Audit of TrueCrypt disk encryption software reveals low source code quality

by
in security on (#3HZ)
Back in October 2013, Kenneth White and Matthew Green kicked off the idea to do a full and complete audit of TrueCrypt, the most popular disk encryption package out there. They raised over $60,000 dollars and 33BTC to this end, and got underway.
The first part of the audit - the in-depth source code review - was performed by a security firm and completed on April 14 of this year ( report ).
The results are interesting to read. No bogeys have been found so far, though 11 medium-to-minor items were identified. But the authors did note:
Overall, the source code for both the bootloader and the Windows kernel driver did not meet expected standards for secure code. This includes issues such as lack of comments, use of inse-cure or deprecated functions, inconsistent variable types, and so forth.

The next stage, cryptanalysis , has begun and is proceeding.
I'm sure plenty of people are thinking, "How about doing the same thing for OpenSSL?" I'd personally prefer to see this sort of effort going into improving the OpenSSL software.

Re: this is where open source (Score: 1, Interesting)

by Anonymous Coward on 2014-04-17 14:42 (#13S)

I think it goes a step further: it shows a need for extremely stringent code analysis to be done by *qualified* people. We need more Theo de Raadts looking at code that affects internet security. These people exist, but most of them are either looking at software that powers your car or airplane, or they are in the military, reviewing code that's used in weapons. These are places that don't have much leeway when it comes to errors. I don't understand why encryption protocols should be any different.
Post Comment
Subject
Comment
Captcha
Enter the largest number of eight, ninety eight or 13: