Keeping Up With DoD Security Requirements In Linux? 211
ers81239 writes "I've recently become a Linux administrator within the Department of Defense. I am surprised to find out that the DoD actually publishes extensive guidance on minimum software versions. I guess that isn't so surprising, but the version numbers are. Kernel 2.6.30, ntp 4.2.4p7-RC2, OpenSSL 9.8k and the openssh to match, etc. The surprising part is that these are very fresh versions which are not included in many distributions. We use SUSE Enterprise quite a bit, but even openSUSE factory (their word for unstable) doesn't have these packages. Tarballing on this many systems is a nightmare and even then some things just don't seem to work. I don't have time to track down every possible lib/etc/opt/local/share path that different packages try to use by default. I think that this really highlights the trade-offs of stability and security. I have called Novell to ask about it. When vulnerabilities are found in software, they backport the patches into whatever version of the software they are currently supporting. The problem here is that doesn't give me a guarantee that the backport fixes the problem for which this upgrade is required (My requirements say to install version x or higher). There is also the question of how quickly they are providing the backports. I'm hoping that there are 100s of DoD Linux administrators reading this who can bombard me with solutions. How do you balance security with stability?"
I am surprised (Score:5, Interesting)
I thought the DoD would forbid to run newer versions that haven't been ran and scrutinized enough by a lot of people.
I though they would do like many big iron companies that run older versions with security patches applied. I mean if I remember right, no later than last week, exploits were found in newer versions like Linux kernel 2.6.30 and Firefox 3.5. I think this is more likely to happen with newer releases of software than with older releases tested through the years.
Re: (Score:2, Insightful)
I think there might be some changelog analysis going on too. If you see "Huge exploit xyz fixed in this patch", you're more likely to use the new, untested version just because a known exploit is closed. With security software, they're always usually fixing, improving, and generally securing their software.
I personally keep pretty up-to-date, and I can understand that a government agency would want to be completely on top of things.
"It's safer"
Re: (Score:2)
Re:I am surprised (Score:4, Interesting)
I thought the DoD would forbid to run newer versions that haven't been ran and scrutinized enough by a lot of people.
Depends on who you work for and what you do.
Not everything various DoD employees do is related to a "super secret project".
A lot of stuff in the DoD doesn't really have the need or want to be super scrutinized. Some of the stuff that they do is as boring as public relations and kitchen supplies.
Re: (Score:3, Insightful)
Why would they possibly need the latest kernel version?
Re:I am surprised (Score:4, Funny)
Some of the stuff that they do is as boring as public relations and kitchen supplies.
Why would they possibly need the latest kernel version?
They probably believe it provides the kitchen sink ;)
Re: (Score:3, Informative)
Why would they possibly need the latest kernel version?
Wasn't there a kernel root exploit publicized (and patched) a few days ago?
Re: (Score:2)
Re: (Score:2)
Regardless of what the actual machine does, it's still attached to the DoD's primary network, which has a lot of less boring info traversing it. By securing the boring stuff, you can keep it from becoming a host to those looking for the other stuff.
Re: (Score:3, Insightful)
Because the people who write the requirements need to justify their jobs.
Re: (Score:3, Insightful)
Re: (Score:2)
It isn't that HE thinks manually installing the latest versions is any better, it's that the person writing the requirements does.
maybe DoD needs to build their own distro (Score:2)
Just build it off of slackware and distribute the whole thing using apt. That way, you just need to build the whole thing on one set of systems and distribute out to all the boxen you need to update/install.
Re: (Score:3, Informative)
Yes, except I would recommend using the same Linux distributions already in place, but adding your own package server to their repository list (or better yet, create a local mirror, modifying only the packages you need).
For example, if you were running an RPM based distribution, create a YUM server, add it to the existing machine's /etc/yum.conf, and set up a nice little makefile system to easily build new RPMs from the .tar.gz packages; that way you only do the build once.
RPM makes it easy to create pa
Re: (Score:2)
I'm pretty sure you didn't mean to imply that Firefox is a part of Linux, but you did.
And this is why I have arguments with my Windows admin friends (I'm Faust) about how many security flaws "Linux" has. Arrrrgh! /. crowd. Just be careful with this stuff.
