Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Security Software

Put Your Code in the SWAMP: DHS Sponsors Online Open Source Code Testing 67

cold fjord (826450) writes with an excerpt from ZDNet At OSCon, The Department of Homeland Security (DHS) ... quietly announced that they're now offering a service for checking out your open-source code for security holes and bugs: the Software Assurance Marketplace (SWAMP). ... Patrick Beyer, SWAMP's Project Manager at Morgridge Institute for Research, the project's prime contractor, explained, "With open source's popularity, more and more government branches are using open-source code. Some are grabbing code from here, there, and everywhere." Understandably, "there's more and more concern about the safety and quality of this code. We're the one place you can go to check into the code" ... funded by a $23.4 million grant from the Department of Homeland Security Science & Technology Directorate (DHS S&T), SWAMP is designed by researchers from the Morgridge Institute, the University of Illinois-Champaign/Urbana, Indiana University, and the University of Wisconsin-Madison. Each brings broad experience in software assurance, security, open source software development, national distributed facilities and identity management to the project. ... SWAMP opened its services to the community in February of 2014 offering five open-source static analysis tools that analyze source code for possible security defects without having to execute the program. ... In addition, SWAMP hosts almost 400 open source software packages to enable tool developers to add enhancements in both the precision and scope of their tools. On top of that the SWAMP provides developers with software packages from the National Institute for Standards and Technology's (NIST) Juliet Test Suite. I got a chance to talk with Beyer at OSCON, and he emphasized that anyone's code is eligible — and that there's no cost to participants, while the center is covered by a grant.
This discussion has been archived. No new comments can be posted.

Put Your Code in the SWAMP: DHS Sponsors Online Open Source Code Testing

Comments Filter:
  • No thanks (Score:1, Troll)

    by Dishwasha ( 125561 )

    The NSA is already proactively doing this for me.

  • by Anonymous Coward

    I trust the DHS as much as I trust the NSA.

  • Looks good to me (Score:4, Insightful)

    by Mostly a lurker ( 634878 ) on Tuesday July 29, 2014 @09:22AM (#47557175)
    The knee jerk reaction, of course, is to look for a catch in anything Homeland Security is doing. However, this seems like a really good idea. Finally, they are contributing in a positive way to public safety.
    • Re: (Score:2, Insightful)

      by Anonymous Coward

      What a shame they have no credibility with the people that would benefit from this.

    • by jasno ( 124830 )

      Actually, my first thought is why isn't the NSA doing this?

      Securing our nation's information infrastructure is one of their core missions(along with spying on OTHER nations, which I also think they should be doing, instead of spying on US). They have the talent to be able to do it effectively.

      • "Actually, my first thought is why isn't the NSA doing this?

        Actually, my first thought was that they are, and that they're calling their initiative SWAMP Thing. Perhaps you missed the stories of agencies performing the tasks that others cannot and then "sharing" their data?

        • by jasno ( 124830 )

          I had a feeling someone would say something like this...

          According to TFS, the program is for open source code. You know, the code that is already open and scannable by a web crawler. If the NSA wanted to do this for nefarious purposes(and I'm sure they do), they would have(and probably have) started their own program years ago. They don't need you to upload your open source project for them.

          I'm willing to bet the NSA has all the closed-source software source they want as well. I doubt my company's shitt

          • You should have paid more attention. This allows, at a minimum, them to not search the whole internet searchning for code. The proles will bring it to them! Why pay someone to look all over the internet for FOSS code and go through the work of pulling it to their servers, when trusting morons will push it for them?

            "You know, the code that is already open and scannable by a web crawler"

            Have you ever tried to write a Webcrawler that will crawl the internet and differentiate code from everything else there,

      • by suutar ( 1860506 )

        Because "be able to attack others" always winds up being a higher priority than "keep others from attacking us" in a dual-mission agency. It goes along with "the best defense is a good offense" and such mindsets, and it sounds cooler when you're selling your budget to the oversight committee.

    • What makes you say that? You seem to be assuming that they are both competent and well meaning. These are two assumptions that are specious at best. Somewhere there are some DHS droids laughing their ass off: can you believe it. We even called it SWAMP and the morons still did the work of ferreting out software to find holes in for us!"

      I almost don't feel sorry for the people stupid enough to fall for this scam.
    • The knee jerk reaction, of course, is to look for a catch in anything Homeland Security is doing. However, this seems like a really good idea. Finally, they are contributing in a positive way to public safety.

      Barely. If you look at what they're offering [continuousassurance.org] it's FindBugs, clang, gcc, and cppcheck. Completely bog-standard tools that anyone should be using anyway, but they're being paid $23M taxpayer dollars for it. Shee-it, I could do the same thing with $10K to cover the cost of renting some EC2 space, and I'll spend the remaining $22.99M on coke and hookers (seriously, how can they have spent $23M on this? One person could set it up in a few hours, the only constraint is how many VMs you need to spin up if lots

      • It saves the government money to consolidate the checking to one place. Otherwise every department would need to do the checking themselves.

