Return-Path: <sentto-279987-4755-1023136366-fc=all.net@returns.groups.yahoo.com> Delivered-To: fc@all.net Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Mon, 03 Jun 2002 13:37:08 -0700 (PDT) Received: (qmail 2884 invoked by uid 510); 3 Jun 2002 20:32:19 -0000 Received: from n9.grp.scd.yahoo.com (66.218.66.93) by all.net with SMTP; 3 Jun 2002 20:32:19 -0000 X-eGroups-Return: sentto-279987-4755-1023136366-fc=all.net@returns.groups.yahoo.com Received: from [66.218.66.95] by n9.grp.scd.yahoo.com with NNFMP; 03 Jun 2002 20:32:46 -0000 X-Sender: fc@red.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-8_0_3_2); 3 Jun 2002 20:32:46 -0000 Received: (qmail 60878 invoked from network); 3 Jun 2002 20:32:46 -0000 Received: from unknown (66.218.66.217) by m7.grp.scd.yahoo.com with QMQP; 3 Jun 2002 20:32:46 -0000 Received: from unknown (HELO red.all.net) (12.232.72.152) by mta2.grp.scd.yahoo.com with SMTP; 3 Jun 2002 20:32:45 -0000 Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g53KZXR31979 for iwar@onelist.com; Mon, 3 Jun 2002 13:35:33 -0700 Message-Id: <200206032035.g53KZXR31979@red.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL3] From: Fred Cohen <fc@all.net> X-Yahoo-Profile: fcallnet Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Mon, 3 Jun 2002 13:35:33 -0700 (PDT) Subject: [iwar] [fc:Study:.Open.source.poses.security.risks] Reply-To: iwar@yahoogroups.com Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: quoted-printable X-Spam-Status: No, hits=0.0 required=5.0 tests=DIFFERENT_REPLY_TO version=2.20 X-Spam-Level: Study: Open source poses security risks By Matthew Broersma, ZDNet UK, 5/31/02 <a href="http://zdnet.com.com/2100-1104-929669.html">http://zdnet.com.com/2100-1104-929669.html> A conservative U.S. think tank suggests in an upcoming report that open-source software is inherently less secure than proprietary software, and warns governments against relying on it for national security. The white paper, Opening the Open Source Debate, from the Alexis de Tocqueville Institution (ADTI) will suggest that open source opens the gates to hackers and terrorists. "Terrorists trying to hack or disrupt U.S. computer networks might find it easier if the federal government attempts to switch to 'open source' as some groups propose," ADTI said in a statement released ahead of the report. Open-source software is freely available for distribution and modification, as long as the modified software is itself available under open-source terms. The Linux operating system is the best-known example of open source, having become popular in the Web server market because of its stability and low cost. Many researchers have also suggested that since a large community contributes to and scrutinizes open-source code, security holes are less likely to occur than in proprietary software, and can be caught and fixed more quickly. The ADTI white paper, to be released next week, will take the opposite line, outlining "how open source might facilitate efforts to disrupt or sabotage electronic commerce, air traffic control or even sensitive surveillance systems," the institute said. "Computer systems are the backbone to U.S. national security," said ADTI Chairman Gregory Fossedal. "Before the Pentagon and other federal agencies make uninformed decisions to alter the very foundation of computer security, they should study the potential consequences carefully." ------------------------ Yahoo! Groups Sponsor ---------------------~--> The FREE Server Security Guide shows you how: • DEPLOY THE LATEST ENCRYPTION and authentication techniques • DELIVER TRANSPARENT PROTECTION with the strongest security without disrupting users. And more. Get your FREE Guide now: http://us.click.yahoo.com/B62TUC/KyKEAA/sXBHAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2003-08-24 02:46:32 PDT