Not discrediting Open Source Software, but nothing is 100% safe.

  • Cypher@lemmy.world
    link
    fedilink
    English
    arrow-up
    76
    arrow-down
    1
    ·
    1 year ago

    Luckily there are people who do know, and we verify things for our own security and for the community as part of keeping Open Source projects healthy.

      • andrew@lemmy.stuart.fun
        link
        fedilink
        English
        arrow-up
        18
        ·
        edit-2
        1 year ago

        And to a large extent, there is automatic software that can audit things like dependencies. This software is also largely open source because hey, nobody’s perfect. But this only works when your source is available.

          • andrew@lemmy.stuart.fun
            link
            fedilink
            English
            arrow-up
            4
            ·
            1 year ago

            See my comment below for more of my thoughts on why I think heartbleed was an overwhelming success.

            And you help make my point because openssl is a dependency which is easily discovered by software like dependabot and renovate. So when the next heartbleed happens, we can spread the fixes even more quickly.

            • 018118055@sopuli.xyz
              link
              fedilink
              English
              arrow-up
              2
              ·
              1 year ago

              Enterprise software inventory can unfortunately be quite chaotic, and understanding the exposure to this kind of vulnerability can take weeks if not longer.

      • buckykat@lemmy.fmhy.ml
        link
        fedilink
        English
        arrow-up
        9
        ·
        1 year ago

        Also because those people who can audit it don’t have a financial incentive to hide any flaws they find

      • AlexWIWA@lemmy.ml
        link
        fedilink
        English
        arrow-up
        8
        ·
        1 year ago

        It’s safe because there’s always a loud nerd who will make sure everyone knows if it sucks. They will make it their life mission

          • AlexWIWA@lemmy.ml
            link
            fedilink
            English
            arrow-up
            2
            ·
            1 year ago

            I’ll listen to them because I love OSS drama. But you’re right that they may just get passed over at large

      • kbotc@lemmy.world
        link
        fedilink
        English
        arrow-up
        3
        ·
        1 year ago

        My very obvious rebuttal: Shellshock was introduced into bash in 1989, and found in 2014. It was incredibly trivial to exploit and if you had shell, you had root perms, which is insane.

        env x=‘() { :;}; echo vulnerable’ bash -c “echo this is a test”

    • guy@lemmy.world
      link
      fedilink
      English
      arrow-up
      4
      ·
      1 year ago

      Though one of the major issues is that people get comfortable with that idea and assume for every open source project there is some other good Samaritan auditing it

      • 𝕽𝖔𝖔𝖙𝖎𝖊𝖘𝖙@lemmy.world
        link
        fedilink
        English
        arrow-up
        8
        ·
        1 year ago

        I would argue that even in that scenario it’s still better to have the source available than have it closed.

        If nobody has bothered to audit it then the number of people affected by any flaws will likely be minimal anyway. And you can be proactive and audit it yourself or hire someone to before using it in anything critical.

        If nobody can audit it that’s a whole different situation though. You pretty much have to assume it is compromised in that case because you have no way of knowing.

        • guy@lemmy.world
          link
          fedilink
          English
          arrow-up
          4
          ·
          1 year ago

          Oh definitely, I fully agree. It’s just a lot of people need to stop approaching open source with an immediate inherent level of trust that they wouldn’t normally give to closed source. It’s only really safer once you know it’s been audited.

    • bill_1992@lemmy.world
      link
      fedilink
      English
      arrow-up
      2
      ·
      1 year ago

      Have you seen the dependency trees of projects in npm? I really doubt most packages are audited on a regular basis.

  • Holzkohlen@feddit.de
    link
    fedilink
    English
    arrow-up
    60
    ·
    1 year ago

    But eventually somebody will look and if they find something, they can just fork the code and remove anything malicious. Anyways, open source to me is not about security, but about the public “owning” the code. If code is public all can benefit from it and we don’t have to redo every single crappy little program until the end of time but can instead just use what is out there.
    Especially if we are talking about software payed for by taxes. That stuff has to be out in the open (with exception for some high security stuff - I don’t expect them to open source the software used in a damn tank, a rocket or a fighter jet)

  • s_s@lemmy.one
    link
    fedilink
    English
    arrow-up
    54
    ·
    edit-2
    1 year ago

    Closed-source software is inherently predatory.

    It doesn’t matter if you can read the code or not, the only options that respect your freedom are open source.

  • stappern@lemmy.one
    link
    fedilink
    English
    arrow-up
    44
    ·
    1 year ago

    Completely missing the point. Collective action is what makes open source software accessible to everybody.

    You dont NEED to be able to audit yourself. Still safer than proprietary software every way you look at it.

    • Lennard@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      7
      arrow-down
      3
      ·
      1 year ago

      While I generally agree, the project needs to be big enough that somebody looks through the code. I would argue Microsoft word is safer than some l small abandoned open source software from some Russian developer

      • stappern@lemmy.one
        link
        fedilink
        English
        arrow-up
        9
        arrow-down
        2
        ·
        1 year ago

        no, proprietary software its always possible malware and you have no weapon against it. being able to audit is always better.

        • Lennard@lemmy.dbzer0.com
          link
          fedilink
          English
          arrow-up
          2
          ·
          1 year ago

          That’s true, but I’m not a programmer and on a GitHub project with 3 stars I can’t count on someone else doing it. (Of course this argument doesnt apply to big projects like libre office) With Microsoft I can at least trust that they will be in trouble or at least get bad press when doing something malicious.

          • Cyclohexane@lemmy.mlM
            link
            fedilink
            English
            arrow-up
            2
            ·
            1 year ago

            I mean if a github project has only 3 stars, it means no one is using it. Why does safety matter here? Early adopting anything has risks.

            This is kind of a false comparison. If it has 3 stars then it doesn’t even qualify for this conversation as literally no one is using it.

          • stappern@lemmy.one
            link
            fedilink
            English
            arrow-up
            2
            arrow-down
            1
            ·
            1 year ago

            undefined> With Microsoft I can at least trust that they will be in trouble

            lol yeah if anybody finds out… something something NSA

      • rufus@discuss.tchncs.de
        link
        fedilink
        English
        arrow-up
        6
        ·
        edit-2
        1 year ago

        Ehmm. if nobody uses it, it kinda doen’t matter if it’s safe. And for this example: I bet more people had a look at the code of LibreOffice than MS Office. And i dont think it sends telemetry home in default settings.

  • Cyclohexane@lemmy.mlM
    link
    fedilink
    English
    arrow-up
    41
    ·
    1 year ago
    1. Yes, I do it occasionally
    2. You don’t need to. If it’s open source, it’s open to billions of people. It only takes one finding a problem and reporting it to the world
    3. There are many more benefits to open source: a. It future proofs the program (many old software can’t run on current setups without modifications). Open source makes sure you can compile a program with more recent tooling and dependencies rather than rely on existing binaries with ancient tooling or dependencies b. Remove reliance on developer for packaging. This means a developer may only produce binaries for Linux, but I can take it and compile it for MacOS or Windows or a completely different architecture like ARM c. It means I can contribute features to the program if it wasn’t the developer’s priority. I can even fork it if the developer didn’t want to merge it into their branch.
    • ArrogantAnalyst@feddit.de
      link
      fedilink
      English
      arrow-up
      9
      arrow-down
      1
      ·
      1 year ago

      Regarding point 2. I get what you’re saying but I instantly thought of Heartbleed. Arguably one of the most used examples of open source in the world, but primarily maintained by one single guy and it took 2 years for someone to notice the flaw.

  • mobley@ani.social
    link
    fedilink
    English
    arrow-up
    39
    ·
    1 year ago

    You shouldn’t automatically trust open source code just because its open source. There have been cases where something on github contains actual malicious code, but those are typically not very well known or don’t have very many eyes on it. But in general open source code has the potential to be more trustworthy especially if its very popular and has a lot of eyes on it.

    • Rocinante@lemmy.one
      link
      fedilink
      English
      arrow-up
      2
      ·
      1 year ago

      It’s one reason I haven’t rushed to try out every lemmy app that has come out yet.

  • Dr. Jenkem@lemmy.blugatch.tube
    link
    fedilink
    English
    arrow-up
    38
    ·
    edit-2
    1 year ago

    A lot of bad takes in here.

    Here are a few things that apparently need to be stated:

    • Any code that is distributed can be audited, closed or open source.
    • It is easier to audit open source code because, well, you have the source code.
    • Closed source software can still be audited using reverse engineering techniques such as static analysis (reading the disassembly) or dynamic analysis (using a debugger to walk through the assembly at runtime) or both.
    • Examples of vulnerabilities published by independent researchers demonstrates 2 things: people are auditing open source software for security issues and people are in fact auditing closed source software for security issues
    • Vulnerabilities published by independent researchers doesn’t demonstrate any of the wild claims many of you think they do.
    • No software of a reasonable size is 100% secure. Closed or open doesn’t matter.
    • stevedidWHAT@lemmy.world
      link
      fedilink
      English
      arrow-up
      7
      ·
      edit-2
      1 year ago

      Very good points here, especially your last point

      As you increase the complexity of a system, it makes sense that your chance of vulnerability increases. End of the day, open source or not, you will never beat basic algorithm principals and good coding practice.

      I would however argue that just because closed source code is possibly reversed doesn’t mean it’s easier or as reliable as having the source code. As long as corporations have an interest in possession there will always be someone striving and spending ungodly amounts of money to keep their castle grounds gated heavily which makes securing them en mass much harder and slower

      • Dr. Jenkem@lemmy.blugatch.tube
        link
        fedilink
        English
        arrow-up
        6
        ·
        1 year ago

        I agree, it takes longer to audit closed source software. Just wanted to point out it’s not impossible, as long as you have a binary.

    • theblueredditrefugee@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      7
      arrow-down
      1
      ·
      1 year ago

      Closed source software can still be audited using reverse engineering techniques such as static analysis (reading the disassembly) or dynamic analysis (using a debugger to walk through the assembly at runtime) or both.

      How are you going to do that if it’s software-as-a-service?

      • Dr. Jenkem@lemmy.blugatch.tube
        link
        fedilink
        English
        arrow-up
        13
        ·
        1 year ago

        See the first bullet point. I was referring to any code that is distributed.

        Yeah, there’s no way to really audit code running on a remote server with the exception of fuzzing. Hell, even FOSS can’t be properly audited on a remote server because you kind of have to trust that they’re running the version of the source code they say they are.

        • EuphoricPenguin@normalcity.life
          link
          fedilink
          English
          arrow-up
          1
          ·
          1 year ago

          You can always brute force the SSH login and take a look around yourself. If you leave an apology.txt file in /home, I’m sure the admin won’t mind.

            • EuphoricPenguin@normalcity.life
              link
              fedilink
              English
              arrow-up
              1
              ·
              edit-2
              1 year ago

              That’s not universally true, at least if you’re not on the same LAN. For example, most small-scale apps hosted on VPSs are typically configured with a public-facing SSH login.

    • stappern@lemmy.one
      link
      fedilink
      English
      arrow-up
      2
      arrow-down
      1
      ·
      1 year ago

      Ah yes let’s audit through reverse engineering. The same thing huh? xD

      • Dr. Jenkem@lemmy.blugatch.tube
        link
        fedilink
        English
        arrow-up
        1
        ·
        edit-2
        1 year ago

        Second bullet point, it’s much easier to audit when you have the source code. Just wanted to point out it’s not important to audit closed source software. It’s just more time consuming and fewer people have the skills to do so.

    • nous@programming.dev
      link
      fedilink
      English
      arrow-up
      0
      ·
      1 year ago

      Also, just because you can see the source code does not mean it has been audited, and just because you cannot see the source code does not mean it has not been audited. A company has a lot more money to spend on hiring people and external teams to audit their code (without needing to reverse engineer it). More so than some single developer does for their OSS project, even if most of the internet relies on it (see openssl).

      • Dr. Jenkem@lemmy.blugatch.tube
        link
        fedilink
        English
        arrow-up
        5
        ·
        1 year ago

        And just because a company has the money to spend on audits doesn’t mean they did, and even when they did, doesn’t mean they acted on the results. Moreover, just because code was audited doesn’t mean all of the security issues were identified.

        • nous@programming.dev
          link
          fedilink
          English
          arrow-up
          1
          ·
          1 year ago

          Yup, all reasons why it does not matter if the software is open or closed as to how secure it might be. Both open and closed source code can be developed in a more or less secure fashion. Just because something could be done does not mean it has been done.

          • Dr. Jenkem@lemmy.blugatch.tube
            link
            fedilink
            English
            arrow-up
            1
            ·
            1 year ago

            Nah I wouldn’t say that. Especially if you consider privacy a component to security. The fact that a piece of software can more easily be independently reviewed, either by you or the open source community at large, is something I value.

            • nous@programming.dev
              link
              fedilink
              English
              arrow-up
              1
              ·
              1 year ago

              Good security is a component to privacy. But you can have good security with no privacy - that is the whole idea of a surveillance state (which IMO is a horrifying concept). Both are worth having, but my previous responses were only about the security aspect of OSS. There are many other good arguments to have about the benefits of OSS, but increased security is not a valid one.

  • ichbinjasokreativ@lemmy.world
    link
    fedilink
    English
    arrow-up
    35
    ·
    1 year ago

    The point is not that you can audit it yourself, it’s that SOMEBODY can audit it and then tell everybody about it. Only a single person needs to find an exploit and tell the community about it for that exploit to get closed.

    • theangryseal@lemmy.world
      link
      fedilink
      English
      arrow-up
      8
      ·
      1 year ago

      Exactly! I wait on someone who isn’t an idiot like me to say, “ok, so here’s what’s up guys.”

  • SkyNTP@lemmy.ml
    link
    fedilink
    English
    arrow-up
    33
    arrow-down
    3
    ·
    1 year ago

    “Transparent and accountable government is a waste of time because I personally don’t have the time to audit every last descision.”

    OP, you are paranoid beyond belief.

  • utopia_dig@lemmy.ml
    link
    fedilink
    English
    arrow-up
    28
    arrow-down
    1
    ·
    1 year ago

    I really like the idea of open source software and use it as much as possible.

    But another “problem” is that you don’t know if the compiled program you use is actually based on the open source code or if the developer merged it with some shady code no one knows about. Sure, you can compile by yourself. But who does that 😉?

    • aname@lemmy.one
      link
      fedilink
      English
      arrow-up
      24
      ·
      1 year ago

      But another “problem” is that you don’t know if the compiled program you use is actually based on the open source code or if the developer merged it with some shady code no one knows about.

      Actually, there is a Debian project working on exactly that problem, called reproducible builds

      https://wiki.debian.org/ReproducibleBuilds

      • jdeath@lemm.ee
        link
        fedilink
        English
        arrow-up
        2
        ·
        1 year ago

        yes and others are working on it, also! i believe some android folks are (f-droid iirc), and i’ve heard about it elsewhere. this stuff is super nerdy (so therefore cool to nerds such as myself). before the internet existed it would be so hard to even imagine the need for this sort of thing!

    • fabian_drinks_milk@lemmy.fmhy.ml
      link
      fedilink
      English
      arrow-up
      15
      ·
      1 year ago

      You can check it using the checksum. But who does that?

      In all seriousness I am running NixOS right now using flakes. The package manager compiles everything unless a trusted source already has it compiled, in which case the package manager checks the checksum to ensure you still get the same result and downloads that instead. It also aims to be fully reproducible and with flakes it automatically pins all dependency versions so next time you build your configurations, you get the same result. It is all really cool, but I still don’t understand everything and I’m still learning it.

      • coolin@beehaw.org
        link
        fedilink
        English
        arrow-up
        4
        ·
        edit-2
        1 year ago

        Based NixOS user

        I love NixOS but I really wish it had some form of containerization by default for all packages like flatpak and I didn’t have to monkey with the config to install a package/change a setting. Other than that it is literally the perfect distro, every bit of my os config can be duplicated from a single git repo.

        • fabian_drinks_milk@lemmy.fmhy.ml
          link
          fedilink
          English
          arrow-up
          1
          ·
          1 year ago

          Great points. I kinda feel the same with containerization. I have been wanting change my OS on my home server and while NixOS is great for that, I have decided to do things differently and use OpenSUSE Micro OS. My plan was actually Fedora Core OS, but after that Red Hat drama I decided to run with SUSE instead. It is an immutable distro with atomic upgrades that is designed for being a container host. It uses Ignition as the configuration for setting up things like users, services, networking, etc. My plan is then to just use containers like I was doing before on Fedora Server and for the other things to use Nix to build container images. Instead of using DockerFile, you’d use Nix Flakes to create really minimal images. Instead of starting with a full distro like Alpine, Nix starts from scratch and copies all dependencies over as specified in your flake. So the image only contains the absolute minimum to run. I think I’d be a fun side project while learning more about Ignition, Linux containers and Nix Flakes.

