SEVERAL years ago CentOS almost died; now it's being embraced by Red Hat and one pundit from tech tabloid ZDNet is moving to CentOS Linux on the desktop [1,2].
openssl
and RHEL's gnupg
[5,6], contributed even less to trust. RHEL is so standard in the industry that it would probably be simpler than other distributions to exploit; the NSA may as well have off-the-shelf exploits for all major RHEL releases, which are deployed in many countries' servers (even so-called 'rogue' countries). Based on the NSA leaks, Fedora -- not RHEL -- is being used by the NSA itself to run its spying operations (e.g. collecting radio signals from afar). Fedora is not truly binary-compatible and its source code makes secrets hard to keep.
CentOS is a very interesting and different choice for a desktop distribution. I haven't heard of many people using it that way. Whenever somebody brings it up it's usually within the context of running a server.
In the 10 years since the CentOS project was launched there has been no board of directors, or legal team, or commercial backing. The developers who labored to build the community-led version of Red Hat Enterprise Linux (RHEL) worked largely unpaid (though some took a few consulting gigs on the side.) They had a few hundred dollars in their bank account to pay for event t-shirts and that was it. And the project's direction was decided based on the developers' immediate needs, not a grand vision of future technology.
At its annual Partner conference in Scottsdale, Arizona this week Red Hat (RHT) announced new Test Drives on Amazon Web Services (AWS) with three Red Hat partners – CITYTECH, Shadow-Soft, and Vizuri. Through the AWS Test Drive program, users can quickly and easily explore and deploy ready-made solutions built on Red Hat technologies.
OpenStack, the cloud's community darling, desperately needs leadership, and Red Hat seems the ideal leader. But OpenStack isn't the only needy party here. As good as Red Hat's growth has been over the last decade, it pales in comparison to that of VMware, a later entrant that has grown much faster than Red Hat. And the open source leader still trails well behind Microsoft.
Google Cloud Platform and Amazon Web Services executives are set to address Red Hat Partner Conference attendees on Jan. 13 in Arizona. No doubt, the keynotes will seek to ensure Linux resellers understand how to move customer workloads into the Google and AWS public clouds, respectively.
I grew up in the 1980s in Columbus, Georgia. You needed a car to get around, so I did not work until I could drive. Within months of getting my driver's license, I got my first job as a part-time computer programmer for a stockbroker.
Comments
AdamW
2014-01-18 00:44:05
http://ftp.redhat.com/redhat/linux/enterprise/6Server/en/os/SRPMS/
do feel free to peruse it at your leisure.
Dr. Roy Schestowitz
2014-01-18 00:52:00
richardon
2014-01-20 15:33:48
If RedHat's binaries differ from the published source, then they're violating the GPL.
If the binaries don't differ the backdoors would be public, and CentOS (and other derivatives) would be as insecure as RedHat.
About the openssl and gnupg vulnerabilities: CentOS was afected too, so as insecure as RH.
Qoute: "There is definitely a good reason to trust CentOS security more than RHEL security."
Which reason is that? You don't provide it so you shouldn't trust CentOS either, according to your rules.
DanseM
2014-01-20 16:06:03
You can build RHEL from SRPMs and compare binaries. Guess what, CentOS is doing exacly this to determine build environment (i.e. gcc version). CentOS build their distro as a "RHEL clone", 100% API and ABI compatibile. You can even compare single file diffs from RHEL and CentOS. Guess what, we do that. You should try some builds yourself :)
Red Hat could have placed some backdoor in RHEL but it would easy detectable. It is an issue in closed source products and this is why we should be aware of them.
As a homework, plz check whether your truecrypt binaries are build from source without modifications. Not an easy task, but you can verify this with 100% certanity. Otherwise how could you tell your drive is really encrypted?
PS. I am not an employee of Red Hat etc.
Dr. Roy Schestowitz
2014-01-20 21:54:44
I have already exchanged almost a dozen E-mails about this analysis (E-mails with Red Hat staff). They could not find factual errors, but they were unhappy with the article, for reasons they could not, IMHO, defend or at least convince me of.
I know one can build RHEL from source code (given some privileged access, which is similar to SUSE's with SLE*). Then there's patching, too (lots of packages updated, so keeping track of source code becomes even more impractical).
I did not argue that assessment of the code is feasible given limited human resources (distributions are vast). I also did not argue that back doors are undetectable. Au contraire; Because these validation phases are infeasible we are left having to choose who to trust. I'm also in the business of validating builds, so I have some understanding of this.
Let's look at some other news from recent days:
Red Hat and CentOS become Voltron, build free operating system together
OpenShift Welcomes CentOS to the Red Hat Family--Origin Adds CentOS Support
CentOS Now Supported By OpenShift
This joining of the two is not encouraging; in fact, we will now struggle to compare two potential sources of trust (acting as a sort of peer review). They're conjoined now. I guess Scientific and other more deprecated clones of RHEL might be of use here.
Lastly, you mentioned truecrypt. Well, truecrypt is proprietary software (pretending to be "open"), so it deserves zero trust anyway. It's not relevant to this analysis in the way you contextually interject it.
DanseM
2014-01-20 22:32:53
My conclusion is to start watching RH's hands although I do not feel thrilled. These days closed sourced system are real threat.
BTW that's quite wierd that RH folks are dropping you emails but not comments under the article.
Dr. Roy Schestowitz
2014-01-20 22:47:59
1) NSA is a Red Hat client. I already knew DoD (Pentagon) was a client, as that had been announced years ago. I didn't know about the NSA.
2. NSA submits code through Red Hat, and not just SELinux code. In November I cited a Slashdot comment where a Red Hat employee (I cannot verify this affilation in Slashdot) wrote: “I work for Red Hat…. The NSA asks me to put code in the Linux kernel and I pass it to Linus.”
Now I have this confirmed by one whose identity is verified, so I need not rely on Slashdot comments.
For those who are eager to accuse me of being anti-Red Hat, I am sorry to disappoint, but this smear would not work. I defended Red Hat's position for many years and Red Hat even let me interview their CEO.
Red Hat is doing well despite the NSA scandals which harm some US companies, but if people peel off some onion layers and realise that Red Hat works with the NSA it won't be good for business. Red Hat should make formal, publicly-accessible build processes to assure us NSA cannot compromise the system. Right now there's secrecy (the above details are not public knowledge) which does nothing to appease the "paranoid".