Open Source Concerns: Trojan Horses In the Code 186
crisco writes to us with an article from InternetWeek addressing the concern of "trojan horse programs concealed inside open source code that could create new security headaches for IT managers", as the article says. The article deals mainly with the BO2K issue, which makes the whole open source connection a bit of a stretch.
Won't happen (Score:1)
Man, not a lot of classicists here! (Score:1)
Helen was the wife of Menelaus, king of Lacedaemon (AKA Sparta), one of the Greek leaders. She was reputed to be the most beautiful woman in the world. Paris was a prince of Troy, located across the Aegean Sea from Greece in what is now known as Turkey. Because he judged Aphrodite to be the most beautiful goddess, Paris was granted a wish, and he asked to have Helen as his wife. The Greeks were outraged at this "theft", so they gathered a massive army and sailed to Troy to get her back. (So Helen is known to have "a face that launched 1,000 ships).
The Greeks and Trojans fought for 10 years before the gates of Troy and many heroes were killed, including Hector (the mightiest Trojan warrior) and the incomparable Achilles (who would have loved Quake - read the Iliad - after his friend Patroclus was killed, he slaughtered the Trojans by the hundreds). Achilles was killed by a cowardly arrow in the heel, the only spot left vulnerable when his goddess-mother Thetis dipped him in the river to make him invincible.
Since the Greeks couldn't take Troy by force, Odysseus devised the great horse as a ploy. The Trojans foolishly brought it into the city, after which the Greeks came out, killed whatever resistance they met, and opened the city gates to let the rest of the army in.
Although most people associate the Iliad with the Trojan war, the Trojan horse never appears in the Iliad - it ends with the funeral of Patroclus. The Aeneid, by Virgil, tells the story of the Trojan Horse and the sack of Troy. The Aeneid puts forth the hypothesis that Rome was founded by Trojan refugees after the fall of Troy.
Wrong, wrong, wrong (Score:1)
Calm thyself, language zealot (Score:1)
virus
is in the same spirit of hackish wordplay that gives us plurals like
Unix
VAX
I don't know if it's actually in the Jargon File, but it's hardly kiddie-speak. We don't do away with words like hackage and bogosity just because they're not in the dictionary!
AC
FUD (Score:2)
FUD, nothing more.
Open Source (Score:1)
For what it's worth, if the OS being "attacked" is open source, there are even larger of number of people ready to close up holes and what-not within a few hours, days at most. As Jason Garms is quoted, "There's nothing wrong with [Microsoft] systems until Back Orifice is installed." NT is perfect, therefore there will never be any fixes. BO2k will just be labeled a virus/trojan and to most people, that's considered sufficient protection.
Re:su (Score:1)
Where to begin... (Score:5)
BO2k isn't concealed inside another program..
When virus writers moved to an open source model in 1996, there was an explosion in macro viruses,...
Ah yes, I remember the good old days of proprietary virii...NOT.
The explosion in macro virii wouldn't have anything to do with a program that
could _host_ them now, would it?
Like, I don't know, maybe MS Office?
No mention of how much easier it is to construct
a macro virus as opposed to a real virus done in, say, x86 assembler.
Organizations "absolutely should be putting
security measures in place if they use NT to a
great degree" to thwart BO2K-specific attacks,
said Drew Williams, director of Axent Technologies'
SWAT Team.
Hmm, not quite sure what to say about this one...
Are they saying:
A)You don't need security if you don't use NT
B)You shouldn't use NT (I'll buy that)
C)If you only have one NT box you don't have to worry
D)Win9x, 3.1 aren't vulnerable
Internet Security Systems researchers have
already decoded BO2K protocols and encryption
algorithms.
Nice trick...somebody must have sent them the source
code in an encrypted email, yeah, thats
the ticket...
Jason Garms, product manager for NT security at
Microsoft, said the company will fix any known
security vulnerabilities in its operating
systems. "There's nothing wrong with [Microsoft]
systems until Back Orifice is installed.
Oh my.... Somebody should start
a 12 step group for folks like this
I detect some serious denial problems here.
How much are these fixes going to cost?
When can we expect delivery?
Thats what I thought...
Users on NT networks that
exchange files and use Internet chat systems
are at the highest risk....
So..don't use your network to
transfer files..just look at the pretty lights....
The elite hacker group is banking on tools
such as BO2K to eventually force Microsoft
to correct security weaknesses in its operating
systems.
Security experts don't see the logic.
"They didn't have to write code and
release it to the public," said ICSA's Thompson.
The bastards, how _dare_ they try
to push around Micros~1!
Who's the real victim here? Micros~1
or the "Security Experts" who have to get
off their well padded rear ends and do some work now?
Oh wait, I guess security expert is a synonym for pundit now.
Once the program is released,
Axent's Williams expects an "immediate
spike" in hacking activity
on NT systems, but expects it to trickle down to
some level of manageability.
The program is already released, Sparky...
I expect this is true if we use hacking in the
proper sense as in "Micros~1 programmers fixing
things up a bit"..
