Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
News

ADTI Whitepaper Released 572

Dave Wreski Writes: "This PDF article, written by Kenneth Brown of ADTI, attempts to explain that "Open source GPL use by government agencies could easily become a nation security concern. Government use of software in the public domain is exceptionally risky." The paper has been taken down since this reader submitted the link -- they promise to replace it by the end of the day -- but as of right now, it's still available here. Their accompanying press release is out too. You might remember that we ran a story on this whitepaper earlier. At the time, a CNET story said that it was going to link open-source to terrorism; it does so in a glancing reference on p. 8 to the FAA and "national security." But the thrust of the paper is "GPL bad, open-source good," coincidentally Microsoft's position, as was hinted-at in NewsForge's interview last week. In case they take the second copy of the paper down, we'll include some teaser quotes for you below. Update by HeUnique:The Register got some nice critique about this paper.

"Another security concern is that the primary distribution channel for GPL open source is the Internet. As opposed to proprietary vendors, open source is freely downloaded. However, software in the public domain could contain a critical problem, a backdoor or worse, a dangerous virus."

Reverse engineering "harbors very close to IP infringement because and has staggering economic implications." [sic]

"On a lighter note, while many open source enthusiasts are proponents for copyleft, they insist on trademark protection for their ideas."

"If a software application representing 5000 hours uses GPL code that reflects only 100 hours, is the GPL fair in its argument that the entire product is GPL? This point is of considerable concern to software companies that value their secrets, design and architecture strategies. Proponents of the GPL argue that each party in the exchange is benefiting equally, but without a means to properly make this evaluation, this position at best is over-assuming."

"The federal government's information systems requirements intersect countless sensitive operations. The limitless potential for holes and back doors in an open source product would require unyielding scrutiny by staff that decided to use it. For example, if the Federal Aviation Agency were to develop an application (derived from open source) which controlled 747 flight patterns, a number of issues easily become national security questions such as: Would it be prudent for the FAA to use software that thousands of unknown programmers have intimate knowledge of for something this critical? Could the FAA take the chance that these unknown programmers have not shared the source code accidentally with the wrong parties? Would the FAA's decision to use software in the public domain invite computer 'hackers' more readily than proprietary products?"

This discussion has been archived. No new comments can be posted.

ADTI Whitepaper Released

Comments Filter:
  • by tempest303 ( 259600 ) <jensknutson@@@yahoo...com> on Monday June 10, 2002 @02:37PM (#3674026) Homepage
    Wow, these guys have figured out the PERFECT career:

    they get paid to troll!

    Man, I gotta hook myself up with a gig like this...
    • by RickHunter ( 103108 ) on Monday June 10, 2002 @02:44PM (#3674072)

      Being paid to troll has been around for decades now.

      Its called "marketing".

  • and will send it to anyone who asks. rayp@unixnotwindowsnetworking.net.
  • Just in case... (Score:5, Informative)

    by Pig Hogger ( 10379 ) <(moc.liamg) (ta) (reggoh.gip)> on Monday June 10, 2002 @02:39PM (#3674035) Journal
    here is my mirror [emdx.org] of the "old" report, safely out of the reach of the DMCIA...
  • GPL bad, open-source good
    Okay, is it just me or is the difference b/w these pretty much nonexistent? I assume there are other open-source licenses, but they'd all do the same thing anyway.
    • There is a big distinction between the GPL and the BSD-style licenses. The GPL is all about making sure that people who use GPL licensed code release their new code under the GPL too. The intention is to create more GPLed code. The BSD license is about propogating quality code. The idea is that if you think your code is a good implementation of something, you release it under the BSD, which allows anyone to use it in their own applications without being restricted in how they license their own code at all. A BSD coder doesn't care what use their code is put to or who profits from it, they just want it to be used. That's a pretty big difference :-)
      • by lysurgon ( 126252 ) <joshkNO@SPAMoutlandishjosh.com> on Monday June 10, 2002 @03:37PM (#3674476) Homepage Journal
        There is a big distinction between the GPL and the BSD-style licenses. The GPL is all about making sure that people who use GPL licensed code release their new code under the GPL too.

        Except that using GPL code doesn't compel you to "release" anything. It only means that if you elect to share your code with another party, you do so under the terms of the GPL.

        The .gov could pick up a bunch of GPL code, hire some hakers (or use the NSA) to brew their own system and simply make the decision not to share the code. That's nice and legal. They'd simply make distribution a matter of national security.

        The only security issue with the GPL is the security of companies who derive revenue from selling proprietary code.


    • Okay, is it just me or is the difference b/w these pretty much nonexistent? I assume there are other open-source licenses, but they'd all do the same thing anyway.

      The advantage of open source is that your customers can continue to maintain and upgrade your code after you go bankrupt.

      -a

      ---
      When the man in front of you is shot, pick up his gun and start shooting.
  • by Jucius Maximus ( 229128 ) on Monday June 10, 2002 @02:41PM (#3674049) Journal
    "Open source GPL use by government agencies could easily become a nation security concern. Government use of software in the public domain is exceptionally risky."

    A valid concern.

    But is it more or less risky in comparison to using closed source software?

  • Sad (Score:5, Insightful)

    by 4of12 ( 97621 ) on Monday June 10, 2002 @02:42PM (#3674052) Homepage Journal

    I can't be the only one saddened to see the name of Alexis de Toqueville besmirched by being associated with a think tank for hire.

    His insights into America of the early 19th century were profound.

    Meanwhile, the points of this paper, besides being wide of the mark in assessing the truth, are not even particularly original - other fear mongers have trotted out the same vague bogeymen prior to the publication of this report. And those objections to open source have no more basis in fact now than they did when they were originally brought out.

    • by twitter ( 104583 ) on Monday June 10, 2002 @06:38PM (#3675692) Homepage Journal
      While I'm not familiar with Toqueville's work, I can see a glaring contradiction when it's put in my face. Their mission statement [adti.net] is at odds with what this Ken Brown says, and even with the page itself.

      The page was generated with Adobe Go Live, and the mission statement is an image or something else difficult to copy, so I had to type it by hand for your enjoyment.

      Since 1988, the Alexis de Toqueville Institution has studied the spread and perfection of democracy around the world. I'm not impressed

      In this we follow the principles of Toqueville himself...

      At the root, perhaps, is a populist belief in the basic goodness, perfectibility, and nobility of mankind and of the human community....

      Our principles guide the selection of which issues are critical to the advancement of freedom - but we don't rush to judgment about which means will be most effective in producing it.

      I'm afraid that they have rushed to judgment and condemned one of the most important documents protecting freedom of speech today. The GPL is the only document that insures that you will have control of your computer and therefore your publications will not be censored at the source. It does this by insuring that the possesor of GPL code will always have the ability to use, understand, modify and distribute that code as they see fit without reducing the rights of other users to do the same. Code that does not insure this right has all of the security flaws and fears raised in Ken Browns paper as the owner does not know what the machine is doing or have the ability to change it. ADTI completely misses the point and condemn the GPL because they fear it can not be comercialized in the conventional fashion and many other incorrect and confused reasons. This is a shame because there is nothing more important for "democracy" and freedom than the free exchange of information the GPL ultimately protects.

      The greatest contradiction is seems to be their main reason for rejecting the GPL as a license worth using: that volunteer efforts can not match commercial ones, and that the GPL community of volunteers is a myth. Well, I'm sitting here with my mythical OS, typing into a mythical text editor, for a mythical browser. All are far better than commercial alternatives. All were developed and rely on tools created by volunteers and others who really do believe in the goodness and freedoms of their users. No one who has respect for his neighbor would ever say that people could not co-operate without a profit motive, but this is what Ken concludes,

      ...Removing the economic incentive for firms to own the rights to products spawned from research and development programs is the surest way to end their existence... the [Greatest risk of the GPL] is its threat to the cooperation between different parties who collaborate and create new technologies.

      What utter hogwash. The GPL enables all to participate in the development of new technology and removes many artificial barriers. The fruit of all the mentioned government programs has been brought to me in a form I can manipulate by Debian. The number of sound scientific programs I now have access to, through GNU compilers, is uncountable. There are few academic publishers who would have it any other way, they exist to teach and promote their various specialties. To top it off, large companies will continue to pour money into the exploitation of these technologies because it is in their best financial interest. So much the better if that means their derivative works will be available to me as well. How can anyone intellectually honest say otherwise, especially while espousing freedom and the goodness of man?

      Oh, enough. The more I read of this MicroSoft parrot's garbage, the angrier I get. Especially unkind and untrue is the assertion that RMS is a "fallen hero" viewed as radical. I respect that man more every day. Ken Brown, you are a 1/4 watt bulb.

  • I'm always amazed at the flat-out bullshit that gets published as "research". I guess I shouldn't be, since it all sounds good to someone who doesn't know anything about anything.

    Where are the "think tanks" that actually have people who can think critically?

    • by Black Parrot ( 19622 ) on Monday June 10, 2002 @02:53PM (#3674142)


      > Where are the "think tanks" that actually have people who can think critically?

      Think tanks only need to think critically enough to fool their intended audience.

      And this is for consumption by businessmen, legislators, and bureaucrats, so...

    • Where are the "think tanks" that actually have people who can think critically?

      Beware of the words "think tank." The closest you are going to get to unbiased thinking is from academia, not think tanks.

      • The closest you are going to get to unbiased thinking is from academia, not think tanks.

        HAHAHAHAHAHA...Cough...gag...splutter.

        That's the funniest thing I've read all day! You are either an exceptional comedian, or have never met an academic.

    • Where are the "think tanks" that actually have people who can think critically?

      The fact of the matter is that objective think tanks just don't exist because there aren't any companies out there that want to fund truly objective research.

      They want the research to show what they want it to show.
  • Obvious Answer ... (Score:5, Insightful)

    by BoyPlankton ( 93817 ) on Monday June 10, 2002 @02:42PM (#3674058) Homepage
    "If a software application representing 5000 hours uses GPL code that reflects only 100 hours, is the GPL fair in its argument that the entire product is GPL? This point is of considerable concern to software companies that value their secrets, design and architecture strategies. Proponents of the GPL argue that each party in the exchange is benefiting equally, but without a means to properly make this evaluation, this position at best is over-assuming."

    If you don't want your app to be GPL, and you've already spent 5000 hours coding it, might as well spend another 100 writing that piece instead of cutting and pasting.
    • by Dark Paladin ( 116525 ) <jhummel.johnhummel@net> on Monday June 10, 2002 @02:47PM (#3674093) Homepage
      But...But...BSD let us use their code and make money off of it! Why don't you meanie GNU guys let us?

      I mean, it's not like we're stealing Norton Doublespace or anything....
    • by taniwha ( 70410 )
      exactly - it's up to the writer of the 100 hour bit to decide how he/she wants to license it - GPL doesn't mean you HAVE to use someone's code - it just describes a particular set of conditions under which you can.



      BTW 100 hours is a ridiculously small number - certainly below the threshold where even if you're considering licensing a commercial package it's probably not worth the lawyer time to write a contract

    • by lynx_user_abroad ( 323975 ) on Monday June 10, 2002 @02:59PM (#3674195) Homepage Journal
      If a software application representing 5000 hours uses GPL code that reflects only 100 hours, is the GPL fair in its argument that the entire product is GPL?

      If I have 5000 hours of video in my library, but only 100 hours of that is copyrighted by Hollywood, is the MPAA being fair in their argument that I'm stealing from them?

      • Actually, they are being fair in saying that you're stealing (if in fact the hundred hours is "pirated"). If they make a claim that you should pay them for all 5000 hours though, that's different. Your argument is flawed. The main thing here, though, is that nobody's forcing anyone to use gpl'd code. Don't like the license restrictions? Write your own damn code. Want to use the gpl'd code? Agree to the license. It's like any other software - agree to the licensing terms, or just don't use it.
    • Just where would you be if you slipped in 100 hours of Microsoft proprietary code you got your hands on?

      What would that do your 5000 hour product?

      The GPL is less disruptive than borrowing other code that comes with limitations.

      Besides, if you use code from other sources you certainly should know the impact of doing so. The GPL is not different in that regard.

      I guess Microsoft thinks that proprietary code should be outlawed because if it should mistakenly get its way into an application, you could be sued, right?
    • I posted this earlier, but it seems like an appropriate response here.

      "If a software application representing 5000 hours uses GPL code that reflects only 100 hours, is the GPL fair in its argument that the entire product is GPL? After all, if proprietary software vendors don't like the terms of a software license, they should not reasonably be expected to abide by it. This point is of considerable concern to software companies who wish to use the work of other without compensation -- 'pirating' the free software, to use a popular industry term. Proponents of the GPL argue that each party in the exchange benefits, which is the basis for a free, capitalist society, but proprietary software vendors don't always like this arrangement. Interestingly, proprietary software vendors often include highly restrictive and draconian licenses with their products, and disallow all use of them by any other developers; this, somehow, is presented by them as the 'fair market solution' -- what's ours is ours, and what's yours is ours."
  • by slowtech ( 12134 ) on Monday June 10, 2002 @02:44PM (#3674070)
    Goodness, this thing is full of gramatical errors. (Grammar may be optional here, but these people are lobbying the Feds). Any of my teachers in High School would have sent this paper back if it had been submitted to them:

    "harbors very close to IP infringement"

    "are proponents for copyleft"

    "code that reflects only 100 hours"

    "knowledge of for something this critical"

    Blech...

    • by Soko ( 17987 ) on Monday June 10, 2002 @03:16PM (#3674337) Homepage
      Touché.

      This is (somewhat) more important than it looks, folks. When the ADTI folks accuse OSS projects of being less than professional, we can simply point to the origional document and say that this "Think Tank" can't even correctly write American Engish.

      Rushing the document out the door without proper proof reading shows un-professionalism from ADTI in completeing thier task, a clearly worded and concise critique of the GPL. Pointing out this fact may damage thier credibility in a way that regular folks will understand. This should then allow the larger arguments of an opinion bought and paid for by the BSA in the door, too. We win. ;-)

      Think tank indeed. Wonder if the CSS camp got it's money's worth?

      Soko
      • This is (somewhat) more important than it looks, folks. When the ADTI folks accuse OSS projects of being less than professional, we can simply point to the origional document and say that this "Think Tank" can't even correctly write American Engish.

        I had exactly the same thought, after reading the very first paragraph. Issues of proofreading aside (we all occasionally write "of for," or something similar, especially when revising a document and changing the format of sentences), the report just isn't well-written. The concepts are vague, the language is unclear, and the overall structure seems very haphazard. I would be embarrassed to release it, especially given the amount of hype it has received and the supposed high-profile of the think tank.

        -schussat

      • by catfood ( 40112 ) on Monday June 10, 2002 @03:44PM (#3674531) Homepage
        Wonder if the CSS camp got
        it's money's worth?

        Following the old Usenet tradition that every spelling and grammar flame must contain at least one spelling or grammar error, you meant "its." There's no apostrophe. See Bob The Angry Flower [angryflower.com] for details.

  • by Anomolous Cow Herd ( 457746 ) on Monday June 10, 2002 @02:44PM (#3674075) Journal
    "Another security concern is that the primary distribution channel for GPL open source is the Internet. As opposed to proprietary vendors, open source is freely downloaded. However, software in the public domain could contain a critical problem, a backdoor or worse, a dangerous virus."

    It is true that open source applications, being openly available on the internet and distributed in the same manner, are susceptible to backdooring and trojaning. Just look at IRSSI [irssi.org] or FragRoute [securityfocus.com].

    This risk factor is somewhat mitigated in commercial software, where the distribution is typically through CDs and other trusted media. Of course, someone can still somehow compromise a software developer's network, but it isn't exactly hanging out a sign saying "I'm the source code, hack me!" like the open source projects.

    Just imagine, for a minute, how devastating it would be if Sourceforge was hacked and malicious code was inserted into a ton of the projects without anyone noticing for long enough that it could cause real damage? The danger is clear.

    • Not convinced (Score:4, Insightful)

      by Space cowboy ( 13680 ) on Monday June 10, 2002 @02:54PM (#3674149) Journal
      The issue of whether source code is as-the-author-intended is an old one, and is very well catered for by signing the .bz2 or .gz archive with the authors GPG/PGP key.

