1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

Linux Linux OS by NSA

Discussion in 'Software' started by Umbra, 12 Jun 2014.

  1. Umbra

    Umbra What's a Dremel?

    Joined:
    18 Nov 2013
    Posts:
    636
    Likes Received:
    17
    SELinux

    I'm sure the Linux experts know about this but even putting on my biggest tin foil hat I couldn't help but smile at the irony of it :lol:

    The Original Contributors

    The National Security Agency (NSA)
    Researchers in NSA's National Information Assurance Research Laboratory (NIARL) designed and implemented flexible mandatory access controls in the major subsystems of the Linux kernel and implemented the new operating system components provided by the Flask architecture, namely the security server and the access vector cache. The NSA researchers reworked the LSM-based SELinux for inclusion in Linux 2.6. NSA has also led the development of similar controls for the X Window System (XACE/XSELinux) and for Xen (XSM/Flask).

    SELinux policies in Fedora were initially focused on network facing services. However several dozens of desktop software including Firefox, HAL, D-Bus etc are protected by default using SELinux policies in current releases of Fedora.
     
  2. murraynt

    murraynt Modder

    Joined:
    6 Jun 2009
    Posts:
    4,234
    Likes Received:
    128
    It's also used in android. They know everything.
    [​IMG]
     
  3. Corky42

    Corky42 Where's walle?

    Joined:
    30 Oct 2012
    Posts:
    9,648
    Likes Received:
    388
    One of the main advantages of open source is that anyone can examine the code, unlike other software. So far i don't think anyone has unearthed any back doors in any part of the Linux code.
     
  4. Cthippo

    Cthippo Can't mod my way out of a paper bag

    Joined:
    7 Aug 2005
    Posts:
    6,785
    Likes Received:
    103
    In addition to breaking other people's codes and security, the NSA is also responsible for creating codes and secure communications systems for the rest of the US government. This distro was probably developed developed for government use to be as secure as possible.
     
  5. Guinevere

    Guinevere Mega Mom

    Joined:
    8 May 2010
    Posts:
    2,484
    Likes Received:
    176
    It's not so clear cut. You can rephrase that as :

    How many people used open SSL? (I know I have done in the past) It's open source, it was managed by competent developers and yet it had a massive security fault.

    Using open source software does not mean you are secure. Only that when faults are discovered they can be fixed, but not before they are often instantly known to all hackers (it's hard to keep them secret).

    Security Agencies: I don't think it's traditional 'back door' vulnerabilities that the NSA (or whoever) would consider putting in place, but more that weaknesses could be ignored or even engineered. It's much easier to do that with open source software than it is for proprietary systems.

    With closed source infrastructure the NSA have to intercept the hardware during transit and implement backdoors at a firmware / hardware level.

    For open source I bet you there's been times when they've gone 'We don't need to do that with that platform, we can just throw our super computer at the box for a few minutes, grab the public / private keys and then play piggy in the middle until the end of time'

    I'm not saying open source is unsafe, or even that it's less safe than closed source. Only that being "open source" is not the holy grail of security. You've still got to get everything else right as well.
     
  6. will_123

    will_123 Small childs brain in a big body

    Joined:
    2 Feb 2011
    Posts:
    1,060
    Likes Received:
    15
    Depending who you ask it was not managed by competent developers. openBSD developers seem to think it was very poorly managed hence their own fork.

    Its not really, lots of security patches come from security specialists who report the bug and wait for it to be patched before they release the report etc on it. Rather than shouting from the rooftops before people had had a chance to fix it.

    100% agree. Its not the holy grail but having a open source code base allows me to understand how some of my software works. Rather than just assuming that somebody else is making it safe for me.
     

Share This Page