New Release Of NSA SELinux 210
rstewart writes: "The NSA has released a new version of SELinux for public consumption. It is based on the 2.4.9 kernel and the utilities patches are known to work on Redhat 7.1. More information and the source can be found at the NSA SeLinux site." You can read the what's new for more information.
Secure Linux? (Score:3, Flamebait)
Wouldn't a... (Score:2)
Re:Wouldn't a... (Score:1)
Re:Wouldn't a... (Score:1)
dave
Re:Secure Linux? (Score:1)
Waaayy OT but... (Score:1)
Re:Secure Linux? (Score:1, Funny)
Re:Secure Linux? (Score:2)
Unfortunately, the RIAA would probably object to such a blatant act of thievery!
Dueling Penguins (Score:2)
Grsecurity (Score:4, Informative)
What would be the benefit of switching to NSA (but more complexity to admin) ?
Re:Grsecurity (Score:1)
oh yea, one of the coolest features hides processes of other users from each other. e.g. top or ps will only show your processes. It doesn't *completly* hide other users that are online though. like i said, go try it out.
Re:Grsecurity (Score:3)
# sysctl kern.ps_showallprocs=0
Re:Grsecurity (Score:2, Informative)
It doesn't actually make anything more secure.
Re:Grsecurity (Score:2)
To say that it doesn't make the system more secure is incorrect. It doesn't involve the same kind of security audits that have been carried out with other projects, so the individual components aren't any more secure. The new security mechanisms can improve matters, though, because they make it easier to implement least privilege. You should be able to give programs only the privileges they need to do their jobs, so that a single buffer overflow or trojaned binary won't leave the whole system open to attack. It's an approach that's orthogonal and complementary to code auditing.
Re:Grsecurity (Score:5, Informative)
On the other hand, the SELinux is focused on exactly this. It allows you to specify much more finely grained permissions for users and processes. This actually complements the grsecurity work. SELinux is focused on minimizing or containing the damage that can be done with a given application. This can both minimize the things that a buffer overflow can do, and minimize the evil tricks that a user might be able to get away with using installed software. For example, a user could restrict what directories netscape is allowed to read and write to. Or an admin could restrict 'top' to opening the kernel read-only so that a buffer overflow wouldn't enable root access. Or preventing even 'root' from changing important system-level libraries and binaries.
All sorts of really neat things are possible. The downside of course, as you mentioned, is more complexity to administer. But it doesn't make sense to compare Grsecurity and SELinux. They address different security shortcoming of Linux.
Re:Grsecurity (Score:2)
Grsecurity includes LIDS that does exactly this.
Re:Grsecurity (Score:2, Interesting)
What about debian? (Score:4, Funny)
or do i have to use their rpm?
nah, install from source.. (Score:2)
Re:What about debian? (Score:1)
I applaud your devotion to your intellectual integrety, which would never let such a (sarcastic) statement, with obvious informational flaws, go unnoticed!
Pat yourself on the back and put a sticker of a dancing bear on your shirt and wear it proud for the rest of the day. Until you have to go and correct Jay Leno about a Dubbyah joke.
And lastly, NSA, FBI, CIA, etc.: same octopus, different tentacles. The only reason the NSA and the CIA didn't create carnivore, is because the FBI beat them to it. If you were in the illuminati, you would know. (yes, i've left you a chance to correct me again! Just state that the Bavarian Order of the Illuminati no longer exists and that the US government is actually controlled by Zionists and Masons. Then, you can call me an idiot again. It will be fun!)
Re:What about debian? (Score:1)
Beat them to it?!? Nah, the NSA's had their own version of carnivore for years, and there's no way they're going give away one of their proprietary jewels to the clowns at the FBI. (Technically, any domestic monitoring was probably done by the British Government Communications Headquarters (GCHQ), but since they share information with the NSA, there's little difference.)
Re:What about debian? (Score:1)
Bonus feature: 100% DMCA compliant (Score:2, Interesting)
These 'Security Enhanced' versions are everywhere (Score:1)
I just got back from the book store to pick up 'Linux Journal' and it was funny how 'Linux Magazine' and LJ have almost identical Security Special Editions.
Re:These 'Security Enhanced' versions are everywhe (Score:2)
Those are two different magazines?
Re: Those are two different magazines? (Score:1)
Re:These 'Security Enhanced' versions are everywhe (Score:1, Interesting)
The NSA addons allows linux to use a diffrent permissions mechamism and to track the information needed to exist in military installations.
Finally we can get NSA/Linux (Score:2, Funny)
Search google for NSAKey if you don't know what I'm yammering about
Re:Google sez... (Score:1)
But believe whatever you like, dude. (not that you needed me to tell you that)
I was joking darnit...
It was my fault though - my original post was moded as a Troll and you obviously thought I was serious. The whole NSA/Linux was a parody of the GNU/Linux fiasco, and the NSA dosen't need any backdoors to get into a Windows box - just a copy of Code Red.
Linux mainstream? (Score:1)
Is Linux really a mainstream OS yet? I know it is for servers, but definately not for desktops. I couldn't quite tell where they were going with it, if it was geared more towards servers or desktops, since both need decent security. Could someone shed some light on this?
Re:Linux mainstream? (Score:2)
Re:Linux mainstream? Consider the options... (Score:1)
Linux is not as ubiquitous as Windows (which I doubt can be considered "trusted" in the security sense due to how it handles memory protection and device access).
However, if you look at the other operating systems which are considered B2 or B1 secure [boran.com] Linux is mainstream compared to those.
j.
Re:Linux mainstream? (Score:1)
Open Development Model (Score:2, Insightful)
Also, for those people all paranoid about all this, remember it was because of the national security issues that resulted from systems and web servers attacked by Denial of Service, hackers and the Chinese, that caused Congress and NSA to study the problem.
Dumb question (Score:5, Insightful)
Re:Dumb question (Score:1)
This comment violated the postercomment compression filter. Extra crap added!
Not all that Dumb a Question (Score:2)
Re:Dumb question (Score:2)
I've taken a quick look (very quick) and am convinced that it's exactly how I'd build a set of Linux patches if I wanted to be sure that a hidden flaw (either now or later) would be hard to detect. Basically, you have a set of "security operations" handlers which are dynamically assigned by modules. The question is, of course, when are these handlers set, and how good is the security around setting them.
I've not reviewed the second half (majority?) of their code, which is the modules themselves. We should really get a gorup together and discuss the internals of this thing. If it's really good, and we find no fault with the implementation, perhaps it should be come mainstream. However, for now I think paranoia is wise.
NSA vs. Deus Ex (Score:1)
Re:NSA vs. Deus Ex (Score:2)
I can't get the patch to work. (Score:5, Funny)
Re:I can't get the patch to work. (Score:1)
Re:I can't get the patch to work. (Score:2)
I think you meant Ken Thompson [acm.org].
Why is the NSA in this? (Score:1)
You know they used the favorite hacker OS out there and now give it out freely....funny crap coming from the very same government that locked Dimitri up for showing security flaws, the same gov that locked Kevin up without trial, the same gov run by CIA spinoffs.....fuck the NSA linux, we don't want no gov building a hacker tool.
You know they're just trying to get closer to the hacker community by giving you a free linux distro. So far it's the only way the feds found to get close to the hacker type, since force didn't do them any good.
Watch out, they're not up to any good there.
Re:Why is the NSA in this? (Score:5, Informative)
Incorrect. Read the NSA's charter [psu.edu].
Pay attention to section 1, Article 5, Section 3 et. al. The NSA also is charged with creating standards for the security of information held in DoD computers (specifically), other govt. computers (generally), and promulgating those standards for use in other systems. Here is a nice link to the NSA's computer security guidelines if you haven't seen them [ncsc.mil].
Yes, the NSA spies on people. No this isn't nice. Yes, the government of the USA does some awfully screwy things, like the DMCA. Tarring the whole government with the same brush is simple-minded.
