EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

01.17.14

For Real Security, Use CentOS — Never RHEL — and Run Neither on Amazon’s Servers

Posted in GNU/Linux, Red Hat, Security at 9:27 am by Dr. Roy Schestowitz

Red Hat logo

Summary: Never run Red Hat’s “Enterprise Linux”, which cannot be trusted because of NSA involvement; Amazon, which pays Microsoft for RHEL and works with the CIA, should never be used for hosting

SEVERAL years ago CentOS almost died; now it’s being embraced by Red Hat and one pundit from tech tabloid ZDNet is moving to CentOS Linux on the desktop [1,2].

CentOS is still in the news [3], with the CentOS project leader (Karanbir Singh) giving an interview to the Linux Foundation [4]. We trust CentOS, whereas trusting Red Hat is hard. RHEL is binary and based on news from half a decade ago, the NSA is said to be involved in the building process, as well as SUSE’s, whereas CentOS is built from source (publicly visible). Microsoft and the NSA do the same thing with Windows and it’s now confirmed that Windows has NSA backdoors.

Earlier this month vulnerabilities in RHEL’s openssl and RHEL’s gnupg [5,6], contributed even less to trust. RHEL is so standard in the industry that it would probably be simpler than other distributions to exploit; the NSA may as well have off-the-shelf exploits for all major RHEL releases, which are deployed in many countries’ servers (even so-called ‘rogue’ countries). Based on the NSA leaks, Fedora — not RHEL — is being used by the NSA itself to run its spying operations (e.g. collecting radio signals from afar). Fedora is not truly binary-compatible and its source code makes secrets hard to keep.

Lastly, mind the latest of Red Hat’s Fog Computing hype [7,8], including the CIA’s partner Amazon that’s lumped onto Red Hat [9,10] as part of a conference [11,12]. Avoid Amazon at all costs. It’s a malicious trap for many reasons. Amazon also pays Microsoft for RHEL after a patent deal with Microsoft, as we pointed out years ago. Suffice to say, Microsoft's servers are as bad as Amazon's for privacy.

RHEL and its derivatives continue to be deployed in many large networks of systems [13], so it’s clear why the NSA would drool over the possibility of back doors in RHEL. Watch out for that. Given the way NSA infiltrated standards bodies and other institutions, it’s not impossible that there are even moles at Red Hat or Fedora. There used to be some at Microsoft (we know about those who got caught).

Red Hat’s CEO is now telling his story in a Red Hat site [14] and one needs to remember who he used to work for (close to Boeing, which is primarily an army company), not just the country he is based on (hence the rules that apply to him, especially when he wishes to appeal to government contractors, DoD/Pentagon etc. which are the most lucrative contracts).

It should be noted that my Web sites are mostly running CentOS and the same goes for the host of Techrights, who focuses on security. With CentOS you can get the source code and redistribute; with Red Hat’s RHEL you can’t (it’s sold as binary).

There is definitely a good reason to trust CentOS security more than RHEL security. As for Oracle (“Unbreakable”), well… just read Ellison’s public statements in support of the NSA (never mind the company’s roots and the CIA). That tells a lot.

The bottom line is, blind faith in binary distributions is a bad thing. Blind faith in NSA partners (Red Hat collaborates with the NSA not just in SELinux) is even worse.

Related/contextual items from the news:

  1. Taking the long view: Why I’m moving to CentOS Linux on the desktop
  2. Is CentOS ready for the Linux desktop?

    CentOS is a very interesting and different choice for a desktop distribution. I haven’t heard of many people using it that way. Whenever somebody brings it up it’s usually within the context of running a server.

  3. Fedora and CentOS Updates, Linux for Security, and Top Seven
  4. CentOS Project Leader Karanbir Singh Opens Up on Red Hat Deal

    In the 10 years since the CentOS project was launched there has been no board of directors, or legal team, or commercial backing. The developers who labored to build the community-led version of Red Hat Enterprise Linux (RHEL) worked largely unpaid (though some took a few consulting gigs on the side.) They had a few hundred dollars in their bank account to pay for event t-shirts and that was it. And the project’s direction was decided based on the developers’ immediate needs, not a grand vision of future technology.

  5. Red Hat: 2014:0015-01: openssl: Important Advisory
  6. Red Hat: 2014:0016-01: gnupg: Moderate Advisory
  7. Red Hat Invests in Open Source IaaS, Cloud Talent
  8. Red Hat Academy Expands Training, Includes OpenStack Coursework
  9. Red Hat Launches Test Drives on AWS

    At its annual Partner conference in Scottsdale, Arizona this week Red Hat (RHT) announced new Test Drives on Amazon Web Services (AWS) with three Red Hat partners – CITYTECH, Shadow-Soft, and Vizuri. Through the AWS Test Drive program, users can quickly and easily explore and deploy ready-made solutions built on Red Hat technologies.

  10. Why Red Hat Needs OpenStack … And AWS

    OpenStack, the cloud’s community darling, desperately needs leadership, and Red Hat seems the ideal leader. But OpenStack isn’t the only needy party here. As good as Red Hat’s growth has been over the last decade, it pales in comparison to that of VMware, a later entrant that has grown much faster than Red Hat. And the open source leader still trails well behind Microsoft.

  11. Google, Amazon Clouds Invade Red Hat Partner Conference

    Google Cloud Platform and Amazon Web Services executives are set to address Red Hat Partner Conference attendees on Jan. 13 in Arizona. No doubt, the keynotes will seek to ensure Linux resellers understand how to move customer workloads into the Google and AWS public clouds, respectively.

  12. 7 Surprises At Red Hat Partner Conference 2014
  13. How to deploy OSSEC across a large network of systems from RPMs
  14. Teens and their first job: How to get on the path to a happy career

    I grew up in the 1980s in Columbus, Georgia. You needed a car to get around, so I did not work until I could drive. Within months of getting my driver’s license, I got my first job as a part-time computer programmer for a stockbroker.

Share this post: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Digg
  • del.icio.us
  • Reddit
  • co.mments
  • DZone
  • email
  • Google Bookmarks
  • LinkedIn
  • NewsVine
  • Print
  • Technorati
  • TwitThis
  • Facebook

If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

Pages that cross-reference this one

7 Comments

  1. AdamW said,

    January 17, 2014 at 7:44 pm

    Gravatar

    The RHEL 6 source – yes, RHEL is built “from source”, amazing, I know! – is right here:

    http://ftp.redhat.com/redhat/linux/enterprise/6Server/en/os/SRPMS/

    do feel free to peruse it at your leisure.

    Dr. Roy Schestowitz Reply:

    That’s a bit of a straw man response; I know there’s source code for RHEL, but if one was to built it from source, would it be identical to the binaries distributed by Red Hat? We need to check the build process, too. It’s about trusting trust and we already know what the NSA has been doing with corporate or squsi-corporate partners like RSA, NIST, Microsoft, etc.

    richardon Reply:

    I’m sorry but this is a loda of cr*p.

    If RedHat’s binaries differ from the published source, then they’re violating the GPL.

    If the binaries don’t differ the backdoors would be public, and CentOS (and other derivatives) would be as insecure as RedHat.

    About the openssl and gnupg vulnerabilities: CentOS was afected too, so as insecure as RH.

    Qoute:
    “There is definitely a good reason to trust CentOS security more than RHEL security.”

    Which reason is that?
    You don’t provide it so you shouldn’t trust CentOS either, according to your rules.

  2. DanseM said,

    January 20, 2014 at 11:06 am

    Gravatar

    > I know there’s source code for RHEL
    Then you should mention this in the article. You really should, otherwise it is not fair.

    You can build RHEL from SRPMs and compare binaries. Guess what, CentOS is doing exacly this to determine build environment (i.e. gcc version). CentOS build their distro as a “RHEL clone”, 100% API and ABI compatibile. You can even compare single file diffs from RHEL and CentOS. Guess what, we do that.
    You should try some builds yourself :)

    Red Hat could have placed some backdoor in RHEL but it would easy detectable. It is an issue in closed source products and this is why we should be aware of them.

