[iwar] [fc:Is.Linux.Ready.for.National.Security?]

From: Fred Cohen (fc@all.net)
Date: 2002-06-05 16:03:50


Return-Path: <sentto-279987-4770-1023318053-fc=all.net@returns.groups.yahoo.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Wed, 05 Jun 2002 16:14:10 -0700 (PDT)
Received: (qmail 8844 invoked by uid 510); 5 Jun 2002 23:09:49 -0000
Received: from n24.grp.scd.yahoo.com (66.218.66.80) by all.net with SMTP; 5 Jun 2002 23:09:49 -0000
X-eGroups-Return: sentto-279987-4770-1023318053-fc=all.net@returns.groups.yahoo.com
Received: from [66.218.66.96] by n24.grp.scd.yahoo.com with NNFMP; 05 Jun 2002 23:00:53 -0000
X-Sender: fc@red.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-8_0_3_2); 5 Jun 2002 23:00:53 -0000
Received: (qmail 40746 invoked from network); 5 Jun 2002 23:00:53 -0000
Received: from unknown (66.218.66.218) by m13.grp.scd.yahoo.com with QMQP; 5 Jun 2002 23:00:53 -0000
Received: from unknown (HELO red.all.net) (12.232.72.152) by mta3.grp.scd.yahoo.com with SMTP; 5 Jun 2002 23:00:52 -0000
Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g55N3oB10947 for iwar@onelist.com; Wed, 5 Jun 2002 16:03:50 -0700
Message-Id: <200206052303.g55N3oB10947@red.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL3]
From: Fred Cohen <fc@all.net>
X-Yahoo-Profile: fcallnet
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Wed, 5 Jun 2002 16:03:50 -0700 (PDT)
Subject: [iwar] [fc:Is.Linux.Ready.for.National.Security?]
Reply-To: iwar@yahoogroups.com
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
X-Spam-Status: No, hits=0.0 required=5.0 tests=DIFFERENT_REPLY_TO version=2.20
X-Spam-Level: 

June 5, 2002
Is Linux Ready for National Security?
By Thor Olavsrud

The popularity of the Linux open source operating system is exploding in the
public sector, both in the U.S. and abroad. In May, IBM Corp. (NYSE:IBM)
alone announced a deal to supply the Air Force, Department of Defense (DoD),
Department of Agriculture, Department of Energy, and Federal Aviation
Administration (FAA) with Linux systems. But now at least one group (aside
from Microsoft) is raising questions about possible security risks posed by
open source software.

The Alexis de Toqueville Institution, a conservative U.S. think tank, plans
to release a white paper Friday which will go so far as to suggest that
terrorists may find it easier to hack U.S. networks run on open source
infrastructure.

"Computer systems are the backbone to U.S. national security," said Gregory
Fossedal, chairman of ADTI. "Before the Pentagon and other federal agencies
make uniformed decisions to alter the very foundation of computer security,
they should study the potential consequences carefully."

But the Pentagon has conducted its own study, one that has led the
traditionally close-mouthed Defense Department ally itself the open source
movement, and not with vendors of proprietary systems as ADTI advocates.

"Banning open source would have immediate, broad and strongly negative
impacts on the ability of many sensitive and security-focused DOD groups to
protect themselves against cyberattacks," concluded a May 10 report prepared
by Mitre Corp., a non-profit which operates federally funded research and
development centers for the DoD, FAA and IRS.

The Mitre Corp. report further suggests that open source software is often
more secure and less expensive than proprietary software.

The even more secretive National Security Agency (NSA) -- which specializes
in cryptography -- is also working with Linux, though it has not taken sides
on the open source vs. proprietary debate and is only working with the
platform in a research capacity.

The agency's Information Assurance Research Group has been heading up a
project to create Security-Enhanced Linux, a modified version of the Linux
kernel with "strong, flexible mandatory access control architecture
incorporated into the major subsystems of the kernel." The agency said its
system provides a mechanism to enforce the separation of information based
on confidentiality and integrity requirements. "This allows threats of
tampering and bypassing of application security mechanisms to be addressed
and enables the confinement of damage that can be caused by malicious or
flawed applications."

The agency said it selected Linux for the platform because "its growing
success and open development environment provided an opportunity to
demonstrate that this functionality can be successful in a mainstream
operating system and, at the same time, contribute to the security of a
widely used system. Additionally, the integration of these security research
results into Linux may encourage additional operating system security
research that may lead to additional improvement in system security."

U.S. agencies are not the only ones turning to Linux. On Monday, the German
Ministry of the Interior forged a deal with IBM to standardize the German
government on Linux and open source IT. Military and intelligence agencies
in North America, Europe and Asia -- including the U.S., Canada, Germany,
France, England, Spain, China and Singapore -- have invested in Linux
systems. China's post office runs on the platform; so too do France's
culture, defense and education ministries.

But Ken Brown, author of ADTI's forthcoming Opening the Open Source Debate
white paper, argued the U.S. needs to slow down and hold a national debate
on the suitability of open source systems in vital areas that touch on
national security.

"We're recommending further study," Brown said. "We're not saying that one
type of software, proprietary, is better than open source."

Brown, who characterized himself as pro-open source, noted that ADTI is not
composed of open source experts or cryptographers, though it interviewed
many experts to create its report. He also noted that when it comes to
security, ADTI is more concerned with the terms of the GNU (define) General
Public License (GPL), which requires that any changes to open source code
licensed under the GPL which is then distributed must be made part of the
GPL and be made freely available to all.

"There isn't a software that cannot be cracked," he said. "Our position is
that if a platform is proprietary it is vulnerable because not enough people
can see it. We feel that a platform everyone can see may be even more
vulnerable."

Brown explained that while ADTI believes pooled talent is highly beneficial
in software development, it is naive to allow "bad guys" as well as "good
guys" into that talent pool. "This volunteer community of people is as good
as a group of people that's been screened for security? Screened for
credibility? Screened for reliability?" he asked.

He also raised the specter of back doors and viruses woven into critical
software patches.

"I don't see any reason why we shouldn't have a national debate, with
in-depth discussion and rigorous testing on this topic," he said.

Brown neither confirmed nor denied that ADTI receives funding from Microsoft
or firms representing the company, which has been at pains to denounce open
source software as insecure.

"We don't discuss funding," Brown said.

------------------------ Yahoo! Groups Sponsor ---------------------~-->
Save 30% on Web addresses! Get with the times, get a web site. Share information, pictures, your hobby, or start a business. Great names are still available- get yours before someone else does!
http://us.click.yahoo.com/UBc4BA/nFGEAA/sXBHAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2003-08-24 02:46:32 PDT