RE: [TSCM-L] Re: China broadens espionage operations
>From - Sat Mar 02 00:57:19 2024
Received: by 10.50.47.132 with SMTP id d4mr4716165ign.1.1329157974273;
Mon, 13 Feb 2012 10:32:54 -0800 (PST)
MIME-Version: 1.0
X-BeenThere: tscm-l2006_at_googlegroups.com
Received: by 10.50.154.193 with SMTP id vq1ls8144207igb.1.canary; Mon, 13 Feb
2012 10:32:52 -0800 (PST)
Received: by 10.43.53.73 with SMTP id vp9mr6164868icb.0.1329157972929;
Mon, 13 Feb 2012 10:32:52 -0800 (PST)
Received: by 10.50.209.5 with SMTP id mi5msigc;
Fri, 10 Feb 2012 05:39:37 -0800 (PST)
Received: by 10.100.81.18 with SMTP id e18mr4294548anb.12.1328881176170;
Fri, 10 Feb 2012 05:39:36 -0800 (PST)
Received: by 10.100.81.18 with SMTP id e18mr4294547anb.12.1328881176147;
Fri, 10 Feb 2012 05:39:36 -0800 (PST)
Return-Path:
Received: from absinthe.tinho.net (absinthe.tinho.net. [166.84.5.228])
by gmr-mx.google.com with ESMTP id m29si4011793qco.0.2012.02.10.05.39.33;
Fri, 10 Feb 2012 05:39:33 -0800 (PST)
Received-SPF: neutral (google.com: 166.84.5.228 is neither permitted nor denied by best guess record for domain of d..._at_geer.org) client-ip6.84.5.228;
Authentication-Results: gmr-mx.google.com; spf=neutral (google.com: 166.84.5.228 is neither permitted nor denied by best guess record for domain of d..._at_geer.org) smtp.mail
..@geer.org
Received: by absinthe.tinho.net (Postfix, from userid 126)
id 8DCC233DA9; Fri, 10 Feb 2012 08:39:33 -0500 (EST)
Received: from absinthe.tinho.net (localhost [127.0.0.1])
by absinthe.tinho.net (Postfix) with ESMTP id 8C24333C55
for ; Fri, 10 Feb 2012 08:39:33 -0500 (EST)
From: d..._at_geer.org
To: tscm-l2006_at_googlegroups.com
Subject: Re: [TSCM-L] {6042} Stolen Symantec source code posted online by hacker
In-Reply-To: Your message of "Fri, 10 Feb 2012 10:50:23 GMT."
Date: Fri, 10 Feb 2012 08:39:33 -0500
Message-Id: <20120210133933.8DCC233DA9_at_absinthe.tinho.net>
Point of information:
> Symantec said the source code was for 2006 products that had
> since been updated with newer code.
That is likely true, but "updated" and "rewritten using no libraries
of the era or anything else" are pretty different.
The paper listed below was a thorough review of bug lifetime in
OpenBSD which, as you may know, is driven by folks who see security
of their code as Job 1, not a necessary nuisance. As such, the
persistence (half-life) of bugs, the fraction of them that are
security-related, the version-to-version forward propagation of
existing code-base problems, etc., are, with OpenBSD, quite likely
as good as it gets. One thus can plausibly conclude that other
code-bases are no better than the OpenBSD code-base when one's
metric is the probability of carry-forward security bugs.
This is written not to diverge this list into a thread on software
security, merely to contextualize the Symantec claim. As with so
much in software security, many things which are true are also
irrelevant. Symantec's statement falls in that category.
--dan
See
http://www.usenix.org/events/sec06/tech/ozment.html
Received on Sat Mar 02 2024 - 00:57:19 CST
This archive was generated by hypermail 2.3.0
: Sat Mar 02 2024 - 01:11:44 CST