SlideShare ist ein Scribd-Unternehmen logo
1 von 53
Downloaden Sie, um offline zu lesen
OPEN vs CLOSED: Which is more secure?
Yossi Hasson
http://twitter.com/yossihasson
yossih@synaq.com
OPEN
VS CLOSED
  WHICH IS
     MORE
   SECURE
The debate
I’m closed.
  I’m more
    secure
               Open is
                better!
5
Kerckhoff’s Principle




           “the system must not require secrecy
           and can be stolen by the enemy without
                      causing trouble.



                                               ”
                         - Auguste Kerckhoff, 1883
at SYNAQ
 we believe that good
OPEN SOURCE projects
lead to better software
  being developed and are
 therefore generally more
         secure
WHY
WHAT IS
  OPEN
SOURCE
Richard Stallman




 1983


  “   Free software' is a matter of liberty, not price.
To understand the concept, think of ‘free’ as in ‘free speech’


                                                         ”
                   not as in ‘free beer’
Linus Torvalds




                                           1991



“
Hello everybody out there using minix. I'm doing a (free)
      operating system (just a hobby, won't be big


                                                      ”
   and professional like gnu) for 386(486)AT clones.
Eric Raymond




   1998




“
People are imperfect. What we have learned through the ages, though,
    is that combining lots of people creates a better end result, ...
For some reason, we forgot that when it came to developing software.


                                                                   ”
OSS Definition
1.  Free Redistribution
2.  Source Code
3.  Derived Works
4.  Integrity of The Author’s Source Code
5.  No Discrimination Against Persons or Groups
6.  No Discrimination Against Fields of Endeavor
7.  Distribution of License
8.  License Must Not Be a Specific to a Product
9.  License Must Not Restrict Other Software
10. License Must Be Technology Neutral
Source: www.opensource.org
WHAT
     IS
CLOSED
SOURCE
Source code of the software is not
available, or the licensor does not
grant the freedoms to use, modify,
and distribute that are granted by
       free software licenses.



                             - Source: Wikipedia
“      Who can afford to do professional work for nothing?
      What hobbyist can put 3-man years into programming,
finding all bugs, documenting his product and distribute for free?
                                                    - Bill Gates, 1976
“
 There are fewer communists in the world today than there were.
    There are some new modern-day sort of communists
who want to get rid of the incentive for musicians and moviemakers
           and software makers under various guises.
       They don't think that those incentives should exist

                                                   - Bill Gates, 2005
“
Linux is a cancer that attaches itself in an intellectual
       property sense to everything it touches
                                    - Steve Ballmer, 2001
WHAT
PRIMARILY
   DRIVES
    BOTH
Closed Source
Open Source

 Status
 Contribution
 Social Capital
 Ideology
 In some cases:
  Making money
WHATS THIS
 GOT TO DO
      WITH
 SOFTWARE
  SECURITY
$
TIME
“
In an open source project, to make a mistake and have it
  known to the entire development community and your
 friends is mortifying to the extreme …. the last moment
before hitting the Enter key – to commit a change or send
  a patch out into the cold cruel world of your peers – is



                                                  ”
              the longest moment imaginable
    - Michael H. Warfield
    senior researcher Internet Security Systems
Factors to Consider

  Time to compromise
  Speed at which flaws are fixed
  Number of vulnerabilities
  Major virus outbreaks
  Trust
Time to Compromise

•  Time taken to compromise an un-patched
   Linux vs Windows XP machine




                VS
Time to Compromise

    Linux                                     Windows XP
   3 Months*                            4 Minutes (pre SP2)*
                                       18 Minutes (post SP2)**




                                                        WINNER
     Source:
     * Honeynet “Know Your Enemy: Trend Analysis” (2004)
     ** Symantec’s Internet Security Threat Report (2004)
Bugs
Bugs
Article “Apache avoids most security woes” found
Apache’s last serious security problem was
announced in January 1997

Article “IT bugs over IIS security” found Microsoft had
reported 21 security bulletins over the period - 8 of
which rated highly dangerous in comparison to 0
for Apache over the same period

Source:
eWeek &
www.dwheeler.com/oss_fs_why.html
Fixing Flaws
Fixing Flaws #1




     VS           VS
Fixing Flaws #1
           Vendor        Number Advisories   Average Time to
                                              Resolve After
                                               Discovery

