Skip to content

Latest commit

 

History

History
121 lines (96 loc) · 3.17 KB

reflections-on-trusting-trust.md

File metadata and controls

121 lines (96 loc) · 3.17 KB

To what extent should one trust a statement of a program is free of Trojan horses? Perhaps it is more important to trust the people who wrote the software.

Stage I

The problem is to write the shortest source program that, when compiled and executed, will produce as output an exact copy of its source.

It has to have two important properties:

  1. This program can be easily written by another program
  2. This program can contain an arbitrary amount of excess baggage that will be reproduced along with the main algorithm
char s[] = {
	'\t',
	'0',
	'\n',
	'}',
	';',
	'\n',
	'\n',
	'/',
	'*',
	'\n',
	(213 lines deleted)
	0
}

/*
 * The string s is a
 * representation of the body
 * of this program from '0'
 * to the end.
 */

main()
{
	int i;
	
	printf("char\ts[] = {\n");
	for(i = 0; s[i]; i++)
		printf("\t%d, \n", s[i]);
	printf("%s", s);
} 

Stage II

The C compiler is written in C. C allows individual characters in the string to be escaped to represent unprintable characters. For example

	"Hello world\n"

It "knows" in a completely portable way what character code is compiled for a new line in a character set.

c = next();
if(c != '\\')
	return(c);
c = next();
if(c == '\\')
	return('\\');
if(c == 'n')
	return('\n');

Suppose we wish to alter the C compiler to include '\v' to represent the vertical tab character. We must "train" the compiler. After it "knows" what '\v' means, then our new change will become legal C.

c = next();
if(c != '\\')
	return(c);
c = next();
if(c == '\\')
	return('\\');
if(c == 'n')
	return('\n');
if(c == 'v')
	return('\v');

Now, the old compiler won't accept the new source. We look up on an ASCII chart that a vertical tab is decimal 11, we can alter our source code so the old compiler accepts the new source.

c = next();
if(c != '\\')
	return(c);
c = next();
if(c == '\\')
	return('\\');
if(c == 'n')
	return('\n');
if(c == 'v')
	return(11);

You simply tell it once, then you can use this self-referencing definition.

Stage III

We can do a simple modification to the compiler that will deliberately miscompile source. If this were not deliberate, it would be called compiler "bug". Since it is deliberate it should be called a "Trojan horse".

compile(s);
char *s;
{
	if(match(s, "pattern")) {
		compile("bug");
		return;	
  }
}

First we compile the modified source with the normal C compiler to produce a bugged binary. We install this binary as the official C. We can now remove the bugs from the source of the compiler and the new binary will reinsert the bugs whenever it is compiled. Programs will remain bugged with no trace in source anywhere.

Moral

You can't trust code that yu did not totally create yourself. No amount of source-level verification or scrutiny will protect you from using untrusted code.

The act of breaking into a computer system has to have the same social stigma as breaking into a neighbour's house. It should not matter that the neighbour's door is unlocked. The press must earn that misguided use of a computer is no more amazing than a drunk driving of an automobile.