<font face="arial" size="3"><p style="margin:0;padding:0;font-family: arial; font-size: 12pt; overflow-wrap: break-word;">In my personal view, the lack of any evidence that Huawei has any more government-controlled or classified compartmented Top Secret offensive Cyberwar exploits than Cisco, Qualcomm, Broadcom, Mellanox, F5, NSO group, etc. is quite a strong indication that there's no relevant "there" there.</p>
<p style="margin:0;padding:0;font-family: arial; font-size: 12pt; overflow-wrap: break-word;"> </p>
<p style="margin:0;padding:0;font-family: arial; font-size: 12pt; overflow-wrap: break-word;">Given the debunking of both the Supermicro and Huawei fraudulent claims (made by high level "government sources" in the intelligence community), this entire thing looks to me like an attempt to use a fake National Emergency to achieve Trade War goals desired by companies close to the US Government agencies (esp. now that the Secretary of Defense is a recent Boeing CEO who profits directly from such imaginary threats).</p>
<p style="margin:0;padding:0;font-family: arial; font-size: 12pt; overflow-wrap: break-word;"> </p>
<p style="margin:0;padding:0;font-family: arial; font-size: 12pt; overflow-wrap: break-word;">Now, I think that this "open up the sources" answer is a really good part of a solution. The other parts are having resiliency built in to our systems. The Internet is full of resiliency today. A balkanized and "sort of air-gapped" US transport network infrastructure is far more fragile and subject to both random failure and targeted disruption.</p>
<p style="margin:0;padding:0;font-family: arial; font-size: 12pt; overflow-wrap: break-word;"> </p>
<p style="margin:0;padding:0;font-family: arial; font-size: 12pt; overflow-wrap: break-word;">But who is asking me? Fear is being stoked.</p>
<p style="margin:0;padding:0;font-family: arial; font-size: 12pt; overflow-wrap: break-word;"> </p>
<p style="margin:0;padding:0;font-family: arial; font-size: 12pt; overflow-wrap: break-word;"> </p>
<p style="margin:0;padding:0;font-family: arial; font-size: 12pt; overflow-wrap: break-word;">On Thursday, May 16, 2019 5:58am, "Dave Taht" <dave.taht@gmail.com> said:<br /><br /></p>
<div id="SafeStyles1558015482">
<p style="margin:0;padding:0;font-family: arial; font-size: 12pt; overflow-wrap: break-word;">> And we labor on...<br />> <br />> https://tech.slashdot.org/story/19/05/15/2136242/trump-signs-executive-order-barring-us-companies-from-using-huawei-gear<br />> <br />> To me, the only long term way to even start to get out of this<br />> nightmare (as we cannot trust anyone else's gear either, and we have<br />> other reminders of corruption like the volkswagon scandal) is to<br />> mandate the release of source code, with reproducible builds[1], for<br />> just about everything connected to the internet or used in safety<br />> critical applications, like cars. Even that's not good enough, but it<br />> would be a start. Even back when we took on the FCC on this issue, (<br />> http://www.taht.net/~d/fcc_saner_software_practices.pdf ) I never<br />> imagined it would get this bad.<br />> <br />> 'round here we did produce one really trustable router in the cerowrt<br />> project, which was 100% open source top to bottom, which serves as an<br />> existence proof - and certainly any piece of gear reflashed with<br />> openwrt is vastly better and more secure than what we get from the<br />> manufacturer - but even then, I always worried that my build<br />> infrastructure for cerowrt was or could be compromised and took as<br />> many steps as I could to make sure it wasn't - cross checking builds,<br />> attacking it with various attack tools, etc.<br />> <br />> Friends don't let friends run factory firmware, we used to say. Being<br />> able to build from sources yourself is a huge improvement in potential<br />> trustability - (but even then the famous paper on reflections on<br />> trusting trust applies). And so far, neither the open source or<br />> reproducable builds concepts have entered the public debate.<br />> <br />> Every piece of hardware nowadays is rife with binary blobs and there<br />> are all sorts of insecurities in all the core cpus and co-processors<br />> designed today.<br />> <br />> And it isn't of course, just security in huawei's case - intel just<br />> exited the business - they are way ahead of the US firms in general in<br />> so many areas.<br />> <br />> I have no idea where networked computing can go anymore, particularly<br />> in the light of the latest MDS vulns revealed over the past few days (<br />> https://lwn.net/Articles/788522/ ). I long ago turned off<br />> hyperthreading on everything I cared about, moved my most critical<br />> resources out of the cloud, but I doubt others can do that. I know<br />> people that run a vm inside a vm. I keep hoping someone will invest<br />> something major into the mill computing's cpu architecture - which<br />> does no speculation and has some really robust memory and stack<br />> smashing protection features (<br />> http://millcomputing.com/wiki/Protection ), and certainly there's hope<br />> that risc-v chips could be built with a higher layer of trust than any<br />> arm or intel cpu today (but needs substancial investment into open<br />> on-chip peripherals)<br />> <br />> This really isn't a bloat list thing, but the slashdot discussion is<br />> toxic. Is there a mailing list where these sorts of issues can be<br />> rationally discussed?<br />> <br />> Maybe if intel just released all their 5G IP into the public domain?<br />> <br />> /me goes back to bed<br />> <br />> [1] https://en.wikipedia.org/wiki/Reproducible_builds<br />> <br />> --<br />> <br />> Dave Täht<br />> CTO, TekLibre, LLC<br />> http://www.teklibre.com<br />> Tel: 1-831-205-9740<br />> _______________________________________________<br />> Cerowrt-devel mailing list<br />> Cerowrt-devel@lists.bufferbloat.net<br />> https://lists.bufferbloat.net/listinfo/cerowrt-devel<br />> </p>
</div></font>