SlideShare a Scribd company logo
1 of 53
Download to read offline
OPEN vs CLOSED: Which is more secure?
Yossi Hasson
http://twitter.com/yossihasson
yossih@synaq.com
OPEN
VS CLOSED
  WHICH IS
     MORE
   SECURE
The debate
I’m closed.
  I’m more
    secure
               Open is
                better!
5
Kerckhoff’s Principle




           “the system must not require secrecy
           and can be stolen by the enemy without
                      causing trouble.



                                               ”
                         - Auguste Kerckhoff, 1883
at SYNAQ
 we believe that good
OPEN SOURCE projects
lead to better software
  being developed and are
 therefore generally more
         secure
WHY
WHAT IS
  OPEN
SOURCE
Richard Stallman




 1983


  “   Free software' is a matter of liberty, not price.
To understand the concept, think of ‘free’ as in ‘free speech’


                                                         ”
                   not as in ‘free beer’
Linus Torvalds




                                           1991



“
Hello everybody out there using minix. I'm doing a (free)
      operating system (just a hobby, won't be big


                                                      ”
   and professional like gnu) for 386(486)AT clones.
Eric Raymond




   1998




“
People are imperfect. What we have learned through the ages, though,
    is that combining lots of people creates a better end result, ...
For some reason, we forgot that when it came to developing software.


                                                                   ”
OSS Definition
1.  Free Redistribution
2.  Source Code
3.  Derived Works
4.  Integrity of The Author’s Source Code
5.  No Discrimination Against Persons or Groups
6.  No Discrimination Against Fields of Endeavor
7.  Distribution of License
8.  License Must Not Be a Specific to a Product
9.  License Must Not Restrict Other Software
10. License Must Be Technology Neutral
Source: www.opensource.org
WHAT
     IS
CLOSED
SOURCE
Source code of the software is not
available, or the licensor does not
grant the freedoms to use, modify,
and distribute that are granted by
       free software licenses.



                             - Source: Wikipedia
“      Who can afford to do professional work for nothing?
      What hobbyist can put 3-man years into programming,
finding all bugs, documenting his product and distribute for free?
                                                    - Bill Gates, 1976
“
 There are fewer communists in the world today than there were.
    There are some new modern-day sort of communists
who want to get rid of the incentive for musicians and moviemakers
           and software makers under various guises.
       They don't think that those incentives should exist

                                                   - Bill Gates, 2005
“
Linux is a cancer that attaches itself in an intellectual
       property sense to everything it touches
                                    - Steve Ballmer, 2001
WHAT
PRIMARILY
   DRIVES
    BOTH
Closed Source
Open Source

 Status
 Contribution
 Social Capital
 Ideology
 In some cases:
  Making money
WHATS THIS
 GOT TO DO
      WITH
 SOFTWARE
  SECURITY
$
TIME
“
In an open source project, to make a mistake and have it
  known to the entire development community and your
 friends is mortifying to the extreme …. the last moment
before hitting the Enter key – to commit a change or send
  a patch out into the cold cruel world of your peers – is



                                                  ”
              the longest moment imaginable
    - Michael H. Warfield
    senior researcher Internet Security Systems
Factors to Consider

  Time to compromise
  Speed at which flaws are fixed
  Number of vulnerabilities
  Major virus outbreaks
  Trust
Time to Compromise

•  Time taken to compromise an un-patched
   Linux vs Windows XP machine




                VS
Time to Compromise

    Linux                                     Windows XP
   3 Months*                            4 Minutes (pre SP2)*
                                       18 Minutes (post SP2)**




                                                        WINNER
     Source:
     * Honeynet “Know Your Enemy: Trend Analysis” (2004)
     ** Symantec’s Internet Security Threat Report (2004)
Bugs
Bugs
Article “Apache avoids most security woes” found
Apache’s last serious security problem was
announced in January 1997

Article “IT bugs over IIS security” found Microsoft had
reported 21 security bulletins over the period - 8 of
which rated highly dangerous in comparison to 0
for Apache over the same period

Source:
eWeek &
www.dwheeler.com/oss_fs_why.html
Fixing Flaws
Fixing Flaws #1




     VS           VS
Fixing Flaws #1
           Vendor        Number Advisories   Average Time to
                                              Resolve After
                                               Discovery

