A trojan for Skype
A recent report about a Skype trojan that could extract voice calls as mp3 files and ship them off to other locations led to an interesting discussion on the Fedora users mailing list. The trojan itself is somewhat unsurprising as there have been persistent rumors about wiretapping back doors in Skype for some time. The trojan is Windows-only, but it does come with most of the source code, which makes it interesting to those who study malware. While not a direct threat to Linux users, it does highlight a number of privacy and security issues to ponder.
Skype is a popular voice over IP (VoIP) application that runs on Linux, Mac OS X, and Windows. Part of its appeal is that there are many users of the free (as in beer) software, so folks can make free phone calls to many of their friends and family. But it is a closed source tool that resists attempts to reverse-engineer its protocol, so there are no interoperable free (as in freedom) equivalents.
Daniel B. Thurman brought up the trojan and wondered if it was an example of the back doors or interception facilities that governments have long been rumored to be pushing for Skype. That set off a thread in which "black helicopters" made a tongue-in-cheek appearance, but there were also more serious postings. Marko Vojinovic asks about whether there are ongoing attempts to reverse-engineer the Skype protocol:
There are a number of problems with that, as was pointed out, including
the likelihood that Skype would change the protocol to cripple
interoperability, much as instant messaging companies have done along the
way. Roberto Ragusa noted that there have
been people who looked at Skype, but they "found that it contains
tons and tons of cryptography, obfuscation and countermeasures against
debugging or reverse engineering.
" That is of concern he said
because one cannot be sure of exactly what it's doing: "A closed
source code like that and with an explicit purpose to build a crypted P2P
network bypassing firewalls with every trick possible is something to be
nervous about.
"
Alan Cox had some additional thoughts
on reverse-engineering the code: "The person who completely reverse
engineers skype probably destroys it. If you can write a skype client [then]
the spammers can write skype spam tools as well.
" He also mentions
the "mostly circumstantial
" evidence that law enforcement has
added intercept facilities to Skype itself. Furthermore, anyone who might
be working on the problem has good reason to do it quietly, he said:
So, we have a closed source application, which uses malware-like techniques to obfuscate its functioning, and folks willingly run it on their computers. In some ways, that's no different than any other closed source application, but there are a few differences. Skype, by its very nature, must use the network to send encrypted data to multiple untrusted machines elsewhere. While it may not be compromised by governmental authorities in the standard binary, it is a known target of those entities, and this trojan demonstrates a way that it might be compromised. Overall, it would seem there are a few risks to both security and privacy from that kind of application—more so than a closed source word processor or non-networked game.
Free software solutions, like Ekiga, may be able to overcome some of the shortcomings of Skype. But, if those solutions become popular, they are likely to run afoul of the spammers and scammers that Cox warns about. It's likely to be true of regular and cellular phone service as well, but a warning from "Tim" in the thread is worth repeating:
While Skype provides a nice service—without charge in many cases—it does present a bit of a privacy headache. If it can be subverted for wiretapping purposes, it can undoubtedly be subverted for other reasons. Some of those could present security headaches as well. Since we don't really know what the Skype code does when it isn't infected, it will be difficult to determine if its behavior changes in a malicious way. That should be a little worrisome.
| Index entries for this article | |
|---|---|
| Security | Internet/Voice over IP (VoIP) |