Besides, the code is available for your perusal. If you think the uberspooks have put in a back door, get to work and find it!
Re:Why is the NSA in this? (Score:1)
Right. I'm no fan of the NSA, but my guess is that this is all on the level. If they were to put Evil Nasty Code into it, someone would find it, and that would be a major PR gaffe.
Re:Why is the NSA in this? (Score:1, Funny)
Ahh, but that media frenzy would be enough of a distraction to cover up the secret launches of the newest mind control satellites. Watch out boys, these ones can go right through tinfoil...
Re:Why is the NSA in this? (Score:2, Insightful)
Why do some many people see the NSA as evil? Yes, the NSA listens to overseas communications. That just might avoid a war, or reduce the scope of one.
For all you US citizens out there, and citizens of our allies, they are the good guys! When an article comes up mentioning the Air Force, people generally don't dwell on thoughts like "yes the Air Force shoots down enemy fighters, no this isn't nice."
Re:Why is the NSA in this? (Score:2)
Forgive us for having a healthy skepticism about the government. Most Americans probably wouldn't mind if the NSA only worked to listen to overseas communications. However, through Echelon, the NSA and its friends have the power to listen to our conversations as well, which we reguard is a violation of our privacy.
When an article comes up mentioning the Air Force, people generally don't dwell on thoughts like "yes the Air Force shoots down enemy fighters, no this isn't nice."
Also, just because my government does something (even to foreigners) does not mean I have to like it. Being part of a democracy means evaluating your government's policies, domestic and foreign. That doesn't mean being super-negative and unwilling to admit that the government ever makes good decisions, but it doesn't mean you sheepishly go along with all the government's decisions either. What kind of patriot are you if, when you see the government doing something overseas you feel is unwise, wrong, or possibly both, you don't speak up? The many men and women who have died serving our country--including those in the Air Force--didn't die so you and I could mindlessly go along with whomever happens to be in power at the moment.
Re:Why is the NSA in this? (Score:1)
The truth (Score:1)
BSD? (Score:2, Insightful)
Re:BSD? (Score:1)
openbsd (Score:1)
Re:BSD? (Score:3, Informative)
Re:BSD? (Score:1)
For what it's worth, LOMAC is an example of a project currently underway andbeing developed for Linux and FreeBSD both, so it is not only Linux that is getting security projecs funded for it (^_^)
Disclaimer: I am an employee of NAI Labs, not that it makes this information less relevant.
Legal Notice from their Download page (Score:1)
Warranty Exclusion
I expressly understand and agree that this software is a non-commercially developed program that may contain "bugs" (as that term is used in the industry) and that it may not function as intended. The software is licensed "as is". NSA makes no, and hereby expressly disclaims all, warranties, express, implied, statutory, or otherwise with respect to the software, including noninfringement and the implied warranties of merchantability and fitness for a particular purpose.
Limitation of Liability
In no event will NSA be liable for any damages, including loss of data, lost profits, cost of cover, or other special, incidental, consequential, direct or indirect damages arising from the software or the use thereof, however caused and on any theory of liability. This limitation will apply even if NSA has been advised of the possibility of such damage. I acknowledge that this is a reasonable allocation of risk.
hmmm. "bugs", clear this up will ya? Software glitches or electronic listening devices? Plus, they use "may contain"...Are they giving it permission? My software isn't allowed to have bugs. If it does, it is an error! "it may not function as intended" hmm you mean...like...the 'security' part? "In no event will NSA be liable for any damages, including...or other special, incidental, conseqential...damages...arising from the software"
special: backdoors we forgot about that we find later
incidental: backdoors we internally documented
direct: What we break/steal from you
indirect: What l33t hax0rs break/steal from you after our direct methods post on Bugtraq.
and finally...."This limitation will apply even if NSA has been advised of the possibility of such damage" if we 'accidentally' left our public ssh identity in
Re:Legal Notice from their Download page (Score:1)
Those disclaimers are the exact same disclaimers, almost word for word, that you will find on MANY MANY pieces of software (especially Open Source types). Just because the big, scary government likes to cover their butts the same as everyone else, that doesn't mean that they're out to spy on your computer. You flatter yourself to think that the NSA even cares about the half-naked Brittney Spears pictures you are downloading. They don't. The source code that is being patched into your kernel is right there in front of you. If you have concerns about it, read it. I'm sure that many people will, just to make sure there are no back doors. If you find a back door, fix it. They can't patch something into your kernel without your interaction. Now go back to playing your video games, and let the educated people see if they can do something useful with this patch.
P.S. I only speak in condescending tones to those who sound like children.
Re:Legal Notice from their Download page (Score:1)
You do realize that there is some [slashdot.org] evidence [slashdot.org] of [slashdot.org] a [slashdot.org] precedent [slashdot.org] for [slashdot.org] that sort of thing.
I agree that it is silly to suggest that the boilerplate disclaimer is evidence of a secret NSA plot. But your suggestion -- that an intelligence agency is not interested in doing any spying -- is equally ludicrous.
Re:Legal Notice from their Download page (Score:1)
What percentage of linux users do you actually think can come close to actually security auditing code? If Linus renamed linux.h to backdoor.h (and no actual changes in the code), how many people would actually find it on their own?
But, the main point still goes over to motive. *WHY* would a government agency, who primary concern is nation al security (supposedly only outside of American soil), mess with a 'grass roots' OS, modify its kernel, then *RELEASE* it to the public? Use a strlen incorrectly and it's a bug. The shit happens all the time. Suppose for an instant, that someone wanted to allow this bug, since it could be used to gain unauthorized access. OpenBSD patches shit things "that could *never* be exploited!!!", but somehow, in a few years, comes back and bites everyone *else* in the ass. And OpenBSD still gets bit in the ass, just not as often as everyone else. You wouldn't need to include 'backdoor.h' to do something like that. Just use a buffer of size n-1 where it actually needs one of size n. Make it reference through about 20 libraries and function calls (laundry it) and make it only occur after certian other specific events. Nevertheless, if mr. nobody makes something like this and puts it on freshmeat, your risk of discovering the application, installing the application, and he finding you and exploiting said bug would be much smaller than a branch of the US government concerned with national security.
I see no valid reason to trust the NSA, FBI, CIA, etc. without *extreme* caution and scrutiny. Besides, they have no valid reason to trust us, without *extreme* caution and scrutiny.
Re:Legal Notice from their Download page (Score:1)
Re:Legal Notice from their Download page (Score:1)
both want to spy on us.
who has more resources?
Yes, you might say that the NSA can't legally operate on American soil or on it's citizens (on natural soil).
Then I just mention a thing called the '60s - '70s and the CIA. Just ask JFK, MLK, and RFK. heh Of course you could say that many of these 'one person' applications are actually run by a cadre of devious hax0rs to infiltrate my box! But, still...I doubt they would still compare to the mass of the NSA
Just a question... (Score:5, Insightful)
Do other agencies just follow along with the guidelines the NSA sets forth, try to get independent advice or go it alone? Financially, at least, it would seem like going with the NSA's guidelines would be the way, since the information is more or less public (at least it is in these two instances) and there wouldn't be any time or money spent on third-party tripe (bids, negotiations, etc) or independent research.
Re:Just a question... (Score:3, Informative)
The Information Assurance mission provides the solutions, products and services, and conducts defensive information operations, to achieve information assurance for information infrastructures critical to U.S. national security interests.
The foreign signals intelligence or SIGINT mission allows for an effective, unified organization and control of all the foreign signals collection and processing activities of the United States. NSA is authorized to produce SIGINT in accordance with objectives, requirements and priorities established by the Director of Central Intelligence with the advice of the National Foreign Intelligence Board.
Re:Just a question... (Score:2)
Sorry. That would be the CIA.
Re:Just a question... (Score:1)
What FooGoo said.
