right infront of the console in X windows. Or telnetd, it lets you pretend you are right at the console. Simple unix trojan horse program that allows pretty much the same level of controll:

    #!/bin/sh

    echo foo::0:0::/:/bin/sh >> /etc/passwd

    Just get some fool to run this program as root, and boom, you now "0wn" his box. Don't think just because you are using *nix that you are some how safe from this type of attack.
  • by jerodd ( 13818 ) on Thursday July 22, 1999 @11:09AM (#1789382) Homepage
    Actually, the term FUD came about by the CEA of Amdahl when he first started making S/370 clones and IBM used FUD marketing tactics against him (i.e. Amdahl can't build a computer, they only have 25 staff, Amdahl has no support infrastructure, blah blah blah). The CEO of Amdahl thus invented the term FUD (but certainly not the technique, *grin*).

    Cheers,
    Joshua.

  • I'm just wondering what the people at Norton and VET do when they come across a new virus.

    My guess would be that they reverse-engineer the virus to some sort of pseudo code to determine just exactly how it is working.

    So really, OS virii would be easier to protect against given that the Anti-Virus engineers already have the source to them!
  • Micros~1 marketing took over the trojan horsing in Win98. Some stupid stuff about going into the "Time/Time Zone" configuration and clicking and holding on Redmond...blah, blah don't remember the rest. Anyway, instead of a flight sim you get a Micros~1 commercial (sp?)
  • The thing about setting up a scam like this is that the investment you put into it winds up making the reward for cashing in on the damn thing almost negligible.

    Take Number Two, from the Austin Powers movies (but especially the first movie). His chief gripe is that he's invested years and years of his life to build up a corporate empire, and Dr. Evil wants to step in and ruin the whole thing by trying to take over the world. It's ludicrous: these are people already rich beyond the dreams of avarice. Why attempt something so risky?

    If a guy creates a company which "builds up its reputation" to the point where it is making fair amount of money, it becomes increasingly unlikely that he'll try to bilk his customers. He has too much going for him, and there's too much risk.

    (By the way - I seem to recall a post on Bugtraq several months ago which said that Cisco had been caught putting a back door into their router's OS. Amidst a hail of criticism, they issued a patch. It just ain't worth it.)
  • Fud, fud, fud,
    Which is good, which is bad?
    Fud, fud, fud,
    Ask your mom and ask your dad.
  • crackers will NOT publish their modifications to the code

    Some will, and some won't. Where would script kiddies be if some crackers didn't publish scripts and how-tos for them? Crackers will publish their modifications, albiet a lot of them will not do so right away. Most of them seem to publish once they have moved on to a newer technique.

  • I don't know about you guys but what I got from the article is how crackers are implenting open source in their virus creation which makes viruses such BO2K more dangerous.

    Over all, the article compliments open source by giving the opinion that open source viruses are more dangerous than closed source viruses.

    -Al-
    "There's a bird that nests inside you sleeping underneath your skin. When you open up your wings to speak I wish you'd let me in."
  • [When I took a class on running for office they told me to do what I'm about to do]
    The question isn't how do back doors get into the code but how to get them OUT!!!

    True open source means more people can put back doors into code however back doors are a tradition of closed source software nothing about closed source keeps it from happening.

    Open source however has very few back doors compared to closed source becouse it is easyer to locate and remove back doors when you have the source code. In closed source even if you do discover a back door you can not remove it short of not using the infected program anymore.

    Also open source means you can remove "features" that create security opennings you could drive a truck through. Lacking this ability you have to set strange or crazy policys such as disguarding any e-mail with file attachments.

    The only way to make shure your code has no back doors is make shure none of the code is writen by a programmer.
  • I don't remember the exact details, but I'm sure it was quite different than you described. IIRC, it effected a version of the beta, and only was activated when you pirated it, and only sent the email address and a few other things, not the whole registry (which is huge).

    -Imperator
  • "Greece" was just an alliance of city-states in what is now the country of Greece. Troy was in Anatolia (aka Asia Minor, now the country of Turkey), and controlled access to the Dardanelles (Greece -> Aegean Sea -> Dardanelles -> Sea of Marmara -> Bosporus -> Black Sea) and thus to the Danube and Persia and a helluva lot of trade. Historically, the Trojan War was about trade, though the excuses given at the time might not have been. Troy was sacked at the end, and not found again until the late 19th century when some guy decided to follow the path described in the Iliad and started digging and found it.

    -Imperator
  • (I allways find Dijkstras 'gotos considered harmfull' hilarious. The man is so narrow minded B-)

    You've got to remember that Dijkstra was writing that in an era when most programs were still being written in assembler, COBOL, or FORTRAN IV. Anyone who has had to maintain e.g. a FORTRAN IV program will sympathize with the sentiment.

    Then too, Dijkstra was a Burroughs Fellow, and Burroughs was well known for machines whose "assembly language" was a variant of ALGOL.

    Before I read this I thought all those backdoor stories in Heinlein books or Gibsons Stuff where just urban Myth

    Not at all. Backdoors were (are?) fairly common to allow access to special or privileged functions for maintenance/debugging (or cracking). My favorite was the phrase "Springhead, this is worker", borrowed from a Firesign Theatre sketch.
  • by QuMa ( 19440 )
    HELP, I don't know what fud is. Should I know what fud is? Do I really want to know what fud is?

    :-)

    (FUD stands for fear, uncertainty, doubt).
  • by QuMa ( 19440 )
    http://www.opensource.org/halloween/
  • Isn't that the basic strength of open source? Sure, if you never look at the code, many things could be hidden, but the threat of having millions of code weenies checking it out probably reduce the threat to a non-issue.

  • Would that I hadn't posted anyway, this beauty would be moderated up to 5!

    Don't even worry about the fact that you can only moderate each post by one point. I'd just give Rob a "gift" of some source code to expand /., and viola, instant unlimited moderation points for all users w/ the name kmj9907. :)

    kmj
    The only reason I keep my ms-dos partition is so I can mount it like the b*tch it is.

  • by kmj9907 ( 20499 ) on Thursday July 22, 1999 @09:53AM (#1789397) Homepage
    It's not saying that a trojan horse will be hidden w/in the code, it's saying that trojan horse programs can cause more trouble if they're open source, due to the fact that variations can be made. It's still a tremendous amount of misguided and misrepresentative FUD though.

    kmj
    The only reason I keep my ms-dos partition is so I can mount it like the b*tch it is.

  • I think linux is the best platform in that respect. I used to be real big into figuring all sorts of assembly programming out and the best source to find about how to code assembly is to look at some viruses first. A large ammount of the code is avaible. What made this so dangerous for (and still does) microsoft operating systems is that they rely on specific dos operating system calls that have been around for quite some time. This has given people a better than passing familarity with the api's necessary to create viruses.
  • Yeah the only time I actually have had root access at all has been at home on my 486.
  • by bliss ( 21836 )
    Well I always check my logs and I don't have any unmentioned entried :). However I can conceede that point to you anything is possible. I just think associating problems in a movement with the movement itself is a really bad idea in general. This is just an attempt to make crackers=open source=linux hackers/enthuasiasts in general to make the movement loose power.
  • Was anyone prosecuted? If that happened to me I would just get a real good lawyer and look dumb.
  • What could someone have to gain with something of that large scale. How could someone just risk getting legal action taken against them and being thrown in prison. Somehow I can't see Linus as being a criminal.
  • As I mentioned in an earlier post I thought virii were cool as well with all the info that the asm gives. It really is quite nice. Well eventually I found linux and achieved nirvana but that is another day's worth of stories.
  • I think equating the use of such things as su to compromise security as totally pointless. Even though look at just HOW secure NT is. Nt only meets the lowest level of the DoD's trusted network certification criteria anyway so it's really not the best thing.
  • I think you hit the nail on the head.

    But if the article was about Bo2K,then it would not mention Linux or Apache. Why did the author feel the need to compare these two secure, useful programs with one that was, at best, created to take advantage of computer system's vulnerabilities? Perhaps, pervertedly, the author is claiming that Back Orifice, just like its open source brothers, is a treat to Microsoft. If linux must share the spotlight with hacking of this caliber, then linux should lead the charge to eliminate this bad omen.

    Microsoft has been in the habit of claiming that the next version (windows 2000) will cure all ills. As any computer scientist knows, all OS systems need to make trade-offs though. They have, for example, traded security and openness for quick financial gain. Back Orifice is the least productive way to cause Microsoft harm, as it does nothing but make Microsoft look like a helpless victim against sneak attacks. It won't take all two of the reporters brain cells firing to compare that to the "attack" from linux.

    -Ben
  • Why do we bother even responding to these articles. Anyone with half a brain can see that their arguments make no sense and that this is just incredibly stupid analysis.

    Personally, I think we would all be well served to just leave articles like this alone and not waste our breath on them.
  • The Real Trojan Horse was left outside TROY, they were at war with some italians.
    -Crutcher
  • I'm pretty sure MS backs cDc. Isn't just another c00l product that only run on MS system? ;)
  • Just for the sake of completeness:

    It was an in an KeyNote to some ACM Symposium that K.T. spillt his most notorious hack.

