Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Security Hardware

Can You Trust Chinese Computer Equipment? 460

Ian Lamont writes "Suspicions about China slipping eavesdropping technology into computer exports have been around for years. But the recent spying attacks, attributed to China, on Google and other Internet companies have revived the hardware spying concerns. An IT World blogger suggests the gear can't be trusted, noting that it wouldn't be hard to add security holes to the firmware of Chinese-made USB memory sticks, computers, hard drives, and cameras. He also implies that running automatic checks for data of interest in the compromised gear would not be difficult." The blog post mentions Ken Thompson's admission in 1983 that he had put a backdoor into the Unix C compiler; he laid out the details in the 1983 Turing Award lecture, Reflections On Trusting Trust: "The moral is obvious. You can't trust code that you did not totally create yourself. (Especially code from companies that employ people like me.) No amount of source-level verification or scrutiny will protect you from using untrusted code. In demonstrating the possibility of this kind of attack, I picked on the C compiler. I could have picked on any program-handling program such as an assembler, a loader, or even hardware microcode. As the level of program gets lower, these bugs will be harder and harder to detect. A well installed microcode bug will be almost impossible to detect."
This discussion has been archived. No new comments can be posted.

Can You Trust Chinese Computer Equipment?

Comments Filter:
  • Another reason (Score:3, Insightful)

    by AnotherUsername ( 966110 ) * on Friday February 05, 2010 @11:02AM (#31035168)
    This is just another reason for me to not want to buy Chinese made goods. Unfortunately, so much is made in China that it is nearly impossible to completely avoid the country.
    • Re:Another reason (Score:5, Interesting)

      by Spazztastic ( 814296 ) <<spazztastic> <at> <gmail.com>> on Friday February 05, 2010 @11:04AM (#31035192)

      This is just another reason for me to not want to buy Chinese made goods. Unfortunately, so much is made in China that it is nearly impossible to completely avoid the country.

      Some component of your car, cell phone, computer, etc. is going to be made in China. I have a feeling eventually they will catch on that people aren't buying Chinese made stuff and will just put stamps on it from their more friendly neighboring countries.

      • Re:Another reason (Score:5, Insightful)

        by TubeSteak ( 669689 ) on Friday February 05, 2010 @11:12AM (#31035296) Journal

        I have a feeling eventually they will catch on that people aren't buying Chinese made stuff and will just put stamps on it from their more friendly neighboring countries.

        It's not as simple as "put stamps on it from their more friendly neighboring countries" when those neighboring countries do not have the high-tech industrial base to produce the hardware in question.

        On a strategic level, the USA really screwed the pooch by chasing the lowest bidder and not building up our domestic capacity to produce these items. And for you small gov't types, this is an example of free market principles colliding with what is effectively a national security issue.

        • Re: (Score:3, Insightful)

          I couldn't agree more, but then I'm also a big believer in 'trust but verify'. It's worth noting, however, that paranoia is self-fulfilling. :D

          I recommend just being careful, verify that your devices are performing safely (as much as possible) and taking your chances. There are really very few alternatives - you have to trust someone.

          • Re:Another reason (Score:5, Insightful)

            by Rogerborg ( 306625 ) on Friday February 05, 2010 @11:34AM (#31035580) Homepage
            You know that 2/3 of the phrase "trust but verify" is meaningless oxymoronic bullshit designed to mask the harshness of the only significant word, right? Like "strong but sensitive" or "sexy but geeky".
            • Re:Another reason (Score:5, Insightful)

              by Spazztastic ( 814296 ) <<spazztastic> <at> <gmail.com>> on Friday February 05, 2010 @11:40AM (#31035658)

              You know that 2/3 of the phrase "trust but verify" is meaningless oxymoronic bullshit designed to mask the harshness of the only significant word, right? Like "strong but sensitive" or "sexy but geeky".

              It's a good point, but that 2/3 of the phrase is what keeps the potential client from being insulted. The majority of business is sugar coating the harsh truth to keep people on your side and hopefully more of their money going into your wallet.

              • Re: (Score:3, Interesting)

                Exactly :D

                Trust but verify means "we'll agree not to call you a sneaky bastard to your face".

                If you take the opposite tack of 'trust no one', then I assume you're going to be wiring up your own circuits, breadboards, and chips, then writing the boot code and machine code by hand before writing the compiler and then finally the test kit?