                               31             11.2 days


                               61            16.1 days

                                8            89.5 days


Source: SecurityPortal
                                             WINNER
Fixing Flaws #2




             VS
Fixing Flaws #2


  The U.S. Department of Homeland Security’s Computer
  Emergency Readiness Team (CERT)
  recommended using browsers other than
  Microsoft Corp.’s Internet Explorer (IE) for security
  reasons. Microsoft had failed to patch a critical
  vulnerability for 9 months, and IE was being
  actively exploited in horrendous ways.
Source: US Department of Homeland Security, CERT
Fixing Flaws #2

                     Mozilla Firefox fixed its
 According to Symantec Corp.,
 vulnerabilities faster, and had fewer severe
 vulnerabilities than Internet Explorer




                                          WINNER
Source: Symantec, 2004
Fixing Flaws #3




             VS
Fixing Flaws #3
  eWeek Labs’ article “Open Source Quicker at Fixing Flaws” listed
                                        Serious flaw was
  specific examples of more rapid response.
  found in the Apache Web server; the Apache
  Software Foundation made a patch available two
  days after the Web server hole was announced.




                                                                WINNER
Source: eWeek, article: “Open Source Quicker at Fixing Flaws”
Virus Outbreaks




    Computer viruses are overwhelmingly more
   prevalent on Windows than any other system.
Virus Outbreaks




            VS
Virus Outbreaks #1

 Microsoft IIS features twice as often (49% vs.
 23%) as a malware distributing server.




                                              WINNER
Source: Google, Online Security Blog (2007)
Who to Trust?
Who to Trust? #1
European Parliament calls “on the Commission and Member States to
promote software projects whose source text is made
public (open-source software), as this is the only way of
guaranteeing that no backdoors are built into
programmes [and calls] on the Commission to lay down a standard
for the level of security of e-mail software packages,
placing those packages whose source code has not been
made public in the ‘least reliable’ category”
(5 September, 2001; 367 votes for, 159 against and 39 abstentions).


  Source: European Parliament A5-0264/2001
Who to Trust? #2


•  April 2000 discovery Frontpage contained a
   deliberate “backdoor”
•  Remained undetected for more than 4 years



 Source: TruSecure, Paper: Open Source Security
Who to Trust? #3


•  Some time between 1992 and 1994
•  “Back door” inserted in the DB server InterBase
•  Vulnerability stayed for 6 years
•  Borland released source code July 2000 as OSS/
   FS
•  Firebird launched
•  5 months later CERT identified the vulnerability
   and it was patched shortly after
Microsoft EULA - XP #4
Comparison EULA to GPL
                                                                       EULA   GPL
  Percentage of license which limits                                   45%    27%
  your rights
  Percentage of the license which                                      15%    51%
  extends your rights
  Percentage of license which limits                                   40%    22%
  your remedies




 Source: Cybersource, a comparison of the GPL and the Microsoft EULA
The Tally

Factor                  Open Source   Closed Source

Time to compromise           ✔             ✖
Number critical bugs         ✔             ✖
Speed at fixing flaws        ✔             ✖
Number of Viruses            ✔             ✖
Who to trust                 ✔             ✖
Conclusion
•  “Openness” of source code is 1 factor of
   many when considering security
•  Being open doesn’t automatically mean
   more secure
•  Underlying driving motives for open source
   can lead to better software development
•  History has shown that good open source
   projects tend to be more secure then their
   closed counterparts
•  It’s a question of who to put your trust in
Thank You
    &
Remember
References

•  Why open source? (David Wheeler)
•  IBM, The security implications of open
   source software
•  Open source versus closed source
   security (Jason Miller)
•  Open source security: A look at the
   security benefits of source code access
   (TruSecure)

     5
     2
Questions and Further Information
              yossih@synaq.com
                   011 262 3632

Weitere ähnliche Inhalte

Was ist angesagt?