But I don't need to preach this to the
Re: (Score:2)
I think you missed the point my post was trying to make. I was talking about software. It applies as well when newer versions of Windows come out. This is a principle above the OS that you are using that is pretty well known.
Another poster has stated it better than I did :
"the sweet-spot between security and stability *is* using back-ported security fixes."
Linux and Firefox were only examples, the holes did NOT exist in previous versions of Linux, same for Firefox. They are newly introduced holes that go wi
Re: (Score:2)
Its not as treacherous as it sounds. Security through obscurity. It does theoretically allow a vulnerable machine to be accessible to the network, but it makes the network collective less vulnerable to a targeted hack into the system, for botnet or node search. This is sort of what some security pundits were referring to when talking about a diverse OS ecosystem better able to survive a virus.
Also, the reality is you're not going to keep any machine, accessible through a network, 100% secure. They all b
Re: (Score:2)
Ok that was just a few and it appears that Fedora 11 is a bit behind considering that this distro is fairly cutting edge and IMHO not appropriate for current enterprise usage. The DoD people who suggest really bleeding edge releases appear to have a crystal ball which must tell them that that
Grindstone (Score:2)
Re:Grindstone (Score:4, Informative)
The most logical thing, surely, is to have a script that grabs the latest source, build suitable binary RPMs and a binary DEB, and then move these files to the correct directory for a repository manager.
(For RPMs, you could simply use the distro-supplied SPEC file and have the script replace values as needed. This only breaks when files are added/deleted, which usually doesn't happen.)
Alternatively, standardize on Slackware and banish the distro-specific issues to history. The drawbacks are less support and fewer fixes, but since the DoD can't track or test all variants, it's reasonable to assume they only track issues for the vanilla version. Distro-modded versions could have flaws added ad well as flaws removed, and in the DoD, it's better to have an absence of known threats.
Re: (Score:3, Informative)
"The most logical thing, surely, is to have a script that grabs the latest source, build suitable binary RPMs and a binary DEB, and then move these files to the correct directory for a repository manager."
Which, more or less, is exactly what it's done at the distribution level... and then you find that it takes about two years to stabilize the compatibility problems that arises with such a practice.
Then you look elsewhere and find that's what Debian does (to name an example) and that's why it takes Debian a
Re: (Score:2)
The most logical thing, surely, is to have a script that grabs the latest source, build suitable binary RPMs and a binary DEB, and then move these files to the correct directory for a repository manager.
Those scripts sound a lot like Gentoo Portage to me.
Re: (Score:2)
If you're feeling really ambitious, up the ladder and find out why it's only by version.
That one is easy: this is how you work with software from Sun or IBM
Who sets those minimum versions? (Score:2, Interesting)
I smell something fishy. Sounds to me like whoever is making money off securing DoD systems is also involved in specifying what versions to use. If you run something that's been battle tested and known to be "safe" (relative term) then there's no money to be made.
Here's a cheap way to make DoD Linux systems safe: don't connect them to the public internet, period.
Re:Who sets those minimum versions? (Score:4, Informative)
The few DOD installations that my company has wired had two completely separate, very secure, physical networks. Big air gap between the secure PCs & the internet.
Re:Who sets those minimum versions? (Score:5, Informative)
If you've been here on
Some of these networks are truly open. Some are only acecssible from a
Your oh so insightful remark is also a cheap way to hamper operations.
We need a -1 Dumbass.
Re: (Score:2)
Some are not connected to the internet at all, and split with an air gap.
This "air gap", I see mentioned several times, what is it, really? The entire building floating on an air cushion?
And some even more restrictive than that.
You're getting me curious! What are those networks like?
Re: (Score:3, Informative)
An air gap means the network isn't connected to the public internet, or to unsecured networks. The "air gap" is the open air between the secure computers and the insecure computers. At present most networking gear has a hard time routing packets through open air, but I hear they're ginning up a new RFC to address that.
Re: (Score:3, Funny)
My Netgear box routes packets over open air without too much trouble.
Re: (Score:3, Funny)
802.11(b,g,n)?
Re: (Score:2)
At present most networking gear has a hard time routing packets through open air
That's weird. My 8 year old wireless router seems to handle routing packets through the open air just fine. *shrug*
Re: (Score:2)
An air gap just means that the computer networks aren't physically connected to each other at all. They exist entirely on separate networks, and the secure one usually isn't connected to any network with computers outside the building, much less on the internet.
Re: (Score:3, Funny)
"And some even more restrictive than that.
You're getting me curious! What are those networks like?"
Their TCP three-way handshake goes like this: SYN SYN NACK.
Welcome, BARACK.OBAMA@WHITEHOUSE.GOV, to area52.31337.nopeeping.nuh-uh.icu.goaway.clubhouse.nwo.mil.
Your security clasification: ACCESS DENIED
Would you like to play a game?
$ls ..
NO
$cat .
NOPE
$pwd
AS IF
$cd
YEAH RIGHT
It simplifies things immensely.
Re: (Score:3, Interesting)
You're getting me curious! What are those networks like?
I can give you some examples of their restrictions, and I didn't even see the room. In fact, I was supporting an enterprise management package used at their site, and I wasn't even allowed to know where their site was. They're not allowed to have any communications lines or devices inside the room, so doing support involved talking to three people really; one person actually on the phone, shouting to the guy holding open the door, shouting to the guy sitting at the keyboard. And keep in mind that this is a
Really secure computers (Score:3, Informative)
"You're getting me curious! What are those networks like?"
Things start getting really secure when you go classified. (There's plenty that's sensitive or deserving of security that ain't classified.)
Right away, classified generally means no connections to public networks/communications. (It's in theory possible, with sufficiently sophisticated security software, but practically never done.) Air gap. The only way to transfer data off the secure "island" is via hand-carried media (sneakernet). For most systems, any media mounted on the system is automatically cl
Re: (Score:2)
If I was working on something that needed real security, I'd prefer a steel reinforced concrete gap with armed guards outside. But I guess an air gap would do. It doesn't do much for the physical security though. :)
Re: (Score:2)
Your oh so insightful remark is also a cheap way to hamper operations.
We need a -1 Dumbass.
I think a +1 Bad Example would be more appropriate. Have it be karma neutral like +1 Funny. Even if you are a total failure you can still be used as a bad example!
Re: (Score:2)
DOD Repository (Score:2)
Can you set up your own private DOD repository to hold those newer versions? Beats updating a ton of PCs manually.
Let the process work. (Score:4, Informative)
Re:Let the process work. (Score:5, Informative)
A few things (Score:3, Interesting)
1) Does the DoD contribute heavily to security software programs or packages? If so, they probably know which libraries are needed as they've been using them to provide the updates.
2) Maintenance of multiple server systems is always difficult. This is why Rocks was developed and why some develop their own startup and build scripts for clusters or server farms. Advanced scripting techniques are a must in a large environment.
3) Even if DoD doesn't contribute, they'll always point out the latest stable software and security fix. If you're talking about the defense of the country, how could you say, "We recommend this version...the one with the security hole that was fixed in the next version."
repo (Score:3, Funny)
Rolling Distrobution (Score:2, Informative)
Re: (Score:2)
I second this.
Arch Linux and Funtoo can fit the bill.
Re: (Score:2)
DoD isn't big on DIY (Score:2)
"If you need to stay cutting edge, why not use a rolling distrobution such as Arch or Gentoo?"
The DoD, in general, *really* doesn't like do-it-yourself stuff. Yah, you can run Linux, but it has to be from Officially Approved vendors (Red Hat, SuSE). Only they have the secret decoder ring or whatever it is the DoD wants.
I'm sure any number of arguments against this will occur to people. You learn real quick: What you think doesn't matter for squat. You're in the army now, and they do it the army way.
(Substitute service branch of your choice.)
Re: (Score:2)
Oh dear me no. No, no and thrice no.
Gentoo is great for learning how to fix things that are broken. That's because it's not uncommon to find a new version you want to install breaks something - eg. the config file syntax has changed subtly and the ebuild doesn't warn you of this before you carry out the upgrade. The longer you leave between doing an emerge -uD world, the more likely this is to happen.
