Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

'Breaking' (not really new - article title) - Diebold Source Code

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » Topic Forums » Election Reform Donate to DU
 
Jersey Devil Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 04:22 PM
Original message
'Breaking' (not really new - article title) - Diebold Source Code
Edited on Wed Nov-10-04 04:37 PM by Jersey Devil
Kos: http://www.dailykos.com/story/2004/11/10/1172/9052
by ouranos
Wed Nov 10th, 2004 at 08:07:02 PST

Dr. Avi Rubin is currently Professor of Computer Science at John Hopkins University. He "accidently"got his hands on a copy of the Diebold software program--Diebold's source code--which runs their e-voting machines.
Dr. Rubin's students pored over 48,609 lines of code that make up this software. One line in partictular stood out over all the rest:

#defineDESKEY((des_KEY8F2654hd4"


All commercial programs have provisions to be encrypted so as to protect them from having their contents read or changed by anyone not having the key..The line that staggered the Hopkin's team was that the method used to encrypt the Diebold machines was a method called Digital Encryption Standard (DES), a code that was broken in 1997 and is NO LONGER USED by anyone to secure prograns.F2654hd4 was the key to the encryption. Moreover, because the KEY was IN the source code, all Diebold machines would respond to the same key. Unlock one, you have then ALL unlocked.

I can't believe there is a person alive who wouldn't understand the reason this was allowed to happen. This wasen't a mistake by any stretch of the imagination. This was a fixed election, plain and simple.

This second coup d'etat is either stopped now or America ceases to be.


Printer Friendly | Permalink |  | Top
alittlelark Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 04:23 PM
Response to Original message
1. OH MY...... Drool.......
please, please please.....
Printer Friendly | Permalink |  | Top
 
HeeBGBz Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 04:26 PM
Response to Reply #1
5. Damn, this is getting stinkier by the minute n/t
Printer Friendly | Permalink |  | Top
 
Straight Shooter Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 04:24 PM
Response to Original message
2. He "accidentally" got his hands on the source code?
Bwahahahah. Somebody is honest, and as the fundies would say, "Praise God!!"
Printer Friendly | Permalink |  | Top
 
CraZdem4life Donating Member (62 posts) Send PM | Profile | Ignore Wed Nov-10-04 04:41 PM
Response to Reply #2
38. diebold
a while back (2002 i think), diebold accidentally uploaded the source code onto their webserver. there, the whole world downloaded it. then they found out, peed their pants, and took it off.
Printer Friendly | Permalink |  | Top
 
txindy Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 06:50 PM
Response to Reply #2
79. Rubin could've found it on the floor. We shouldn't make any assumptions.
:silly:

B-)
Printer Friendly | Permalink |  | Top
 
MadAsHellNewYorker Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 04:24 PM
Response to Original message
3. now thats a smoking gun
if i ever did need one
Printer Friendly | Permalink |  | Top
 
The Backlash Cometh Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 04:24 PM
Response to Original message
4. Ohhh...this is what happens when you piss off the net nerds.
Way to go John Hopkins!
Printer Friendly | Permalink |  | Top
 
nolabels Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 04:39 PM
Response to Reply #4
36. "this is what happens when you piss off the net nerds."
I hate them guys :D
Printer Friendly | Permalink |  | Top
 
txindy Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 06:55 PM
Response to Reply #36
82. Yeah, what's their problem, anyway? You'd think they didn't want the draft
Or something. ;) Or maybe it's because they are part of the "Intellectual Elite." Or something.

Let's face it, other than the fundies and KoolAid drinkers, Junior has managed to chap just about everybody's hide.
Printer Friendly | Permalink |  | Top
 
ramblin_dave Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 04:26 PM
Response to Original message
6. Why is this "breaking" news
Rubin has had the source code for some time now. Is this a new discovery?
Printer Friendly | Permalink |  | Top
 
Occulus Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 04:27 PM
Response to Reply #6
8. Maybe they just found it
That's quite a bit of code to analyze.
Printer Friendly | Permalink |  | Top
 