      If you subscribe to Redhat Network, all the .rpm's that are downloaded can be optionally (by default they are) checked against the GPG key - this prevents anyone from inserting their own version of /bin/login into the system... I'm assuming the machines doing the signing aren't the machines doing the delivery, but that would be an elementary mistake to make on Redhat's part...

      In short - this is not an issue.

      Simon
      • Re:Not convinced (Score:3, Interesting)

        by MAXOMENOS ( 9802 )

        I'm a firm believer in the GPL and Linux. That having been said, consider the following:

        Eve wants to create a back door that lets her root by sending a particular, carefully-constructed packet to Apache. She discovers a way to do this by hiding it in a very subtle bug that she introduces to some component of the Apache system. After months of research, she finds a way to introduce the bug, by incorporating it in a modification that's too good for the Apache project to pass up. Eve's code becomes part of the next release, which is signed by the Apache project with a legitimate signature. Thousands of users worldwide download the buggy Apache RPM, verify the signature, install it on their machines, and restart httpd. Eve and her friends, perhaps months later, then use the compromised httpd to infiltrate a bunch of systems. The bug is finally found after hundreds of rooted boxes, and a patch released to fix the bug (and therefore the hole); but meanwhile, the damage has been done.

        I'll grant that this is an awful lot of work to go through to get root; this scenario is strictly meant to be illustrative. My question is, what practices can we adopt, as a community, to prevent this from occuring in practice?

        (We might also keep in mind that there are parties out there that are more interested in causing psychological damage than actual damage, and who may view this kind of operation as worthwhile if they can just get consumers into a panic.)

        OK, done talking, now I listen :)

    • "Another security concern is that the primary distribution channel for GPL open source is the Internet. As opposed to proprietary vendors, open source is freely downloaded. However, software in the public domain could contain a critical problem, a backdoor or worse, a dangerous virus."

      While what you say is technicaly true, at least with open source, hackers(as in the jargon file definition) have a chance to go over the source and fix any back doors implemented. If you only receive binary files, who's to say that the company themselves hasn't inserted a backdoor or left a myriad of security holes unfixed. The above quote is a bad way of looking at it, because the exact same arguement can be applied to closed source.


    • > This risk factor is somewhat mitigated in commercial software, where the distribution is typically through CDs and other trusted media. Of course, someone can still somehow compromise a software developer's network, but it isn't exactly hanging out a sign saying "I'm the source code, hack me!" like the open source projects.

      And then there's the pirates' CDs that consumers buy thinking they are getting the real thing. What's to stop a pirate from turning evil (heh) and burning a trojanized bootleg rather than a straight copy?

      Who's to say they haven't already done that...?

      > Just imagine, for a minute, how devastating it would be if Sourceforge was hacked and malicious code was inserted into a ton of the projects without anyone noticing for long enough that it could cause real damage? The danger is clear.

      There was a notorious case a couple of years ago where someone put a hax0red version of a popular OSS product on a popular FTP site. It was caught in about 4 hours, and the site admins used their FTP logs to identify and notify everyone who had downloaded it during that period.

    • "It is true that open source applications, being openly available on the internet and distributed in the same manner, are susceptible to backdooring and trojaning."

      It doesn't even have to be malicious. Awhile ago, the original author of cfingerd was heavily criticized for making a finger daemon that insisted on running as root. His response to such criticism was to simply abandon the project.

      When holes were inevitably found in cfingerd, there was no one maintaining the project and thus no easy way to get it fixed short of someone actually adopting the project. In the absence of a caretaker, the last buggy version continued to live on in open source mirrors for quite a while.

      From what I understand, the project was eventually continued and cleaned up, but the interim had a dead, unsafe piece of code sitting right next to its safer/more maintained breathren. At least with commercial code, the EOL'd stuff is usually explicitly EOL'd. On the other hand, in a non-source provided context, you're still beholden to the vendor for patches. But I believe in this case, the group is advocating commercial code that comes with the source.

      • by SirSlud ( 67381 ) on Monday June 10, 2002 @03:30PM (#3674420) Homepage
        > But I believe in this case, the group is advocating commercial code that comes with the source.

        No, they ad advocating that open source is good, because commercial companies can use it to cut costs (and profit on the backs of others' work), but that those companies should not have to repay the community for reasons of security.

        It really should read 'borrowable open-source good, except when the source code is mine .. then it should be closed.'

        We all know the usual /. arguments on whether OS is more or less secure than CS, so we dont need to go into that. But really, they like it when companies can borrow source (heaven forbid they have to actually hire as many skilled programmers as it takes to build any given application .. I mean, they have execs and marketers to pay, doncha know!) .. but hate it when they have to give that source back.

        I've been watching the commercial world come to the realization that open-source isn't what they should be scared of (MS has borrowed BSD'd code many a time) .. its just the thought of holding the quality of their software accountable to a community that scares the shit out of them. Anyone following what the multinationals have been doing for the last 20 years in order to divest themselves from ALL possible negative public reaction understands this position. Just like Nike no longer technically employs their sweatshop workers (they're contracted, so the accountability is divested from Nike to their contractors), companies want to be able to take 'tried and true' code, use it, not have to hold their use of the code (and the rest of their code) accountable to the community, and PLUS they get the benifit of passing the buck to the open-source author should problems be found! (Since in a closed source product, nobody can proove it _wasnt_ the open source chunk that caused the problems or indroduced the security hole or whatever.)

        It's the usual power mongering, and desire to not be held accountable for any of it.
    • You're correct about the risk, but the Government has strict standards that systems must adhere to, both when they go into production and when they are in initial development. The Common Criteria [commoncriteria.org] site has a listing of protection profiles that basicly spell out all the requirements a system must adhere to in order to be considered 'secure.' In the Labeled Security Protection Profile [ncsc.mil] (and likely the others...I'm only familiar with this one) there is a section that basicly states that "the developer must use a content management system" and provide all documentation for how it functions, is administered, and how changes to the content are tracked.

      In other words if any government group were to use an open source product or start one of their own they are still required to keep their copy of the source tree for the code under rigid, monitored control to ensure what happened to irssi and FragRoute could not happen to their project.

      I'm not saying that CVS will be the total solution to this problem, but it's nice to see that they do have measures built-in to mitigate the risks.
  • by Erotomek ( 584106 ) on Monday June 10, 2002 @02:45PM (#3674079) Homepage

    For example, if the Federal Aviation Agency were to develop an application (derived from open source) which controlled 747 flight patterns, a number of issues easily become national security questions such as: Would it be prudent for the FAA to use software that thousands of unknown programmers have intimate knowledge of for something this critical?

    Yeah, there's nothing like the good ol' security through obscurity. Thank God no one knows how does the software controling 747 flight works, so now I can fly safely.

  • by Yohahn ( 8680 ) on Monday June 10, 2002 @02:49PM (#3674110)
    They attempt to draw a dividing line in a community. They do this by trying to stress "differences". They list these differences with the claim that it makes software more secure, BAH!

    They also ignore the aspect of the GPL that says you can keep your secret changes if you don't distribute the software outside of your organization. Where is the security leak now?

    The difference between "GNU FREE" and "BSD FREE" is that the people in BSD are willing to sacrifice themselves (no reward), whereas the GNU people are willing to take up arms (we reward you, but you must reward us in return, if you use our stuff).

    The comminuty is more alike that it is different. Don't let these types of papers and publicity screw that up.
  • Backdoors in OSS? (Score:5, Interesting)

    by BlueFall ( 141123 ) on Monday June 10, 2002 @02:49PM (#3674113)
    Sauce for the goose is sauce for the gander; anyone can put a backdoor into an OSS program, but anyone can also see it. With closed source, you're trusting that the vendor won't put one in. Of course, now you're assuming that (1) the vendor has no malicious intent and (2) that they keep their code completely safe. Of course, that could never [wired.com] happen...
  • by ortholattice ( 175065 ) on Monday June 10, 2002 @02:51PM (#3674122)
    Once upon a time, some people lived in a cave, and no one knew that there was a world outside of the cave. The cave provided everything they needed, with plenty of fish and water. Luminous mushrooms provided both food and light. The only thing in short supply was air. All air came through a small shaft connected to the outside world. The shaft was controlled by a single company, Microshaft, which carefully rationed its flow to maximize demand and collected breathing license fees from everyone who had to breath. To save money the company hired cheap labor to operate the valves, but these laborers were often barely competent, and the air supply was unreliable. The shaft was poorly maintained, the air was often stale and laden with viruses. By selling a product that cost them essentially nothing to produce, Microshaft's profits were enormous and they became rich and powerful.

