Embedded RTOS Maker Raises Linux Security Issues 341
drquizas writes "Embedded RTOS provider Green Hills recently delivered an address where they raised the question of whether Linux can be considered secure enough to be used in defense applications. Much of the usual FUD is present in the remarks, although an interesting question is raised regarding what defense and other government contractors are required to do in testing code (in this case anyway): is the closed code here being held to a higher standard than its open-source equivalent, and does this change the 'security through obscurity' argument?"
Open source is much better than closed souce (Score:5, Informative)
Can't put it much better than that. When you have the contribution of the entire open source development community, so much knowledge and experience comes to the table that it's difficult for any one group of programmers to compete.
Re:Open source is much better than closed souce (Score:5, Insightful)
Microsoft Windows, MacOS, Unix, and Linux often crash, lock up, or go crazy. They indicate this condition by displaying a sad face, an exploding bomb, a red X, a blue screen of death, or by simply refusing to respond to mouse-clicks or keyboard input.
This is FUD and he does have a vested interest.
Re:Open source is much better than closed souce (Score:3, Insightful)
Frankly, even as a faithful Linux user, I still have to agree with him. Our missile defense systems should not be running the same software as my home PC whether it is a commercial or open-source product.
Re:Open source is much better than closed souce (Score:5, Funny)
You want custom, quality, made for Govt. spec code! The kind that is produced by either the low-bidder, or corporate crony!
Re:Open source is much better than closed souce (Score:5, Insightful)
Funny... I feel just the opposite. Whether it's missile control, voting machines or accounting system 99% of what the operating systems components are doing is the same. I'd want that code tested millions of times if possible. Of course some of the code, unique to that application, can only be tested in place, but the less there is of that the better. For every person who would want to introduce a flaw into such software there are hundreds, more likely thousands, who would want to expose that flaw and fix it. It really doesn't matter if their reasons are patriotic or ego related.
It is closed systems after all that produce voting machines with huge bugs in them, and closed systems that crash vehicles into Mars due to metric to English conversion bugs. It is also closed systems that had laptop computers being used in Afghanistan being subverted by pop-up messages from
Re:Open source is much better than closed souce (Score:3, Insightful)
The feature requirements for control systems are also vastly different and would inevitably exercise different features of the system, so testing in the server or desktop areas would be of limited value. No general purpose operating system provides hard real-time constraints out of the box.
My preference would be an open source RTOS. I know there are a lot of p
Re:Open source is much better than closed souce (Score:3, Insightful)
It's not like you're going to have open source missile guidance systems, they're going to be written by the government or their contractors, and so aren't open to contributions from all and sundry.
Re:Open source is much better than closed souce (Score:3, Insightful)
Somewhere in there an imperial to metric conversion failure would be caught.
Popular projects never lack for developers or testers.
Re:Open source is much better than closed souce (Score:3, Insightful)
Re:RTOS has some inherent reliability advantages (Score:4, Informative)
Re:Open source is much better than closed souce (Score:5, Funny)
Oh. Wait. Nevermind.
not open vs. closed, cathedral vs. bazaar (Score:5, Insightful)
When you buy a RTOS, you usually aren't getting compiled executable code. You usually get source code that you need to port to the hardware you are building.
Data sheets like this [ghs.com] implies that Green Hills adheres to this common practice. So all the open source is more trustworthy than a black box arguments don't apply. Anyone who wishes to deploy a system based on Green Hills' RTOS can audit the code, it isn't hidden from them. Also, this PDF [ghs.com] linked says:
Which to me implies that it has had a more thorough external audit than most open source packages.One final argument is that an RTOS is usually very small. Their Velocity [ghs.com] RTOS can run in 3KB of RAM. When the OS is stripped down to something that small, a full audit seems like a much less daunting task.
This implies that he isn't arguing security through obscurity. He is arguing for the cathedral approach vs. the bazaar. Don't get me wrong, he still is spreading FUD. Its just a different FUD than you think. He is ignoring the role that Linus Torvalds and some of his trusted lieutenants like Alan Cox play in planning a direction, vetting ideas, and protecting the stability of the code base. Patches don't just come out of the blue from anonymous sources and applied without any examination, no matter what Dan O'Dowd may think.
Re:not open vs. closed, cathedral vs. bazaar (Score:3, Interesting)
Re:This has little to do with Closed v.s. Open (Score:3, Interesting)
However, very very little Defense software requires DO-178B level ANYTHING certification.
This certification does not mean that there are not bugs in the software. Based on some limited
Re:Open source is much better than closed souce (Score:4, Insightful)
I mean I can test the latest version of redhat, I can even, if I really desire to do so and am willing to work out the specifics, fix some of the problems I might encounter, but the militray is unlikely to care how something works on my system, they are going to want to know how it performs on their systems, the most important of which are likely to be either expensive and difficult to obtain servers or proprietary military hardware. I can't test that nor, I believe, can 99% of the people who test and examine OSS software.
