June 2003; Volume 4, Number 5![]() ![]() |
||||||||||
Loose Lips Sink Ships | ||||||||||
DARPA quietly cuts OpenBSD's funding, but the secure OS still sails. This is a tale of two stories: First, making the most news, is the April 21, 2003 cancellation of Defense Advanced Research Projects Agency funding for the remainder of the OpenBSD project's contract through the University of Pennsylvania for its work on secure operating systems; second, and less-noticed, is the May 1 release of OpenBSD 3.3. While the first story has all the right elementspolitics, free speech and military intrigue—there's no smoking gun. Meanwhile, the second story received cursory attention, though its impact is likely to be extensive. The Quote that Ended It
All
"Foreign entities often receive grants if they're capable of doing the work described in the solicitation," Walker says, explaining that while some solicitations also contain restrictions about who may qualify to do research on the topic, this one did not. "We were not funding OpenBSD—we are continuing to fund the POSSE project at the University of Pennsylvania. We were interested in stopping work only on that particular area [the hackathon]. Our communications were the same as always. In certain communities, high-tech communities, the word gets out faster." Meanwhile, de Raadt is still fuming: "Air Force Material Command told the university to cease all operations, and they went aggressively after the funds. The contracting company I work for did the absolute least they could for me. Numerous lawyers from Pennsylvania and the Air Force went after the $8,000 that was left in the account for me." And de Raadt's frustration extends to Professor Smith: "Jonathan Smith told me not to exercise my right to free speech. A tenured professor's job is to, one, get grant money; two, recognize when the rights of his researchers are being trampled on; and three, use his tenure to protect them."
Walker disagrees that the reasons are ever arbitrary: "DARPA is a very hands-on management activity. As our name implies, we fund specific projects. There's a start point and an end point. Our goal is not to build infrastructure at universities. Most of the time, we award funding in phases; the first phase is usually 18 months. Our milestones are set up at the outset, and the researchers know what they are." DARPA's motivation remains murky, but OpenBSD is not, says Spafford: "It's full-featured, stable, free, well maintained and well documented." Though he won't review the anti-buffer overflow advances in version 3.3 until the summer, "I've read about what they've done, and it's fully appropriate. OpenBSD is one of leading candidates [as a platform] for two major research projects here: One is a sensor-based intrusion detection system; the other is a software server architecture." "The bigger problem," Spafford notes, "is that the open-source community doesn't give OpenBSD as much attention and use as it does other operating systems that aren't as reliable."
A Canary on the Stack At compilation time, "ProPolice places a random canary on every stack frame, snuck in at exactly the right place on the stack. If the value's unmodified, everything runs fine, but if it's modified, the program is terminated," explains de Raadt, and this complicates attacking attempts to change a function's return address. To avoid pointer corruption, Etoh's approach reorders local variables to place buffers after pointers and copies pointers in function arguments to an area preceding local variable buffers. To speed performance, it omits instrumentation code from some functions.
For those architectures that can support it, OpenBSD
offers a "fine-grained memory permissions layout"
called W^X (and pronounced "W xor X").
In de Raadt's words, "It's a policy for mapping
processes so that you never have a page that's both
writable and executable. Most buffer overflows rely
on being able to write to a piece of memory and then
jump to it." Finally, other security enhancements
include heavy use of chroot, privilege separation for
the X window server and xconsole, default RSA blinding
in
"The idea of removing implementation bugs like buffer overflows is always a good start," says Gary McGraw, CTO of Cigital, a software quality firm. "You can do this statically or place dynamic checks in the code. However, removing buffer overflows alone won't suffice. You need to get the architecture right from a security perspective, too. The open-source guys have a harder time controlling architecture in the chaos." That, and playing politics. —Alexandra Weber Morales |
||||||||||
From SARS to Mars | ||||||||||
A high-tech brainstorm can only
take you so far. I recently had lunch with a friend, a computer science researcher whom I met years ago at a conference. He was lamenting about what he should do if Sudden Acute Respiratory Syndrome (SARS) was still at epidemic levels when he was to attend a workshop in Japan in a few months. "Should I go, or shouldn't I?" he wondered. "Is there any doubt?" I asked, remembering his deathly brush with pneumonia. Then I started thinkingI'd just attended a conference where a keynote speaker from China was unable to attend a meeting in San Diego, perhaps for SARS-related travel reasons. His remote, big-screen presentation wasn't so badhe even took questions afterwards. "But I don't want that to happen," my friend said, "I want to go to Japan. The real value is in the exchange of ideas with other researchers in the field"not to mention his love of traveling.
We then explored all sorts of alternatives to personal attendance. Continental meeting points running identical conference sessions could be patched into a hosting site, allowing you to network outside of your regionnot as fluidly as an international face-to-face would, but perhaps a viable option. Networking kiosks at events with huge screens transmitting live video from locations around the world could be set up around a cocktail lounge with long-distance "pagers." If you wanted to converse with someone on the video conference screen, you could beep him by entering his number (each member would wear an identifier of some sort) and go to a private kiosk to conduct a screen-to-screen interaction. We laughed. It could be real fun, but what if you were interested in "meeting" someone? "There would be lots of potential for small talk-and with less inhibition," I mused. "Forget about the technical worldthis could be a fantastic new dating model!"
My friend had one more objection: "How about the
latency?" You know, that annoying, protracted,
question-response delay that's ubiquitous with remote
video and TV communication,dashing any hope for a truly
spontaneous, productive interaction. "Not a problem,"
I answered. "In fact, it's a great opportunity.
If light travels around the globe seven times in one
second, it seems like we should be able to solve that
one." I could see dollar signs on the horizon for
technical start-ups that addressed these sorts of teleconferencing
problems with giant towers, faster data compression,
asynchronous messages and any number of other tricks.
Well, back to the drawing board. Rosalyn Lum |