    As a homework, plz check whether your truecrypt binaries are build from source without modifications. Not an easy task, but you can verify this with 100% certanity. Otherwise how could you tell your drive is really encrypted?

    PS. I am not an employee of Red Hat etc.

    Dr. Roy Schestowitz Reply:

    Hi DanseM,

    I have already exchanged almost a dozen E-mails about this analysis (E-mails with Red Hat staff). They could not find factual errors, but they were unhappy with the article, for reasons they could not, IMHO, defend or at least convince me of.

    I know one can build RHEL from source code (given some privileged access, which is similar to SUSE’s with SLE*). Then there’s patching, too (lots of packages updated, so keeping track of source code becomes even more impractical).

    I did not argue that assessment of the code is feasible given limited human resources (distributions are vast). I also did not argue that back doors are undetectable. Au contraire; Because these validation phases are infeasible we are left having to choose who to trust. I’m also in the business of validating builds, so I have some understanding of this.

    Let’s look at some other news from recent days:

    • Red Hat and CentOS become Voltron, build free operating system together

      “In retaliation, Red Hat started shipping Linux kernel source code in a big tarball with the patches already applied, making it more difficult to build Linux distributions from the RHEL source,” we noted in a feature on Red Hat’s history.

    • OpenShift Welcomes CentOS to the Red Hat Family–Origin Adds CentOS Support
    • CentOS Now Supported By OpenShift

      Hot on the heels of the news that CentOS was officially joining the RedHat family, the OpenShift project has announced that OpenShift Origin would now be officially supported for CentOS, which joins Fedora and Red Hat Enterprise Linux. OpenShift is Red Hat’s Platform as a Service (PaaS) offering. OpenShift has three flavors: the Red Hat hosted Online version, the self hosted and supported Enterprise version, and Origin, the community-driven upstream version of OpenShift.

    This joining of the two is not encouraging; in fact, we will now struggle to compare two potential sources of trust (acting as a sort of peer review). They’re conjoined now. I guess Scientific and other more deprecated clones of RHEL might be of use here.

    Lastly, you mentioned truecrypt. Well, truecrypt is proprietary software (pretending to be “open”), so it deserves zero trust anyway. It’s not relevant to this analysis in the way you contextually interject it.

  3. DanseM said,

    January 20, 2014 at 5:32 pm

    Gravatar

    > [about RHEL and CentOS] This joining of the two is not encouraging; in fact, we will now struggle to compare two potential sources of trust (acting as a sort of peer review). They’re conjoined now. I guess Scientific and other more deprecated clones of RHEL might be of use here.
    That’s 100% truth. Undoubtedly CentOS take over is a sound reason to watch your own back.

    My conclusion is to start watching RH’s hands although I do not feel thrilled. These days closed sourced system are real threat.

    BTW that’s quite wierd that RH folks are dropping you emails but not comments under the article.

    Dr. Roy Schestowitz Reply:

    The communications taught me two important things:

    1) NSA is a Red Hat client. I already knew DoD (Pentagon) was a client, as that had been announced years ago. I didn’t know about the NSA.

    2. NSA submits code through Red Hat, and not just SELinux code. In November I cited a Slashdot comment where a Red Hat employee (I cannot verify this affilation in Slashdot) wrote: “I work for Red Hat…. The NSA asks me to put code in the Linux kernel and I pass it to Linus.”

    Now I have this confirmed by one whose identity is verified, so I need not rely on Slashdot comments.

    For those who are eager to accuse me of being anti-Red Hat, I am sorry to disappoint, but this smear would not work. I defended Red Hat’s position for many years and Red Hat even let me interview their CEO.

    Red Hat is doing well despite the NSA scandals which harm some US companies, but if people peel off some onion layers and realise that Red Hat works with the NSA it won’t be good for business. Red Hat should make formal, publicly-accessible build processes to assure us NSA cannot compromise the system. Right now there’s secrecy (the above details are not public knowledge) which does nothing to appease the “paranoid”.

What Else is New


  1. The EPO's Media Partners Like Les Echos Already Produce EPO Puff Pieces (Marketing/Stenography)

    EPO promotion disguised as reporting or journalism, as seen in the media partners of the EPO well before these partnerships even begin



  2. Unitary Microsoft: EPO Excludes People Who Are Not Microsoft Customers From UPC Participation

    The EPO just can't help providing special treatment to Microsoft, not only when it comes to patent applications but also when it comes to rejecting stakeholders/applicants who dare not become Microsoft customers



  3. Links 30/5/2016: Linux 4.7 RC1, Best Linux Distros

    Links for the day



  4. Make Nothing, Sue Everybody: The Reality of Patent Trolls Increasingly Understood by the 'Mainstream'

    New patent stories and even extensive coverage at PBS, which dedicated a whole program to these matters but failed to address the core issue, which is software patenting



  5. [ES] Advertencia: La Vigilancia de la EPO Surveillance Puede Haberse Convertido en Más Intrusiva

    BlueCoat, que la EPO usa para oprimir a sus empleados en sus premisas Europeas, acaba de ajustar más y hacerse más intrusiva y los empleados pueden estar en riesgo



  6. [ES] Tarjeta de Victima Termina en Otra Torpeza para Battistelli Seis de su Guardia Pretoriana

    Battistelli esta destruyéndo lo que queda de la reputación de la EPO (después de las décadas que le costó a ella construírla) mientras los medios continúan escrutinando su desastroso régimen



  7. [ES] La EPO esta Excelente, Dice Sitio de ‘Noticias’ Conectado a Ella

    Los caraduras de la ‘revista’ IAM, viejo aliado de la EPO, da la impresión a la gente de que en la EPO todo esta bien y dandy aunque claramente ese no es el caso



  8. New EPO Caricature: Nouveaux Garde-Vélo (New Bicycle Guards)

    A new cartoon poking fun at Battistelli's bicycles and the perceived threat these are under



  9. Battistelli's 'Special Relationship' With Portugal and the 'Inventor of the Year' Charade

    What makes Portugal rather unique when it comes to Mr. Battistelli, who is allegedly desperate for support from smaller countries whose vote is easier to 'win'



  10. Patent Lawyers' Marketing Dominates and Marginalises Meaningful Analyses of Software Patenting in the US

    In an effort to create demand for software patents again, patent lawyers produce a huge heap of so-called 'analyses' which piggyback just one single decision (the exception, not the norm)



  11. A Mix of Patent Aggression and Sanctions/Raids (Using Controversial Patents) Against East Asian Companies

    New stories that demonstrate patent protectionism and show how Western industry, which barely makes anything anymore, relies on patents (software and design patents included) and this self-serving patent regime perpetuates itself even in Asia, where almost everything is actually being manufactured (and often/increasingly designed/developed too)



  12. Rumour: Battistelli Wants to Extend the Term of Topić's EPO Appointment in Spite of Criminal Charges Against Him

    The EPO's 'ringleader', Mr. Battistelli, is trying to keep his confidants (like Mr. Minnoye and Željko Topić) together for several more years to come, even defying rules regarding retirement age



  13. Links 29/5/2016: NetBSD 7.0.1, Genode OS 16.05

    Links for the day



  14. [ES] La Gerencia de la EPO Bajo Creciénte Estres por las Autoridades Legales Croatas, Políticas Alemanas, y los Medios Italianos

    Las cosas no son color rosa como la calma relativa sugiere, y esperamos en las próximas semanas mayores eventos otros que la protesta en todas las sedes de la EPO a través de Europa



  15. [ES] Los Medios de Comunicación Comienzan a Informar al Público Europeo Acercas de las Desventájas de la UPC Mientras que la EPO Acelera su Cabildeo por Ratificación

    La vergonzósa promoción de la UPC por parte de la EPO da otro paso adelánte mientras que venues de la prensa Europea (incluso canales de televisión) comienzan a explorar el arreglo secreto que es negociado por los abogados de patentes (con clientes corpórativos) y las oficinas de patentes, no el público o cualquier grupo que represente los intereses del público en general



  16. [ES] Algunos Detalles Acerca de ¿Cómo el Presidente de la EPO Es Rumoreado Estar Comprando Votos, y el Porqué es Suficientemente Base Para un Despido Inmediato?

    Algo de información tras las cortinas y una detallada explicación de la dependencia finánciera sistemática, creada por Battistelli a un costode €13 millónes o más, la cuál evita una efectiva supervisión de Battistelli



  17. Mishi Choudhary and Mike Masnick Explain Why India Should Reject Software Patents

    Both an Indian activist-lawyer and a widely-recognised author from the US explain to Indians why over-reliance on patents -- and acceptance of patents on software in particular -- is a very bad idea



  18. Microsoft Boosters Pretend Microsoft Fights for Privacy While the Company Uses Malware Tactics to Put Keyloggers on Everyone's Computers

    In spite of malware-inspired tactics that should land Microsoft in courts of law all around the world (as a defendant), Microsoft-friendly circles pretend that the company fights for people's rights like privacy -- all this when Microsoft installs keyloggers on people's PCs without their consent and obviously against their will



  19. Battistelli's Assault on EPO Staff's Right to Strike in Relation to French Politics and That 'Bicycle' Pretext for Crackdowns

    The latest bicycle 'gossip' and how it's being used, based on expectations from EPO staff, to introduce further crackdowns on human/labour rights



  20. Vice-President of the EPO Under Investigation: Treason, Abuse, Violations, Giving and Receiving Bribes

    An English translation of documents involving the Organised Crime Section of the Criminal Police Department in Zagreb, where the Vice-President of the EPO faces criminal charges



  21. EPO Management Warns People About Scams When the EPO's Management is Itself Falling for Scams

    Jesper Kongstad, the Chairman of the Administrative Council of the European Patent Organisation, helps demonstrate that not even the EPO is intelligent enough to spot an obvious scam



  22. Links 28/5/2016: Wine 1.9.11, New Gentoo

    Links for the day



  23. Links 27/5/2016: Android for Raspberry Pi, Google Beats Oracle in Court

    Links for the day



  24. Warning: EPO Surveillance May Have Just Gotten Even More Intrusive

    BlueCoat, which the EPO uses to enable oppression inside its European premises, has just gotten even nastier and staff may be at risk



  25. Victim Card Ends up in Another Blunder for Battistelli and His Six Bodyguards

    Battistelli is wrecking what's left of the EPO's reputation (after decades it took the Office to earn it) as the media continues to scrutinise his appalling regime



  26. Italian Report About EPO Now Available in English

    An English translation of a TV program which earlier this month documented some of the glaring problems at the EPO



  27. The EPO is Doing Great, Says EPO-Connected 'News' Site

    IAM 'magazine', a longtime ally of the EPO, gives people the impression that all is fine and dandy at the EPO even though that's clearly not the case



  28. Microsoft Has Killed Nokia (and Its Own Mobile Ambitions), But Watch What it Does With Patents

    Microsoft announces many more layoffs, having already caused tremendous damage to the Finnish economy, and patents are left astray for Microsoft's favourite patent trolls to pick



  29. EPO Management Under Growing Stress From Croatian Law Enforcement Authorities, German Politicians, Italian Media

    Things are not as rosy as the relative calm may suggest, and in the coming weeks we expect some major events other than the protest at all EPO sites across Europe



  30. Microsoft, a Dead Company Walking, Resorts to Malware Tactics, Now Truly Indistinguishable From Crackers

    Microsoft is essentially taking over people's PCs and installing on them a large piece of malware, complete with keyloggers, against the will of these PCs' owners


CoPilotCo

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

CoPilotCo

Recent Posts