IBM Running Linux On Secure Hardware 143
Schmad writes: "IBM announced at LinuxWorld today that IBM Research and Cryptographic Appliances have Linux running on FIPS 140 Level 4 hardware. Imagine, Linux running in a totally secure environment!
Peter Gutmann, father of the crypto toolkit cryptlib, has some things to say about it here."
Thank You IBM (Score:1)
Re:Thank You IBM (Score:1)
Although I must admit they are developing some very cool technology.
Re:Thank You IBM (Score:1)
It's a win-win situation for both the Linux community and IBM.
you're wrong. (Score:2)
Actually this is the most secure way to make money as you can still rely on what you already patented.
Allows for protection of intellectual property? (Score:1)
So this new hardware will allow for the protection of intellectual property, which in turn will allow for cesorship and government control over the internet. This doesn't sound like good news to me.
Re:Allows for protection of intellectual property? (Score:1)
Re:Allows for protection of intellectual property? (Score:2, Insightful)
Jesus H. Christ on a freakin' popsicle stick, man! I am really tired of people who immediately blow up when they hear the phrase "intellectual property". Yes, there have been some stupid patents approved by the US Patent Office. Yes, companies have been crying "protect intellectual property" whenever someone comes up with a way to view/edit/manipulate "protected" data. Does this mean that intellectual property is bad? No.
All this means is that some intellectual property laws need overhauling, and the Patent Office needs a swift kick in the ass. I bet that if you invented something that could conceivably make you a lot of money, you wouldn't want every Joe Schmoe making a cheap knock-off of it and selling it for 1/4 the price you could have charged. Someone will always lose; TANSTAAFL. Either the inventors lose, and there's no more innovation, or the consumers pay a bit more and support people who are inventing and making our world better.
I guess it finally proves (Score:1)
um, huh? (Score:1, Insightful)
uh.. just one question.. (Score:1)
they don't!
Re:uh.. just one question.. (Score:1)
Re:uh.. just one question.. (Score:1, Informative)
t00t TooT
Re:uh.. just one question.. (Score:1)
Steve
Re:uh.. just one question.. (Score:1)
But I guess that *would* be kinda impractical...
Re:uh.. just one question.. (Score:1)
The basic premise is that everything is housed on a single PCI card.
The card is "tamper sensitive" i.e. it goes into one enormous sulk if the the case is opened, it feels its electorodes being tweaked etc. etc.
As hardware this is tried and tested technoligy. What is new is that IBM are dumping there specially written, proprietory (an presumably short of applications and development tools) "CP/OS" for LINUX.
In the financial information business there is a big demand for this type of device. e.g. you are a company which has at great expense aquired data on every trade from every major stock exchange as it happens, you broadacast this compressed and encrypted via satelite to all your cutomers, but, each customer only pays for a subset of this data, easy, you program one of these cards to decompress and decrypt the data, then, filter out all the data the customer hasn't paid for.
well.. (Score:1)
totally secure environment!
Hands down linux is better than MS but totally?!? unless the box is in hell, unpluged from anything and protected by lava it aint TOTALLY secure. don't ever forget that. you'll thank me later, trust me
Aha (Score:2)
So, um, would CP/Q be the fifth version of CP/M? That would certainly explain why they found it lacking...
Re:Aha (Score:3)
So, um, would CP/Q be the fifth version of CP/M? That would certainly explain why they found it lacking...
No the fifth version of CP/M is MS-DOS 5.0.
Re:Aha (Score:1)
It's been used as an embedded OS in a number of boxes, including high-end printers.
The desire to move away from CP/Q to Linux is prompted more by "political" considerations than technical ones (e.g., broaden the toolset/developer experience base)
Secure Computing (Score:1)
No seriously, it's really neat that Linux can be used in an environment designed for maximum security. This kind of thing (despite the IP-hating people's snyde comments) is probably "the future" of e-commerce (if there is going to be any, See Also: Dot Bomb). It takes a lot of entropy to do SSL on a very active secure web server like the E-Commerce places do.
This shows that Linux can in fact deal with the things that are needed for businesses to succeede on the Internet (along with all the other things being done, clusters, apache, etc). When they are all combined, I think the result will be "kick-ass".