                You certainly have to apply reason and sanity - otherwise you would have to personally build an identical copy of every single item to double check against. Otherwise, you go

            • Re: (Score:3, Funny)

              by Tetsujin ( 103070 )

              You know that 2/3 of the phrase "trust but verify" is meaningless oxymoronic bullshit designed to mask the harshness of the only significant word, right? Like "strong but sensitive" or "sexy but geeky".

              I don't get it.... You're saying "but" is the only meaningful word?

            • Re: (Score:3, Insightful)

              by khallow ( 566160 )

              You know that 2/3 of the phrase "trust but verify" is meaningless oxymoronic bullshit designed to mask the harshness of the only significant word, right?

              I disagree. First, you are trusting them. Else you wouldn't be employing their services or buying their goods in the first place. Second, the phrase indicates that this trust is not unconditional, that you will be testing them in some way to verify that they did the work that they agreed to do.

              Money handling is a classic example. Allowing someone to handle your money (be it a transaction in a store, cashiers in a business you own, or some sort of financial advisor) is a bit of trust in that person. If yo

        • Re: (Score:3, Funny)

          by jeffmeden ( 135043 )

          But the free market would never lead us to disaster by chasing the lowest common denominator and exploiting our innately trusting human nature! I also don't see how a 'big government' is required to sufficiently instill the kind of nationalism that forces people to buy higher priced, locally produced goods.

          Perhaps you have a newsletter?

        • Re: (Score:2, Interesting)

          by tiberus ( 258517 )

          On a strategic level, the USA really screwed the pooch by chasing the lowest bidder and not building up our domestic capacity to produce these items.

          It goes much deeper than that, too many Americans are overly litigiousness, not at fault and to desperately seek the almighty dollar. Corporations have gone off shore to seek lower cost materials and labor in pursuit of higher profits. You'll note nothing seems to get cheaper to the end user.

          Sadly at this point in the game, what other options are there?

          And for you small gov't types, this is an example of free market principles colliding with what is effectively a national security issue.

          Free Market, pah. As the guy at the end of the supply chain, of mega-corporations, multi-nationals, world-wide supply chains and so on, I don't see the Fr

          • Re:Another reason (Score:5, Insightful)

            by BZ ( 40346 ) on Friday February 05, 2010 @11:42AM (#31035682)

            > You'll note nothing seems to get cheaper to the end user.

            Since we're talking about computer equipment, this is demonstrably false.

            • Re: (Score:3, Insightful)

              by tiberus ( 258517 )

              Should have been more specific. Granted prices on tech drop as overall manufacturing costs drop, new more efficient (read fewer defects and less waste) processes have been adopted, etc... So, yes in terms of a blanket statement it would be false.

              The intent was to state, and I'm open to being shown evidence to the contrary, that I have never seen a company's offshore move and resultant reduced operating costs directly result in lower prices. The market bears current pricing until such time that a manufact

        • Re:Another reason (Score:4, Insightful)

          by electrosoccertux ( 874415 ) on Friday February 05, 2010 @11:52AM (#31035868)

          economic co-dependency is the best national security there is. We'll never go to war with China; we're both far too dependent on each other. Wars are fought for power. Money is power, and is preferable to war. History has shown we won't fight when there's money involved.
          China only holds ~10% of our national debt; ~70% perhaps more is domestically owned; so the whole "THEY'VE GOT OUR DOLLAR BY THE BALLS" nonsense doesn't count-- they would be shooting themselves in the head by removing our purchasing power-- don't forget they have to keep their workers happy, and to keep them happy they have to keep them employed.

          • Re:Another reason (Score:5, Insightful)

            by QuoteMstr ( 55051 ) <dan.colascione@gmail.com> on Friday February 05, 2010 @11:58AM (#31035976)

            economic co-dependency is the best national security there is

            They said that before World War I too.

        • Re:Another reason (Score:4, Insightful)

          by PPalmgren ( 1009823 ) on Friday February 05, 2010 @12:14PM (#31036200)

          You think if we had the means to produce them, people would have bought it? I'm sorry, but the reason domestic capacity doesn't exist is because it isn't competitive. Big gov't is not going to solve this in any way shape or form, it would actually make the issue worse by increasing admin overhead (taxes). If what you're advocating is protectionism, then I suggest you go read a bit of history on the subject and its reults.

          There are only three sane ways manufacturing jobs will return to the US: De-globalisation due to peak oil, normalizing quality of life in the US down to the rest of the world, or bringing the rest of the world to the US quality of life. I prefer the third option.

          • Re: Another Reason (Score:4, Insightful)

            by soren100 ( 63191 ) on Friday February 05, 2010 @02:03PM (#31037658)

            the reason domestic capacity doesn't exist is because it isn't competitive.

            One of the reasons for that is because China is artificially holding down the value of its currency so that we will destroy our own manufacturing base in a mad rush to make a quick buck. For the other countries, often American companies are the ones building the facilities and training the workers over there just for the cheap wages. Our own technology is given away for their cheap labor.

            If what you're advocating is protectionism, then I suggest you go read a bit of history on the subject and its reults.

            It seems to be working very well in many countries around the world that are smart enough to protect their own industries and work to keep out ours. Why do you think China is creating such problems for Google, and that Baidu is doing so well over there? The point is that if you don't go to extremes, you do very well. The extreme that America has gone into (not protecting our own domestic industries in favor of temporary profits) has really hurt us.

            normalizing quality of life in the US down to the rest of the world

            You mean make America a 3rd world country? That strategy seems to be working.

      • Re: (Score:2, Informative)

        by Kugala ( 1083127 )
        They already do; counterfeit parts are a massive issue.
        • Re: (Score:3, Interesting)

          by Spazztastic ( 814296 )

          They already do; counterfeit parts are a massive issue.

          Yeah, someone I work with bought three T1 WICs (Cisco) for their SOHO. Two of the three were counterfeit.

          I meant more in terms of someone putting the "MADE IN TAIWAN" stamp on a Chinese made part to trick people into thinking that it's from a country with a better reputation.

      • by lkcl ( 517947 )

        that's already happened :)

    • Re: (Score:3, Informative)

      by Anonymous Coward

      You can buy stuff made in the USA.. You just have to look harder and spend just a bit more.
      You can also buy from Europe, their quality is much better than Chinese anyway

      • Re:Another reason (Score:5, Interesting)

        by Thud457 ( 234763 ) on Friday February 05, 2010 @11:15AM (#31035328) Homepage Journal
        AFAIK, this [homebrewcpu.com] is the only CPU still made in America.
        • Re: (Score:3, Insightful)

          Intel has several fabs in the US, and AMD's spun off fab company Global Foundries is building a US fab. Even the very Chinese (insofar as Taiwan is Chinese) TMSC has a fab in the US.
        • Yes, except for all of those x86, PowerPC and ARM CPUs produced in the USA.

          Forget about the military CPUs.

        • Re: (Score:3, Funny)

          by lxs ( 131946 )

          Weaksauce. He uses ready-made logic gates. Have him build a CPU out of discrete BC547 transistors and I'll be impressed.

        • You are incorrect (Score:4, Informative)

          by Sycraft-fu ( 314770 ) on Friday February 05, 2010 @11:59AM (#31035984)

          Nearly all Intel CPUs are made in the US. Most of Intel's fabs are located throughout the US. The do have one in Ireland and one in Israel but that's it. None are in China. So your CPU, the actual silicon part, is made in the US most likely (all the new 45nm and 32nm stuff is I think). Now you'll probably see a stamp on it for places like Costa Rica or Singapore or the like. That is where is was packaged, where the silicon was put in the actual metal until you buy. You'll still note, that doesn't happen in China.

          You also might want to have a look at all the other CPU makers out there. AMD, Motorola, IBM, Marvell, all US companies. While some of them do fab in other locations (AMD has most of their fab work done by Global Foundries in Germany), they are US companies and do a great deal (sometimes all) of their design work in the US. In fact the only non-US processor companies I can think of are Hitachi (Japanese) and ARM (British).

      • I just did a quick survey of all the computer equipment in easy reach from my office chair:
        Mac Pro computer - built in China
        Apple Keyboard: Made in China
        Wacom digitizer: Made in Japan
        Logitech Speaker: Made in China
        iSight Camera: Made in China
        Vakoss USB Hub: Made in China
        Apple Cinema Display: Made in China

        Sli

    • Re: (Score:2, Insightful)

      by Yaa 101 ( 664725 )

      US goods are riddled with backdoors too, I think it is much healthier for you to mistrust your own government apart from the Chinese one.

      • Comment removed based on user account deletion
      • Re:Another reason (Score:5, Insightful)

        by TheLink ( 130905 ) on Friday February 05, 2010 @11:21AM (#31035416) Journal
        The Chinese Government is unlikely to be interested in spying on US citizens (or taking control of their computers). They'll be spying on their own citizens.

        Similarly, the US Government is more likely to spy on US citizens.
        • Re:Another reason (Score:5, Insightful)

          by chiguy ( 522222 ) on Friday February 05, 2010 @12:33PM (#31036486) Homepage

          That's insightful? That's what's called a false dichotomy.

          It's not mutually exclusive: The Chinese Government is likely to spy BOTH on US citizens AND their own citizens, just for different purposes.

          The US Government does both as well, but US abuses of US citizens are more likely to have discovery and recourse than China's abuse of Chinese.

          Just a bad argument all around.

    • Re: (Score:2, Insightful)

      by toastar ( 573882 )

      Listen, Do you want a $200 Intel i7 made in China/Taiwan/Korea. Or you can Buy american and get a $1000 IBM chip made over at East fishkill.

      oh and they're about the same speed.

    • by astar ( 203020 )

      I wonder why you would be particularly concerned about china made goods, as opposed to usa made goods. There exists more data to say Microsoft puts in backdoors than that China puts in backdoors. Not that the details are particularly convincing in either case. And security on many dimensions is so problematic that it is not clear why you want to focus on this particular threat.

      So what is the real deal? Big time world-historic international politics. Figure the reason the blog got written comes directly

    • Re: (Score:3, Insightful)

      by jellomizer ( 103300 )

      Then there is the conspiracy theory mind set. There is always something going on that somehow there is one piece that is beyond our comprehension on how they do it.

      I am sure there are solid american geeks out there when they plug in their USB Device will find odd communication going to china and probably report it on the internet with the exact test case to show it.

      As well many of the China made components are made of US made specs and if they are not working as planned then there is a problem.

      For the most

  • Short and Sweet (Score:2, Insightful)

    by guygo ( 894298 )
    No.
    • by Monkeedude1212 ( 1560403 ) on Friday February 05, 2010 @11:31AM (#31035530) Journal
      Of course you can't. In fact, if you're anything like me, you can't even trust the code that you wrote yourself. A night filled with browsing old Russian Propoganda, Some Vodka, and Rufilin... You wake up the next morning and you have no idea whether that Tax Financer is just a Tax Financer.
  • Bad Headline (Score:5, Insightful)

    by lyinhart ( 1352173 ) on Friday February 05, 2010 @11:08AM (#31035232)
    Considering where a lot of this stuff comes from, it should probably read, "Can You Trust Computer Equipment?"
  • Can we trust any computer equipment or code? can we trust Linux, Microsoft, Apple, PGP, based on the blurb if you haven't written the code yourself you shouldn't be trusting anything.

    The seeds of the police state are, including the preceding /. article about DNA storage.

  • by Anonymous Coward on Friday February 05, 2010 @11:16AM (#31035352)
    The referenced to article doesn't actually state he included a back door. It was a proof of concept demo apparently: Suppose we wish to alter the C compiler [bell-labs.com]

    "one the creators of Unix, admitted that he had included a backdoor in early Unix versions. Thompson's backdoor gave him access to every Unix system [itworld.com] then in existence"
    • by jeffb (2.718) ( 1189693 ) on Friday February 05, 2010 @02:32PM (#31038102)

      I was a gung-ho CS student when this article came out, and we spent a LOT of time hashing it over. He specifically did not say that he had done this, and while I don't remember him making an outright denial, we concluded that he hadn't. After all, the C compilers of that day were still small enough to be understood by a single human, and comparing C code to the assembly code generated from it (or comparing that assembly code to generated machine instructions) was not very challenging.

      Maybe the Jargon File entry is right, and he did implement it as a proof-of-concept, but it wasn't widely distributed. It was easy enough for an interested (and bored) undergrad to check out over a weekend, but hard enough that compiler distributions weren't routinely examined.

      With today's optimizing compilers and layers upon layers of abstraction, though, it seems like there's more than enough room for plenty such exploits. Pham Nuwen can still have his backdoor into the localizers.

  • I'm sure the chinese think the same about american (computer) equipment. I'm sure the french think the same about the british hi-tech imports (and vice-versa). I expect everyone country has doubts about the ultimate security (when push becomes <bang!>) of any foreign sourced hardware or software that the security of their country is reliant on. If they don't, they're fools
  • I just bought my girlfriend a fancy Chinese-made Tarzan. If only I could find the hidden web-interface.
  • Yellow paranoia (Score:2, Insightful)

    by lorg ( 578246 )

    Cause it's only the chinese that spy on other countries cause the rest of us are all friends and friends don't spy on eachother ... oh wait ... Seems that red paranoia have had a bit of a colour change.

