LinuxQuestions.org
Latest LQ Deal: Latest LQ Deals
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Non-*NIX Forums > General
User Name
Password
General This forum is for non-technical general discussion which can include both Linux and non-Linux topics. Have fun!

Notices


Reply
  Search this Thread
Old 11-07-2002, 11:10 PM   #1
aaronluke
Member
 
Registered: Aug 2002
Posts: 58

Rep: Reputation: 15
Oh Linux, Where Art Thou?


Yesterday, the very first day, Microsoft announced that Windows 2000 has passed all required tests for certification under the Common Criteria (CC) at Evaluated Assurance Level 4 (EAL4) to demonstrate their “commitment to security.” Unlike the Windows® NT 4.0 TCSEC (Trusted Computer Security Evaluation Criteria, a.k.a. “Orange Book”) C2 certification which was on a non-networked machine without a floppy drive, the Windows 2000 CC EAL4 tests included among others the Active Directory Service, Virtual Private Networking (VPN), the Kerberos implementation, and the Encrypted File System. Where was Linux™ when Microsoft dropped this bombshell? Linux™ was nowhere to be found. There was no one from Red Hat, no one from Mandrakesoft (makers of Mandrake Linux), and no one from SuSE. Linus wasn’t there. Not even the self-appointed patron saint of open source, Richard Stallman, bothered to show up.

Oh Linux™, oh Linux™. Where art thou, Linux™? Why dist thou not showst up? The answer lies in a small, little excerpt from John Pescatore, Director of Internet Security for Gartner. He said, “Not all but some of versions of Linux could meet this level [CC EAL4] as well.”

That’s right. Not all versions of Linux could meet CC EAL4. In other words, not all versions of Linux could meet the same minimum security requirements as Microsoft Windows 2000.

“Well,” you ask, “exactly which versions of Linux can and cannot meet CC EAL4 requirements?” It stands to reason that the core Linux™ kernel, the version distributed by Linus at http://www.kernel.org, cannot meet these minimum requirements, because if it did, all versions of Linux™ would meet these minimum requirements. After all, other Linux distributions are not going to be made less secure. I also know for a fact that this is true. The reason that only some of the Linux™ versions would pass CC EAL4 is that those versions patch the main Linux™ distribution. In other words, those more secure versions are forks, alternative versions of Linux™ that were not accepted into the main distribution.

This means that Linux™, as released by saint Linus, the same Linux™ that all these so-called “experts” have been touting as the more stable, more secure alternative to Windows, is actually less secure than Windows 2000. Now I don’t want to get any email from you Linux™ naysayers asking me that if Microsoft Windows 2000 is so secure why does Microsoft® Windows 2000 have so many more security bugs, or security bulletins, than Linux™. Measuring the security of an operating system by the number of security bulletins is like measuring the security of a bank by the number of robberies. By that standard, my small town bank out here in the sticks with 2 tellers, 3 security cameras, and never more than US$1,000 cash on-hand is the most secure bank in the world.

The “theory of a thousand eyes” (the theory that open source is more secure because everybody can see the code and instantly discover a problem) doesn't make an operating system any more secure either. While the potential for more security exists, this doesn't ensure that the “thousand eyes” are actually looking. To the contrary, Red Hat has discovered bugs in the Linux kernel in sections that went unchanged for years. For example, not only did the Teardrop vulnerability in TCP/IP exist for decades, but the Teardrop vulnerability was ported to other operating systems, even though “thousands of eyes” had to be looking at the code in order to port it to another operating system. Peer review, an extension of this theory, doesn't provide any assurance either, because the reviewing peer may not be well versed in security and hence not fully understand or appreciate the implications of a given piece of code.

I’ve said it before, and I’ll say it again. The only way to fully evaluate operating system security, and to compare one operating system's security to another operating system's security, is to have that operating system evaluated under TCSEC or CC. These are comprehensive methods of fully and exhaustively evaluating security, and the fact that they are common standards allows operating systems evaluated by the same criteria to be compared in terms of total security assurance. Until Linus and his open source goons get their act together, get their kernel up to snuff, and get their kernel certified, Linux™ will remain less secure than its arch-nemesis, Microsoft Windows 2000.

full story: http://www.worldtechtribune.com/worl...sv10302002.asp
 
Old 11-08-2002, 12:07 AM   #2
jdc2048
Member
 
Registered: Jul 2002
Distribution: Redhat, Gentoo, Solaris, HP-UX, etc...
Posts: 391

Rep: Reputation: 30
Quote:
Based on a set of Department of Defense specifications for trusted systems known as the Orange Book, the Common Criteria certification doesn't guarantee that an operating system or software application is bug-free, but that the development and support processes that created and maintain the product meet a certain level of standards.
and
Quote:
Microsoft paid the Common Criteria testing lab at Science Applications International Corp (SAIC) to perform the evaluation of Windows 2000.
and
Quote:
"Only one company (Red Hat) has enough money to get certified," he said. "I don't think even United Linux has enough money to get Linux-certified."
 
Old 11-08-2002, 04:51 AM   #3
Bert
Senior Member
 
Registered: Jul 2001
Location: 406292E 290755N
Distribution: GNU/Linux Slackware 8.1, Redhat 8.0, LFS 4.0
Posts: 1,004

Rep: Reputation: 46
Also, have a look at:

http://worldtechtribune.com/worldtec...bz06282002.asp

and

http://www.worldtechtribune.com/worldtechtribune/

to find out which side their bread is buttered on. In fact, looking at those articles there appears little to offer it creditibility. Those articles are full of value judgements and opinion dressed up as fact.
 
Old 11-08-2002, 07:39 AM   #4
Bert
Senior Member
 
Registered: Jul 2001
Location: 406292E 290755N
Distribution: GNU/Linux Slackware 8.1, Redhat 8.0, LFS 4.0
Posts: 1,004

Rep: Reputation: 46
In fact according to Microsoft's latest missive from the November meeting in Berlin, the Anti OSS jihad is finished, and it never worked:

http://www.opensource.org/halloween/halloween7.php

Looks like worldtechtribune's editorial team will need to have a rethink.
 
Old 11-08-2002, 08:06 AM   #5
CragStar
Senior Member
 
Registered: Oct 2000
Location: UK - Frome
Distribution: Ubuntu
Posts: 1,081

Rep: Reputation: 47
In the words of porky pig: "B-B-B-B-B-B-Bull$hit".

Whoever wrote that article is obviously saying that because my well-respected friend (who I paid) has checked out my OS and has found no more flaws in it that haven't been discovered yet anyway, it must be secure, and because my next door neighbour didn't turn up this pointless, costly ceremony his OS is very unsecure.

And who knows, maybe his bank in his home town is actually the most secure bank in the world if it hasn't had any robberies?!?
 
Old 11-09-2002, 01:23 PM   #6
masinick
Member
 
Registered: Apr 2002
Location: Greenville, SC
Distribution: Debian, antiX, MX Linux
Posts: 636
Blog Entries: 16

Rep: Reputation: 104Reputation: 104
Re: Oh Linux, Where Art Thou?

Quote:
Originally posted by aaronluke

I’ve said it before, and I’ll say it again. The only way to fully evaluate operating system security, and to compare one operating system's security to another operating system's security, is to have that operating system evaluated under TCSEC or CC. These are comprehensive methods of fully and exhaustively evaluating security, and the fact that they are common standards allows operating systems evaluated by the same criteria to be compared in terms of total security assurance. Until Linus and his open source goons get their act together, get their kernel up to snuff, and get their kernel certified, Linux™ will remain less secure than its arch-nemesis, Microsoft Windows 2000.

full story: http://www.worldtechtribune.com/worl...sv10302002.asp
Linux is not the most secure operating system out of the box, you're right about that. I'd suggest that award would probably go to OpenBSD, or possibly to the long reigning mainframe operating system, OS/MVS (in whatever incantation or name its given today).

