18Apr2009 (UTC +8) On Fri, Apr 17, 2009 at 23:35, Pablo Manalastas <[email protected]> wrote: > I am more interested in checking that the Comelec computers > will do the job correctly (that the PCOS machines will actually > count our votes) than in ensuring that the PCOS machines can not > be hacked.
I agree with you on this. Verification of the trustworthiness of the AES and the conduct of the entire electoral system as a whole, is what we Filipinos really want. As for the AES itself, the AES must work as expected --no more, no less. Security features should be built in, just like seatbelts in a car, or side-protection beams in the doors, or airbags or anti-lock braking systems --and not as opportunistic options from the IT product vendor. Therefore IMHO, this "hacking" invitation will not give Filipinos the best value for the money. At best, the PhP 100M bounty for the hacking challenge is both costly and inefficient. At worst, the criminal hackers just get to learn about the weaknesses of the AES and not share it with anyone, and then later exploit it for their own profit. (I vaguely remember the words of a senator saying that one needs at least PhP 1B for a national campaign, yet has no guaranteed results. Thus PhP 100M for an assured position is therefore a much cheaper and less risky alternative... but I digress). "Hacking", or what the information security professionals and IT auditors call "penetration testing", is just a subset of a proper source code review. Source code review includes (very briefly): Review of vendor / developer documentation and claims > Review of vendor / developer SDLC > Analysis of hardware & software functions (Static code analysis, and source code audit as per generally-accepted standards) > Testing and documentation of findings (Dynamic code testing, Penetration testing, etc.) > Vendor / developer fixes > Celebration of end-of-project. (The amount of "work units" included for a typical source code review (i.e. evaluation and assurance) project depends on the level of assurance required. Simply put, the higher the assurance requirements, the more effort is put in the source code review project.) Other disadvantages, other than those above, of a "hacking" only approach to testing the AES include: 1. No guarantee that the penetration tester won't be later charged with "illegal access" or other charges. Can anybody here compare to other laws, that the punishment for "electoral sabotage" in R.A 9369 is one of the harshest? 2. "Hacking" contests can only go after the hardware & software interfaces, so that's a very limited approach. "Black box" testing is much less conclusive than "white box" testing. 3. 100 testers spending 100 hours each, is not equivalent to 10,000 man-hours of testing. All those "hackers" are doing just the same tests. 4. A typical "hacking" approach is ad hoc and random. Many times there are no verifiable methodologies used nor adequate risk assessments. 5. "Hacking" contests are unfair to the testers. The testers are outsiders trying to get in. It does not cover the situation where you have malicious or incompetent insiders. And as everybody knows, it's the insiders who can do the most damage in the least amount of time. 6. If the "hackers" don't find nor report any problems, it does not necessarily mean there are no problems. It may only mean that the penetration testers could not exploit nor even just recognize the problems. (This point is so unfortunately TRUE and prevalent !!!) Even worse, the "hackers" may choose not to report all or some of the problems because it may not be in their best interests :( 7. "Hacking" contests promote the vicious cycle of "Deploy > Get exploited and panic > Patch". What we should instead encourage is the use of proper engineering techniques in the SDLC. So for PhP 100M, we Filipinos already ought to have more than "hacking" services! As a side note, here's a well-known story of what happened in a hacking contest: http://www.securityfocus.com/news/1717 [...] >> From: Jerome Macaranas <[email protected]> >> Subject: [plug] OT: 100M rewards for breaking the automated poll system >> To: [email protected] >> Date: Friday, April 17, 2009, 8:45 PM >> >> http://www.gmanews.tv/story/157488/P100-M-reward-sought-for-automated-poll-system-hacking-challenge Drexx Laggui -- CISA, CISSP, CFE Associate, ISO27001 LA, CCSI, CSA http://www.laggui.com ( Singapore / Manila / California ) Computer forensics; Penetration testing; QMS & ISMS developers; K-Transfer PGP fingerprint = 6E62 A089 E3EA 1B93 BFB4 8363 FFEC 3976 FF31 8A4E _________________________________________________ Philippine Linux Users' Group (PLUG) Mailing List http://lists.linux.org.ph/mailman/listinfo/plug Searchable Archives: http://archives.free.net.ph

