this post was submitted on 07 Jan 2025
599 points (96.6% liked)

linuxmemes

21741 readers
360 users here now

Hint: :q!


Sister communities:


Community rules (click to expand)

1. Follow the site-wide rules

2. Be civil
  • Understand the difference between a joke and an insult.
  • Do not harrass or attack members of the community for any reason.
  • Leave remarks of "peasantry" to the PCMR community. If you dislike an OS/service/application, attack the thing you dislike, not the individuals who use it. Some people may not have a choice.
  • Bigotry will not be tolerated.
  • These rules are somewhat loosened when the subject is a public figure. Still, do not attack their person or incite harrassment.
  • 3. Post Linux-related content
  • Including Unix and BSD.
  • Non-Linux content is acceptable as long as it makes a reference to Linux. For example, the poorly made mockery of sudo in Windows.
  • No porn. Even if you watch it on a Linux machine.
  • 4. No recent reposts
  • Everybody uses Arch btw, can't quit Vim, <loves/tolerates/hates> systemd, and wants to interject for a moment. You can stop now.
  •  

    Please report posts and comments that break these rules!


    Important: never execute code or follow advice that you don't understand or can't verify, especially here. The word of the day is credibility. This is a meme community -- even the most helpful comments might just be shitposts that can damage your system. Be aware, be smart, don't fork-bomb your computer.

    founded 2 years ago
    MODERATORS
     

    The NSA, the original primary developer of SELinux, released the first version to the open source development community under the GNU GPL on December 22, 2000.[6] The software was merged into the mainline Linux kernel 2.6.0-test3, released on 8 August 2003. Other significant contributors include Red Hat, Network Associates, Secure Computing Corporation, Tresys Technology, and Trusted Computer Solutions.

    https://en.wikipedia.org/wiki/Security-Enhanced_Linux

    (page 2) 27 comments
    sorted by: hot top controversial new old
    [–] [email protected] 45 points 2 days ago (3 children)

    Only because they use Linux too and had to make it public as Linux is a public, open-source kernel

    [–] [email protected] 60 points 2 days ago (1 children)

    GPLv2 only says that people with access to the binary need access to the source code too. If they only used it internally they'd never have to make it public.

    load more comments (1 replies)
    load more comments (2 replies)
    [–] [email protected] -1 points 2 days ago (1 children)

    But Linus said he was never approached by the US for a backdoor. He was so sure of it, lol.

    [–] [email protected] 14 points 2 days ago (6 children)

    He is not the type of developer who would allow it

    load more comments (6 replies)
    [–] [email protected] 112 points 2 days ago (8 children)

    While they created a set of patches that would implement the security features that selinux provides, what was actually merged was the result of several years of open collaboration and development towards implementing those features.

    There's general agreement that the idea that the NSA proposed is good and an improvement, but there was, and still is, disagreement about the specific implementation approaches.
    To avoid issues, an approach was taken to create a more generic system that selinux would then take advantage of. That's why selinux, app armor and others can live side by without it being a constant maintenance and security nightmare. Each one lives in their little self contained auditable boxes, and the kernel just makes the "check authorization" function call and it flows into the right module by configuration.

    The Linux community was pretty paranoid about the NSA in 2000, so the code definitely got a lot more scrutiny than the typical proposal.

    A much easier way to introduce a backdoor would be to start a tiny company that produces some arbitrary piece of hardware which you then add kernel support for.

    https://github.com/torvalds/linux/tree/master/drivers/input/keyboard - that's just the keyboard drivers.

    Now you're adding code to the kernel and with the right driver and development ability you can plausibly make changes that have non-obvious impacts, and as a bonus if someone notices, you can just say "oops!" And not be "the god-damned NSA" who everyone expects to be up to something, and instead be 4 humble keyboard enthusiasts with an esoteric set of lighting and input opinions like are a dime a dozen on Kickstarter.

    [–] [email protected] 43 points 2 days ago

    We saw a very sophisticated attack on Linux earlier this year with the XZ exploit. That stuff is terrifying and the sort of thing people should be worried about. SELinux is tame, by comparison.

    [–] [email protected] 19 points 2 days ago

    I haven't looked at the keyboard drivers, or much Linux source. I never really had a reason to do a lot of C other than small microcontroller projects.

    But I see this stuff and think of how awesome it must have felt to get a different keyboard working on an OS the first time. I have to do all this stuff with cloud, and api levels, and configuring CI/CD pipelines, and sometimes I get to write backend C# code or they let me play in the front end. Most of the time it's telling another team of developers what to do, and listening to our clients explain the problems and I have to figure out if we already have anything to fulfill at least some of those needs.