                               31             11.2 days


                               61            16.1 days

                                8            89.5 days


Source: SecurityPortal
                                             WINNER
Fixing Flaws #2




             VS
Fixing Flaws #2


  The U.S. Department of Homeland Security’s Computer
  Emergency Readiness Team (CERT)
  recommended using browsers other than
  Microsoft Corp.’s Internet Explorer (IE) for security
  reasons. Microsoft had failed to patch a critical
  vulnerability for 9 months, and IE was being
  actively exploited in horrendous ways.
Source: US Department of Homeland Security, CERT
Fixing Flaws #2

                     Mozilla Firefox fixed its
 According to Symantec Corp.,
 vulnerabilities faster, and had fewer severe
 vulnerabilities than Internet Explorer




                                          WINNER
Source: Symantec, 2004
Fixing Flaws #3




             VS
Fixing Flaws #3
  eWeek Labs’ article “Open Source Quicker at Fixing Flaws” listed
                                        Serious flaw was
  specific examples of more rapid response.
  found in the Apache Web server; the Apache
  Software Foundation made a patch available two
  days after the Web server hole was announced.




                                                                WINNER
Source: eWeek, article: “Open Source Quicker at Fixing Flaws”
Virus Outbreaks




    Computer viruses are overwhelmingly more
   prevalent on Windows than any other system.
Virus Outbreaks




            VS
Virus Outbreaks #1

 Microsoft IIS features twice as often (49% vs.
 23%) as a malware distributing server.




                                              WINNER
Source: Google, Online Security Blog (2007)
Who to Trust?
Who to Trust? #1
European Parliament calls “on the Commission and Member States to
promote software projects whose source text is made
public (open-source software), as this is the only way of
guaranteeing that no backdoors are built into
programmes [and calls] on the Commission to lay down a standard
for the level of security of e-mail software packages,
placing those packages whose source code has not been
made public in the ‘least reliable’ category”
(5 September, 2001; 367 votes for, 159 against and 39 abstentions).


  Source: European Parliament A5-0264/2001
Who to Trust? #2


•  April 2000 discovery Frontpage contained a
   deliberate “backdoor”
•  Remained undetected for more than 4 years



 Source: TruSecure, Paper: Open Source Security
Who to Trust? #3


•  Some time between 1992 and 1994
•  “Back door” inserted in the DB server InterBase
•  Vulnerability stayed for 6 years
•  Borland released source code July 2000 as OSS/
   FS
•  Firebird launched
•  5 months later CERT identified the vulnerability
   and it was patched shortly after
Microsoft EULA - XP #4
Comparison EULA to GPL
                                                                       EULA   GPL
  Percentage of license which limits                                   45%    27%
  your rights
  Percentage of the license which                                      15%    51%
  extends your rights
  Percentage of license which limits                                   40%    22%
  your remedies




 Source: Cybersource, a comparison of the GPL and the Microsoft EULA
The Tally

Factor                  Open Source   Closed Source

Time to compromise           ✔             ✖
Number critical bugs         ✔             ✖
Speed at fixing flaws        ✔             ✖
Number of Viruses            ✔             ✖
Who to trust                 ✔             ✖
Conclusion
•  “Openness” of source code is 1 factor of
   many when considering security
•  Being open doesn’t automatically mean
   more secure
•  Underlying driving motives for open source
   can lead to better software development
•  History has shown that good open source
   projects tend to be more secure then their
   closed counterparts
•  It’s a question of who to put your trust in
Thank You
    &
Remember
References

•  Why open source? (David Wheeler)
•  IBM, The security implications of open
   source software
•  Open source versus closed source
   security (Jason Miller)
•  Open source security: A look at the
   security benefits of source code access
   (TruSecure)

     5
     2
Questions and Further Information
              yossih@synaq.com
                   011 262 3632

More Related Content

What's hot

Open source technology
Open source technologyOpen source technology
Open source technology
aparnaz1
 
Copyright in Software and Open Source licensing
Copyright in Software and Open Source licensingCopyright in Software and Open Source licensing
Copyright in Software and Open Source licensing
Rowan Wilson
 

What's hot (20)

Open Source Concepts
Open Source ConceptsOpen Source Concepts
Open Source Concepts
 
Open Source Business Models
Open Source Business ModelsOpen Source Business Models
Open Source Business Models
 
