back to article Wow, another NSA leak: Network security code appears on GitHub

The NSA today revealed it has uploaded source code to GitHub to help IT admins lock down their networks of Linux machines. The open-source software is called the System Integrity Management Platform (SIMP). It is designed to make sure networks comply with US Department of Defense security standards, but the spy agency says it …

  1. elDog

    Please, be the first to take advantage of this fine product

    What's not to like about a gov't funded product that gets full control of your system?

    If they were even worth the purported 1BN$/month per the article, they should have already installed it, run it without you detecting, and sent the reports to the appropriate places.

    1. Anonymous Coward
      Terminator

      Re: Please, be the first to take advantage of this fine product

      You make it sound as if SIMP is akin to SkyNet!! I for one can assure you that SkyNet is much more user-friendly :)

    2. Matt Bryant Silver badge
      FAIL

      Re: elDog Re: Please, be the first to take advantage of this fine product

      "What's not to like about a gov't funded product that gets full control of your system?...." It's now open source code, anyone can review it. Well apart from those too blinded by the foil wrapped round their heads, it seems.

      1. Fatman
        Joke

        Re: elDog Please, be the first to take advantage of this fine product

        Well apart from those too blinded by the foil wrapped round their heads, it seems.

        Well, you can wrap you house, like this guy did:

        http://wfla.com/2015/07/09/foiled-tarpon-springs-house-no-longer-an-art-project/

    3. NoneSuch Silver badge
      Thumb Down

      This isn't SkyNet

      You'd have a chance with SkyNet.

      The USA has no business dictating computer and security policy to anyone when it can't even protect itself.

      I would love the recent 21 million record data theft to be traced back to an NSA introduced weakness in the Ethernet, SSL, or crypto protocols. Karma, what a concept.

  2. Anonymous Coward
    Anonymous Coward

    Is it just me?

    //The NSA today revealed it has uploaded source code to GitHub to help IT admins lock down their networks of Linux machines.//

    //To use the software, you'll need to be running Red Hat Enterprise Linux 6.6 or 7.1, or the same versions of CentOS.//

    Are Red Hat Enterprise Linux 6.6 and 7.1 compromised?

    1. Robert Helpmann??
      Childcatcher

      Re: Is it just me?

      Are Red Hat Enterprise Linux 6.6 and 7.1 compromised?

      I would guess those two versions are listed because they are what are authorized for use on DoD networks. As the article pointed out, the tool was developed for in-house use so it would surprise me if there were another Linux version given.

  3. Bob Dole (tm)

    NSA?

    >>The NSA today revealed it has uploaded source code to GitHub to help IT admins lock down their networks of Linux machines.

    The NSA, as well as the other US TLA's, have lost all public trust at this point. Install at your own risk.

    1. Anonymous Coward
      Linux

      Re: NSA?

      "Install at your own risk."

      I wear far more tin foil than you are ever likely to see in your lifetime but I am reading the source code at the moment as a background task and so far it looks fine. Unfortunately I can't do that for many systems that I have to hold my nose whilst managing them.

      Have a look at their GitHub page. There are some pretty good docs on there and I am grateful to the US taxpayer for funding eg this:

      https://www.nsa.gov/ia/_files/app/Spotting \

      _the_Adversary_with_Windows_Event_Log_Monitoring.pdf

      I'll take good advice wherever I find it.

      1. Paul Crawford Silver badge

        Re: NSA?

        GCHQ also provide guidance for securing systems. It is OK and you can sleep safe, they are not a TLA :) See here, but of course read and understand first:

        https://www.gov.uk/government/collections/end-user-devices-security-guidance

        1. Nifty Silver badge

          Re: NSA?

          Unable to connect to that link from work. Is it NSFW?

          ( https://www.nsa.gov/ia/_files/app/Spotting \_the_Adversary_with_Windows_Event_Log_Monitoring.pdf )

          1. Anonymous Coward
            Anonymous Coward

            Re: NSA?

            This one works for me:

            https://www.nsa.gov/ia/_files/app/Spotting_the_Adversary_with_Windows_Event_Log_Monitoring.pdf

            Be careful putting it back together. Seems el Reg likes to wrap it to a second line.

  4. Mark 85

    They uploaded it, therefore not a leak...

    Open source... some of us are reading it. My only concern is are there holes that even NSA doesn't know about? If it's so damn secure, why are other governmental departments running it... like OPM for example?

    NSA has a seriously tarnished image and it would help if the code does what it says on the label with no surprises. It'll be interesting to see what those with the expertise see in the code. It might be a good thing.

    1. Anonymous Coward
      Anonymous Coward

      Re: They uploaded it, therefore not a leak...