Social & professional issues in IT
Social & professional issues in ITSocial & professional issues in IT
Social & professional issues in ITRohana K Amarakoon
 
Cyber Security Incident Response
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident ResponsePECB
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information SecurityDr. Loganathan R
 
Comparison of windows linux and mac os
Comparison of windows linux and mac osComparison of windows linux and mac os
Comparison of windows linux and mac osAli Zar
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewTandhy Simanjuntak
 
Information Assurance And Security - Chapter 3 - Lesson 1
Information Assurance And Security - Chapter 3 - Lesson 1Information Assurance And Security - Chapter 3 - Lesson 1
Information Assurance And Security - Chapter 3 - Lesson 1MLG College of Learning, Inc
 
Network security policies
Network security policiesNetwork security policies
Network security policiesUsman Mukhtar
 
Information Security It's All About Compliance
Information Security   It's All About ComplianceInformation Security   It's All About Compliance
Information Security It's All About ComplianceDinesh O Bareja
 
1-LESSON-SOCIAL AND PROFESSIONAL ISSUES.pptx
1-LESSON-SOCIAL AND PROFESSIONAL ISSUES.pptx1-LESSON-SOCIAL AND PROFESSIONAL ISSUES.pptx
1-LESSON-SOCIAL AND PROFESSIONAL ISSUES.pptxMarvenParay
 
Server configuration
Server configurationServer configuration
Server configurationAisha Talat
 

Was ist angesagt? (20)

Security policies
Security policiesSecurity policies
Security policies
 
Social & professional issues in IT
Social & professional issues in ITSocial & professional issues in IT
Social & professional issues in IT
 
Cyber Security Incident Response
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident Response
 
Ethics in-information-security
Ethics in-information-securityEthics in-information-security
Ethics in-information-security
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Data security
Data securityData security
Data security
 
Comparison of windows linux and mac os
Comparison of windows linux and mac osComparison of windows linux and mac os
Comparison of windows linux and mac os
 
Chapter 1_dp-pertemuan 1
 Chapter 1_dp-pertemuan 1 Chapter 1_dp-pertemuan 1
Chapter 1_dp-pertemuan 1
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An Overview
 
Information Assurance And Security - Chapter 3 - Lesson 1
Information Assurance And Security - Chapter 3 - Lesson 1Information Assurance And Security - Chapter 3 - Lesson 1
Information Assurance And Security - Chapter 3 - Lesson 1
 
Network security policies
Network security policiesNetwork security policies
Network security policies
 
System Administration
System AdministrationSystem Administration
System Administration
 
Information Security It's All About Compliance
Information Security   It's All About ComplianceInformation Security   It's All About Compliance
Information Security It's All About Compliance
 
Network monitoring tools
Network monitoring toolsNetwork monitoring tools
Network monitoring tools
 
File security system
File security systemFile security system
File security system
 
Chapter 5 - Identity Management
Chapter 5 - Identity ManagementChapter 5 - Identity Management
Chapter 5 - Identity Management
 
1-LESSON-SOCIAL AND PROFESSIONAL ISSUES.pptx
1-LESSON-SOCIAL AND PROFESSIONAL ISSUES.pptx1-LESSON-SOCIAL AND PROFESSIONAL ISSUES.pptx
1-LESSON-SOCIAL AND PROFESSIONAL ISSUES.pptx
 
Server configuration
Server configurationServer configuration
Server configuration
 
NTFS vs FAT
NTFS vs FATNTFS vs FAT
NTFS vs FAT
 
System Security Plans 101
System Security Plans 101System Security Plans 101
System Security Plans 101
 

Ähnlich wie OPEN vs CLOSED: Which is more secure for software development

Free Libre Open Source Software - Business aspects of software industry
Free Libre Open Source Software - Business aspects of software industryFree Libre Open Source Software - Business aspects of software industry
Free Libre Open Source Software - Business aspects of software industryFrederik Questier
 
Barcamp: Open Source and Security
Barcamp: Open Source and SecurityBarcamp: Open Source and Security
Barcamp: Open Source and SecurityJoshua L. Davis
 
Free Libre Open Source Software Development
Free Libre Open Source Software DevelopmentFree Libre Open Source Software Development
Free Libre Open Source Software DevelopmentFrederik Questier
 
Case study cybersecurity industry birth and growth
Case study cybersecurity industry birth and growth Case study cybersecurity industry birth and growth
Case study cybersecurity industry birth and growth Mamoon Ismail Khalid
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Virusesmkgspsu
 
Free Libre Open Source Software - Business Aspects of Software Industry
Free Libre Open Source Software - Business Aspects of Software IndustryFree Libre Open Source Software - Business Aspects of Software Industry
Free Libre Open Source Software - Business Aspects of Software IndustryFrederik Questier
 
Free & Open Source Software (2017 update)
Free & Open Source Software (2017 update)Free & Open Source Software (2017 update)
Free & Open Source Software (2017 update)Frederik Questier
 
Security by Weston Hecker
Security by Weston HeckerSecurity by Weston Hecker
Security by Weston HeckerEC-Council
 
Perspectives on Open
Perspectives on OpenPerspectives on Open
Perspectives on OpenTim O'Reilly
 
Security in the age of open source - Myths and misperceptions
Security in the age of open source - Myths and misperceptionsSecurity in the age of open source - Myths and misperceptions
Security in the age of open source - Myths and misperceptionsTim Mackey
 
GNU/Linux, Server Web, dan Keamanan
GNU/Linux, Server Web, dan KeamananGNU/Linux, Server Web, dan Keamanan
GNU/Linux, Server Web, dan KeamananIwan stwn
 
The Top 3 Strategies To Reduce Your Open Source Security Risks - A WhiteSour...
 The Top 3 Strategies To Reduce Your Open Source Security Risks - A WhiteSour... The Top 3 Strategies To Reduce Your Open Source Security Risks - A WhiteSour...
The Top 3 Strategies To Reduce Your Open Source Security Risks - A WhiteSour...WhiteSource
 
Open Source Issues and Trends
Open Source Issues and TrendsOpen Source Issues and Trends
Open Source Issues and TrendsNicole Baratta
 
Open Source Insight: NVD's New Look, Struts Vuln Ransomware & Google Open So...
Open Source Insight:  NVD's New Look, Struts Vuln Ransomware & Google Open So...Open Source Insight:  NVD's New Look, Struts Vuln Ransomware & Google Open So...
Open Source Insight: NVD's New Look, Struts Vuln Ransomware & Google Open So...Black Duck by Synopsys
 

Ähnlich wie OPEN vs CLOSED: Which is more secure for software development (20)

Free Libre Open Source Software - Business aspects of software industry
Free Libre Open Source Software - Business aspects of software industryFree Libre Open Source Software - Business aspects of software industry
Free Libre Open Source Software - Business aspects of software industry
 
FLOSS & OER
FLOSS & OERFLOSS & OER
FLOSS & OER
 
Barcamp: Open Source and Security
Barcamp: Open Source and SecurityBarcamp: Open Source and Security
Barcamp: Open Source and Security
 
Introduction To Open Source
Introduction To Open SourceIntroduction To Open Source
Introduction To Open Source
 
Free Libre Open Source Software Development
Free Libre Open Source Software DevelopmentFree Libre Open Source Software Development
Free Libre Open Source Software Development
 
Case study cybersecurity industry birth and growth
Case study cybersecurity industry birth and growth Case study cybersecurity industry birth and growth
Case study cybersecurity industry birth and growth
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Free Libre Open Source Software - Business Aspects of Software Industry
Free Libre Open Source Software - Business Aspects of Software IndustryFree Libre Open Source Software - Business Aspects of Software Industry
Free Libre Open Source Software - Business Aspects of Software Industry
 
Bulletproof IT Security
Bulletproof IT SecurityBulletproof IT Security
Bulletproof IT Security
 
FOSS and Security
FOSS and SecurityFOSS and Security
FOSS and Security
 
Free & Open Source Software (2017 update)
Free & Open Source Software (2017 update)Free & Open Source Software (2017 update)
Free & Open Source Software (2017 update)
 
Security by Weston Hecker
Security by Weston HeckerSecurity by Weston Hecker
Security by Weston Hecker
 
Perspectives on Open
Perspectives on OpenPerspectives on Open
Perspectives on Open
 
Security in the age of open source - Myths and misperceptions
Security in the age of open source - Myths and misperceptionsSecurity in the age of open source - Myths and misperceptions
Security in the age of open source - Myths and misperceptions
 
GNU/Linux, Server Web, dan Keamanan
GNU/Linux, Server Web, dan KeamananGNU/Linux, Server Web, dan Keamanan
GNU/Linux, Server Web, dan Keamanan
 
The Top 3 Strategies To Reduce Your Open Source Security Risks - A WhiteSour...
 The Top 3 Strategies To Reduce Your Open Source Security Risks - A WhiteSour... The Top 3 Strategies To Reduce Your Open Source Security Risks - A WhiteSour...
The Top 3 Strategies To Reduce Your Open Source Security Risks - A WhiteSour...
 
