Slashdot article on MITRE open source software

Bill Horne bill at horne.net
Fri Nov 29 18:03:47 EST 2002


----- Original Message -----
From: "John Abreau" <jabr at abreau.net>


> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> Content-Type: text/plain; charset=us-ascii
>
> John Chambers <jc at trillian.mit.edu> writes:
>
> > Then, of  course,  there's  Ken  Thompson's  famous  "Reflections  on
> > Trusting Trust" paper, in which he explains how to install a backdoor
> > in a program in such a way that it doesn't  appear  anywhere  in  the
> > source,  but  is  inserted  in the binary by the compiler.  Also, the
> > insertion code doesn't appear in the compiler source, but is  in  the
> > binary version of the compiler, even after you recompile it.
>
> I remember reading that paper back in college. I responded at the time
> that if you write your own bootstrap compiler to compile the "real"
> compiler's source, you'll then have a binary of the "real" compiler
> that doesn't contain the insertion code.
>
> Today I would add to the rebuttal an assertion that the premise assumes
> a bug-free instance of the insertion code, and one that can successfully
> anticipate any future enhancements and other modifications to the compiler
> source code. I'd even speculate that such an ability might require an
> AI of nearly human-level intelligence, and I doubt such a thing would be
> small enough to insert unnoticed into the newly compiled compiler binary.

Isn't it an academic problem? The invention of public key cryptography, and
the verification checksums it supports, should obviate this.

Bill




More information about the Discuss mailing list