And while you should keep a separate test network to test these things on, IME the test network is never
Re: (Score:2, Insightful)
Re: (Score:3, Informative)
Because only the major vendors have been approved for use within the DOD?
Been there done that for 9+ years...it all really depends on how much common sense your IT security group has and how tech savvy they are. My favorite place was where the head IT security guy was an avid computer geek, so when the new vulnerability lists came out, as long as we could provide a memo for the record explaining how we mitigated the vulnerability (backporting the fix, upgrading to the next version, removing the software, e
Military Mirror (Score:2)
If it is an issue I am surprised there is not a military mirror.
Why would not CyberCommand (or whatever it is called) maintain a mirror of OS they approve of.
It is easy enough to set up and they can log all the machines to make an inventory. Even make sub-mirrors for different commands.
Re: (Score:3, Interesting)
That was my first thought. If the DOD requires specific versions- they should maintain repositories of them on their own servers. Perhaps one on their secure/classified network, and one on a more accessible network. They could be writable by only a few key people, so their chances of become corrupted would be very low.
Re: (Score:2)
Shouldn't they just be able to get whatever version of Linux the NSA is running, complete with a working SElinux? Seems to me like anything else is a huge, stupid duplication of effort.
Re: (Score:2)
They probably want to departmentalize that to a certain extent; a single source for all military computers would mean a single point of compromise for all military networks.
There are also networks isolated by an air gap which have no outside connection but should still be running patched software.
Switch distros? (Score:4, Insightful)
Re: (Score:3, Informative)
Re: (Score:3, Informative)
One addendum to the Gentoo thing...
If you're running a "real shop", in other words many boxes that you want to keep in sync, dedicate one or a few as "binhost servers". Compile there, and the rest of the machines just fetch binaries.
Only problem is that it defuses the usual "waiting to compile" Gentoo jokes.
Re: (Score:2)
For all the "waiting to compile" jokes, Gentoo is a highly servicable distribution.
Really, Gentoo has also been called a meta-distribution, because of its customization capabilities. In that light, it can be highly appropriate for a "controlled shop", where more-or-less locked-down systems are centrally administered.
Re: (Score:2)
you want.
Re: (Score:2)
I'd love to run Gentoo on my box, but the IT department requires Red Hat or Windows XP/Vista. :(
Re: (Score:3, Informative)
Why on earth would you need to update all the time? If it were me, I would install gentoo once, then only update those packages on the DoD's list.
Re: (Score:2)
"Why on earth would you need to update all the time? If it were me, I would install gentoo once, then only update those packages on the DoD's list."
You don't think they came up with a list saying "kernel 2.6.30" a year ago, do you? That list basically ends up saying "use the latest published releases" so, yes, you need updating all the time to stay up to the list.
Re: (Score:2)
Gentoo lets you build binary packages too, build the packages on one box and send binaries to the rest... That way you can update what you need to and leave what you don't, with binary packages dependencies often have to be replaced too... For example, something built against glibc 2.8 will require glibc 2.8 at runtime, even if its perfectly capable of being compiled against a much older version.
Re: (Score:2)
Neither Gentoo nor Ubuntu is on the certified products list....
So do any of the approved distributions have the required library versions, or is this one of those "We require you to have 10 years experience with Office 2010" type of things?
Surprising??? (Score:2)
that's not surprising, or you're not paid to administer linux systems.
really, now.
Re: (Score:2)
That the fresh versions aren't included in many distros shouldn't be surprising. However, that the DoD demands these bleeding edge versions should raise an eyebrow.
I can't see how they can possibly have done a thorough job at certifying something when it's just out the door and bugs are still being weeded out.
If I were to set up a highly secure system, I would probably go with Trusted Solaris from a few years back, or something similarly well tested, like Red Hat Enterprise Linux (kernel 2.6.18) with SElin
I take exceptions! (Score:4, Informative)
Get ready for paperwork! You will need to apply for exceptions for everything that's out of compliance... I've worked in similar institutions, tho not the DoD, but most places run this the same way. The list of software in compliance is usually generated by the infosec team, and it's more of a wish-list than a demand... but to pass your audit, you will need to have permission to run out-of-spec software, and document why it's out of spec (vendor doesn't support that ver) and what you're using instead (the ver. the vendor supports). This is generally so the pen-test, NIDS and Intrusion Response people know what they're dealing with.
Have a chat with your info security shop - they'll walk you through it, and they're secretly envious of unix admins. They yearn for your aura of splendor and awe.
Roll yer own packages (Score:3, Informative)
Back when I was managing SuSE systems we had our own local mirror of the main updates repository, and another repository of custom packages rolled in-house. The documentation ( http://en.opensuse.org/Creating_YaST_Installation_Sources [opensuse.org] ) covers this pretty well.
Either way there's no excuse to be compiling packages on each server and managing the usual /usr/local & /opt mess, not to mention with autoyast iirc you can configure it to update packages at specific times of the day unless there's a reboot necessary (and even to reboot automagically for new kernels)
The Solution! (Score:2)
Run Debian Stable. Have a few members of DOD join the Debian Security Team. Everybody wins/profits!
Just email him (Score:2)
Find the guy's email address of who writes those specs (located somewhere on the doc, I'm sure), or it's on the server that hosts those docs, and email him and ask him where your local depository for the latest .mil approved packages are.
Weigh each vulnerability individually (Score:5, Informative)
There are many, many ways to deal with this, but fortunately while DoD says "update to this specific version," what they really mean is "close this specific vulnerability." Get used to hearing about IAVMs and VMS (Vulnerability Management System).
Taking the case of OpenSSL specifically, it's not uncommon for there to be patches released for vulnerabilities affecting a previous version. If you're using a vendor like Redhat (and in the mind of DoD, Redhat/SuSE = Linux, and nothing else) what you'll end up with is a version of OpenSSL that appears vulnerable, but in fact has a backported patch applied to the vulnerable distribution. Once you've applied the updated RPM, you can say in good conscience that you've mitigated the vulnerability, and you can close the finding.
Where it gets stickier is where you have code that depends on a specific version of a library that might be vulnerable. In that case, you need to dig in and understand the specific uses and how you might be able to mitigate the vulnerability by turning off a publicly listening service or applying some strict file controls, or maybe you don't exercise the vulnerable function in the library and can justify it that way.
Ultimately, you have to be able to convince your DAA (Designated Approving Authority) to accept the risk. If you can't immediately close the issue, you have the option of doing a POAM (Plan of Action and Mitigations) that will outline how you're going to mitigate the issue until you can close it.
There are a ton resources, but specifically I'd start here:
http://iase.disa.mil
You also might find this interesting as a way to secure Redhat machines:
http://people.redhat.com/jnemmers/STIG/
Feel free to contact me if you have more specific questions as well.
Re: (Score:2)
trust the vendor (Score:3, Interesting)
Re:trust the vendor (Score:5, Interesting)
DADMS is DoN-only for a reason; nobody else has the NMCI problem, and it didn't exist prior to NMCI. It's somewhat disconcerting to sit in on a meeting for a joint POR system, and have flag officers wonder WTF the Navy isn't implementing. "Uh, it's not in DADMS, sir." Sparks fly to say the least.
That said, the procedure is pretty simple, and since DITSCAP/DIACAP provide for it, you run specific vendor patches for whatever vendor-supported OS you're running (sorry Gentoo fanboys, roll-your-own isn't allowed in production systems). The Unix SRR script *should* be able to figure out if the backport is applied in a vendor-supplied patch, and pronounce it okay.
(The SRR scripts are publicly-available to everyone; if you're not running a commercial distro, you'll probably get some weird results, but it's still pretty good at picking out possible problems, even on systems that aren't officially-supported. I've run it on everything from Debian, including GNU/Hurd to OS X. http://iase.disa.mil/stigs/SRR/index.html [disa.mil])
If something is revealed that's not accurate, you document:
a) why you can't fix it (i.e. whatever system is running on top ceases to work, the vendor refuses to fix, the vendor is tango uniform, it's Wednesday and you don't feel like it, etc.),
b) why the scanner goofed up and picked out a problem that doesn't exist (yes, this version is different, but the vendor backported the fix [with proper vendor reference] to this, which is applied).
or
c) the fix hasn't been released and fully tested yet.
Cases a and c are what a POA&M is for, which is normally submitted along with the accreditation package, and updated periodically.
It's a trap! (Score:3, Insightful)
I'm hoping that there are 100s of DoD Linux administrators reading this who can bombard me with solutions. How do you balance security with stability?"
Computer security configuration data is on a need-to-know basis. Anyone revealing UCI will be receiving a call or visit from an armed person who had his sense of humor surgically removed. :-)
/workedtoolongforDOE
If you need fresh RPMs on RHEL use koji (Score:2)
RHEL5 is getting a little stale and we often need more recent versions for various reasons; I found that downloading SRPMs from koji.fedoraproject.org and recompiling them on RHEL usually worked. The only annoying thing is that from F11 on the RPM compression has changed and RHEL can't unpack them; so I have to unpack them on my Fedora system first.
Then I just build them, sign them with our GPG key, and copy them over to our loca repo, and just run "createrepo." It's not that big a deal.
Re: (Score:2)
Re: (Score:2)
Actually, it's F11's signatures that have changed; the compression is still gzip. You can bypass the 'unpack on a Fedora box' step by using rpm2cpio, then extracting the cpio archive.
Where are you finding these "requirements"? (Score:5, Informative)
I am a Linux administrator at a DoD site. I have never seen anything that says that you must run kernel 2.6.30 or anything like that. Can you please provide a link to where you read this? (links to CAC-authenticated websites are ok)
DoD I-8500.2 requires you to run an OS that is EAL certified at a certain level depending on your classification. The only Linux distributions I know of that have EAL certification are SLES (9 and 10) and RHEL (4 and 5). I keep hearing about people that run things like Fedora, CentOS, and Ubuntu on DoD networks, but I have no idea how they get away with that.
As far as software versions go, what versions you must be at are dictated by IAV-A, IAV-B, and IAV-T notices. The IAV-A may say that there is a vulnerability that affects kernel versions = 2.6.30 and that you must go to 2.6.30 to be compliant, but as long as your vendor's kernel version addresses the CVEs that the IAV-A references then you are covered.
Re: (Score:2)
What about STIGs (http://iase.disa.mil/stigs/stig/index.html)? Complete STIG compliance is a pain in the ass. Bastille Linux (is it dead?) doesn't even get you there half of the way.
Re: (Score:2)
Yep - STIG compliance is a pain, esp. if your linux box is an appliance, not a general-purpose multi-user box. I do think it cool they appear to care about securing their systems, though.
Re: (Score:2)
a what path? (Score:2)
It's simple, really (Score:3, Insightful)
If you lose data or your system gets abused and you're patched to the latest version you're off the hook. If you don't have the latest patch however you're fired. Even if the latest patch fixes a local privilege escalation on libgd2 and all your server does is DHCP and it was actually exploited by someone cleverly guessing your co-worker's password.
Same thing with firewalls: if all you run is a web server, I say you make sure nothing else is running that opens any ports. It's no use to setup a firewall, because the thing that is most vulnerable, port 80, will need to be open anyway. But get caught without a firewall in some places and you're fired.
It's a lot easier to write a meaningless list of requirements than to think about needs and policies and design the requirements
It's a lot safer to follow some dumb list of requirements than to try to understand what your systems are doing and configure accordingly
It's a lot easier for an auditor to check a list of requirements against the output of some version-checker than to actually know what these things do
It's the dumbing down of engineering that passes for systems administration these days. It's the Windows way of thinking.
Backports FTW (Score:3, Interesting)
I feel your pain... (Score:2, Informative)
As a former DoD Linux admin (one of the first for that organization), the best way I've found to keep everything in sync is to build updates yourself (essentially, you're doing the vendors work for them). I know of the guidelines you speak of and the regular advisories and it was quite a task to implement something reasonable. In the end though, the only way I could both satisfy both the security concerns and maintain the rpm database integrity was to build updated versions of the vulnerable software myse
Do it once, distribute it with M23 (Score:2)
http://en.wikipedia.org/wiki/M23_software_distribution_system
Here's a solution (Score:2)
Holy crap, I have an answer for this.