Though I expect if you replace "hack" with "kludge"
it'd be a little more accurate
Now _this_ is the kind of story I expect to see on
Just like backinaday
Re:possibly misinterpreted (Score:3)
NT or BO2K's fault? (Score:1)
How does a process "hide" in NT? Is this a "feature" of NT? Is it an undocumented feature? Or it BO2K using an exploit to do this?
If you run BO2K as a regular user, isn't it limited to that user's rights, just like in unix? If not, how does BO2K gain superuser access?
Is this really Microsoft's fault? Or is BO2K not as harmful as everyone makes it out to be?
Oh my... (Score:2)
La. La. La la la.
uhh. what's the POINT here? (Score:1)
"Jason Garms, product manager for NT security at Microsoft, said the company will fix any known security vulnerabilities in its operating systems. "There's nothing wrong with [Microsoft] systems until Back Orifice is installed.In reality, [cDc] has produced code with malicious intent that targets users, not technology," (bolding mine)
Uh, yeah, right, so the BO stuff gets installed on users now, does it?
What bothers me is the subtle dig here at OSS development, really missing the point that if the target TECHNOLOGY wasn't so friggin full of holes, then there would be a lot fewer exploits - either in binary or open source form.
The article could have been a lot more honest by stating: "yeah, open source 'sploits make it a bit easier to mutate the buggers, but, hey, if MS wrote decent client and server software, we wouldn't be having this discussion."
Re:The real Trojan Horse (Score:1)
Re:So.... what's your point? (Score:1)
If that really happened, then I'm sorry your family was the victim of some bad cops.
We're dealing with people here, and some of them are bad. Some are very good, but most are somewhere in between.
If the cops got caught and prosecuted and sentenced, then the law _was_ followed.
I'm sick of hearing all cops get maligned for the actions of a few bad apples!!
my response (Score:1)
------------------------------------------------
This e-mail is in response to your online article dated July 19, 1999 entitled "Hackers Kick Open Back Door To NT". I (like many others, I presume) take exception to the way the article associates the CRACKER (cracker, not hacker, you idiots!!) community with the Open Source / Free Software community. The dangerous connections that you have made that "the Back Orifice programs are bad" and "the Back Orifice programs have the source available" leads the uninformed to believe that all open-sourced software could contain trojan horses or other viruses. In your very own article you state that the server part of the program is spread through an e-mail attachment, therefore the software responsible for delivering and allowing the release of the trojan horse is a very proprietary closed-source product.....Microsoft Outlook!!! (just as in the case of the melissa virus)
In case you were not aware, the cracker community has almost _always_ made the source code to their viruses, trojan horses, password crackers, port scanners, and other software available to other crackers. This way the other crackers can use them. The cracker community existed long before there was a Free Software community. The Free Software community is about spreading ideas and information about computing and programming to take advantage of the massive pool of talented HACKERS (programmers) available worldwide. I hesitate to use the term hackers, since even you people in the _technical_ media obviously still haven't grasped the distinction between hackers and crackers. Crackers are about breaking into phone and computer systems for fun and profit.
If your intent was to write an article about the possible problems with the proliferation of the BackOrifice2000 program, then you have failed miserably. It is obvious that you do not understand the problems yourself. You do not make a point of the fact that if Outlook and Word did not have such a poor excuse for security, then the program could not be spread as easily. You also do not understand the motivations of people like the cDc, who have decided that since MS will not fix the _very_ long-standing bugs in all of their windows operating systems and applications, then cDc will use them to create a program that does essentially what "PC Anywhere" does (without the large amount of money and signed NDA's Symantec had to give to receive the information to write PC Anywhere). If I attach a self-installable, pre configured copy of PC Anywhere to an email to someone, and use it to own their machine, should Symantec be sued for writing it? cDc and other "white-hat" cracking groups have made it clear for a long time that they are trying to warn MS about these security holes so THAT THEY WILL BE FIXED. MS has shown that unless widely publicized outrage at a security bug occurs (like the melissa virus), then all but the most serious bugs and holes either go unfixed for a long time (until the next service pack or so) or they just do not get fixed, ever!!
Re:Serious mis-interpretation going one here (Score:1)
What it says to 'Clueless Joe' IT Manager who has never used anything else except MS products is that since this "horrible" program that he heard about on this "trustworthy" technical web site is open sourced, then all programs and projects associated with the current buzzword "Open Source" must be bad and he should never allow them into his domain.
It also preys upon their fears that there are armies of rabid "hackers" (/me shudders at the misuse) out there, like in the movies, who are just waiting to jump across the internet and own his boxes.
I agree that BO is an attempt to force MS to deal with their holes, but rather than interviewing cDc about it and finding their side of the story, the writer just let some "experts" blather on.
The whole idea that BO would now evolve into millions of strains that would keep Anti-Virus detection companies working 24x7 to fight them is even more sensational, so that was made the focus of the article.
See my response to the article in another post.