    Sure this might be software related so it's write once - copy everywhere but would you really want to do that. Cause if you plant it everywhere, "everyone" will have it leading to a larger chanse it will be found and out blow the entire operation out of the water. But have they really ever found any evidence

  • by fuzzyfuzzyfungus ( 1223518 ) on Friday February 05, 2010 @11:26AM (#31035462) Journal
    In a general sense, you really can't trust any computer equipment that you didn't build yourself, pretty much from the ground up(as the issues with compilers and microcode suggest). I'm pretty sure that using somebody else's sand to make your silicon is safe; but that's about it.

    Computer gear hasn't quite reached biological levels of complexity, where trust is even harder(one malformed Prion in a batch of millions can end up eating holes in your brain); but, from the perspective of a user who isn't a tech god, it might as well have.

    That being so, the question of whether you can trust Chinese computer equipment is basically a political one. China's general enthusiasm for industrial espionage is well known, so if you have data on interesting technology or military stuff, the answer is almost certainly "no". If you are basically just Joe Consumer, though, your data are just noise obscuring what Chinese intelligence really wants. You would do better to be worried about the botnet your PC is part of, Google, ChoicePoint, Equifax, the NSA, and whoever is taking advantage of CALEA at that particular moment. The world of technology is a ghastly morass of potential backdoors, quite a few of them not even hidden, that most of us are constantly vulnerable to, and, in a great many cases, actively being monitored through.

    Bugged Chinese chips are definitely something to think about if you are doing military COTS procurement, or doing security for somebody who has data of real interest; but, for most of us, it's all just one more piece of assymetric transparency. I, for one, don't feel any warmer and fuzzier about the Americans spying on me than the Chinese spying on me(worse, in fact, because some sinister chinese intelligence agency is substantially less likely to sell my information to advertisers, make it harder to get medical insurance, or damage my credit rating than some warm, fuzzy, American multinational corporation).

    I really hope that this threat leads to a general recognition of the need for sound and open practices for security(both in the sense of novel CS research on how to do maximally verifiable stuff, test blackboxes, build verified bootstrap compilers, etc, etc. and in the sense of market acceptance of the fact that mysterious binary firmwares, and "just trust us" responses from vendors, and blackbox systems in general just aren't good enough). That would make things better for everybody. I get the unpleasant sense, though, that a lot of this concern is less about "We really need to understand how to build highly complex systems that are dependable and verifiable for those who use them." and more about "Goddam chinks, only we are supposed to have backdoors and surveillance capabilities!"
    • Re:NSA (Score:3, Interesting)

      by Phrogman ( 80473 )

      Can you trust the NSA to not simply forward all the commercially viable information to a corporation, if it serves their interests?
      They have apparently used sigint to aid US corporations in the past, whats to stop them now.
      I feel no guarantee that the NSA is going to be any more careful about using personal information than the Chinese will be. I am opposed to both of them knowing my personal details. Really the only defense I have is the fact that I am undoubtedly of little interest to either.

  • I'll just return my iPod Touch and my 2 MacBooks to Apple, with a little note about the Chinese manufacturing. I'm sure they will understand and give me my money back.
  • by gurps_npc ( 621217 ) on Friday February 05, 2010 @11:29AM (#31035498) Homepage
    It is a rather simple military rule that you create your own information networks. You don't let your enemy or even your ally. Using Chinese made equipment for any military equipment is a bad idea. This is a no-brainer.
  • For outsourcing the production to the lowest bidder...

  • by cdrguru ( 88047 ) on Friday February 05, 2010 @11:30AM (#31035518) Homepage

    If you are a User, you have no choice but to trust the entire universe of code around you. Your watch could contain a rogue program, your car radio, your cell phone, your microwave oven. Everything is enabled with microprocessors programmed by unknown and unknowable people with unknown and unknowable motivations.

    All you can do is hope for the best if you are a User.

    However, if you are a Programmer you can only use code that you trust and have personally verified in addition to the rest of the Programmer community. Users don't count for much in this world, because they can't help out, they can only blindly follow. Some Users will have Programmer friends and they can just follow in their footsteps, like a line of soldiers through a minefield. Only Programmers have this power.

    Sadly, the way people are wired only a very few are going to be Programmers. The rest simply do not have the skills or the mental faculties. The rest of the human race are doomed to simply be Users.