Run ArchLinux - pacman is *perfect* for this role. Just set up a local repository and have your client image include only it. Set up a cron job on the image to do a "pacman -Syu" nightly - that's "update your package list from the repo, and install any newer versions"
Then you have a test system that you can test new versions on, and when you're ready to launch, update that package in your local repo. That night, all your clients will update to the new version.
The only
Obey the rules. (Score:2, Funny)
First rule about DoD security and stability? Don't talk about DoD security and stability. :>
DISA Auditors (Score:3, Informative)
The thing I keep seeing is lazy DISA auditors that see the STIG's [disa.mil] as black and white. Most of the testers I've run into aren't technical people. They run the automated SRR scripts [disa.mil] and ding you for having your kernel version out of spec. If I were to sit them down and ask why a particular control was an open finding they'd tell me "Because the STIG said so" without digging deeper as to why.
The most recent test I was on, the testing team hit the sys admins for an out of date Kernel on a VMWare ESX box. VMWare uses a highly customized version of RHEL. Installing the most recent Kernel would turn the box into a paperweight. The best advice I can give you is to first check with the tester to find out exactly what the vulnerability is and what their recommended fix action is. Depending on your tester you may be wasting your time. I've see far too many tester leave comments like "Not up to STIG compliance". Check with your vendor to see if they have issued a patch to address that vulnerability. Once you have that information you can place your comments into a POA&M and go back to your DAA and explain why a given open finding isn't really a finding and/or won't be fixed. You can also look into mitigation factors to see if you can reduce the severity. Many controls will state "If you're doing X, Y and Z this finding may be reduced from a CAT I to a CAT II".
Good luck with your C&A and be glad you're not on the documentation side of things :^)
One solution (Score:2)
Setup a few servers to host the patches and pay someone to turn those newer versions into valid rpm and deb packages so they can be used to patch said systems.
Past that, the policy needs to be reviewed. If they're patching because of a physical vuln vs a remote attack then that's just plain stupid. If the system is properly secured according to TSSCI etc then it's not a huge issue to ensure upgrades for at the keyboard attacks. If you lack phys security then you have much bigger problems, any linux syste
Polish your resume (Score:2)
You ought get to work polishing your resume. Discretion is key in the defense community and blabbing about your job on Slashdot is a bad idea. For a start you should have phrased the question in a more vague manner rather than outright naming your employer. They will find out who you are and you can kiss any any access permissions goodbye in the near future.
Re: (Score:2)
Sorry to sound like a jerk, but isn't this what you're paid to do?
What, create time?
Re: (Score:2)
Sorry to sound like a jerk, but isn't this what you're paid to do?
While it might be, is that any reason not to want to find a software solution to make his life easier? Heck, I thought that was what software solutions were all about? Also, have you considered it might not be his only job?
Re: (Score:2)
Really....
"Sorry, I can't be bothered with finding this, so I'll ask Slashdot how to do it without trying."
I would think his problem should be pretty simple. SuSE does have a package manager, right? You can uninstall the vendor package, and install your own. Voila, problem gone.
I've been known to do both the tarball method, and the source method. It's really not *that* painful to build things from source directly on the machines in question. W
Re: (Score:2)
Ya, I'm pretty sure that's a no-no. Unless he didn't really work for DoD, and he was just hoping that blurb would make him browny points with the Slashdot crowd. Reading the comments so far, it doesn't look like it made him any new friends. :)
Re: (Score:2)
Re: (Score:2)
Oh my ..... You know radioman, I hadn't really thought, but....
I hadn't bothered to look, but if you look a little bit ... Well, lets just make a trail.
From the posting, you see his Slashdot username.
From the username, you can look at his public Slashdot profile.
From his profile, you can see his site.
From his site, you can see where he's deployed; what he brought with him; the names, types, brands and models of equipment; the typ
Re: (Score:2)
Re: (Score:2)
On the upside, you get to meet interesting people in prison.