They do make a good argument... (Score:1)
I'd almost like to see this one go to court. After Microsoft somehow managed to win the Bristol case (I still can't understand how the jury came to that conclusion), It'd make me feel better to see them get themselves into another case where they'll end up looking stupid. cDc makes a pretty good argument on their website. It's amazing the lengths MS will go to to avoid having to admit that their programs have bugs.
Re:Man, not a lot of classicists here! (Score:1)
Achilles was killed by a cowardly arrow in the heel,
What's cowardly about that? Jeez... if it's the only spot that'll do the trick, I'd say it was a pretty darn smart arrow. Doesn't seem like Achilles was all that brave himself. Charging into battle isn't such a big deal when you're invincible.
So.... what's your point? (Score:1)
He did a bad thing. He should be arrested and barbecued for his blatant attempt to take that which most definitely did not belong to him. What's to stop someone from doing the same thing with proprietary software? They hire a bunch of programmers and make a real product. After a year or two, people trust them. Then he goes and sticks in his little back door and nobody knows about it... not even his own programmers. This is why we have laws. It has nothing to do with open/closed source. It has to do with malicious intent.
Re:That is the point! (Score:1)
Besides, unless the sysadmin is very crappy, users should never be allowed to write to code files.
My cheesy little friend, do you really think that everybody developing on *NIX boxen has root access?
Nope, they don't. And you need access to system header files to do anything of consequence.
Unless, of course, your company is preparing for the release of "Hello, World! 2000". ;)
Re:possibly misinterpreted (virii) (Score:2)
I still wonder what hapenned to them.
Interrestingly, the viruses where very often using undocumented functions in MS-DOS (and not only the InDos flag), some where really incredible.
Dangerous conclusion (Score:1)
Think it can't happen?
Re:possibly misinterpreted (Score:3)
Excuse me ?? Macro Viruses? Wasn't it Microsofts own macro language that resulted in the rise of Macro Viruses. Open source had nothing to do with it. Damm read that line again what a load of Bullsh#t!
If you go to the BO2k website you'll see that Microsoft uses the STEALTH feature in their own product.
www.cultdeadcow.com/news/pr19990719.html
SMS is Microsoft's remote admin tool for Windows. As it happens, SMS has a nearly identical
stealth feature. As a matter of fact, they explain this feature in a Word document available
from the Microsoft website:
Re:there already is! (Score:1)
Consider Linux or Mozilla -- their source trees
are huge, and if one were particularly untrusting,
one might think that it would be easy for such
groups to accidentally or purposefully stick code
in that could be problematic WRT security. The
trust that can be applied to small projects WRT
security can't neccesarily be given to larger
projects, as the chance of someone, or even everyone collectively,
looking at the problematic section(s) and knowing
enough to recognize a security problem isn't
particularly inspiring. OTOH, it certainly beats
binary distributions
Re:there already is! (Score:1)
But on a practical level, things submitted by
people from outside with ill intent or lack of
a clue could cause security issues, and it seems
that even with a reviewer, some bad code will
quite possibly get in.
Verification group? (Score:2)
verification group which would audit open source
projects for security problems (intentional or no),
determine what platforms the source compiles on,
look for bugs, and ideally submit patches back to
authors and possibly sell support and/or legal
liability for program failings.
Re:Missing the point of BO2K (Score:1)
--BEGIN--
In a number of places on your page about BO2K, you refer to it as a "virus" and a "trojan".
BO2K is neither of these. Virus spread themselves; BO2K does not. Torjan horses pretend to be something they are not; BO2K does not.
Back Orifice 2000's website (http://www.bo2k.com) makes no bones about what it is: it is a remote administration program. It hides from the taklist to stop clueless users from removing it, and then only on 95/98. On NT, it is visible in the task list running as a service.
You refer to the original Back Orifice being "discovered" on October 15 1998... The software was announced with a press release on July 21 1998. Where's the discovery in that?
Back Orifice 2000 is a tool that allows the installer to control a machine remotely. It is no different in function from pcAnywhere or other such tools. As a side effect, it demonstrates the woeful security present in Microsoft's operating systems.
Personally, I find your characterisation of BackOrifice 2000 offensive and sensationalistic. Sensationalising the possible effects of the tool is one thing, but sensationalising its essential nature is another thing entirely.
Yours,
Paul Collins.
--END--
Yes, I have seen the typos
------------p!
possibly misinterpreted (Score:4)
I think that you might have misinterpreted what this article is about. It is merely an article about Bo2k and how the fact that IS open source will cause problems for people. Meanwhile, it eludes the somewhat minor problem of people writing patches for legitimate software that turns in into trojan like software.
However I did glean a few bits of interesting stuff. Mainly that Microsoft is saying that if its a real remote admin tool that it wouldn't hide from the administrator. Umm, excuse me, I have the displeasure of having an NT server box here at work that I'm pseudo responsible for and NT Server Manager hides.
Secondly it doesn't mention the fact that if NT were written worth a damn, then it wouldn't be POSSIBLE to do this sort of stuff to it. There was the comment about it preying on users and not administrators, which is partially true, but its really MSs fault in the first place.
There was only one other thing that I disagreed with. It said something about when virus writers switched to open source in 1996 (like it was some sort of heavenly revelation) that there was proliferation in macro viruses. This may be true. But its more likely due to the rise of people who are using IE and Outlook for their net browsing and email reading.
Oh well, if nothing else the cDc by releasing the source code will actually FORCE microsoft to patch the whole and release patches that detect the software.
Re:Verification group? (Score:2)
FUD. (Score:2)
Further, OSS has been around a long while. This sort of thing can happen, but it doesn't last too long.
Sounds like a case of old fashion FUD.
Re:Why Bother? (Score:2)
Re:Verification group? (Score:1)
I can't remember their URL so if anyone does have any info on them post it here.
--
Trojans open a possibility of tactical attack? (Score:1)
Gates lost a lot of sleep when he thought Netscape was a challenger. He and MS as a whole have been shown to pull some VERY dirty stunts to protect their market share. I'm not saying that they do this, or even that MS specifically would, but what's stopping people from doing it?
I don't pretend to know a lot about the security of the packages and the sources they are mirrored, so this is not a rhetorical question.
Serious mis-interpretation going one here (Score:4)
The article says that because Back Orifice is open source, there will be more variants of Back Ofifice, and that this will be more of a problem for virus detection vendors.
However, the security problem exploited by Back Orifice is Microsoft's fault. The release of Back Orifice is an attempt to force Microsoft to deal with its security problems.
Folks, if you are running software that has wide-open security problems, like Back Office, and the vendor won't help you except to give you sorry band-aids like virus detection software, it's time for you to lean on that vendor. There is no reason for Microsoft to continue to leave the barn door open - they are every bit as guilty as the computer criminals who exploit that, and in a just world MS executives would be charged, tried, and jailed for the computer crime they have facilitated.
Thanks
Bruce Perens
Re:Open-source Trojan Horses (Score:1)
What do you mean, they won't publish their modifications? They have to, according to the license, or else they're breaking the law!
:)
Dogs and cats.. living together.. MASS HYSTERIA! (Score:3)
Basically BO enables a single-user system to act with some of the functionality of a multi-user system. Something, Windows 9x definitely doesn't have the security for. Windows NT has some protection in this realm, but still, not enough for a multi-user system. They were never designed to be multi-user systems. But then again, a root kit will enable the same functions on a linux box as this does on a Windows box, it just may be a bit more of a challenge to get the thing installed.
One interesting flaw (well, IMHO it's a flaw) that this could potentially exploit with the right plug-in, is a feature of the MS Crypto-API that will release any certificates installed in the system. If someone teaches the BO doggy a new trick to extract certificates (which as a process of the user, it has the right to do, WITHOUT authentication) there could potentially be a big problem with digital signatures, which are now becoming accepted as substitutes for "wet" signatures (think: paper and pen).
Oh.. think of the possibilities..
P.S. - I am a spelling and grammer genius. Any errors you think you see in this document are probably just transmition errors, and most likely your fault.
Re:That is the point! (Score:1)
Re:Did you people read the article? (Score:1)
Another major reference to OSS security (Score:1)
The mag may be worth picking up just for the two (a dozen or so pages total) Linux security articles in it.
Re:Clarification (Was Re:What they really mean...) (Score:1)
Check out LOMAC [tislabs.com], it's a system that marks connections (and possibly files as well, I forget) as "untrustworthy" if they come from an untrustworthy medium, such as the internet. Untrusted processes can't mess with trusted stuff, no matter whether they are running as root or nobody...
I like the idea alot, for a normal workstation.
BO2K distribution at DefCon (Score:1)
"ISS immediately passed along copies to watchdog groups such as the Computer Emergency Response Team (CERT) and ICSA as well as Microsoft."
Shouldn't MS have had to pay several hundred dollars for a binary only copy that came with a "no looking at or reverse engineering and if it screws up your system we ain't responsible, and by breaking open the shrink wrap you agree to all this" license agreement?
OSS & Macros - quite the opposite actually (Score:2)
Isn't it actually the other way around? I thought that macros were by definition open source (i.e. not compiled) so variants were easily proliferated. This is different from saying that once "virus hackers" decided to open their souce, people suddenly had new tools to create macro viruses.
p.s. damn, I was gonna use that sig! :)
Anti virus software (Score:1)
If viruses are developed faster because their makers moved to an "open source" model, then this would seem to provide an argument that anti-viral software should also have an open source model.
But for the most part, anti virus software is just a bandaid to cover for something that the OS should be doing in the first place. Frankly, I think OSS and Free software developers have better things to do with their time. Secure delete and undelete in Linux might be nice.
Errata and other points (Score:1)
2) "Unlike a predecessor released last year that attacked Windows 95/98 systems, BO2K is designed to evade detection". Enough said. How about getting Editors with brains?
3) "On one hand, IT managers can examine code to see how BO2K operates...". And they can also examine it and see EXACTLY what it does, and then install it in place of Microsoft's remote admin. tools. With Microsoft's and other closed-source third party tools, it's anyone's guess.
