Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Security IT

One Laptop Per Child Security Spec Released 253

juwiley writes "The One Laptop Per Child project has released information about its advanced security platform called Bitfrost. Could children with a $100 laptop end up with a better security infrastructure than executives using $5000 laptops powered by Vista? 'What's deeply troubling — almost unbelievable — about [Unix style permissions] is that they've remained virtually the only real control mechanism that a user has over her personal documents today...In 1971, this might have been acceptable...We have set out to create a system that is both drastically more secure and provides drastically more usable security than any mainstream system currently on the market.'"
This discussion has been archived. No new comments can be posted.

One Laptop Per Child Security Spec Released

Comments Filter:
  • Even worse (Score:2, Interesting)

    by imipak ( 254310 ) on Wednesday February 07, 2007 @07:04PM (#17927532) Journal
    Even the crappy POSIX-compliant NT ACL model is far superior to the standard unix WRX model. No, before you start, as it happens I loathe Microsoft in particular (and proprietary vendors in general) and use Free software wherever possible even when it's technically inferior -- as is the case with filesystem permissions, where Linux has been behind Windows since NT 3.51, 1993 IIRC. Yes I know about the various security add-ons and kernel mods, grsec, SELinux, blah blah. Doesn't change a thing.

    Netware was also better in this respect whilst it was still in mainstream use, despite being more of a runtime system than a real OS.

  • by SilentMobius ( 10171 ) on Wednesday February 07, 2007 @07:24PM (#17927788)
    From TFA
    "Beyond cyberthreats, the XO laptop will have an anti-theft system designed to render stolen laptops useless. Each XO is assigned a "lease," secured by cryptography, that allows it to operate for a limited period of time. The laptop connects to the internet daily and checks in with a country-specific server to see if it's been reported stolen. If not, the lease is extended another few weeks."

    Congratulations, you have destroyed this projects credibility, desirability and much of the good will that the open source community was providing.

    I wonder this would rule out any interaction with the GPL v3?
  • by cduffy ( 652 ) <charles+slashdot@dyfis.net> on Wednesday February 07, 2007 @07:51PM (#17928126)
    Once you do that, it isn't the traditional Unix model anymore -- it's something more like POSIX ACLs, which Linux *does* support, and which *does* provide the ability to give one group write while another has read.

    I think the traditional UNIX model is too simple to call bolting on an List of names and permissions used for Access Control (in place of the user/group/mask approach) a "trivial tweak".
  • It isn't about ACLs. (Score:5, Interesting)

    by jhantin ( 252660 ) on Wednesday February 07, 2007 @07:52PM (#17928146)

    It's the sandboxing. A program run by a given user doesn't automatically get the user's full permissions -- it only gets a small subset. For example, it can't open files from the user's home directory other than by calling a trusted system File Open dialog, which allows the user to select the file and returns an open file handle to the application (or in OLPC's case hardlinks the file into the chroot jail).

    In terms of research projects, see the secure scripting language E [erights.org] and the proof of concept CapDesk [combex.com].

    Interestingly, in the commercial world it only seems to turn up in safe bytecode runtimes -- there's very little out there for native code. For an example of something similar in concept look at JNLP [sun.com] or ClickOnce [microsoft.com] deployers.

  • by Anonymous Coward on Wednesday February 07, 2007 @07:55PM (#17928182)
    "Manufacturing data includes two unique identifiers: SN, the serial number, and U#, the randomly-generated UUID."

    "On first boot, a program is run that asks the child for their name, takes their picture, and in the background generates an ECC key pair. The key pair is initially not protected by a passphrase, and is then used to sign the child's name and picture. This information and the signature are the child's 'digital identity'. The laptop transmits the (SN, UUID, digital identity) tuple to the activation server. The mapping between a laptop and the user's identity is maintained by the country or regional authority for anti-theft purposes, but never reaches OLPC."

