Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Operating Systems Security Software

A Secure OS For the Dalai Lama? 470

Jamyang (Greg Walton) writes "I am editor of the Infowar Monitor and co-author of the recent report, Tracking Ghostnet. I have been asked by the Office of His Holiness, the Dalai Lama (OHHDL) and the Tibetan Government in Exile (TGIE) to offer some policy recommendations in light of the ongoing targeted malware attacks directed at the Tibetan community worldwide. Some of the recommendations are relatively straightforward. For example, I will suggest that OHHDL convene an international Board of Advisers, bringing together some of the brightest minds in computer and international security to advise the Tibetans, and that the new Tibetan university stands up a Certified Ethical Hacking course. However, one of the more controversial moves being actively debated by Tibetans on the Dharamsala IT Group [DITG] list, is a mass migration of the exile community (including the government) to Linux, particularly since all of the samples of targeted malware collected exploit vulnerabilities in Windows. I would be very interested to hear Slashdot readers opinions on this debate here." (More below.)
Jamyang continues: "Allow me to play devil's advocate for a moment here: in the short term, moving to a platform that is perhaps less familiar to the attacker provides considerable relief, but it is essentially less difficult to write exploits for Mac OS/Linux than it is for Windows, given the many anti-exploitation mechanisms Microsoft has embedded in the last years, so in the long run, if the attackers want your data, the entire move is moot. People should choose a platform based on their productivity requirements instead of purely security. Furthermore, most of the web servers broken into during these attacks (to be used as command and control servers) were not Windows, but Linux. What do you think?

(While I have the floor I'd also like to take this opportunity to plug two initiatives where Slashdot readers can directly help the Tibetan tech community, either through sharing your expertise or your cash! Firstly, one of the obstacles to migrating to Linux for a Tibetan speaker is the lack of decent Tibetan font — can you help? Secondly, Avaaz is raising funds for projects that will help End The Blackout in Tibet, including a proposal to support the deployment of Psiphon's circumvention network. Thanks, or in Tibetan, thuk.je.che!"
This discussion has been archived. No new comments can be posted.

A Secure OS For the Dalai Lama?

Comments Filter:
  • Huh? (Score:5, Insightful)

    by khasim ( 1285 ) <brandioch.conner@gmail.com> on Saturday April 18, 2009 @05:46PM (#27630365)

    "Allow me to play devil's advocate for a moment here: in the short term, moving to a platform that is perhaps less familiar to the attacker provides considerable relief, but it is essentially less difficult to write exploits for Mac OS/Linux than it is for Windows, given the many anti-exploitation mechanisms Microsoft has embedded in the last years, so in the long run, if the attackers want your data, the entire move is moot."

    First off, yes, that is a single sentence.

    Secondly, exactly who is it who says (or can demonstrate) that cracking a Mac or Linux box is easier than a Windows box? My experience is exactly the opposite.

  • First thoughts (Score:5, Insightful)

    by FooAtWFU ( 699187 ) on Saturday April 18, 2009 @05:47PM (#27630377) Homepage

    it is essentially less difficult to write exploits for Mac OS/Linux than it is for Windows, given the many anti-exploitation mechanisms Microsoft has embedded in the last years, so in the long run, if the attackers want your data, the entire move is moot.

    As opposed to the anti-exploitation frameworks which were present in UNIX systems from the moment they were conceived? and continually updated since? You've been listening to too much Microsoft advertising if you think they're Superior. (Competitive? Maybe. Superior? Not a chance).

  • Re:Huh? (Score:5, Insightful)

    by cjfs ( 1253208 ) on Saturday April 18, 2009 @05:56PM (#27630475) Homepage Journal

    Secondly, exactly who is it who says (or can demonstrate) that cracking a Mac or Linux box is easier than a Windows box? My experience is exactly the opposite.

    The language is vague enough to be pointless. Does he mean when run by the user as root? Does he mean remote exploit vs something in the full install of ___ distro? Does he mean windows makes you click yes more times to run it?

    Now half the comments will be off-topic due to that sentence.

  • Re:Huh? (Score:5, Insightful)

    by maz2331 ( 1104901 ) on Saturday April 18, 2009 @05:58PM (#27630497)

    Especially if the sysadmins take an active role in:

    A. Customizing and minimizing the installed packages.
    B. Configuring a very restrictive set of firewall rules.
    C. Configuring a very tight SELinux policy.

    The key to Linux is to not think of it as on Operating System so much as an "OS Toolbox" that lets you build just what is needed.

  • by voss ( 52565 ) on Saturday April 18, 2009 @06:05PM (#27630563)

    Not encryption or top secret stuff.

    Any of the major linux distros should work fine., unicode tibetan is supported.

  • Re:Free Tibet! (Score:2, Insightful)

    by Stephan202 ( 1003355 ) on Saturday April 18, 2009 @06:06PM (#27630575) Homepage
    I think you mean a Tibet of equal or greater value.
  • by funkapus ( 80229 ) on Saturday April 18, 2009 @06:10PM (#27630631) Homepage

    First of all, converting the Dalai Lama to Linux is about the coolest IT project I've ever heard of, so congratulations

    That aside, there are practical considerations and there are philosophical ones you'll want to consider. Practically speaking, no platform is 100% secure. Linux has historically been more secure than Windows. MS has made a lot of progress in the last decade or so.

    The question is, do you prefer the closed-source approach or the open-source one? Would you rather the problems be hidden away, or laid out for all to find? In the closed-source scenario, knowledge of exploits may be less common, but that cuts two ways. Less attackers will be aware of an exploit, but less defenders will be aware of it as well. That may well result in the exploits that do occur being much more severe.

    Beyond those practical considerations, which approach fits better with the values of the Tibetan community and the Dalai Lama in particular? In my mind, open source is the embodiment of non-attachment.

  • Bias (Score:5, Insightful)

    by Tubal-Cain ( 1289912 ) on Saturday April 18, 2009 @06:11PM (#27630651) Journal

    A Secure OS For the Dalai Lama?

    I have absolutely no idea what Slashdot will say to a question like that.

  • by edsousa ( 1201831 ) on Saturday April 18, 2009 @06:15PM (#27630689) Journal
    I would focus on teaching them security practices:
    • do not open attachments you don't know
    • don't store your confidential data on your laptop
    • keep and check if auto-updates are working
    • report any suspect of breach to IT

    Most of all, make sure that anyone that uses a computer is aware of the risks. Even more sure with higher clearance levels.

  • Diversify! (Score:3, Insightful)

    by uffe_nordholm ( 1187961 ) on Saturday April 18, 2009 @06:30PM (#27630821)
    If it were up to me to decide, I would go for the broadest possible range of OSes: Windows, Mac, Linux, Unix, BSD, BeOS....

    The reason is simple: if an outside attacker can't predict what they will meet, it's much harder to get in.

    And if you can get the various OSes to masquerade as each other when replying to outside queries, so much the better: an attacker could be trying to use known Mac vulnerabilities to enter a machine that from the outside looks and behaves like a Mac, but actually runs Windows or Linux.
  • His Holy etc. (Score:2, Insightful)

    by oldhack ( 1037484 ) on Saturday April 18, 2009 @06:35PM (#27630853)
    Call him Dalai Lama. What's with all these his holy, etc.? Do we call the pope his holy whatsit? Or the English Queen? Even The One is simply The One.
  • by Anonymous Coward on Saturday April 18, 2009 @06:39PM (#27630887)

    These are some of the best comments on here so far because they are underscored by the idea that ALL of your possible choices are going to have vulnerabilities.
    While others debate the security records and architectures of various operating systems (and some may be better choices overall), only an idiot would claim that such-and-such a system is invulnerable, particularly when the attack is specifically targeted at you.

  • by AnalPerfume ( 1356177 ) on Saturday April 18, 2009 @06:54PM (#27631027)
    The sarcastic response would be "try Red Flag Linux" but the serious response would be to look at a fully open *nix variant such as Debian, or one of the BSDs. I'm not familiar with any of the BSDs but I'm aware that security is a high priority with them. My reluctance with BSD is the lack of "rich entertainment" (for want of a better description) applications easily installable, which won't be an issue (I'd imagine) for the needs of the Dhali Lama.

    For the BSD fans, this is NOT meant to flame, just to point out that for users who expect "modern" or "proprietary" stuff like Flash, mp3 support Linux is a better option. If you don't need those type of features then BSD is well worth a look. Any new OS will need new learning, in that regard BSD or Linux makes no difference.
  • by cpghost ( 719344 ) on Saturday April 18, 2009 @06:57PM (#27631057) Homepage

    That should give you 20,000 apps to leverage

    And each one with its own set of vulnerabilities.

  • by belmolis ( 702863 ) <billposerNO@SPAMalum.mit.edu> on Saturday April 18, 2009 @07:05PM (#27631121) Homepage

    Actually, designing a Tibetan font is rather difficult. Tibetan letters combine in complicated ways (somewhat like Devanagari, but worse), meaning that it is either necessary to produce very sophisticated rendering software/info or necessary to create a large number of pre-combined glyphs.

  • by erroneus ( 253617 ) on Saturday April 18, 2009 @07:13PM (#27631191) Homepage

    And failing the thousands of monks having nothing better to do than to spend hours with FontForge, they could just import (read: infringe upon copyright) the fonts they like under Windows and place them into Linux.

    The original notions put forward do mirror my initial concerns when moving from Windows to Linux. Among those concerns were a good Japanese language interface and input method, good fonts and printer support. The first two were addressed with some heavy pushing in that direction with SCIM and whatever it was that came before it... then it became as good or better than Windows. The other was just opening up some man pages or simply giving it a try... turned out not to be difficult in the slightest.

    Moving to a different operating system is a seemingly daunting task to those who have never done it before and they are required, then, to think of computing in terms of what you need to do and how you might accomplish it... not something most people are accustomed to thinking about. (The same can be said about moving from Word Perfect to Microsoft Word and it was a BIG deal!)

    Moving away from Windows is simply necessary judging by the kinds of attacks described. Another option might be Deep Freeze... has that been defeated yet?

    One thing is for certain: one should not be stopped from performing a necessary task merely because it is "difficult." Just do it. If it seems impossible, give it a try anyway. But moving the religious leader and all his followers to Linux is definitely a workable thing to do.

  • Re:Huh? (Score:5, Insightful)

    by dangitman ( 862676 ) on Saturday April 18, 2009 @07:41PM (#27631435)

    Your windows install has at least been verified by a known party.

    Yes, a known incompetent party, which has very little concern for security or the vetting of source code, but has rather different interests foremost.

  • BEOS (Score:3, Insightful)

    by syousef ( 465911 ) on Saturday April 18, 2009 @07:52PM (#27631513) Journal

    Hardly any exploits at all.

    Oh you wanted a USABLE OS? Well you'll need to tell me what it's going to be used for.

  • Re:Huh? (Score:5, Insightful)

    by J Story ( 30227 ) on Saturday April 18, 2009 @08:06PM (#27631623) Homepage

    There are thousands of attack vectors into linux, far more than there are into any windows software.

    How do you know this? A claim this large needs to be supported by something more than mere assertion.

  • Re:Huh? (Score:4, Insightful)

    by gmuslera ( 3436 ) on Saturday April 18, 2009 @08:15PM (#27631665) Homepage Journal
    Not sure on what are you on, but must be strong. You seriously suggest Microsoft, the I-included-government-backdoor-in-every-windows Microsoft, the one that will do almost anything to enter into the chinese market, to provide the "secure" OS to the Dalai Lama?

    I almost can hear a child saying "but... the emperor is naked!". The track of successful attacks on the windows platform, even to secure savvy people, is too long. And some of those attacks were discovered long after the fact just because tiny discrepancies.

    No, not sure if there are "formal" auditing into code that goes into kernel or major pieces of the puzzle that is open source, but from there to say that noone checks another's work at all goes a bit of distance. And there is some strenght into the "puzzle" part.

    Yes, could be an infiltration in open source software if you take an army of skilled programmers for that task, that could eventually could be busted or not (the many eyes theory is not a guarantee, but is a posibility that exist).

    But what if a closed source company wants to put something intended in their OS? Remember how easy was to the security experts to decipher what Conficker will do? And that wasnt even from the maker of the OS.

    My recommendation would be something open source, not so edgy, that passed the test of time, but secure and functional.
  • I smell bacon! (Score:4, Insightful)

    by Dreadneck ( 982170 ) on Saturday April 18, 2009 @08:15PM (#27631673)

    This entire article smells like flamebait to me. I'm going to sit back and watch it burn.

  • Re:Huh? (Score:5, Insightful)

    by putaro ( 235078 ) on Saturday April 18, 2009 @08:45PM (#27631881) Journal

    I don't need to because there are hundreds of code reviews ongoing on the Linux kernel code all the time.

    The key word here is Open Source. There are enough paranoids out there using the Linux kernel that I'm sure just about everything gets plenty of scrutiny. If you are a party with something to worry about, like the Tibetan Gov't in Exile you could get a few people together to vet the code that goes into your own build and monitor the patches that go in. That is something you cannot do with Windows or any other closed source product (that include Mac OS X, really, as what comes from Apple has a bunch of closed source extensions). Doing your own security review would be difficult but it is possible.

    If I had to bet my life on something it sure wouldn't be Windows.

  • Re:Huh? (Score:5, Insightful)

    by Anonymous Coward on Saturday April 18, 2009 @08:46PM (#27631895)

    There are thousands of attack vectors into linux, far more than there are into any windows software.

    How much source code have you verified on your linux install ? Your windows install has at least been verified by a known party. Anyone wanting to get into your system will have to get past microsoft first.

    Microsoft verify its software so well that it doesn't even know what it's privileged services do. They had to create an "archaeological" team to discover how their CIFS redirector works, just to be able to write the documentation the EU antitrust mandated them to write as a remedy.

    It is well known that they historically never created. much less used extensive test suites.
    Proof is the number of regressions you can see in their server software from one release to the other. Their testing method has always just been to run a battery of clients with Office and other "important" application to make sure they did not "break".

    Now in theory getting into a linux system would require getting past redhat or canonical.

    In practice, as several breaches have demonstrated, compromising ANY widely used project (who accept volunteers as full comitting members merely for showing a bit of ability) would be sufficient.

    And yet there is no evidence that any reasonably popular Linux distribution is compromised.

    It's easy to fantasize on what could happen, but empirical evidence shows this is mere speculation.

    How many chinese spies are working on the linux kernel. Improving it, yes, but also ...

    And how many have been working for Microsoft, with the added "benefit" that nobody can review the code outside of said organization? (which as mentioned above has already demonstrated it doesn't know its own code?)

    Do you dare to bet your life on the answer being zero ?

    As much as I can bet my life on any other hw/sw system.

    A full linux install being trustworthy is dependant on tens of thousands of coders all being trustworthy (since in practice, nobody checks one another's work, and no "real" security audits are being conducted. Checking personnel is considered heresy, refusing code based on lack of credentials is something that cannot ever be mentioned).

    Man so much FUD in a single sentence is staggering.

    1) any major (and certainly any security sensitive project) is checked. Every single checking is normally reviewed by at least another developer. This is true both for the kernel and many other projects. So the idea that nobody checks one another work is total bullshit.

    2) not only code is checked by automatic checkers for defects, a lot of cryptographic and security software is routinely certified (FIPS and others) and reviewed both internally and by external organizations.

    3) There is no need to refuse code on the basis of lack of credentials, because the code is *reviewed* first. So if you do something that is not simply stupid but that is malicious you can bet none of your code will never be reviewed again, much less committed.

    4) Obviously you have never developed any major FOSS software ...

    You want to be secure against chinese interference ? Go to microsoft or ibm. Not because they do not have chinese spies in their organisations, but because they most likely do not have 1000 chinese spies in them.

    1,10,100,1000, does it make any difference?
    What you need is 1, and only 1.

    Also, those spies have to get past at least a single code review (one hopes) before compromising all customer's security.

    Ya, rly ?

    Sorry to break the news to you : open source software, in it's current form, cannot defend against a concerted attack by any large groups of individuals. It can't be done. It doesn't have to be the chinese. It's a matter of time before isla

  • by Kaboom13 ( 235759 ) <kaboom108@@@bellsouth...net> on Saturday April 18, 2009 @08:59PM (#27631967)

    I know purists will hate this, but another solution would be to create a standardized way to display tibetan without the letter combination. Just like japanese has a more or less standardized process for displaying japanese words in the roman alphabet, a way to do something simliar in Tibetan would be useful. Spending a ton of time modifying all western software to use advanced typography to display Tibetan "correctly" could well backfire. The end result would be the effort required would result in few programs being translated at all, and another language becoming the defacto standard for computer savvy Tibetans. That road leads to youth with minimal skills in their own cultural language.

  • Re:Huh? (Score:4, Insightful)

    by SanityInAnarchy ( 655584 ) <ninja@slaphack.com> on Saturday April 18, 2009 @09:04PM (#27631989) Journal

    Can you say the same for linux kernel contributors ?

    It doesn't matter where an idea came from -- that's why Ad Hominim is a fallacy.

    It matters whether it's valid.

    So yes, I can say the same for the part that matters:

    I'm sure that were one to dig deep enough, you'd find that the xp kernel (like some central parts of the linux kernel) has been vetted by NSA experts.

    There you have it -- some central parts of the Linux kernel have been vetted by NSA experts.

  • Re:Huh? (Score:3, Insightful)

    by SanityInAnarchy ( 655584 ) <ninja@slaphack.com> on Saturday April 18, 2009 @09:06PM (#27632007) Journal

    That trivially ignores the hierarchy of review and acceptance.

    Moreover, you haven't provided a similar list for Windows, or Windows software.

    You make some interesting arguments elsewhere, but your bias is showing.

  • by Creepy Crawler ( 680178 ) on Saturday April 18, 2009 @09:19PM (#27632103)

    ---One of the ways that I manage my systems is to create a zone where hackers may go, and not go.

    The only way to guarantee that is by an air gap. If data can travel in both directions, it can gone to.