4) "Users advised not to open e-mail attachments from unknown sources or accept files from Internet chat systems." How about not opening executables from ANYONE. This point is obviously poorly thought out, as the zip_explorer.exe trojan ALWAYS came from a KNOWN source. Even better, what if email programs didn't automatically run
Re:Dangerous conclusion (Score:1)
Look at all of the irresponsible closed source software out there, heh heh.
--
QDMerge [rmci.net] -- data + templates = documents.
Oh, these "security experts" ARE pundits (Score:1)
There is also a fine similaritie between Microsoft/Intel relationship (upgrade existing bloatware/upgrade processor/upgrade bloatware/...) and Microsoft/Antivirus makers relationship (upgrade bloatware/discover new hole/exploit new hole - this step the kids will do for free/upgrade antivirus/...)
The article is Right On the Mark! (Score:2)
Yup, that open source is DANGEROUS.....er, wait a sec....me very sorry....the spreadsheet was Microsoft Excel....nevermind.
FUD, Microsoft's Influence, and What am I going to (Score:1)
1: FUD:
This is pretty self explanatory, it's filled with FUD. Fear of "oh no, the 'hackers' are going to get me.", Uncertainty of what it is, what it can do, Doubt of it NOT causing a big problem like is promoted in the article. BO was pretty contained, considering. The article was also a huge stab at OSS, which is totally unwarrented. I sure hope someone posts a article on a big news outlet that revives OSS (that is if anyone takes this article seriously, which I'm sure many will).
2: Microsoft's Influence in the Media:
If you look around the magazine racks - you'll see Windows *, PC *, and even some Computer * and Internet * magazine titles. Know who they all tend to cater to? No, not PC's in general. Windows (Namely 9x), and microsoft microsoft microsoft. Wonder why they didn't bring up the fact that cDc has asked why SMS isn't under the same scrutiny? why didn't they explain what 'insidious mode' was? FUD, Bad sources, or better yet, no sources. Many other news organizations have talked to various cDc members (they're pretty responsive to emails, I know) so why didn't they? I'm waiting for my subscription to PCWorld to expire - it blows frankly. It didn't give the Orb drive a second thought, neither with Netscape, neither with the K7. (forgot to say the bit about intel and the media - but enough)
3: What am I Going to Do? (silly short topic):
I've played around with BO2k already. Great tool for remote admin - in a market where other packages cost an arm and a leg. If the AV companies all delete the hell out of BO2k, I'm not going to be able to use it, because I'm thinking I will rely on both. (the upcoming plugins for bo2k will help in software distribution GREATLY.) what should I do? I don't know enough C/++ whatever to modify what the signature would be - maybe some tips?
Re:The real Trojan Horse (Score:1)
Root access (Score:1)
echo foo::0:0::/:/bin/sh >>
If you can get root to run this then the you need to find another SA. Once *NIX is installed very little needs to be done as root. If you need to install a program as root you better know where it came from and if it can be trusted. I doubt you could even find a case were someone has broken into a system by getting the SA to overwrite
BOO HOO HOO! (Score:1)
Hmm, why dont we hear about linux or Unix virii?
why can NT be eaten alive by a virii while linux will just fart?
as long as MS keeps writing crap the virii will poliferate...
festering and sick bodies harbor disease and virii
and in the software world it seems to be mimicking the biological world.
Quite the opposite... (Score:2)
Re:The real Trojan Horse (Score:1)
Re:The real Trojan Horse (Score:1)
Re:possibly misinterpreted (Score:2)
#!/bin/sh
echo foo::0:0::/:/bin/sh >>
Just get some fool to run this program as root, and boom, you now "0wn" his box. Don't think just because you are using *nix that you are some how safe from this type of attack.
Re:FUD? (Score:3)
Cheers,
Joshua.
OS virii makes it easier for Norton and VET (Score:1)
My guess would be that they reverse-engineer the virus to some sort of pseudo code to determine just exactly how it is working.
So really, OS virii would be easier to protect against given that the Anti-Virus engineers already have the source to them!
Have you seen the Win98 one?...that's a virus (Score:1)
Number Two/Virtucom Syndrome (Score:1)
Take Number Two, from the Austin Powers movies (but especially the first movie). His chief gripe is that he's invested years and years of his life to build up a corporate empire, and Dr. Evil wants to step in and ruin the whole thing by trying to take over the world. It's ludicrous: these are people already rich beyond the dreams of avarice. Why attempt something so risky?
If a guy creates a company which "builds up its reputation" to the point where it is making fair amount of money, it becomes increasingly unlikely that he'll try to bilk his customers. He has too much going for him, and there's too much risk.
(By the way - I seem to recall a post on Bugtraq several months ago which said that Cisco had been caught putting a back door into their router's OS. Amidst a hail of criticism, they issued a patch. It just ain't worth it.)
F - U - D (Score:1)
Which is good, which is bad?
Fud, fud, fud,
Ask your mom and ask your dad.