      If it's so damn secure, why are other governmental departments running it... like OPM for example?

      Apples and oranges. The key challenge for US government security is the amount of fragmentation and power plays that undermine any attempt at coherence. There isn't a single party that is neutral enough to prescribe to the others what needs to happen and have a hope in hell of the advice being listened to, let alone being followed.

      This is not the first time the NSA has brought some code into the public that was worth looking at, and they know full well that it will be taken to pieces before anyone will deploy it.

      1. Anonymous Coward
        Anonymous Coward

        Re: They uploaded it, therefore not a leak...

        Agreed, to a point. For a billion USD per month, one should expect decent code. A sea change that indicates TLAs are truly more interested in exposing and countering vulnerabilities (as opposed to hoarding and exploiting them) in pursuit of the public interest would be very welcome. A more secure internet world is in everyone's interest, even cold warrior dinosaurs. Self interested bottom feeders need to be removed from the process.

        But I wear tinfoil too, and fear that this could just be another highly motivated PR and damage control exercise. It will be some time before the general public ever feels relaxed about code that was "good enough for government work" again. On the other hand, if gov/sec/intel starts playing by the same rules as the rest of the internet, there may be hope.

        So bring on the open source eyeballs, check it out, and trust n0one.

        I don't.

    2. Anonymous Coward
      Anonymous Coward

      Re: They uploaded it, therefore not a leak...

      You may be onto something, @Mark85 - sounds like a PR gimmick. A token gesture of goodwill, nothing more.

  5. Will Godfrey Silver badge
    Unhappy

    Trojans?

    Not too keen on horses these days.

    1. tony2heads
      Joke

      Re: Trojans?

      No, and they keep the prophylactics on

    2. Anonymous Coward
      Anonymous Coward

      Re: Trojans?

      Not too keen on horses these days.

      Well, at least they stopped putting them in the lasagna so there is *some* progress..

  6. Anonymous Coward
    Anonymous Coward

    Security

    It is designed to make sure networks comply with US Department of Defense security standards,

    So using it on a secure network downgrade that network to the cheese cloth security of the US DoD - no thanks.

    1. Captain DaFt

      Re: Security

      "It is designed to make sure networks comply with US Department of Defense security standards,"

      "So using it on a secure network downgrade that network to the cheese cloth security of the US DoD"

      Seems like it would be easy enough to do yourself, without their help:

      Set username: admin

      Set password: password

      There. Fully as secure as most government networks seem to be.

  7. Koconnor100

    " US Department of Defense security standards"

    Would that be the standard NSA deliberately gutted ?

    Please ... enough is enough. Quit pushing broken software on us. You're totally non-trustworthy, you've been caught lying time and time again, quit embarrasing yourself.

  8. JJKing

    When I first read it I wondered if there were a couple of lines of code that could be hooked into other lines of code from their other "updates" that when joined together make a nice NSA owned backdoor. I wonder at times if I am wearing too much tinfoil or not enough. The neck brace help with the load at the moment.

  9. Destroy All Monsters Silver badge
    Holmes

    Well, actually....

    ....this seems to be in the tradition of "SELinux" issued from "Project Flask". So there is some continuity.

  10. Spaceman Spiff

    NSA. Doesn't that stand for Naturally Stupid Assholes?

    1. Matt Bryant Silver badge
      FAIL

      Re: Spaceman Spiff

      "....Naturally Stupid Assholes?" If you had bothered to read up on the matter, you might have known that the NSA employs more Maths grads than NASA. Definitely Not Stupid Assholes it would seem.

      1. Fatman

        Re: Spaceman Spiff

        I think he was taking a jab at the upper reaches of the NSA, not its foot soldiers.

  11. DerekCurrie
    Devil

    Wait. What? Use security code from the NSA? No way!

    Don't we learn from the past? The NSA has deliberately and consistently dumped compromised and back-doored code on its victims. We want more of the same? I don't think so.

    Report: NSA paid RSA to make flawed crypto algorithm the default

    The NSA apparently paid RSA $10M to use Dual EC random number generator.

    http://arstechnica.com/security/2013/12/report-nsa-paid-rsa-to-make-flawed-crypto-algorithm-the-default/

    How “omnipotent” hackers tied to NSA hid for 14 years—and were found at last

    "Equation Group" ran the most advanced hacking operation ever uncovered.

    http://arstechnica.com/security/2015/02/how-omnipotent-hackers-tied-to-the-nsa-hid-for-14-years-and-were-found-at-last/

  12. connermac725

    its a Honey pot

    use at your own risk

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Other stories you might like