    Remember kids, file sharing is illegal and there is a database full of mugshots for the RIAA to find you.
  • by dewarrn1 ( 985887 ) on Wednesday February 07, 2007 @08:33PM (#17928538)
    From the spec [laptop.org] linked from the article, section 11:

    1227 In Norse mythology, Bifrost is the bridge which keeps mortals, inhabitants of
    1228 the realm of Midgard, from venturing into Asgard, the realm of the gods. In
    1229 effect, Bifrost is a powerful security system designed to keep out unwanted
    1230 intruders.
    1231
    1232 This is not why the OLPC security platform's name is a play on the name of the
    1233 mythical bridge, however. What's particularly interesting about Bifrost is a
    1234 story that 12th century Icelandic historian and poet Snorri Sturluson tells in
    1235 the first part of his poetics manual called the Prose Edda. Here is the
    1236 relevant excerpt from the 1916 translation by Arthur Gilchrist Brodeur:
    1237
    1238 Then said Gangleri: "What is the way to heaven from earth?"
    1239
    1240 Then Harr answered, and laughed aloud: "Now, that is not wisely asked; has
    1241 it not been told thee, that the gods made a bridge from earth, to heaven,
    1242 called Bifrost? Thou must have seen it; it may be that ye call it rainbow.'
    1243 It is of three colors, and very strong, and made with cunning and with more
    1244 magic art than other works of craftsmanship. But strong as it is, yet must
    1245 it be broken, when the sons of Muspell shall go forth harrying and ride it,
    1246 and swim their horses over great rivers; thus they shall proceed."
    1247
    1248 Then said Gangleri: "To my thinking the gods did not build the bridge
    1249 honestly, seeing that it could be broken, and they able to make it as they
    1250 would."
    1251
    1252 Then Harr replied: "The gods are not deserving of reproof because of this
    1253 work of skill: a good bridge is Bifrost, but nothing in this world is of
    1254 such nature that it may be relied on when the sons of Muspell go
    1255 a-harrying."
    1256
    1257 This story is quite remarkable, as it amounts to a 13th century recognition of
    1258 the idea that there's no such thing as a perfect security system.
  • by kelnos ( 564113 ) <[bjt23] [at] [cornell.edu]> on Wednesday February 07, 2007 @09:04PM (#17928852) Homepage
    Are you just trolling?

    If you'll RTFA (yeah, I know, no one does that...), the system can be completely disabled if the user so wishes. The purpose of the PKI is not to force someone to only use certain software; it's to help ensure that security updates haven't been compromised before getting to the laptop.

    As for installing another Linux distribution, would that even be possible at present? I doubt any other distro would run properly on the OLPC's custom hardware without extensive modifications. Sure, you can argue "but they should have the freedom to break it if they want" -- and they do, as the article says. All this stuff can be disabled. Overwriting the OS should disable the anti-theft daemon, since the anti-theft system is implemented entirely in software.

    I think the anti-theft provisions that turn the laptop into a brick are a bit much, but the actual spec (which I'm sure you didn't read either, as you're misquoting it) notes that the lease period can be set to any value (chosen by the country manager who distributes the laptop). A lease period of 3 months is given as an example. And in extreme circumstances, a USB drive with credentials that can be used to extend the lease period without needing access to the internet.

    At any rate, the spec mentions that the anti-theft system is only installed and enabled on the request of the country purchasing the laptops. So it's not like the OLPC group is forcing this on anyone. If the countries are spending the cash on these things, I think it's reasonable that they should be able to try to protect their investment.

    I have a decent number of reservations about the entire OLPC program, but c'mon, at least don't make up shit about it that isn't true.
  • by fang2415 ( 987165 ) on Wednesday February 07, 2007 @09:07PM (#17928880) Journal

    FTFA:

    Beyond cyberthreats, the XO laptop will have an anti-theft system designed to render stolen laptops useless. Each XO is assigned a "lease," secured by cryptography, that allows it to operate for a limited period of time. The laptop connects to the internet daily and checks in with a country-specific server to see if it's been reported stolen. If not, the lease is extended another few weeks.

    If the lease expires, the XO's internet connectivity is turned off, and shortly thereafter the whole computer becomes a brick. In the case of an area without internet connectivity, a local school can extend the lease from its own server by Wi-Fi or with a USB dongle.

    I've been hearing that they were going to do this for a while, and I think it's a terrible idea that will kill a lot of the potential of this wonderful project. What happens if these kids go to another area for a month or two and want to take the thing with them? Tough, it's a brick. Not to mention if they want to keep it and take it out of area after they graduate.

    There's also this deeply worrying gem:

    Users can manually assign more power to a particular program through the security control panel, but even there, they are limited.

    "You cannot request a set of permissions that let you do bad things," Krstic said.

    So much for a computer that students will have complete control over, can take everything apart and put it back together, etc. For a project so focussed on empowering kids as users, these two parts of an otherwise promising security plan sound an awful lot like the computer having control over the user, not the other way around.

    I hope I've got this wrong, I hope that we aren't actually introducing third world kids to the world of DRM and Treacherous Computing, where "their" machines do things they can't control, where they "lease", not own. If so, it's really too bad. Yet another missed opportunity...

  • by pla ( 258480 ) on Wednesday February 07, 2007 @09:28PM (#17929058) Journal
    You do realize Microsoft hired Dave Cutler (the guy who created VMS) to design NT, right?

    Yes, actually, I do. And I'd say most of the same complaints about VMS - Except that Windows doesn't have the rock-solid stability to make up for the hellishness of use.



    Yeah, because right-clicking a file or folder, selecting Properties, then choosing the confusingly labeled Security tab is difficult.

    Hypothetical situation for you...

    You have Domain Admin (but not EA) on a standard mid-sized multi-site corporate network. A finance-related folder on your NAS has users, local groups, domain groups, and forest groups set on it, including possibly-contradictory local and inherited permissions.

    Quick, in 15 seconds or less, tell me who in the Dallas Accounting office has write permission to the 2006 internal audit folder.


    You can fairly plead that you couldn't even have such a situation under Linux (not with the stock FS permission system, anyway), but I would say the same thing in support of my stance.
  • by a.d.trick ( 894813 ) on Wednesday February 07, 2007 @09:37PM (#17929118) Homepage
    There's another major drawback you missed. Managing permissions on NT systems is quite a pain. It often takes more work, and more repeating yourself to get what you want. This means that there's a higher chance that people will make a mistake when setting permissions. Also people are more likely to leave files with inappropriate permissions because they are too lazy to go to the work of doing it right.
  • Who holds the keys? (Score:3, Interesting)

    by Louis Guerin ( 728805 ) <guerin.gmx@net> on Wednesday February 07, 2007 @10:19PM (#17929442)
    As with any sufficiently strong security system, the weakest link I foresee will be the people. In this case, not the people who *use* the XO, but the people who control various points along the keychain: developer keys, activation keys, etc.

    The people who hold these keys are plenty vulnerable to corruption, intimidation and good old-fashioned trickery. This doesn't invalidate the security model, but I'd be interested to know how they mean to preserve the integrity of the keychain in case of theft, misuse, disaster, going-out-of-business and aliens.

    L
  • by r00t ( 33219 ) on Wednesday February 07, 2007 @11:22PM (#17930004) Journal
    Basically all UNIX-like systems support ACLs now.

    The ACLs are usually almost like the ones Windows uses, with a few minor differences:

    a. UNIX-like systems normally still use rwx.
    b. Windows normally disables checking permissions on parent directories.
    c. Windows does a funny sort of inheritance thing that kills performance. (thus the above speed hack)

    The stuff OLPC is using is way more powerful though. An ACL on your own data file will not protect your data from being damaged by a trojan. The OLPC project uses mandatory access control (mostly a domain-type-role enforcement mechanism) to stop such problems.

  • Re:Even worse (Score:3, Interesting)

    by Mad Merlin ( 837387 ) on Wednesday February 07, 2007 @11:24PM (#17930034) Homepage

    ...but then you have to maintain all the symlinks and hardlinks and make sure THEY have the proper permissions.

    Symlinks don't have permissions of their own, they inherit the permissions of whatever they link to.

    I can think of 4 apps on my little Linux box that REQUIRE that they be run as root, etc.

    What apps? I've never run into an app that requires root when it shouldn't. Not even various commercial software makes that mistake.

    In fact, the assumption that root will be running almost everything seems to be built into Linux and most of the Linux distributions I've used.

    What distros? No distro I can think of (Gentoo, Fedora, (K)ubuntu, Suse, Debian, ...) assumes that root will be the regular user.

  • by r00t ( 33219 ) on Wednesday February 07, 2007 @11:37PM (#17930142) Journal
    The concept, called mandatory access control, goes back decades. It comes from the US military. It was originally based on the classified info system (SECRET, TOP SECRET, etc.) and was intended to stop insiders causing leaks. Insiders tend to make dumb security mistakes, and sometimes even sell secrets to the enemy. Mandatory access control stops that cold.

    A few years back, the NSA wrote an implementation of this for Linux. It's called SE Linux. It's a bit modernized, supporting more than just the old military-style security levels.

    Linux also has CLONE_NEWNS, which is based on features from an old research OS called Plan 9. That, combined with some neat tricks involving mount points, gives you something like chroot() with extra power.

    Most of the code has been around for years. OLPC just integrated it nicely into the app installer and made the user experience tolerable.

"The four building blocks of the universe are fire, water, gravel and vinyl." -- Dave Barry

Working...