Open source technology
Open source technologyOpen source technology
Open source technology
 
Introduction To Open Source Licensing
Introduction To Open Source LicensingIntroduction To Open Source Licensing
Introduction To Open Source Licensing
 
Linux Operating System
Linux Operating SystemLinux Operating System
Linux Operating System
 
FOSS
FOSS FOSS
FOSS
 
Open source operating systems
Open source operating systemsOpen source operating systems
Open source operating systems
 
Open source software and os
Open source software and osOpen source software and os
Open source software and os
 
Top Open Source Licenses Explained
Top Open Source Licenses ExplainedTop Open Source Licenses Explained
Top Open Source Licenses Explained
 
Professional Software Development, Practices and Ethics
Professional Software Development, Practices and EthicsProfessional Software Development, Practices and Ethics
Professional Software Development, Practices and Ethics
 
Linux Presentation
Linux PresentationLinux Presentation
Linux Presentation
 
Open Source & PHP
Open Source & PHPOpen Source & PHP
Open Source & PHP
 
Open Source Operating System [Chapter 1]
Open Source Operating System [Chapter 1]Open Source Operating System [Chapter 1]
Open Source Operating System [Chapter 1]
 
Open Source Technology
Open Source TechnologyOpen Source Technology
Open Source Technology
 
Introduction To Open Source Licenses
Introduction To Open Source LicensesIntroduction To Open Source Licenses
Introduction To Open Source Licenses
 
Copyright in Software and Open Source licensing
Copyright in Software and Open Source licensingCopyright in Software and Open Source licensing
Copyright in Software and Open Source licensing
 
Unix vs linux
Unix vs linuxUnix vs linux
Unix vs linux
 
The open source philosophy
The open source philosophyThe open source philosophy
The open source philosophy
 
Linux ppt
Linux pptLinux ppt
Linux ppt
 
An Introduction to Open Source Software and Web Application Development
An Introduction to Open Source Software and Web Application DevelopmentAn Introduction to Open Source Software and Web Application Development
An Introduction to Open Source Software and Web Application Development
 

Similar to Open vs Closed - Which is more secure?

Similar to Open vs Closed - Which is more secure? (20)

Free Libre Open Source Software - Business aspects of software industry
Free Libre Open Source Software - Business aspects of software industryFree Libre Open Source Software - Business aspects of software industry
Free Libre Open Source Software - Business aspects of software industry
 
FLOSS & OER
FLOSS & OERFLOSS & OER
FLOSS & OER
 
Barcamp: Open Source and Security
Barcamp: Open Source and SecurityBarcamp: Open Source and Security
Barcamp: Open Source and Security
 
Introduction To Open Source
Introduction To Open SourceIntroduction To Open Source
Introduction To Open Source
 
Free Libre Open Source Software Development
Free Libre Open Source Software DevelopmentFree Libre Open Source Software Development
Free Libre Open Source Software Development
 
Case study cybersecurity industry birth and growth
Case study cybersecurity industry birth and growth Case study cybersecurity industry birth and growth
Case study cybersecurity industry birth and growth
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Free Libre Open Source Software - Business Aspects of Software Industry
Free Libre Open Source Software - Business Aspects of Software IndustryFree Libre Open Source Software - Business Aspects of Software Industry
Free Libre Open Source Software - Business Aspects of Software Industry
 
Bulletproof IT Security
Bulletproof IT SecurityBulletproof IT Security
Bulletproof IT Security
 
FOSS and Security
FOSS and SecurityFOSS and Security
FOSS and Security
 
Free & Open Source Software (2017 update)
Free & Open Source Software (2017 update)Free & Open Source Software (2017 update)
Free & Open Source Software (2017 update)
 
Security by Weston Hecker
Security by Weston HeckerSecurity by Weston Hecker
Security by Weston Hecker
 
Perspectives on Open
Perspectives on OpenPerspectives on Open
Perspectives on Open
 
Security in the age of open source - Myths and misperceptions
Security in the age of open source - Myths and misperceptionsSecurity in the age of open source - Myths and misperceptions
Security in the age of open source - Myths and misperceptions
 
GNU/Linux, Server Web, dan Keamanan
GNU/Linux, Server Web, dan KeamananGNU/Linux, Server Web, dan Keamanan
GNU/Linux, Server Web, dan Keamanan
 
The Top 3 Strategies To Reduce Your Open Source Security Risks - A WhiteSour...
 The Top 3 Strategies To Reduce Your Open Source Security Risks - A WhiteSour... The Top 3 Strategies To Reduce Your Open Source Security Risks - A WhiteSour...
The Top 3 Strategies To Reduce Your Open Source Security Risks - A WhiteSour...
 