Re:Open-source Trojan Horses (Score:1)
Some will, and some won't. Where would script kiddies be if some crackers didn't publish scripts and how-tos for them? Crackers will publish their modifications, albiet a lot of them will not do so right away. Most of them seem to publish once they have moved on to a newer technique.
You missed the point. (Score:1)
Over all, the article compliments open source by giving the opinion that open source viruses are more dangerous than closed source viruses.
-Al-
"There's a bird that nests inside you sleeping underneath your skin. When you open up your wings to speak I wish you'd let me in."
Back doors (Score:1)
The question isn't how do back doors get into the code but how to get them OUT!!!
True open source means more people can put back doors into code however back doors are a tradition of closed source software nothing about closed source keeps it from happening.
Open source however has very few back doors compared to closed source becouse it is easyer to locate and remove back doors when you have the source code. In closed source even if you do discover a back door you can not remove it short of not using the infected program anymore.
Also open source means you can remove "features" that create security opennings you could drive a truck through. Lacking this ability you have to set strange or crazy policys such as disguarding any e-mail with file attachments.
The only way to make shure your code has no back doors is make shure none of the code is writen by a programmer.
Slightly inaccurate (Score:1)
-Imperator
Re:The real Trojan Horse (Score:1)
-Imperator
Dijkstra (Score:2)
You've got to remember that Dijkstra was writing that in an era when most programs were still being written in assembler, COBOL, or FORTRAN IV. Anyone who has had to maintain e.g. a FORTRAN IV program will sympathize with the sentiment.
Then too, Dijkstra was a Burroughs Fellow, and Burroughs was well known for machines whose "assembly language" was a variant of ALGOL.
Before I read this I thought all those backdoor stories in Heinlein books or Gibsons Stuff where just urban Myth
Not at all. Backdoors were (are?) fairly common to allow access to special or privileged functions for maintenance/debugging (or cracking). My favorite was the phrase "Springhead, this is worker", borrowed from a Firesign Theatre sketch.
Re:FUD? (Score:1)
:-)
(FUD stands for fear, uncertainty, doubt).
Re:FUD? (Score:2)
That is the point! (Score:1)
Re:The real Trojan Horse (Score:1)
Don't even worry about the fact that you can only moderate each post by one point. I'd just give Rob a "gift" of some source code to expand /., and viola, instant unlimited moderation points for all users w/ the name kmj9907. :)
kmj
The only reason I keep my ms-dos partition is so I can mount it like the b*tch it is.
Did you people read the article? (Score:3)
kmj
The only reason I keep my ms-dos partition is so I can mount it like the b*tch it is.
Re:I they mean viruses that are Open Source.. (Score:1)
Re:That is the point! (Score:1)
Re:FUD (Score:1)
Re:Slightly inaccurate (Score:1)
Re:there already is! (Score:1)
Re:possibly misinterpreted (virii) (Score:1)
Re:What they really mean... (Score:1)
Re:possibly misinterpreted (Score:2)
But if the article was about Bo2K,then it would not mention Linux or Apache. Why did the author feel the need to compare these two secure, useful programs with one that was, at best, created to take advantage of computer system's vulnerabilities? Perhaps, pervertedly, the author is claiming that Back Orifice, just like its open source brothers, is a treat to Microsoft. If linux must share the spotlight with hacking of this caliber, then linux should lead the charge to eliminate this bad omen.
Microsoft has been in the habit of claiming that the next version (windows 2000) will cure all ills. As any computer scientist knows, all OS systems need to make trade-offs though. They have, for example, traded security and openness for quick financial gain. Back Orifice is the least productive way to cause Microsoft harm, as it does nothing but make Microsoft look like a helpless victim against sneak attacks. It won't take all two of the reporters brain cells firing to compare that to the "attack" from linux.
-Ben
Why Bother? (Score:2)
Personally, I think we would all be well served to just leave articles like this alone and not waste our breath on them.
Um.. NO (Score:1)
-Crutcher
[humor] Re:M$ and open source propaganda (Score:1)
Re:Ken Thompson and the C compiler... (Score:1)
It was an in an KeyNote to some ACM Symposium that K.T. spillt his most notorious hack.
Unfortunately the ASM has stopped putting links of these classic speeches and docs and their site.
(I allways find Dijkstras 'gotos considered harmfull' hilarious. The man is so narrow minded B-), but I digress)
What K.T. hat done was to put code in the compile (cc) that a) reinserted itself even if removed from the source code, and b) created a backdoor in the login code when compiled with such compiler, so that (dough, forgot K.T.s fav. login) was on a system even if it was not in the
Before I read this I thought all those backdoor stories in Heinlein books or Gibsons Stuff where just urban Myth. But it is real my man.
mfg 12dec0de
Re:FUD (Score:1)
And what happened? Within a few hours the ftp site with the trojaned code was taken offline. Out of all those "l33t" coders at least one isn't going to think "hey, there's a nasty trojan in this, I'll comment it out and not tell anyone else ". No, they're going to spread the word, and it'll be all over the place, and no-one will use it.
