Feeds

Lobbying for insecurity

NSA secure Linux project tangled in politics

  • alert
  • submit to reddit

5 things you didn’t know about cloud backup

The U.S. National Security Agency's contribution to open-source security, Security-Enhanced Linux, found broad approval and support in geek forums from Wired News to Slashdot that are typically suspicious of the government.

It's not surprising that it couldn't last, however, and a recent CNET article suggests that the NSA may not make further contributions to software released under the GNU General Public License, and perhaps other open-source licenses.

What prompted this decision? Not abuse of their code by script kiddies, nor the ungrateful trolling of the hordes, but lobbying by the U.S. software industry against the government giving away something that could compete with products sold commercially. Microsoft in particular allegedly conducted intense lobbying to block further open-source development by the NSA, according to CNET.

We already knew that security is less a technical problem than a human problem. If true, Microsoft's alleged NSA coup demonstrates that it's a political one as well.

Anything which encourages the use or development of proprietary systems that are difficult to certify for even the most basic levels of security creates additional risk to computer systems; reducing government support for security development for any widely-available and widely-used operating system creates additional risk; and suppressing the development of a competitor's secure software on the basis of market concerns creates a security risk for your customers as well as your competitor's customers.

None of which is to say that Microsoft is doing anything wrong. They're a business, and they are doing what they need to do to win in the marketplace. What's wrong is the rest of the industry allowing them to get away with it.

So what can be done about it? I believe that developing code that runs securely is a good first step, as News.com columnist Declan McCullagh suggests in a recent opinion piece. However, it's hardly a complete solution.

No, what we need to do now is something we haven't been very good at. We have to start playing politics.

The most secure software in the world doesn't improve security if nobody runs it, or if it's incompatible with what the vast majority of people run. Standard is better than better. VINES networks might be more secure than TCP/IP but it does little to secure the Internet as a whole. MD5 password hashing was always more secure than old Unix crypt password hashes, but until vendors started shipping the code, and integrating it via Pluggable Authentication Modules, it made little difference.

Politics is an essential element in the success of any given technology. The quality matters some, as do other factors, but the people and organizations with a knack for the for political are the ones who get to the finish line first.

I'm using the term "politics" broadly here: it includes standards-setting, personal relationships between major personalities, and marketing.

We've seen politics at work in our own community. Quite a number of people feel that Linux is technically inferior to FreeBSD, OpenBSD, or even NetBSD. That makes Linux's success in the marketplace the quintessential triumph of politics: Linux succeeded by being in the right place at the right time, having a unified front in public (if not behind-the-scenes), having a recognizable name and logo, and a number of popular, well-liked people to provide a public face for the effort.

The security community, and the open-source security community in particular, can use that as a roadmap to ensuring that secure open-source solutions aren't buried by proprietary competitors.

There's no harm in writing your Senator or the President; it might help to submit comments to the FTC. But it takes a lot of money and a lot of power to influence the NSA. We should focus our main efforts, instead, on battles that we can win. These are the battles within standards organizations and within our workplaces. Convince the W3C to reject patent-encumbered standards. Make it a policy to rely on open, documented protocols instead of proprietary monstrosities.

If we don't want to lose future market share, if we don't want Microsoft to dictate its terms to the security community, if we don't want to be stuck with whatever they choose to offer the marketplace, we have to play politics. The only alternative is to let Microsoft dominate the marketplace and dictate future standards. I can't imagine how that would improve the security of our systems.

© 2002 SecurityFocus.com, all rights reserved.

The essential guide to IT transformation

More from The Register

next story
One HUNDRED FAMOUS LADIES exposed NUDE online
Celebrity women victimised as Apple iCloud accounts reportedly popped
Rubbish WPS config sees WiFi router keys popped in seconds
Another day, another way in to your home router
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
NZ Justice Minister scalped as hacker leaks emails
Grab your popcorn: Subterfuge and slur disrupts election run up
HP: NORKS' cyber spying efforts actually a credible cyberthreat
'Sophisticated' spies, DIY tech and a TROLL ARMY – report
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
New Snowden leak: How NSA shared 850-billion-plus metadata records
'Federated search' spaffed info all over Five Eyes chums
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?