Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Government Software United States News

US Dept. of Defense Creates Its Own Sourceforge 131

mjasay writes "The US Department of Defense, which has been flirting with open source for years as a way to improve software quality and cut costs, has finally burst the dam on Defense-related open-source adoption with Forge.mil, an open-source code repository based on Sourceforge. Though it currently only holds three projects and is limited to DoD personnel for security reasons, all code is publicly viewable and will almost certainly lead to other agencies participating on the site or creating their own. Open source has clearly come a long way. Years ago studies declared open source a security risk. Now, one of the most security-conscious organizations on the planet is looking to open source to provide better security than proprietary alternatives."
This discussion has been archived. No new comments can be posted.

US Dept. of Defense Creates Its Own Sourceforge

Comments Filter:
  • by rlseaman ( 1420667 ) on Sunday February 01, 2009 @10:36AM (#26684079)
    Denigrating the concept of security through obscurity is not the same as claiming the inverse holds. This should be an interesting experiment in whether subjecting code to an early phase of public hazing reduces security holes and risks of all sorts.
  • Huh? (Score:4, Insightful)

    by RDW ( 41497 ) on Sunday February 01, 2009 @10:51AM (#26684165)

    If it's 'limited to DoD personnel for security reasons' in what sense is it 'Open'?

  • Re:forgemil.com? (Score:1, Insightful)

    by Anonymous Coward on Sunday February 01, 2009 @10:55AM (#26684195)
    Yeah. If it's not a .mil site, then it's not US military. This has a very rotten smell. It's possible that some military folks got together to this on the private side, but it is definitely not military sanctioned. We have plenty of servers, why would we use GoDaddy?
  • by Anonymous Coward on Sunday February 01, 2009 @11:08AM (#26684281)

    You have an unusual definition of security. Let me tell you a few ways that having an obscured login name does not make you secure:

    Insecure server or service: By virtue of running a machine connected to the internet with an open port attached to a program, you are opening a potential security risk.

    If you can't find and login then obscurity does equal security

    You presume that login credentials and IP addresses are "unfindable". Warrants, interrogation, torture, greased palms, all of these things can easily circumvent the fact that one does not know information about your machine _right now_.

    Obscurity always sucks. There are plenty of easy ways to provide security without having to rely on the fact that a second party does not know easily found information.

  • Re:forgemil.com? (Score:2, Insightful)

    by Grandim ( 1390511 ) on Sunday February 01, 2009 @11:41AM (#26684491)
    My guess is that forgemil.com is the worldwide site that advertise the project while forge.mil is reserved to the individuals with the required certificate.
  • by MasterAE2k9 ( 1466549 ) on Sunday February 01, 2009 @11:53AM (#26684557)
    The military has being using open source for more than 2 decades. They even have a huge repository of approved/certified open source products that people with the right clearance can access to assist with day to day work. This is not new in any way or shape. This is nothing more than the incompetent in the Whitehouse taking credit for other people's work to make himself look good in the eyes of the bubbling idiots who ate his turds during the election.
  • by Srin Tuar ( 147269 ) <zeroday26@yahoo.com> on Sunday February 01, 2009 @11:57AM (#26684599)

    OK, you missed the entire point of the maxim "Security != Obscurity".

    It is a truism. The point is this: any secrets will eventually be leaked, whether you know it or not. Things that are easy to change, such as keys and passwords, are relatively low risk. Things that are very difficult to change, such as algorithms, are very high risk.

    If you count on the fact that your crypto algorithm or operating system is secure because its obscure, then when its leaked you will be facing a catastrophic disaster. Instead of losing the data on one communication or one server, you face a organization wide vulerability, and compromise of past communications.

    The extra security gained from keeping the algorithms secret pales in comparison to the disaster of having them be weak.
    Getting as many eyes on this type of code as possible is the best way to mitigate risk.

    After that, you still keep as much secret as possible.

  • by FlyingBishop ( 1293238 ) on Sunday February 01, 2009 @12:02PM (#26684625)

    You're missing the point. Good processes are hard to come up with. Pick a good process that has some well-defined unknown, something that you need to keep safe, and you're assured that no one will break your security. Pick a bad process, and someone may tell you.

    If you keep your process a secret, on the other hand, you have a host of unknowns - unknowns you do not know - that may provide someone access to your system. The point is, relying on a variety of ill-defined unknowns is inferior to relying on a single, well-defined unknown.

  • Re:Huh? (Score:3, Insightful)

    by Vertana ( 1094987 ) on Sunday February 01, 2009 @12:17PM (#26684725) Homepage

    The software is open... not every strategic decision or case use in which the software will be used.

  • by mazarin5 ( 309432 ) on Sunday February 01, 2009 @12:20PM (#26684757) Journal

    The point of it is that things like "Oh don't worry, nobody would think to look at /admin.pl so there's no point in putting a password on it" is not a good idea. Of course something has to be unknown or inaccessible for good security - that's not the same thing as claiming your system is secure when you're just hoping somebody doesn't notice a gaping flaw.

    There's nothing wrong with obscurity in a secure system, but obscurity alone is not genuine security.

  • by denzacar ( 181829 ) on Sunday February 01, 2009 @12:25PM (#26684795) Journal

    Sure, it's not open to 6 billion people, but it might be open to several million, and that's a heck of a lot better than closed in someone's desk drawer.

    How exactly is that different than something like this:

    3. RESERVATION OF RIGHTS AND OWNERSHIP. Microsoft reserves all rights not expressly granted to you in this EULA. The Software is protected by copyright and other intellectual property laws and treaties. Microsoft or its suppliers own the title, copyright, and other intellectual property rights in the Software. The Software is licensed, not sold.

    4. LIMITATIONS ON REVERSE ENGINEERING, DECOMPILATION, AND DISASSEMBLY. You may not reverse engineer, decompile, or disassemble the Software, except and only to the extent that such activity is expressly permitted by applicable law notwithstanding this limitation.

    5. NO RENTAL/COMMERCIAL HOSTING. You may not rent, lease, lend or provide commercial hosting services with the Software.

    It is ours not yours. You may do only what we let you. You can't give it away.

    Million drawers or just one - same thing if there is only one key to all the drawers.

    Open within a community that is guaranteed to be all "U.S. Persons" for export control purposes, perhaps.

    Apple's and MS' products are open within their own community too - is that also Open Source?

  • by silanea ( 1241518 ) on Sunday February 01, 2009 @12:40PM (#26684931)

    Sure, but that means nothing can be secure unless nobody knows about it and nobody can find out about it OR it in inaccesable for everyone. [...]

    Yes and no. Security is not absolute, it's not binary. It is the factor by which the amount of time and resources needed to break a certain security measure outnumbers the value of what's protected (or the effort needed to go through a different vector).

    Obscurity does not add anything on your side of the scale because you can't depend on it, you can't measure it, you can't audit it, and in most cases you will only know it has been broken when it is too late. It is a good idea to keep information about your valuable goods and the security measures that protect them hidden, but this does not add any security in itself.

    Not giving away your IP on /. may protect you from "our" wrath, but some script kiddie randomly scanning for open ports might still wreak havoc on your machine if you didn't lock it down properly.

    Don't mix up security and secrecy! They have little to do with each other.

  • by yorkshiredale ( 1148021 ) on Sunday February 01, 2009 @01:12PM (#26685175)

    Clicked through the site a little to the 'PKI Online Training' section, and I'm informed that I must :

    1. enable flash

    2. enable cookies

    3. enable javascript

    4. disable pop-up blocking

    I desperately hope this is a scam, since the alternative possibility is just frightening

  • Re:forgemil.com? (Score:3, Insightful)

    by Frosty Piss ( 770223 ) on Sunday February 01, 2009 @05:59PM (#26687415)

    Nice. It even points the user to ANOTHER non-.mil site to download a PKI certificate. That settles it for me. This is NOT the military.

    It's almost certainly a phishing site to gather CAC data from unsuspecting CAC holders.

  • Re:forgemil.com? (Score:5, Insightful)

    by RyoShin ( 610051 ) <<tukaro> <at> <gmail.com>> on Sunday February 01, 2009 @06:29PM (#26687619) Homepage Journal

    But wait, there's more!

    DefenseLink [defenselink.mil] is a DoD site that lists all DoD sites. Forge.mil(.com) is not on that list. Of course, it could be bureaucracy acting slow.

    Second, WHOIS contact connects to an individual at collab.net, another sourceforge-like site. Were this a government site, I would think they would have it registered to a position in a department, or at least a c/o address for a military/goverment institution, not an individual.

    Just to be sure, popping the given address into Google Maps returns what looks like a residential area.

    So this is either a horribly managed project (not surprising for the government), or some weird scam of sorts.

"If it ain't broke, don't fix it." - Bert Lantz

Working...