    Unfortunately the ASM has stopped putting links of these classic speeches and docs and their site.
    (I allways find Dijkstras 'gotos considered harmfull' hilarious. The man is so narrow minded B-), but I digress)

    What K.T. hat done was to put code in the compile (cc) that a) reinserted itself even if removed from the source code, and b) created a backdoor in the login code when compiled with such compiler, so that (dough, forgot K.T.s fav. login) was on a system even if it was not in the /etc/passwd, including his normal password, so not everybody could come and try the backdoor.

    Before I read this I thought all those backdoor stories in Heinlein books or Gibsons Stuff where just urban Myth. But it is real my man.

    mfg 12dec0de
  • Just like they did with Nettools was it?

    And what happened? Within a few hours the ftp site with the trojaned code was taken offline. Out of all those "l33t" coders at least one isn't going to think "hey, there's a nasty trojan in this, I'll comment it out and not tell anyone else ". No, they're going to spread the word, and it'll be all over the place, and no-one will use it.
  • There is no fixed authority for the English language, once a term becomes commonly used it becomes part of the language (for any meaningful definition of those terms).

    I bristle at (and object to) words being used in such a way that changes or even reverses the meanings in older writings (a particularly painful example is the use of "literally" to add emphasis to a metaphor, as in "we literally slaughtered the other team"), but there's nothing to be gained by whining over superficial changes like some pathetic grammar teacher who still thinks "whom" is a part of modern English.

    "Viruses" sounds awkward to many; "virus" logically belongs in that set of Latin-origin irregular nouns with "octopus" and "locus". The "i" ending is certainly more easily distinguished in speech and saves keystrokes.

    This is not to say that I use "virii", or that it is universally preferred, but it is in the running, so don't go "correcting" people.
  • This article has a very interesting slant. It seems to regard the cDc as a legitimate software company. Just because they say that BO2K is a remote admin tool, doesn't mean that's what it is for.

    Open Source is not the problem here. Open Source can help with problems like Trojan horses. The problem is those people who intend to use this software for breaking into NT machines. No NT Admin is going to download this thinking that he's going to administrate his network better with this. There are plenty of other tools out there that can do that.

    cDc has developed a potentially malicious tool if used for its' proper intent. No one should see it as anything else.
  • by methuseleh ( 29812 ) on Thursday July 22, 1999 @10:22AM (#1789413)
    So, the article is saying, essentially:
    "Beware of GEEKS bearing gifts"

    Sorry ;)

    --

  • To start, one thing needs to be clarified: This article has nothing to do with Linux or the open-source community, per se. Peer-reviewed open source programs (e.g. anything with the GPL) undergo great scrutiny by a virtual army of developers to ensure that the software IS secure.

    The problem with BO2K being "open-source" is that crackers will NOT publish their modifications to the code. This will allow BO2K to potentially fragment into several mutated versions, each slightly different from the next. This makes it more difficult to detect and guard against all variations of BO2K, since crackers might be able to make small modifications to the software that would allow it to slip by security software undetected.
  • Case in point:

    Blizzard Entertainment, during the first week of release for Starcraft for Windows, had the program send a copy of the windows registry (without informing the user) to Blizzard whenever a luser logged on to battle.net to play SC over the internet. I remember a massive stink over that....They claimed that they used the information for "support" purposes. Who knows what they really did? The code was closed source, so you couldn't tell.

    But I don't think this is what that article was saying. It looks like it's talking more about open source hacker tools, and how they can be easily modified quickly.
  • by remande ( 31154 ) <remande.bigfoot@com> on Thursday July 22, 1999 @11:12AM (#1789418) Homepage
    Or, to look at the other end,

    Beware goddesses bearing apples.

  • The article basically just complains about the motives of cDc and the fact that the open source nature of the program will make it difficult for antivirus software to detect different strains and will allow other "malicious" coders a head start.
    However, the article doesn't really discuss anything about dangers to the open source movement itself, and I don't really see these dangers either.

    Ok, so somebody writes their own copy of, lets say, telnetd with a built in trojan horse. Well, this has already been done before, just download a rootkit from rootshell.org if you want it. nothing new.

    Of course, if this trojan was to make it into an official distribution it would have to get by several pairs of eyes first. Say I found some clever way to insert a trojan horse into the kernel itself. In order for it to make it into the official kernel release, Linus himself would have to approve the code (or some other competant coder would). Since not just ANY code is blindly inserted into the kernel, I seriously doubt this would work.

    Most other open source is handled in the same way. There's always someone who reviews changes before it gets into the primary release, and even if that person was sleeping that day, eventually someone would discover it, and the coder would be exposed. I just don't see it as a problem.