        By doing this continuously you end up with releases which are free of known errors.

        • By doing this continuously you end up with releases which are free of known errors.

          Weeellll... you end up with something that's been run through gcc -wall, which is a long way from "free of known errors". Now admittedly "free of known errors" is a nice circular definition meaning "free of things gcc warns about", but even then it's not necessarily the case, there's plenty of code that ships with avalanches of warnings when you build it, but no-one's bothered fixing it up.

          At best, you get something that doesn't produce warnings in gcc and clang. At worst you get code that hasn't been chan

          • Actually you get something that has passed several different analyses.

            Silencing "gcc -Wall" is a good thing. Modern gcc versions catch lots of errors. Add to that clang static analysis and others you get pretty reasonable error detection which is what they are aiming for.

  • by xxxJonBoyxxx ( 565205 ) on Tuesday July 29, 2014 @09:23AM (#47557191)

    It's a neat project covering C, C++, and Java and a little Objective C and Javascript, but it doesn't cover C# or Windows yet. (https://continuousassurance.org/tool-selection/)

    Unfortunately, in my world C#/Windows is where a lot of the business-facing open source action is, especially with the advent of NuGet.

  • When I write open source software in C, and expect it to be widely distributed, I may use the service.
    I wouldn't submit PROPRIETARY software, probably, but code I submit to Apache or something like that isn't exactly. If NSA or someone reacts to analyze the Apache source, they'll do that without me submitting it. By running static analysis on my code, I can learn about potential issues and fix them.

    • When I write open source software in C, and expect it to be widely distributed, I may use the service.
      I wouldn't submit PROPRIETARY software, probably, but code I submit to Apache or something like that isn't exactly secret. If NSA or someone wants to analyze the Apache source, they'll do that without me submitting it. By running static analysis on my code, I can learn about potential issues and fix them.

    • I think it's probably a good idea to do this to your code even if you don't play on widely distributing it. It can help identify errors in your coding style/skillset. And you know what they say about a stitch in time...

    • Ray Morris... exactly. People are so closed minded. You don't think NSA already know the backdoors and vulnerabilities in popular open-source packages.? lol
  • WTF? (Score:4, Insightful)

    by gstoddart ( 321705 ) on Tuesday July 29, 2014 @09:26AM (#47557209) Homepage

    Do the DHS seriously believe they have any credibility in this area?

    At this point, I assume if they find any exploits they'll keep them secret and use them themselves.

    Sorry guys, but once you became the enforcement arm for copyright, you lost all credibility.

    • by Anonymous Coward

      At this point, I assume if they find any exploits they'll keep them secret and use them themselves.

      Huh? If it is about open source, they can just download any project and still do that. As a matter of fact, harvesting open source software for vulnerabilities is something which agencies like NSA do all the time.

    • I'm not sure why you're conflating your understandable disgust over the current state of copyright litigation in the US with issues related to code integrity. There's not exactly a lot of common ground there.

      Now if you had mentioned DHS' cozy relationship with the NSA - an organization that most of us expect is actively subverting both code and the standards we rely on - that would make more sense.

  • by Anonymous Coward

    Soon it will be illegal to use open source unless it is verified by DHS.

  • by Joe Gillian ( 3683399 ) on Tuesday July 29, 2014 @09:37AM (#47557303)

    What DHS isn't telling you is that they're secretly submitting anything given to them via SWAMP to a secret NSA partner program known as SHREK (Security Holes for Recapturing Encryption Keys) and the FBI's version of the same program, known as DONKEY (Domestic Onion-Router Key Capture) which will attempt to overthrow the TOR project.

    The real question is, what is anyone doing putting their code in the SWAMP?

  • by jones_supa ( 887896 ) on Tuesday July 29, 2014 @09:40AM (#47557351)
    Quality assurance is the #1 thing that open source software needs in spades. There's a lots of buggy stuff out in the OSS world. Sure, it is mildly nauseating that DHS is the one doing this, but still I am all for it.
    • by antdude ( 79039 )

      I agree. I try to help out by reporting issues that I run into, but I can't do this fulltime since I already have a paying SQA job. ;)

    • This will be eventually transitioned to the community to maintain. Think about it... much of software used in government and critical infrastructure is now relying on open-source components. The SWAMP is a response from DHS that says.. software security is a huge problem ... here is a resource to help improve software development activities and raise the quality of tools used to detect bugs and weaknesses.
  • Coverity (Score:4, Interesting)

    by __aapopf3474 ( 737647 ) on Tuesday July 29, 2014 @09:45AM (#47557399)
    I trust Coverity's Scan [coverity.com] program far more than I'll trust the organization that continues to promote security theater. DHS has no business in this area. This is typical over expansion of a bloated bureaucracy.
    • Agreed:

      1) Create a program, and call it SWAMP
      2) Look for problems in the code that is sure to be buggy, as competent developers would never submit code
      3) Announce that OMFG, Open Source is full of holes!
      4) Watch more people stay with Windows due to the misinformation
      5) Power Profit

      Look Ma! No ???? step!