  • Evidence? (Score:3, Interesting)

    by david.given ( 6740 ) <dg@cowlark.com> on Friday February 05, 2010 @11:30AM (#31035524) Homepage Journal

    So, is there any actual evidence backing all this up, or is it just more anti-Chinese vilification?

    (Remember, we have always been at war with Eastasia.)

    • Re:Evidence? (Score:4, Insightful)

      by Jeng ( 926980 ) on Friday February 05, 2010 @11:44AM (#31035728)

      Looks completely made up to me. Why just think about the times that the consumer has ran across hidden malware such as the Sony Rootkit incident. Experts saw unusual traffic and traced it back to a CD. Same thing would happen if a piece of equipment had hidden malware in it, someone would notice the suspicious traffic and trace it back to the source.

  • Sure... (Score:5, Insightful)

    by ironicsky ( 569792 ) on Friday February 05, 2010 @11:31AM (#31035544) Journal

    While the USB memory key (in this example) could have low level software to snoop your data, how are they going to get it? Is the USB key going to open a TCP/IP or UDP connection back to their servers without tripping my firewall that a new application is trying to connect? Is my virus scanner going to get tripped that something suspicious is coming out of the key without my interaction?

    Most decent virus scanners and firewalls will pick up on this. In a lot of corporate networks USB Mass media is disabled. I'd love to see a proof of concept that can get around these common checks... If anyone has a USB key that can do this, please let me know :-) I'll happily test it.

  • by MpVpRb ( 1423381 ) on Friday February 05, 2010 @11:40AM (#31035660)

    Not all Chinese-made products contain Chinese computer code.

    I am a consultant to a US company. Our products are made by Chinese companies, to our specifications.

    I write all of the code, and it is loaded after the products get to the US.

    • by SmallFurryCreature ( 593017 ) on Friday February 05, 2010 @01:16PM (#31037052) Journal

      Because the entire point of someone a LOT smarter then you, is that if the very tool you use is compromised, then how can you ever check it? Your write your program to the memory, but the memory controller itself is corrupted. So you check everything, and you never see anything wrong.

      A compromised system can never be trusted and if you don't control the system, then you can never know it is compromised unless you verify every last detail, down to grinding the top of the chip and seeing exactly what the layout is. And do this for every last element.

      How do you know there is not a simple element in the USB connector that records everything? How do you know the simple chip in your ethernet card doesn't transmit everything? How do you know your router hasn't been hardcoded to ignore such traffic?

      You don't. Granted, putting it all together seems like an enormous task and there are far simpler ways of spying. But it is possible.

  • by King_TJ ( 85913 ) on Friday February 05, 2010 @11:42AM (#31035686) Journal

    I'm *far* from trying to defend China or claim they're "trustworthy" ... but taken to its logical conclusion, this line of thinking is a dead-end for most individuals and businesses. Ultimately, yes, you can't know for 100% certain a given piece of software is trusted unless you wrote it yourself .... but what's new? That's always been, and always will be the case ... and unless you were able to engineer your own computer processor and other components on the motherboard, etc. - you STILL can't prove you're running a completely trusted system, can you?

    In reality, I think people have to possess some awareness of their computing environment, as a whole - and that may realistically be the best we can do. If some piece of gear is "compromised", it still has to communicate the information it stole to a receiver on the other end. That means, your firewall is capable of either blocking or at least logging that connection. There's also, of course, the "strength in numbers" facet to all of this. Maybe YOU as an individual never noticed something strange was going on with a piece of gear, but as thousands or millions of people become customers/users of the same gear, chance increase that SOMEONE will figure it out. Keep an eye on the tech news and Internet forums, and you'll receive pretty quick warnings about such things. (This is probably also a good argument for going with popular products, vs. obscure ones with a far lower installed user-base?)

  • by cluemore ( 1617825 ) on Friday February 05, 2010 @11:42AM (#31035698)
    talk about yer hardware backdoors ... this one is a pseudo random number generator that can be rigged to generate predictable keys. http://www.antiwar.com/orig/ketcham.php [antiwar.com]
  • Cisco (Score:5, Interesting)

    by Lifyre ( 960576 ) on Friday February 05, 2010 @11:43AM (#31035706)

    This isn't just for good known to be made in china. This past year we performed an audit of our network infrastructure with Cisco's help. We found almost 10% of our switches were counterfeit. They were all models of layer 2 and layer 3 switches and were virtually indistinguishable from genuine Cisco products down to the enhanced security IOS.

  • by Animats ( 122034 ) on Friday February 05, 2010 @11:58AM (#31035966) Homepage

    DoD is really worried about this. They're trying to develop ways to efficiently examine ICs to check for unexpected "features". Right now, it's necessary to open up the IC and put it under a scanning electron microscope, then use software that can extract the logic diagram from the scan.

    One of the obvious places to put in a "back door" is in Ethernet controllers. Many used in servers already have logic for hardware "remote administration" (turn machine off, reboot, load code, etc.). It is supposed to be disabled by default, and work only when initialized with keys during hardware installation. Just build a set of default remote administration keys into the chip, and everyone using that chip is 0wned. Send the right UDP packets, and you can take over the machine. This would be completely invisible until activated.

    • by smellsofbikes ( 890263 ) on Friday February 05, 2010 @12:28PM (#31036406) Journal

      DoD is really worried about this. They're trying to develop ways to efficiently examine ICs to check for unexpected "features". Right now, it's necessary to open up the IC and put it under a scanning electron microscope, then use software that can extract the logic diagram from the scan.

      One of the obvious places to put in a "back door" is in Ethernet controllers. Many used in servers already have logic for hardware "remote administration" (turn machine off, reboot, load code, etc.). It is supposed to be disabled by default, and work only when initialized with keys during hardware installation. Just build a set of default remote administration keys into the chip, and everyone using that chip is 0wned. Send the right UDP packets, and you can take over the machine. This would be completely invisible until activated.

      Whenever this subject comes up, I post about it and either get a +5 insightful or get flamed to hell and told I don't know what I'm talking about, so let's see what happens this time. I work in semiconductor design. In a CPU or memory chip there are some sections of the chip that have duplicate/spare circuitry that can be brought into play if some of the main circuitry is defective. This is what people refer to when they talk about trimming memory chips. I don't do this sort of stuff so I don't actually know for sure, but people who post on slashdot claiming to know, say that it would be "easy" to jigger some of the spare circuitry to provide added/surreptitious functionality to the chip.

      Thing is: I don't see that this is very useful since it's in ram or the cpu, and it seems to me to be possible, maybe even likely, to see surreptitious traffic from them heading outwards to the ethernet controller chip.

      I think -- as apparently do you -- that the most likely places to try to put in backdoors are the I/O chips because it's hard for you to determine what they're doing. But then they have to include some serious functionality, to implement at least a little intelligence to decide what to send, unless they want to send everything, which again would be pretty obvious to someone looking at the hardware.

      And since I work at a place that *does* design ethernet controller chips, although that's not what *I* do, I can say with at least some assurance that it's really, really, really unlikely that they could be backdoored.

      Let me explain why: on analog and small digital chips, die size is *unbelievably* important because it is directly related to your profit margin. I've done chip layout. We will go to any lengths whatsoever to make the die smaller, even if it means completely relaying out the chip. There isn't any space for extra circuitry at all. Every square mil is loaded.

      On top of that, we then run our prototype chips on planet runs, where a bunch of proto chips from various designers are all masked onto a chunk of silicon, in either our own local fab or our tiny owned fab in Europe, and then characterize the returned chip, and do metal changes and maybe a complete new mask set, and only *then* does it go out to the big fabs. And when we get *those* back, we spend months characterizing *them*, making sure that every individual pin has the same leakage current and ESD protection characteristics, as the ones we got back from our local fab, to ensure the chips will actually work in the field.

      In order for a Chinese fab to put a backdoor into one of our designs they'd have to increase the die area, which would be really amazingly obvious, or remove existing circuitry, which would be really amazingly obvious. Even if they're so incredibly clever as to redesign the chip better than we can design it in the first place, giving them space to add their circuitry, it's very unlikely that the current draw on every pin during operation and when forced into test mode and pushed to failure, would be within 1% of the chips we got from fabs that we control.

      With all that said, my company recently closed our Chinese fabs, an

      • by Animats ( 122034 ) on Friday February 05, 2010 @01:51PM (#31037522) Homepage

        In order for a Chinese fab to put a backdoor into one of our designs...

        If just the IC fab is outsourced, with masks provided, that's true. Many Ethernet chips are designed in Taiwan and fabbed in China, but so far I can't find ones developed entirely on the mainland. That can't be far off; eventually, engineering and design moves near the fab. There are competent IC design houses in China; HiSilicon and C2 Microsystems are sizable design companies. But neither makes an Ethernet controller. The focus of the Chinese design companies tends to be entertainment electronics and portable devices.

        • Re: (Score:3, Informative)

          You're entirely right. I'm making a presumption that by 'backdoor' we mean a hostile organization is altering a trusted design to include unintended functionality. But as with the security implications of physical access to a computer, if you're buying hardware from a potentially hostile organization, it's innately untrustworthy. (Is it a backdoor if the organization designs it in, intentionally, and only the end user doesn't know about it? If so, I'm misusing the word.)

          There are some fantastic design

  • Overblown fears (Score:3, Insightful)

    by timholman ( 71886 ) on Friday February 05, 2010 @12:02PM (#31036040)

    IMO people are worrying far too much about an exploit mechanism that is simply not needed if the Chinese want to spy on the West, or anyone else for that matter.

    The problem with building backdoors into the hardware or firmware is that such backdoors are traceable. You know where it was made. The right forensics people can probably tell you the exact factory it came out of. And how many people would buy chips from a Chinese fab once someone found a hardware backdoor inserted into a product? The Chinese want to make money first and foremost, not shoot themselves in the foot adding a backdoor that might have a one-in-a-million shot of giving them access to a system they even cared about, but would destroy an entire industry if they were caught. It's not worth the risk.

    The smart thing to do is what they (and everyone else) are doing right now - use software exploits over the net to gain access. The attack can be targeted, the attackers can easily hide their tracks, the attacks can be modified as needed, and you have plausible deniability if you're caught. That's the smart way to subvert your enemies, and as long as governments and businesses keep running Windows, it's the way that they'll keep using.

  • by trifish ( 826353 ) on Friday February 05, 2010 @12:13PM (#31036176)

    ... because hardware means accountability and traceability. Software intrusions are much more convenient for them because the attacks are practically anonymous and nobody can really prove who in China carried them out.

  • Comment removed (Score:3, Insightful)

    by account_deleted ( 4530225 ) on Friday February 05, 2010 @12:18PM (#31036262)
    Comment removed based on user account deletion
  • by MrTripps ( 1306469 ) on Friday February 05, 2010 @12:30PM (#31036424)
    After all we did that to the Russians in the 80's causing one of their large oil pipelines to explode. Does it make you feel better that Microsoft gave China a peek at the full source code for Windows? http://www.builderau.com.au/architect/work/soa/US-software-blew-up-Russian-gas-pipeline-/0,339024596,320283135,00.htm [builderau.com.au]
  • by Remus Shepherd ( 32833 ) <remus@panix.com> on Friday February 05, 2010 @01:25PM (#31037190) Homepage

    I'm amazed at the number of responses saying, 'Well, the US spies on its citizens too.'

    Folks, there are laws in the US that restrict surveillance of US citizens. They are allowed to collect aggregate data, and they have far-reaching powers when a subpoena exists due to suspected crime or terrorism. But just spying on regular citizens as a normal function of government -- that should never happen in the US.

    I say 'should' because it's possible it does happen in some black project somewhere. But I guarantee you it's much, much smaller and more benevolent than how China spies on its citizens.

    If you're comparing Big Brothers, the US one has one eye closed and only sneaks a peek when the cops aren't watching. The Chinese practically live in a panopticon; their government probably keeps track of what color underwear they have on.

    • Re: (Score:3, Insightful)

      by swordgeek ( 112599 )

      "But I guarantee you..."

      That's a hell of a guarantee to make, especially given how extensively the US is currently known to spy on its citizens.

      Not defending China here at all, nor saying that things in the western world are _that_ bad, but I think they are much closer than you claim.

  • by swordgeek ( 112599 ) on Friday February 05, 2010 @02:32PM (#31038100) Journal

    No.

    There, that's all there is to it. Chinese, Korean, Vietnamese, American, British, Indian, or other.

    You can't trust the companies, and you can't trust the governments. Everywhere a corrupt person _could_ have (or create) access to data they shouldn't, there _will_ be a corrupt person working at it.

    Maybe it's the Chinese government, maybe it's a hacker at a chip factory, maybe it's the Russian mafia, maybe it's a rogue NSA operative (or the NSA itself), but SOMEONE will do this eventually. They may not be after your data, but if it becomes useful (i.e. valuable) to them, then they'll use it.

  • by dirtyhippie ( 259852 ) on Friday February 05, 2010 @02:51PM (#31038370) Homepage

    The post makes it sound like Thompson actually put a backdoor in the version of CC that shipped with unix. He did not. What he *did* was demonstrate that he could have in an earlier version and you would be none the wiser by inspecting the source of said compiler.

There are new messages.

Working...