Regarding the English language. (Score:1)
I bristle at (and object to) words being used in such a way that changes or even reverses the meanings in older writings (a particularly painful example is the use of "literally" to add emphasis to a metaphor, as in "we literally slaughtered the other team"), but there's nothing to be gained by whining over superficial changes like some pathetic grammar teacher who still thinks "whom" is a part of modern English.
"Viruses" sounds awkward to many; "virus" logically belongs in that set of Latin-origin irregular nouns with "octopus" and "locus". The "i" ending is certainly more easily distinguished in speech and saves keystrokes.
This is not to say that I use "virii", or that it is universally preferred, but it is in the running, so don't go "correcting" people.
Missing the point of BO2K (Score:2)
Open Source is not the problem here. Open Source can help with problems like Trojan horses. The problem is those people who intend to use this software for breaking into NT machines. No NT Admin is going to download this thinking that he's going to administrate his network better with this. There are plenty of other tools out there that can do that.
cDc has developed a potentially malicious tool if used for its' proper intent. No one should see it as anything else.
Re:The real Trojan Horse (Score:4)
Sorry
--
Open-source Trojan Horses (Score:2)
The problem with BO2K being "open-source" is that crackers will NOT publish their modifications to the code. This will allow BO2K to potentially fragment into several mutated versions, each slightly different from the next. This makes it more difficult to detect and guard against all variations of BO2K, since crackers might be able to make small modifications to the software that would allow it to slip by security software undetected.
Re:Quite the opposite... (Score:2)
Blizzard Entertainment, during the first week of release for Starcraft for Windows, had the program send a copy of the windows registry (without informing the user) to Blizzard whenever a luser logged on to battle.net to play SC over the internet. I remember a massive stink over that....They claimed that they used the information for "support" purposes. Who knows what they really did? The code was closed source, so you couldn't tell.
But I don't think this is what that article was saying. It looks like it's talking more about open source hacker tools, and how they can be easily modified quickly.
Re:The real Trojan Horse (Score:3)
Beware goddesses bearing apples.
Dont' see the issue. (Score:2)
However, the article doesn't really discuss anything about dangers to the open source movement itself, and I don't really see these dangers either.
Ok, so somebody writes their own copy of, lets say, telnetd with a built in trojan horse. Well, this has already been done before, just download a rootkit from rootshell.org if you want it. nothing new.
Of course, if this trojan was to make it into an official distribution it would have to get by several pairs of eyes first. Say I found some clever way to insert a trojan horse into the kernel itself. In order for it to make it into the official kernel release, Linus himself would have to approve the code (or some other competant coder would). Since not just ANY code is blindly inserted into the kernel, I seriously doubt this would work.
Most other open source is handled in the same way. There's always someone who reviews changes before it gets into the primary release, and even if that person was sleeping that day, eventually someone would discover it, and the coder would be exposed. I just don't see it as a problem.
-Restil
Re:FUD, Microsoft's Influence, and What am I going (Score:2)
AV companies all delete the hell out of BO2k, I'm not going to be able to use it, because I'm thinking I will rely on both. (the
upcoming plugins for bo2k will help in software distribution GREATLY.) what should I do? I don't know enough C/++ whatever to
modify what the signature would be - maybe some tips?
I'm interested in BO2K for the same reasons as you. I use VNC all the time to fix the bi-daily problem with my brother's 98 machine. I also connect to my machine from work and school to check mail, read documentation, etc.
Frankly, I don't see the security risk. Putting BO2K on my brother's computer is no different than putting VNC or PC-Anywhere on it.
I'll try out BO2K when there is a *NIX client. My favourite VNC feature is the Java client so that I can use it within a browser without having to download stuff.
As for your AV problem, I suggest you find out what your AV software does (or will do) regarding BO2K. I think nothing is appropriate. This is a tool, and anybody who is scared of it is, well, not very computer-literate. According to the site, there is no known way to detect it running on a remote machine. That's a good thing. There's obviously no backdoor, or we'd all know about it now.
Any AV company who discriminates against BO2K needs a stern talking to. Imagine if AV software automatically deleted Linux partitions from your HD. It's a similar situation, discriminating against OSS alternatives to proprietary software. On my computer at school, the previous user turned on the AV features and password protected it (I would have fixed that, but I haven't rebooted it in months, and don't care to). It detects in the boot sector, oh my god, a VIRUS!!! Sorry, only LILO. Imagine the new user who installs Linux only to get this message, thinking it's real.
That can't be good.
there already is! (Score:2)
The appearance of a trojan is nil, as everyone could see the backdoor in plain view, and close it, and then flame the heck out of whoever tried to put it in.
Security by Obscurity does not work. Just look at NT... or MacOS-X...
What they really mean... (Score:3)
Is the bo2k open source? Apparently. Will that help it's proliferation? Probably, although as far as I have read it is made to be particularly evasive in the first place. Does this have any relevance to the common usage of the term "open source" and the people who will be drawn to read the article based upon it's use of this term? Of course not.
