Slashdot article on MITRE open source software

John Chambers jc at trillian.mit.edu
Fri Nov 29 22:58:27 EST 2002


Bill writes:
| > John Chambers <jc at trillian.mit.edu> writes:
| > > Then, of  course,  there's  Ken  Thompson's  famous  "Reflections  on
| > > Trusting Trust" paper, in which he explains how to install a backdoor
| > > in a program in such a way that it doesn't  appear  anywhere  in  the
| > > source,  but  is  inserted  in the binary by the compiler.  Also, the
| > > insertion code doesn't appear in the compiler source, but is  in  the
| > > binary version of the compiler, even after you recompile it.
...
| Isn't it an academic problem? The invention of public key cryptography, and
| the verification checksums it supports, should obviate this.

Not likely in this case. Ken Thompson was the author of the
compiler, remember.  All the verification schemes can do is
warn you that someone has tampered with the code after  the
kit  was prepared.  If the tampering was done by the author
before building the kit, the  checksums  can  warn  you  if
someone  removes  the backdoor.  They can't do much to warn
you of things that the author included.




More information about the Discuss mailing list