Open Source Issues and Trends
Open Source Issues and TrendsOpen Source Issues and Trends
Open Source Issues and Trends
 
Hacking 10 2010
Hacking 10 2010Hacking 10 2010
Hacking 10 2010
 
Open Source Insight: NVD's New Look, Struts Vuln Ransomware & Google Open So...
Open Source Insight:  NVD's New Look, Struts Vuln Ransomware & Google Open So...Open Source Insight:  NVD's New Look, Struts Vuln Ransomware & Google Open So...
Open Source Insight: NVD's New Look, Struts Vuln Ransomware & Google Open So...
 
Pak kiet presentation-24_mar_2005_7
Pak kiet presentation-24_mar_2005_7Pak kiet presentation-24_mar_2005_7
Pak kiet presentation-24_mar_2005_7
 

Kürzlich hochgeladen

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 

Kürzlich hochgeladen (20)

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 

OPEN vs CLOSED: Which is more secure for software development

  • 1. OPEN vs CLOSED: Which is more secure? Yossi Hasson http://twitter.com/yossihasson yossih@synaq.com
  • 2. OPEN VS CLOSED WHICH IS MORE SECURE
  • 3. The debate I’m closed. I’m more secure Open is better!
  • 4.
  • 5. 5
  • 6.
  • 7. Kerckhoff’s Principle “the system must not require secrecy and can be stolen by the enemy without causing trouble. ” - Auguste Kerckhoff, 1883
  • 8. at SYNAQ we believe that good OPEN SOURCE projects lead to better software being developed and are therefore generally more secure
  • 9. WHY
  • 10. WHAT IS OPEN SOURCE
  • 11. Richard Stallman 1983 “ Free software' is a matter of liberty, not price. To understand the concept, think of ‘free’ as in ‘free speech’ ” not as in ‘free beer’
  • 12. Linus Torvalds 1991 “ Hello everybody out there using minix. I'm doing a (free) operating system (just a hobby, won't be big ” and professional like gnu) for 386(486)AT clones.
  • 13. Eric Raymond 1998 “ People are imperfect. What we have learned through the ages, though, is that combining lots of people creates a better end result, ... For some reason, we forgot that when it came to developing software. ”
  • 14. OSS Definition 1.  Free Redistribution 2.  Source Code 3.  Derived Works 4.  Integrity of The Author’s Source Code 5.  No Discrimination Against Persons or Groups 6.  No Discrimination Against Fields of Endeavor 7.  Distribution of License 8.  License Must Not Be a Specific to a Product 9.  License Must Not Restrict Other Software 10. License Must Be Technology Neutral Source: www.opensource.org
  • 15. WHAT IS CLOSED SOURCE
  • 16. Source code of the software is not available, or the licensor does not grant the freedoms to use, modify, and distribute that are granted by free software licenses. - Source: Wikipedia
  • 17. Who can afford to do professional work for nothing? What hobbyist can put 3-man years into programming, finding all bugs, documenting his product and distribute for free? - Bill Gates, 1976
  • 18. “ There are fewer communists in the world today than there were. There are some new modern-day sort of communists who want to get rid of the incentive for musicians and moviemakers and software makers under various guises. They don't think that those incentives should exist - Bill Gates, 2005
  • 19. “ Linux is a cancer that attaches itself in an intellectual property sense to everything it touches - Steve Ballmer, 2001
  • 20. WHAT PRIMARILY DRIVES BOTH
  • 23. WHATS THIS GOT TO DO WITH SOFTWARE SECURITY
  • 25. “ In an open source project, to make a mistake and have it known to the entire development community and your friends is mortifying to the extreme …. the last moment before hitting the Enter key – to commit a change or send a patch out into the cold cruel world of your peers – is ” the longest moment imaginable - Michael H. Warfield senior researcher Internet Security Systems
  • 26.
  • 27. Factors to Consider   Time to compromise   Speed at which flaws are fixed   Number of vulnerabilities   Major virus outbreaks   Trust
  • 28. Time to Compromise •  Time taken to compromise an un-patched Linux vs Windows XP machine VS
