Close
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    Source Code Leak Offers Novel Security Test

    By
    Larry Seltzer
    -
    February 13, 2004
    Share
    Facebook
    Twitter
    Linkedin

      A frequent pitch of the open-source movement—bordering on a cliche—is that closed-source companies, most famously Microsoft, are wrong in thinking that the unavailability of their source code will enhance the security of the product.

      The open-source advocates belittle this attitude as “security through obscurity,” and insist that the holes in the products will come out anyway. Quite the contrary, the theory goes, the more secure product is the open-source one, which will be examined by anyone who cares to, looking to improve it.

      Is this idea true? We may soon find out, thanks to the leak of parts of Windows NT4 and Windows 2000 to the Internet.

      All day Ive been receiving analyst predictions that the release of this code will result in a large increase in the number of exploits of Windows in the wild. This prediction is an expression of utter faith in the idea of security through obscurity. If there was no security value in obscurity, then there should be no security to lose in the release of the source code.

      Remember, we are talking about a code base of portions of two products several years old. According to Russ Cooper, Editor of the famous NTBugTraq mailing list, the NT4 source is from NT4 Service Pack 3, without the Internet Information Server and includes Internet Explorer 4.0.

      The Windows 2000 code is a very small subset of Windows 2000 Service Pack 1. It includes Internet Explorer 5, Simple Network Management Protocol, Public Key Infrastructure, networking and some SDK code, along—strangely—with a large collection of empty mail messages.

      Cooper said he would be very surprised if this leak results in any significant new risk. “Given how hard people have pounded away at the binaries in the past, pouring over 55,000 source file to find something new in old versions will likely, hopefully, be a very unfulfilling task.”

      I have to agree with Cooper, although we are both guessing to a point.

      First, anyone running a system with these particular builds of Windows will already be at substantial risk of attack from known problems that were discovered without the aid of source code, so its reasonable to assume that there are few such users out there to attack.

      The question then becomes how much of the code in todays more-common configurations is common with the source code that was leaked? In other words, how many attacks can be built for todays systems out of the source from 3.5 years ago and longer?

      If there are still meaningful attacks to wring out of the code, it will only be because there is security value in obscurity. Black hats and white hats have been throwing their worst at this code for many years now, and if an attack of significance comes out of this code leak I think it just goes to show that source code matters.

      When you consider the number of institutions with licenses for Windows source code, its amazing that it took so long for this to happen. These licenses go a long way back too, and the program has been growing.

      Given that non-disclosure agreements and other legal obligations are an important tool of closed source, Id say it speaks well of the practice that it took so long for this kind of incident to occur.

      Another recent analysis claimed that this incident is like capturing a Russian fighter from the 1950s. Now, that may be an exaggeration, but it makes the point that a lot of the leaked code is obsolete already.

      But the fear and excitement over all the presumed attacks to come against Windows—depending on who you were listening to—at heart betrays a lack of confidence in the derision of “security through obscurity.”

      Theres no middle ground here, either closed source is more secure for being closed, or it isnt. While I tend to think it is, we may learn for certain now.

      Security Center Editor Larry Seltzer has worked in and written about the computer industry since 1983. Be sure to check out eWEEK.coms Security Center at http://security.eweek.com for the latest security news, views and analysis.

      More from Larry Seltzer

      Larry Seltzer
      Larry Seltzer has been writing software for and English about computers ever since—,much to his own amazement—,he graduated from the University of Pennsylvania in 1983.He was one of the authors of NPL and NPL-R, fourth-generation languages for microcomputers by the now-defunct DeskTop Software Corporation. (Larry is sad to find absolutely no hits on any of these +products on Google.) His work at Desktop Software included programming the UCSD p-System, a virtual machine-based operating system with portable binaries that pre-dated Java by more than 10 years.For several years, he wrote corporate software for Mathematica Policy Research (they're still in business!) and Chase Econometrics (not so lucky) before being forcibly thrown into the consulting market. He bummed around the Philadelphia consulting and contract-programming scenes for a year or two before taking a job at NSTL (National Software Testing Labs) developing product tests and managing contract testing for the computer industry, governments and publication.In 1991 Larry moved to Massachusetts to become Technical Director of PC Week Labs (now eWeek Labs). He moved within Ziff Davis to New York in 1994 to run testing at Windows Sources. In 1995, he became Technical Director for Internet product testing at PC Magazine and stayed there till 1998.Since then, he has been writing for numerous other publications, including Fortune Small Business, Windows 2000 Magazine (now Windows and .NET Magazine), ZDNet and Sam Whitmore's Media Survey.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.

      MOST POPULAR ARTICLES

      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Applications

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      IT Management

      Intuit’s Nhung Ho on AI for the...

      James Maguire - May 13, 2022 0
      I spoke with Nhung Ho, Vice President of AI at Intuit, about adoption of AI in the small and medium-sized business market, and how...
      Read more
      Applications

      Kyndryl’s Nicolas Sekkaki on Handling AI and...

      James Maguire - November 9, 2022 0
      I spoke with Nicolas Sekkaki, Group Practice Leader for Applications, Data and AI at Kyndryl, about how companies can boost both their AI and...
      Read more
      Cloud

      IGEL CEO Jed Ayres on Edge and...

      James Maguire - June 14, 2022 0
      I spoke with Jed Ayres, CEO of IGEL, about the endpoint sector, and an open source OS for the cloud; we also spoke about...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2022 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×