--MonMotha
Re:Secure Computing (Score:1)
What's COOL is that I dowloaded your IPTables firewall roughly 2 hours ago (unless there are multiple monmothas running around).
Kick ass... today is MonMotha day. Thanks!!!
Mirror (Score:1)
IBM Research has demonstrated Linux running on the IBM 4758 secure cryptographic coprocessor, a hardware security module. This is the first general purpose operating system (OS) running on a secure coprocessor. The IBM 4758 cryptographic coprocessor is an advanced, tamper-sensing and responding, programmable PCI card. Its specialized cryptographic electronics, along with a microprocessor, memory and random number generator are housed within a tamper-responding environment to provide a highly secure subsystem in which data processing and cryptography can be performed.
By running Linux, it enables much easier migration and porting of applications into the secure environment than with the current CP/Q operating system. As a key product for secure e-business, its main applications are financial-related solutions, such as electronic coupon dispensers, Internet postage meters, intellectual property protection (web subscription services), signatures for digital documents and certificate authorities.
The Linux-based IBM 4758 also offers significantly better performance, including eight times improved communication latency and four times faster throughput, over the current custom OS based product offering. In addition, Linux provides better support for new features, which are not supported by the custom OS such as running multiple potentially hostile applications on the same 4758 coprocessor card and allowing cross card communications that enables load balancing among multiple cards.
IBM Research developed the 4758 coprocessor hardware, along with its internal operating system, secure configuration and bootstrap software, and custom software development tools that can run on multiple platforms, including all IBM servers and non-IBM servers, about five years ago. By creating the Linux version, IBM hopes to provide Linux developers the opportunity to create high security applications, and to encourage such development and interest in industry. We are working on making this software package available as a free download for existing 4758 coprocessor users. Parts of the Linux port were jointly developed with Cryptographic Appliances, Sacramento, California.
The 4758 secure coprocessor was the first device ever to earn the highest possible certification for commercial security granted by the U.S. Department of Commerce's National Institute of Standards (NIST) and the Communications Security Establishment (CSE) of the Government of Canada.
For further information, visit the IBM Research Mycroft Website at
http://www.research.ibm.com/mycroft
Explain it to me: (Score:1)
What else (or something completely different) ?
Also, how does Linux fit in the picture. It is used to run the co-processor (??) or to run a box including a general-purpose processor and the co-processor?
Re:Explain it to me: (Score:1)
Re:Explain it to me: (Score:1)
Re:Mirror- build your own (Score:3, Informative)
It's funny, they spend billions to make a "secure" hardware platform while you only have to spend a few million and common knowlege to make a generic platform secure. -- Put the PC where no-one can get to it, inside a faraday cage, and shoot anyone that comes near it.
pretty darn simple to get a secure computer.
No such thing (Score:1)
There's a famous quote about the only secure computer being turned off, buried in concrete, protected by nerve gas and armed guards, and still not quite secure enough...
Re:how to make your own secure box (Score:1)
lmao (Score:1)
Unfortunatly this is our dreaded future... (Score:1)
bleah..
Re:Unfortunatly this is our dreaded future... (Score:2)
Depends on the firmware, doesn't it?
I'd like to see hardware like this with field-programmable parts. Stick in a CD-ROM and a blank hard drive and boot.
I'd like to see it commoditized. You buy this box just like you'd buy a PC and an unformatted hard drive. The CD-ROM installs the OS and sets up everything through a series of dialogs.
I'd like to see such a box in every hax0r'z closet, effectively acting as a router with a big-ass cache, and hooked up by wire to another router, the other end of that router hooked up to a wireless link.
I'd like to see Freenet scale.
Secure Environment (Score:4, Funny)
Does it shut down?
Send a pack of dogs with bees in their mouths for you?
High amperage electrical shock?
Immediately, and permanently bond itself to the intruding device/intruder?
Explode a packet of purple paint?
So while that sounds good and all, it still is a PCI card. Is this a "Linux as an OS" product or a "Linux Embedded" product?
Re:Secure Environment (Score:3, Informative)
This level of paranoia is appropriate for organizations for whom Crypto is Life (think CAs, credit card companies, banks, big e-commerce houses, etc.)
Re:Secure Environment (Score:1)
The MPAA... The RIAA... Adobe...
Re:Secure Environment (Score:1)
Re:Secure Environment (Score:2, Informative)
I like the Superman III scenario personally. For some reason that scared the crud out of me when I saw it in the theater. I was about 7 then. Didn't look at my C64 for a week
Re:Secure Environment (Score:1)
The Simpsons (Score:1)
Also quoted here (Homer actually shouts the line, or at least says it frantically, so the CAPS are not out of order..):
"ARE YOU GOING TO SEND THE DOGS, OR THE BEES, OR THE DOGS WITH BEES IN THEIR MOUTHS, SO WHEN THEY BARK THEY SHOOT BEES?" -Homer Simpson
Regards,
Stephen
Re:Secure Environment (Score:1)
Bart: I want to stay here with Mr. Burns.
Burns: I suggest you leave immediately.
Homer: Or what? You'll release the dogs, or the bees, or the dogs with bees in their mouths and when they bark they shoot bees at you? Well, go ahead -- do your worst! [Burns slams the door and locks it] [disbelieving] He locked the door! I'll show him -- [rings the doorbell and runs away]
Episode 1F16 -- Burns' Heir [snpp.com]
Re:Secure Environment (Score:1)
Re:Secure Environment (Score:1)
According to quantum Linux theory, it's both.
Re:Secure Environment (Score:1)
Only until you pry the cover off this card and look, but then it zeros out it's RAM, so I guess you'll never know...
You mean? (Score:2)
You mean that Linux runs on a powered-off PC cast in concrete? (That's the only totally secore environment I know)
Re:You mean? (Score:1)
Yes, this is the open-source answer to Microsoft's Windows CE-ME-NT [geocities.com]
Re:You mean? (Score:1)
Linux (Score:1)
Redneck secure mobile linux (Score:2)
I'm sure (Score:1)
I'm sure it comes complete with the HIV virus.
Re:This begs the question: (Score:2)
So, since you're all so quick to bitch at people for the slightest possibility of a so-called GPL violation, will you also bitch at IBM if the entire software kit is not freely available to *ANYONE* who wishes to look at the source?
GPL does NOT require to you give it to ANYONE. You only have to give it to customers that ask for the source, but then you CAN NOT RESTRICT how those customers use or distribute it.
embedded Linux (Score:1)
Check out http://www.networkrobots.com/ [networkrobots.com] for a functionally similar development on the router side of things.
Hopefully this will continue to happen, but the production run of this IBM thing is not large enough to justify a slashdot piece on this. (no offense intended) If the linux-router-thing (above) takes off, that would be big.
Looking forward (Score:1)
How long will it remain secure?
I think the best thing would be if part of the Linux kernel is embedded in the crypt-hardware. (Don't panic, you can flash for a new kernel image.)
Anyway, I think that would be a lot more secure.
Please correct me if I'm wrong here!
I sure hope... (Score:2)
Jokes aside, secure hardware is useless when combined with insecure software -- and so far it seems that the software part has been a much bigger problem.
Air gap is the best security (Score:1)
Ok...no network, no keyboard, no floppy, no CD-ROM, and locked up in a sealed room. Totally secure!
I think some of you are missing the point (Score:1, Insightful)
More importantly, being able to run something like SE Linux inside of a piece of tamper responsive hardware that has isolation mechanisms offers the ability to securely run software in places where it can't be physically assured. Even for things like data center applications, the possibilites are broad.
Cryptography != security (Score:1)
A processor like this just provides yet another way to do "reliable" digital signatures. Such signatures are getting increasing legal status. The real security threat is the fact that it's not really the user that is doing the signature, i.e. the RSA calculations, it's the device. Regardless of how secure the device is, if a trojan horse fools the user into giving his PIN to the device, the trojan can then make a legally binding "digital signature" using a "totally secure device". On any document of the trojan's choosing.
If you thought identity theft was bad, think again.
Re:Cryptography != security (Score:1)
Ever so slightly off topic.
Every time someone metions "digital signitures" I want to scream "digital seals".
They bear much more similarity to the medieval "royal seal" than an actual signiture. Like the "prince and the pauper" story by Mark Twian where the evil baron steals the royal seal so he can make his own laws.
Also, the signiture is a very hazy legal device having become accepted over hundreds of years of common law. Depending on the type od contract it is usually only one of many "indications of intent" a signature alone, unwitnessed, is not legally binding on anyone.
Re:Cryptography != security (Score:2)
Is this thing REALY secure? (Score:2)
Now, I can run a secure version of Linux behind a decent firewall and keep my secret key on that, but what stops the feds from breaking into my house whilst I am at work a sniffing it straight off the hard drive. I could perhaps keep the key on a PDA or some sort of dongle and lug it around with me, but I could always be "mugged".
Bottom line. Is this IBM doo-hickey tamper resistant against the average thief or can it keep the feds at bay? As the DMCA (and forthcoming EUCD) makes more and more of us into potential felons this sort of issue is becoming increasingly relevant.
BTW, how much do they cost?
Re:Is this thing REALY secure? (Score:1)
Re:Is this thing REALY secure? (Score:1)
Re:Is this thing REALY secure? (Score:1)
Probably not, but it's as close as you're going to be able to get.
BTW, how much do they cost?
The CP/Q-based version is about USD 2K. I don't think the Linux-based version is for sale yet.
Re:Is this thing REALY secure? (Score:3, Interesting)
The encryption algorithms are secure. You can find more then a few solid encryption schemes available on the net if you look. Others that I trust say the mathmatics behind them are sound, and that by today's standards, breaking them would be difficult, if not impossible, even with the resources the feds have.
So, if you never keep your key on the hard drive, and instead only keep it in ram, having to manually retype it every time you want something, there is no possibility of anyone rebooting and having easy access to your encrypted data (if you disclude the possibility of unencrypted stuff showing up in swap, and with memory prices the way they are, I'd just throw a gig of ram at the problem and turn swap off.) If I had such a setup (and I don't, I'm a windows luser that is content with E4M), that actual encryption scheme and the way it was carried out would be secure to my heart's content.
Now, if this data is very important to you, I would only decrypt it when nessessary. That way, if the feds come, the chance of you having the data accessable is small. If you need to remotely access the data and it has to be up all the time, then you are in more trouble. However, it seems that when the feds do seize your equipment, they remove it, with removal, the power is turned off, and the memory is thus cleared. If you are really paranoid, just setup something in the door that as soon as its opened, it resets the power of the computer. Actually, it would be trivial for a skilled person to setup a nice motion sensor hooked up to the computer that can be remotely turned on/off, and if turned on, would reset the computer if it detects motion.
Just my $.02
Re:Is this thing REALY secure? (Score:1)
One nit, and one stupidity.... (Score:2)
This rather defeats the whole purpose: if you allow a "hostile app" (read: an application you don't control, don't have the source for, and don't trust implicitly (e.g. Windows)) to run on this card, you have just thrown the security of the card out the window. The whole idea is that the crypto functions take place in a secure environment where everything can be trusted. If you want to run Realplayer or something, run it on the host CPU, not the card!
Second, the nit. I work with secure comms products, and the term "zeroize" has always grated on my ears: You zero the keys, you randomize the keys, but you don't "zeroize" them. This is a typical case of the government type making up a word because it makes him sound more important. Yes, I know full well that "zeroize" is the accepted term in secure comms, but it still sounds stupid!
a possible movie? (Score:1)
We use these at work (Score:2, Informative)
The difficult thing about programming these boards is all the states they go through in the lifecycle of getting code securely loaded. There are a million different utility scripts to change the state of code trust.
I'm curious to see how linux handles all this secure code loading stuff. Let's hope it's easier.
(Not that I'm disparaging these boards. What they do is really amazing, as far as they can assure you that your secrets inside will never get out and the code that you have running there is your code.)
Re:We use these at work (Score:1)
I'm curious to see how linux handles all this secure code loading stuff. Let's hope it's easier.
It probably won't be. The segment 0 and segment 1 code (which dictate the lifecycle) presumably won't change much...
Re:We use these at work (Score:2, Informative)
Here is my understanding of the situation. The internals of the 4758 are wrapped in paper that has a grid of conduting ink inside it. If any change in the conductivity of the ink is detected the 4758 is zeroed. So if someone manages to stick a logic probe thorugh the epoxy that seals the box, piercing the paper will zero the memory.
The supplier of this wrapper intially used ink that was past the expiration date. It degraded after manufacture and the boards detected this as an intrusion attempt. This has been fixed now.
Shipping the boards is also a pain. I think they are made in Italy and the changes that occur in temperature and pressure while they are in transit used to cause them to zero.
Pictures of the little beastie (Score:1)
What FIPS-140-1 Level 4 buys you (Score:2)
So if your IBM 4578 gets stolen, recovering the data there in will be that much more difficult.
GPL and charging for software (Score:1)
Re:GPL and charging for software (Score:1)
That's even a FAQ: See http://www.fsf.org/licenses/gpl-faq.html#DoesTheG
Re:GPL and charging for software (Score:1)
There is nothing in the GPL that says I have to give away source to anyone that asks...its just that this is how most people have chosen to do it.
I can charge you a million bucks for my program, but at that point you can then turn around and stick the source up on the internet. There's no guarantee that anyone else will pay for it because they can get it from your site, but there is nothing wrong with me charging a million bucks for them to get the program from *me*, as long as I make the source available to them.
Re:GPL and charging for software (Score:1)
But if you give the source code with every binary you give out, then you aren't forced to give anything to anyone
But for the rest, you made the point.
Re:They should of used Freebsd since its the futur (Score:1)
Please do refrain from such ill informed posts ok?
At Slashdot we have a reputation to keep.
Even anonymity cant save you from our collective wrath. And if you care to
That will take care of ur ignorance.
The sky is falling, the sky is falling! (Score:1)
There was no such thing as OpenSource in 1994. The term wasn't coined until 1998.
The main three *BSDs (FreeBSD, OpenBSD, NetBSD) all use at least 85% of 4.4BSD-Lite's source code,
And the concept of getting it right the first time eludes yuo? New does not always mean better.
FreeBSD's C2 security certification is horrible.
Neither FreeBSD or NT has a C2 security classification. The classification is granted not to software but to a specific hardware and software combination. NT's is on a couple Pentium class Compaqs running a particular release of NT 3.51 that aren't connected to a network. Real relevant.
NetBSD, I'm afraid, is dead before it got off the ground.
It's not just admirable, it's useful. The other BSD projects can feed off the work the NetBSD team does. Bugs show up when software is ported to other architectures.
OpenBSD's filesystem is extremely slow, ... No real help is given to new users and such an elitest attitude is suicide.
The OpenBSD team don't tolorate stupid people (which I can perfectly understand) and this comment signifies yuo as one. From the OpenBSD FAQ (strangely hidden in the section on performance tuning):
Question: "I simply do "mount -u -o async /" which makes one package I use (which insists on touching a few hundred things from time to time) usable. Why is async mounting frowned upon and not on by default (as it is in some other unixen) ? Surely it is much simpler and therefore a safer way of improving performance in some applications ?"
Answer: "Async mounts is indeed faster then sync mounts, but they are also less safe. What happens in case of a power failure? Or a hardware problem? The quest for speed should not sacrifice the reliability and the stability of the system. Check the manpage for mount(8)."
Yuo have obviously made no attempt to find out why it was so slow or posted a question plainly explained in the FAQ and got flamed for it. Yuo are the one at fault here. Not the OpenBSD community. I personally quite like Theo's attitude. He's a total pain in the arse but it's all in the name of security.
Maybe yuo should stick to yuor NT point and drool interface and get cracking on updating yuor MSCE to W2k.
Somebody please slap me for feeding the trolls.
Re:The sky is falling, the sky is falling! (Score:1)
NT is C2 certified. Read the report below:
http://www.radium.ncsc.mil/tpep/library/fers/TT
Re:Erste Poste (Score:1)