  • 29. Time to Compromise Linux Windows XP 3 Months* 4 Minutes (pre SP2)* 18 Minutes (post SP2)** WINNER Source: * Honeynet “Know Your Enemy: Trend Analysis” (2004) ** Symantec’s Internet Security Threat Report (2004)
  • 30. Bugs
  • 31. Bugs Article “Apache avoids most security woes” found Apache’s last serious security problem was announced in January 1997 Article “IT bugs over IIS security” found Microsoft had reported 21 security bulletins over the period - 8 of which rated highly dangerous in comparison to 0 for Apache over the same period Source: eWeek & www.dwheeler.com/oss_fs_why.html
  • 34. Fixing Flaws #1 Vendor Number Advisories Average Time to Resolve After Discovery 31 11.2 days 61 16.1 days 8 89.5 days Source: SecurityPortal WINNER
  • 36. Fixing Flaws #2 The U.S. Department of Homeland Security’s Computer Emergency Readiness Team (CERT) recommended using browsers other than Microsoft Corp.’s Internet Explorer (IE) for security reasons. Microsoft had failed to patch a critical vulnerability for 9 months, and IE was being actively exploited in horrendous ways. Source: US Department of Homeland Security, CERT
  • 37. Fixing Flaws #2 Mozilla Firefox fixed its According to Symantec Corp., vulnerabilities faster, and had fewer severe vulnerabilities than Internet Explorer WINNER Source: Symantec, 2004
  • 39. Fixing Flaws #3 eWeek Labs’ article “Open Source Quicker at Fixing Flaws” listed Serious flaw was specific examples of more rapid response. found in the Apache Web server; the Apache Software Foundation made a patch available two days after the Web server hole was announced. WINNER Source: eWeek, article: “Open Source Quicker at Fixing Flaws”
  • 40. Virus Outbreaks Computer viruses are overwhelmingly more prevalent on Windows than any other system.
  • 42. Virus Outbreaks #1 Microsoft IIS features twice as often (49% vs. 23%) as a malware distributing server. WINNER Source: Google, Online Security Blog (2007)
  • 44. Who to Trust? #1 European Parliament calls “on the Commission and Member States to promote software projects whose source text is made public (open-source software), as this is the only way of guaranteeing that no backdoors are built into programmes [and calls] on the Commission to lay down a standard for the level of security of e-mail software packages, placing those packages whose source code has not been made public in the ‘least reliable’ category” (5 September, 2001; 367 votes for, 159 against and 39 abstentions). Source: European Parliament A5-0264/2001
  • 45. Who to Trust? #2 •  April 2000 discovery Frontpage contained a deliberate “backdoor” •  Remained undetected for more than 4 years Source: TruSecure, Paper: Open Source Security
  • 46. Who to Trust? #3 •  Some time between 1992 and 1994 •  “Back door” inserted in the DB server InterBase •  Vulnerability stayed for 6 years •  Borland released source code July 2000 as OSS/ FS •  Firebird launched •  5 months later CERT identified the vulnerability and it was patched shortly after
  • 48. Comparison EULA to GPL EULA GPL Percentage of license which limits 45% 27% your rights Percentage of the license which 15% 51% extends your rights Percentage of license which limits 40% 22% your remedies Source: Cybersource, a comparison of the GPL and the Microsoft EULA
  • 49. The Tally Factor Open Source Closed Source Time to compromise ✔ ✖ Number critical bugs ✔ ✖ Speed at fixing flaws ✔ ✖ Number of Viruses ✔ ✖ Who to trust ✔ ✖
  • 50. Conclusion •  “Openness” of source code is 1 factor of many when considering security •  Being open doesn’t automatically mean more secure •  Underlying driving motives for open source can lead to better software development •  History has shown that good open source projects tend to be more secure then their closed counterparts •  It’s a question of who to put your trust in
  • 51. Thank You & Remember
  • 52. References •  Why open source? (David Wheeler) •  IBM, The security implications of open source software •  Open source versus closed source security (Jason Miller) •  Open source security: A look at the security benefits of source code access (TruSecure) 5 2
  • 53. Questions and Further Information yossih@synaq.com 011 262 3632