Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Government Software United States News

US Dept. of Defense Creates Its Own Sourceforge 131

mjasay writes "The US Department of Defense, which has been flirting with open source for years as a way to improve software quality and cut costs, has finally burst the dam on Defense-related open-source adoption with Forge.mil, an open-source code repository based on Sourceforge. Though it currently only holds three projects and is limited to DoD personnel for security reasons, all code is publicly viewable and will almost certainly lead to other agencies participating on the site or creating their own. Open source has clearly come a long way. Years ago studies declared open source a security risk. Now, one of the most security-conscious organizations on the planet is looking to open source to provide better security than proprietary alternatives."
This discussion has been archived. No new comments can be posted.

US Dept. of Defense Creates Its Own Sourceforge

Comments Filter:
  • by rlseaman ( 1420667 ) on Sunday February 01, 2009 @09:36AM (#26684079)
    Denigrating the concept of security through obscurity is not the same as claiming the inverse holds. This should be an interesting experiment in whether subjecting code to an early phase of public hazing reduces security holes and risks of all sorts.
    • by Anonymous Coward on Sunday February 01, 2009 @09:41AM (#26684107)

      I have a server running somewhere on the internet.
      It has an IPv4 address with an open port 666
      The password is donkeydick69

      If you can't find and login then obscurity does equal security.

      • Re: (Score:2, Funny)

        by Anonymous Coward

        I left you a present :)

      • Re: (Score:3, Insightful)

        by Anonymous Coward

        You have an unusual definition of security. Let me tell you a few ways that having an obscured login name does not make you secure:

        Insecure server or service: By virtue of running a machine connected to the internet with an open port attached to a program, you are opening a potential security risk.

        If you can't find and login then obscurity does equal security

        You presume that login credentials and IP addresses are "unfindable". Warrants, interrogation, torture, greased palms, all of these things can easily circumvent the fact that one does not know information about yo

        • by Thiez ( 1281866 )

          > You presume that login credentials and IP addresses are "unfindable". Warrants, interrogation, torture, greased palms, all of these things can easily circumvent the fact that one does not know information about your machine _right now_.

          Sure, but that means nothing can be secure unless nobody knows about it and nobody can find out about it OR it in inaccesable for everyone. If we assume an opponent who plays without any rules whatsoever and has unlimited resources and can find out where you live, you al

          • Re: (Score:1, Informative)

            by Anonymous Coward

            It isn't even about having unlimited resources. For instance, take the great grandparent scenario. Lets say I offered some slashdot intern $4000 to get the IP address of the person who made that anonymous post, then I offered $4000 to some underpaid tech support person at his ISP to give me some information about this person. If he was posting at home, I could find out where he lived. A plane ticket, a rental car, a gun, and you would be able to hack into his "security through obscurity" server.

            $12,000 (est

            • by Thiez ( 1281866 )

              > $12,000 (estimating fees) isn't anywhere near unlimited funds. If he had something that was worth the effort, an average businessman could spend that much to get it.

              Sure, but an average businessman doesn't go around kicking peoples doors in and threatening people with a gun to force them to give up their secrets (well, not where I'm from). Even if they do, the password great great grandparent gave us is useless: if you visit him and threaten him with a gun, you don't ask for the ip and login of his ser

              • Then again, great great grandparent's computer could be behind a router blocking incomming connections...

                Then it's no longer simply obscurity.

                • Re: (Score:3, Funny)

                  by Thiez ( 1281866 )

                  But it IS irrelevant if you are prepared to go to his home and beat any information you need out of him.

                  • This is turning into job interview 2.0, where there is simply no possible solution and then you don't get hired because you didn't have a solution.
              • by mysidia ( 191772 )

                There is a solution to this: metal detectors on all doors and windows, and a degaussing coil.

                If someone steps in with a gun, the secrets automatically get blown away.

          • Re: (Score:3, Insightful)

            by silanea ( 1241518 )

            Sure, but that means nothing can be secure unless nobody knows about it and nobody can find out about it OR it in inaccesable for everyone. [...]

            Yes and no. Security is not absolute, it's not binary. It is the factor by which the amount of time and resources needed to break a certain security measure outnumbers the value of what's protected (or the effort needed to go through a different vector).

            Obscurity does not add anything on your side of the scale because you can't depend on it, you can't measure it, you can't audit it, and in most cases you will only know it has been broken when it is too late. It is a good idea to keep information about your

          • Secure the machine with a password, but don't watch what you are typing when you enter it. Now no one knows the password, and even though they have you, what you know, your body... They cannot get into the system. Of course you can't either, but you didn't say anything about that being a requirement. What you have, what you know, and who you are... The big three..... We are all waiting for a fourth security principle to make things better :-)
      • by lordsid ( 629982 )

        Just because I can't find it and login does not make it secure. You need to take into consideration the massive bot nets currently operating that constantly search IP addresses for security holes.

        Even if a setup is never compromised it is not necessarily secure. I hate to get all philosophical but if you build they will hack it.

        For example I give you any copy protection that has ever been implemented.

        • by Thiez ( 1281866 )

          > For example I give you any copy protection that has ever been implemented.

          That's a bad example. Copy protection can easily be circumvented because you have physical access to and root permissions on the machine the to-be-copied data is on. DRM gives you the encrypted data and the key.

      • by jotok ( 728554 )

        Back of a napkin: Using my modest (hypothetical) botnet of about 10,000 hosts, there's a decent (~25%) chance I will find and exploit you inside of a day, and a near-certainty that I will get you within 3 days. Just to be charitable I could throw in a random fudge factor of one week.

        I could probably speed it up if I could depend on certain assumptions or if I have a little additional data.

        Point being, the internet seems huge but it's not really all that big.

      • If you can't find and login then obscurity does equal security.

        If a tree fell and there was nobody in the forest to hear it, would it still make a sound?

    • Re: (Score:2, Interesting)

      by Cillian ( 1003268 )
      The whole security != obscurity thing is bollocks. Pretty much any "security" around today is basically obscurity. People say it's a bad idea to have a security system which relies on the process being unknown. It's comparable to having a system where the process is known but the password is unknown - the only difference being it's easier to change a password. The same applies to more advanced stuff like keys or certificates - The process is known, but one of the parameters is unknown, i.e. the key. If
      • by Srin Tuar ( 147269 ) <zeroday26@yahoo.com> on Sunday February 01, 2009 @10:57AM (#26684599)

        OK, you missed the entire point of the maxim "Security != Obscurity".

        It is a truism. The point is this: any secrets will eventually be leaked, whether you know it or not. Things that are easy to change, such as keys and passwords, are relatively low risk. Things that are very difficult to change, such as algorithms, are very high risk.

        If you count on the fact that your crypto algorithm or operating system is secure because its obscure, then when its leaked you will be facing a catastrophic disaster. Instead of losing the data on one communication or one server, you face a organization wide vulerability, and compromise of past communications.

        The extra security gained from keeping the algorithms secret pales in comparison to the disaster of having them be weak.
        Getting as many eyes on this type of code as possible is the best way to mitigate risk.

        After that, you still keep as much secret as possible.

      • by FlyingBishop ( 1293238 ) on Sunday February 01, 2009 @11:02AM (#26684625)

        You're missing the point. Good processes are hard to come up with. Pick a good process that has some well-defined unknown, something that you need to keep safe, and you're assured that no one will break your security. Pick a bad process, and someone may tell you.

        If you keep your process a secret, on the other hand, you have a host of unknowns - unknowns you do not know - that may provide someone access to your system. The point is, relying on a variety of ill-defined unknowns is inferior to relying on a single, well-defined unknown.

      • by mazarin5 ( 309432 ) on Sunday February 01, 2009 @11:20AM (#26684757) Journal

        The point of it is that things like "Oh don't worry, nobody would think to look at /admin.pl so there's no point in putting a password on it" is not a good idea. Of course something has to be unknown or inaccessible for good security - that's not the same thing as claiming your system is secure when you're just hoping somebody doesn't notice a gaping flaw.

        There's nothing wrong with obscurity in a secure system, but obscurity alone is not genuine security.

    • Re: (Score:1, Informative)

      by Anonymous Coward

      This is NOT an official DoD site. It's pointing to too many non-DoD sites, including for CAC/PKI sig's registered through GoDaddy, hosted on Collab.net.

      Using Slashdot as a large DoD Fishing Scam is interesting...

    • Re: (Score:2, Informative)

      by Rhabarber ( 1020311 )
      In Germany we have a government payed open source site since 2000 [berlios.de]. They provide good service for free, to anybody and without commercial annoyances. I especially like the choice between CVS/SVN/Mercurial/GIT.
    • This should be an interesting experiment in whether subjecting code to an early phase of public hazing reduces security holes and risks of all sorts.

      It's extremely unlikely that any SourceForge type repository for government-used code will have much if any public access.