Open Source Issues and Trends
Open Source Issues and TrendsOpen Source Issues and Trends
Open Source Issues and Trends
 
Hacking 10 2010
Hacking 10 2010Hacking 10 2010
Hacking 10 2010
 
Open Source Insight: NVD's New Look, Struts Vuln Ransomware & Google Open So...
Open Source Insight:  NVD's New Look, Struts Vuln Ransomware & Google Open So...Open Source Insight:  NVD's New Look, Struts Vuln Ransomware & Google Open So...
Open Source Insight: NVD's New Look, Struts Vuln Ransomware & Google Open So...
 
Pak kiet presentation-24_mar_2005_7
Pak kiet presentation-24_mar_2005_7Pak kiet presentation-24_mar_2005_7
Pak kiet presentation-24_mar_2005_7
 

Recently uploaded

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 

Open vs Closed - Which is more secure?

  • 1. OPEN vs CLOSED: Which is more secure? Yossi Hasson http://twitter.com/yossihasson yossih@synaq.com
  • 2. OPEN VS CLOSED WHICH IS MORE SECURE
  • 3. The debate I’m closed. I’m more secure Open is better!
  • 4.
  • 5. 5
  • 6.
  • 7. Kerckhoff’s Principle “the system must not require secrecy and can be stolen by the enemy without causing trouble. ” - Auguste Kerckhoff, 1883
  • 8. at SYNAQ we believe that good OPEN SOURCE projects lead to better software being developed and are therefore generally more secure
  • 9. WHY
  • 10. WHAT IS OPEN SOURCE
  • 11. Richard Stallman 1983 “ Free software' is a matter of liberty, not price. To understand the concept, think of ‘free’ as in ‘free speech’ ” not as in ‘free beer’
  • 12. Linus Torvalds 1991 “ Hello everybody out there using minix. I'm doing a (free) operating system (just a hobby, won't be big ” and professional like gnu) for 386(486)AT clones.
  • 13. Eric Raymond 1998 “ People are imperfect. What we have learned through the ages, though, is that combining lots of people creates a better end result, ... For some reason, we forgot that when it came to developing software. ”
  • 14. OSS Definition 1.  Free Redistribution 2.  Source Code 3.  Derived Works 4.  Integrity of The Author’s Source Code 5.  No Discrimination Against Persons or Groups 6.  No Discrimination Against Fields of Endeavor 7.  Distribution of License 8.  License Must Not Be a Specific to a Product 9.  License Must Not Restrict Other Software 10. License Must Be Technology Neutral Source: www.opensource.org
  • 15. WHAT IS CLOSED SOURCE
  • 16. Source code of the software is not available, or the licensor does not grant the freedoms to use, modify, and distribute that are granted by free software licenses. - Source: Wikipedia
  • 17. Who can afford to do professional work for nothing? What hobbyist can put 3-man years into programming, finding all bugs, documenting his product and distribute for free? - Bill Gates, 1976
  • 18. “ There are fewer communists in the world today than there were. There are some new modern-day sort of communists who want to get rid of the incentive for musicians and moviemakers and software makers under various guises. They don't think that those incentives should exist - Bill Gates, 2005
  • 19. “ Linux is a cancer that attaches itself in an intellectual property sense to everything it touches - Steve Ballmer, 2001
  • 20. WHAT PRIMARILY DRIVES BOTH
  • 23. WHATS THIS GOT TO DO WITH SOFTWARE SECURITY
  • 25. “ In an open source project, to make a mistake and have it known to the entire development community and your friends is mortifying to the extreme …. the last moment before hitting the Enter key – to commit a change or send a patch out into the cold cruel world of your peers – is ” the longest moment imaginable - Michael H. Warfield senior researcher Internet Security Systems
  • 26.
  • 27. Factors to Consider   Time to compromise   Speed at which flaws are fixed   Number of vulnerabilities   Major virus outbreaks   Trust
  • 28. Time to Compromise •  Time taken to compromise an un-patched Linux vs Windows XP machine VS
  • 29. Time to Compromise Linux Windows XP 3 Months* 4 Minutes (pre SP2)* 18 Minutes (post SP2)** WINNER Source: * Honeynet “Know Your Enemy: Trend Analysis” (2004) ** Symantec’s Internet Security Threat Report (2004)
  • 30. Bugs
  • 31. Bugs Article “Apache avoids most security woes” found Apache’s last serious security problem was announced in January 1997 Article “IT bugs over IIS security” found Microsoft had reported 21 security bulletins over the period - 8 of which rated highly dangerous in comparison to 0 for Apache over the same period Source: eWeek & www.dwheeler.com/oss_fs_why.html
  • 34. Fixing Flaws #1 Vendor Number Advisories Average Time to Resolve After Discovery 31 11.2 days 61 16.1 days 8 89.5 days Source: SecurityPortal WINNER
  • 36. Fixing Flaws #2 The U.S. Department of Homeland Security’s Computer Emergency Readiness Team (CERT) recommended using browsers other than Microsoft Corp.’s Internet Explorer (IE) for security reasons. Microsoft had failed to patch a critical vulnerability for 9 months, and IE was being actively exploited in horrendous ways. Source: US Department of Homeland Security, CERT
  • 37. Fixing Flaws #2 Mozilla Firefox fixed its According to Symantec Corp., vulnerabilities faster, and had fewer severe vulnerabilities than Internet Explorer WINNER Source: Symantec, 2004
  • 39. Fixing Flaws #3 eWeek Labs’ article “Open Source Quicker at Fixing Flaws” listed Serious flaw was specific examples of more rapid response. found in the Apache Web server; the Apache Software Foundation made a patch available two days after the Web server hole was announced. WINNER Source: eWeek, article: “Open Source Quicker at Fixing Flaws”
  • 40. Virus Outbreaks Computer viruses are overwhelmingly more prevalent on Windows than any other system.
  • 42. Virus Outbreaks #1 Microsoft IIS features twice as often (49% vs. 23%) as a malware distributing server. WINNER Source: Google, Online Security Blog (2007)
  • 44. Who to Trust? #1 European Parliament calls “on the Commission and Member States to promote software projects whose source text is made public (open-source software), as this is the only way of guaranteeing that no backdoors are built into programmes [and calls] on the Commission to lay down a standard for the level of security of e-mail software packages, placing those packages whose source code has not been made public in the ‘least reliable’ category” (5 September, 2001; 367 votes for, 159 against and 39 abstentions). Source: European Parliament A5-0264/2001
  • 45. Who to Trust? #2 •  April 2000 discovery Frontpage contained a deliberate “backdoor” •  Remained undetected for more than 4 years Source: TruSecure, Paper: Open Source Security
  • 46. Who to Trust? #3 •  Some time between 1992 and 1994 •  “Back door” inserted in the DB server InterBase •  Vulnerability stayed for 6 years •  Borland released source code July 2000 as OSS/ FS •  Firebird launched •  5 months later CERT identified the vulnerability and it was patched shortly after
  • 48. Comparison EULA to GPL EULA GPL Percentage of license which limits 45% 27% your rights Percentage of the license which 15% 51% extends your rights Percentage of license which limits 40% 22% your remedies Source: Cybersource, a comparison of the GPL and the Microsoft EULA
  • 49. The Tally Factor Open Source Closed Source Time to compromise ✔ ✖ Number critical bugs ✔ ✖ Speed at fixing flaws ✔ ✖ Number of Viruses ✔ ✖ Who to trust ✔ ✖
  • 50. Conclusion •  “Openness” of source code is 1 factor of many when considering security •  Being open doesn’t automatically mean more secure •  Underlying driving motives for open source can lead to better software development •  History has shown that good open source projects tend to be more secure then their closed counterparts •  It’s a question of who to put your trust in
  • 51. Thank You & Remember
  • 52. References •  Why open source? (David Wheeler) •  IBM, The security implications of open source software •  Open source versus closed source security (Jason Miller) •  Open source security: A look at the security benefits of source code access (TruSecure) 5 2
  • 53. Questions and Further Information yossih@synaq.com 011 262 3632