There are two competing standards for security on government computer systems: DIA (Defense Intelligence Agency) and NSA's, depending on where you are and whose money you're getting, you conform to one or both standards. You'd be surpsied at what a HUGE pain in the ass this can be to do, especially when the standard changes from month to month and which standard inspectors decide to go by.
This is the government, nothing is ever simple if we can find a way to make it complex.
Re:Just a question... (Score:1)
--sam
Cha! And monkeys might fly out my ... (Score:1)
if $LOGNAME==`NSA_Agent` then
echo `crackyou.nsa.gov ispy` >>
useradd ispy -G wheel -d
From the FAQ (Score:2)
feeling insecure with the NSA's security (Score:1)
You're welcome. (Score:1, Offtopic)
Do you think any OS would be secure ? (Score:1, Interesting)
http://www.acm.org/classics/sep95
(Reflections on Trusting Trust - Ken Thompson)
"The final step is represented in Figure 7. This simply adds a second Trojan horse to the one that already exists. The second pattern is aimed at the C compiler. The replacement code is a Stage I self-reproducing program that inserts both Trojan horses into the compiler. This requires a learning phase as in the Stage II example. First we compile the modified source with the normal C compiler to produce a bugged binary. We install this binary as the official C. We can now remove the bugs from the source of the compiler and the new binary will reinsert the bugs whenever it is compiled. Of course, the login command will remain bugged with no trace in source anywhere.
Moral
The moral is obvious. You can't trust code that you did not totally create yourself. (Especially code from companies that employ people like me.) No amount of source-level verification or scrutiny will protect you from using untrusted code. In demonstrating the possibility of this kind of attack, I picked on the C compiler. I could have picked on any program-handling program such as an assembler, a loader, or even hardware microcode. As the level of program gets lower, these bugs will be harder and harder to detect. A well installed microcode bug will be almost impossible to detect. "
A definate read !
Believe it or not, as Ken Thompson says, you will be 100% secure.
Government using GPL? (Score:1)
Re:Government using GPL? (Score:1)
Do they really have a choice? Remember, it is a modification of Linux, so it must be released under the GPL or it would be a GPL violation.
Re:Government using GPL? (Score:1)
Re:Government using GPL? (Score:1)
Re:Government using GPL? (Score:1)
Re:Government using GPL? (Score:1)
Seems fair to me. Though I'm not a US tax payer, so I suppose my opinion doesn't really count... though I suppose I pay the US Imperialist Stealth Tax in other ways....
Re:Government using GPL? (Score:1)
Re:Government using GPL? (Score:2)
Consider the White House... Everyone should get to sit in the big chair? Stealth Bomber? You want a go?
Don't think so. Just because you pay for it doesn't mean you personally or you corporately benefit from it. In this case you can use it; even modify it. Be happy. But you can't modify it and distribute it without everyone else seeing how you've hacked it. That's much fairer than the stealth bomber.
Government using MS? (Score:2)
Re:Government using GPL? (Score:1)
Let's lose the FUD, people (Score:5, Insightful)
First try and wrap your brain around this concept: The NSA has TWO distinct missions -- to spy on foreign nations on behalf of the US government, and to keep foreign nations from spying on US govt. and businesses. People tend to forget about that second part. Knowing government beaurocracy, it's not at all unlikely that the spy-on-other-folks department and the keep-other-folks-from-spying-on-us department are involved in a turf war, or are working at cross-purposes.
Second: the NSA secure linux is a patch to the standard Linux kernal. If you are paranoid about them trying to do somthing neferious, download the source and diff it against the baseline code. It's pretty hard (but not impossible) to hide a backdoor in source. Paranoid types, make sure you trust your compiler [as well as any other binary that touchs the code as it's being transformed from source to executable] If the NSA wanted to hack your box, they have a lot of better ways to do it than releasing a GPL'ed trojan. Give them some credit -- they are not that stupid.
This is a Good Thing. Having a respected government agency endorse Linux gives it huge amounts of credibility. [OK, geeks may not trust/respect the NSA, but you can be sure that CEOs and PHBs do.] Believe it or not, occasionally the US gvt does manage to Do The Right Thing, even if it's unintentional.