Jersey Devil Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 04:27 PM
Response to Reply #6
11. I just repeated the title of the article at Kos - true, not breaking
and also just read the comments there that it really wasn't new, but I think it is an important fact that should be forwarded to the media to convince them that the security problems are real.
Printer Friendly | Permalink |  | Top
 
txindy Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 06:52 PM
Response to Reply #11
81. Agree about forwarding it
It's not as if the media paid any attention to this when it was first revealed that these machines had serious flaws. They need to be brought up to speed. The media AND the machines. Both have serious flaws. :evilgrin: Well, they do!!
Printer Friendly | Permalink |  | Top
 
BlueEyedSon Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 04:29 PM
Response to Reply #6
20. You also have to make sure that code is used everywhere
and there isn't some other security code. Depends how its all organized....
Printer Friendly | Permalink |  | Top
 
htuttle Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 04:37 PM
Response to Reply #20
33. Almost doesn't matter
Once you know that they've hard-coded the DES pass key as a macro, all you have to do is extract it from the executable (static strings are EASY to pull out of executables).

So even if they changed it every year, it wouldn't matter. It could still be easily extracted and used from the current version of the executable.
Printer Friendly | Permalink |  | Top
 
BlueEyedSon Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 04:48 PM
Response to Reply #33
46. Sure it matters. Maybe that macro is never used.
Maybe there is a huge, sophisticated encryption subsystem defined in another set of source files. Maybe that define id only for testing, or as a default which in real-world use is always overwritten. Yadda, yadda, yadda.

That one liner is not an indictment. But so far the code sounds like major CRAP. Should have outsourced it to India!
Printer Friendly | Permalink |  | Top
 
htuttle Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 04:53 PM
Response to Reply #46
50. It was used
It was used to encrypt the memory flash cards. Speaking from having read through ALL of it myself (which is why I remember it).
Printer Friendly | Permalink |  | Top
 
BlueEyedSon Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 05:06 PM
Response to Reply #50
52. Got a link to the ZIP?
:)
Printer Friendly | Permalink |  | Top
 
htuttle Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 05:24 PM
Response to Reply #52
54. It's a tar file, not a zip
And no, I can't. I enjoy my freedom. :)

BUT a little bird tells me that a file called 'dieboldcvs.tar' is somewhere out there on the Gnutella network.

Along with a file named 'SecretDieboldMemos.tar.gz', which might also be very interesting, since it shows that Diebold's programmers KNOW that they suck.

They are both out there somewhere.

Printer Friendly | Permalink |  | Top
 
dbonds Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 05:26 PM
Response to Reply #54
56. Nice birdie
Singing those songs.
Thanks birdie.
Printer Friendly | Permalink |  | Top
 
htuttle Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 05:32 PM
Response to Reply #56
58. One other thing
It's about 68374528 bytes.

Approximately. :)
Printer Friendly | Permalink |  | Top
 
BlueEyedSon Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 06:20 PM
Response to Reply #58
73. Must be a lot of comments.
:)
Printer Friendly | Permalink |  | Top
 
htuttle Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 06:23 PM
Response to Reply #73
75. There are
And like most corporate source code written by many people, some of them are both hilarious and scary.

Printer Friendly | Permalink |  | Top
 
BlueEyedSon Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 06:30 PM
Response to Reply #75
77. //*************************************************************
// this subroutine fucks the godless
// liberal democrats.
// I get a big fat bonus for every
// election we steal!
//*************************************************
Printer Friendly | Permalink |  | Top
 
htuttle Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 06:37 PM
Response to Reply #77
78. Nothing that incriminating
More like the stuff you see in too much business code, like "THIS CODE SUCKS WIND AND NEEDS TO BE REMOVED BEFORE DEPLOYMENT", around a section of code that's obviously still there, and obviously still sucks wind. (NOTE: That is not a direct quote, but a characterization.)

Printer Friendly | Permalink |  | Top
 
txindy Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 07:00 PM
Response to Reply #54
83. So, EVERYBODY who reads that code online knows the hard-coded key?
This just gets better and better. Did they actually pay somebody to deliberately write this code so poorly or did they decide to take advantage of poor code once they found out what they had? Rhetorical question. It really doesn't matter. Knowing they had it and using it anyway, is worse. Tampering with it during an election -- or telling someone how to tamper with it -- is far worse.
Printer Friendly | Permalink |  | Top
 
Occulus Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 04:26 PM
Response to Original message
7. WHAT. THE. FUCK.
But I want to see the source itself to verify the line is indeed in there. If true = smoking gun.
Printer Friendly | Permalink |  | Top
 
Boredtodeath Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 04:31 PM
Response to Reply #7
22. It's there...and it was posted on DU in July 2003
If you can search the archives here, check for it.

I've seen the source code. It's there.

Printer Friendly | Permalink |  | Top
 
tridim Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 04:27 PM
Response to Original message
9. Can we move the Democracy security alert level to red yet?
Printer Friendly | Permalink |  | Top
 
GingerSnaps Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 04:27 PM
Response to Original message
10. Source code dating back to 1997?
The election was rigged.

We have to get this story out.

March on Washington!
Printer Friendly | Permalink |  | Top
 
Jersey Devil Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 04:28 PM
Response to Reply #10
17. Of course, it could have been upgraded
We have no way of knowing how old the code was that was worked on at Hopkins.
Printer Friendly | Permalink |  | Top
 
Eloriel Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 04:38 PM
Response to Reply #17
34. No, it was the same stuff n/t
Printer Friendly | Permalink |  | Top
 
GingerSnaps Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 04:42 PM
Response to Reply #17
39. Cobol would be my guess
Edited on Wed Nov-10-04 04:42 PM by GingerSnaps
They would need a source code that would be more or less obsolete to programmers today.

I am happy that everything is coming out.

:bounce:
Printer Friendly | Permalink |  | Top
 
htuttle Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 04:43 PM
Response to Reply #39
42. It was written in C++
FYI
Printer Friendly | Permalink |  | Top
 
ParanoidPat Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 06:12 PM
Response to Reply #17
72. You have no way of knowing however.......
.......those of us who downloaded the entire library (Gigs of files!) have the entire source code library up until the time the software was found, complete with revision history. :)

Every change made to the source code is annotated with what the change was for, who made it, and which version number it was made for.

Each state that uses the machines has a public record of the certification documents stipulating the version number(s) certified for use in that state.

The code was current at the time and we can prove it. :evilgrin:
Printer Friendly | Permalink |  | Top
 
merbex Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 04:27 PM
Response to Original message
12. Now NH looks really critical
Thank God they elected a Dem Gov up there this time
Printer Friendly | Permalink |  | Top
 
BlueEyedSon Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 04:27 PM
Response to Original message
13. Oh yeah that's not a "bug", that's a "feature"
designed in from the get-go.
Printer Friendly | Permalink |  | Top
 
high density Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 04:28 PM
Response to Original message
14. Haven't we known about this for a while now?
And who knows what that DES key was used to encrypt anyway.

The main problem, in my opinion, is Diebold using Microsoft Access databases to store votes. These voting machines should be locked down more than ATM and slot machines combined. You can be sure that there are no banks out there storing account information in Access databases.
Printer Friendly | Permalink |  | Top
 
Jersey Devil Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 04:30 PM
Response to Reply #14
21. apparently yes, but I didn't and I bet the media didn't
Look at the original article - "breaking" is part of the title
Printer Friendly | Permalink |  | Top
 
htuttle Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 04:42 PM
Response to Reply #14
40. IIRC, the DES was used to encrypt the actual memory flash cards
So with this DES pass key, you could take any one of the cards, alter the data, and reencode it so nobody was the wiser.
Printer Friendly | Permalink |  | Top
 
GuardingVirginia Donating Member (80 posts) Send PM | Profile | Ignore Wed Nov-10-04 04:28 PM
Response to Original message
15. Current software?
Is this the current release? Some snatched Diebold's software before and Diebold said it was the old release, a program in work and wasn't valid. You'd have to have the copy of what was running on the machine.
Printer Friendly | Permalink |  | Top
 
htuttle Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 04:39 PM
Response to Reply #15
35. See post #33
Even if they changed the password in later versions, it would be extractable once you knew it was compiled in as a macro (leading to a static string you can pull out WITHOUT the source code with the right tools).
Printer Friendly | Permalink |  | Top
 
phasev Donating Member (187 posts) Send PM | Profile | Ignore Thu Nov-11-04 10:39 AM
Response to Reply #35
102. exactly
static strings normally come out as plaintext when you look at the binhex depending on how it's compiled.
Printer Friendly | Permalink |  | Top
 
Middle Finger Bush Donating Member (108 posts) Send PM | Profile | Ignore Wed Nov-10-04 06:52 PM
Response to Reply #15
80. this is technically true
Lets say that the software was a work in progress, you sometimes take certain shortcuts like hardcoding passwords that you would prompt for in the production app.

