Skip to comments.
Closed Source -- Who Dares Call It Treason?
Armed and Dangerous weblong ^
| 5/22/02
| Eric S. Raymond
Posted on 05/22/2002 6:49:45 AM PDT by NativeNewYorker
click here to read article
Navigation: use the links below to view more comments.
first 1-20, 21-33 next last
ESR writes great stuff. Highly recommended for all FReepers' daily reading bookmark list.
To: NativeNewYorker
Microsoft executive Jim Allchin has admitted that some code critical to the security of Microsoft products is so flawed it could not be safely disclosed to other developers or the public. When I first heard of this, I thought of this story from Sep 3, 1999.
Andrew Fernandes of Cryptonym in Mississauga, Ontario, has investigated Microsoft's "CryptoAPI" architecture for security flaws, and found that in WindowsNT4's Service Pack 5, the company neglected to remove annotations identifying the security components, according to a Cryptonym statement. Apparently there are two keys used by Windows, one of which belongs to Microsoft and allows the secure loading of encryption services, but the second was annotated in the code with the letters NSA. Fernandes' investigation was building on the work of encryption experts Nicko van Someren and Adi Shamir, according to the company statement. The holder of the second key, if it is indeed the NSA (the acronym by which the National Security Agency is often referred), could easily load unauthorized security services on any copy of Microsoft Windows, according to Cryptonym.
Although in fairness, maybe MS' code just sucks and there is no nafarious plot :)
2
posted on
05/22/2002 6:57:33 AM PDT
by
Lorenb420
To: NativeNewYorker
I hate the cr@p that MS produces, but this is over the top. If there is a real risk, it is the responsibility of the purchasing agent to evaluate. Caveat emptor.
/john
To: NativeNewYorker
Microsoft executive Jim Allchin has admitted that some code critical to the security of Microsoft products is so flawed it could not be safely disclosed to other developers or the public. If you'd ever seen MS code, such as that in Windows CE, you'd understand why they want to keep it all secret from not only the public but developers as well. One word: pedestrian.
4
posted on
05/22/2002 7:01:04 AM PDT
by
GingisK
To: JRandomFreeper
If there is a real risk, it is the responsibility of the purchasing agent to evaluate. It is well-established law that the seller is responsible if he knows of a significant risk, conceals it from the buyer, and the buyer could not reasonably know the risk on his own. All three conditions would be met here (unless, of course, Allchin is perjuring himself).
5
posted on
05/22/2002 7:07:13 AM PDT
by
steve-b
To: steve-b
conceals it from the buyerM$'s flaws are glaring. No one needs to see the source code to know that. I won't employ M$ products in any mission critical positions within my business, so why should the government?
/john
Comment #7 Removed by Moderator
To: thecat2
A buggy, virus prone, closed source software monoculture is a big, fat target.
Comment #9 Removed by Moderator
To: thecat2
To: NativeNewYorker
to ALL: I personally use WinXP Pro and Win2K Pro in a multiboot environment. I have no issues with either. I am also not in a 'mission critical' situation, I simply make websites and graphics...and for that, XP is awesome. I run my own 3rd party firewall and don't click on stupid stuff. Common sense stuff.
My guess is, you are all running Linux or Unix to be able to rag MS as easily as you do? I've run 3 different flavors of Linux on my boxes in the last 3 years, and aside from all the manual configurations of hardware and protocols, etc, there are STILL no programs for Linux that I can use in my business.
One final thing... my WinXP and 2K are so stable, I have a hard time believing I'm using Windows, as I don't seem to have to reboot 10 times a day anymore (from using 9X), and when a program decides it's going to crash, it doesn't take the whole O/S with it anymore. There ARE no perfect Operating Systems, there NEVER will be. Period. So we just choose the system that works best for us. Maybe the gov. should consider NOT using MS if it's so bad, eh?
To: Still Using Air
I use W2K because my industry (finance) is standardized on the MS platform. I've toyed with SuSE/K desktop and loved it, but my sunk learning curve expense in MS is too great for me to migrate to an OS unsupported by my industry.
That said, if I were running a large commercial/govt enterprise where security and stability were central issues (as opposed to interoperability with 99% of my vendors) I'd choose Linux without a second thought.
Why the govt would use an insecure, unstable OS is beyond me.
Comment #13 Removed by Moderator
Comment #14 Removed by Moderator
To: NativeNewYorker
The military doesn't have to use Microsoft software. If you examine the software license (who really reads that in detail?), Microsoft covers the fitness issue to shield themselves from liability. Use of the software is at the end user's risk. Allchin is correct to point out that there is a security consequence to exposing the source code. It makes it much easier to find new ways to hack the software. The worms that exploit buffer overruns could never have been created without intimate knowledge of the software source code and the target CPU implementation. Cyber attack is a new front in military engagement. It is stupid to provide resources to our enemies. BTW, it cuts both ways. The bad boys are running pirated MS software too.
15
posted on
05/22/2002 8:26:34 AM PDT
by
Myrddin
To: thecat2
Comment #17 Removed by Moderator
Comment #18 Removed by Moderator
To: thecat2
The Univac 1100 series that I used at PacBell was operated in a military environment with a completely different set of microcode. Our staff cut their teeth on the AN/UYK-7. The support procedures were similar, but the machines were not object code compatible.
19
posted on
05/22/2002 5:28:14 PM PDT
by
Myrddin
Comment #20 Removed by Moderator
Navigation: use the links below to view more comments.
first 1-20, 21-33 next last
Disclaimer:
Opinions posted on Free Republic are those of the individual
posters and do not necessarily represent the opinion of Free Republic or its
management. All materials posted herein are protected by copyright law and the
exemption for fair use of copyrighted works.
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson