[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Fwd: Re: MS?]




Paul Tiger wrote:


From:        "Paul Tiger" <tigerp@xxxxxxxxx>
Date:         Sat, 10 Apr 2004 11:05:59 -0600
To:             <cvv-discuss@xxxxxxxxxxxxxxxxx>

Paul Tiger <tigerp@xxxxxxxxx> wrote:

>> Thread name change ---

Lou - you've mentioned MS software a number of times. While there are systems using MS as an OS there isn't anyone here that I know of that is pushing MS. We've all be pushing Linux or something open. I like BSD. <<

I too like Linux (and I've used several flavors over the last six years or so at the level of being a determined, patient and stubborn user of applications, not by any stretch as a systems guru). However I am not so much biased toward a particular open system as the (long-term) basis of a trustworthy voting system, but rather that we first not have an UNtrustworthy system in the short-term that may well become long-term, and second that then Boulder County can have the opportunity to consider open software that MIGHT develop into a trustworthy voting system.

My main concern is what we here in Boulder County are evidently facing, which is the Hart InterCivic voting system - which (however well-intentioned and impressively developed IMHO) is entirely based on MS-Windows software: its operating system, its server system, its drivers and applications, its linkage to the Sequoia registration database, its linkage to independent "failsafe" triple-storage, and its linkage to web-based updating.

>> You've made such a big deal out of your issue with MS (and I don't disagree with the premise) that I am guessing that you are addressing some specific system by some certain maker. Who & What are you directing these comments toward and in relation to?
<<


I do think it's a "big deal" because I have seen the results of costly MS-Windows malware disasters on clients and related enterprises (large and small vendors, law firms, multinational corporate and govenment databases) as well as at a news-observer level watching world-wide disasters on millions of desktops and servers affecting vital infrastructure at many levels, whether financial systems churning trillions of dollars in speculative derivatives, or entire regional networks of energy generation and distribution.

As far as specific systems of applications, I have long considered, for example, the desktop MS Office Suite to be in general inferior for my own needs to several alternatives, such as Open Office, and which more and more is handling most of my MS-dependent client needs. The two XP desktops which I am forced to maintain, under firewall-security with automated updating, are almost entirely directed at coping with interoperation and conversion for clients - I do virtually nothing myself using MS applications. However desktop MS Office seems largely irrelevant with respect to voting machines - it's the MS operating system and server software, and voting-related applications that are of real concern. The perpetually reported MS defects whose patches are appallingly late (seven months recently), unpatched (currently at least eight security-critical defects) or never patched (thousands of Windows 2000 defects - mostly minor, some critical) are NOT indications of a trustworthy business model for something as prime time as a voting system, again however well designed (but closed) the Hart InterCivic applications may be.

>> One thing that I would like to address about MS boxes is that if you don't connect them to the internet it's going to be pretty difficult to have any of the exploits that we know about damage those systems. As it stands currently, no one is connecting balloting machines to the internet. There is no reason to do this, and the way in which things are set up at our clerk's office it would be an physical and logical impossibility.
<<


I don't agree that the MS boxes do not need to be connected to the internet. There is no timely and responsible way that I know of to update the frequent RELEASED patches without connecting to the Internet. Users must trust that Microsoft itself knows best how to install the updates that they themselves must generate, so online installation is virtually mandatory to verify all the incredibly Byzantine dependencies. However even some Redmond servers, 1100 in one campus building alone, could not be fully verified in time last summer to avoid many being crashed by malware. The Catch 22 for a voting system is that the system must be isolated at certification from any modem, wireless, or other network linkage to the outside world, yet still be a trustworthy system. It is highly unlikely that just the KNOWN required eight patches will be available before certification, much less that ANY of the inevitable FUTURE reported defects will have patches available and installed (by Internet) and recertifiable. Updating a certified system without recertification would be irresponsible, because it must be verified that the update was indeed properly installed and was indeed the genuine and secure update, not a malware counterfeit downloaded from a fake MS website, as is now occurring more often.

>>Win 2K Pro is pretty stable.
<<

Hmmm ... really? Here's one recent example extracted from Information Week, 13 April, 2004:

"Microsoft Releases A Bevy Of Security Updates; Four security bulletins address more than 20 specific software security holes, and three of the four are rated as critical."
" ... The flaws affect virtually every major Windows operating system currently supported: Windows NT Workstation 4.0, Windows NT Server 4.0 (including the Terminal Server Edition), Windows 2000, XP, as well as Windows Server 2003. One of the critical bulletins, MS04-13, also affects versions of the company's desktop operating systems Windows 98, SE, and Windows Millennium Edition ..."


>>You sound to me like someone who has had difficulty applying patches for MS and your response is that it shouldn't be used at all. Am I even close? MS doesn't make it easy for end users, because they want you to pay geeks like me that they trained for a few grand to do their dirty work.
<<


The difficulty is with MS - they install the patches automatically (when they are finally issued, usually very late or often too late). Personally (i.e. at my laptop) I have happily avoided all recent MS malware-interaction by using a dual-boot Mac/Linux to interface with the MS/NT/XP-dependent/dominant world of clients and enterprises - except for those interoperability and conversion issues, which is enough of a challenge for my strictly user-level of ignorance. I would not trust any Linux nor OSX nor BSD nor any other current flavor of open source code without completely open, security-targeted, election-specific certification. For the fall election, we may have to deal with Windows XP, which is widely agreed to have hundreds of thousands of (mostly syntax) defects. We can only hope that the vast majority of those defects are indeed minor and can be handled by rebooting away the Blushing-Bill Blue Screen of Death, but many of these thousands of defects are security-critical and are found only by experience and end-result testing. It is estimated by XP-loving security experts* to have a highly conservative 1 security-related defect for each 10,000 lines of code among its some 45 million lines of initial code. That's at the least 4500 attackable defects (mostly undiscovered, hence yet unpatchable) that must have a patch to ever justify calling XP an election-trustworthy OS. I submit no army of geeks with proprietary access will ever be paid to examine all 45 million line-by-line. [*See e.g. Malware by Ed Skoudis, Prentice Hall 2004.]

>>MS isn't the only thing that has exploits and has been hacked. Pick any one of your favorite open source OSs and we can find a laundry list of exploits that have been created and implemented. If UNIX and Linux were so rock solid, then why would CU have a specific group of people who spend their waking hours finding a defeating hackers on such systems?
<<


It's certainly true that Unix-type and any other OS is susceptible (even my laptop PPC has at least seven long known/patched defects) to errors in coding and hence to malfunction and malware attack. But only open software can be available to the level of scrutiny that MIGHT someday result in a trustworthy digital voting system - it could be that it will never be either rock-solid or even practical enough to develop such a system. I think a reasonable comparison is OSX versus MS/NT/XP during the last year - the relatively open OSX has not had nearly the level of digital devastation associated with it that Balmer/Billware has. Within the last year MS has indeed carried out a major change in attitude toward quality and security - which might somewhat improve "Longhorn" whenever it appears - but we have to deal with the present and past software and its defects in the November election.

-----Original Message-----
From: Lou Puls [mailto:lpuls@xxxxxxxxxxxxx]
Sent: Friday, April 09, 2004 11:57 AM
To: cvv-discuss@xxxxxxxxxxxxxxxxx
Subject: Re: "Luddite" hand counting

[|>] snip
Let's discuss the merits of such issues and not fritter away energy on minor detail. How about some balanced, constructive views on why this highly vulnerable, defective (MS-Windows) software should be acceptable for such an important civic function? With the digital talent
represented in this group, credible legal action could still be mounted to stop it down and allow recountable paper ballots of record - but only if this group takes a firm stand on the obvious.
[|>]