Red Hat & Dell Host Open Source Security Summit 79
wishus writes "Red Hat and Dell said they would co-host an Open Source Security Summit. 'Join Red Hat, Dell and experts in enterprise security from around the world for a summit on securing infrastructures with open source software.'"
So.. (Score:1, Interesting)
Re:So.. (Score:2)
Re:So.. (Score:2)
I want something like Reiserfs (ie, full unix privs and soon ACLs) that just happens to work wonderfully over a network and is protected by SSH.
But, the solution might not be in the filesystem. Perhaps we shouldn't waste time securing that when it's just the network that needs securing. NFS is perfectly secure on a two-computer network, so maybe we need to use VPNs (with SSH-level security) and simply run NFS over them).
I'm looking into this same thing right now. I want to store all my files on a server machine and pull them from any of the client machines, without letting anyone else on the switch sniff them. SMB is a bit more secure, with a password and all, but it sends the data in plaintext, and doesn't properly support Linux permissions, let alone ACLs. (That I know of.)
Re:So.. (Score:2)
The same goes for the Linux security model. Great strides have been made in making the file permissions very secure, but the main problem goes beyond the basics of file permissions, group ownership, etc. Real masters at the file permissions have an almost zen-like control over their systems, bending the security model to the point just before it breaks, to achieve maximum security over a file system. The trick is not knowing which permissions allow or deny access to a file, but rather how they interact with each other.
Re:So.. (Score:1)
Re:So.. (Score:1)
a good thing... (Score:4, Insightful)
Dude! (Score:5, Funny)
Imagine ads with "Steven" saying, "Dude, you're compiling a kernel."
*shudder*
Re:Dude! (Score:3, Funny)
Re:Dude! (Score:4, Funny)
I fear that they might want to change the kernel error messages first.
Dude, you're getting a kernel panic!
Timing... (Score:3, Interesting)
Re:Timing... (Score:4, Informative)
Another dimension (Score:2, Offtopic)
Will there be fibbies running around with cameras and notepads?
How can we possibly write code to test/implement security, without looking over our shoulders?
Re:Another dimension (Score:1)
Welcome to Slashdot, man. :)
Re:Another dimension (Score:1)
Toronto or Montréal would be more practical venues (Score:2)
First of all, you can avoid the mounting insanity at U.S. and disorganization airports. Second, non-U.S. security experts would be able to attend without worrying if the door prize is a matching pair of metal bracelets. Lastly, U.S. security geeks can get some time in some nice cities.
Opensource the Dell Dude? (Score:5, Funny)
User Friendly Security (Score:5, Insightful)
The problem is, so much of the strong reasons for switching to Linux (aka security) are hard to realize in a user friendly sort of way.
For instance, getting OpenSSH up and running to integrate a Windows box to be able to ftp from/to the secure Linux install takes alot of work, and fishing around. It's an immediate turn-off.
Then there's wireless networking. Oh by the way, you have to become a kernel compile afficianado to get these wireless drivers workers.
If we're talking RedHat/ here and security in the same breath, then why not focus on a user friendly install for security. Including a side howto on how to possibly go get Putty up and running. And how you're going to need to generate your keys with ssh-keygen type 2 rsa and then load them into puttygen which will convert them. And oh by the way, the converted private key will also work under SecureNetTerm. Don't forget something like this for your private keys in you $home/.ssh dir:
chmod 600 id_rsa
cp id_rsa authorized_keys2
It wasn't that easy, but it should be, and it could be.
Re:User Friendly Security (Score:3, Interesting)
Again, in general I think that Microsoft has deployed some simple security tools like ICF, the MBSA, and even Windows Update that Redhat can't really compete with. Even up2date is a little more complicated than most people want to deal with. The RHN is a good service for enterprises, but for Joe User that doesn't want to pay it's just not that great. I have recently converted a family member to Redhat from Win2k, and one of their complaints is their inability to update their PC because "Free service limited due to high load..." Most people don't know what that means and don't care...it discourages them from even updating their computers at all. Overall, I think that Microsoft is winning the user-friendly security tool war, even though their software is not secure.
Re:User Friendly Security (Score:3, Interesting)
It would be fantastic if their user friendly firewall did all the work rather than part of the work, but the ability to root a box in 5 ways instead of 10 is still the ability to root. The real danger is in convincing the users that the firewall makes them safe and therefore need not be vigilant or suspicious. That creates users who do not patch their software, making the inevitable breach more disasterous.
In fact, your quote, "Microsoft is winning the user-friendly security tool war, even though their software is not secure," is rather telling. They aren't winning anything related to security. They're succeeding in generating revenue through marketing and slogans, which they've always done. The security of their products is not enhanced in any fashion by their user friendly firewall in the long run. If you think it takes a public relations department and TV commercials to win the security tool war, you simply don't have a clue and probably don't want one.
Huuh? (Score:2)
What's all that crap you're going through with ssh?
I haven't done a *SINGLE* thing to the SSH config on my desktop 7.3 box and I can SSH into it from work with no problem using TeraTerm. The only config issues I had to deal with were port forwarding on my wireless AP/router, but that had absolutely nothing to do with RedHat.
I don't know how you got Score: 5 - It should be -1 Troll.
Re:Huuh? (Score:2)
My Linksys Wireless PCI card doesn't work.
I port forwarded my router as well, it was very easy.
Wireless PCI cards? (Score:2)
I tried no less than *two* different PCI WLAN approaches in my desktop. One was a D-Link DWL-520 (Basically identical to Linksys' offering) - 50%+ packet loss under Windows if it even ran at all, 25%+ under Linux. Prism2 based PCI solutions *SUCK* and it's unfair of you to blame that on Linux when it's even more difficult under Windows.
I also tried an Orinoco PCI. Worked flawlessly under Linux with no trouble whatsoever, it NEVER worked under Windows. (98 or 2000, multiple reinstalls of each) It would show 100% signal strength, but never was able to send/receive data.
(I gave up and ran a Cat5 cable downstairs until I found out about the Linksys WET11 a month later)
Re:Huuh? (Score:1)
But apparently, even if the model is new, the chip is fairly common.
In fairness to the topic, I'll take back what I said about wireless. Because, I really wasn't ranting on device support.
In all, I'd have to say it is excellent.
I was ranting on security. If you're new to OpenSSH, it aint easy to use from the install get go, though, sshd is installed and setup sort of.
Re:User Friendly Security (Score:1)
You mean, apart from doing 'chkconfig --level 345 openssh on' or running 'setup' and then either reboot (*shudder*) or typing 'service sshd start'?
You might want to look at the Getting Started Guide RedHat provides for free on their website - no amount of trying is a substitute for RTFM
And please don't blame RedHat for possibly poor ssh documentation that's part of one package.
Re:User Friendly Security (Score:1)
I plopped the Knoppix 3.1 CD in my drive, booted my laptop, and surfed the web on my wireless card. Easy installation of wireless network cards CAN be done, it just usually isn't. (yet)
And right next to this story... (Score:5, Funny)
Microsoft Issues Windows Security Warning
gotta love it
Re:And right next to this story... (Score:2)
Oh, the irony...
Design, Development, Deployment "load marks" (Score:5, Interesting)
The risks,issues and solutions for providing a more secure operating and application enviroment have been known for decades. Those who do not already comprehend the issues and are willing to learn, should take some time out to listen to some of the speeches at Dr. Dobbs Journal's Technetcast security archives [ddj.com], starting with Meeting Future Security Challenges [ddj.com] by Dr. Blaine Burnam, Director, Georgia Tech Information Security Center (GTISC) and previously with the National Security Agency (NSA)
The "security rules" for Unix based system and application development are well known, although not widely taught. See Secure Programming for Linux and Unix [dwheeler.com] by David Wheeler. Although Microsoft's NT,2000 and XP are not Unix based, a lot of the core above "rules" apply or have direct or indirect equivalents
Because some developers ignore similar above rules, the design and implementation of some applications and servers are just too unsafe to use in the "open ocean" of the internet.
Numerous security experts have railed against Microsoft's lack of security, best summed up by Bruce Schneier Founder and CTO Counterpane Internet Security, Inc who rightly stated
However Microsoft's products are not alone in the presence of vulnerabilities, this is a major issue for Linux/BSD and Unix as well as any other OS and vendor.
In a recent speech Fixing Network Security by Hacking the Business Climate [ddj.com] Bruce Schneier claimed that for change to occur, the software industry must become libel for damages from "unsecure" software, however historically, this has not always been the case, since most businesses can insure against damages and pass the cost along to the consumer.
The Ford Pinto and more recently the Ford Explorer's tires are two examples of public and media pressure being more successful than just threat of lawsuits. Even so, eventually though public pressure the governments around the world have to step in and pass regulations that set up a minimum set of requirements an automobile has to meet to be deemed "road worthy". This includes crash testing as well as the inclusion of safety equipment on all models. The requirement are not constant and change to meet the expectations and demands of the public and lawmakers.
The onus is not only on the automotive industry itself but also on the users. Most countries require that all automobiles undergo regular inspection and maintain an up to date "Warrant of Fitness".
In the same way, if you want a secure IT infrastructure, eventually the software design, implementation and each deployment will have to undergo the same type of regulation and scrutiny.
For paid software distributions, this could mean just a tick list of security features and security tests to the other extreme of requiring the source code to be fully audited for government/secure deployments.
For users, this would require running a program that checks to make sure that all the required software security update/patches have been installed to the other extreme of requiring an audited deployment for government/secure deployments.
Users and vendors should be taking a more active approach, including lobbying government, to
1) set up a minimum set of expectations, in the design and implementation of internet "accessing" software ; and
2) ensure that all deployments are more securely implemented ; and/or
3) remove inherently unsecure products from the marketplace.
IMO the above three are preferable to all software vendors, including Microsoft, than attempts to allow liability lawsuits against vendors for deployments which the software vendors have very little control over.
Dude!! (Score:1)
Kernel compiles don't have to be horror stories (Score:2, Interesting)
Thankfully, they had an interface to automate that. It was a CUI, of course, because few people had the luxury of enough memory to run X11.. (Ack! I sound like my dad.. "I had to walk to school! Up hill; both ways!) But, all you had to do was run a script. Perhaps more than "./configure; make; make install," but not too involved. An entry-level sys-admin could do it. Of course, they had dead-tree instructions to guide them too; something that's missing all to often today.
Some of you may be thinking there's no need to recompile the kernel if you can just use insmod. Have you heard of the module-based rootkits? My hardened system has loadable modules disabled. If I need to compile something, I do it on another system. A little paranoia pays off in this world.
There are many things to do yet that would help people who aren't gurus create secure, hardened Linux installs. I foresee only good things coming from summits like this.
Re:Kernel compiles don't have to be horror stories (Score:2, Informative)
I think the version I had to work on was in the 3.x range. We were working with some legacy software that only runs on that version, so we were unable to upgrade. It couldn't even be made 2K compliant, but much to the management's chagrin, didn't explode afterall. In fact it's still running like a champ!
Re:Kernel compiles don't have to be horror stories (Score:2)
That's only because people don't print out the docs prior to starting their endeavours. I had a 2-inch binder filled to capacity with separator tabs before I tried my first install. Hell the full RH install guide is there in PDF form on the freely downloadble version, not to mention all the HOWTOs. I appreciate the fact that they include the entire book in the freely downloadable version.
How often do you see around here, "oh, discs 3 & 4 are the source RPMS and disc 5 is the documentation CD, so you really only need discs 1 and 2." Take disc 5 over to staples and have them make up a binder for you with some/all of the docs on the doc CD. Of course, you should give the $30 to RH instead, but still, at least you'll have paper that you can mark up and read when all you get is "No Operating System".
Re:Kernel compiles don't have to be horror stories (Score:2)
This will not help you at all. One can modify the kernel at runtime using /dev/kmem, and
you cannot protect against that (for a detailed
discussion, see this article [phrack.com]
from Phrack 58). There are rootkits out there that
use this technique.
Re:Kernel compiles don't have to be horror stories (Score:1)
Fortunately, right in the readme file, he has a patch for mem.c to disable write access to
Re:What is the deal with DELL? (Score:1)
Turn up the logic and turn down the posting (Score:2, Interesting)
What? Did you mean WITHOUT? If you didn't, then you surely have three hands, because you're talking about three different viewpoints, plus that's just not true. If you did, did you see THIS [slashdot.org] article? Hmm? Didja?
Also, what's this crap about "crap like this"? I dont' think hosting an OS conference is crap.
Interesting (Score:2)
Re:Interesting (Score:4, Interesting)
Get your facts straight before flaming please. Red Hat is doing a good job, progressively being more 'secure by default' since about RH 6.1 (took them a while though
Re:Interesting (Score:3, Informative)
Re:Interesting (Score:2, Informative)
I'll be able to check soon though, since I'm going to install 8 on the ~100 computers I admin. You're right about pre-7.1 installs, I don't dispute their poor security record at all.
Re:Interesting (Score:2)
Re:Interesting (Score:1)
IIRC, an upgrade (at least the ones I do
I recently installed a server in the following way: installed off the LAN with RH7.2 with the absolute minimum I could get away with, excepting only openssh-server (no client even). This took some 258MB only. Then I took some time installing apt on these machines (using the enabled ssh service, of course) and upgraded them to RH8 (I did this off a custom-built apt repository with rpms leaked from an ftp site as RH8 wasn't out yet
The only services open now are openssh and postfix (since it's going to be a mail gateway), both of which I had to enable. Two open tcp ports, no open udp ports, according to netstat.
So that would qualify as 'secure by default' in this set of services at least. As to others...who knows? Perhaps you run some services that are enabled by default that I don't run? (I guess X enables port 6000 by default, and I run that too, on the desktops at least, so that might be considered 'unsecure by default' perhaps.)
Re:Interesting (Score:2)
http://www.osnews.com/story.php?news_id=1883
Dell ships over 10-20% of its servers with Linux (Score:1)
Re:Dell ships over 10-20% of its servers with Linu (Score:2)
Enterprise security? (Score:4, Funny)
Does that mean a couple of red-shirts will be there?
Worf (Score:1)
West Coast? (Score:1)
I mean really, some of us only have so much money in our travel budgets...
Last Post! (Score:1)
sophisticated that nobody gets it any more except Mia Farrow. All those who
think Mia Farrow should go back to making movies where the devil gets her
pregnant and Woody Allen should go back to dressing up as a human sperm,
please raise your hands. Thank you.
-- Dave Barry, "Why Humor is Funny"
- this post brought to you by the Automated Last Post Generator...