DonationCoder.com Forum

Main Area and Open Discussion => General Software Discussion => Non-Windows Software => Topic started by: xtabber on November 06, 2015, 09:49 AM

Title: Linux and Internet security
Post by: xtabber on November 06, 2015, 09:49 AM
According to today's Washington Post, "The Internet’s future rests with a man who calls most security experts ‘completely crazy’ (http://www.washingtonpost.com/sf/business/2015/11/05/net-of-insecurity-the-kernel-of-the-argument/)"

I'd agree that Linus can be obnoxious at times (http://www.maximumpc.com/linus-torvalds-posts-angry-rant-over-sht-code/), but I would certainly not call him crazy, or even wrong-headed about security experts.  But then, I'm not a security expert.

Title: Re: Linux and Internet security
Post by: MilesAhead on November 10, 2015, 05:29 PM
Hmm, I remember reading a blog someplace where the person seriously advocated building the security into the system before the system has been made to work.  He noted that programmers leave out security measures because they are trying to get the code to work.  Then after the function is enabled they graft the security on later.  He suggested building in the security from line one of code.  Of course how to accomplish this new way of program design is never specified.

The blogger is even more inane than those people who posit that "everything should be free."  :)

Edit:  Sorry it was some time ago when I encountered the blog.  I have no clue where I could dig up the citation.

Title: Re: Linux and Internet security
Post by: Tuxman on November 11, 2015, 09:21 AM
Linux's "security" records are awful indeed. I can't understand why anyone prefers it to other systems.
Title: Re: Linux and Internet security
Post by: 40hz on November 11, 2015, 11:27 AM
It's fairly straightforward to design security into a system, which basically comes down to controlling access to memory and the supervisor. The old mainframe security was virtually bulletproof in that regard. The real problem today is that this type of security can be cumbersome to deal with on a highly interactive interrupt-driven OS targeted for workstations as opposed to something intended for servers where the allowed running processes are usually very fixed and restricted. So the security usually gets "detuned" as the saying goes, until people stop complaining. AFAIK there's no easy way to work around that, so design compromises are unavoidable.

If anybody does find a way to get the absolute best of both worlds when it comes to operational transparency and strong security, they should be pleased to know there's a very large fortune and probably a Nobel Prize waiting for them to claim it.
Title: Re: Linux and Internet security
Post by: f0dder on November 11, 2015, 11:58 AM
It's fairly straightforward to design security into a system, which basically comes down to controlling access to memory and the supervisor. The old mainframe security was virtually bulletproof in that regard.
That's only a very small part of the whole picture, though... there's a Whole Lot Of Horrible in that world because people mess up the (complicated!) security settings and then expose the boxes to the internet. Like when Anakata of PirateBay fame hacked the central Danish police mainframe (http://arstechnica.com/tech-policy/2014/10/pirate-bay-co-founder-convicted-in-denmarks-largest-hacking-case-ever/).
Title: Re: Linux and Internet security
Post by: 40hz on November 11, 2015, 12:06 PM
It's fairly straightforward to design security into a system, which basically comes down to controlling access to memory and the supervisor. The old mainframe security was virtually bulletproof in that regard.
That's only a very small part of the whole picture, though... there's a Whole Lot Of Horrible in that world because people mess up the (complicated!) security settings and then expose the boxes to the internet. Like when Anakata of PirateBay fame hacked the central Danish police mainframe (http://arstechnica.com/tech-policy/2014/10/pirate-bay-co-founder-convicted-in-denmarks-largest-hacking-case-ever/).

To be sure. But that's not a coding issue. It's an "interface" (i.e. human) issue. If we could just get the people out of the loop, security wouldn't be an issue at all.

Easy to say.

But not practical to do.

Nor necessarily desirable, as the cautionary scifi story Colossus: The Forbin Project suggested many years ago.  ;)