Even the NSA doesn't use Linux, they use their own brand of Linux which they've probably modified the bejesus out of, Linux was just an easier place to start than other OS's(I don't doubt that the NSA could make their own version of Windows if they liked and there wouldn't be a damned thing MS could do about it, but it'd be a pain).
Re:Open source is much better than closed souce (Score:3, Informative)
you think they don't use the same big oracle databases that everyone else uses?
there was an article posted in the last week about the US navy's newest fanciest warship, the commanders were all drooling about how they can run the ship with 3 people on the bridge compared to 8 on a standard ship - and the article SPECIFICALL
Re:Open source is much better than closed souce (Score:4, Interesting)
Yes, they do have their own chip fabrication facilities. The NSA has had one at Fort Meade for many years. I'm sure there are others.
Re:Open source is much better than closed souce (Score:5, Interesting)
Re:Open source is much better than closed souce (Score:4, Informative)
Perhaps that may be true of civilian aircraft systems, but the DoD certainly has no objection to using Windows as a development environment for military aircraft. The Common Operating Environment [dtic.mil] may change that in the future, but MS Windows is definitely used at the moment.
Re:Open source is much better than closed souce (Score:5, Informative)
No, he's not, your assertion that "Windows could easily be qualified, by a team under NDA with a source license for Windows." is just plain laffable. And I say that as one who has been working in DO-178b certification efforts for the last 8 years or so. Believe me when I tell you that I have already laffed out loud at that sort of a statement more than once, both on and off the job.
Take a look at the cost per line of code for the typical level A cert and you will find that just the sheer volume of code in Windows makes any such effort impractical. Then there's the issue of the man-hours of effort per line of code...
Also, saftey-critical code is requirements driven. That is, the requirements are defined, then the code is written to implement the requirements. Using this approach, even if you could find something in Windows that fit your requirements, by the time you removed everything else, it wouldn't be Windows anymore. There would likely be no requirement for the user interface, for example.
That said, it is notable that most operating systems that exist today have similar issues. The bottom line is, none of them can be considered an RTOS, so if an RTOS is what you need, they won't do.
Smaller kernels have a better chance if you're trying to make one compliant, and the scheduler is the most useful piece, since it a) is what is needed (otherwise an OS wouldn't be needed, a monolithic embedded application would suffice), and b) it must be completely reliable, incapable of allowing race conditions, priority inversions, lockups, etc.
As for Green Hills, the fact is that Green Hills has the reputation in the industry for having produced the only (there may be another, but this is their rep I'm speaking of) actual OS that has qualified under DO-178b.
There have been several tries to produce others, but to date none has qualified, afaik. I have been, and continue to be, invovled in those efforts, so I am properly a competitor to Green Hills, since I am not a Green Hills employee, and have not worked with their OS.
I have, however, been involved in attempts to bring the Linux kernel into compliance with both DO-178b and ARINC 653 (the document desribing the partitioned RTOS model for "Loadable Software Airplane Parts," that is expected to be used in the future, starting with RTOSs like the one sold by Green Hills). While the Linux kernel port is considered doable, the cost of the effort was more than that client chose to bear. Again, the critical part of the port was to make the scheduler provably deterministic. Without that, the OS can't be considered.
The marketting hype (FUD) included in the piece is standard marketting hype, and is completely beside the point from an engineering standpoint, but plays well with suits, who typically don't understand what they're trying to build (software-wise), anyway.
Also, if you take a look at the experience the US Navy had trying to use Windows NT for engine control applications, you will get an idea of a) the relative simplicity of making it function as an RTOS, b) the degree of effort Microsoft was willing to expend towards the reliability of their software for a critical system, c) what a dumb idea it was, and d) why anyone with any understanding of the problem will not trust their life to software made by Microsoft, NDAs notwithstanding.
Finally, regarding the Open Source/Cathedral/Bazaar argument: When creating saftey critical requirements and the implementation of them, it is pretty much impossible to have too many eyes on the work. Practicality and economics are the constraints. That, and security, in the case of military or other sensitive applications.
Re:Open source is much better than closed souce (Score:4, Interesting)
You are correct, medical device manufacturers do in fact use Windows in some cases, and I find it plausible that they use OS/2, although I am not directly aware of an instance.
However, I would also point out that medical device manufacturers are not held to development process standards or testing requirements as stringent as those applied in the aerospace industry. I won't get into the possible reasons for that, but the medical industry is a lot more self-regulating.
In my experience, "critical" in medical industry software means somewhat else than it does in my field. This based on having interviewed for some of those types of positions. ...
And for good reason. It was a clear case of Microsoft having bribed a congressional committee, and the first clue that many of us outside Microsoft got that El Senor Gates' ambitions reached beyond mere global domination of the software industry and great wealth. I think that aspect of it was not as widely discussed in the media, though.
Re:Open source is much better than closed souce (Score:2, Interesting)
It is not too difficult to build your own customized OS based off Linux [linuxfromscratch.org], even using Red Hat (Although it wouldn't be my choice of distributions to start with).
Re:BS and you know it! - China linux versions (Score:4, Insightful)
And no one would dare do that at a closed source vendor. How on earth could it be possible for, say, a Chinese or Russian person to get a job a Microsoft or Cisco working on an operating system? It would never happen.
How right you are, our closed source software is completely safe!
DIEBOLD VOTING SYSTEM PROGRAMMERS ARE RUSSIAN (Score:4, Informative)
oh yeah I forgot. Diebold uses russians. Sequoia is foreign owned. Shouptronics founder served time for Election Machine Rigging, Seqoia execs indicted for bribing election officials, and GEMS VP of research served time for computer fraud.
In contrast OVC is a multi-national effort but its all open source so no one cares there be foreign nationals programming US machines.
Re:BS and you know it! - China linux versions (Score:3, Informative)
A related Green Hills article... (Score:2, Informative)
What? What? What11!11?1 (Score:5, Funny)
"It costs us $500 to $1,000 a line to review our source code. It would cost billions of dollars to review Linux."
Say whut? It actually costs this? why? where can I sign up???? I'll sub my per-line auditing out, rake it in...
Naw, cmon, really? the government charges this, or he just pays this cost? Because..huh?
Re:What? What? What11!11?1 (Score:3, Insightful)
"It costs us $500 to $1,000 a line to review our source code. It would cost _us_ billions of dollars to review Linux."
That's why he's losing business.
In all fairness (Score:5, Insightful)
And this tendency is probably much more pronounced when rather than debugging, you are, for example, attempting to certify something as a failsafe system.
Linux is a fairly large and multifarous system. If his company sells a product that is designed and streamlined to be an RTOS embedded kernel, it more than likely achieves this in far, far fewer lines of code than Linux overall. While he is probably being unfair by counting in the total number of Linux number of lines of code things like desktop video card drivers, it is an altogether reasonable statement to suppose that the streamlined and smaller RTOS kernel this company sells is probably easier to debug and reason about than the Linux kernel, which is relatively larger, more complex, and has more complex design goals.
Re:In all fairness (Score:2)
Let's not forget, also, that what he's selling is not as capable across multiple architectures as Linux is, nor is it going to have the diverse hardware support.
Sure, a kernel designed for a specific hardware config and for specific applications is going to be more secure than one designed as I pointed out above.
I fail to see what point he is making, if any. Apples, Oranges, and FUD.
SB
Re:In all fairness (Score:2)
Annonymous anything is annoying to the military. They need to be able to trust who and what they're dealing with. They want to be friendly with the Iraqis in the street as much as possibl
oss anonymous? (Score:3, Insightful)
Meanwhile, at many commercial companies you could have employees who worked there for a few months and got fired/quit. Depending on their internal code tracking it might be hard to tell what code they submitted, and whether it s
Re:In all fairness (Score:2)
No features and really just a program bootstrapper.
Re:What? What? What11!11?1 (Score:2)
ie- perhaps to test a piece of software that is responsible for guiding missiles or whatever, they may have to actually fire a few million dollar missiles. Or they may have to build a test suite or simulation software etc for testing.
The NSA seems to think (Score:5, Informative)
If they have faith in it....
http://www.nsa.gov/selinux/ [nsa.gov]
Re:The NSA seems to think (Score:2, Insightful)
If they have faith in it....
http://www.nsa.gov/selinux/
except they say:
There is still much work needed to develop a complete security solution. In addition, due to resource limitations, we have not yet been able to evaluate and optimize the performance of the security mechanisms.
One problem, as I see it is there are many people messing with the code that each update would require a line by line check to verify nothing has changed - greatly increasing the co
Re:The NSA seems to think (Score:2)
No matter wether closed o
Re:The NSA seems to think (Score:3, Informative)
Back to square one for that argument.
What NSA Secure Linux really is. (Score:4, Informative)
What developers can do to help is to modify a web server, a mail server, and a DNS server (the most attacked server side software) to run under NSA Secure Linux, partitioned into levels of integrity.
The idea is that just because somebody attacks, say, the mail server receive program, that doesn't get them power over the whole system. All it should do is let them run their attack code in a jail where it can't do anything except burn CPU cycles, and maybe generate phony incoming mail. Mail associated with the known IP address from which that copy of the receiver was launched, so the problem can be tracked.. When they disconnect, or some monitor program kills the corrupted component off, all the damage should be flushed.
You need to rework key server apps so that about 95% of the code is untrusted and jailed, while the 5% that has to do security-related functions is isolated, identified, and carefully examined.
That's what NSA Secure Linux is for.
Review cost (Score:3, Insightful)
Hows that any different from if they chose windows? Wouldnt it still cost them just as much? thats assuming they can get access to the windows code. At least with Linux you don't have to pay to get it.
And no the leaked source does not count.
Re:Review cost (Score:3, Informative)
Re:Review cost (Score:2)
Re:Review cost (Score:2)
Anyway software security I belive is more about keeping it simple, this means fewer lines of code to go wrong, knowing every move the OS makes. The full linux source is hugh but you don't need all of it. But linux isn't the answer for everything but everyone is trying to make it solve another problem which adds to it size and complexity.
I think it would be alot easier starting from scratch which is jus
Obscurity not worthless (Score:3, Insightful)
Re:Obscurity not worthless (Score:4, Insightful)
give us a break (Score:5, Insightful)
Re:give us a break (Score:2, Insightful)
If the Gov't requires the vendor to audit the code that stringently, why wouldn't they put the same requirement on the embedded Linux provider?
In that case, it's the vendor's responsibility to audit to the gov't requirements. I'm going to seriously doubt it'll cost $500/line, but it should already be a part of the quote.
Re:give us a break (Score:3, Informative)
It might be more like $2,000/line - or more
There's also the issue of what kernel version you want to run - once you've decided on a certain version, it will be extremely painful to updtae to a new one. You've also have to validate that the compilers are generating the expected code. Compared to a well designed RTOS, Linux is bl
Compare that to (Score:3, Informative)
The advantages of closed source coding seem to me to be a faster development time, stronger integration of components, and more support. The drawbacks, though, are that you are ultimately trusting somebody else.
Open source code, I would say, is more secure overall - there are more people looking at the code, so it is less likely that bugs slip through. The drawbacks would be that open source is less custom-made and possibly less supported than the rest (also, as O'Dowd would have it, people 'contributing' backdoors).
As for simply writing your own secure code (an agency doing this, that is), it's obviously just more expensive.
The best solution, in my opinion, is to make your own custom flavor of Linux that is open to all, but contribution is regulated so no questionable code can be admitted - the tack taken by the NSA [nsa.gov].
Higher Standards (Score:5, Interesting)
I know Sun had to have a special version of Solaris just to meet these needs and Solaris was already considered very secure to begin with. I can't remember if MS released a secure NT for this reason as well or if they tried to and failed.
Talking about the openess of the linux code, there's another question I always wonder nobody asks. Sure Linux is open source and that's what helps it get better but I don't see the argument in terms of cost and security. Saying "you have the source you can see how secure it is" doesn't work for me. People buy an OS because it's cheaper to spend a few hundred or a few grand per PC than it is to hire the staff to build their own OS. Having to have the staff that can review, maintain and patch their own linux kernel alone isn't easy. It's something like 1.5 million lines of code right now. People want an OS that just works and is cheaper than building one themselves.
Re:Higher Standards (Score:3, Informative)
Re:Higher Standards (Score:2)
Re:Higher Standards (Score:2)
I'm not saying open source is bad I'm saying that I don't see that argument as being valid in terms of security.
but I'd like to comment on :
"Third is that if there's a problem with a particular piece of code (say, the SSL l
A Few Quick Notes about Green Hills (Score:5, Informative)
Basically, Green Hills seems to be just another proprietary software vendor scratching for ways to try and derail a competitor in their market space. Nothing to see here. Move along now.
Re:A Few Quick Notes about Green Hills (Score:2)
They're taking their example from someone we know quite well, aren't they
(Sorry, just finished reading Kaplan's "StartUp" again...)
SB
Re:A Few Quick Notes about Green Hills (Score:2)
Microsoft didn't say much about Linux until it started becoming a threat.
Linux certainly isn't always the best tool for the job, it is inappropriate to say that Linux can do every job as much as it is inappropriate to say it can't be trusted for any job.
Green hills hey? (Score:2, Funny)
Open vs. closed... (Score:3, Insightful)
This is kind of a side remark that I haven't really thought on too much, but here goes. (I think I'm playing devil's advocate...)
(1) Who audits the open source software that they use? I certainly don't. I rarely even bother to look at the source. So in this respect, it doesn't matter (to me) if the software is closed source or open source since the code isn't looked at even if you (I) had the chance to.
(2) If you're not going to audit the code, will you trust the code developers to have done adequate auditing? Again, the folks who write open source software are, for the most part, as much a stranger as the folks working in some company (at least if you're me). Why should I trust "open source" strangers more than "closed source" strangers?
These points rarely seem to get brought up here. I can certainly see the answers to (2) giving the edge to open source, but what about (1)?.
Re:Open vs. closed... (Score:2)
2) This one is a bit off base, since by definition the programmer who wrote the intrusive code is the one who introduced it to the system; thus, it is inhierent in any system that one does not trust the programmer. That is why companies have audits. The real question is why trust open source strangers?
Trust is often mi
Look at it this way. (Score:5, Informative)
Let's say you're in a major city. Let's say there's a small, narrow street. And let's say you walk down this street twice; once in the middle of the day, when the street is well-lit and crowded. And the second time in the middle of the night, when it is empty, abandoned and dark.
In which of these situations do you feel more safe?
I would probably guess the second. Why? In both the first and the second case, you have no way of knowing if there is someone who has a weapon and wishes you harm. But in the first case, this possibility is not something that worries you.
Open source is kind of like the well-lit, crowded street, and auditing is kind of like being able to tell if someone wishes you harm. First off, you don't *have* to be constantly watching your back; it's more than likely someone is looking at your back at any given moment, and can tell if someone is walking up behind you with a blunt instrument. Second off, the fact that *everyone knows people are watching* means it's less likely anyone will try anything, because they know they'll get caught and have messy problems with the law.
Note that this argument does not go so well unless the open source product is relatively well used. If you're the only user, well, you're not much better off.
---
Anyway, as far as (1) goes, I would imagine that while it may probably be a very important point insofar as you go, as far as the kinds of software discussed in this article go it's not so useful. You probably don't audit the open source software you use. But a propreitary embedded RTOS vendor certainly would, since their demands for security and reliability are much higher.
But wait, you say, wouldn't the need to audit the code at that level be an argument against open source, since it destroys the "free" nature? Well, here we run into the basic problem of the conflation of "free" software with "open source" software, or the conflation of "free" software with what RMS might call "software libre". These two concepts are often described by the same term. However, they are not the same thing!
A program being open source does not mean that it can have a trusted company of some kind behind it! A company such as IBM could be providing an open source program they internally wrote, or you could have a case such as that with MySQL (ok, maybe that's not a great example, but you know what I mean) where a community-developed program passes through a certain central trusted point (MySQL AB) which can be trusted to-- or demanded to-- perform the auditing for you. So this is not a problem with Open Source, this is just a problem with software you downloaded for free off the internet.
The best line is about the spies who insert code (Score:4, Insightful)
"Now that foreign intelligence agencies and terrorists know that Linux is going to control our most advanced defense systems, they can use fake identities to contribute subversive software."
The whole story is so absolutely paranoid (The Russians are coming! Beware of the Yellow Peril!) and shows such a complete lack of understanding of the Linux Open Source process that it would make me worry if I were buying Green Hills' software: Do you want to buy something from somebody who is this divorced from reality and has this little understanding of how his competitor works?
Re:The best line is about the spies who insert cod (Score:2, Insightful)
Re:The best line is about the spies who insert cod (Score:3, Insightful)
There are a number of open source projects that have had their servers 0wn3d by crackers in the last year or two. In at leas
Re:The best line is about the spies who insert cod (Score:2)
No.
He's right you know (Score:5, Funny)
btw, why even give a story like this press? What a joke.
This makes no sense... (Score:2, Interesting)
Basically this guy is recommending we entrust the security of our defense systems to the code review teams of the closed-source OS, rather than taking the time and money to do have the DOD do it themselves. Sounds like a money saver until a missile goes blue-screen and blows up a school...
If these people are so concerned about code review(which, admittedly, they ought to be), then perhaps they should be writing their
secure programs howto (Score:3, Informative)
Pot Kettle (Score:5, Insightful)
Does he get this pissed about Microsoft, IBM, Sun, HP and other companies that outsource core dev to those same countries?
Re:Pot Kettle (Score:2)
Don't get hung up on the term "core dev". Those companies are paying Chinese, Russian, and Indian developers to develop software that ships with their OSes and applications, and just about any piece of software that gets shipped could be used to put in a Trojan horse: device drivers, compilers, optimizers, code generators, installers, help systems, database code, network servers, CGI scripts, etc.
Biggest load of sh**. (Score:5, Informative)
Anyone want to place bets that Microsoft paid him to say that?
MS Isn't The Only One (Score:3, Insightful)
Nah, MS isn't the only one with a livelihood at stake. Linux is going to change the way a lot of people do business; some companies will not be able to adapt, and will die.
This is the sound of someone running scared. Plus, he probably believes what he says. Think about it from his perspective: his company is in the business of supplying good software, and he *knows* it's good software. Linux is deveoped in a strange way, one that is counte
Market share hype from Wind River (Score:4, Informative)
Actually, this is somewhat misleading. The top players listed are Microsoft (Windows CE), Wind River, Symbian, Palm. QNX, OSE, and Green Hills. But Microsoft, Symbian, and Palm are really selling into handheld devices, not hard real-time control. (The phone and PDA markets are much bigger than real time control, though.) Wind River's VRTX is the dominant player by a big margin, especially in low-end embedded control. QNX is next, and is usable on a broad range of platforms. Wind River is more of a specialist maker catering to the military Ada market.
Following these seven come LinuxWorks and MonteVista, who are moving up. These are the main Linux-based offerings.
Also confusing the issue is Windows XP Embedded, which is basically a Windows XP from which you can delete stuff you don't need. This sells more into point-of-sale applications than hard real time control.
SAYODF (Score:3, Interesting)
In the end, this means to me that Green Hill believes OSS has an unfair advantage. Personally, I think it's perfectly fair for people to offer free software. If Green Hill doesn't like it, tough. Or, they can just make their RTOS so good that the FAA or some other organization will be so impressed they won't bother going over some OSS and possible having to fix bugs or write documentation. Looks like the free market to me.
PS: SAYODF == Self-Analysising Your Own Dog Food; it's like a water bottling plant bitching about there being freshwater lakes because lakes don't have to do their own quality control
Impartiality (Score:2)
I wish suits would stop blathering about each other's products because really it's just a waste of time. The source is so obviously biased that even reading is pointless.
People like O'Dowd are running scared (Score:5, Interesting)
I caught this story on OSNews yesterday and posted a rebuttal on my blog [blindmindseye.com]. This sort of thing probably doesn't carry a lot of weight with most of the defense types because the military is the very definition of mission critical, no pun intended. Peoples lives are at risk on a daily business in most jobs in the military these days. There is almost no price too high to pay for the freedom to design to specification that Linux provides.
Linux is certainly not ready to take over a lot of things yet, but it is good enough for many things that traditional defense contractors are involved with. I wouldn't trust it yet as an OS for our warships or other vehicles, but I would trust it for communication systems and things like that. For situations like that, a RTOS from a company like Green Hills may not provide enough benefit to justify the cost. Linux is free, their product isn't. They can try to get the military hooked for a while, but Linux will always be free and there are plenty of IT workers in the military who could work on existing RTOS Linux forks for military use.
Another thing that has to be kept in mind is that with the push for homeland security, the laissez faire attitude that has been prevalent toward security has to go. The miltiary wants transparency so it knows it's not getting something bugged all to hell by some Jihadi who wormed his way into Microsoft or Sun via the H1-B visa program. The Debian and Fedora teams are great for that very reason. Everything is open to public scrutiny, from the installer to every package so the military gets a chance to audit everything.
Free markets are great, but in this case the military has to perform a more core mission: defend the US from attack. If that means violating free market principles by pouring taxpayer dollars into a free OS for public use, then they should and most likely will do it eventually.
Re:People like O'Dowd are running scared (Score:3, Interesting)
I would trust it more in that application than Windows or even Green Hills.
Free markets are great, but in this case the military has to perform a more core mission: defend the US from attack. If that means violating free market principles by pouring taxpayer dollars into a free OS for public use, then they should and most likely will do it eventually.
What makes you think that is not part of the free market? When the military invests
DoD, Linux and Security (Score:5, Informative)
If COTS products are used, the DoD programmers will test the software for defects and ask the vendor to correct the defects they find. There have been cases where the DoD has signed NDAs to gain access to source code for COTS software to fix bugs that caused problems with the DoD software that the software company WOULDN'T fix. This has even been done to find backdoors, trojans, and other bad things that disgruntled employees of proprietary software vendors have put into that company's products.
OSS gives the DoD the power to make the changes they want to secure their systems the way they want. They WILL go through the code and look for backdoors, trojans, viri, etc. They may even set up their own repository and fork the kernel. Once the DoD has a trusted version of Linux, they'll use it in-house. I suspect that most DoD programs looking at Linux are probably testing NSA's version.
The DoD should be able to release some of the improvements they make back to the community, but don't expect them to release everything. The military still has it's secrets.
Re:DoD, Linux and Security (Score:2)
I, for one, am still waiting for the DoD to release the research of one Colonel Sanders, who apparently came up with 11 Secret Ingredients for a secret project with the code name of "Fried Chicken".
How the Defense industry produces code (Score:5, Informative)
For starters, in the DoD, every line of code is reviewed by hand by a team of reviewers (usually 4-5). There are records of all the defects found and verification that fixes were made. After the initial development cycle, there's a rigorious testing phase where all specifications are tested, senarios are ran, and stress tests are performed. Any defect from this testing is recorded, and the software doesn't ship until it's fixed. This usually ends up being a 2-4 year process of just doing bug fixes.
And for those that don't know the difference, Windows is *not* certified for tactical use. Having EAL4 is not the same as being certified for tactical use.
It's really a different type of software. It's not that Linux isn't good piece of software, it's just that it wasn't developed for this type of work. There's nothing wrong with that.
Re:How the Defense industry produces code (Score:2)
Just curious - what about the NSA version of linux? Isn't that exactly what you are talking about?
(Yeah, I'm aware that what the NSA makes public and their in-house versions are probably very different. Still curious - and no, I'm not a terrorist
SB
Re:How the Defense industry produces code (Score:2)
NSA Linux is not a reviewed version of linux, it's a version of linux with enhanced security services (Linux Security Modules grew out of it for example).
Re:How the Defense industry produces code (Score:2)
Info from the NSA certainly filters down to the military, tho, so one could argue that they are part of the chain. But I may just be blowing smoke there
I take it that tactical (?battlefield CCC?) is essentially written from scratch "inhouse" then? If so, that's a very good thing IMO. Gotta be damned difficult tho.
Hats off to those devs.
SB
Whose Linux is it anyway? (Score:3, Interesting)
Drawing a line between what's secure enough to make the grade, and what that's out there might not be trustworthy enough for "secure" use is quite a tough thing. Sure, Open Source allows the code to be reviewed... but the government doesnt have the time to do that so that's no good for them.
Microsoft can at least come forward and show a big company standing behind their product... how can Linux match that?
Russian Gas Pipeline Code (Score:4, Funny)
Terrorists using fake identities to make changes? (Score:2, Insightful)
A current issue for me (Score:2)
Closed source should be held to a higher standard (Score:3, Insightful)
open source = no funny stuff (Score:2)
With closed source, it might work fine in test cases but there might be code hidden/lurking in the shadows that does something other than what's intended. If a cyberterrorist (or some a-hole) adds code that can be remotely activated and wreak havoc, it's harder to detect it if the code is like a black box (a mystery), and more likely to be detected in a clear box.
Just like ppl aren't likely to buy a car if you c
Trojan horses not much of an issue in embedded OSS (Score:3, Insightful)
Furthermore, for embedded code to try and infer what kind of system it's running on (military/non-military, essential/non-essential, deployed/non-deployed) and only fail in the essential, deployed, military systems is essentially impossible with the kind of minimalist code that could be hidden in an open source project and not noticed.
That means that if anybody planted a Trojan horse in OSS that was of any military significance, it would show up during testing as random failures, and that is just taken care of by normal testing procedures.
Note that the same argument doesn't work for closed source: something like a Green Hills embedded kernel could easily ship with a huge Trojan horse that looks for specific strings in system output/logs ("military", "target", "live munitions", "vehicle speed", whatever the military lingo is) and/or looks for specific sensor types, output devices, and/or communications channels and only triggers under specific circumstances likely to represent actual combat situations. While such attempts to identify combat situations would be blatantly obvious in 100% open source software and be noticed right away, they could easily be hidden in any big binary component of any closed source system.
DO-178B and Linux. (Score:5, Interesting)
This is defined within the D) 178b as software requirements, software specification, software design, source code configuration, and software test suites. If one changes one part then all levels affected must change as well.
Simply put a paper trail must exist for every change made in a system. It is stringent anal rententive form of development. It is costly since the amount of book keeping that must be done to incorporate changes.
This is the 'cost' that O'Dowd is refering to. In order to make a 'DO-178B' compliant version of Linux a group of developers/software house would have to:
1) Ensure that a comprehensive set of functional requirements is generated to match the desired platform.
2) Define a kernel that matches desired functional requirement. Any kernel portion that is not needed is defined out.
3) Specify the behaviour for each driver. Ensure the driver is fully specified. Work from the source and ensure that the behaviour of each execution path is documented.
4) Ensure that all changes to this build are reviewed and a paper-trail exists for all changes and changes are made for solid well documented reasons.
5) Use the documented behaviours to generate test cases that validate the documented behaviour.
It goes on and on...
There is nothing inherent within Linux that would prevent a DO-178B build to be created.
Only in the last 3 years has Green-hills has marketed a DO-178B compliant system. DO-178B as a standard has been around for I believe the last 10 years. Hmmm...
O'Dowd did not learn Thompson's lesson (Score:4, Insightful)
In fact, open-source software may have a slight advantage here, because it's less of a monoculture. Presumably Microsoft always uses their own Visual C++ compiler to build Windows, so if there were a trojan in the compiler that compromised the resulting Windows executables, it would be present in all copies of Windows that Microsoft distributed. But open source software is by its nature built on many different platforms using different compilers, so a compiler trojan would only affect a portion of the deployed copies of the open source software. And it is possible that a trojan introduced by one particular compiler would be found due to the executable it produces being different in some noticable way from the executable produced by a different compiler. For instance, strace might show the trojaned executable making extra system calls.
How does Mr. O'Dowd propose to assure us that his company's operating systems and compilers are more secure than Linux, xBSD, GCC, etc? Is he certain that none of his employess who have written code incorporated into his products have ever installed trojans? If so, how has he gained this certainty? Has he scrutinized every line of source code himself? Including those of the compilers that compiled the compilers, back all the way to the machine-code only origin of the system? Somehow I doubt it.
It is a matter of historical fact that far more trojan and back door exploits have been present in commercial, closed source software than in open source software. Just two days ago Cisco had to issue a security advisory regarding a back door found in their WLSE and HSE products. Would Mr. O'Dowd conclude that foreign agents and terrorists are responsible for that? Would he really have us believe that these shadowy figures can compromise open source software developed in the public eye more easily than they could subvert a commercial closed-source software package for which the source code and development process get no public scrutiny?
One is forced to conclude that Mr. O'Dowd feels his company's business model is threatened, and rather than change that model to reflect changes in the marketplace, he prefers to use "the sky is falling" proclamations in an attempt to scare customers into sticking with his products.
Embedded Software Different from Desktop/Server (Score:5, Informative)
If you've got your real time system in rom inside a piece of equipment, or in thousands of pieces of equipment, you've got to be very careful with it.
Desktop system can be patched and upgraded, but ROMs have to be replaced or flashed. For example, you've got to bring the missle into the hanger/lab and hook up the reflashing unit or swap out the ROM chip. You've got to test the missle with the new chip. Out in the field, the soldiers have new ly upgraded missles (or tanks...) and would really like to know that it will work when they need it. You can field test a tank, but some missles are expensive, especially when all you want to do is prove you installed the right chip in the right way.
When a desktop or server software hiccups, the human user can work around it. Often this is not the case in communications and avionics.
Linux Advantages Don't Translate to Military Embedded Systems
Embedded systems are almost always memory-resident and have no disk for software storage. There are usually no user identities to manage, and the user interface is quite often absent or primitive.
Most of the advantages of Linux do not apply to an embedded, military situation: Licensing fees for software are usually a negligable part of a tank, missle or radar. Embedded RTOS systems are already quite reliable, and do not suffer from nearly as many buffer overruns, neither are they susceptible to hackers. Embedded military systems are almost never connected to the internet.
You could build a reliable, compact embedded software system from embedded Linux, but you'd want to write all your own drivers and you would have to port it to special hardware. This approximately the same amount of work that you would have to do if you were to use a proprietary RTOS.
The vast bulk of the problems users experience with proprietary OS's are 1) expensive to license, more expensive to license across many machines. 2) Security vulnerabilities resulting from using a system designed and built for stand-alone personal use in an internetworked environment. Neither of these problems matters much to embedded, military systems.
He is overreacting. (Score:3, Interesting)
Security issues may exist in development environments, that are usually LANs connected to WANs. In that case, Linux is preferrable, due to better security.
As for open source being better when it comes to security, it is irrelevant to defense applications subcontracting. As long as the subcontractor is audited and found to have satisfactory methodologies and coding procedures, the contractor is ok. The focus in these cases is on qualification and testing, and they usually do exhaustive testing (i.e. testing every possible case) to make sure the application works as intended.
Re:Troll (Score:2)
Too bad that this company is not MS owned in anyway (and possibly a direct competitor in the embedded OS market). MS IS NOT OUT TO EAT YOUR CHILDREN AND DEFECATE ON YOUR WIFE!!!!
Re:Troll (Score:2)
SCO is not MS owned in any way (and possibly a direct competitor in the server market.)
Re:Troll (Score:2)
Big Ass Cowbells(tm) are not MS owned in any way (and possibly a direct competitor in the cow bell manufacturing market.)
See, I too can replace words and come up with an entirely false analogy.
Re:Troll (Score:2)
O'Dowd's criticism of Linux isn't aimed at non-defense applications such as set-top boxes and handheld computers. "I don't mind Linux's good pre
Re:Ehh... (Score:2)
Take the Phoenix Missile for instance and it's killer RTOS Foo, while there are plenty of Missiles using it, chances are, not a lot of evil doers are trying to hack them as they don't know any of the specifics of the OS.
Same
Re:Ehh... (Score:2)
The day a US DOD Linux system gets hacked, no amount of "we can patch it faster than closed source" is going to appease the angry mob, and the closed-source vendors are going to have a field day, regardless of their own track recor
Re:Slashdotted... (Score:2)
Just how are these evil open source coders going to gain access to the system? Will they be in the control center (the only place with access to it) with a computer that is attached to the system in front of them, and no one watching to see that they do nothing out of place?
Pure FUD. Only sligthly better than SCO, mainly because they haven't ranted enough about it i