I hope people are looking for strange functions that might manipulate the vote to give a predetermined result by doing as few changes as necessary.
Printer Friendly | Permalink |  | Top
 
htuttle Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 07:30 PM
Response to Reply #80
88. The version in question had already been used in an election
There is a cvs log of all the changes at the top of each one each file. With dates. By these dates and checkin comments, you can see that the source code spans several elections.

In fact, I think it was by examing these cvs logs that it was determined that Diebold had made changes to their software without re-certification before an election (2002, IIRC).
Printer Friendly | Permalink |  | Top
 
dbonds Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 07:36 PM
Response to Reply #88
91. CVS and tar files
These are all Unix/Linux type things. Are these the programs that run on XP? Not that they couldn't store the code on a more secure OS than XP, just curious. Also curious that these tools are more often used by Open Source advocates.
Printer Friendly | Permalink |  | Top
 
htuttle Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 07:40 PM
Response to Reply #91
92. I dont' know anything about their actual setup
...But a lot of companies are likely to set up a CVS server on a cheap Linux box. If the CVS was on Linux, tarring up the code would be the natural thing.

Since the choice of CVS is probably one of the few things actually left up to the programmers, it wouldn't be too surprising.

I believe that all these tools are available on Windows as well. Perforce and Source Safe can be expensive. :shrug:
Printer Friendly | Permalink |  | Top
 
dbonds Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 07:49 PM
Response to Reply #92
94. I was just pointing out one of those things that make you go hmm
As a programmer I agree with the setup and I myself prefer Linux and Open Source. Just that XP was used for development and deployment but they do know better. I'm sure there was probably some design requirement from somewhere telling them to use XP, but they don't blindly bow to MS software. And think how much cheaper each voting machine would be if it used Linux instead of XP. One of those rhetorical things where you just shake your head. Just the Open Source advocate in me coming out.
Printer Friendly | Permalink |  | Top
 
ParanoidPat Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 07:47 PM
Response to Reply #91
93. Actually the OS for the voting terminals is WIN CE.......
......and the software to run the GEMS tabulator was made backward compatible to run on Windows 9x. :wow:

Did I mention that the OS gets NO SECURITY PATCH UPDATES? :scared:

Oh, one more thing, no one ever looks at the OS software because it is considered 'COTS, Commercial Off The Shelf' software and as such, the ITA says it does not need to be looked at. We've found that the patches applied to systems in Georgia (from the infamous Rob Georgia folder) and elsewhere were to fix the 'broken' OS that was causing the screens to freeze up.
Printer Friendly | Permalink |  | Top
 
txindy Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 09:49 PM
Response to Reply #93
101. kicking
:kick: :kick: :kick: :kick: :kick:
:kick: :kick: :kick: :kick: :kick:
Printer Friendly | Permalink |  | Top
 
Flubadubya Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 04:28 PM
Response to Original message
16. Care to elucidate for us NON-nerds? ....
What does it mean? What does this line stand for? What does it make the program do? Why is it a "smoking gun"? Please & thank you.
Printer Friendly | Permalink |  | Top
 
high density Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 04:32 PM
Response to Reply #16
25. Big picture: It shows that Diebold has a bunch of sloppy programmers...
...but we knew that already.
Printer Friendly | Permalink |  | Top
 
txindy Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 07:18 PM
Response to Reply #16
84. Think of it as something akin to this --
Taking your ATM card (with access to, say, your entire lifesavings), writing your PIN directly on the card, and then super-gluing the card to the rear bumper of your car. The car you drive many miles with, each and every day.


