Matt Asay
Contributing Writer

Focusing open source on security, not ideology

analysis
Jul 22, 20244 mins
Cloud SecurityOpen SourceSecurity Practices

In todayโ€™s world where everything gets hacked, conversations about security are whatโ€™s truly important, especially to attract younger developers to open source.

Communication technology with global internet network connected in Europe. Telecommunication and data transfer european connection links. IoT, finance, business, blockchain, security.
Credit: NicoElNino / Shutterstock

Underlying the proliferating memes about the CloudStrike update fail is a certain smugness that such things wonโ€™t happen to you. Yes, itโ€™s true that Microsoft may be particularly susceptible to such things. As the US Cyber Safety Review Board has found, โ€œMicrosoftโ€™s security culture [is] inadequate and requires an overhaul,โ€ but letโ€™s not kid ourselves. Could something equally catastrophic happen in Linux land? Maybe not that exact issue, but Linux systems have been ripped open by supply chain attacks like Heartbleed repeatedly in the past. No, that doesnโ€™t make them bad, any more than the CrowdStrike issue makes Windows machines bad. This is just the world we live in. Everything breaks, and everything gets hacked.

Yes, we absolutely should try to avoid breaks and hacks, but real safety comes in how we respond when they happen. This is why open source and open technology, generally, have been such a boon. Not because open source is more secure or less prone to break, but because fixing it can be easier. Rather than dance on a Windows security breakdown, now is the time to refocus open source on the issues that matter most.

The bell tolls for thee

Open source software is not more secure than proprietary software. But the process for securing open source software arguably is. Iโ€™ve been saying so for decades, and lots of data supports the contention.

Yet even here, the process only works if people follow it. Thereโ€™s a reason supply chain attacks succeed: Even when a fix for a bug is available, we stink at applying the patches. Itโ€™s been 10 years since Heartbleed hit, and there are still tens of thousands of systems that remain vulnerable. Why? Well, itโ€™s non-trivial to effectively inventory enterprise systems, and patching older systems can be complicated.

At an industry level, we canโ€™t really resolve these issues, as theyโ€™re specific to each enterprise. However, there are things we can do. The Open Source Security Foundation (OpenSSF) has taken up the challenge to both improve the security posture of open code while also training people on the process of security. This is excellent. For me, itโ€™s one of the most important things that the Linux Foundation, which is the ultimate home for OpenSSF, does.

Iโ€™d also point out that this is what open source communities should emphasize, generally. We have a graying open source community, as Steven J. Vaughan-Nichols writes. โ€œIf weโ€™re going to change the world for good with open source, we need to grab the attention of people who havenโ€™t turned 30 yet,โ€ he argues. Heโ€™s not wrong.

Changing the conversation

Iโ€™d hazard a guess that one reason open source remains largely an older developerโ€™s game is the insistent gatekeeping on the โ€œright wayโ€ to open source. They grew up on a steady diet of the Open Source Definition, and persist in fixating on the wrong open source issues. The biggest concern isnโ€™t companies relicensing their software (disclosure: my company did just that in 2019). Itโ€™s security.

The younger GitHub generation of coders has never shown the same concern for open source licensing, something first observed by RedMonkโ€™s James Governor in 2013, as he dubbed this group the โ€œpost open source generation.โ€ They are open, yes, but not pedantic about the underlying licenses (sometimes to a fault, because itโ€™s not as if GitHub repositories without a license are somehow public domainโ€”thatโ€™s not how copyright works).

Given how critical open software is for security, thatโ€™s where we should focus our attention. In other words, yes, open source and open technology matter, but not for the reasons we sometimes suggest. Rather than doing our best impressions of Dana Carveyโ€™s Grumpy Old Man skit on open source definitions, we should put that energy into talking about the process for securing software and how open source helps. This will be much more interesting and relevant to younger developers, who have grown up in the โ€œeverything will break; everything will be hackedโ€ era, than tedious discussions about licensing.

Matt Asay

Matt Asay runs developer marketing at Oracle. Previously Asay ran developer relations at MongoDB, and before that he was a Principal at Amazon Web Services and Head of Developer Ecosystem for Adobe. Prior to Adobe, Asay held a range of roles at open source companies: VP of business development, marketing, and community at MongoDB; VP of business development at real-time analytics company Nodeable (acquired by Appcelerator); VP of business development and interim CEO at mobile HTML5 start-up Strobe (acquired by Facebook); COO at Canonical, the Ubuntu Linux company; and head of the Americas at Alfresco, a content management startup. Asay is an emeritus board member of the Open Source Initiative (OSI) and holds a JD from Stanford, where he focused on open source and other IP licensing issues. The views expressed in Mattโ€™s posts are Mattโ€™s, and donโ€™t represent the views of his employer.

More from this author