    These drivers are the divine marriage of hardware that's not native to the machine that an OS is running on. It's so beautiful to read. You can visualize where the values enter a memory address, and bits get shifted or something is static so the keyboard always uses the right thing.

    load more comments (6 replies)
    [–] [email protected] 8 points 2 days ago (2 children)

    do i remember correctly that android is based on se?

    [–] [email protected] 12 points 2 days ago (1 children)

    Yes, android is actually a very secure system if you get rid of the vendor rom and google

    load more comments (1 replies)
    [–] [email protected] 32 points 2 days ago (2 children)

    You wouldn't phrase it like that. Android is based on Linux, and selinux is part of the Linux security subsystem. Android makes use of selinux features, among others, for security sandboxing.

    [–] [email protected] 4 points 2 days ago

    Most modern androids enforce it btw

    load more comments (1 replies)
    [–] [email protected] 129 points 2 days ago (1 children)

    I mean, leaving aside their surveillance tasks, it's still their job to ensure national security. It's in their best interest to keep at least themselves and their nation safe, and considering how prevalent Linux is on servers, they likely saw a net benefit this way. They even open sourced their reverse engineering toolkit Ghidra in a similar vein

    [–] [email protected] 24 points 2 days ago (1 children)

    Ghidra was about hiring and cost savings. Its easier to hire when people already know your tools. Also people are more willing to use your tools rather than expensive ones if they can still use them when they leave (go into contracting). Also interoperability with contractors may improve.

    [–] [email protected] 17 points 2 days ago

    And we're all the better for it! Needs polish and development of course, but it's a decent alternative already

    [–] [email protected] 149 points 2 days ago* (last edited 2 days ago) (3 children)

    I mean, it's still Open Source, right? So it would be pretty hard for them to hide a backdoor or something??

    I guess I don't know what's so sus when it's easily auditable by the community and has been for two decades now.

    If it's just because it's memes and you're not being that serious, then disregard please.

    [–] [email protected] 42 points 2 days ago (1 children)

    I maintain open source software on a much smaller codebase that is less security critical. We have dozens of maintainers on a project with about 3k stars on GitHub. Stuff gets by that are potentially security vulnerabilities and we don’t know until upstream sources tell us there is a vulnerability

    [–] [email protected] 9 points 2 days ago

    I'd imagine in this case there has been extra community scrutiny since it's security software and it comes from less than trustworthy source.

    [–] [email protected] 26 points 2 days ago (5 children)

    So it would be pretty hard for them to hide a backdoor or something??

    It happens, though.

    [–] [email protected] 8 points 2 days ago (1 children)

    Do you know of any good comprehensive followup to this? A quick search shows me lots of outdated info and inconclusive articles. Do you know if they conclusively found anything or if there is a good writeup on the whole situation?

    load more comments (1 replies)
    [–] [email protected] 9 points 2 days ago

    I did some follow-up research and found that subsequent audits found no backdoors. They're either incredibly sneaky, or the person making these claims wasn't being entirely honest.

    [–] [email protected] 26 points 2 days ago (1 children)

    This is also probably the reason why you lost your DARPA funding, they more than likely caught wind of the fact that those backdoors were present and didn't want to create any derivative products based upon the same.

    Though this implies that the Department of Defense doesn't want to use compromised tools, since DARPA is DoD. NSA is also DoD.

    [–] [email protected] 8 points 2 days ago

    They wouldn't want to use or derive any compromised software themselves. They would want any adversaries to have it implemented.

    load more comments (2 replies)
    [–] [email protected] 121 points 2 days ago (3 children)

    I mean, it’s still Open Source, right? So it would be pretty hard for them to hide a backdoor or something??

    Right but maybe it combined with other tools they have is what helps them with some exploit.
    Like they figured out an exploit but needed SELinux as a piece of the puzzle. It's open source
    and we can all read the code but we can't see the other pieces of the puzzle.

    Come on, put your conspiracy hat on! ;)

    [–] [email protected] 13 points 2 days ago

    Ok, conspiracy hat on...Maybe Snowden was the only NSA contributor with the sole purpose of making tracking citizens harder!

    [–] [email protected] 105 points 2 days ago (1 children)

    This is why I use templeOS

    [–] [email protected] 77 points 2 days ago (1 children)

    Dude, that one got a spy built-in! Direct telemetry to god.

    [–] [email protected] 34 points 2 days ago

    That explains why it doesn’t need internet

    load more comments (1 replies)
    load more comments
    view more: ‹ prev next ›