Printer Friendly | Permalink |  | Top
 
methinks2 Donating Member (894 posts) Send PM | Profile | Ignore Wed Nov-10-04 04:28 PM
Response to Original message
18. thanks for the info
I'm passing it on.
Printer Friendly | Permalink |  | Top
 
Flubadubya Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 04:34 PM
Response to Reply #18
27. Thank you...
So they're using outdated code?
Printer Friendly | Permalink |  | Top
 
nadinbrzezinski Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 04:29 PM
Response to Original message
19. oh my, the plot thickens, now if we could get anybody tio care
Printer Friendly | Permalink |  | Top
 
Arioch Donating Member (81 posts) Send PM | Profile | Ignore Wed Nov-10-04 04:32 PM
Response to Reply #19
24. DES is still used
But only by dummies...or people who want the door to be easily opened...
Printer Friendly | Permalink |  | Top
 
Flubadubya Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 04:33 PM
Response to Reply #24
26. WHAT DOES IT MEAN????
Please pardon my yelling, but a LOT of people here do not understand the ramifcations of this "code", but would LIKE TO!!!!
Printer Friendly | Permalink |  | Top
 
dbonds Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 04:31 PM
Response to Original message
23. Something fishy about that
I am a software engineer, that line of code doesn't make sense

#defineDESKEY((des_KEY8F2654hd4"

I might can understand the missing spaces. A define statement is

#define NAME VALUE


so the two opening parenthesis raise the first question, they are not closed and it would not be complete without it, but this could be the start of a MACRO which would have most of it missing. The other part is a DES key would usually be numbers, but 8F2654hd4 is not a hex number because of the 'h' embedded, leaving me to believe it is part of the des_KEY identifier. The final question is raised by a quotation mark " being opened and not closed. There is nothing you can tell from this piece of code other than it is not complete.

DES keys are usually numeric. DES codes are crackable but only by brute force, which takes lots of computing power and a good bit of time.

Printer Friendly | Permalink |  | Top
 
tridim Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 04:34 PM
Response to Reply #23
29. They copied and pasted it wrong
The original report referenced the line:

#define DESKEY ((des_key*) "F2654hD4")
Printer Friendly | Permalink |  | Top
 
dbonds Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 04:42 PM
Response to Reply #29
41. That makes a little more sence - But ...
Edited on Wed Nov-10-04 05:11 PM by dbonds
That would imply defining a key word DESKEY that would be replaced with the code ((des_key*) "F2654hD4")

which would mean des_key* is a pointer to a memory address that has a class or stucture of type des_key. The rest is funny though. It is not a valid pointer as is. Problem number 1, it is a string (enclosed in quotes). Problem 2 is the embedded h again. So my theory. des_key is a class that has an operator overload for the pointer dereference that took a string and did something to it. What it does we can't tell and this is a very bad coding practice. if the code was something like
#define DESKEY ((des_key*) 0xF2654D4
it would make complete sense.

Editted for Second though
Unless the key is the alphanumber string F2654hD4, not a number. And des_key* is a typedef to a char*. Then it would make sense.
Printer Friendly | Permalink |  | Top
 
Occulus Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 04:44 PM
Response to Reply #29
44. That looks more like it should.
But how does it appear in the code itself- the way it is in the original post, or your 'correction' above?

That's what we need to know; the way it is written in the original post doesn't make much sense.
Printer Friendly | Permalink |  | Top
 
htuttle Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 04:46 PM
Response to Reply #44
45. It appears in the code just like it appears in tridim's post
It's a simple macro to define a static C string for the DES pass key.
Printer Friendly | Permalink |  | Top
 
dbonds Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 04:51 PM
Response to Reply #45
47. Could someone post a bigger code fragment
Edited on Wed Nov-10-04 04:53 PM by dbonds
That by itself doesn't tell us much. Other than there is something inside the code called DES. It doesn't even show that it was the same DES that we are thinking of. Actually I would be impressed if they even used DES. If it is the same program I downloaded the compiled version at blackboxvoter.org they just used a MS Acess database with the password of 'password'.

Edit for spelling
Printer Friendly | Permalink |  | Top
 
htuttle Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 04:52 PM
Response to Reply #47
49. No, we shouldn't
They came down on people who'd posted parts of the code (elsewhere) under the DMCA.

