IEEE to Standardize OS Security Components 197
aster_ken writes "The Institute of Electrical and Electronic Engineers has started work on a standard for securing operating systems, as a recognition that software security is 'limited by the operating systems that underpin them', the organization said yesterday. The standard, dubbed IEEE P2200, will address external threats and intrinsic flaws arising from software design and engineering practices."
In other news (Score:4, Funny)
Deems Windows perfect, others not
Re:In other news (Score:2)
Limited release (Score:5, Insightful)
Quit whining - not everything has to be free (Score:4, Informative)
This is typical of so many kiddies these days: "I want everything for free, even if it's something I will never need/use/understand".
Many products that are the result of the work of many people - like cars, toasters, and yes, even documents - cost money to produce. Learn to recognize which items are worth the amount on the price tag, and purchase accordingly.
Re:Quit whining - not everything has to be free (Score:2, Insightful)
You got that right, everything the IETF ever turned out is a load of crap.
I'm glad I spent all that money to get the ISO's OSIRM protocol documents. That's where it's at.
Re:Quit whining - not everything has to be free (Score:5, Informative)
There are several jurisdictions in the United States where thier building codes are released in this way and are protected under copyright requiring a builder or homeowner to pay a large amount to have a copy of the current codes for reference and to pay an additional amount to include excerpts from the code in zoning and building permit applications. The fact that all persons (in that jurisdiction) are subject to compliance with these codes makes the licensing scheme an unfair limitation on builders giving an unfair advantage to larger construction companies and prevents homeowners being able to make even small improvements to thier properties if they are on a limited budget.
I have seen building projects where the cost of preparing the permits was extensively more than the cost of actual construction due to licensing costs for access to the building codes and the necessity of including exerpts from the building code in the application. The one that springs to mind is a $1,500.00 improvement to a fire escape (required by code) that cost in excess of $2,000.00 to prepare the permits. If there had been no licensing fee for code exerpts , and if a reference copy of the code had been possible to obtain for less than $750.00, it would have cost less than $500.00 to prepare the permit, as it would have been possible to prepare the application in house and would not have required a legal review of the application before submittal.
The only purpose that charging for the use of a specification serves is to limit the playing feild in the affected industry to a certain class of individuals who either already have money with which to pay, or have made commitments to persons who might or might not be knowlegable about the involved technology, but have the economic power and the desire to regulate that industry.
This kind of non-governmental regulation puts an artificial limitation on the mechanisms of capitolism and prevents the very kind of "free market" (that you seem to be arguing for) from developing and prevents participation from legitimate businesses and other projects that have the necessary skills, knowledge, and abilities, but are lacking in support from the already established players in that market.
Re:Quit whining - not everything has to be free (Score:2)
Re:Quit whining - not everything has to be free (Score:2)
Re:Quit whining - not everything has to be free (Score:2, Interesting)
This is typical of professional prejudice these days: (see above reply)
It's unfortunate that in capitalist societies people blindly accept that everything should cost money, even things such as information which can be replicated ad infinitum at no cost and without disturbing the original.
If this group, ostensibly chartered to set standards for the common good, finds it must charge money to those whom it purports to benefit, it is a bureaucracy and hence inimical to its stated purpose. Drafting standards
Re:Limited release (Score:1)
document that can't be freely redistributed.
No different from the POSIX standard, then...
Re:Limited release (Score:3, Informative)
Easy solution. (Score:2, Interesting)
oh.. and ban microsoft.
Re:Easy solution. (Score:2)
Bad idea. Isn't that how the whole SCO/Linux debacle started.... though SCO have yet to offer any proof?
Here here! (Score:2, Insightful)
Re:Here here! (Score:5, Insightful)
Not only that, but people like microsoft will just make their own standards and ignore the ones already set. They won't have any affect on anything, imho.
Re:Here here! (Score:2)
(right)
Re:Here here! (Score:3, Insightful)
IEEE has a fair amount of credibility with the U.S. government - this standard could easily become a purchase requirement like POSIX.
microsoft will just make their own standards and ignore the ones already set.
MS will support this standard if it is a purchase requirement. I think it is more likely that MS will have an inconvenient BOSS mode, they will then be able to point to users failu
IEEE isn't your average organization (Score:2, Insightful)
Of course anybody can ignore a standard, but if the largest organization in the world in this industry goes one way, do you really want to go the other way?
Erioll
Re:Hear hear (even)! (Score:2)
It will address essential functions for cross-platform security, including identification and authentification, access control and key cryptographic concepts.
This is awesome fucking news...
It'll be interesting though, to see just how tangent to TCPA it will be...
Re:Here here! (Score:2)
That's because most of it was done twenty or thirty years ago.
[...] that this is a step in the right direction towards the development of a mature, secure operating system for general use!
Maturity comes after a decade or two of public exposure. It'll be a long time before any "mature" product is designed around these proposals.
If only Windows would use them and not brake them (Score:1, Insightful)
Cool... (Score:1, Troll)
Re: (Score:1)
Re:So What? (Score:3, Funny)
Linux hits the trees less, but it irritates the bear and prevents it from rears up. Eventually, after the Linux bunnies all mate like crazy, one bunny rabbit is born that is somewhat like the bunny in Monty Python's The Search for the Holy Grail. The point here is to mate Linux distros with each other until the pe
Re:So What? (Score:2)
Won't work, you'll just end up with one big cluster fuck...
great... (Score:4, Interesting)
The other is that at some point a system that adheres to the standard will be compomised and will raise questions as to the usefulness of this standars.
I don't question the need for standards , but not all things can be standardized. Standards stand for a commonnly accepted way of doing something. Security is still too volatile.
Re:great... (Score:5, Insightful)
Better put: Security is in the details.
If I'm going to crash a system then its going to be its specific weakness/flaw and not some standard hole in every product.
The standard will help but it still does not guarentee the implementation will be invulnerable.
Re:great... (Score:2)
Re:great... (Score:2)
All of the details.
Security is a perimeter type thingee. Putting a steel security door on a tarpaper shack isn't going to improve security. The weak point of a bank vault is that enormous security door.
If I'm going to crash a system then its going to be its specific weakness/flaw and not some standard hole in every product.
Exactly. Furthermore you get to make your choices after the product has committed to its choices. Further, the more complicated the security
IEEE (Score:4, Funny)
Re: IEEE (Score:3, Funny)
> Never mind a secure OS, I think these electronic engineers sound like very useful devices. Is there a review of one anywhere? How much do they cost? Do they run Linux?
Yeah, I have an old mechanical engineer, and I think it's about time to upgrade to a modern electronic one in order to reduce the maintenance costs.
Re:IEEE (Score:2)
As a matter of fact I do!
About time! (Score:2, Interesting)
It'll take a lot of work to make windows secure!!
No operating syatem is completely secure anyway, there are always some 'undocumented features'
So, did anyone else... (Score:5, Insightful)
I hope not, but it certainly sounds that way. Basically, it makes the point that we cannot trust people not to run programs that break their own (or others) computers, so the task of limiting what (possibly malicious) code can run falls to the OS.
Sad. If I didn't have complete confidence that any DRM scheme will eventually prove itself flawed, I might actually worry. Though, I certainly do not look forward to the general inconvenience it would cause, regardless...
Only education (and not running Outlook) will help reduce the modern plague of worms, virii, spam, and other ways to generally make a computer and the internet grind to a crawl. Not legislation, and not crippled hardware. People simple need to learn how to secure their own damn machines.
Re:So, did anyone else... (Score:5, Insightful)
you know, this basic premise doesn't have to be tied up in DRM. i think any decent security model is going to involve partitioning off system capabilities that aren't appropriate to the current user/situation/time of day/etc.
unix has had this sort of thing for ages, in the form of user permissions, and ulimit. ulimit supports various parameters -- files, memory, cpu, etc. that can be consumed. taking this to its logical conclusion and including bandwidth, address book access, connections to various servers, etc. could provide a pretty logical way to fence in worms.
providing even more restricted environments (like chroot jails or the applet runner) for untrusted code would be a good idea, too. if microsoft is going to insist on allowing people to email executables (screen savers, vbscript, etc.), the world will be better off if they execute in an environment that can't access the network, DoS the local machine, etc.
-esme
Re:So, did anyone else... (Score:3, Insightful)
What you write makes a lot of sense, and leaves me at least a bit of hope of a "good" implementation. Even within your ideas, though, I can see room for a few unacceptible restrictions...
For example, who defines "untrusted code"? Perhaps most people don't care about issues like that, but I personally think nothing of popping out 15 minutes of code to automate a task that wo
Re:So, did anyone else... (Score:2)
i agree with you -- the definitions and policies regarding untrusted code are the crux of the matter.
i can definitely see the potential for a DRM world where you can't listen to your CDs, watch your DVDs, access the network, use your peripherals, etc. unless you've bought into the DRM infrastructure that takes all your rights away. or worse, you can't get a new computer because the hardware won't run the OS you want to run.
one of the main things that makes the initial attempts to impose DRM tolerable i
The opposite (Score:2)
This sure looks like it's about real security, not DRM.
No, not at all Re:So, did anyone else... (Score:2)
Re:So, did anyone else... (Score:2)
I had exactly the same first thought as you, so I dug around and found a link to their first draft and started reading to find evidence.
Here's their first draft in PDF format (1.6 meg), [bosswg.org] RTF format (5.0 meg), [bosswg.org] and a ZIP (1.2 meg). [bosswg.org]
I haven't read the whole thing, it's 76 pages, but as far as I can tell it hasn't been subverted by TCPA / DRM / Palladium / NaGSCaB / Trusted Computing nonsense. It looks like legitimate security designed for th
Re:Users are just one part of the problem (Score:2)
Some info (Score:3, Interesting)
Anyways the IEEE has a track record of working on security-related standards includnig the popular P1363 (Standard Specifications for Public Key Cryptography) standard. P1363 defines standard implementations of public key crypto ciphers based on Integer Factorization, Discrete Log, Elliptic Curve, and Lattice algorithms.
Ill be waiting to see this P2200 come arround.
Re:Some info (Score:4, Interesting)
Yes, like the P1003.6 (POSIX Security) which I was involved with (died because of lack of interest and politicial conflicts) as well as P1003.22 (Distributed Security) which I was one of the founders of (was later adopted by X/Open and is usually irrelevant today).
For some reasons (like practical experience), I don't believe the IEEE will manage this any better than they have before (i.e., very badly, mostly due to political aspects having precedents before technical and security aspects).
Feel free to mod an old cynic down.
Re:Some info (Score:2)
And who uses them?
Very few RSA implementations are P1363 compliant. Almost everyone uses the RSA labs PKCS#1 signature format. That is what is used in S/MIME, PKIX, SSL, all the IETF sta
Not A Guarantee (Score:5, Interesting)
It's true that some flaws in the OS are inherently design-based. However, even if we make certain design requirements to be incorporated in the OS, it still doesn't guarantee that the OS is secure. I would think that it even can't minimize the number of OS breaches. It would even hamper the OS development in order to comply with their standards.
About the quote regarding the "minimum expectations of consumers for security and general reliability by establishing a floor for these characteristics". I don't think it would be possible the goal of "the least restrictive requirement while not relenting the control" is vague. Unless it provides rigid post- or pre-conditions of each method (in first order logic if necessary) and provide each formal specifications unambiguously, I would still see some leaks here and there. And, guess what? They put the requirement like UML standards: Way to vague. Congratulations.
For those of you who are curious, click here [bosswg.org] for the draft.
This could be good (Score:5, Insightful)
I think a security standard should be enforced by a world body to help prevent MicroSoft from once again taking the standard and corrupting it to work only with Windows and
Some would say standards hurt computing that's not exactly the case. You can design products around standards and still compete with other standard compliant products. It allows everyone to remain compatible and at the same time darwinism will take effect with bad products going away and good products evolving to better suit their users.
It would have been easier... (Score:2, Funny)
Got a link for that? (Score:2)
link (Score:1)
it's good (Score:2, Insightful)
Re:it's good (Score:2, Interesting)
I expect it will raise their security level, but raise expectations even higher, and increase the general danger brought about by virii and so-such due to user over-confidence.
I predict one of three things will happen (Score:5, Interesting)
One, the final standard spec will be loose enough that Windows will already be compliant, so it won't mean anything.
Two, the final standard spec will be Microsoft's Window-centric implementation of a secure system (existing windows systems may not be compliant, but future ones would be). No non-Windows system would be able to meet the standard without extensive licensing fees being paid to Microsoft to license the technologies needed.
Three, the final standard spec will be sensible, and Microsoft will ignore it. With the mainstream desktop environment paying no regard to the specification, the spec fails to acquire the widespread adoption necessary to become a real standard.
Re:I predict one of three things will happen (Score:3, Interesting)
If they do succeed, I should be able to run an unpatched OS, run unpatched and vulnerable applications and click on anything I please with impunity. That's not to say that everything's fine. It's just that I shouldn't be able to get consequences all out of proportion to their causes. I click on a bad website and maybe kill the browser, but that browser is extrem
No, windows specific solution (Score:2)
I'm guessing that the standard is windows specific. Current versions of windows might lack a few things, but MS will have no problem changing those details.
All UNIX/POSIX, VMS, OS/390 (Is that the lattest name for IBM's mainframe os?), and so on systems will find the standard irrelavent to their way designing. In other words both unimplimentable without breaking backwards compatability, and irrelavent to (and in many cases lesser than) the security system allready in place
Re:I predict one of three things will happen (Score:2)
-
I've got a secure system (Score:4, Funny)
Re:I've got a secure system (Score:2)
-and i bet one of my old mobos sitting on the shelf is more secure than that! i have even removed the bios roms and used violence on them.
Re:I've got a secure system (Score:3, Funny)
Oh, wait. I mean: Can you imagine a Beowulf cluster of those?
Okay, fine. In Soviet Russia, secure system bypasses YOU!
Welcome to Slashdot.
redundancy (Score:2, Interesting)
All you need is an ARM, firmware in FLASH (so it can be upgraded when it is inevitably cracked), a PCI interface an
Re:redundancy (Score:2, Insightful)
These solutions are more usefully implemented in software.
It IS software (Score:2)
There are Millions of people in the "Open source community." A high percentage of them are experienced engineers (and some of them are even working!)
The point is we don't all need the skiils to solder this stuff into our boxes - that would be the opposite of what I was tlakign about, in fact. What's needed is t
My point exactly... (Score:3, Informative)
I can buy a linksys router with basic firewall functionality for $50. I can buy a NIC for $5. That's one helluva jump in price to get less functionality in a low profile case. So what if it says 3com on the box? My whole point is that this stuff doesn't need to be proprietary or expensive - it is only because there's no standard to commoditize the functionality.
Root (Score:2)
Cheaper and easier doesn't mean better and more effective.
Standard: (Score:2, Funny)
(ok, I realize they really talk about a broader view of security, couldn't resist though)
NOT FOR USE WITH LINUX (Score:2)
Too bad, it might have been useful for Non-Commercial Off The Net Software (NCONS) too. Ever get the feeling that someone has just been dying to use a new acronym?
Sigh.. yes, for use with linux.. (Score:2)
Re:NOT FOR USE WITH LINUX (Score:2)
Why use a meaningless acronym, like COTS, intead of saying OTS, since as you say, it doesn't have to be commercial, or for that matter maybe OT would be better since it doesn't need to be off the shelf?
How about we just stick to the english language and say "pre-built software" or "custom software" or "bespoke software"?
Could it be because if we used existing en
Why the IEEE? (Score:2, Insightful)
Re:Why the IEEE? (Score:2)
Americans and standards (Score:5, Insightful)
Remember the reaction of the average American to an international standard is to denounce it as a communist plot, particularly if one of the European standards bodies takes an interest (or even ISO, which most Americans regard as European and therefore communist).
If you want an example of how well Americans make good use of international standards you just have to look at their mobile phone system
Now, if most operating system manufacturers were European and Japanese this would be a good idea, because they'd be likely to follow any new international standard. But it happens to be a fact of life that many operating systems are produced or contributed to by Americans, so any such idea is dead in the water before it gets off the ground.
It's lonely at the middle... (Score:2)
Re:Americans and standards (Score:2)
is the USA literally the ONLY country that does not use the metric system? dammmmmn..
Re:Americans and standards (Score:4, Interesting)
Except for the fact that it is much easier to calculate in metric, and many Americans, such as myself, who deal with both sytems, depending on the subject at hand, find metric much easier than the Imperical system that we grew up using.