          As for your point on config, I think it’s just part of the trade offs of NixOS. You either have a system that can be modified easily at anytime through the shell or you have a system that you modify centrally and is fully reproducible. You can already install packages with nix-env in the command line without changing your config, but that also won’t be reproducible. Maybe a GUI app for managing your config and packages could be helpful, although I’m pretty sure that’s low priority for NixOS right now.

  • Shameless Genius@lemmy.world
    link
    fedilink
    English
    arrow-up
    29
    arrow-down
    3
    ·
    1 year ago

    We trust open source apps because nobody would add malicious codes in his app and then release the source code to public. It doesn’t matter if someone actually looks into it or not, but having the guts to publish the source codes alone brings a lot of trust on the developer. If the developer was shady, he would rather hide or try to hide the source code and make it harder for people to find it out.

    • And009@vlemmy.net
      link
      fedilink
      English
      arrow-up
      9
      ·
      1 year ago

      Since it’s publicly available and used widely enough, there would be ‘those’ people who like finding cracks in code or just have knack for looking deep through all kinds of data.

      Not everyone is malicious and that part of humanity is something we have to trust in.

    • nous@programming.dev
      link
      fedilink
      English
      arrow-up
      1
      ·
      1 year ago

      What about the various NPM packages written by one guy. Who then moved on to other things then gave control of that package to someone else that seemed legit. Only for them to slowly add melicious code to that once trusted package that is used by a large number of other packages?

      Or someone raising a pull request for a new feature or something that on the surface looks legit on its own. But when combined with other PRs or existing code ends up in a vulnerability that can be exploited.

  • ghostermonster@discuss.tchncs.de
    link
    fedilink
    English
    arrow-up
    26
    ·
    edit-2
    1 year ago

    Just that there is ability to read and change the code, even if not everyone reads it, makes developers away from idea to put something malicious there.

    • Stelus42@lemmy.ca
      link
      fedilink
      English
      arrow-up
      3
      arrow-down
      9
      ·
      1 year ago

      Just like how no one has ever put anything malicious on Wikipedia. Nope, never, not once

      • ghostermonster@discuss.tchncs.de
        link
        fedilink
        English
        arrow-up
        8
        ·
        1 year ago

        Wikipedia accepts all new entries by default. Almost all open source projects review any contribiution first before merge.

        It’s also not fair comparison, because there can’t exists an encyclopedia you can learn from but not look what’s inside it. But you can obfuscate machine code, making it very hard to see what it does, so it’s more temping for code developers to put malicious features when noone can see it.

    • redditcunts@lemmy.world
      link
      fedilink
      English
      arrow-up
      4
      arrow-down
      38
      ·
      1 year ago

      This is wrong and ignorant. It happens all the fucking time. Software vendor supply chain is a huge fucking issue.

      Christ, tell me you have no idea what your talking about with 1 sentence vibes.

      • stappern@lemmy.one
        link
        fedilink
        English
        arrow-up
        20
        arrow-down
        1
        ·
        1 year ago

        how about you chill? it will happens less frequently than with proprietary software…

        • redditcunts@lemmy.world
          link
          fedilink
          English
          arrow-up
          2
          arrow-down
          45
          ·
          1 year ago

          Lol no it doesn’t. It happens weekly, all the fucking time.

          Source: I’ve been developing oss software for 20 years and have had to push hundreds of teams to fix their vendors bin.

          Chill == I ain’t got shit to say 🤣

          • stappern@lemmy.one
            link
            fedilink
            English
            arrow-up
            19
            ·
            1 year ago

            ah, found the redditor.

            best of luck im not doing that shit again,you act like a child.

            • bloodfart@lemmy.ml
              link
              fedilink
              English
              arrow-up
              1
              ·
              1 year ago

              Hey I know it sucks when someone isn’t nice to you, but that person is about as right as can be.

              Just a month ago thousands of malicious commits discovered on git made the news. Unaudited repositories are a huge vector for attack and have been for years.

              If that person seems pissed off you could chalk it up to hearing about this stuff on newsgroup discussion two decades ago.

      • Cyclohexane@lemmy.mlM
        link
        fedilink
        English
        arrow-up
        2
        ·
        1 year ago

        Software vendor supply chain affects ALL software. It is caught much sooner with open source.