To make matters worse, and to muddy the waters to a point obvious to anyone reading the proliferation of comments on this topic, this article refers to bo2k as a trojan horse. This is completely and totally untrue and misleading. A trojan horse is a program that imbeds itself in another, allowing itself to be executed (usually unnoticed) when the enclosing program is run. Such a practice is devious and obviously viral and totally unlike this program.
Back Orifice's server is an executable program that runs in and of itself. It does so very quietly and (due to, in my opinion, an oversite on Microsoft's development) is difficult to detect. It is a server program, an application, and in no way a trojan horse.
The reason this has muddied the waters, at least at slashdot, is that the image of a trojan horse in open source software (in other words, offending source code placed unnoticed in trusted source code) provokes most open source advocates to bring up the issue of peer review's ability to eliminate such 'trojan horses.' These arguments, though accurate, are completely irrelevant when one considers that there are not trojan horses (either in source code or executable form) involved.
But the article did what was intended: It provoked many of us to read it that would not have otherwise. Congrats.
Oh, and as a side not: I have seen it mentioned many times that Back Orifice exploits security risks in Windows operating systems. Basically, this is untrue. I am not a Microsoft fan by any stretch of the term, but I find it hard to fathom people considering a server program, run with the equivelant of root privilages, as exploiting security risks if it can actually control a system. Telnetting (or more wisely ssh'ing) in to a unix box of any variety that I know and su -'ing allows anyone with knowledge of the root password the ability to control basically any aspect of the system in question. The two security holes that this exploits are the inadequate task management of Windows OS's and the overuse of administration-level accounts in doing user-level operations. Oh, and the execution of untrustworthy applications, which can not (except perhaps in the case of macros) be blamed on MS.
Security through obscurity... (Score:2)
Yes, OSS makes it easy for disgruntled people to get trojan code into a program, but there are several ways to deal with this.
Deepak Saxena
Project Director, Linux Demo Day '99
Thompson's trojan virus, and why not to sweat it. (Score:3)
- If the compiler recongized that it was compiling the login program, it expanded a canned macro that added a trapdoor - a canned login and password that gave root access.
- If the compiler recognized that it was compiling itself, it expanded a canned macro that added the recognize-and-expand-canned-macros code, along with the macros, to the new copy of the compiler.
You only have to compile this in once, after which you can throw out the patch and it propagates to later versions of the compiler. BUT:
- It only lives in compilers.
- It only works as long as they're being compiled by themselves, in a never-ending stream. It will NOT propagate to a new compiler implementation, such as making the hop from PCC to gnu, or being installed in a new version of PCC that was compiled by gnu rather than PCC. (In principle you could build one that recognized TWO or more compilers and could hop back and forth, though that makes it twice as fragile.)
- It will die as soon as a change to the compiler source renders the signature unrecognizable.
- Even if it is alive, it stops inserting trapdoors once the signature of the target program changes.
Rumor has it that this was actually propagated in the Portable C Compiler {PCC}, and was discovered and cleaned out when the guys at Berkeley wrote strings, and wondered why the compiler had the string "login".
Note that this is MUCH easier to do with a proprietary compiler than an open one. Gcc, for instance, is shipped in source, with a build file that lets it be built by just about any C compiler, not just an older gcc. Even if a Thompson trojan virus existed for gcc, it isn't inserted when you compile with another compiler, producing a clean gcc that only has what its own source implies and only emits what the target's source implies. (It's almost as if NONinfection was infectious.)
So even a security paranoid like myself isn't worried about trojans that aren't there to be spotted in the open source.
Re:FUD? (Score:2)
It seems to me the term was brought into more common usage by the Halloween documents (they`re no longer posted anywhere i can find them).
Re:The real Trojan Horse (Score:2)
1) Get your kernel from one of the standard sources, i.e. kernel.org or a mirror.
2) Verify the PGP signature.
Then, at least, you know you are running a real release, the same one hundreds of thousands of other people are running, and not one that someone has subsequently hacked.
The other question is: How do we know the real release wasn't hacked? Short of looking yourself, there are many other people using the same code, including developers, and also people who analyze the patches to summarize changes. Even if a trojan patch did slip Linus' attention, it would be discovered very quickly and removed quicker.
(And yeah, it's the Greeks, but which ones? The Trojans were Greek too, weren't they?)
The real Trojan Horse (Score:4)
The lesson: Look inside the friggin' horse, you stupid idiots! And THAT is something you can do with open source that you cannot do with closed, proprietary software.
Re:Compeletely the opposite... (Score:2)
98% of the world's computer users are 'dumb enough' to use software they didn't compile themselves, from source code they personally reviewed. Actually that should be 99.99% of the world, since there isn't anybody here reading this message who has read every bit of source code for every thing s/he runs.
Open Source turns it into a "local" problem rather than a 'big scale' problem as is the case when unfriendly code is widely distributed in closed source software.
"Peer review" doesn't solve anything if Hacker X at Podunk Corporation slips an exploit into the payroll machine.
It's a far more complex issue than many people in this discussion thread seem ready to recognize.