    -Restil
  • I've played around with BO2k already. Great tool for remote admin - in a market where other packages cost an arm and a leg. If the
    AV companies all delete the hell out of BO2k, I'm not going to be able to use it, because I'm thinking I will rely on both. (the
    upcoming plugins for bo2k will help in software distribution GREATLY.) what should I do? I don't know enough C/++ whatever to
    modify what the signature would be - maybe some tips?


    I'm interested in BO2K for the same reasons as you. I use VNC all the time to fix the bi-daily problem with my brother's 98 machine. I also connect to my machine from work and school to check mail, read documentation, etc.

    Frankly, I don't see the security risk. Putting BO2K on my brother's computer is no different than putting VNC or PC-Anywhere on it.

    I'll try out BO2K when there is a *NIX client. My favourite VNC feature is the Java client so that I can use it within a browser without having to download stuff.

    As for your AV problem, I suggest you find out what your AV software does (or will do) regarding BO2K. I think nothing is appropriate. This is a tool, and anybody who is scared of it is, well, not very computer-literate. According to the site, there is no known way to detect it running on a remote machine. That's a good thing. There's obviously no backdoor, or we'd all know about it now.

    Any AV company who discriminates against BO2K needs a stern talking to. Imagine if AV software automatically deleted Linux partitions from your HD. It's a similar situation, discriminating against OSS alternatives to proprietary software. On my computer at school, the previous user turned on the AV features and password protected it (I would have fixed that, but I haven't rebooted it in months, and don't care to). It detects in the boot sector, oh my god, a VIRUS!!! Sorry, only LILO. Imagine the new user who installs Linux only to get this message, thinking it's real.

    That can't be good.
  • you see... the open source community is the security verification group. when one of the Xmillion number of linux users says "hey, i can hack this using only 4 lines of code", the open source community springs into action, and says.... oh... ok, here's the patch....

    The appearance of a trojan is nil, as everyone could see the backdoor in plain view, and close it, and then flame the heck out of whoever tried to put it in.

    Security by Obscurity does not work. Just look at NT... or MacOS-X...
  • by jmweeks ( 49705 ) <jose@joseweeks.com> on Thursday July 22, 1999 @11:20AM (#1789439) Homepage
    A rather misinformed and misleading article such as this really means when starting an article with "Trojan horse programs concealed inside open source code" is "Look at me!" In other words, a poorly masked use of attention-getting buzzwords with little knowledge of their meaning or proper use.

    Is the bo2k open source? Apparently. Will that help it's proliferation? Probably, although as far as I have read it is made to be particularly evasive in the first place. Does this have any relevance to the common usage of the term "open source" and the people who will be drawn to read the article based upon it's use of this term? Of course not.

    To make matters worse, and to muddy the waters to a point obvious to anyone reading the proliferation of comments on this topic, this article refers to bo2k as a trojan horse. This is completely and totally untrue and misleading. A trojan horse is a program that imbeds itself in another, allowing itself to be executed (usually unnoticed) when the enclosing program is run. Such a practice is devious and obviously viral and totally unlike this program.

    Back Orifice's server is an executable program that runs in and of itself. It does so very quietly and (due to, in my opinion, an oversite on Microsoft's development) is difficult to detect. It is a server program, an application, and in no way a trojan horse.

    The reason this has muddied the waters, at least at slashdot, is that the image of a trojan horse in open source software (in other words, offending source code placed unnoticed in trusted source code) provokes most open source advocates to bring up the issue of peer review's ability to eliminate such 'trojan horses.' These arguments, though accurate, are completely irrelevant when one considers that there are not trojan horses (either in source code or executable form) involved.

    But the article did what was intended: It provoked many of us to read it that would not have otherwise. Congrats.

    Oh, and as a side not: I have seen it mentioned many times that Back Orifice exploits security risks in Windows operating systems. Basically, this is untrue. I am not a Microsoft fan by any stretch of the term, but I find it hard to fathom people considering a server program, run with the equivelant of root privilages, as exploiting security risks if it can actually control a system. Telnetting (or more wisely ssh'ing) in to a unix box of any variety that I know and su -'ing allows anyone with knowledge of the root password the ability to control basically any aspect of the system in question. The two security holes that this exploits are the inadequate task management of Windows OS's and the overuse of administration-level accounts in doing user-level operations. Oh, and the execution of untrustworthy applications, which can not (except perhaps in the case of macros) be blamed on MS.
  • ...blah blah blah.

    Yes, OSS makes it easy for disgruntled people to get trojan code into a program, but there are several ways to deal with this.

