Apple Cites Open Source Core Security 69
ChilyMack writes "In a CNet article, Apple senior vice president Bertrand Serlet says, 'A lot of security problems derive from the core ... [With open source code,] thousands of people look at the critical portions of source code and ... check those portions are right. It's a major advantage to have open-source code.'"
Yeah... (Score:4, Funny)
I remember this from when I was a kid (Score:3, Funny)
A: Finding half of a worm.
...and this is why we love Apple. (Score:5, Insightful)
This is what Apple's always done that's kept them around... their products are dirt simple, yet really powerful in hands that know how to put them to work.
In the words of a motivational book-on-tape foisted on me recently, it's not enough to have satisfied customers, you need to create raving fans. I bought my first Apple (Pbook G4 1.25) in May, and I've been raving about it ever since. mmm.... iMac...
Re:...and this is why we love Apple. (Score:3, Interesting)
Re:...and this is why we love Apple. (Score:1, Flamebait)
But then again, ignoring reality in favor of pretending statements like that OSS is the solution to all problems, that Windows is the worst piece of software ever written, and that all corporations are huge evil entities out to ge
Milton was wrong (Score:3, Insightful)
The fact that a falsehood can be stated with great precision, style, or in a moving manner does not change its "false" nature. For example my corporation's goal may be to maximize profit by designing and developing the most effective and reliable medical equipment.
And of course charities, open source developers, etc. can be unethical. Welcome to the real world, sound bites, or in Milton's case word bites, are not the ultimate source of knowledge or fact. Writers ha
Re:Milton was wrong (Score:2)
And in twenty years, your corporation is maximizing profit by selling that medical equipment at incredibly inflated prices. leading to an overall rise in the cost of medical care, and eventually there's a whole class of people (at least in some
Re:Milton was wrong (Score:3, Informative)
Inflating prices invites competition, that does not maximize profit. Subsidizing needy hospitals in the third world can give me tax write offs, generate good publicity, and strengthen business relationships. Thos
Hold Yer Horses! (Score:3, Funny)
The fundamental difference? When Jobs says something is cool, it's cool. When random execs at Apple say something's cool it means nothing.
At least, that's the way it seems to work...
Re:Hold Yer Horses! (Score:3, Funny)
You had me convinced, right up until I realized it was your sig that convinced me. Then my head exploded.
Re:Hold Yer Horses! (Score:2)
seemed the most obvious place to put it. I've always wanted to be a head-explodey-fu master. I shall call this attack "The nine fingered blow of the code monkey"
Re:It's the open source! (Score:5, Insightful)
Re:It's the open source! (Score:1, Interesting)
Re:It's the open source! (Score:2)
Re:It's the open source! (Score:2)
"And others are probably spoofing Apache to throw hackers off the scent, so Netcraft numbers" is not a complete sentence.
Re:It's the open source! (Score:2)
Re:It's the open source! (Score:1)
Re:It's the open source! (Score:5, Insightful)
You've misunderstood what the "Apache versus IIS" example represents.
It shows that open source can be secure. Apache is indeed a more attractive target because it does have a larger marketshare. However, attacks are unsuccessful because Apache is more secure than IIS.
This doesn't mean that marketshare is irrelevant. Quite the opposite. It means that good code can withstand the added attention a marketleader attracts.
You cannot make a parallel between Apache and OSX however. Apache is a product that proves a concept is sound; that open source can be secure even when it is a very attractive target. This doesn't mean all open source is secure, and it certainly doesn't mean that OSX won't be targetted more as its marketshare increases. OSX will be targetted more.
Re:It's the open source! (Score:2)
You've misunderstood what the "Apache versus IIS" example represents...
You cannot make a parallel between Apache and OSX however. Apache is a product that proves a concept is sound; that open source can be secure even when it is a very attractive target. This doesn't mean all open source is secure, and it certainly doesn't mean that OSX won't be targetted more as its marketshare increases. OSX will be targetted more.
And you understood what the example represents, but then lost the message at the end. Th
Re:It's the open source! (Score:4, Interesting)
It possibly does.
361 Apache Advisories on Buqtraq [securityfocus.com] VS 141 IIS advisories [securityfocus.com]
A rough and cheap example, but never the less a belief that Apache is somehow super secure is a nonsense.
The many eyes argument is a tired one - how many people actually check the code, how many of those people are experienced enough to find vulnerabilities?
Look at the DARPA [theregister.co.uk] funded Linux Security effort. It died because noone was contributing.
Open source is great because you can read the code, but a belief that someone else must be auditing that code leads to security through delusionment - unless YOU are auditing the code, and unless YOU are trained to know how to audit it well, don't assume anyone else is.
Odd they bring this up now (Score:5, Interesting)
Although, if Steve Jobs points that out in an interview, then how low-profile can it really be?
Re:Odd they bring this up now (Score:1, Offtopic)
Re:Odd they bring this up now (Score:2, Informative)
Re:Odd they bring this up now (Score:2, Informative)
That's not entirely true, there are many tutorials on discovering and exploiting security holes on Linux / Unix platforms.
Everything from the classic Smashing The Stack For Fun And Profit [insecure.org] paper to more recent ones.
Bugtraq deliveries daily reports of exploitable flaws in software lots of it for Unix systems - granted that few people use most of the toy packages which people post bugs for, but they still exist and it's still mostly trivial to discover them.
I audit code [debian.org] and it's depressingly easy to find f [shellcode.org]
open source is like proofreading (Score:5, Insightful)
I mean seriously - if something is important to you, do you just turn it in w/o someone else giving it the once over? My wife reads every talk I give and vise-versa. WE ALWAYS catch mistakes that the other person has made.
It's a no-brainer.
Re:open source is like proofreading (Score:5, Insightful)
A million ignorant eyes won't be able to spot a buffer overflow even if it bites them.
Re:open source is like proofreading (Score:2)
Re:open source is like proofreading (Score:3, Insightful)
And equally Open Source doesn't work because there is no controlled review process. In most (not all) projects only one pair of eyes will every consider a particular piece of code. Another may touch on it in passing. But seldom is each function thoroughly reviewed, line by line, for correctness.
Open Source gives you the ability to have a million eyes inspecting the code. It doesn't necessarily cause that the happen.
What we need in the FLOSS world is a code review system similar to Project Gutenberg'
Re:open source is like proofreading (Score:1)
Perhaps it can be done using a mechanism modeled on the slashcode karma/moderation/metamoderation system. (It seems that this might be valuable CVS functionality for some kinds of projects).
The peer review of code is somewhat different from sifting the chaff in slashdot, but the parallel is there, and the automated negative feedback process that the slashadmins invented certainly solves some of the problems.
Er, bad pun (Score:1)
Shame they left out the secure bits.... (Score:1, Interesting)
Well... (Score:3, Interesting)
Though most of the directly network-exposed stuff seems to be generally open source (well, dunno about Rendevous).
Re:Well... (Score:4, Interesting)
Though most of the directly network-exposed stuff seems to be generally open source (well, dunno about Rendevous).
There's an simple rendezvous implementation that's open source called mDNSResponder. This is the library released for linux and darwin.
However, this is not what OSX apps use for rendezvous. They call functions in the core services. The code in the core services is not opensource and probably uses little of the mDNSResponder library.
But even if it did use the mDNSResponder library, just because it's open source doesn't mean it is secure.
At the core of mDNSResponder is a single 318k file called mDNS.c
It is really tough to work on because it is such a huge mess.. and this is the code they released to the public.
Re:Well... (Score:3, Interesting)
Obviously -- but there's a pretty good argument that it helps improve security (other factors being held the same, naturally).
Re:Well... (Score:2)
The entire architecture is like that: Applications use frameworks, APIs and system calls to get services, which are often provided by UNIX daemons.
Evidence too... (Score:1, Insightful)
(exceptions in recent libpng and libz exploits)
Re:Evidence too... (Score:3, Informative)
That's not even remotely true. When you run Software Update, Apple lists exactly what's being updated and all of the security updates have been primarily updating free software.
And that doesn't even address your use of the word "exploits" as there have been none to date, just potential exploits and "proofs of concept" that are at best nominal exploits.
Security Updates != Exploits (Score:1)
Re:Security Updates != Exploits (Score:2)
I wasn't disputing the article. In fact I agree with the article. I was disputing that Apple's security flaws have been from their proprietary software and that the answer to their (nonexistent) problem is to open source the whole thing.
"When discussing this, keep in mind how many more eyes OSS can train on code, and how much faster those patches can be created."
I care nothing about how many eyes see the code as how many brains do.
Totally misses the boat on security (Score:2, Informative)
I'll also remind everyone that it has had it's share of URI handler problems, but of course people will claim they only had those problems because they used a closed-source browser. Well I've seen enough Mozilla and Opera security patch
Re:Totally misses the boat on security (Score:2)
Of course, I'd hate to see what a few powerbooks infected could do with their builtin wifi. If nothing else, it should bring the airs
Re:Totally misses the boat on security (Score:2)
Its obvious you know nothing about Apple computers.
Re:Totally misses the boat on security (Score:5, Insightful)
I wouldn't call it irrational. Sometimes people vent their anger irrationally, but the cause of that anger is generally quite rational indeed.
And your assertion:
"So really, there are two reasons why Mac OS has not had mass exploits:
1.) Obscure
2.) Not an emotional target"
is pure speculation. If they were the sole reasons, then you'd expect at least one actual exploit to surface in the wild. I'm sure they are factors, but how about it's easier to write viruses/worms/trojans for Windows? And the fact that MS waits so long before security updates?
In short, there are not, simply, "two reasons why Mac OS has not had mass exploits".
Re:Totally misses the boat on security (Score:3, Interesting)
Macs have been around for what, 20 years? I don't know a single graphic designer who hasn't at least spent a fair amount ( if not all) of their time on them.
Obviously, Macs aren't number 1, but as regards *personal* computing they're definitely number 2. Macs have a huge mindshare. Macs are everywhere from schools to businesses to government and even science.
Saying the Mac is obscure is like saying Zenith is obscure because Sony has #1 marketshar
Re:Totally misses the boat on security (Score:3, Interesting)
These things are not mutually exclusive. OS X may, in fact, be more secure because it uses open source, and also has fallen to fewer (zero?) exploits in part because it has smaller market share.
I'll also remind everyone that it has had it's share of URI handler problems, but of course people will claim they only had those problems because they used a closed-source browser.
True, but that was a prob
rabid (Score:2)
As for the cheerleading squad, you can't go 6 inches on
Re:Totally misses the boat on security (Score:3, Interesting)
You're at least partially right, though there is room for disagreement (the way Windows puts all the metadata about executability in the file extension is a fundamental flaw, I'd say).
In the end, it doesn't matter why Mac OS X has fewer security problems - it only matters that it does have fewer problems.
Right now, if you're using file formats and applications that are standards-based and/or cros
Re:Totally misses the boat on security (Score:3, Interesting)
Yes and no.
Yes, in that of course, for you and I in there here and now, this is most important in practical terms. We can both get on with our work with fewer hassles.
No, in that the why is important for several reasons. I think it's important to look at the obscurity angle, and break it down into two areas. 1) is that obviously because there are fewer Macs as compared to Windows mac
Re:Totally misses the boat on security (Score:2, Insightful)
A third reason that Macs have fewer attacks is that fewer of the l33t kiddies actually own them.
There's no way I could write code that attacked a Mac without having one to play with - and I don't.
I've got a collection of PCs and a collection of Sun boxes, but no Macs.
OMG! Vulnerabilities! (Score:1)
Re:Totally misses the boat on security (Score:2)
you're missing a boat too... (Score:2)
I'm talking about "cross zone exploits". Until Microsoft merged the desktop and the browser the whole idea of a program that was designed to handle untrusted documents, particularly something like a web browser, tha
Re:Totally misses the boat on security (Score:2)
A default installation of the consumer-version of OS X ships with zero network services turned-on by default. Run nmap at a fresh installation of OS X on the same network, you won't get a single hit.
Windows has FOR YEARS shipped with network services that were turned-on by default that the vast majority of end-users would never need. Start with IIS. samba. xmlrpc. FOR YEARS windows machines have been exploited without the help of their users, for just being "turned-on". The most virulent cases really st
Re:Totally misses the boat on security (Score:1)
We saw, when the proof-of-concept virus came out, the media jumped all over it. Imagine the attention the first real OS X virus would get!
Ego driven scriptkiddies (Score:1)
Makes financial sense. (Score:2, Insightful)