    ---For example, I use a good firewall. That firewalls is allowed to communicate to another firewall. Between the two firewalls is my take down zone. This means if they happen to break through the firewall all they will get are servers that can be taken down anyways.

    ---These take down servers are virtual machine based. So if a machine goes down, who shives a ghit because you just shut down the VM, copy the old one and restart it.

    Lets assume what you say is correct. First, what protections do you have vs the hypervisor running the VMs? How do you prevent starvation of resources by de-fragmenting ill formed packets? If you don't "correct broken packets", then what prevents a fragrouter-like attack right through your network?

    As per your answer of shutting down and reloading, that is not an answer to bad rules that can almost never work, for they will persist until you fix them. Then, when you bring them up, they will be hopped over again.

    (trimmed gobbledegook about unhackable firewalls)

    You can think that you have an unhackable setup. Fine. Perhaps you will investigate what I said, and might take action to test what I claim. But aside that you are probably just as vulnerable as the rest. All that has to really be done is your border router feed bad updates to machines requesting OS updates. Of course, crypto signatures will catch that they don't sign, but that's where we use old packages with known vulnerabilities. I'm sure in your course of duty you don't check the package date, nor do most update programs. Or, perhaps somethings watching for passwords on your external firewall. There's a nice tool called dsniff that does just that.

    In the real world, if you want an unhackable network, you build the network with no external connections. It's as simple as that. The military understands that. Power companies understand that. Industrial control designers understand that. If you want to have a facade that you somehow can super-firewall so that no hacker can get in, so be it. Whatever you put on the internet can potentially end up everywhere. Just look at Wolverine Workprint or multitudes of sex tapes or other media. I'm sure there's some Presidential Helicopter schematics going around in Islamic areas right now, according to my sources.

  • secure OS (Score:2, Insightful)

    by Naraki ( 1535763 ) on Saturday April 18, 2009 @09:30PM (#27632179)
    Just look at one of the BSD's they have a track record for being secure and no messy cert issues like debian had. Also you might want to consider that the OS isnt the only attack vector.
  • by Microlith ( 54737 ) on Saturday April 18, 2009 @09:49PM (#27632305)

    Just like japanese has a more or less standardized process for displaying japanese words in the roman alphabet

    Mashing everything into the roman alphabet isn't necessarily the best thing. The Japanese don't use romaji at all in any real contexts. So it's a more complex script? Make sure Unicode supports it. Update the rendering engines to handle it. No sense in forcing people to give up part of their language just to use software.

    another language becoming the defacto standard for computer savvy Tibetans

    In case you hadn't noticed, English was already the worldwide de-facto standard for computing. It isn't computing professionals these programs are localized (properly) for in most cases. Also, changing your society to match the capabilities of some software is -always- the wrong way.

  • Re:Huh? (Score:1, Insightful)

    by Anonymous Coward on Saturday April 18, 2009 @09:57PM (#27632371)

    There are thousands of attack vectors into linux, far more than there are into any windows software.

    How much source code have you verified on your linux install ? Your windows install has at least been verified by a known party. Anyone wanting to get into your system will have to get past microsoft first.

    Now in theory getting into a linux system would require getting past redhat or canonical. In practice, as several breaches have demonstrated, compromising ANY widely used project (who accept volunteers as full comitting members merely for showing a bit of ability) would be sufficient.

    How many chinese spies are working on the linux kernel. Improving it, yes, but also ... Do you dare to bet your life on the answer being zero ?

    A full linux install being trustworthy is dependant on tens of thousands of coders all being trustworthy (since in practice, nobody checks one another's work, and no "real" security audits are being conducted. Checking personnel is considered heresy, refusing code based on lack of credentials is something that cannot ever be mentioned).

    You want to be secure against chinese interference ? Go to microsoft or ibm. Not because they do not have chinese spies in their organisations, but because they most likely do not have 1000 chinese spies in them. Also, those spies have to get past at least a single code review (one hopes) before compromising all customer's security.

    Sorry to break the news to you : open source software, in it's current form, cannot defend against a concerted attack by any large groups of individuals. It can't be done. It doesn't have to be the chinese. It's a matter of time before islamic terrorists compromise projects (they certainly have attacked quite high-value targets on the internet aplenty. Most attacks are stupid. Some (currently a very, very tiny fraction) aren't). It's a matter of time before India breaks into open source projects. Keeping the NSA out of linux systems ... can't be done.

    And that's the best case scenario. A code compromise cannot be avoided if you can't trust the contributors. Trusting people means checking them first. Nobody's doing that.

    Checking the contributions require you taking into account every other piece of software it might interact with. It's like playing a chess game with chinese hackers, only you can't see their moves, since other projects don't concern you, you can only see your own moves.

    And to be completely honest ... are you seriously hoping to hide a large group of Tibetan exiles from China's billion people ? You need to downsize seriously, and split the organisation.

    Hiding an entire government from a billion eyes inside free countries where Chinese can move without anything more thorough than a weapons check (in many countries not even a weapons check) ? Sorry but it can't be done.

    Sounds like a troll talking.
    The above is obviously by someone that does or has not worked in software development in any capacity. I can tell you for a certainty that code reviews in closed source software houses rarely happen. Managers think they take too much time and just want code churned out.

    With open source projects the code is out in the public for anyone to review. Patches in the open source community do get code reviews before being approved.

  • Re:Huh? (Score:2, Insightful)

    by Scullywag ( 2299 ) on Saturday April 18, 2009 @10:06PM (#27632437)

    How much source code have you verified on your linux install ? Your windows install has at least been verified by a known party. Anyone wanting to get into your system will have to get past microsoft first.

    And there are THOUSANDS of virus, trojans, keyloggers, etc. that show that you don't need source code to bypass Microsoft's (or anyone esle's) security.

  • Re:Huh? (Score:2, Insightful)

    by Scullywag ( 2299 ) on Saturday April 18, 2009 @10:19PM (#27632519)

    Windows : you're trusting Microsoft, the State of Massachusetts and the Federal Government of America.

    I'd rather not. Those are all American, and are working for America's benefit. I'm not American (or Chinese either), so almost by definition, they are not working for my benefit. So no thanks, I'd be rather naive to blindly trust them.

  • Re:Huh? (Score:5, Insightful)

    by exponential ( 1415291 ) on Saturday April 18, 2009 @10:25PM (#27632569)

    Oh that wonderful little drama again.

    Had you followed that event a bit more closely, you would have known that little snippet of code had zero (yes, none, zilch) possibility of getting into Linus' branch, where all the public releases are made. In fact judging from your post I'd say you have no idea of what really happened at all.

    Do you seriously think they only introduced one problematic piece of code ?

    No. I think it's one less than that. It might surprise you, but unlike some proprietary software, the big oss projects aren't big piles of mysterious crap, the developers really do understand their code.

    News of successful incursions will, for obvious reasons, not be released until untold damage is done

    With countless diligent people like you keeping a watchful eye, I'm sure any news of successful incursions into free/open source software will be promptly released when it happens. Or perhaps even earlier than that!

  • Re:Huh? (Score:2, Insightful)

    by gavron ( 1300111 ) on Saturday April 18, 2009 @10:32PM (#27632621)
    You need to read this link: http://tinyurl.com/dgwnl4 [tinyurl.com]

    After you learn to speak and read English it will all make sense.

    E

  • by speedtux ( 1307149 ) on Sunday April 19, 2009 @12:18AM (#27633335)

    ASLR in Linux is a novelty and usually not the default. Just like selinux is a joke.

    Yes, and there's a reason for that: the Linux community apparently doesn't want them and doesn't find them useful. If enough people wanted them, they'd be on by default in the major distributions.

    To bad MS has figured out how to implement it consistently.

    Yes, and that pretty much tells you what's wrong with Microsoft: it's a bunch of managers deciding top down what security mechanisms Windows should use, and then they direct their masses of programmers to implement that "consistently", and finally it gets shipped with the next major release, whether users want it or not.

    The trouble with the Microsoft approach is that nobody in the world is smart enough to design security correctly in such a top-down way. Based on a bunch of papers half a dozen years ago, Microsoft may have jumped onto the ASLR bandwagon, but that doesn't make it a good security solution.

    And this top-down, planned approach is the reason Microsoft keeps screwing up and why they need to spend so much money developing software that other people develop with a fraction of the investment. It sounds good on paper, and control-freaks love it, but it simply isn't a good way of creating a complex software system.

  • by SmallFurryCreature ( 593017 ) on Sunday April 19, 2009 @12:42AM (#27633499) Journal

    Remind me again please which OS the botnet runs on? Thank you.

    MS embeds all kinds of code from third parties. Drivers, libraries etc etc. It has been shown time and time again that there are huge security holes in MS code, holes that are actively exploited. It ain't for nothing that when the NSA wanted to make a proof of concept secure OS they choose linux.

    You got a point, how can you trust any OS if you have not checked the code. Where you take a dive of the deep end is that you then suggest that MS can be trusted to check the code for you. Not trusting say Red Hat blindly that they checked all the code is sensible, trusting Microsoft that they checked all theirs is just plain silly. If they had, they wouldn't have so many bugs. And your fate in your goverment is bordering on the insane.

    Anyway, that same goverment checks linux code. So either both are to be trusted or neither is.

  • Re:Huh? (Score:3, Insightful)

    by J Story ( 30227 ) on Sunday April 19, 2009 @01:16AM (#27633721) Homepage

    Open a prompt ... type dpkg -l

    That's the list of software that you have to trust not to contain a backdoor in order to trust your own system.

    The list of contributors, package maintainers, webserver admins, ... that are implicitly trusted is ridiculously long.

    Refresh my memory: how many lines of code does Microsoft say Windows has these days? Given some of Microsoft's incredible QA fails (the most recent to block access to Google) I am sceptical that they have set the bar very high.

    If we can surmise anything from their OOXML fiasco, it is that Microsoft values obscurity over comprehension, product lock-in over the rigour of open debate, and most of all that Microsoft neither understands nor is able to implement its own specifications. There may or may not be intentional backdoors in Microsoft products, but given the thinking that drives product development I doubt that malware authors worry about job security.

  • by gd ( 86983 ) on Sunday April 19, 2009 @01:28AM (#27633789)

    ... you need to choose a competent admin. Remember, security is a process, not a product ...

  • Re:Huh? (Score:2, Insightful)

    by eiMichael ( 1526385 ) on Sunday April 19, 2009 @01:37AM (#27633835)

    Linux : you're trusting everyone, everywhere with the basic smarts of getting code accepted in an open source project.

    OR They don't trust those people and take the code, get some talented people to audit it, tweak it to perform well for their purpose and use that version. Auditing/Creating future patches and updates also.

    With Windows you can't do that, you MUST trust Microsoft. With FOSS, you don't have to trust anybody.

  • by likecheese ( 1188103 ) on Sunday April 19, 2009 @01:38AM (#27633845)

    when the Chinese invaded. He has consistently supported democracy, equality, and human rights.

    The Dalai Lama may "consistently" espouse such views in public, but his behavior outside the (western) public eye tells a different story. Even for Tibetans now residing on free soil in places such as the US, UK, Germany, and Switzerland, he behaves as a dictator-for-life and demands that they follow his decrees in order to receive travel papers, work permits, food and living allowances, etc. His regime unapologetically practices religious apartheid. Unbelievable? Check out the information and first-hand accounts provided by http://www.westernshugdansociety.org/ [westernshu...ociety.org] and make up your own mind.

  • by obarthelemy ( 160321 ) on Sunday April 19, 2009 @01:49AM (#27633891)

    It's not about the OS. I've had Windows servers remain safe for years, and Linux servers be subverted in days.

    Security is an eco-system, not an OS, for example:
    - granting and removing access rights, in a very conservative and up-to-date manner
    - keeping an audit trail of every access
    - locking confidential info so it never gets onto a laptop's HD
    - having backups
    - securing every cog and wheel of the system: client PCs, routers, servers, backups, admin stations...
    - locking down the weakest point: users (weak passwords, copied files, printouts, espionage...)
    - and many more issues.

    In the big picture, the OS is fairly irrelevant. It's only a very small part of the whole system. The whole "we need to be safe - let's switch to Linux" is wrong and shows a tremendous lack of understanding of the issues.

  • by speedtux ( 1307149 ) on Sunday April 19, 2009 @02:47AM (#27634105)

    Combining letters aren't an intrinsic necessity in any language, they are an affectation and a mechanism for keeping people illiterate. European languages used to have them and got rid of them because the only purpose they serve is to restrict access to reading and writing.

    Tibetan can be written just fine in an alphabetic style. It would be prudent for the Dalai Lama to make that the standard for the Tibetan community.

  • Re:Huh? (Score:4, Insightful)

    by Bill, Shooter of Bul ( 629286 ) on Sunday April 19, 2009 @03:01AM (#27634173) Journal
    Why are you trusting Massachusetts,or the US Government? I'm not sure I understand why. Especially, Massachusetts seems weird. Do they have some elite code review department I am unaware of?
  • by joe 155 ( 937621 ) on Sunday April 19, 2009 @05:22AM (#27634767) Journal
    What I would try and convince the people of who you are working with is that security is a continuum running from almost totally secure to almost completely insecure (to the extent that there is such a thing), so in reality pretty much no OS will be completely secure. What is interesting, I think, is that usability is inversely related to security. If you imagine that an OS which wouldn't allow you to write to the disk and wouldn't allow you on the internet you can imagine that when security is that high you'll get almost no usability.

    with that in mind I would advocate trading a lot of usability for security - you could have an encrypted disk and run a terminal with something like nano and lynx installed - this would be pretty damn secure especially if you were running it on fairly secure hardware (did Intel ever fix the security issue that theo de raat was talking about in the Core 2s?) with something like OpenBSD as the core. This, I think would allow you (after some modifications) to allow pretty robust security. A downside though is that I'm pretty sure you might be compelled to run in English as I'm not sure how good the language support is for this sort of thing (with no GUI I can't imagine it would be great). Even so, I think if your data security is important (and lets face it, in this situation it probably is) then the trade-off might be worth while.

