[iwar] [fc:Study:.Open.source.poses.security.risks]

From: Fred Cohen (fc@all.net)
Date: 2002-06-03 13:35:33


Return-Path: <sentto-279987-4755-1023136366-fc=all.net@returns.groups.yahoo.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Mon, 03 Jun 2002 13:37:08 -0700 (PDT)
Received: (qmail 2884 invoked by uid 510); 3 Jun 2002 20:32:19 -0000
Received: from n9.grp.scd.yahoo.com (66.218.66.93) by all.net with SMTP; 3 Jun 2002 20:32:19 -0000
X-eGroups-Return: sentto-279987-4755-1023136366-fc=all.net@returns.groups.yahoo.com
Received: from [66.218.66.95] by n9.grp.scd.yahoo.com with NNFMP; 03 Jun 2002 20:32:46 -0000
X-Sender: fc@red.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-8_0_3_2); 3 Jun 2002 20:32:46 -0000
Received: (qmail 60878 invoked from network); 3 Jun 2002 20:32:46 -0000
Received: from unknown (66.218.66.217) by m7.grp.scd.yahoo.com with QMQP; 3 Jun 2002 20:32:46 -0000
Received: from unknown (HELO red.all.net) (12.232.72.152) by mta2.grp.scd.yahoo.com with SMTP; 3 Jun 2002 20:32:45 -0000
Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g53KZXR31979 for iwar@onelist.com; Mon, 3 Jun 2002 13:35:33 -0700
Message-Id: <200206032035.g53KZXR31979@red.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL3]
From: Fred Cohen <fc@all.net>
X-Yahoo-Profile: fcallnet
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Mon, 3 Jun 2002 13:35:33 -0700 (PDT)
Subject: [iwar] [fc:Study:.Open.source.poses.security.risks]
Reply-To: iwar@yahoogroups.com
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: quoted-printable
X-Spam-Status: No, hits=0.0 required=5.0 tests=DIFFERENT_REPLY_TO version=2.20
X-Spam-Level: 

Study: Open source poses security risks

By Matthew Broersma, ZDNet UK, 5/31/02
<a href="http://zdnet.com.com/2100-1104-929669.html">http://zdnet.com.com/2100-1104-929669.html>

A conservative U.S. think tank suggests in an upcoming report that
open-source software is inherently less secure than proprietary
software, and warns governments against relying on it for national
security. 
The white paper, Opening the Open Source Debate, from the Alexis de
Tocqueville Institution (ADTI) will suggest that open source opens the
gates to hackers and terrorists. 
"Terrorists trying to hack or disrupt U.S. computer networks might find
it easier if the federal government attempts to switch to 'open source'
as some groups propose," ADTI said in a statement released ahead of the
report. 
Open-source software is freely available for distribution and
modification, as long as the modified software is itself available under
open-source terms. The Linux operating system is the best-known example
of open source, having become popular in the Web server market because
of its stability and low cost. 
Many researchers have also suggested that since a large community
contributes to and scrutinizes open-source code, security holes are less
likely to occur than in proprietary software, and can be caught and
fixed more quickly. 
The ADTI white paper, to be released next week, will take the opposite
line, outlining "how open source might facilitate efforts to disrupt or
sabotage electronic commerce, air traffic control or even sensitive
surveillance systems," the institute said. 
"Computer systems are the backbone to U.S. national security," said ADTI
Chairman Gregory Fossedal. "Before the Pentagon and other federal
agencies make uninformed decisions to alter the very foundation of
computer security, they should study the potential consequences
carefully."

------------------------ Yahoo! Groups Sponsor ---------------------~-->
The FREE Server Security Guide shows you how: • DEPLOY THE LATEST ENCRYPTION and authentication techniques • DELIVER TRANSPARENT PROTECTION with the strongest security
without disrupting users. And more. Get your FREE Guide now:
http://us.click.yahoo.com/B62TUC/KyKEAA/sXBHAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2003-08-24 02:46:32 PDT