Linux software, and the systems upon which they were based, the UNIX systems, were not originally designed with security in mind at all, so you're right about that much. Both UNIX and Linux designs, however, are extremely flexible and extensible, so that they can be easily made to be reasonably, or even extremely, secure.

The OpenBSD project focuses on security, so it is, by definition and intent, secure, whereas that is a secondary (but important) goal for Linux systems. The SE Linux project is specifically aimed at security, and that effort brings sound security principles to Linux software.

The Windows 9x series OS are inherently insecure, the Windows NT series OS (which includes NT, 2000, and XP), have more built in security. I think that the security vulnerabilities in the NT family come mostly from applications, not the system per se, so I'd agree with you that NT family OSs have decent built in security, possibly more default security than a plain, unaltered Linux system.

The good news (or maybe it is the sad news) is that most modern OS are taking security more seriously. Linux vulnerabilities seem to come mostly from buffer overflow issues, and those are being rapidly located and fixed. Windows vulnerabilities seem to come mostly from the convenience of being able to execute macros and embedded executables without sufficient safe guards in place. It's really too bad that we have to tighten down security, the openness of communication between processes and applications has been really convenient.

I get the distinct sense, though, that you're interested in taking shots at Linux software wherever you can. I think this forum is mainly designed to deal with Linux questions rather than Linux rants. I think there is room for constructive criticism, but let's leave it to that, and be careful about turning constructive criticisms into rants. The former are worthwhile, the latter are more annoying than they are useful. So I'll leave this that NT-based OS have some nice access control features that are not found by default in Linux systems, unless they happen to have the Secure Linux (SE Linux) features.

Where Art Linux? In the same open, flexible, extensible place it's always been, right where I like it!
 
Old 11-09-2002, 03:01 PM   #7
Bert
Senior Member
 
Registered: Jul 2001
Location: 406292E 290755N
Distribution: GNU/Linux Slackware 8.1, Redhat 8.0, LFS 4.0
Posts: 1,004

Rep: Reputation: 46
The article is copied verbatim though, it's not necessarily aaronluke's opinion. It's still a heap of dumpy.
 
Old 11-09-2002, 06:48 PM   #8
masinick
Member
 
Registered: Apr 2002
Location: Greenville, SC
Distribution: Debian, antiX, MX Linux
Posts: 636
Blog Entries: 16

Rep: Reputation: 104Reputation: 104
Quote:
Originally posted by Bert
The article is copied verbatim though, it's not necessarily aaronluke's opinion. It's still a heap of dumpy.
I hope it's not Aaronluke's opinion. I wasn't looking for that kind of dialog in LinuxQuestions.org. Ziff Davis did post some links over the past 24 hours that showed, on one hand, studies that linked people moving over to Red Hat Linux to a seriousness about security, and another article that showed Windows 2000 meets high security standards (and not all Linux distros could meet the same standards). I think it was a reference to the second set of resources (which were probably the originals) from which the comments emanated. There is certainly some truth to each of the statements. In the end, security is a function of due diligence on the part of those using the system. Some systems include better tools than others, but it is users and administrators that are the weakest link, not always the systems themselves.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
God says THOU shalt MAKE SATAUX --- Linux dedicated to sata hard drives & Raid etc . studpenguin Linux - General 13 05-18-2007 07:21 PM
Cool Debian wallpaper - wherefor art thou? moistTowelette Debian 6 08-21-2005 03:50 PM
oh kernal, where art thou? ccflashback Linux - General 4 11-20-2004 11:02 AM
traditional art vs modern art acid_kewpie General 14 10-27-2003 01:12 AM
linux art? alaios Linux - General 5 06-03-2003 02:52 PM

LinuxQuestions.org > Forums > Non-*NIX Forums > General

All times are GMT -5. The time now is 08:20 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration