On November 10, 2005 3:12 AM Andrey G. Grozin
> 
> On Wed, 9 Nov 2005, C Y wrote:
> > Years ago Ken Thompson proposed a diabolical attack on a 
> > computer that could be made by putting a trap door in a
> > compiler, which would automatically build it into all software
> > and subsequent versions of itself, undetectibly.  (I think this
> > is the article: http://www.acm.org/classics/sep95/) That kind
> > of thing makes people (especially open source folk, I think)
> > suspect all binaries, and for good reason.

It must be the approaching Winter season or maybe it is this pain
in my back that wont go away anymore, but I seem to be disagreeing
with almost everyone here lately... :(

I believe that such an attack is technically possible, but I 
disagree strongly that therefore there is a good reason to suspect
all binaries. Modern network computing (like life in general) is
a social phenomenon. In social interactions it is extremely
important that one establish relationships based on trust. It is
only by trusting others that is possible to build a co-operative
collaborative environment that is more than the sum of it's parts.
Given the aggressive and competitive nature of people, companies
and governments, no doubt this might seem a little naïve to some
people, but trust me, it is not ... :)

The implementation of trusted computing on the Internet is
already quite well advanced. Many binary programs are available
with electronic signatures that guarantee authenticity and
origin. Yes, any system (at least those in common use now) can
be broken, but we trust these people, e.g. the GNU free software
foundation, or for that matter even the Axiom developers, not to
behave in a malicious manner. No matter what we do technically,
in the end security always comes down to trusted relationships,
from computer to computer, computer to human, and human to human.

> Yes. I dislike having any binaries in my system I have not
> compiled myself. Therefore, I use Gentoo (installed from stage
> 1, so I recompiled gcc too). Of course, this does not help
> against the Thompson's attack.

By arguing in favour of bootstrapping, I am certainly *not* arguing
against the idea of compiling as much open source software from
source as possible - from the kernel up. I think that such an
approach does effectively deter Thompson's attack (but not prevent)
because at least in principle the possibility of comparing the
source to the generated binary does exist.

> 
> > Not in light of things like Ken Thompson's proposed attack. 
> > Security people may be paranoid, but on the internet paranoia
> > is a virtue.

No. Paranoia is a disease, like depression. It is a social/medical
condition that needs to be treated.

Security is another thing all together. It consists of using the
right technology, having a clear understanding of the way the
system works, and establishing trusted relationships. Security
is not a matter of hiding knowledge and hording control.

> As one of my colleges said,
> 
> For a sysadmin, the absence of paranoia is called professional 
> incompetence.
>

I think your colleague does not have a clear understanding of
security.
 
> Sorry for off-topic.
>
 
Andrey, I think that although this might be a side-issue, it
is not really off-topic since as open source developers we do
distribute both binaries and source code for Axiom. And I
think we should take some steps that we are not taking now to
help ensure that what we distribute is trusted by Axiom users.

Regards,
Bill Page.




_______________________________________________
Axiom-developer mailing list
Axiom-developer@nongnu.org
http://lists.nongnu.org/mailman/listinfo/axiom-developer

Reply via email to