Re:Let's lose the FUD, people (Score:1)
However, this release certainly does not constitute an endorsement. They released it only to demonstrate certain security improvements that should be made to Linux. They admit it is still not secure in any meaningful way (read the FAQ).
I think this is a good thing. Linux undoubtedly needs better security.
Facts (Score:1)
When I say something, you want facts right ?
Now it's your time to give that facts, I've read no real fact until now.
So upon then, you are just making a fool of your self with these conspiracy theories. Gimme facts about a backdoor in the NSA distro.
Paranoia Strikes Deep (Score:3, Insightful)
I would guess for the all-out hacker geek, this NSA compile on their system, probably would cause paranoia (like some invisible eye looking back at you !! ha! ha!) But probably wouldn't have any other power you imagine it has. As for anyone else, it wouldn't hurt to at least study their implementations.
"Paranoia strikes deep
Into your life it will creep
It starts when you're always afraid
You step out of line, the man come
and take you away"
-- Stephen Stills, "For What It's Worth"
NSA only sticks to Red Hat? (Score:1)
Re:NSA only sticks to Red Hat? (Score:2)
I would think that the kernel patches & source code would be able to build on *any* distro, not just RH...or you could use alien and/or rpm2tgz.
NSA? (Score:2)
I keep asking around, and all I get is that there is "No Such Agency".
useful set of features (Score:1)
*sigh* This is what they mean by secure... (Score:1)
1) It shuts off almost all services and ports by default. Unless you specify it, it does not enable it.
2) It includes (rather clever and robust) methods for autheticating a user and his/her permissions and/or clearance levels on-the-fly in a secure manner called Flask. If you read this [nsa.gov] document, it explains it in very precise terms (if somewhat dryly).
The articles linked from the last time NSALinux was covered were better, but
NSA == Nosily Sneaking Around (Score:1)
The United States National Security Agency is a spy agency. It's purpose is to discover things that other people want to keep secret. It is the official U.S. agency for snooping. Democracy means acting openly; the NSA is, in this sense, anti-democratic.
Nevertheless, it is possible that not all people who work for the NSA believe in sneakiness. Remember that the purpose of DARPA (Defense Advanced Research Projects Administration) was to find better ways to kill people and destroy their property. However, people within Darpa intented the Internet.
NSAs work should be carefully audited. But things are not so wonderful that the Open Source Community can turn down honest contributions from any source.
NSA plays both sides (Score:1)
my favorite thing... (Score:1)
How come? (Score:2)
???
This is a usability test (Score:2)
Previous NSA secure OS projects (I worked on one, 20 years ago) concentrated on security at the expense of usability. This resulted in systems that didn't get used much. This time, they're trying to fix the usability problem first.
If mandatory security in Linux goes mainstream, this would be a major step forward. Once we see important applications like Apache modified to work under mandatory security, we'll have real progress.
Security Built In (Score:2)
Why are you people always moaning when some big company supports GNU/Linux ?
That's what *you* want, ne c'est pas ?
Nope, I could care less. I want people to be free to use their computers as they see fit. I'm not happy to see people surrender those freedoms to another big company, much less the Federal Government, using some basterdized version of a free OS. The NSA has a history of recomending weak secruity, backdoors and nice stuff like Carnivore.
You're not doing the stuff yourself, so be happy.
Backdoors are not a do it yourself job.
Re:Security Built In (Score:1)
[i]Backdoors are not a do it yourself job.[/i]
I thought that Opensource allowed you to find backdoors ? That's the whole idea right ?
And I think the NSA has much better ways to get your information, then to release some sort of backdoored Linux version, don't you think ?
Sorry, but the Windows/Mac Market is much bigger then the Linux userbase, so it's less interesting for the NSA. Get over it.
Re:Security Built In (Score:1)
Net->floppy->intermediate box->new floppy->target
Check at each step and clear the intermediate box each time to have the most protection from back doors. That is the route for the paranoid.
Re:Security Built In (Score:1)