Unfortunately, all I can say is 'trust me'.
Printer Friendly | Permalink |  | Top
 
dbonds Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 05:06 PM
Response to Reply #49
51. I understand about DMCA
But as a software engineer with 20 years programming, 15 of them in c++, it doesn't really make sense as is. I have also programmed DES functions before. It is a double encrypting code where you re-encrypt the encrypted data to get the original. It needs two keys. One is usually internal to the system and one external. While I don't imagine the security they put in is much, this is just not a smoking gun without the rest of the context.
I want as much as anyone to find the holes, and if you are looking at the code and this is it great, but it is not proof.
Printer Friendly | Permalink |  | Top
 
htuttle Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 05:29 PM
Response to Reply #51
57. I found this document that might help
http://www.cs.rice.edu/~dwallach/talks/e-voting-risks.pdf

It has larger sections of the very code in question. Ultimately, the DESKEY string is fed to an API function named DesCBCEncrypt as the passkey.

Here's another document (might be the same, but different title) that also mentions this section of the code:
http://www.cs.utsa.edu/~shxu/CS6973-Fall2004/take-home-exam-1.pdf
Printer Friendly | Permalink |  | Top
 
dbonds Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 05:44 PM
Response to Reply #57
61. That helps
If the DesCBCEncrypt function does what it seems like then that is the "The Key". I would love to see inside that function. Am I right in understanding they store each vote as a record on the memory cards, why would they do that? To me the option that jumps out is to trellis encode an aggregate value based on a trellis that was generated from a random key. The program itself would not need to know it for any reason and you can tell if and when the data was changed.
Printer Friendly | Permalink |  | Top
 
htuttle Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 05:47 PM
Response to Reply #61
62. Yes, even a simple aggregate checksum would be an obvious step
But if memory serves, they did not take it.
Printer Friendly | Permalink |  | Top
 
artv28 Donating Member (104 posts) Send PM | Profile | Ignore Wed Nov-10-04 07:50 PM
Response to Reply #57
95. central tabulating machines
Another important issue is network security. How easy is it to access these PC's remotely? It's still not clear to me if someone needs physical access to the machine or if hackers can alter the results remotely.
Printer Friendly | Permalink |  | Top
 
dbonds Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 08:02 PM
Response to Reply #95
97. Yes, that is still true
I think these particular machines used memory cards that were physically taken to the central machine. I don't know if there was a modem hook up. The point of altering the results would have to be when the memory cards were in transit.

This is my assumption of how it works from what I have seen, others may know more specifically.

But even if they were not altered in transit, then still room for manipulations on the central tally machine.
Printer Friendly | Permalink |  | Top
 
riverwalker Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 04:34 PM
Response to Reply #23
30. tech people: what does it mean?
I'm so computer illiterate I can't even post a picture. What does this all mean? Please explain for a nice grandma. ;)
Printer Friendly | Permalink |  | Top
 
htuttle Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 04:36 PM
Response to Reply #30
31. It means that all the voting machines used the same password
And that password was available not only on the internet, but was extractable from any installation of the software (since static strings like this one are extractable from executables, anyone could have dug it out, even without the source code).

Printer Friendly | Permalink |  | Top
 
Flubadubya Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 04:43 PM
Response to Reply #30
43. You've proved the old adage right, nice grandma...
Ya get more flies with honey than vinegar. :)
Printer Friendly | Permalink |  | Top
 
jsascj Donating Member (425 posts) Send PM | Profile | Ignore Wed Nov-10-04 07:56 PM
Response to Reply #30
96. I know how you feel...
I'm lost too. It's like a foreign language to me.
Printer Friendly | Permalink |  | Top
 
htuttle Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 04:34 PM
Response to Original message
28. I hope we already knew this
I,...um..., 'found' a copy of that way back when if 'found' it's way onto the internet. I posted what I'd found myself about that DESKEY macro, and many noted that they found it as well.

There were a number of other SERIOUS flaws in the code, but this one was one of the real doozies.

Printer Friendly | Permalink |  | Top
 
tex-wyo-dem Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 04:37 PM
Response to Original message
32. One of the most alarming things is that...
it doesn't appear that anyone in the government oversees or reviews the hardware or software of these systems once they are developed by Diebold or others. In fact, one would hope that when the government subcontracts a company to develop a machine to do something as important as decide our national elections, the government would provide the company with very specific requirements on the design and security of the entire system. So far it appears that the fed just gave Diebold a check as said "go at it."
Printer Friendly | Permalink |  | Top
 
txindy Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 07:22 PM
Response to Reply #32
85. Kind of like the check they gave that other company.
Halli-something. ;)
Printer Friendly | Permalink |  | Top
 
da_chimperor Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 04:39 PM
Response to Original message
37. Fuck me . . . how is this possible?
It seems like diebold wanted their voting machines to be broken into. I wonder why? :eyes:
Printer Friendly | Permalink |  | Top
 
ElementaryPenguin Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 04:51 PM
Response to Original message
48. Yikes! THIS EXPLAINS IT!
Especially for those who can't buy the scale of this fraud!

:wow:
Printer Friendly | Permalink |  | Top
 
GuardingVirginia Donating Member (80 posts) Send PM | Profile | Ignore Wed Nov-10-04 05:18 PM
Response to Original message
53. Diebold in court in Kallyfornia
Associated Press is reporting that (11/10/2004)
Diebold will pay California $2.6 Million to settle a suit related to its Voting Machines
California Attorney General Bill Lockyer joined a suit charging that Diebold sold the state inferior hardware and software that left the vote-count susceptible to hackers and software bugs.
Printer Friendly | Permalink |  | Top
 
nolabels Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 05:26 PM
Response to Reply #53
55. Main stream corporate media seems to want to draw and quarter the man
I have seen an in ordinate amount of front page smears on the guy as of late
Printer Friendly | Permalink |  | Top
 
ParanoidPat Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 07:25 PM
Response to Reply #55
86. Secretary of State Kevin Shelley was also accused of wrongdoing.......
.......on the flimsiest of evidence after taking Bev's warning seriously and de-certifying the Diebold TSx machines and placing the AccuVote TS on conditional certification here. Here's a link to Key Documents On Electronic Voting Systems in California from the Secretary of State's web site for more background.

Governor Gropenator then froze 17.5 million dollars in HAVA funding meant for poll worker training and poll security based on the current investigation of Shelley's 'alleged' wrongdoing.

Bev, Andy and several other BBV activists met with California Voting Systems Panel officials and a representative of the AG's office to demonstrate the GEMS 'hack' developed by Dr. Hugh Thompson. After that meeting, Lockyer decided to join Bev's suit. That explains what you're seeing. :(

The good news is that a portion of that settlement will go toward funding Black Box Voting.org and "we the people" of California get our tax money back. :)

Thanks once again Bev, Andy, Jim March, and everyone else who helped make that happen. :toast:
Printer Friendly | Permalink |  | Top
 
Curtis Donating Member (125 posts) Send PM | Profile | Ignore Wed Nov-10-04 05:34 PM
Response to Original message
59. Why didn't
someone use this and cheat the other way in the election? We knew they were going to hack it. Why didn't we? If I was a computer guru . . . ;-) :evilgrin:

I know, I know. High road and all, but I am still furious it looks like Bush is going to sit in the White House for another (at least) four years. I've donated and sent emails and such, but it doesn't take away the anger. :mad: :mad:
Printer Friendly | Permalink |  | Top
 
raipoli Donating Member (45 posts) Send PM | Profile | Ignore Wed Nov-10-04 05:43 PM
Response to Original message
60. $100,000 Reward for Vote Fraud Evidence
Justice Through Music, www.jtmp.org, has posted a $100,000 reward for evidence proving vote fraud in this election. JTM is looking for inside info, and is well aware of the things on this site. See website for details. JTM wants to increase the reward to provide the highest possible incentive to whistleblow. JTM has put a message on the Diebold company message board. Info goes to reward@jtmp.org, donations toward the reward can be made on the site. Today JTM was with Bev Harris and Ralph Nader discussing strategy. questions at questions@jtmp.org.
Printer Friendly | Permalink |  | Top
 
TexasChick Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 05:50 PM
Response to Reply #60
63. raipoli, this is great news! Maybe we are finally getting somewhere with
all of this. Maybe we Dems aren't crazy after all!
Printer Friendly | Permalink |  | Top
 
leftchick Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 06:05 PM
Response to Reply #60
70. that is a great idea!
thanks for posting and welcome :)
Printer Friendly | Permalink |  | Top
 
mcg Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 06:21 PM
Response to Reply #60
74. I'll post this as a new thread
Printer Friendly | Permalink |  | Top
 
txindy Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 07:26 PM
Response to Reply #60
87. Now that's a truly excellent idea!
Hopefully, someone will blow the whistle before one of his 'colleagues' does. Play them off each other. This terrible economy, plus all of the outsourcing, makes for a powerful incentive. Better than driving a truck in Iraq, that's for sure.
Printer Friendly | Permalink |  | Top
 
jsascj Donating Member (425 posts) Send PM | Profile | Ignore Wed Nov-10-04 08:16 PM
Response to Reply #60
98. Send that message to
George Soros and let him pony up $1,000,000. Maybe that will really bring them out
Printer Friendly | Permalink |  | Top
 
Name removed Donating Member (0 posts) Send PM | Profile | Ignore Wed Nov-10-04 05:54 PM
Response to Original message
64. Deleted message
Message removed by moderator. Click here to review the message board rules.
 
TexasChick Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 05:56 PM
Response to Reply #64
65. Thanks, Freeptard! Little nervous about your Chimp being exposed as
a cheater! Afraid that mandate is all rubbish?
Printer Friendly | Permalink |  | Top
 
Name removed Donating Member (0 posts) Send PM | Profile | Ignore Wed Nov-10-04 06:00 PM
Response to Reply #65
66. Deleted message
Message removed by moderator. Click here to review the message board rules.
 
dbonds Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 06:03 PM
Response to Reply #66
68. Then just sit back and laugh
And we will do our best to save the world.
Printer Friendly | Permalink |  | Top
 
TexasChick Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 06:03 PM
Response to Reply #66
69. Really? Well, your precious Chimp is as about as ugly as a patch of
hemoroids up a bear's ass! And as about as intelligent as a rock! We go to www.dubyaspeak.com just to have hours and hours of entertainment!
Printer Friendly | Permalink |  | Top
 
Name removed Donating Member (0 posts) Send PM | Profile | Ignore Wed Nov-10-04 06:03 PM
Response to Reply #65
67. Deleted message
Message removed by moderator. Click here to review the message board rules.
 
bleever Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 06:06 PM
Response to Reply #67
71. Thanks for the picture of Repub. civility and polity. n/t
Printer Friendly | Permalink |  | Top
 
jsascj Donating Member (425 posts) Send PM | Profile | Ignore Wed Nov-10-04 08:21 PM
Response to Reply #67
99. Name removed doesn't have much to say, does he?
Printer Friendly | Permalink |  | Top
 
mcg Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 06:23 PM
Response to Original message
76. These guys make ATMs, they can't say they didn't know any better.
Printer Friendly | Permalink |  | Top
 
txindy Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 07:32 PM
Response to Reply #76
90. True, and if their culpability in this security issue is exposed
It becomes possible for other companies to market their own ATM machines because very few banks will want those produced by Diebold, anymore. Every time one of the Diebold machines has even the slightest glitch, everyone familiar with this issue will freak. The last thing banks want is a panic. So, there's a chance that whoever else makes ATM machines stands to benefit from Diebold's 'mistake'.
Printer Friendly | Permalink |  | Top
 
jsascj Donating Member (425 posts) Send PM | Profile | Ignore Wed Nov-10-04 07:31 PM
Response to Original message
89. What?
Edited on Wed Nov-10-04 08:23 PM by jsascj
Is he going to do with this information? He'd better get himself some bodyguards while he's at it. I wouldn't put anything past these thugs.
Printer Friendly | Permalink |  | Top
 
slackmaster Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-10-04 08:36 PM
Response to Original message
100. This reinforces my theory about the Diebold system
They wrote a mock-up using code samples; and through a process of mis-management and/or incompetence and/or deliberate attempts to make a vulnerable system, promoted it into a 1.x release of a live product.

The use of an MS Access database alone was enough proof for me. I've seen this kind of software development fiasco many times in the 20+ years I've been a computer professional.

Definitely.

Not.

Industrial.

Grade.

Software.
Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Fri May 03rd 2024, 12:36 PM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » Topic Forums » Election Reform Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC