Feeds

FBI 'planted backdoor' in OpenBSD

Break out the code auditing kit

How to simplify SSL certificate management

Allegations that the FBI may have smuggled back doors or weaknesses into openBSD's cryptography have created uproar in the security community.

Former government contractor Gregory Perry, who helped develop the OpenBSD crypto framework a decade ago, claims that contractors were paid to insert backdoors into OpenBSD's IPSec stack around 10 years ago. Perry recently warned the openBSD's Theo de Raadt of the development, years after the event, via an email that de Raadt has published in the spirit of openness.

Perry said he had waited until his ten year NDA with the FBI had expired before coming forward with the claims, which remain unsupported by secondary sources. If true the allegations mean that would have an easy way to tap into supposedly secure VPN links and other technologies based on OpenBSD's crypto stack.

De Raadt said he had published Perry's email so that those who use potentially affected code can carry out an audit, as well as offering the opportunity for those named in the email to come forward and give their version of events.

In his email, Perry alleges that virtualisation guru Scott Lowe is on the FBI payroll, suggesting this may be behind his recent advocacy of OpenBSD at a technology for VPN and firewall installation in virtualised environments. Lowe denies the charge, saying he never worked for the Feds.

In an email exchange with reporter Robert McMillan, Perry said that attempts to plant backdoors in open source code were made by the Clinton administration to "counter to their supposed relaxation of the Department of Commerce encryption export regulations".

Perry's allegations are being taken seriously even though they don't come alongside anything substantial by way of evidence. Whether true or not, the charge of an OpenBSD backdoor has spawned a debate.

E J Hilbert, a former FBI cyber-crime agent, said attempts were made to place backdoors in open source security codes but that these were unsuccessful. "I was one of the few FBI cyber agents when the coding supposedly happened. Experiment yes. Success No," Hilbert said in a Twitter update.

Chris Wysopal, CTO of application security tools firm Veracode and former high profile member of hacker collective L0pht Heavy Industries, said that the issue of potential backdoors doesn't stop with OpenBSD: "If OpenBSD w/all their auditing was backdoored where does that leave Linux, Windows, FreeBSD, OS X. Who thinks they stopd at smallest dist?" ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Nothing illegal to see here: Tribunal says TEMPORA spying is OK
Rules mass surveillance is legal, in principle at least
Google kills CAPTCHAs: Are we human or are we spammer?
Do you make up these questions, Mr Wonka?
'We're having panic attacks' ... Sony staff and families now threatened in emails
Join us or else say messages purportedly from GOP hackers
The internet is less free than last year. Thanks a bunch, Snowden
Running around, warning everyone the NSA is spying on us all. What is he like?
Author fined $500k in first US spyware conviction
100,000 creeps buy mobe-watching wares
Snowden files show NSA's AURORAGOLD pwned 70% of world's mobe networks
Brits and Yanks snoop on security standards bods
Sony Pictures struggles as staff details, salaries and films leaked
Fury and Annie now doing the rounds - along with staff's privates
Stupid humans and their EXPENSIVE DATA BREACHES
Non-human cockups only account for 7% of leaks
prev story

Whitepapers

The falling cost - and rising value - of desktop virtualization
The growing strategic value of desktop virtualization, from a more flexible, productive workforce to lower real estate costs, has made it a key IT strategy.
Focus on 5 SIEM requirements
In order for SIEM to help usher in more effective security and risk management strategies—particularly as they relate to threat mitigation, embracing trends, and aligning with business priorities—these five issues must be solved.
The Escalating Threat of DDoS Attacks
With increasing frequency and scale, some of the world’s largest data center and network operators are suffering from crippling Distributed Denial of Service (DDoS) attacks.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Everything a site builder wants to know
The major changes in Drupal 8 for end users, site builders, designers and front-end developers, and for back-end developers - part 2.