1 Open Source Software (OSS) and Security David A. Wheeler March 15, 2004 This presentation contains the views of the author and does not indicate endorsement.

Slides:



Advertisements
Similar presentations
The Web Wizards Guide to Freeware/Shareware Chapter Six Open Source Software.
Advertisements

Free Beer and Free Speech Thomas Krichel
Carlo Tarantola Senior Director EMEA Mobile and Wireless Center of Expertise Warsaw, Poland Oracle Corporation.
Open Source Answer to Critical Infrastructure Security Challenges Vadim Shchepinov, Chief Executive Officer RED SOFT CORPORATION.
Copyright © 2014 Pearson Education, Inc. 1 Managers from across organizations are involved in developing and acquiring information systems Chapter 5 -
Lecture 2 Page 1 CS 236, Spring 2008 Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
1 Open Source Software (OSS) David A. Wheeler March 12, 2007 This presentation contains the views of the author and does not indicate endorsement by IDA,
Open Source/Free Software Source code is available Extensible Can be changed, modified Freely distributed Copies Modified versions Alternatives to commercial/proprietary.
Open Source WGISS 39. Definition of Open Source Software (OSS)  Open source or open source software (OSS) is any computer software distributed under.
Key Issues in Licensing Software and Associated Intellectual Property: Matching Licensing Models to Business Strategies Steve Mutkoski Regional Director,
Open-Source Software ISYS 475.
Security Comparisons of Open Source and Closed Source Programs Katherine Wright.
COMP 6005 An Introduction To Computing Session Two: Computer Software Acquiring Software.
Linux Introduction. Overview What is Unix/Linux? History of Linux Features Supported Under Linux The future of Linux.
AN INTRODUCTION TO LINUX OPERATING SYSTEM Zihui Han.
Sl.NoUnitContents 1.Unit - 1 What is Open Source?, Why Open Source? 2Unit – 2 What is Open Standard? - Why Open Standards? 3Unit – 3 Peek into history.
CHAPTER 6 OPEN SOURCE SOFTWARE AND FREE SOFTWARE
 Open-source software ( OSS ) is computer software that is available in source code form: the source code and certain other rights normally reserved.
Open Source: It's Already Here Dave Cross Magnum Solutions Ltd
Is Open Source Software a viable option for private and public organizations? Anthony W. Hamann Tuesday, March 21, 2006.
IBM Governmental Programs Open Computing, Open Standards and Open Source Recommendation for Governments.
Computers and Society Examine the extent to which Richard Stallman’s GNU manifesto has succeeded in challenging the dominance of conventionally distributed.
Open Source Software An Introduction. The Creation of Software l As you know, programmers create the software that we use l What you may not understand.
Overview of Linux Dr. Michael L. Collard 1.
Operating Systems AOIT Principles of Information Technology.
Presented By: Avijit Gupta V. SaiSantosh.
A Comparison of Linux vs. Windows Bhargav A. Sorathiya B.E. 4 th C.E. Roll no:6456.
Open Source Software Bangladesh University of Business and Technology Nizar Saadi Dahir M.Sc. Computer Engineering Computer Center- Kufa University
OPEN SOURCE AND FREE SOFTWARE. What is open source software? What is free software? What is the difference between the two? How the two differs from shareware?
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
David Cheung, CECID/HKU 1 Open Source Software and It’s Impact to Technology Development Dr. David Wai-lok Cheung ( 張偉犖博士 ) Director Center for E-Commerce.
1 CS 501 Spring 2003 CS 501: Software Engineering Lecture 7 Business Aspects of Software Engineering.
Open Source In the DoD Dawn Meyerriecks Chief Technology Officer Defense Information Systems Agency (703) ,
IT320 OPERATING SYSTEM CONCEPTS Unit 3: Welcome to Linux June 2011 Kaplan University 1.
Free and Open Source Software Aruna Lorensuhewa Contact Details:
IT320 OPERATING SYSTEM CONCEPTS Unit 3: Welcome to Linux September 2012 Kaplan University 1.
Improving Security through Software Dr Warren Toomey School of Computer Science Australian Defence Force Academy.
What and Why Open Source Tony Stanco, Esq. Director The Center of Open Source & Government Associate Director Cyberspace.
The UNIX Time-sharing system
Made By: Micheal Mouner Linux VS Windows. Agenda.
5 ٥ V new position ? 10 ^1 10 ^2 10 ^ : : : : 99.
Corporate Citizenship policy of Software Companies.
1 Free-Libre / Open Source Software (FLOSS) and Software Assurance / Software Security David A. Wheeler December 11, 2006 This presentation contains the.
보안 취약점 비교 Linux vs. Windows
Henry Briggs Open Source Software Diffusion and Integration of Technology in Education EDUC /EDUC Dr. D. Thornburg Walden University 07/08/09,
Enterprise Linux Servers Solution Overview Kerry Kim Enterprise Linux Servers Solution Manager.
1 January 14, Evaluating Open Source Software William Cohen NCSU CSC 591W January 14, 2008 Based on David Wheeler, “How to Evaluate Open Source.
Open Source Principles & Practices
Open source development model and methodologies.
CII badging program for ONAP ONAP security committee Stephen Terrill
What is F/LOSS? By Scot Henderson.
Open Source Software & Security – an Introduction
LINUX History In 1984 a project was launched by Richard Stallman to develop a complete Unix-like operating system that would be considered free software.
OPEN SOURCE.
open source and free software Najeeb Ullah Student ID
Open Source Software An innovation for teaching and learning with the use of technology.
Open Source Software (OSS) and Software Assurance
Open Source Software An innovation for teaching and learning with the use of technology.
OPEN SOURCE.
LINUX WINDOWS Vs..
Selected topic in computer science (1)
Key Issues in Licensing Software and Associated Intellectual Property: Matching Licensing Models to Business Strategies Steve Mutkoski Regional Director,
OPEN SOURCE SOLUTION FOR e-GOVERNANCE
OPEN SOURCE BY :.
LINUX WINDOWS Vs..
DHCP, DNS, Client Connection, Assignment 1 1.3
Open Source Share, and be rewarded tenfold ….
Chapter 7 – and 8 pp 155 – 202 of Web security by Lincoln D. Stein
O.S. Security.
Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Presentation transcript:

1 Open Source Software (OSS) and Security David A. Wheeler March 15, 2004 This presentation contains the views of the author and does not indicate endorsement by IDA, the U.S. government, or the U.S. Department of Defense.

2 Outline Extreme claims Open design: A security fundamental Problems with hiding source & vulnerability secrecy Proprietary advantages… not necessarily Common criteria evaluation challenges OSS bottom line

3 Extreme claims – “OSS is always more secure” – “Proprietary is always more secure” Reality: Neither OSS nor proprietary always better

4 Open design: A security fundamental Saltzer & Schroeder [1974/1975] - Open design principle OSS better fulfills this principle Security experts perceive OSS advantage – Bruce Schneier, Vincent Rijmen (AES), Whitfield Diffie,...

5 Problems with hiding source & vulnerability secrecy Hiding source doesn’t halt attacks – Dynamic attacks – Static attacks (binaries, disassemblers, decompilers) – Can’t keep source secret – Inhibits help Vulnerability secrecy doesn’t halt attacks – Rediscovery – Days works, not years

6 Proprietary advantages… not necessarily Experienced developers who understand security produce better results Proprietary developers higher quality? No guarantee OSS is widely reviewed

7 Common Criteria and OSS Common Criteria (CC) can be used on OSS CC matches OSS imperfectly Government policies discriminate against OSS

8 OSS bottom line OSS security preconditions – Developers/reviewers need security knowledge Knowledge more important than licensing – People have to actually review the code – Problems must be fixed OSS: less secure, later more secure (~yr) Neither OSS nor proprietary always better

9 Detailed Slides

10 Outline Extreme claims Open design: A security fundamental Problems with hiding source & vulnerability secrecy Proprietary advantages… maybe Common criteria evaluation challenges OSS bottom line

11 Extreme claims – “OSS is always more secure” – “Proprietary is always more secure” Reality: Neither OSS nor proprietary always better

12 Open design: A security fundamental Saltzer & Schroeder [1974/1975] - Open design principle – the protection mechanism must not depend on attacker ignorance OSS better fulfills this principle Security experts perceive OSS advantage – Bruce Schneier: “demand OSS for anything related to security” – Vincent Rijmen (AES): “forces people to write more clear code & adhere to standards” – Whitfield Diffie: “it’s simply unrealistic to depend on secrecy for security”

13 Problems with hiding source & vulnerability secrecy Hiding source doesn’t halt attacks – Dynamic attacks don’t need source or binary – Static attacks can use pattern-matches against binaries, disassembled & decompiled results – Presumes you can keep source secret Attackers may extract or legitimately get it – Secrecy inhibits those who wish to help, while not preventing attackers Vulnerability secrecy doesn’t halt attacks – Vulnerabilities are a time bomb and are likely to be rediscovered by attackers – Brief secrecy works (10-30 days), not years

14 Proprietary advantages… not necessarily Experienced developers who understand security produce better results – Experience & knowledge are critical, but... – OSS developers often very experienced & knowledgeable too (BCG study: average 11yrs experience, 30 yrs old) Proprietary developers higher quality? – Dubious; OSS often higher reliability – Market rush impairs proprietary quality No guarantee OSS is widely reviewed – True! & unreviewed OSS may be very insecure – Also true for proprietary (rarely reviewed!)

15 Common Criteria and OSS Common Criteria (CC) can be used on OSS – Red Hat Linux, SuSE Linux (FIPS 140-2: OpenSSL) CC matches OSS imperfectly – CC developed before rise of OSS – Doesn’t credit mass peer review or detailed code review – Requires mass creation of documentation not normally used in OSS development Government policies discriminate against OSS – Presume that vendor will pay hundreds of thousands or millions for a CC evaluation (“big company” funding) Presumes nearly all small business & OSS insecure – Presume that “without CC evaluation, it’s not secure” – Need to fix policies to meet real goal: secure software Government-funded evaluation for free use/support? Multi-Government funding? Alternative evaluation processes?

16 OSS bottom line OSS security preconditions – Developers/reviewers need security knowledge Knowledge more important than licensing – People have to actually review the code Reduced likelihood if niche/rarely-used, few developers, rare computer language, not really OSS More contributors, more review – Problems must be fixed OSS: less secure, later more secure (~yr) – Borland InterBase/Firebird (user: politically) Neither OSS nor proprietary always better

17 Backup Slides

18 Basics of Open Source Software (OSS) / Free Software (FS) Open Source Software / Free Software (OSS/FS) programs have licenses giving users the freedom: – to run the program for any purpose, – to study and modify the program, and – to freely redistribute copies of either the original or modified program (without royalties, etc.) Not non-commercial, not necessarily free-of- charge – Often supported via commercial companies Synonyms: Libre software, FLOS software (FLOSS) Antonyms: proprietary software, closed software

19 Extreme claims (and counterexamples) “OSS is always more secure” – Counterexample: Sendmail “Proprietary is always more secure” – Counterexample: Windows & IIS – Vulnerabilities: Apache 0, IIS 8 over 3yrs – J.S. Wurzler hacker insurance costs 5-15% more for Windows than for Unix or Linux – Windows websites more vulnerable 17% (GNU/Linux)66% (Windows)Defaced 66.75% (Apache)24.81% (IIS)Deployed websites (by name) 29.6% (GNU/Linux)49.6% (Windows)Deployed Systems OSS/FSProprietaryCategory

20 Reliability Fuzz studies found OSS/FS apps significantly more reliable [U Wisconsin] – Proprietary Unix failure rate: 28%,23% – OSS/FS: Slackware Linux 9%, GNU utilities 6% – Windows: 100%; 45% if forbid certain Win32 message formats GNU/Linux vs. Windows NT 10 mo study [ZDNet] – NT crashed every 6 weeks; both GNU/Linuxes, never IIS web servers >2x downtime of Apache [Syscontrol AG] Linux kernel TCP/IP had smaller defect density [Reasoning]

21 OSS/FS Development Model Developer Trusted Developer OSS/FS users typically use software without paying licensing fees OSS/FS users typically pay for training & support (competed) OSS/FS users are responsible for developing new improvements & any evaluations that they need; often cooperate/pay others to do so Trusted Repository Distributor User Source Code  Bug Reports Improvements (as source code) and evaluation results: User as Developer “Stone soup development”

22 Acronyms COTS: Commercial Off-the-Shelf (either proprietary or OSS) DoD: Department of Defense HP: Hewlitt-Packard Corporation JTA: Joint Technical Architecture (list of standards for the DoD); being renamed to DISR OSDL: Open Source Development Labs OSS: Open Source Software RFP: Request for Proposal RH: Red Hat, Inc. U.S.: United States Trademarks belong to the trademark holder.

23 Interesting Documents/Sites “Why OSS/FS? Look at the Numbers!” “Use of Free and Open Source Software in the US Dept. of Defense” (MITRE, sponsored by DISA) President's Information Technology Advisory Committee (PITAC) -- Panel on Open Source Software for High End Computing, October 2000 “Open Source Software (OSS) in the DoD,” DoD memo signed by John P. Stenbit (DoD CIO), May 28, 2003 Center of Open Source and Government (EgovOS) OpenSector.org Open Source and Industry Alliance Open Source Initiative Free Software Foundation OSS/FS References