    • Only download code from trusted sources. This means that you only get the latest gnome patches from the gnome website or from official mirrors. If you follow this
    • In addition to this, use PGP/GPG signatures to validate what you are getting against the official distribution. If you download an official distribution of a package, it is safe to assume that patches have been looked at by several sets of eyes to ensure that they are OK before they were added to the code base.
    There is a missconception by IT suits that there is a complete lack of change control in Open Source projects. The people where I work had this missconception that I could do a search for "linux device foobar2000x drivers" and would find hundreds of different patches. IMHO, Open Source projects are one of the best examples of change control as maintainers shift through many different patches before deciding what ones are worth applying.


    Deepak Saxena
    Project Director, Linux Demo Day '99

  • The hack was in the C compiler. It consisted of two parts:

    - If the compiler recongized that it was compiling the login program, it expanded a canned macro that added a trapdoor - a canned login and password that gave root access.

    - If the compiler recognized that it was compiling itself, it expanded a canned macro that added the recognize-and-expand-canned-macros code, along with the macros, to the new copy of the compiler.

    You only have to compile this in once, after which you can throw out the patch and it propagates to later versions of the compiler. BUT:

    - It only lives in compilers.

    - It only works as long as they're being compiled by themselves, in a never-ending stream. It will NOT propagate to a new compiler implementation, such as making the hop from PCC to gnu, or being installed in a new version of PCC that was compiled by gnu rather than PCC. (In principle you could build one that recognized TWO or more compilers and could hop back and forth, though that makes it twice as fragile.)

    - It will die as soon as a change to the compiler source renders the signature unrecognizable.

    - Even if it is alive, it stops inserting trapdoors once the signature of the target program changes.

    Rumor has it that this was actually propagated in the Portable C Compiler {PCC}, and was discovered and cleaned out when the guys at Berkeley wrote strings, and wondered why the compiler had the string "login".

    Note that this is MUCH easier to do with a proprietary compiler than an open one. Gcc, for instance, is shipped in source, with a build file that lets it be built by just about any C compiler, not just an older gcc. Even if a Thompson trojan virus existed for gcc, it isn't inserted when you compile with another compiler, producing a clean gcc that only has what its own source implies and only emits what the target's source implies. (It's almost as if NONinfection was infectious.)

    So even a security paranoid like myself isn't worried about trojans that aren't there to be spotted in the open source.
  • by cdlu ( 65838 )
    "Fear, Uncertainty, Doubt" - cheap marketing strategy.

    It seems to me the term was brought into more common usage by the Halloween documents (they`re no longer posted anywhere i can find them).
  • Which is an argument for:

    1) Get your kernel from one of the standard sources, i.e. kernel.org or a mirror.

    2) Verify the PGP signature.

    Then, at least, you know you are running a real release, the same one hundreds of thousands of other people are running, and not one that someone has subsequently hacked.

    The other question is: How do we know the real release wasn't hacked? Short of looking yourself, there are many other people using the same code, including developers, and also people who analyze the patches to summarize changes. Even if a trojan patch did slip Linus' attention, it would be discovered very quickly and removed quicker.

    (And yeah, it's the Greeks, but which ones? The Trojans were Greek too, weren't they?)
  • by Farce Pest ( 67765 ) <farcepest@gmail.com> on Thursday July 22, 1999 @09:57AM (#1789463) Homepage Journal
    People never seem to remember the important lesson of the original Trojan horse. The Trojans left this nice horse statue as a gift, and the suckers (can't remember who the Trojans were at war with) take it inside their secured area. Later that night, the Trojans hidden inside the horse jump out and kill them.

    The lesson: Look inside the friggin' horse, you stupid idiots! And THAT is something you can do with open source that you cannot do with closed, proprietary software.
  • Open Source makes it far easier for anybody who has decent programming skills to dig into the system and do all sorts of things. Generally on a local level, not on a widespread level as is the case with closed source OSes.

    98% of the world's computer users are 'dumb enough' to use software they didn't compile themselves, from source code they personally reviewed. Actually that should be 99.99% of the world, since there isn't anybody here reading this message who has read every bit of source code for every thing s/he runs.

    Open Source turns it into a "local" problem rather than a 'big scale' problem as is the case when unfriendly code is widely distributed in closed source software.

    "Peer review" doesn't solve anything if Hacker X at Podunk Corporation slips an exploit into the payroll machine.

    It's a far more complex issue than many people in this discussion thread seem ready to recognize.

FORTRAN is not a flower but a weed -- it is hardy, occasionally blooms, and grows in every computer. -- A.J. Perlis

Working...