    One day, a group of daring young renegades discovered that there were other ways to get air, just by moving some rocks that blocked openings to the outside. And they offered their air free. At first people were hesitant to use Free Air, thinking something must be wrong with it since it was free. Initially Microshaft ignored the renegades, dismissing them as a fringe movement and minor nuisance. But eventually Microshaft saw them as a threat. They started a major marketing campaign to convince people that the Free Air was bad for their health. But people found that they actually felt better and healthier breathing the free, fresh air. Microshaft added more and more features to their air, perfuming it and coloring it with smoke to give it "added value". Many people started to dislike Microshaft's heavy, bloated air that was hard to breath and began flocking in droves to the sources of Free Air.

    About this time, after some years of hard volunteer work, Open Air developers finally increased the size of a Free Air portal so that a person could actually squeeze through to the outside. The first brave individuals who ventured through it discovered that not only was there an unlimited supply of air in the outside world, there was no way you could harness and control its supply.

    Alarmed, Microshaft sought to have the government declare Free Air illegal since it threatened their business model, which they had developed and rightfully earned through many years of hard work. They called the use of Free Air "theft" and claimed that the "viral" nature of the Public Breathing License advocated by many Open Air rebels would threaten the livelihood of Microshaft's suppliers and distributors. Indeed, the whole economy of the cave would collapse, they said. Laws were quickly passed and the portals of Free Air were sealed off.

    A charitable organization called the Business Air Alliance was formed to help protect businesses against the threat of Free Air portals. By proving that it was theoretically possible to fund terrorist organizations with the money saved by breathing Free Air, the BAA successfully lobbied to strengthen the laws so that any attempt to make an opening to the outside became punishable by death. Possession of shovels and picks became a criminal offense, and the BAA performed random audits to help citizens comply with the law. For their protection, everyone was required to wear an Air Rights Management security device, which would send an alarm to the authorities if it didn't detect a secret mix of fumes found only in Microshaft air.

    As time passed, Microshaft and the government became indistinguishable. To prevent future uprisings, a new feature was added to the air to keep the people sedated happily ever after.

  • by XaXXon ( 202882 ) <xaxxon.gmail@com> on Monday June 10, 2002 @02:51PM (#3674126) Homepage
    The open source debate is about keeping secrets. Completed (written) software is often locked
    by its programmer, hiding the underlying code from its user. Software can only be modified in
    its "unlocked" state when source code is viewable.


    This is the assumption that is the flaw in the entire argument. While having the source code makes it easier in some ways to find exploits, it of course makes it easier to find them earlier and fix them. Whereas in a closed source implementation it's more likely that there are unidentified flaws in the software because there are fewer eyes willing to parse through assembly listings. But if a 'terrorist' is dedicated enough to do that, they're more likely to find such flaws.


    The GPL is one of the most uniquely restrictive product
    agreements in the technology industry.


    Interesting. I never thought of it that way when I can use a program for whatever purpose I want, make modifications to that program, and distribute either the original or my modified version of that program. Maybe I'm just weird like that...


    By the early 90's, open source enthusiasts began to view Stallman as an extremist and fanatic. The rise in the popularity of Linus Torvalds and the Linux
    open source operating system began to create new supporters. Ironically, Linux supporters
    became the biggest proponents of the GPL. Although Stallman is a fallen hero in the open
    source world, most open source products today are distributed under the GPL license.


    While I'm not the biggest RMS fan, uhh, I can't just let that statement go. For once, I agree that not calling it GNU/Linux really misleads readers in this case. Without the GNU tools, Linux wouldn't have a leg to stand on. It's tough to dismiss RMS's importance here (but the author manages somehow..)


    The article goes on (and on and on), but I think it's fair to say that this is a fairly one-sided view of the GPL that looks like it was written by MS and Kenneth Brown just signed his name to it. Nothing here, just the usual FUD.

    • The GPL is one of the most uniquely restrictive product agreements in the technology industry.
      Interesting. I never thought of it that way when I can use a program for whatever purpose I want, make modifications to that program, and distribute either the original or my modified version of that program. Maybe I'm just weird like that...

      Uniquely Restrictive. Break it down. It is restrictive in that it imposes restrictions; It is uniquely restrictive because (gasp) the restrictions it imposes are unique. Just because it's less restrictive than other licenses does not mean that it's restrictive.

      The most important restriction (as noted here, there, elsewhere, and everywhere) is that if you use some GPL code, the whole package has to be GPL. If your app requires a GPL package, then your package has to be GPL. That means that creating a library using GPL code doesn't let you get around the GPL issue, because if that library contains GPL code, it must be GPL'd, and if your app requires that library, it must be GPL'd. LGPL does not have this restriction, as I understand it, but that still doesn't help when something is GPL and not LGPL. So I'm sure you can see why the license would be unattractive to some people. It's not worth it in its own sense to use a GPL license unless there is already a package that does 99% of what you want. If you are trying to further the GPL, then it makes sense to release everything under the GPL, but this is not the government's goal.

      By the early 90's, open source enthusiasts began to view Stallman as an extremist and fanatic. The rise in the popularity of Linus Torvalds and the Linux open source operating system began to create new supporters. Ironically, Linux supporters became the biggest proponents of the GPL. Although Stallman is a fallen hero in the open source world, most open source products today are distributed under the GPL license.
      While I'm not the biggest RMS fan, uhh, I can't just let that statement go. For once, I agree that not calling it GNU/Linux really misleads readers in this case. Without the GNU tools, Linux wouldn't have a leg to stand on. It's tough to dismiss RMS's importance here (but the author manages somehow..)

      I don't think he's a fallen hero either; There are plenty of RMS-following zealots. That's not likely to ever change. While in the end I agree with him to a certain degree - people shouldn't get paid to write software - I also think that people shouldn't get paid to do anything, and we should have a society without money. Since that's not likely to happen any time soon, RMS needs to just get the hell over it. In a society with money, we need to get PAID.

      As for the GNU tools; It is or should be possible to build linux with non-gnu tools. If you started with a complete BSD system with someone else's compiler and compiler tools it should be possible to come up with a version of the linux kernel which is completely portable. (I don't know if linux builds with any other toolchains right now... does it? Like Sun's SPRO compiler and related tools, or watcom?) Anyway, it's called linux. Maybe every distribution of linux extant today should be called (packager) GNU/Linux (Redhat GNU/Linux, for example.) But Linux is Linux, we all know what it is, and the average man on the street couldn't give a fuck about GNU, he just wants to know that he can load the OS and get work done, whether that's windows or linux, and tacking GNU/ onto the front of a word isn't going to change that. Besides which, it's cumbersome; Even if the entire OSS world decided to call it GNU/Linux, people would still call it Linux. So just build a bridge, and get over it.

      As for your one-sided view issue; If we're talking about national security, it's going to be written from a paranoid mindset, and rightfully so. Better to be paranoid and duplicated work, with code not released to the public, than to fuck up and install a fat backdoor that lets skript kiddies fuck around with our nation's communications, for example. You know, like the private telecom system...

      • by RoninM ( 105723 ) on Monday June 10, 2002 @04:50PM (#3675050) Journal
        Uniquely restrictive. Break it down.

        Except that it's "MOST uniquely restrictive." It's already been established (in other comments) that this Think Tank consists of so many high-minded, conceptual thinkers that there was no room for a grammarian. Even still, I have to give them the benefit of the doubt and assume they meant "most ... restrictive," and not the completely daft, "most uniquely."

        The most important restriction (as noted here, there, elsewhere, and everywhere) is that if you use some GPL code, the whole package has to be GPL. If your app requires a GPL package, then your package has to be GPL. [...yawn...] So I'm sure you can see why the license would be unattractive to some people.

        First, I've never heard of anyone absolutely needing to use GPL code in their package. You can choose to do so or not. Of greater import, however, is that despite your keen insight that some people just won't understand/like the viral nature of the GPL, this whitepaper isn't purporting to be opinion, but a factual analysis of the risk inherent in the GPL. Additionally, you fail to point out that even if the resulting package is GPL, that doesn't oblige you to distribute it, and thus, you don't have to release the source code.

        If we're talking about national security, it's going to be written from a paranoid mindset, and rightfully so.

        Okay, fine, I'll (temporarily) accept that paranoia is a good thing, here. But this is just one paranoid view. Another paranoid view is that with the number of foreigners employed in the tech sector, terrorists could already have been introducing backdoors into closed source products for years, now. Another paranoid view is that computers are inherently dangerous, electricity is the spawn of Satan, and we should all call each other Jebidiah, raise barns, churn butter, and sell cocaine. There's lots of paranoid views. Just because you think paranoia is acceptable in this instance doesn't do anything to validate the views expressed in the whitepaper. A lot of people, these days, have eschewed critical thinking for mindless support for whatever's been pushed to "stop the terrorists." It's both wrong and dangerous, even in paranoid times.

        Of course, paranoia isn't the right framing for anyone, anyway. Rational risk analysis is, and always has been, better. There's a massive divide between planning for the Worst Case Scenario and outright paranoia. We'd be wiser to not ignore it.

  • Microsoft advocacy (Score:5, Insightful)

    by magi ( 91730 ) on Monday June 10, 2002 @02:52PM (#3674131) Homepage Journal
    You might want to take a look at their technology pages [adti.net], especially the Anti-trust & Internet Regulation Program [adti.net] and Intellectual Property Program [adti.net] sections.

    Many of the headlines are quite revealing about their intentions. Many are about the importance of MCSE:

    • Inc. 500 Shops Value Certification Most (MCSE vs college degrees)
    • Familiarity Breeds Respect

      "Recruiters tend to hire MCSEs just as often, if not more so, than those with a four-year college degree."

    • Technology Trends: Program Provides Information For New Age

      "Eighty-seven percent of human resource managers surveyed believed that MCSE's are equally or more successful than college students."

    • The Impact of Technology Training Programs Case Study: MCSE Training
    And then there are numerous anti-trust criticism articles:
    • Break up Microsoft? Rest of world pooh-poohs the notion
    • Press Release: Japan, Switzerland, and the EU do NOT insist on breakup of Microsoft, unlike the U.S.
    • Fine Microsoft, use funds for new competition (anti-breakup)
    • Fine Microsoft and use funds to catalize new competition (anti-breakup)
    • Break-up Remedy for Microsoft Not Supported by Key Democrats
    • Technology and The Congressional Black Caucus (Microsoft anti-trust)
    • Breaking Windows Over Antitrust Dogma
    • Pause the Microsoft Case and Examine U.S. Anti-trust Policy
    • Punishing Winners Hurts the Marketplace
    • Suit Threatens U.S. Computer Dominance
    • Taking a Byte Out of Microsoft
    Etc. Also lots of articles about the precious intellectual property rights, although not specifically in relation to Microsoft.

    Make your own conclusions freely.

  • What I'd like explained to me is how the GPL could be considered somehow worse than other open source licenses for the purposes of national security. The apparent concern in using GPL software is that the source code is out there and available for hackers to look at. Even if you accept the logic that having that source code publicly available is more dangerous, I don't see how that would be different with a BSD style license.

    I could, as a proprietary vendor, take a BSD style license product, and close it up and sell it to the government. At that point though, until I start adding modifications, there is no reduction in the risk of some outside source finding a bug in the code. Once I do make modifications, there's the risk of complacency. Perhaps the government doesn't realize that the code I sold them is based on a buggy open source implementation and is thus vulnerable to a potential security breach.

    This just wreaks of having been written by Microsoft's PR department.

    Oh, and one more comment. The notion that the GPL is somehow one of the most restricitve licenses is complete hogwash. Does microsoft let you incorporate the windows source code into your product under ANY circumstances? Hell they don't even let you see the source code in the first place (and thank god since it's apparently riddled with big security holes). So how is that MORE restrictive?

    MMMMMM a big steaming pile of FUD!
  • For example, if the Federal Aviation Agency were to develop an application (derived from open source) which controlled 747 flight patterns, a number of issues easily become national security questions...

    FAA controlling the flight patterns of any aircraft is absolute nonsense! First, every pilot in the system would block it before it ever got past the talking stage, second it is just ignorant.

    Maybe software to control the traffic flow? Sorry, that deflates this FUD too, since it would not apply to just one airframe and the author assumes that the people operating the aircraft are just going to let that happen too.

    Maybe if he said some more nonsense about FAA requiring all 747s to have this software? Nope, that is the NTSB and the manufacturers, the latter would be marching on the Congress like you never seen before!

    Humm, here is a more believeable thing to scare people with "what if all automated traffic light systems had to run Open Source, could you imagine the national security issue of flashing red lights all over the heartland"?
    • While you make good points about why the example could not be, you never address the concerns of the example. This can be used for any number of other "sensitive" applications. If carnivore was Open Source, would it potentially be more open to being compromised? If the DOD systems were open source, would they be more open to being compromised?

      This is a valid concern about using OSS for "sensitive" applications. Yes, in theory, more eyes means more bugs found. But most "sensitive" applications are not the type that lots of people would be interested in running, so most people would not find the bugs. But the source always is there for black hats to look at, and if they find a bug before anyone else, they can exploit it. You can pooh-pooh the idea all you want, but the added safety that obscurity gives you must be weighed against the added benefit OSS would give you. Depending on the system, obscurity may win.
      • You are correct. The source code for these types of sensitive niche programs probably should be under lock and key, as the only people interested in taking a look at the source are those people who are looking for holes that they can exploit. However, there is nothing in the GPL that requires that you put your source code up on an FTP server. You are just required to turn over source code to software to the people that received binaries from you. If you only distribute binaries to one organization (like the DOD), then you only have to release the source code to one organization.

        It is also probably a good idea to build your system on Free Software components that do get a lot of use. Borland's Interbase had a secret backdoor password until it was released as a Free Software project just recently. If you based your top secret application on Interbase you could very easily have introduced a back door via the commercial software you used as the back end. In other words, for those parts of your project where you are utilizing commodity software (a database, an office suite, a web browser, etc.) you should be using something that comes with source code.

  • by Anonymous Coward on Monday June 10, 2002 @02:53PM (#3674140)
    This paper was prepared as part of The MITRE Corporation?s FY00 Mission-Oriented Investigation and Experimentation (MOIE) research project "Open Source Software in Military Systems.. This paper analyzes the business case of open source software. It is intended to help Program Managers evaluate whether open source software and development methodologies are applicable to their technology programs. In the Executive Summary, the paper explains open source, describes its significance, compares open source to traditional commercial off-the-shelf (COTS) products, presents the military business case, shows the applicability of Linux to the military business case, analyzes the use of Linux, discusses anomalies, and provides considerations for military Program Managers. The paper also provides a history of Unix and Linux, presents a business case model, and analyzes the commercial business case of Linux.

    Here [mitre.org]
  • by redmoss ( 108579 ) on Monday June 10, 2002 @02:56PM (#3674161) Homepage
    Remember the difference between the BSD-style and GPL-style freedoms are very important to MS. MS says BSD-licensed open code is good. Since MS can use it without contributing back, this is the kind of "free" that MS likes.

    MS also says GPL-licensed open code is bad. Since MS can't use it without contributing back, it can only be used by MS's free-software competitors, thus MS strongly dislikes this kind of "free".

    Now back to this study. Can anyone find the basic message surprising? "BSD code is benign, GPL is threatening". Microsoft-funded study, Microsoft-approved results.

    As a side note, if MS didn't make this distinction and got everyone upset about using *any* free/open code, everyone would *also* have to stop using MS software. Remember, significant portions of their OS are built upon BSD-licensed code.
  • Trademarks (Score:4, Insightful)

    by DustMagnet ( 453493 ) on Monday June 10, 2002 @02:58PM (#3674178) Journal
    "On a lighter note, while many open source enthusiasts are proponents for copyleft, they insist on trademark protection for their ideas."

    I have a hard time taking anyone seriously who could write that.

    Trademarks protect product labeling. Patents protect ideas.

    Unlike patents and copyrights, trademarks are there to protect consumers. If I go to the store and want to buy Kraft mac and cheese, I don't want to have someone labeling some other brand as Kraft. If it says RedHat, it should be from RedHat.

    The idea behind open source and trademarks are to help the end user. I don't see how they are incompatable.

  • "Another security concern is that the primary distribution channel for GPL open source is the Internet. As opposed to proprietary vendors, open source is freely downloaded. However, software in the public domain could contain a critical problem, a backdoor or worse, a dangerous virus."

    And how is this more dangerous than a propietary vendor discovering a flaw in there product, keeping quite and not fixing it because it costs too much money?

  • "On a lighter note, while many open source enthusiasts are proponents for copyleft, they insist on trademark protection for their ideas."

    I'm missing the joke, here. Copyright and Copyleft rights aren't the same thing as trademarks at all, and it's perfectly acceptable to enforce your rights under one but not the other. Or neither, or both, as is your want.

    Whatever irony the author tried to find in this alleged stance by "many open source enthusiasts" is lost on me.

  • by BranMan ( 29917 ) on Monday June 10, 2002 @03:00PM (#3674204)
    The FAA has incredibly strict requirements for software critical to keeping a plane in the air. Open Source or not, every single line must be proven to do exactly what it needs to, and the entire system must be deterministic (meet real-time requirements, such as knowing the maximum latency for interrupt processing). The FAA itself should be giving these jokers an earful - this is pure FUD.
  • It's true that hackers could find exploits if they had the source -- but is that any worse than just having the exploits freely available, as is the case with (e.g.) Internet Explorer?

    If the government really has a problem with open source, they can go ahead and contract to reimplement things from scratch. But for non-classified applications (such as serving documents available under the Freedom of Information Act), I see nothing wrong with open source solutions, especially if it can save the taxpayer some money! www.doe.gov, incidentally, is running Apache.
    • Re:Which is worse? (Score:2, Interesting)

      by grungeKid ( 4260 )
      www.doe.gov, incidentally, is running Apache.

      Funnily enough, so does ADTI. HTTP/1.0 200 OK Date: Mon, 10 Jun 2002 19:41:00 GMT Server: Rapidsite/Apa/1.3.20 (Unix) FrontPage/4.0.4.3 mod_ssl/2.8.4 OpenSSL/0.9.6 Last-Modified: Mon, 10 Jun 2002 06:09:04 GMT ETag: "9020935-1af5-3d044280" Accept-Ranges: bytes Content-Length: 6901 Connection: close Content-Type: text/html

  • "The federal government's information systems requirements intersect countless sensitive operations."

    If the federal government has done nothing wrong then I'm sure it has nothing to hide.
  • Vintage 1999 FUD (Score:5, Interesting)

    by ctid ( 449118 ) on Monday June 10, 2002 @03:01PM (#3674215) Homepage
    It's well worth reading the paper, because it's actually quite funny. But the thing that strikes me most about it is just how old fashioned it seems. I mean he advocates security through obscurity for God's sake! He believes that open source SW can't compete with closed source software, although he talks about Apache in the paper. He's clearly completely unaware of what the GPL represents and how it works.


    Of course any normal person would be utterly humiliated to have their name associated with this piece of nonsense. Perhaps that's why it has been pulled? I'd be interested if Microsoft really did pay for it. If so, I think they should feel a little cheated. The standard of FUD required in 2002 is far higher than this. Even the mainstream press are going to tear this crap to pieces.

  • by ansible ( 9585 ) on Monday June 10, 2002 @03:01PM (#3674217) Journal

    I love the quote on backdoors and viruses. Windows systems don't have their source code publically available, and yet that doesn't seem to stop the creation of backdoor programs and viruses.

    I like how they insinuate that people would just download some code from the Internet, and then immediately put that into a production air traffic control system. Talk about a straw man argument.

    Someone needs to explain to this think-tank (or senseless-opinion-tank) that people can do these things called code reviews. Ya see, if I download a new version of this mail client (for example), I can look at the differences between the current source and the last version I checked. Not only could I spot back doors, but I'd likely find some bugs too.

    These guys that develop safety-critical systems (like air traffic control) are real sticklers for inspections, documentation, etc. I bet most of them would be glad for more independant reviews of the code they depend on, rather than just hoping Windows doesn't have bugs in it.

    As for me, my requirements aren't as critical. When I downloaded OpenOffice from some mirror in Timbuktoo, all I did was check the MD5 sum. The five seconds that took assured me that at least no third-party inserted viruses or back doors in the program.

    • Windows does not have any intentional backdoors, it's just an OS that was designed for features and the security of a "disconnected environment". The second everyone got onto the Internet, MS realized the importance of security as hole after hole was announced. However, it's very difficult to take away features, and it takes a long time to role out a fundamentally different design. Regardless, Widnows' security (or lack thereof) has nothing to do with the fact that it's Closed Source. There are many of other commercial and Closed Source OS's, banking software, etc. that have incredible security. Actually, the only OSS OS (say that 3 times fast!0) that I know of that's really secure "out of the box" is OpenBSD.

  • Just in case everybody ./'s everyone else's mirror... http://balloons.space.edu/old_opensource_whitepape r.pdf
  • by SirSlud ( 67381 ) on Monday June 10, 2002 @03:04PM (#3674239) Homepage
    They play it as if it is, but by saying open-source good, GPL bad, they are clearly desperately attempting to keep the sea full of fish for MS when it needs a chunk of [stable and useful] code here and there for their projects. They hate the GPL cause theres no way they'll GPL the whole damn OS .. so this attack is specifically targetted at the GPL, with purely financial intentions in mind. The security angle is clearly just a way of getting people to read it, and to associate GPL with 'problems'. I'd imagine most decision-makers won't have to remember what those 'problems' are (much less understand them), but so long as they walk away going, 'open source good' (so MS can borrow at will, remember how much they like BSD license), 'GPL bad', they've done their job.

    Ironic, huh? MS has the power and might to take and use, and they dont perceive having to apply the same standards as their code-base contributors (ie, the borrowed code) to their own product. It's flat out hypocracy to anyone with half a clue .. fortunately for them, in this day and age of specialization and legal and technological complexity, thats 99.9999% of the population on any particular issue.

    Fuck 'em and their shareholders.

    I assume by decrying the GPL for security, their lame argument is .. "well, open source is fine, so long as we can keep the parts actually keeping the system secure obscured behind closed source?"

    So then why is open-source good? Seems to me that security is 80% of the benifit of open source. I guess MS's story is, 100% of the benifit of open source is 'borrowing' code, and 0% is security. Not surprising, but still infuriating.
  • Register Response (Score:2, Informative)

    by Blasphemy ( 78348 )
    Check out Thomas Greene's article [theregister.co.uk] at the Register [theregister.co.uk], a great critique.
  • by elfdump ( 558474 ) on Monday June 10, 2002 @03:09PM (#3674273)
    The open source debate is about keeping secrets. Completed (written) software is often locked by its programmer, hiding the underlying code from its user.

    Not so sure about this... I think we've all met programmers whose binaries were more readable than their source.

    ;)
  • by reaper20 ( 23396 ) on Monday June 10, 2002 @03:11PM (#3674292) Homepage
    NIH syndrome is more prevalent than people blatantly ripping off open source code or commiting 'acts of IP theft'. I think moreso than people give it credit for.

    Even Mandrake rewrote their installer to "differentiate" between Red Hat. Redhat doesn't include fontdrake, or any of their competitor GPL tools. It seems alot more like a bazaar of cathedrals to use the analogy.

    If I write the ultimate Linux app, what are the chances that someone is going to 'steal my IP', or even if it is GPL, contribute back? Look at the ton of duplicate GPL programs.

    If I were a programmer I think I'd GPL my software so people can look at the code and contribute patches - chances are some other OSS programmer is going to not like the language it was written in, which widget set I used, or whatever, and just rewrite it to suit their needs.

    I have no numbers to back this up, just seems that most programmers and/or companies prefer to write their own software, regardless of reusable code or license.
  • by MountainLogic ( 92466 ) on Monday June 10, 2002 @03:12PM (#3674303) Homepage
    How many thousands of unknown contract programmers have worked on MS code? Does MS do any federal background security checks? No!

    If we blindly take the assumptions of this article then only some DoD funded Unix should be used for Mission/Life critical systems.

    • Does MS do any federal background security checks?

      The moderators see fit to mod you up but you have no factual basis for your claims. I know people who are contracters at MS, and full time employees. First, they do pretty good background check on you. But that's really the point. Code just doesn't get checked in to CVS (lol!) without any sort of peer review and approval process. Think about OSS - can I, someone who has never hacked on a kernal, and someone who doesn't like GPL'd software, write some crap code and check it in to the Linux source tree?
  • The appendix listing open source licenses is missing one obvious license: the Microsoft Shared Source License (SSL)(www.microsoft.com/licensing/sharedsource/def ault.asp) under which you can download stuff like the Java killer ( aka .NET) open source project.

    Wondering if this is not considered an Open Source license enough after all, even with all the fuss that Microsoft made about it...

    Microsoft is just playing the game they want here, one day supporting Open source, the other day, bitching about it. Make up your mind, MSFT!

    PPA, the girl next door.
  • by pjrc ( 134994 ) <paul@pjrc.com> on Monday June 10, 2002 @03:17PM (#3674339) Homepage Journal
    Obviously they've never actually read any of those proprietary EULA's before they clicked ok.

    The GPL is one of the most uniquely restrictive product agreements in the technology industry.

    And, Yes, they have clicked ok to proprietary licenses much more restrictive than the GPL. These lines appear within their PDF file:

    /Producer (Acrobat Distiller 4.0 for Windows)

    /Author (default)
    /Creator (ADOBEPS4.DRV Version 4.24)
    /Title (Microsoft Word - sullivan.doc)

    This simple fact can be easily verified with a command such as "stringsold_opensource_whitepaper.pdf| grep^/"

  • Would it be prudent for the FAA to use software that thousands of unknown programmers have intimate knowledge of for something this critical

    How many people have intimate knowlege of the internal code is irrelavent. What is relavent is how many experts have examined the code to be sure that it is correct. Before code is used for something like flight controll I would expect experts to examine it closely to be sure it worked right. (actually not, game programers with an AI can probably do a better job just rewarding their system for smooth flights even in turbluant weather, but that is a different debate)

    100 experts paid by the goverment to assure the code is correct is not as good as 100 paid experts, plus 1000 amatures doing the same. And the existance of a few amatures sabotaging their work makes it better because it forces the experts to think things through. (when everything is expected to work you can be lazy with the rubber stamp, when some parts are suspected to be sabotaged you have to look closely)

    There is a theory of testing which says you put some number of known bugs in the code without telling the testers. Don't stop testing until they find all the known bugs because that gives you the best chance of stumbling across the unknown bugs. (the countery argument is fixing known bugs cna introduce more so it isn't a clear win, but it is still a point to consider)

  • Programmers that make a living leveraging the unique value of their software, do whatever it takes to keep their code secret. As expected, most successful programmers and companies do not disclose their code and sell their software without the source code.

    I guess you are probably not successful if you program open source. What do you suppose he means be successful?

  • by Hnice ( 60994 ) on Monday June 10, 2002 @03:33PM (#3674440) Homepage
    "If a software application representing 5000 hours uses GPL code that reflects only 100 hours, is the GPL fair in its argument that the entire product is GPL? "

    first of all, if the 100 hours is GPLd, then the GPL isn't 'arguing' anything -- the rest *is* GPLd, according to the GPL. using the verb 'argue' here is like saying that my rental agreement 'puts forth the assertion' that i have to pay my landlord every month. it's not appropriate, because there's nothing to argue, no ambiguity. the GPL is very clear here.

    second, if GPL'd software is, as the statement is clearly implying, a negligible part of the final product, what's the big deal with spending the other 100 hours to build that part yourself? no one's making you use that 100 hours worth of software.

    and imagine how stupid that argument sounds when phrased this way: "i just built a huge program that only makes use of [some copyrighted product] in passing -- why should i have to conform to that company's contract terms in order to use it?" would anyone argue that degree of use is going to make any difference at all here? and if you don't like corporate-bashing, consider this example -- "sure, i stole $100 from you, but i put it towards this car that cost $5000, so why should I owe you anything at all?"

    this is a stupid point. if you don't want to use GPLd code, don't, and if you do, understand the terms.
    • first of all, if the 100 hours is GPLd, then the GPL isn't 'arguing' anything -- the rest *is* GPLd, according to the GPL.

      People make this mistake all the time, but it is a mistake. If someone includes some GPL'ed work into a larger work, the larger work is not magically licensed under the GPL. (Nor, for that matter, is the copyright of the larger work magically made the property of the FSF). Instead, what becomes true is that the ensemble work cannot be legally distributed without violating the terms of the (GPL) license for the 100 hours.

      In this eventuality, what would happen would be that the copyright holder for that 100 hours of labor would sue the infringer, and in the best of all worlds, the infringer would be obligated through an injunction to cease distribution of the offending code. If the copyright holder for the 100 hours was willing, some monetary arrangement might be reached in return for an alternate license for the 100 hours of code.

      The problematic case is where the 100 hours of code was written by five coders spread over the planet, and nobody bothered to track who had copyright over what piece of the code. In that instance, all five coders should agree to the relicensing. If one of the coders does not agree to the relicensing, then the problem of how to clean up the 5000+100 hours of code devolves into one of cleaning up the 100 hours of code.

      There is nothing in the GPL that forces anyone to license code under the GPL, no matter how Microsoft may wish to construe it.

  • GPL fair? (Score:2, Redundant)

    by forehead ( 1874 )
    "If a software application representing 5000 hours uses GPL code that reflects only 100 hours, is the GPL fair in its argument that the entire product is GPL?

    This "argument" really bothers me. What would they say to this: "If a software application represeting 5000 hours uses proprietary code reflecting only 100 hours, should the author really be guilty of copyright infringment?"

    Last time I checked, no one was forced to use GPL code in their products. I think everyone would agree that the author of a piece of code is well within their rights to dictate the terms under which other people are allowed to use it. People who use the GPL effectively say, "I will share my code with you, however, you must share your code with me if you intend to use my code in your project".

    Some people (e.g. those who use the BSD license) don't mind if others use their code without sharing in return. That is their perogative.
  • This story came out early last week and is just a load of FUD. ADTI has no credibility and is funded by MicroSoft (which Microsoft admitted to).

    These are the same guys who claimed that second hand smoke isn't harmful. Their panel of experts contained Scientists and Doctors who had previously been employeed by the Tobacco industry.

    Article Link [smokefreeforhealth.org]

    Do a search for ADTI in article.

    You can view the article at Phillip Morris Tobaccos archive.
    See:

    Article Link [pmdocs.com]

    Or the PDF at:

    PDF Link [pmdocs.com]
  • There are hundreds of comments posted on /. every time some think tank, goverment sheep, or microsoft sponsored clone writes some desparaging article about open-source software, and that's all good, you all make wonderful points. However, sitting at your computer bitching to this site won't ever do much good, as I'm fairly certain all those clones, sheep, and "thinkers" will never hear a word of it.

    If you have something to say, why not start a petition? Why not write a well-written (as opposed to the one above) article and try to have a newspaper or respected journal publish it? Write your congressman (as I have done) and explain in a well-thought-out manner the points and counter points of why open source software is essential in maintaining the rate of innovation in the computer industry.

    I'm not complaining, or trying to be a troll, but even if you copied and pasted some of these very good comments that appear here into an e-mail to some of the powers that be, it would do far more good, and would probably make you feel much better about your day as well.

    Just my $0.02.

  • Yes, Microsoft's security sucks, and every one knows there are open security holes, and it takes ages for them to be patched... But Microsoft's OSes do have one advantage over all the current open source OSes -- Windows Update.

    It may take MS too long to patch their stuff, but when the patch does come out, access to that patch is quick and easy. An update facility for *nix would be a huge step in combatting bugs and security problems. The facility need not be centralized, either; individual distributions or packages could have their own repositories.

    Such a system could even go one step further than Microsoft and report when an unpatched hole is found, and give the option to disable that service 'til a fix is discovered. This would be highly appropriate for individuals, companies and governments who are worried about keeping their systems secure, and would keep them safer than any closed-source software can.
  • by kindbud ( 90044 ) on Monday June 10, 2002 @03:52PM (#3674615) Homepage
    On a lighter note, while many open source advocates atre proponents for copyleft, they insist on trademark protection for their ideas.

    You bet they do, or else commercial interests would steal their work and profit from it, without due compensation to the creator.

    I hear the Red Cross and Salvation Army have trademarks as well, which they zealously protect, even though they are in the business of giving stuff away to those in need.

    The Free Software Foundation, the Open Source Initiative and a number of other organized GPL enthusiasts protect their "marks"...

    Putting the word "marks" in quotes in this context seems to imply that not-for-profit trademark holders are not holding "real" trademarks, and therefore the author of the paper feels entitled to sneer at them.

    ...by posting notices in publications and websites that their trademarks are protected. For example, the notice on the OSI website reads, "... To identify your software distribution as OSI Certified, you must attach one of the following two notices..." The same is true for a number of prominent open source firms including VA Linux.

    This is the most damning section of the entire document, im my opinion. The author betrays his contempt for the fact that open source advocates utilize the copyright system as it was intended: to control the distribution of their works. What burns this author the most however, is that he knows they are correct and the GPL succeeds at its aims, which is preventing GPL code from being hijacked by proprietary, closed source projects. This makes him very angry, and he can barely conceal it in this paragraph.

    While each of these firms would insist that they are not against copyright protection, invoking the protections argues that they are against people copying their marketing documents and symbols.

    He left out the crucial phrase at the end of the sentence: "without authorization." This guy is really burned that the GPL is successful. And it seems clear to me now that "this guy" is the Microsoft FUD^WMarketing department. Their past FUD releases on this topic have been infamous for conflating trademark and copyright, as well as copyright and copy-prevention.

    Now I gotta go take a walk, because I am worked up. But man, this is the most blatant and desperate FUD I have read in a long, long time.
  • by Internet Dog ( 86949 ) on Monday June 10, 2002 @03:53PM (#3674625)
    From Page 12:
    When a software product is sold, it represents the efforts of a diverse team of individuals. The revenue from software compensates engineers, graphic artists, database programmers,hardware specialists, debuggers and a multitude of contractors, partners and vendors.
    In the U.S., the software sector accounted for approximately 319 million jobs in 2001 (see Appendix 8). Software development usually reflects very thin operating budgets and small margins for mistakes. Even after a software application is released, it is often not profitable until its second or third version. The developer must finance both the initial development phase and later modifications. Modifications
    This is interesting, approximately 111% of the U.S. population is employed in the software sector.

    According to the BLS Computer and Mathematical Occupations [bls.gov] employ 2,932,810 total employment. Of those 374k are employeed in the development or the customization of applications.

  • Challenge accepted (Score:5, Interesting)

    by ninewands ( 105734 ) on Monday June 10, 2002 @04:42PM (#3674985)
    "Another security concern is that the primary distribution channel for GPL open source is the Internet. As opposed to proprietary vendors, open source is freely downloaded. However, software in the public domain could contain a critical problem, a backdoor or worse, a dangerous virus."

    And your point, Mr. Brown, is exactly what?

    First point: Today I mistakenly started up IE's infamous "Windows Update" feature for the Win2K installation on the SunPCI card in my Ultra 10. The first "update" it wanted to install was the MS "Automatic Updater" so that Microsoft could cram changes to my system software down my throat whenever they chose to. Mr. Gates does not own my hardware, the State of Texas does. Given Microsoft's track record in the security area, please explain to me the exact difference between this "feature" and a "back door or worse, a dangerous virus"?

    Second point: Microsoft's "Windows update" service is ONLY available over the internet and is usually the ONLY source for critical security fixes and other patches for Microsoft products. Please tell me exactly how that differs from the normal distribution channel for GPL software.

    Reverse engineering "harbors very close to IP infringement because and has staggering economic implications."

    Please show me your bar number before you start rendering legal opinions, Mr. Brown. The only class of Intellectual Property that is infringed by reverse engineering is patents. Specifically, so-called "clean room" reverse engineering of copyrighted works has been repeatedly blessed by the courts as an exercise of the fair-use doctrine.

    "On a lighter note, while many open source enthusiasts are proponents for copyleft, they insist on trademark protection for their ideas."

    Mr. Brown, this "lighter note" comment of yours is little more than a cheap shot that openly displays your lack of understanding of the subject matter on which you write.

    "Open source enthusiasts" not only avail themselves of trademark protection, they also assert and defend their rights as copyright holders. This in no way conflicts with their advocacy of the principle of copyleft. What it DOES do is give them the power to enforce the particular license (GPL, LGPL BSD, or other) under which they choose to release their software.

    "If a software application representing 5000 hours uses GPL code that reflects only 100 hours, is the GPL fair in its argument that the entire product is GPL? This point is of considerable concern to software companies that value their secrets, design and architecture strategies. Proponents of the GPL argue that each party in the exchange is benefiting equally, but without a means to properly make this evaluation, this position at best is over-assuming."

    Answering your questions in order:

    Yes, if it's my GPL code, it most certainly IS fair. If Microsoft, Adobe, Symantec or whoever, wants to license my code for use in their proprietary product, I will be HAPPY to negotiate a special *non-exclusive* license with them for a SUBSTANTIAL fee. HOWEVER, if their objective is to take my code without payment and claim it as their own they had better be ready for MAJOR litigation.

    "The federal government's information systems requirements intersect countless sensitive operations. The limitless potential for holes and back doors in an open source product would require unyielding scrutiny by staff that decided to use it. For example, if the Federal Aviation Agency were to develop an application (derived from open source) which controlled 747 flight patterns, a number of issues easily become national security questions such as:
    Would it be prudent for the FAA to use software that thousands of unknown programmers have intimate knowledge of for something this critical?
    They already do. The FAA's Air Traffic Control Database uses Oracle 9i Real Application Clusters running on Dell PowerEdge servers and (surprise!) Red Hat Linux.
    Could the FAA take the chance that these unknown programmers have not shared the source code accidentally with the wrong parties?
    Apparently the FAA thinks it's a better gamble than hoping that no one with an old copy of debug.exe will find a buffer overflow in Windows 2000 Advanced Server.
    Would the FAA's decision to use software in the public domain invite computer 'hackers' more readily than proprietary products?"
    Again, you clearly demonstrate your lack of knowledge in this field, Mr. Brown. GPL software is NOT public domain. It is private property released for public use under license. It is no more public domain software than Windows XP. And ... in a more direct answer to your question ... Probably ... most of the 'script kiddies' I've encountered on the 'net have a burning desire to crack a Linux box and 0wn it. Do they manage to accomplish this desire? Not many of them.

    However, a more cogent inquiry would be "If the FAA's Air Traffic Control System is exposed to access from the public internet, shouldn't we fire all the boneheaded bureaucrats that decided it SHOULD be?"

    Most of the .mil TLD is not accessible from the public 'net, including ALL the most security-sensitive systems. These systems are isolated on a non-public backbone that you might be able to get to from the public internet if you were an EXTREMELY talented cracker, however, I'd be willing to bet that the FBI would be knocking on your door before you got through the third layer of firewalls and IDS's. Shouldn't something like the FAA's Air Traffic Control system be accorded the same level of security?

    Mr. Brown, your white paper exhibits a failure of understanding of your subject that I find very disappointing in one who would call his operation a "think-tank". You entitle your publication "Opening the Open-Source Debate," ... I will interpret that title as a challenge, and I accept. Debate me ... in the forum of your choice ...
  • by cOdEgUru ( 181536 ) on Monday June 10, 2002 @05:07PM (#3675193) Homepage Journal
    Ofcourse this guy is funded under the table by Gates and his minions.

    I googled for Andre Carter of Irimi Corpn whose comments Mr. Kenneth (or whatever frickin name he has) values more than anything else and this is what I found :

    One pro-Microsoft observer credited Gates with being precise and helpful. "His testimony has been soaked with real-world examples, [and it shows] he understands the ramifications of how the states [want to affect his business]," said E. Andre Carter, CEO of Irimi, a Washington-based mobile and wireless consultancy, who also works for the pro-Microsoft lobbying group Americans for Technology Leadership.


    BINGO!

    When idiots like these make money by lying through their teeth, spread FUD and otherwise confuse the idiots who make decisions in the Senate and everywhere else, this industry, this country and the world we live in has such a fucked up future.

Love may laugh at locksmiths, but he has a profound respect for money bags. -- Sidney Paternoster, "The Folly of the Wise"

Working...