EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

02.24.14

The Increasing Danger of Back Doors in Standards and Binary Blobs

Posted in Apple, GNU/Linux, Microsoft, Security at 9:06 am by Dr. Roy Schestowitz

Summary: The risk of back doors in GNU/Linux comes not from source code but from blobs, back room deals, the build process, and bogus standards with weaknesses cleverly shoehorned into them

IT HAS BEEN a while since we last wrote about Mr. Srinivasan from Microsoft-Novell. Suffice to say, Novell did a lot for Microsoft and some former staff of Novell continues to work for Microsoft (either directly or indirectly). One gift from Novell to Microsoft was OOXML inside FOSS/OOo. Another was Mono and let’s not forget intrusion into Linux itself. Robert Pogson goes as far as saying that Microsoft “Hacked Linux!”

“My configuration,” Pogson argues, “has CONFIG_HYPERV not set. The code in question is Copyright 2010, Novell (mshyperv.c), and Copyright 2009, M$ (vmbus_drv.c). K. Y. Srinivasan is listed as one of the authours on both. I’m not about to run that other OS on Beast, but thank you, Thomas Gleixner, for fixing things.” (see this link)

Performance issues overlook the much bigger problem — a problem which we addressed several times before. We already know that the NSA is pursuing back doors in Linux [1, 2, 3, 4] and as we pointed out before, the NSA might already have some.

incidentally, as we have shown before, Yahoo was fighting against NSA surveillance in court. When Microsoft took over Yahoo it became apparent that Yahoo stopped fighting and soon became part of PRISM. While some new reports suggest that Yahoo might be ready to escape Microsoft “Yahoo is still in NSA’s pocket though even if they break free of Microsoft,” explains iophk.

Likewise, even if Linux does not engage with Microsoft, the code from Microsoft remains stuck inside Linux and even if there are no back doors in the code itself, this connects to a system, Hyper-V, which is developed by a back doors specialist (Microsoft). There are binary-level back doors from which to access GNU/Linux systems because if the host machine runs Windows, then we already know that the NSA has access. A nearby company that I once visited, UKFast (the UK’s largest ‘cloud’ provider), runs GNU/Linux servers under HyperV, based on what they told me. How insane is that?! GCHO must love it!

Adding to some concerns about back doors, NSA ally and PRISM partner Apple turns out to have hidden a back door. As Think Progress puts it, “Apple quietly released a major update Friday to fix a security glitch in its iOS 7 systems. But independent security experts say the seemingly routine update covers up what arguably could be Apple’s biggest security lapse, exposing iPhone, iPad and iPod Touch users to hackers.”

Whether it’s a back door or just direct access does not matter, but it enables Apple to dance around important questions. It works across several Apple platforms, even desktop platforms [1].

As iophk put it, in relation to this other new article [2] “Potential problems with an official back door in HTTP 2.0, though only in a proposed draft so far. But because of the ways certificates are currently (mis-)managed, this kind of interception of HTTPS is already easy.”

“See one example with four steps,” he added, pointing to [3] from the OpenBSD mailing lists.

It’s not as though GNU/Linux is immune to back doors (Debian has some new security advisories [4,5]), but at least with access to source code the back doors remain very shallow and too risky/difficult for malicious/covert entities to hide. It’s when proprietary software gets added that we lose the ability to ascertain security and privacy.

Related/contextual items from the news:

  1. Apple SSL Vulnerability Affects OSX Too
  2. No, I Don’t Trust You! — One of the Most Alarming Internet Proposals I’ve Ever Seen

    If you care about Internet security, especially what we call “end-to-end” security free from easy snooping by ISPs, carriers, or other intermediaries, heads up! You’ll want to pay attention to this.

    You’d think that with so many concerns these days about whether the likes of AT&T, Verizon, and other telecom companies can be trusted not to turn our data over to third parties whom we haven’t authorized, that a plan to formalize a mechanism for ISP and other “man-in-the-middle” snooping would be laughed off the Net.

    But apparently the authors of IETF (Internet Engineering Task Force) Internet-Draft “Explicit Trusted Proxy in HTTP/2.0″ (14 Feb 2014) haven’t gotten the message.

    What they propose for the new HTTP/2.0 protocol is nothing short of officially sanctioned snooping.

  3. relayd SSL interception

    This mail includes a quite detailed explanation of the attached diff that adds support for SSL Interception (“SSL-MITM”) to relayd. If you don’t want to read the story, just skip to the configuration example and diff below.

  4. Debian: 2862-1: chromium-browser: Multiple vulnerabilities
  5. Debian: 2861-1: file: denial of service
Share this post: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Digg
  • del.icio.us
  • Reddit
  • co.mments
  • DZone
  • email
  • Google Bookmarks
  • LinkedIn
  • NewsVine
  • Print
  • Technorati
  • TwitThis
  • Facebook

If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

Pages that cross-reference this one

What Else is New


  1. Patents as a Marketing Strategy: USPTO Now Part of the Advertising Industry

    The existence of publicity patents, or patents whose sole purpose is to advertise some products, serves to discredit the US patent office, which was originally set up to promote science and technology



  2. Microsoft Blackmails and Extorts British Politicians Over Open Standards and Free Software-Leaning Policies

    Microsoft's digital imperialism in the UK getting defended using blackmail, reminding a lot of Brits that Microsoft is just as evil as ever before



  3. Microsoft Gives Another Bug a Name, This Time Logjam™

    The Microsoft crowd is good only at marketing, even when it comes to small bugs in software



  4. Links 22/5/2015: Fedora 22 Final Release is Near, Canonical IPO Considered

    Links for the day



  5. More Utter Shame Unveiled at Battistelli's EPO: Intimidation Tactics With Help From 'Control Risks'

    The unaccountable thugs who run the EPO have hired London-based spooks to help silence their opposition and their critics



  6. GNU/Linux Still Under Attack From Apple and Microsoft, Patents Remain the Weapon of Choice

    A timely reminder of the importance of patent matters, for they are being used to eliminate the zero-cost advantage of Free/libre software and make it more proprietary, privacy-infringing, and user-hostile (as a result of blackmail)



  7. Gartner Group and NASSCOM: Will Lie for FUD, on Behalf of Microsoft and Proprietary Software

    Some of the latest arguments against Free/libre software turn out to be arriving from couriers of Microsoft and its agenda



  8. Windows is a Franchise in Demise, Don't Believe the Hype

    Ongoing propaganda about Vista 10, 'cloud', and other buzzwords or brands are put in perspective



  9. Links 21/5/2015: Fedora 22 RC2, CERN Chooses OpenStack

    Links for the day



  10. Microsoft is Again Showing Its Hatred of Free/Open Source Software by Lobbying the Indian Government to Drop a Rational National Policy

    Microsoft decides to attack Free/Open Source software (FOSS) in India, where the corporate media is very much complicit in misleading the public



  11. Links 20/5/2015: Containers, OpenStack, and EXT4 Corruption

    Links for the day



  12. The PATENT Act, Distraction of Trolls, and Lobbying for Software Patents by Protectionists

    Only large corporations and their lawyers are able to formally change the US patent system through public officials and politicians, despite recent rulings from very high courts



  13. Corporate Media and Friends of Microsoft Are Still Lying About the Cost of Vista 10

    In a desperate effort to beat operating systems that are Free (libre) and free (gratis), such as GNU/Linux or Android, Microsoft shores up the illusion of 'free' (gratis) Windows



  14. Links 19/5/2015: Linux 4.1 RC4, Thunderbird 31.7.0, OpenStack Event

    Links for the day



  15. Links 18/5/2015: Russia Chooses Jolla, Many New Distro Releases, Meizu Devices

    Links for the day



  16. Even Converting an Image to Greyscale is Now a Patent

    Simple mathematics becoming patented as Fujifilm claims 'ownership' of photographic conversion to greyscale



  17. Grooming of the World's Biggest Patent Troll, Nathan Myhrvold of Microsoft and Intellectual Ventures

    UCLA and Microsoft-linked media are framing big thugs as heroes, doing a great disservice to both academia and journalism



  18. The EPO's Fight to Bring Software Patents Into Europe is One Step Closer to a 'Victory' (for Multinationals)

    Opposition to the Unified Patent Court (UPC) is being crushed and Italy is one of the latest actors to have fallen in the battle



  19. Microsoft's 'Former' Staff Continues With His Anti-Google Rhetoric at CBS

    A Microsoft intern, who has moved on to journalism, is still showing his affinity for Microsoft with apologetics and spin



  20. More of Microsoft's False Claims About Cost of Vista 10 and More Layoffs

    Vista 10 is still being marketed using lies and Microsoft may be going down the same route as Nokia



  21. Microsoft Remotely Bricks -- Intentionally -- Xbox One

    Microsoft is showing off its kill switches, kills consoles of people whom it doesn't like



  22. IRC Proceedings: May 3rd - May 16th, 2015

    Many IRC logs



  23. Links 17/5/2015: NuTyX Saravane 15.05, Panasonic and Firefox OS

    Links for the day



  24. Links 16/5/2015: MAME Free Software. Rust 1.0, New Wine

    Links for the day



  25. Links 15/5/2015: GNOME 3.16.2, GNU Guix 0.8.2

    Links for the day



  26. Links 15/5/2015: Skrooge Releases, Linux 3.14.42, Linux 3.10.78

    Links for the day



  27. "VENOM" FUD Attack -- Like "Heartbleed" FUD Attack -- Linked to Microsoft

    Why CrowdStrike™ is motivated to smear Free software and establish a stigma of insecurity in Free software-based virtual machines/'clouds'



  28. Spinning Microsoft's Inability to Sell Windows (or Office) as a Strength

    The 'cloud' mindset, which is promoted by surveillance fanatics, increasingly used to pretend that Microsoft has a bright future, despite declining sales



  29. New Windows Ransomware: No Branding, Not Even a Mention of Windows

    New example of media bias which completely omits Windows and spares Microsoft as that may lead to bad publicity



  30. VENOM® is Not a Serious Bug, It's Just a Marketing Campaign From CrowdStrike

    Many journalists bamboozled into becoming couriers of CrowdStrike, an insecurity firm which tries to market itself using a name and logo for a very old bug


CoPilotCo

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

CoPilotCo

Recent Posts