An FBI Backdoor in OpenBSD
An FBI Backdoor in OpenBSD
An FBI Backdoor in OpenBSD
Newsletters Dashboard RSS Solution Centers White Papers Webcasts Podcasts Video Events Magazine
Blogs
Data Protection Identity & Access Business Continuity Physical Security Security Leadership Basics Tools & Templates Security Jobs Blogs
Blog Topics Data Protection Identity Management Business Continuity Physical Security Leadership Career
You have to give Theo de Raadt credit: he's into openness. What other software product would take serious, what exactly are you suggesting?
but questionable allegations about an FBI-planted back door in its code and just go public with them? 4 weeks 6 days ago
That's what OpenBSD's de Raadt did Tuesday after a former government contractor named Gregory Perry Illegal
came forward and told him that the FBI had put a number of back doors in OpenBSD's IPsec stack, 5 weeks 20 hours ago
The allegations could make many people think twice about the security of OpenBSD, but the way de Raadt
handled the matter will probably have the opposite effect -- giving them another reason to trust the software.
RECENT POSTS » more posts
Here's what de Raadt said:
Patch Tuesday panic not necessary. Or is it?
I refuse to become part of such a conspiracy, and
will not be talking to Gregory Perry about this. Therefore I am Siberian exploit kit circumvents traditional
making it public so that security
(a) those who use the code can audit it for these problems,
(b) those that are angry at the story can take other actions, An FBI backdoor in OpenBSD?
(c) if it is not true, those who are being accused can defend themselves. Sixth Circuit Makes it Harder to Get Cloud E-
mail
I contacted Perry about his email, and while I couldn't get him on the telephone, he confirmed that his letter to
de Raadt was published without his consent. He gave a few more details on his involvement with the FBI Gawker fallout: Mel Brooks warned us
(which, by the way, has no immediate comment on this).
Hello Robert,
WEBCASTS
I did not really intend for Theo to cross post that message to the rest of the Internet, but I stand by my 60 Minutes: The Future of the Perimeter
original email message to him in those regards.
The project involved was the GSA Technical Support Center, a circa 1999 joint research and
development project between the FBI and the NSA; the technologies we developed were Multi Level CyberAttacks ... Are you protected or prepared to
Security controls for case collaboration between the NSA and the FBI due to the Posse Commitatus pay?
Act, although in reality those controls were only there for show as the intended facility did in fact host
both FBI and NSA in the same building. » View All Webcasts
WHITE PAPERS
We were tasked with proposing various methods used to reverse engineer smart card technologies,
including Piranha techniques for stripping organic materials from smart cards and other embedded
systems used for key material storage, so that the gates could be analyzed with Scanning Electron and The Business Case for a Next-Generation SIEM:
Scanning Tunneling Microscopy. We also developed proposals for distributed brute force key cracking Delivering operational efficiency and lower costs
systems used for DES/3DES cryptanalysis, in addition to other methods for side channel leaking and through an integrated approach to network
covert backdoors in firmware-based systems. Some of these projects were spun off into other sub security management
projects, JTAG analysis components etc. I left NETSEC in 2000 to start another venture, I had some
fairly significant concerns with many aspects of these projects, and I was the lead architect for the site- IDC Technology Spotlight: Leveraging the Benefits
to-site VPN project developed for Executive Office for United States Attorneys, which was a statically of Cloud Computing with Specialized Security
keyed VPN system used at 235+ US Attorney locations and which later proved to have been
backdoored by the FBI so that they could recover (potentially) grand jury information from various US
Attorney sites across the United States and abroad. The person I reported to at EOSUA was Zal Azmi, Strong Authentication for the Here and Now
who was later appointed to Chief Information Officer of the FBI by George W. Bush, and who was
chosen to lead portions of the EOUSA VPN project based upon his previous experience with the
Addressing the Grand Challenge of Cloud Security
Marines (prior to that, Zal was a mujadeen for Usama bin Laden in their fight against the Soviets, he
speaks fluent Farsi and worked on various incursions with the CIA as a linguist both pre and post 911,
prior to his tenure at the FBI as CIO and head of the FBI’s Sentinel case management system with Securing Virtualization In Real World
Lockheed). After I left NETSEC, I ended up becoming the recipient of a FISA-sanctioned investigation, Environments
presumably so that I would not talk about those various projects; my NDA recently expired so I am free
to talk about whatever I wish.
Business Resilience: The Best Defense is a Good
Offense
Here is one of the articles I was quoted in from the NY Times that touches on the encryption export
issue:
» View All White Papers
In reality, the Clinton administration was very quietly working behind the scenes to embed backdoors in CSO Corporate Partners
many areas of technology as a counter to their supposed relaxation of the Department of Commerce
encryption export regulations – and this was all pre-911 stuff as well, where the walls between the FBI
and DoD were very well established, at least in theory.
Some people have decided that Perry's claims are not credible, and at least one person named in his email
has come forward to say it's not true. But at this point, it seems that nobody but Perry really knows what's
going on.
It's hard to really know what to say at this point. We're talking about backdoors that probably just look like
regular old bugs in code that was written 10 years ago.
POST A COMMENT
Subject:
Username: Anonymous
E-mail:
The content of this field is kept private and will not be shown publicly.
Homepage:
Body: *
Allowed HTML tags: <a> <em> <strong> <cite> <code> <ul> <ol> <li> <dl> <dt> <dd>
Lines and paragraphs break automatically.
Preview comment
WHITEPAPER WHITEPAPER
Best practices in email security and security RSA Archer gives you one smart choice for security, buy a link »
software as a service. Read more >> risk & compliance
Download the Forrester Study to learn how 305 IT
decision makers are protecting their corporate
secrets
Home | About | Privacy Policy | Terms of Service | Subscription Service | Advertising | Events | Site Map