At 7:31 PM -0500 4/29/04, Tad Anhalt wrote:

<using Green Hills as an example>

>  How did they bootstrap their system?  In other words, how did they
>ensure that they could trust their entire tool chain in the first place?
> They hint that the whole system was written by a few trusted persons.

Begging the question "trusted by whom?".  Some organizations require
"trusted by the agency issuing security clearances" for certain
(primarily non-tool) software.

>Did they write the whole tool chain as well?  The scheme above protects
>against future attack, but not against something that was there before
>they started.  I'm sure that they have an answer for that question,
>it's a pretty obvious one to ask...  Maybe I missed it on my read-through?
>
>  That's the whole point of the Thompson lecture.  The hole is really
>deep.  How far can you afford to dig?  How do you decide what to trust?

Ideally, if you find you cannot afford to dig far enough to satisfy your
need, a revision of your business plan is required.

>  Green Hills Software obviously has a vested interest in convincing the
>reader that it's worth paying them whatever it is that they're charging
>for the extra depth...  In some situations, it may be...  That's a risk
>management decision.

And one solution acceptable in many conditions is determining whether
the vendor has deep enough pockets that a lawsuit after the fact would
mean something.  I don't know much about finance, but I know that suing
Green Hills software has more potential than suing the person from whom
you got a copy of Linux.

Not all checks and balances are embedded in the software itself.


Reply via email to