[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Fwd: Re: MS?]
Paul Tiger wrote:
From: "Paul Tiger" <tigerp@xxxxxxxxx>
Date: Sat, 10 Apr 2004 11:05:59 -0600
To: <cvv-discuss@xxxxxxxxxxxxxxxxx>
Paul Tiger <tigerp@xxxxxxxxx> wrote:
>> Thread name change ---
Lou - you've mentioned MS software a number of times. While there are
systems using MS as an OS there isn't anyone here that I know of that is
pushing MS. We've all be pushing Linux or something open. I like BSD.
<<
I too like Linux (and I've used several flavors over the last six years
or so at the level of being a determined, patient and stubborn user of
applications, not by any stretch as a systems guru). However I am not
so much biased toward a particular open system as the (long-term) basis
of a trustworthy voting system, but rather that we first not have an
UNtrustworthy system in the short-term that may well become long-term,
and second that then Boulder County can have the opportunity to consider
open software that MIGHT develop into a trustworthy voting system.
My main concern is what we here in Boulder County are evidently facing,
which is the Hart InterCivic voting system - which (however
well-intentioned and impressively developed IMHO) is entirely based on
MS-Windows software: its operating system, its server system, its
drivers and applications, its linkage to the Sequoia registration
database, its linkage to independent "failsafe" triple-storage, and its
linkage to web-based updating.
>> You've made such a big deal out of your issue with MS (and I don't
disagree with the premise) that I am guessing that you are addressing
some specific system by some certain maker. Who & What are you
directing these comments toward and in relation to?
<<
I do think it's a "big deal" because I have seen the results of costly
MS-Windows malware disasters on clients and related enterprises (large
and small vendors, law firms, multinational corporate and govenment
databases) as well as at a news-observer level watching world-wide
disasters on millions of desktops and servers affecting vital
infrastructure at many levels, whether financial systems churning
trillions of dollars in speculative derivatives, or entire regional
networks of energy generation and distribution.
As far as specific systems of applications, I have long considered, for
example, the desktop MS Office Suite to be in general inferior for my
own needs to several alternatives, such as Open Office, and which more
and more is handling most of my MS-dependent client needs. The two XP
desktops which I am forced to maintain, under firewall-security with
automated updating, are almost entirely directed at coping with
interoperation and conversion for clients - I do virtually nothing
myself using MS applications. However desktop MS Office seems largely
irrelevant with respect to voting machines - it's the MS operating
system and server software, and voting-related applications that are of
real concern. The perpetually reported MS defects whose patches are
appallingly late (seven months recently), unpatched (currently at least
eight security-critical defects) or never patched (thousands of Windows
2000 defects - mostly minor, some critical) are NOT indications of a
trustworthy business model for something as prime time as a voting
system, again however well designed (but closed) the Hart InterCivic
applications may be.
>> One thing that I would like to address about MS boxes is that if you
don't connect them to the internet it's going to be pretty difficult to
have any of the exploits that we know about damage those systems. As it
stands currently, no one is connecting balloting machines to the
internet. There is no reason to do this, and the way in which things are
set up at our clerk's office it would be an physical and logical
impossibility.
<<
I don't agree that the MS boxes do not need to be connected to the
internet. There is no timely and responsible way that I know of to
update the frequent RELEASED patches without connecting to the
Internet. Users must trust that Microsoft itself knows best how to
install the updates that they themselves must generate, so online
installation is virtually mandatory to verify all the incredibly
Byzantine dependencies. However even some Redmond servers, 1100 in one
campus building alone, could not be fully verified in time last summer
to avoid many being crashed by malware. The Catch 22 for a voting
system is that the system must be isolated at certification from any
modem, wireless, or other network linkage to the outside world, yet
still be a trustworthy system. It is highly unlikely that just the
KNOWN required eight patches will be available before certification,
much less that ANY of the inevitable FUTURE reported defects will have
patches available and installed (by Internet) and recertifiable.
Updating a certified system without recertification would be
irresponsible, because it must be verified that the update was indeed
properly installed and was indeed the genuine and secure update, not a
malware counterfeit downloaded from a fake MS website, as is now
occurring more often.
>>Win 2K Pro is pretty stable.
<<
Hmmm ... really? Here's one recent example extracted from Information
Week, 13 April, 2004:
"Microsoft Releases A Bevy Of Security Updates; Four security bulletins
address more than 20 specific software security holes, and three of the
four are rated as critical."
" ... The flaws affect virtually every major Windows operating system
currently supported: Windows NT Workstation 4.0, Windows NT Server 4.0
(including the Terminal Server Edition), Windows 2000, XP, as well as
Windows Server 2003. One of the critical bulletins, MS04-13, also
affects versions of the company's desktop operating systems Windows 98,
SE, and Windows Millennium Edition ..."
>>You sound to me like someone who has had difficulty applying patches
for MS and your response is that it shouldn't be used at all. Am I even
close? MS doesn't make it easy for end users, because they want you to
pay geeks like me that they trained for a few grand to do their dirty work.
<<
The difficulty is with MS - they install the patches automatically (when
they are finally issued, usually very late or often too late).
Personally (i.e. at my laptop) I have happily avoided all recent MS
malware-interaction by using a dual-boot Mac/Linux to interface with the
MS/NT/XP-dependent/dominant world of clients and enterprises - except
for those interoperability and conversion issues, which is enough of a
challenge for my strictly user-level of ignorance. I would not trust
any Linux nor OSX nor BSD nor any other current flavor of open source
code without completely open, security-targeted, election-specific
certification. For the fall election, we may have to deal with Windows
XP, which is widely agreed to have hundreds of thousands of (mostly
syntax) defects. We can only hope that the vast majority of those
defects are indeed minor and can be handled by rebooting away the
Blushing-Bill Blue Screen of Death, but many of these thousands of
defects are security-critical and are found only by experience and
end-result testing. It is estimated by XP-loving security experts* to
have a highly conservative 1 security-related defect for each 10,000
lines of code among its some 45 million lines of initial code. That's
at the least 4500 attackable defects (mostly undiscovered, hence yet
unpatchable) that must have a patch to ever justify calling XP an
election-trustworthy OS. I submit no army of geeks with proprietary
access will ever be paid to examine all 45 million line-by-line. [*See
e.g. Malware by Ed Skoudis, Prentice Hall 2004.]
>>MS isn't the only thing that has exploits and has been hacked. Pick
any one of your favorite open source OSs and we can find a laundry list
of exploits that have been created and implemented. If UNIX and Linux
were so rock solid, then why would CU have a specific group of people
who spend their waking hours finding a defeating hackers on such systems?
<<
It's certainly true that Unix-type and any other OS is susceptible (even
my laptop PPC has at least seven long known/patched defects) to errors
in coding and hence to malfunction and malware attack. But only open
software can be available to the level of scrutiny that MIGHT someday
result in a trustworthy digital voting system - it could be that it will
never be either rock-solid or even practical enough to develop such a
system. I think a reasonable comparison is OSX versus MS/NT/XP during
the last year - the relatively open OSX has not had nearly the level of
digital devastation associated with it that Balmer/Billware has. Within
the last year MS has indeed carried out a major change in attitude
toward quality and security - which might somewhat improve "Longhorn"
whenever it appears - but we have to deal with the present and past
software and its defects in the November election.
-----Original Message-----
From: Lou Puls [mailto:lpuls@xxxxxxxxxxxxx]
Sent: Friday, April 09, 2004 11:57 AM
To: cvv-discuss@xxxxxxxxxxxxxxxxx
Subject: Re: "Luddite" hand counting
[|>] snip
Let's discuss the merits of such issues and not fritter away energy on
minor detail. How about some balanced, constructive views on why this
highly vulnerable, defective (MS-Windows) software should be acceptable
for such an important civic function? With the digital talent
represented in this group, credible legal action could still be mounted
to stop it down and allow recountable paper ballots of record - but only
if this group takes a firm stand on the obvious.
[|>]