      What exactly stops them from gathering their own FOSS software? See step 2.
      • by Anonymous Coward

        This is just another tool like Coverity, funded by the .gov. There's nothing wrong with it. And competent developers *will* submit code, because competent developers realize that no matter how competent you are and how much you focus on writing correct code, mistakes are inevitable and static analysis tools help mitigate the risk of those mistakes. Competent developers are already using Coverity, and they'll probably sign up for this as well in hopes that there is some non-overlap in the bugs the two sit

    • Sorry to break it to you, but Coverity's free-open source scanning was originally funded by the DHS [coverity.com]. :-)

      After the DHS grant expired in 2009, Coverity continued the service pro bono.

      This new program seems like a step back, though. Now, if the DHS was instead investing in improving the open-source tools, it would make sense.

      • Right you are! In my defense, I think contracting this out to Coverity was one of the rare things that the DHS did that was correct, or at least no horrifically incorrect. I see the DHS as an overgrown bureaucracy that is antithetical to our constitutional rights, especially the fourth amendment (searches). Bureaucracies need to grow to cover up their inefficiencies. Don't get me started on the TSA... Thanks for the correction...
        • Well, considering the budget of the DHS, they're going to do the right thing once in a while, purely by accident. ;-)
      • That's the plan is to try and raise the bar of open source tools. Actually, there is a use case to support to vendors to bring their tool and run their tool against a wide range of software packages and test cases in the SWAMP. The goal is to create better performing tools and improve tool coverage. I think the SWAMP is an excellent idea.
  • hey ya'll - i know these guys have been trying to invade us and everything, but look.. they're nowhere to be seen, and they've left us this SWEET giant wooden horse! i don't know about you, but im thinking it's partytime!! open up them gates and roll that baby in!!
  • <tt>I worked on this project. You should glance at who is involved before donning the tinfoil hats. https://continuousassurance.org/about-us/the-team/<br><br>It's an education grant with several phd's who study various CS security subjects (fuzzing, dynamic, static analysis). Built by a bunch of nice nerds employed by the Morgridge Institute http://discovery.wisc.edu/home/morgridge/morgridge.cmsx which is part of University of Wisconsin Madison.<br><br>QA/Testing is the black s
    • by Actually, I do RTFA ( 1058596 ) on Tuesday July 29, 2014 @11:49AM (#47558621)

      Why are the tools being run remotely, as opposed to, for instance, being all nicely packaged into an image I can download and boot from locally. I understand the benefits of keeping statistics as code improves, etc. but it seems that a "paranoid developer" mode would fit nicely with the mission of improving code security. Esp. since those developers tend to do a lot more NIH of basic parts.

      Additionally, and more relevantly, some of my work is done on a laptop as I move around, and being able to do some Q/A work when away from the Internet would be useful.

      • <tt>The SWAMP is currently just one site, but their eventual goal is that you can install and run it on your own internally, or however you see fit.</tt>
    • Finally someone with commonsense. The Chief Scientist of the SWAMP is the "father of Fuzzing", Barton Miller.
  • Why would anyone voluntarily help the US Government spy on its people. Fuck Uncle Sam! I won't do anything to help big brother.
  • Anybody who trusts the Department of Homeland Security is a fucking idiot.
  • by Animats ( 122034 ) on Tuesday July 29, 2014 @11:57AM (#47558677) Homepage

    All they're offering are some existing tools [continuousassurance.org], ones you can get for free. The main ones are the Clang static analyzer [llvm.org] and Cppcheck [sourceforge.net]. They're not offering free access to some of the better, and expensive, commercial tools.

    Cppcheck is basically a list of common errors, expressed as rules with regular expressions. Clang is a little more advanced, but it's still looking for a short list of local bugs. [llvm.org] Neither will detect all, or even most, buffer overflows. They'll detect the use of "strcpy", but not a wrong size to "strncpy".

    • Commercial tools are just as bad as open-source. Look at heartbleed, none of the tools found that weakness that led to heartbleed. You have to understand the premise behind the project before making assumptions. There will be commercial tools being offered soon!!!
  • It's about gathering even more metadata about the operators and rat lines within the most dangerous terrorist cell of all: F/OSS (It even *sounds* like ISIS!).
  • As a Freedom of Information Act Request; have the NSA offer user access ones phone calls? In other words, be a part of the solution...

"There are things that are so serious that you can only joke about them" - Heisenberg

Working...