Vulnerability Development mailing list archives

Sardonix Security Auditing Portal


From: Crispin Cowan <crispin () wirex com>
Date: Tue, 05 Feb 2002 11:34:00 -0800

Back in the summer of 1998, the Linux Security Audit Project http://lsap.org was founded as a mailing list. Inspired by the spectacular work of OpenBSD, LSAP was intended to orchestrate the systematic security auditing of source code commonly found in Linux distributions.

Since then, LSAP has failed to really live up to its mission. While the LSAP mailing list has become a very nice chat room for discussing security issues, not much software is actually audited any more.

We propose to address this under used potential by providing a real & effective web portal to facilitate & encourage source code auditing. This web site will facilitate and encourage source code auditing in the following ways:

   * Identify auditors: we don't care if auditors are anonymous, but
     they should be authentic.  I.e. you can go by a handle if you want
     to, but you should have a public key, so we know it's you.
   * Repository for audited code:  importantly, identifying who has
     audited the code, and what issues were found.
* Todo's: a list of unaudited code that could use some attention. With source code, so would-be auditors don't have to go find it.
   * Score keeping:  this part is very important.  There's two kinds of
     scores to keep:
         * Auditor's score: each auditor is scored based on the volume
           of code they have audited, and the number of bugs
           SUBSEQUENTLY found in code that they declared clean.
         * Code's score: the trustworthiness of a piece of code is a
           function of the people who have audited the code.

The score keeping is really the most important part of the web site, with two key roles to play:

   * the karma whore effect: we conjecture that a web site that will
     mechanically compute a number of how l33t you are will attract
     people to audit code.  Consider how hard people will work just
     score karma points on Slashdot :-)
   * assuring code quality: scoring the code in terms of the number &
     quality of eyes that have read it will give code consumers a
     reasonably valid way to determine the level of trust they can put
     in that code.

We also will be encouraging responsible reporting. The audit submission form explicitly asks you if you have followed the RFP http://www.wiretrip.net/rfp/policy.html and notified the package maintainer prior to publishing your findings.

What we need:  community feedback.

   * Generally:  what do folks think of the model?  What changes, if
     any, do people think it needs to make it work?
   * Specifically: the scoring functions are critical, as people will
     generally act to maximize figures of merit. This can get
     pathological, e.g. stock brokers churning the market to make
     commission.  What should the scoring functions look like for
     auditors? for programs?

The whole project is intended to leverage community skepticism of claims of security, and the community's joyful habit of criticizing the work of others, and so we call it Sardonix. You can view the beginnings of the project here http://sardonix.org including subscribing to the Sardonix mailing list http://mail.wirex.com/mailman/listinfo/sardonix First, we expect discussion/flaming :-) about the particular structure of the web site, followed by actually implementing the software behind the design the community decides it wants. And then we will get down to some auditing.

Crispin

--
Crispin Cowan, Ph.D.
Chief Scientist, WireX Communications, Inc. http://wirex.com
Security Hardened Linux Distribution:       http://immunix.org
Available for purchase: http://wirex.com/Products/Immunix/purchase.html

       The Olympic Games: A Century of Corruption and Graft
             The FIS: Crushing the soul of snowboarding



Current thread: