[Discuss] Good and Bad Crypto
Richard Pieri
richard.pieri at gmail.com
Tue Apr 22 10:42:05 EDT 2014
Tom Metro wrote:
> Steve Gibson discusses the timeline of the Heartbleed discovery. Google
> researchers, presumably examining the code, found the problem several
> weeks prior, and submitted patches to OpenSSL and fixed their own servers.
I choose not to make such assumptions. Google's methodology has not to
my knowledge been publicized.
> (Sometimes I wonder why you subscribe to this list. Having a skeptical
> view of things is good, but you seem to take glee in perceived failings
> of the open source community, which tends to raise the questions of why
I use tools that work. Some of them are open. Some not. I'm not going to
heap praise on something that doesn't work, or works poorly, simply
because it's open source. And I'm not afraid to speak my mind about
these things.
> Source code analysis has the potential to find these, if the code is
> analyzed. Back-box testing will find them only if you are very lucky.
This is laughably false. If it were even the least bit true then
Microsoft Windows would be the most secure operating system on Earth
because the code isn't available for scrutiny.
We all know that hiding the code isn't any assurance of security. What
you need to get through your head is that displaying the code isn't any
assurance of security, either. Seeing the source code means nothing if
you don't understand it and the algorithms it implements. This works
both ways: you don't need to understand the intricacies of a cipher or
PRNG in order to attack it.
--
Rich P.
More information about the Discuss
mailing list