And, yes America is different for the sake of being different. It may be brutish and idiotic, but it also results in diversity
I fail to see how adopting the metric system would in any way threaten the diversity that we (at least the sane ones among us, perhaps not the majority) dearly love about our country.
I prefer slightly worse stuff to perfectly consistent stuff in many ways.
I agree, but often the American tendancy to be "different" not only results in "slightltly worse stuff" but it also results in such mind niumbing consistancy that we must seek products elsewhere for not only quality, but for something that is different, especially when the "stuff" is beer.
It forces constant change, fights off stagnation, etcetera.
Actually it was the growing dominance of foreign imports that caused the diversification of American beer market and allowed the "microbrews" to share a place on the shelf. The non-standardization of brewer products allowed the few large brewers who manufactured the most cheaply made product to dominate the beer distribution markets after prohibition until relatively recently, when foreign brewers became able to produce enough product for the American market (mostly due to the strength of the dollar in relation to thier own native currencies), in spite of some of the older breweries that had more diverse product lines (such as D.G. Yuengling, Stegmaier, and some of the other older breweries that pre-dated prohibition).
Re:Americans and standards (Score:3, Insightful)
Where did you get the idea that american phones don't work anymore. My Phone is a tri-band GSM only phone that works just fine in the US, despite the "fact" that you appearently made up about no US cellphone working anywhere else in the world.
GSM is a bad standard on most technical counts. The CDMA standard that is popular in the US is better, but it isn't GSM. For most people though, that is irrelavent. You choose a phone by many factor, GSM or CDMA is not, and should not be one for most people. Engi
Re:Americans and standards (Score:2)
I'm struggling to see any advantage in having to pay to receive a phone call.
Re:Americans and standards (Score:2)
Your looking at it from the wrong end: I pay to recive calls (in theory, in practice I get more minutes included than I use so it is part of my base plan). Whoever calls me doens't have to worry about extra chares because they called my cell phone.
In the US we are used to no extra charge to call our neighbors no matter how often we call, or how long we talk. Budgets are a lot easier to do, this way, and you don't worry about talking too long. This is extended to the cell phone - my neighbors (which i
American phones (Score:2)
Exactly. It's ludicrous that the rest of the world has to go out and buy different phones that are not needed anywhere else just because the USA won't follow standards. Cheaper dual band phones cope with the whole of the rest of the world just fine.
The fact that the different more expensive phone needed in the USA happens to use the same protocols but in a different waveband, rather than a completely different protocol, is only of interest to nerds; what ordinary punters know is the
Re:American phones (Score:2)
So you have dual band phones in Europe, and they are relativly common. Seems that you coudn't designate one frequency that would fit all your needs from the start. Then you compounded the problem by making your second frequency one that was already used in the US for something else. Don't blame us for that one, when we can turn around and blame it back on you.
No operating system will ever be completely secure (Score:3, Insightful)
Re:No operating system will ever be completely sec (Score:4, Insightful)
That's why really secure OSes [eros-os.org] don't have millions of lines of security-critical code.
Re:No operating system will ever be completely sec (Score:3, Informative)
Re:No operating system will ever be completely sec (Score:2)
My favorite example is a definition that I ran across across a while ago. A "secure" system was defined as one in which an unauthorized user couldn't get access to any files and copy the data to another computer.
Now this probably sound
Re:No operating system will ever be completely sec (Score:2)
(emphasys mine)
[...snip...]
By this definition, of course, all web servers that work at all are totally insecure, since their fundamental task is to hand out files to all users.
Nope. In this case, those users are authorized (as anonymous) for those files. So the definition still stands.
MS (Score:2, Funny)
How will they keep this on track? (Score:3, Interesting)
Unfortunately, I see one (or both) of two things happening:
1) "This standard will enable mass production of a class of operating systems that meet
the minimum expectations of consumers for security and general reliability by establishing
a floor for these characteristics,"
MS will attempt to set the "floor" to be barely above its current standard for security and reliability.
2) Microsoft will drag the whole thing down some "Trusted Computing" DRM rathole.
Liability (Score:2, Interesting)
It's about time (Score:2)
This is going to be pretty useless, most likely. (Score:2)
Common Criteria might be the spec I'm thinking of... or maybe it was something else. In any case
Not just the OS (Score:3, Funny)
I don't use a PC, so I've largely ignored Blaster and the other recent viruses/worms/&c, but aren't at least some of them down to Outlook and other insecure apps? If every OS suddenly became 100% secure (if such a thing existed) tomorrow, how many problems would remain?
Priorities (Score:3, Interesting)
More time than I care to recall, a decision has had to be made between the right way and the fast way. The fast way almost always wins, even if it is fragile and error-prone.
Is the computing community willing to give more than lip service to security and reliability? Past history say no.
Imperfect trust and contingency costs (Score:3, Insightful)
You have to trust something. That which is trusted has to operate in a way that if it were made to do the wrong things, it would do the wrong things. Trust is the belief that it is not going to the wrong things. That which is not trusted has to be operated in a way that restricts its ability to do wrong things. But you cannot operate everything in the restrictive way because you have to trust the very mechanisms of restriction itself. And that generally means the kernel of the operating system, and the most of the hardware, have to be trusted to do the right things.
But the biggest issue is how do you establish that trust? Are you going to personally inspect every line of source code, and understand what it does? Are you going to inspect the engineering of the CPU and associated hardware that can influence how the CPU operates? Because we generally cannot do this on things as complex as computers or software, we have to establish trust by some proxy. If we know someone, and trust them, who has done all that, then we might trust the system. But there really isn't likely to be very many people around who can do that, and perhaps none at all. So somehow we have aggregate that trust proxy, and conclude on the basis of some combination of information, that something is trustable. But this isn't genuine trust. We cannot be certain that something is truly trustworthy just because someone says it is, or that a combination of others say it is.
Ultimately, we have to accept, and learn to deal with, the fact that trust is imperfect. We have to trust not that something cannot do the wrong thing, but that it is highly unlikely to do the wrong thing, and have contingency plans to be able to deal with it doing the wrong thing, which includes knowing that it did the wrong thing (it might try to hide that fact from you). The level we have to use to establish that trust will thus depend on the real and potential costs of the contingency (such as cleaning up the mess it leaves behind, restoring data, etc).
In order to reduce your contingency costs, you have to establish a greater criteria of trust. But the trust has a cost as well (for example hiring several computer scientists to inspect and analyze the code, as well as performing background checks on them to make sure they have no other motives, and even this has costs). It's all a balancing act. And where the optimal balance is will depend on many factors. As your contingency costs increase (a military has very high contingency costs, as it could mean losing to an opponent), your level of trust establishment needs to increase as well.
A standard for security has to address the fact that trust is imperfect, and that different entities will have different contingency costs. So it has to be flexible over a wide range of optimal levels of trust. If it is too rigid, it cannot be universally adopted, and will end up not being in common use (though it might find a niche use in areas matching its trust metrics). Those who are developing such a standard will at the very least need to state up front what the goal is. Is this something they expect to be usable in both a military high command setting, and in a casual home user setting? Unfortunately, I see none of this in the base document [bosswg.org] at the BOSS working group [bosswg.org] site.
Use a better programming language, for a start. (Score:2)
The first step to solving the OS security problem, IMNSHO, is to build the OS in a real high-level language, instead of a portable assembly language. (Who was it that said that C combines the power and flexibility of
Compromises? (Score:2)
Re:Server is getting slow, here's the text (Score:1, Funny)
Re:Server is getting slow, here's the text (Score:2)
Re: (Score:2, Informative)
Re:Don't, it's full of junk! (Was Re:MOD PARENT UP (Score:2)
Any karma whore can make an AC request to "Mod Parent Up!". Idiots and non-article-reading morons should not be allowed to moderate.
Re:Coming soon to mainstream america (Score:2, Informative)
I used to work tech support for a large software company that develops OSes (who could that be?) and I learned customers are VERY concerned about security. They often asked questions like 'Should I be installing security updates? / Can someone get into my computer? / etc.' This same company had 1000 tech support calls queued the day MSBlaster hit. If one product is sporting a Certification sticker and another is not, the one sporting the sticker will have a bit more weight with the
Re:Step one: (Score:2)
cd
cd
cp
Re:Step one: (Score:2)
cd