Silk Road forums

Discussion => Security => Topic started by: tres on June 29, 2012, 05:22 am

Title: FBI-Backdoor in OpenBSD + Secure OpenBSD Configuration
Post by: tres on June 29, 2012, 05:22 am
Here is an interesting email conversation between the author of OpenBSD and an former FBI employee.

Quote
List:       openbsd-tech
Subject:    Allegations regarding OpenBSD IPSEC
From:       Theo de Raadt <deraadt () cvs ! openbsd ! org>
Date:       2010-12-14 22:24:39
Message-ID: 201012142224.oBEMOdWM031222 () cvs ! openbsd ! org
[Download message RAW]

I have received a mail regarding the early development of the OpenBSD
IPSEC stack.  It is alleged that some ex-developers (and the company
they worked for) accepted US government money to put backdoors into
our network stack, in particular the IPSEC stack.  Around 2000-2001.

Since we had the first IPSEC stack available for free, large parts of
the code are now found in many other projects/products.  Over 10
years, the IPSEC code has gone through many changes and fixes, so it
is unclear what the true impact of these allegations are.

The mail came in privately from a person I have not talked to for
nearly 10 years.  I refuse to become part of such a conspiracy, and
will not be talking to Gregory Perry about this.  Therefore I am
making it public so that
    (a) those who use the code can audit it for these problems,
    (b) those that are angry at the story can take other actions,
    (c) if it is not true, those who are being accused can defend themselves.

Of course I don't like it when my private mail is forwarded.  However
the "little ethic" of a private mail being forwarded is much smaller
than the "big ethic" of government paying companies to pay open source
developers (a member of a community-of-friends) to insert
privacy-invading holes in software.

Quote
From: Gregory Perry <Gregory.Perry@GoVirtual.tv>
To: "deraadt@openbsd.org" <deraadt@openbsd.org>
Subject: OpenBSD Crypto Framework
Thread-Topic: OpenBSD Crypto Framework
Thread-Index: AcuZjuF6cT4gcSmqQv+Fo3/+2m80eg==
Date: Sat, 11 Dec 2010 23:55:25 +0000
Message-ID: <8D3222F9EB68474DA381831A120B1023019AC034@mbx021-e2-nj-5.exch021.domain.local>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Status: RO

Hello Theo,

Long time no talk.  If you will recall, a while back I was the CTO at
NETSEC and arranged funding and donations for the OpenBSD Crypto
Framework.  At that same time I also did some consulting for the FBI,
for their GSA Technical Support Center, which was a cryptologic
reverse engineering project aimed at backdooring and implementing key
escrow mechanisms for smart card and other hardware-based computing
technologies.

My NDA with the FBI has recently expired, and I wanted to make you
aware of the fact that the FBI implemented a number of backdoors and
side channel key leaking mechanisms into the OCF, for the express
purpose of monitoring the site to site VPN encryption system
implemented by EOUSA, the parent organization to the FBI.  Jason
Wright and several other developers were responsible for those
backdoors, and you would be well advised to review any and all code
commits by Wright as well as the other developers he worked with
originating from NETSEC.

This is also probably the reason why you lost your DARPA funding, they
more than likely caught wind of the fact that those backdoors were
present and didn't want to create any derivative products based upon
the same.

This is also why several inside FBI folks have been recently
advocating the use of OpenBSD for VPN and firewalling implementations
in virtualized environments, for example Scott Lowe is a well
respected author in virtualization circles who also happens top be on
the FBI payroll, and who has also recently published several tutorials
for the use of OpenBSD VMs in enterprise VMware vSphere deployments.

Merry Christmas...

Gregory Perry
Chief Executive Officer
GoVirtual Education

"VMware Training Products & Services"

540-645-6955 x111 (local)
866-354-7369 x111 (toll free)
540-931-9099 (mobile)
877-648-0555 (fax)

Here is the Secure OpenBSD Configuration guide.

http://xqz3u5drneuzhaeo.onion/users/secureconfig/tutorial.html

Stay secure, use OpenBSD, it's the securest of the secure. Now I know why the author of this guide is more interested in Gentoo recently.  ::)
Title: Re: FBI-Backdoor in OpenBSD + Secure OpenBSD Configuration
Post by: brutusk on June 29, 2012, 05:33 am
wow, nice find, that is some scary ass shit. Thanks for the post.
Title: Re: FBI-Backdoor in OpenBSD + Secure OpenBSD Configuration
Post by: LouisCyphre on June 29, 2012, 07:21 am
As the dates on the emails indicate, this is old news.  It did cause a bit of a stir when it was released, though.

From memory an audit was done following the release of that information which showed that there was no backdoor and that the code that had been submitted to the project to insert the backdoor either never made it to a production release or didn't last long enough to be included in any release of the last few years (that's the part I can't remember).  Since OpenBSD is an open source project this is all verifiable.
Title: Re: FBI-Backdoor in OpenBSD + Secure OpenBSD Configuration
Post by: 16bitgirl on June 29, 2012, 07:54 am
As far as I can tell, the whole "ultra-super-security" of OpenBSD mainly stems from them auditing the code of the base system. This means that in theory a clean OpenBSD installation is entirely secure, but as soon as you start adding things like web servers or graphical desktops you're exposing yourself to all the potential security flaws within. I mean, it's great that they take so much effort with the base system, all OS projects should make sure they have a secure core, but personally I'm a FreeBSD girl. Well, that or GNU/Linux.
Title: Re: FBI-Backdoor in OpenBSD + Secure OpenBSD Configuration
Post by: LouisCyphre on June 29, 2012, 08:18 am
As far as I can tell, the whole "ultra-super-security" of OpenBSD mainly stems from them auditing the code of the base system. This means that in theory a clean OpenBSD installation is entirely secure, but as soon as you start adding things like web servers or graphical desktops you're exposing yourself to all the potential security flaws within. I mean, it's great that they take so much effort with the base system, all OS projects should make sure they have a secure core, but personally I'm a FreeBSD girl. Well, that or GNU/Linux.

That's the case with any system, though: adding any program or service includes the possibility of opening a vulnerability.  GNU/Linux is still an excellent choice if precautions, such as a tight configuration and access controls (e.g. SELinux or AppArmor), are implemented.
Title: Re: FBI-Backdoor in OpenBSD + Secure OpenBSD Configuration
Post by: 16bitgirl on June 29, 2012, 08:38 am
Or run your entire Silk Road experience inside a chroot that's inside a VM that's inside another VM :D
Title: Re: FBI-Backdoor in OpenBSD + Secure OpenBSD Configuration
Post by: kmfkewm on June 29, 2012, 08:49 am
this was debunked ages ago
Title: Re: FBI-Backdoor in OpenBSD + Secure OpenBSD Configuration
Post by: LouisCyphre on June 29, 2012, 08:54 am
Or run your entire Silk Road experience inside a chroot that's inside a VM that's inside another VM :D

Before you start relying on chroot and VM environments for security, read this:

http://dkn255hz262ypmii.onion/index.php?topic=28552.0

They both have their place, but only in the context of a wider security policy.

A VM in and of itself isn't secure, but it does prevent information leakage from the main system.  Chroot is designed to isolate services within a system and prevent a compromise of the service affecting the rest of the system (and there are alternatives to that).