    Of course, perhaps the more gaping hole in security is the user themselves, who could always reveal all the information they had to anyone... XKCD said it better - http://xkcd.com/538/ [xkcd.com]
  • Re:Huh? (Score:3, Insightful)

    by SanityInAnarchy ( 655584 ) <ninja@slaphack.com> on Sunday April 19, 2009 @09:45AM (#27636075) Journal

    The hierarchy of review or acceptance is a joke. Nobody checks even one tenth of the packages installed on even a basic redhat install. It just doesn't happen.

    Citation needed.

    And I was pointing out here that you did not even mention it as a possibility.

    With open source, you basically do not have the (reasonable) option of trusting the author(s). Your only option is checking every last bit yourself.

    False dichotomy. You could also reasonably trust those responsible for committing changes, or publishing them. You could also hire someone to review every last change yourself. You could also assemble only packages you trust and thus provide a minimal, stripped-down version.

    With Windows, those last two options are not realistic, and I see no reason to trust someone at Microsoft more than, say, Linus Torvalds or Andy Tanenbaum -- especially when Microsoft does not necessarily have a secure system as a priority.

    And even if you'd want to do that, perhaps there are 2000 people world-wide capable of a thorough code review.

    That is quite insanely arrogant. There are only 2000 people competent at code-reviews in the world? Really?

  • Re:Huh? (Score:3, Insightful)

    by RiotingPacifist ( 1228016 ) on Sunday April 19, 2009 @10:36AM (#27636409)

    We're not talking about a desktop system, securing a custom network IS gonig to take planning and time, I'd hazard a guess that as SELINUX has been around longer, it better documented and more secure, additionally as redhat based distros (RHEL,centos,fedora) all come with a fair bit of SELINUX setup for you it's not too hard to tweak from that.

  • by likecheese ( 1188103 ) on Sunday April 19, 2009 @12:49PM (#27637271)

    http://www.westernshugdensociety.org/ has nothing to do with China, despite persistent allegations to the contrary. The organization was formed by western Buddhists and some brave Tibetans who were willing to defy the Dalai Lama at great risk to themselves and their families.

    The issue under protest is not political...it is merely religious freedom. The Dalai Lama has cracked down on Tibetans who wish to practice in their pure lineage rather than the mish-mash lineage created solely by the Dalai Lama, in an attempt to unify Tibetans' religious practices in order to maintain control over them for political purposes.

    How ironic that the Dalai Lama publicly laments that people within Tibet no longer have the freedom to practice, yet he interferes with that same freedom in Tibetan monasteries and enclaves throughout the world.

  • by likecheese ( 1188103 ) on Sunday April 19, 2009 @01:29PM (#27637551)

    There's plenty of information there.

    Pictures of posters refusing entry or service to those who defy the Dalai Lama's decrees: http://www.westernshugdensociety.org/reports/untouchables-shocking-posters-in-monastery/ [westernshu...ociety.org]

    Documentation of the oaths exiled Tibetans must sign (swearing to shun anyone who defies the ban) in order to obtain travel papers, housing, food assistance, etc.: http://www.westernshugdensociety.org/en/reports/oaths/ [westernshu...ociety.org]

    Secretly recorded speeches by the Dalai Lama detailing the religious ban: http://www.westernshugdensociety.org/en/news/speeches-endorsing-the-ban/ [westernshu...ociety.org]

    An AlJazeera investigative report shot in India: http://english.aljazeera.net/programmes/peopleandpower/2008/09/200893014344405483.html [aljazeera.net] (linked to from the site)

    And there's a lot more!

  • by mellon ( 7048 ) on Sunday April 19, 2009 @05:51PM (#27639725) Homepage

    It's not a question of purists. There aren't that many people in the world who read Tibetan. So you'd more likely do harm than good this way. Furthermore, Tibetan Unicode support is very good, so there's no need to redesign the type system. For instance, let's see what happens here:

    à½-à½à¾à½à¼à½à½à½¦à¼à½-à½'à½à¼à½£à½à½à½¦à¼

    Oh, the humanity. Apparently slashdot is not unicode-safe.

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...