Slashdot article on MITRE open source software
Bill Horne
bill at horne.net
Fri Nov 29 18:03:47 EST 2002
----- Original Message -----
From: "John Abreau" <jabr at abreau.net>
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> Content-Type: text/plain; charset=us-ascii
>
> John Chambers <jc at trillian.mit.edu> writes:
>
> > Then, of course, there's Ken Thompson's famous "Reflections on
> > Trusting Trust" paper, in which he explains how to install a backdoor
> > in a program in such a way that it doesn't appear anywhere in the
> > source, but is inserted in the binary by the compiler. Also, the
> > insertion code doesn't appear in the compiler source, but is in the
> > binary version of the compiler, even after you recompile it.
>
> I remember reading that paper back in college. I responded at the time
> that if you write your own bootstrap compiler to compile the "real"
> compiler's source, you'll then have a binary of the "real" compiler
> that doesn't contain the insertion code.
>
> Today I would add to the rebuttal an assertion that the premise assumes
> a bug-free instance of the insertion code, and one that can successfully
> anticipate any future enhancements and other modifications to the compiler
> source code. I'd even speculate that such an ability might require an
> AI of nearly human-level intelligence, and I doubt such a thing would be
> small enough to insert unnoticed into the newly compiled compiler binary.
Isn't it an academic problem? The invention of public key cryptography, and
the verification checksums it supports, should obviate this.
Bill
More information about the Discuss
mailing list