nanog mailing list archives

Re: Alleged backdoor in OpenBSD's IPSEC implementation.


From: Ben <sixtwelveohtwo () gmail com>
Date: Wed, 15 Dec 2010 09:17:50 -0800

On Wed, Dec 15, 2010 at 9:00 AM, Stefan Fouant <
sfouant () shortestpathfirst net> wrote:

-----Original Message-----
From: mikea [mailto:mikea () mikea ath cx]
Sent: Wednesday, December 15, 2010 8:28 AM
To: nanog () nanog org
Subject: Re: Alleged backdoor in OpenBSD's IPSEC implementation.


Someone is confusing FBI with NSA, methinks. And yes, if this is
the kind of thing not talked about, "NDA"s expire when you do. But
seriously ... this would seem to be the kind of code that Smart
People
should be doing security audits on Just Because.

So rustle up a couple of PostDocs, and give them an idea for a
Thesis,
and yer set.

More to the point, I think it wouldn't be an NDA, but a security
classification on the knowledge of the backdoors, and probably one not
subject to automatic downgrading.

Please pardon my ignorance on the matter as I am not involved in any way
with Open Source development, but it stands to reason that anything of this
sort would have been scrutinized by the many developers involved with
OpenBSD and surely would have been discovered at some point.  And to
further
that point, is this not something that can be verified now if this code is
still in the public domain?  Or is writing a crypto stack such an esoteric
task that only a relegated few can possibly decipher the inner workings?

Not that I don't love a good government conspiracy theory, and yes I do
believe there are a fair amount of backdoors in most code (including that
of
many private and publicly held corporations)... but open source?  Just
seems
unlikely to me based on my limited understanding...

Stefan


Stefan,

   I wouldn't want to debate whether or not this specific theoretical "back
door" exists (since it seems to be less than marginally credible at this
point,) but it is more plausible than you might think.

   I believe that most of us a fairly static situation that we think of when
we hear "back door" as it pertains to technology and software. This,
however, is an alleged "back door" (though perhaps describing it as a
weakness is less likely to elicit tin-foil-hat-type predictions) in the
crypto. There are tons of brilliant developers in the open source *and*
commercial community that could spot a back door in the *code* in a
heartbeat. The alleged weakness here, however, is far more likely to be a
mathematical weakness in the actual crypo algorithms which wouldn't stand
out to most developers - even the top-end folks.

   Ultimately, it will probably come down to crypto-nerds and mathematicians
to verify the algorithms that were used rather than just putting great
programming eyes on the code. Such things have happened before, though with
much less fanfare to the general community. For example:
http://www.schneier.com/blog/archives/2007/11/the_strange_sto.html

// Ben S.


Current thread: