Thu Nov 21 23:52:22 2024
EVENTS
 FREE
SOFTWARE
INSTITUTE

POLITICS
JOBS
MEMBERS'
CORNER

MAILING
LIST

NYLXS Mailing Lists and Archives
NYLXS Members have a lot to say and share but we don't keep many secrets. Join the Hangout Mailing List and say your peice.

DATE 2014-06-01

HANGOUT

2024-11-21 | 2024-10-21 | 2024-09-21 | 2024-08-21 | 2024-07-21 | 2024-06-21 | 2024-05-21 | 2024-04-21 | 2024-03-21 | 2024-02-21 | 2024-01-21 | 2023-12-21 | 2023-11-21 | 2023-10-21 | 2023-09-21 | 2023-08-21 | 2023-07-21 | 2023-06-21 | 2023-05-21 | 2023-04-21 | 2023-03-21 | 2023-02-21 | 2023-01-21 | 2022-12-21 | 2022-11-21 | 2022-10-21 | 2022-09-21 | 2022-08-21 | 2022-07-21 | 2022-06-21 | 2022-05-21 | 2022-04-21 | 2022-03-21 | 2022-02-21 | 2022-01-21 | 2021-12-21 | 2021-11-21 | 2021-10-21 | 2021-09-21 | 2021-08-21 | 2021-07-21 | 2021-06-21 | 2021-05-21 | 2021-04-21 | 2021-03-21 | 2021-02-21 | 2021-01-21 | 2020-12-21 | 2020-11-21 | 2020-10-21 | 2020-09-21 | 2020-08-21 | 2020-07-21 | 2020-06-21 | 2020-05-21 | 2020-04-21 | 2020-03-21 | 2020-02-21 | 2020-01-21 | 2019-12-21 | 2019-11-21 | 2019-10-21 | 2019-09-21 | 2019-08-21 | 2019-07-21 | 2019-06-21 | 2019-05-21 | 2019-04-21 | 2019-03-21 | 2019-02-21 | 2019-01-21 | 2018-12-21 | 2018-11-21 | 2018-10-21 | 2018-09-21 | 2018-08-21 | 2018-07-21 | 2018-06-21 | 2018-05-21 | 2018-04-21 | 2018-03-21 | 2018-02-21 | 2018-01-21 | 2017-12-21 | 2017-11-21 | 2017-10-21 | 2017-09-21 | 2017-08-21 | 2017-07-21 | 2017-06-21 | 2017-05-21 | 2017-04-21 | 2017-03-21 | 2017-02-21 | 2017-01-21 | 2016-12-21 | 2016-11-21 | 2016-10-21 | 2016-09-21 | 2016-08-21 | 2016-07-21 | 2016-06-21 | 2016-05-21 | 2016-04-21 | 2016-03-21 | 2016-02-21 | 2016-01-21 | 2015-12-21 | 2015-11-21 | 2015-10-21 | 2015-09-21 | 2015-08-21 | 2015-07-21 | 2015-06-21 | 2015-05-21 | 2015-04-21 | 2015-03-21 | 2015-02-21 | 2015-01-21 | 2014-12-21 | 2014-11-21 | 2014-10-21 | 2014-09-21 | 2014-08-21 | 2014-07-21 | 2014-06-21 | 2014-05-21 | 2014-04-21 | 2014-03-21 | 2014-02-21 | 2014-01-21 | 2013-12-21 | 2013-11-21 | 2013-10-21 | 2013-09-21 | 2013-08-21 | 2013-07-21 | 2013-06-21 | 2013-05-21 | 2013-04-21 | 2013-03-21 | 2013-02-21 | 2013-01-21 | 2012-12-21 | 2012-11-21 | 2012-10-21 | 2012-09-21 | 2012-08-21 | 2012-07-21 | 2012-06-21 | 2012-05-21 | 2012-04-21 | 2012-03-21 | 2012-02-21 | 2012-01-21 | 2011-12-21 | 2011-11-21 | 2011-10-21 | 2011-09-21 | 2011-08-21 | 2011-07-21 | 2011-06-21 | 2011-05-21 | 2011-04-21 | 2011-03-21 | 2011-02-21 | 2011-01-21 | 2010-12-21 | 2010-11-21 | 2010-10-21 | 2010-09-21 | 2010-08-21 | 2010-07-21 | 2010-06-21 | 2010-05-21 | 2010-04-21 | 2010-03-21 | 2010-02-21 | 2010-01-21 | 2009-12-21 | 2009-11-21 | 2009-10-21 | 2009-09-21 | 2009-08-21 | 2009-07-21 | 2009-06-21 | 2009-05-21 | 2009-04-21 | 2009-03-21 | 2009-02-21 | 2009-01-21 | 2008-12-21 | 2008-11-21 | 2008-10-21 | 2008-09-21 | 2008-08-21 | 2008-07-21 | 2008-06-21 | 2008-05-21 | 2008-04-21 | 2008-03-21 | 2008-02-21 | 2008-01-21 | 2007-12-21 | 2007-11-21 | 2007-10-21 | 2007-09-21 | 2007-08-21 | 2007-07-21 | 2007-06-21 | 2007-05-21 | 2007-04-21 | 2007-03-21 | 2007-02-21 | 2007-01-21 | 2006-12-21 | 2006-11-21 | 2006-10-21 | 2006-09-21 | 2006-08-21 | 2006-07-21 | 2006-06-21 | 2006-05-21 | 2006-04-21 | 2006-03-21 | 2006-02-21 | 2006-01-21 | 2005-12-21 | 2005-11-21 | 2005-10-21 | 2005-09-21 | 2005-08-21 | 2005-07-21 | 2005-06-21 | 2005-05-21 | 2005-04-21 | 2005-03-21 | 2005-02-21 | 2005-01-21 | 2004-12-21 | 2004-11-21 | 2004-10-21 | 2004-09-21 | 2004-08-21 | 2004-07-21 | 2004-06-21 | 2004-05-21 | 2004-04-21 | 2004-03-21 | 2004-02-21 | 2004-01-21 | 2003-12-21 | 2003-11-21 | 2003-10-21 | 2003-09-21 | 2003-08-21 | 2003-07-21 | 2003-06-21 | 2003-05-21 | 2003-04-21 | 2003-03-21 | 2003-02-21 | 2003-01-21 | 2002-12-21 | 2002-11-21 | 2002-10-21 | 2002-09-21 | 2002-08-21 | 2002-07-21 | 2002-06-21 | 2002-05-21 | 2002-04-21 | 2002-03-21 | 2002-02-21 | 2002-01-21 | 2001-12-21 | 2001-11-21 | 2001-10-21 | 2001-09-21 | 2001-08-21 | 2001-07-21 | 2001-06-21 | 2001-05-21 | 2001-04-21 | 2001-03-21 | 2001-02-21 | 2001-01-21 | 2000-12-21 | 2000-11-21 | 2000-10-21 | 2000-09-21 | 2000-08-21 | 2000-07-21 | 2000-06-21 | 2000-05-21 | 2000-04-21 | 2000-03-21 | 2000-02-21 | 2000-01-21 | 1999-12-21

Key: Value:

Key: Value:

MESSAGE
DATE 2014-06-16
FROM From: "Michael L. Richardson"
SUBJECT Re: [NYLXS - HANGOUT] Stupidity of the highest order ...
Last I heard you can get taken to court for pointing out security flaws
in non-open source products, (if none are reported they must not be there).

einker wrote:
> Articles like this truly PISS ME OFF! Now, only Open Source Projects
> by their sheer adherence to open source philosophy are hampered by
> security flaws? BULLSHIT.
> I guess all Microsoft and Apple products never had any security issues
> (You wish!) and were pristine because commercial vendor tested them to
> a greater degree than open source projects.
> Give me a break! Commercial products are riddled with security and
> basic programming issues. Best of all, you will never know since you
> can't see the source/test and until its way too late and you've been
> screwed.
> One of my favorites, OpenBSD (Calm down Ruben! Nothing personal and
> Theo does love you...) has only to remote holes in their base OS
> install in the late 10 or more years.
>
> It's amazing that Paul Rubens calls out open source / free software
> yet has the audacity to reference free and open source security
> programs on his website (rubens.org linking to
> http://www.clippings.me/paulrubens).
> Isn't it amazing how you use the products but then bash their security
> status and have the nerve to say that security reviews were never done.
> For what its worth, if you have doubts/concerns about open source /
> free software, do the rest of the planet a real service, don't use it.
> More importantly, dig your head from out of your ass and check out the
> plethora of opens ource / free source projects that have been
> responsible for running and maintaining the internet for years. I
> would strongly suggest looking ta netcraft surveys and then ask why is
> everyone using free OS / servers to host on as opposed
> to commercial offerings. Could it be SECURITY, VIABILITY or even
> should i say it..... Best software going for the job!
>
> For the Rubens of the World, please all turn off your computers
> whatever you are suing and please go live in a cave with the other
> Neanderthals!
>
>
> Why open source software isn't as secure as you think
>
> A failure to spot a necessary validation in OpenSLL code before an
> update caused the Heartbleed bug
>
> Paul Rubens (CIO (US))
> on 13
> June, 2014 08:56
>
>
> The OpenSSL Heartbleed fiasco
>
> proves beyond any doubt what many people have suspected for a long
> time: Just because open source code is available for inspection
> doesn't mean it's actually being inspected and is secure.
>
> It's an important point, as the security of open source software
> relies on large numbers of sufficiently knowledgeable programmers
> scrutinising the code to root out and fix bugs promptly. This is
> summed up in Linus's Law :
> "Given enough eyeballs, all bugs are shallow."
>
> But look at what happened with OpenSSL. Robin Seggelemann, a German
> programmer from Munster University, updated the OpenSLL code by adding
> a new Heartbeat keep-alive function. Unfortunately, he missed a
> necessary validation in his code to check that one particular variable
> had a realistic value.
>
> The member of the OpenSSL development team who checked the code before
> the update was released also missed it. This caused the Heartbleed bug.
>
> One reviewer, even a handful of reviewers, can easily miss a trivial
> error such as this if they don't know there's a bug to be found.
> What's worrying is that, for two years, the Heartbleed bug existed in
> OpenSLL, in browsers and in Web servers, yet no one in the open source
> community spotted it. Not enough eyeballs scrutinised the code.
>
> *Commercial vendors don't review open source code*
>
> Also alarming is that OpenSSL was used as a component in hardware
> products offered by commercial vendors such as F5 Networks, Citrix
> Systems, Riverbed Technology and Barracuda Networks - all of whom
> failed to scrutinise the code adequately before using it, according to
> Mamoon Yunus, CEO of Forum Systems , a
> secure cloud gateway vendor.
>
> "You would think that it would be my responsibility as a vendor, if I
> commercialise OpenSSL, to put my eyeballs on it," he says. "You have
> to take a level of ownership of the code if you build a company based
> on an open source component."
>
> Instead, Yunus believes vendors just regarded OpenSSL as a useful
> bolt-on to their hardware products - and, since it was open source,
> assumed other people were examining the code.
>
> "Everyone assumed other eyeballs were looking at it. They took the
> attitude that it was a million other people's responsibility to look
> at it, so it wasn't their responsibility," he says. "That's where the
> negligence comes in from an open source angle."
>
> **
>
> Yunus suggests that commercial vendors should run effective peer
> review programs for any open source code that they use, run static and
> dynamic analysis tools over it and "fuzz" the code to ensure it's as
> bug-free as possible. "What have these companies been doing for the
> last 10 or 15 years? If I were them, I would be taking a long, hard
> look at QA processes."
>
> In fact, Yunus questions whether OpenSSL should ever have been written
> in a relatively low-level language such as C
> ,
> echoing security expert Bruce Schneier
>
> by suggesting it could be seen as "criminal negligence" to use a
> language that lacks memory management for such a security sensitive
> application.
>
> Jeffrey Hammond, a security analyst at Forrester Research, contradicts
> this view. He points out that performance is a key attribute of
> OpenSSL as it has to deal with huge volumes of packets.
>
> "If you have access to memory you are going to be open to some types
> of attacks, but you get the performance," Hammond points out. "I
> wouldn't say they should never have developed OpenSSL in C, but it's
> true that with performance comes responsibility."
>
> *OpenSSL, Truecrypt show limits of open source code review*
>
> One problem facing many open source projects - and the reason it's
> hard to blame Seggelemann or the rest of the OpenSSL team - is that
> carrying out a rigorous code security review is immensely time
> consuming and requires a high level of skill. That means it's very
> expensive.
>
> This is illustrated by another open source project: The TrueCrypt
> encryption program. The code has been open to anyone who cares to look
> at it since the project started 10 years ago - but it's only very
> recently, following fundraising campaigns on Indiegogo and Fundfill
> that yielded US$60,000, that the code has undergone a proper security
> audit.
>
> **
>
> An initial report
>
> into just the bootloader and Windows kernel driver of the program
> identified 11 vulnerabilities, said that the quality of the source
> code was bad and pointed out that compiling TrueCrypt from source
> required using outdated (in one case, 21-year-old) and unsigned build
> tools that could be modified maliciously and that are hard to access
> from trustworthy sources.
>
> The code auditors said, "Overall,
> the source code for both the bootloader and the Windows kernel driver
> did not meet expected standards for secure code. "
>
> What's worrying is that this only came to light after funds where
> raised to hire the resources to carry out a code review. The open
> source community had plenty of opportunities to do this over the last
> 10 years - but the truth is that the community doesn't have the time,
> skills or resources (including money) to do the job properly.
>
> A new problem will affect the security of OpenSSL going forward, too:
> The code is being forked, thanks to an initiative called LibreSSL
> led by the OpenBSD
> team. LibreSSL is intended to be a stripped
> down version of OpenSSL; in the first week of the LibreSLL project,
> more than 90,000 lines of code were removed, including those
> supporting operating systems such as VMS and OS/2.
>
> The problem, simply stated: Since it's easy to see what's being
> removed from LibreSSL, and which bits are being replaced as they're
> deemed insecure, OpenSSL users are left exposed to malicious hackers
> who may exploit the weaknesses that LibreSSL discovers and removes -
> that is, unless the OpenSSL project can keep up with LibreSSL's progress.
>
> Security by obscurity is never a good idea, but once vulnerabilities
> are made public, they need to be fixed right away. It's not clear that
> the OpenSSL team is in a position to do that - it's said that the
> project only had one full-time maintainer - or that software and
> hardware products that use OpenSSL will necessarily be updated
> promptly even if the OpenSSL software itself is.
>
> *Taking open source security seriously after Heardbleed*
>
> The good news for those concerned about the security of open source
> projects like OpenSSL is that help could be on its way in the shape of
> the Core Infrastructure Initiative (CII)
> ,
> a new project founded by the Linux Foundation in response to
> Heartbleed. Its purpose is to funnel needed money into software
> projects such as OpenSSL that are critical to the functioning of the
> Internet.
>
> "Our global economy is built on top of many open source projects,"
> says Jim Zemlin, the Linux Foundation's executive director. "We will
> now be able to support additional developers and maintainers to work
> full-time supporting other essential open source projects."
>
> Support from the CII may also include funding for security audits,
> computing and test infrastructure. So far, about US$4 million has been
> pledged over the next three years by companies including Google,
> Microsoft and Facebook.
>
> /Paul Rubens is a technology journalist based in England. Contact him
> at paul-at-rubens.org ./
>
>
>
>
>
>
>
> --
> Regards,
>
> Evan M. Inker

  1. 2014-06-08 Ruben Safir <mrbrklyn-at-panix.com> Subject: [NYLXS - HANGOUT] Section 8
  2. 2014-06-08 eminker-at-gmail.com Re: [NYLXS - HANGOUT] Section 8
  3. 2014-06-08 eminker-at-gmail.com Re: [NYLXS - HANGOUT] Section 8
  4. 2014-06-08 Ruben Safir <mrbrklyn-at-panix.com> Subject: [NYLXS - HANGOUT] Meeting
  5. 2014-06-09 Ruben Safir <mrbrklyn-at-panix.com> Subject: [NYLXS - HANGOUT] Re: Meeting
  6. 2014-06-10 Ruben Safir <mrbrklyn-at-panix.com> Subject: [NYLXS - HANGOUT] Movie Night!
  7. 2014-06-11 From: "Michael L. Richardson" <mlr52-at-michaellrichardson.com> Re: [NYLXS - HANGOUT] Movie Night!
  8. 2014-06-12 Ruben Safir <mrbrklyn-at-panix.com> Re: [NYLXS - HANGOUT] Movie Night!
  9. 2014-06-13 Ron Guerin <ron-at-vnetworx.net> Re: [NYLXS - HANGOUT] Movie Night!
  10. 2014-06-15 Ruben Safir <mrbrklyn-at-panix.com> Re: [NYLXS - HANGOUT] Movie Night!
  11. 2014-06-15 Ron Guerin <ron-at-vnetworx.net> Re: [NYLXS - HANGOUT] Movie Night!
  12. 2014-06-16 Ruben Safir <mrbrklyn-at-panix.com> Re: [NYLXS - HANGOUT] Movie Night!
  13. 2014-06-16 einker <eminker-at-gmail.com> Subject: [NYLXS - HANGOUT] Stupidity of the highest order ...
  14. 2014-06-16 From: "Michael L. Richardson" <mlr52-at-mycouponmagic.com> Re: [NYLXS - HANGOUT] Stupidity of the highest order ...
  15. 2014-06-16 Ruben Safir <mrbrklyn-at-panix.com> Re: [NYLXS - HANGOUT] Stupidity of the highest order ...
  16. 2014-06-16 Ruben Safir <mrbrklyn-at-panix.com> Re: [NYLXS - HANGOUT] Stupidity of the highest order ...
  17. 2014-06-16 Ruben Safir <mrbrklyn-at-panix.com> Re: [NYLXS - HANGOUT] Stupidity of the highest order ...
  18. 2014-06-17 Ruben Safir <mrbrklyn-at-panix.com> Re: [NYLXS - HANGOUT] Movie Night II
  19. 2014-06-18 Ruben Safir <mrbrklyn-at-panix.com> Re: [NYLXS - HANGOUT] Oh look! It is the cops
  20. 2014-06-27 Ruben Safir <mrbrklyn-at-panix.com> Subject: [NYLXS - HANGOUT] Movie Week III
  21. 2014-06-27 Ron Guerin <ron-at-vnetworx.net> Subject: [NYLXS - HANGOUT] The Internet's Own Boy
  22. 2014-06-30 Ruben Safir <mrbrklyn-at-panix.com> Subject: [NYLXS - HANGOUT] [info-at-fegs.org: NYNP - FEGS Gets $925K Robin Hood Grant for
  23. 2014-06-30 Ruben Safir <mrbrklyn-at-panix.com> Subject: [NYLXS - HANGOUT] NYNP - FEGS Gets $925K Robin Hood Grant for Integrated Care Model
  24. 2014-06-30 From: "Redpill" <red.pill-at-verizon.net> RE: [NYLXS - HANGOUT] NYNP - FEGS Gets $925K Robin Hood Grant for

NYLXS are Do'ers and the first step of Doing is Joining! Join NYLXS and make a difference in your community today!