Government // Enterprise Architecture
Commentary
8/28/2008
02:23 PM
Serdar Yegulalp
Serdar Yegulalp
Commentary
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Open Source Code Auditing By Design, Not Happenstance

If there's any one thing you hear said consistently about open source, it's the security benefits. My take: given how much we depend on software, we need to stop assuming open source = secure, and take steps to make sure that happens. Here's one idea how.

If there's any one thing you hear said consistently about open source, it's the security benefits. My take: given how much we depend on software, we need to stop assuming open source = secure, and take steps to make sure that happens. Here's one idea how.

Before I start, though, go read a piece by my colleague Robert Hansen, "Atomic Paradigms for Enterprise Security" over at Internet Evolution. It's well worth your time, but the gist of the piece is simple. With security (Rob sez), we're being forced to become either Oppenheimers (disclose security issues slowly and responsibly) or Tellers (disclose them early and often), with no middle ground.

That piece echoes another sentiment I've heard -- I forget who said it, unfortunately: Technology is neither good nor evil, but it is not neutral, either. It assumes the shape of the moral container it is poured into, so to speak. What goes for security practices in general most definitely goes for open source as well. If anything, it's twice as relevant. A fine example, courtesy of InformationWeek Reports, is how open source security tools can be a two-edged sword -- since the exact same tools are available to an attacker as well as a defender.

I've written before that open source is not a guarantee of security, but certainly an enabler. There need to be people in place, people who understand security from the inside out as a process, to audit your code for security issues. This part we all know. (I hope.)

What many forget, though, is that because of the way open source is meant to be re-used, derived code can be found in a panopoly of places -- and there's plenty of opportunities for something to be derived from a source that bears little resemblance to its current use. Something which was written for a desktop environment might find pieces of its code recycled into a kiosk setting ... and that "innocent" unchecked array boundary problem may turn into a hole big enough to drive an eighteen-wheeler through.

Not good. So: Given the way open source is produced, then, how would we go about using a piece of code with confidence that it's been vetted -- other than the mere fact that it's open and anyone can look at it? How do we continue to use open source without simply crossing our fingers and hoping for the best?

One idea I have is an organization of security experts who are specifically devoted to auditing open source projects. For a yearly fee, you could enroll as a client and submit code to folks willing to pick it apart line by line -- a kind of for-pay peer-review security process. To make it a little more manageable for the little guys, fees could be prorated based on the number of lines of code you submit per year, with maybe some additional prorating for interpreted vs. compiled languages.

The audited code could be given a "Good Codekeeping Seal of Approval" -- perhaps in a series of gradations to indicate how much confidence the auditing organization has in the code. Said auditing information could be published along with the software license, although any changes or derivative work would have to be re-certified. (You could, for instance, match the granted certification to an SHA-1 fingerprint for a given iteration of the source.)

I don't doubt for a second this concept would bring up a whole sheaf of new problems, just as it solved some existing ones. For one, what kinds of standards would such an organization have for screening prospective experts? And would we get the kinds of clashes over auditing that we get now over different licensing terms?

One thing I am sure of: we're long past the stage where just having open source alone is not enough of a guarantee of integrity. Especially if we're all turning into either Oppenheimer or Teller whether we want to or not.

Comment  | 
Print  | 
More Insights
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Tech Digest - August 27, 2014
Who wins in cloud price wars? Short answer: not IT. Enterprises don't want bare-bones IaaS. Providers must focus on support, not undercutting rivals.
Flash Poll
Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Howard Marks talks about steps to take in choosing the right cloud storage solutions for your IT problems
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.