The U.S. military routinely engages in red-teamingsearching for weaknesses in its war plansby having its own members role-play as adversaries. Software security researchers also red-team, using the same adversary mindset to conduct penetration testing and to find and fix flaws in software.
Unfortunately, theres an aspect of modern U.S. military operations that has so far escaped this devils-advocate approach: the open-source software that underpins military missions.
The secret of all modern software is that it is mostly open-sourcethat is, code created by enthusiasts (and companies) around the world and released for anyone to study and use. Whether its your iPhone app, military mission-planning software, spy-plane computer, or big-data analytic tool, its open-source software all the way down.
Building apps with open-source components reduces time and cost. And by exposing its source code, open-source software invites the world to find and even fix the inevitable bugs. But open source software, like all software, has security flaws. Nearly a decade ago, the Heartbleed OpenSSL bug exposed information such as credit card details for nearly all web users. More recently, the log4j flaw let attackers easily take over control of affected computers, ranging from Minecraft servers to software from Apple and Amazon.
It is also the case that malicious actors can and do tamper with open-source software. Just the known cases of open-source software supply-chain compromises number in the thousands.
Fortunately, the militarys red-teaming instincts can help reduce the threat. First, the U.S. military ought to undertake a software census to understand the open-source software components embedded into the software it uses. A good model is a recent Harvard University-Linux Foundation analysis for corporate entities.
Second, the military should red-team the open-source software components on which it has become dependent. The military could fund organizations like the Open Source Technology Improvement Fund that have a track record of exactly this type of work. In addition, the military could assign its own personnel to help with this task, building the software security skills of its own members. The military could even directly assist the Open Source Security Foundation with a nascent related initiative called Alpha-Omega. Alternatively, open-source software bug bounties, paid by the military, could spur security researchers around the world to find and report bugs.
Third, the security bugs identified should be fixed and fixed quickly. Military members with expertise in software can provide bug fixes directly to the open-source software maintainers. The military could also fund third parties or the maintainers directly to fix the bugs. At the very least, the security flaws should be discreetly reported to the relevant open-source software projects.
Fourth, rinse and repeat. The open-source software that the military depends on will change. Additionally, open-source software projects are constantly evolving, fixing some bugs and inevitably introducing new bugs too. These facts mean that this whole process ought to be repeated periodically.
In the wake of log4j, the open source software vulnerability that led one observer to declare that the internet is on fire, the Open Source Security Foundation recently proposed red-teaming 200 major open-source projects a year at a cost of roughly $40 million a year. For the military, thats budget dust. In short, the military could reduce the security vulnerabilities lurking in its software, improve aggregate software security for all Americans and humanity, and increase the probability of mission success, all with an investment in open source software red-teaming.
The military tries to never go into battle without red-teaming its plan. Its time to apply that same technique to open-source software.
John Speed Meyers is a security scientist at Chainguard. Zack Newman is a software engineer at Chainguard. Jacobo McGuire is a summer policy research intern at Chainguard.
Original post:
The US Military Should Red-Team Open Source Code - Defense One
- Labour frontbencher advocates for open source software and regulatory innovation - Computing - February 9th, 2024
- Open Source Software: Meaning, Importance, and Examples | Spiceworks - Spiceworks News and Insights - February 9th, 2024
- Office of National Cyber Director Issues 2023 Year-End Report on Open Source Software Security Initiative - Executive Gov - February 1st, 2024
- 40 Must-Have Free Open Source Software for 2023 - Tecmint - October 16th, 2023
- What Is Open Source Software and How Does It Work? | Synopsys - March 5th, 2023
- 15 Best Open Source Software You Must Try in 2023 - Turing - February 25th, 2023
- Cyber Security Today, Feb. 24, 2023 Holes in open source software, ransomware gang tries to evade cyber insurers and more - IT World Canada - February 25th, 2023
- What is Open Source Software? - SourceForge Articles - February 15th, 2023
- About the Open Source Initiative | Open Source Initiative - December 28th, 2022
- Comparison of free and open-source software licenses - December 20th, 2022
- Building an open source software community - SAS Users - December 4th, 2022
- The US Securing Open Source Software Act of 2022 is a step in the right direction - TechCrunch - November 25th, 2022
- Microsoft: Hackers are using open source software and fake jobs in ... - November 17th, 2022
- Open Source Software Directory - OSSD - October 23rd, 2022
- Source Code for Open Source Software Components - Oracle - October 15th, 2022
- We dont teach developers how to write secure software Linux Foundations David A Wheeler on reversing the CVE surge - The Daily Swig - October 15th, 2022
- Learn Linux online for free with Linux Foundation Courses from edX - TechRepublic - October 15th, 2022
- The Blockchain Sector is growing with the help of Open-Source Technology - Wales 247 - October 15th, 2022
- GCHQ chief warns of Chinese . US open source software bill advances. Financial Stability Board on crypto regulation. - The CyberWire - October 15th, 2022
- When transparency is also obscurity: The conundrum that is open-source security - Help Net Security - October 7th, 2022
- You thought you bought software all you bought was a lie - The Register - October 7th, 2022
- Linux Foundation Energy Gains More Industry Support to Drive the Energy Transition - PR Newswire - October 7th, 2022
- State of Open Source Survey By OpenLogic To Take Place In 2023 - Open Source For You - September 29th, 2022
- 15-Year-Old Python Vulnerability Still Affects Over 350,000 Open-Source Projects - Spiceworks News and Insights - September 29th, 2022
- How Can Open Source Sustain Itself without Creating Burnout? - thenewstack.io - September 29th, 2022
- OpenAI opens doors to DALL-E after the horse has bolted to Midjourney and others - The Register - September 29th, 2022
- Red Hat And NdcTech Collaborate To Deliver Solutions Based On Open Source - Open Source For You - September 21st, 2022
- Paladin Cloud Joins the Cloud Native Computing Foundation - GlobeNewswire - September 21st, 2022
- Open Source Software - W3 - September 13th, 2022
- Understanding the hows and whys of open source audits - Security Boulevard - September 13th, 2022
- New Metaverse Track at O3DCon to Tackle Big Questions and Practical Applications of Emerging Graphical Technology - PR Web - September 13th, 2022
- TechOps is a mess: Open source is the solution - BetaNews - September 13th, 2022
- Rezilion Recognized as SBOM Tool Provider in Gartner Emerging Technologies Trend Report on Software Bills of Materials (SBOM) USA - English - USA -... - September 13th, 2022
- Open Security: The next step in the evolution of cybersecurity - SC Media - September 13th, 2022
- 11 Interesting Firefox Add-ons to Improve Your Browsing Experience - It's FOSS - September 13th, 2022
- why the giants fight over open source - Gearrice - September 5th, 2022
- Compare Files in Linux With These Tools - It's FOSS - September 5th, 2022
- Microsoft and ByteDance are collaborating on a big AI project, even as US-China rivalry heats up - CNBC - August 28th, 2022
- OpenSSF Announces 13 New Members Committed to Strengthening the Security of the Open Source Software Supply Chain - DARKReading - August 20th, 2022
- How W4 plans to monetize the Godot game engine using Red Hats open source playbook - TechCrunch - August 20th, 2022
- Secure Open Source Rewards' to help in preventing assaults on the software supply chain. Check out how! - Economic Times - August 20th, 2022
- Free Dev Tools! But Whats the Catch? - DevOps.com - August 20th, 2022
- This Company is Aiming to Do to the Guest what VMWare and AWS Did to the Host - GeekWire - August 20th, 2022
- What Is Open-Source Software? (Definition and Examples) - August 12th, 2022
- What is open source software? | IBM - August 12th, 2022
- 55+ Best Open Source PC Software for almost Everything - August 12th, 2022
- 80 percent of enterprises use open source software and nearly all worry about security - BetaNews - August 12th, 2022
- Boeing joins the ELISA Project as a Premier Member to Strengthen its Commitment to Safety-Critical Applications - PR Newswire - August 12th, 2022
- Looking for simplicity in the cloud? The future is going to be open and hybrid - The Register - August 12th, 2022
- AAIS & The Linux Foundation Welcome Jefferson Braswell as openIDL Project Executive Director - The Bakersfield Californian - August 4th, 2022
- Wicked Good Development Episode 13: Hacks and Ax, July Edition - Security Boulevard - August 4th, 2022
- Microsoft changes its policy against the sale of open source software in the Microsoft Store - BetaNews - July 26th, 2022
- BMW Group Joins the Linux Foundation's Yocto Project - PR Newswire - July 18th, 2022
- Free and Open Source Software (FOSS) - UNESCO - July 9th, 2022
- Know Your Enemy and Yourself: A Deep Dive on CISA KEV - Security Boulevard - June 29th, 2022
- CD Foundation Announces State of CD in 2022 Report, Opens Third Annual cdCon with New Project CDEvents, New... - DevOps.com - June 10th, 2022
- Samsung teams up with Red Hat for memory software development - The Korea Herald - May 25th, 2022
- OpenSSF Helping to Secure Open Source Software - ITPro Today - May 25th, 2022
- Only Microsoft can give open-source the gift of NTFS. Only Microsoft needs to - The Register - May 11th, 2022
- Protestware: what organisations should be aware of when using open source software - Lexology - May 11th, 2022
- This Week in Washington IP: Open Source Cybersecurity Solutions, Civil Capabilities for Space Situational Awareness and Using AI for Effective RegTech... - May 11th, 2022
- Red Hat Expands Capabilities to Provide Streamlined Application Development and Delivery in the Cloud - Business Wire - April 28th, 2022
- Industry 4.0 why smart manufacturing is moving closer to the edge - The Register - April 28th, 2022
- Open source software and DevOps: What are they, and how can your business benefit? - SmartCompany - April 13th, 2022
- Truist Joins the Open Invention Network - GlobeNewswire - April 13th, 2022
- OpenMetal Joins the Open Infrastructure Foundation - PR Newswire - April 13th, 2022
- An Early Test of The Adams Administration's Values and Tech Prowess - Gotham Gazette - April 13th, 2022
- Open Source Software Faces Threats of Protestware and Sabotage - WIRED - April 1st, 2022
- The Promise of Open Source Code and the Paradox of ProtestWare - Security Boulevard - April 1st, 2022
- Software Composition Analysis Market to Witness Massive Growth by 2029 | Open Source Software, Oracle, Smartbear Software - Digital Journal - April 1st, 2022
- Why now is the time to host your code in the cloud - TechRadar - April 1st, 2022
- Those looking for clues to Googles search demise are asking the wrong question - TechRepublic - April 1st, 2022
- Open Source Sabotage Incident Hits Software Supply Chain | eSecurityPlanet - eSecurity Planet - January 15th, 2022
- Open-source software and threats to critical infrastructure. - The CyberWire - January 15th, 2022
- Google wants secure open-source software to be the future - TechRadar - January 15th, 2022
- Baumer, Infineon, Qualcomm Innovation Center, Percepio and Silicon Labs Select Zephyr RTOS for their Next Generation of Products and Solutions - Yahoo... - January 15th, 2022
- How Open Source Is Shaping The World Around Us - Outlook India - December 19th, 2021
- The Projects and People That Shaped Security in 2021 The New Stack - thenewstack.io - December 19th, 2021
- Log4j: Where's Fancy Bear been? Right there, choppin' lumber... - The CyberWire - December 19th, 2021
- Aqua Security acquires Argon to protect the software supply chain - VentureBeat - December 6th, 2021