  • forgemil.com? (Score:5, Interesting)

    by 1u3hr ( 530656 ) on Sunday February 01, 2009 @09:37AM (#26684093)
    Okay, why the hell does the DoD call the site "forge.mil" but actually host it at "forgemil.com"? If they can't get a real .mil site, who can? I thought it was some phishing scam. "forge.mil" doesn't even resolve, let alone redirect. And ".com"? Government reserved .gov, .mil and some other domains for its exclusive use. Why on earth are they using .com?
    • Re:forgemil.com? (Score:5, Interesting)

      by 1u3hr ( 530656 ) on Sunday February 01, 2009 @09:40AM (#26684101)
      PS: checked out forgemil.com: It's registered at Godaddy. Great. Are we sure this isn't some Nigerian scam? (I think the Chinese or Russians would be more subtle.)
      • Re: (Score:1, Insightful)

        by Anonymous Coward
        Yeah. If it's not a .mil site, then it's not US military. This has a very rotten smell. It's possible that some military folks got together to this on the private side, but it is definitely not military sanctioned. We have plenty of servers, why would we use GoDaddy?
        • Re:forgemil.com? (Score:5, Informative)

          by imamac ( 1083405 ) on Sunday February 01, 2009 @09:58AM (#26684213)
          Nice. It even points the user to ANOTHER non-.mil site to download a PKI certificate. That settles it for me. This is NOT the military.
          • Re: (Score:3, Insightful)

            by Frosty Piss ( 770223 )

            Nice. It even points the user to ANOTHER non-.mil site to download a PKI certificate. That settles it for me. This is NOT the military.

            It's almost certainly a phishing site to gather CAC data from unsuspecting CAC holders.

            • by mysidia ( 191772 )

              It's almost certainly a phishing site to gather CAC data from unsuspecting CAC holders.

              The CAC is a smart card, which shouldn't willingly reveal any of the keys stored on it.

              Moreover, I suspect it would be impossible to authenticate without the server itself having certain keys and credentials.

              I don't know enough about it to declare that phishing is completely impossible, but I would say that phishing seems unlikely.

              It would also be pretty hard with a SSL client certificate.. although a man-in-th

              • It's not even about SSL certs - tons of them are literally just a copy and past of your banking site (or what it looked like at one time) into MS word, saving it as HTML, not looking remotely in the same layout as the real thing, having a form dump your info to a plain-text file on their server, and they grab that every so often... and yet so many people still fall for it...
          • Re:forgemil.com? (Score:5, Insightful)

            by RyoShin ( 610051 ) <tukaro@[ ]il.com ['gma' in gap]> on Sunday February 01, 2009 @05:29PM (#26687619) Homepage Journal

            But wait, there's more!

            DefenseLink [defenselink.mil] is a DoD site that lists all DoD sites. Forge.mil(.com) is not on that list. Of course, it could be bureaucracy acting slow.

            Second, WHOIS contact connects to an individual at collab.net, another sourceforge-like site. Were this a government site, I would think they would have it registered to a position in a department, or at least a c/o address for a military/goverment institution, not an individual.

            Just to be sure, popping the given address into Google Maps returns what looks like a residential area.

            So this is either a horribly managed project (not surprising for the government), or some weird scam of sorts.

          • Re: (Score:3, Informative)

            by mysidia ( 191772 )

            Nice. It even points the user to ANOTHER non-.mil site to download a PKI certificate. That settles it for me. This is NOT the military.

            The homepage of the site they are pointing to https://www.dodpke.com/ [dodpke.com] Says the site has moved to: another url [army.mil]

            Which refers you to: this document [army.mil]

            Which states the following:

            Alternate method of retrieving DoD Root Certificate

            If you have trouble accessing the page listed above you can also visit the following page to download the DoD Root Certificates: https://www [dodpke.com]

          • Registered in the wrong TLD? Untrusted PKI source? Tells you you don't have permission to access the site? Screwed up beyond belief? How can you doubt for a minute it's military?

            unfortunately no smiley, if the military had gotten a process patent on disfunctional bureaucracy we could have a balanced budget collecting royalties from the banks and investment firms.

    • Probably because the servers are located in a commercial and not a government facility. They probably don't want to go through the hassle and cost of getting a NIPRNET circuit, which is somewhat ironic because this is a DISA effort (the same people who run NIPRNET).

    • Re:forgemil.com? (Score:5, Informative)

      by legirons ( 809082 ) on Sunday February 01, 2009 @09:59AM (#26684219)

      You know it's the right site, because its certificate is signed by the DoD CA.

      Except that CA isn't installed in any browser.

      And the site to download that cert is signed by the cert itself. Security by circular reasoning.
         

    • Re: (Score:3, Informative)

      by qw0ntum ( 831414 )
      Try https://www.forge.mil/ [forge.mil] . Once you get past the invalid certificate (allegedly because the DoD CA isn't included with most browsers) you'll get an SSL error.
      • Re: (Score:2, Insightful)

        by Grandim ( 1390511 )
        My guess is that forgemil.com is the worldwide site that advertise the project while forge.mil is reserved to the individuals with the required certificate.
        • As everybody else stated, even then, why would that need to be on a GoDaddy server? The DoD has no shortage of servers or bandwidth, even for testing some project that could flunk, so why?
    • Re:forgemil.com? (Score:4, Informative)

      by Anonymous Coward on Sunday February 01, 2009 @10:36AM (#26684449)

      forgemil.com is for public access to information about what the project/service is. It explaines, quite clearly, that to access forge.mil, you will need either a DoD-issued pki cert (CAC for you DoD folks), or a cert from a DoD-trusted source. All .mil infrastructure stuff is pki protected by policy. It also explains in the FAQ why you get the ssl warnings about untrusted certs. It also tells you how you can download the DoD root certs (they only provide installs for Windows; you'll either have to dig around to get the certs for other platforms or just create an exception in your browser).

    • forgemil.com resolves fine in my browser, forge.mil requires that a dod root certificate be entered, and also seems to be slashdotted at times. The official forge.mil site requires DOD credentials so the projects can be edited, forgemil.com seems to be read only.

    • by DoDRob ( 1467295 )
      forgemil.com is an error. The real DoD site is https://www.forge.mil/ [forge.mil]
  • by Anonymous Coward

    It's based on SourceForge Enterprise Edition, a product that VA Software (Now SourceForge, Inc) sold off to CollabNet about two years ago. It's not even close to the code that runs sourceforge.net (sf.net's code was a php/python/perl based site, SFEE is J2EE).

  • Legacy Applications (Score:3, Interesting)

    by El Torico ( 732160 ) on Sunday February 01, 2009 @09:46AM (#26684139)

    I would like to see open source applications that would replace all of the legacy, proprietary applications. DoD is loaded with very badly written applications that usually can only be changed by giving the same companies that produced them more money. Notice I said "changed" and not "improved".

  • Huh? (Score:4, Insightful)

    by RDW ( 41497 ) on Sunday February 01, 2009 @09:51AM (#26684165)

    If it's 'limited to DoD personnel for security reasons' in what sense is it 'Open'?

    • Indeed, I just tried to look at some projects and you can't. Pointless.

    • Re: (Score:3, Informative)

      by denzacar ( 181829 )

      Also... How can something military be open source at all?

      Military, unless we are talking para-military guerrilla troops somewhere in the jungle/desert, represents a particular government.
      Say... government of Canada. Or Peru.
      Now... that government is responsible and accountable to IT'S people. Not to the people of say... Singapore. Or Italy.
      People and nations that are on a good day economic competition and on a bad day vile evildoers.

      So, giving access to state secrets to potential enemies (and open source do

      • Re: (Score:3, Insightful)

        by Vertana ( 1094987 )

        The software is open... not every strategic decision or case use in which the software will be used.

        • Did you even bother to read the Forge.mil User Agreement?

          • Re:Huh? (Score:4, Informative)

            by Vertana ( 1094987 ) on Sunday February 01, 2009 @11:36AM (#26684885) Homepage

            Yes, which claims a standard United States Government agreement which claims they own the computer, the data, your soul and anything else that may come in contact with it... but it also states "Forge.mil is currently in beta with limited operational availability. General availability for unclassified use is scheduled for Spring 2009." So, one could safely assume (at this point) that with the PKI Certification that's needed and the agreement they expect only DoD computers to be accessing it at the moment. However, at some point everything stated will be changed (or they'll change their mission from being 'open').

      • by lahvak ( 69490 )

        Also... How can something military be open source at all?

        Lot's of software written by the military is not secret. For example, I believe the Army ran some sort of engineering competition for kids, where the participants had to "design and test" a bridge using a computer bridge simulator. The software was freely available (Windows only), and there were calls for them to release it as open source. They actually said they were considering it. I can't see how that could compromise our national security. Al

    • by Q-Hack! ( 37846 ) *

      If it's 'limited to DoD personnel for security reasons' in what sense is it 'Open'?

      Many DoD contractors write software for various projects. Allowing them a secure means to share code with each other would be immensely helpful. You can have several developers within a single contract, but in different companies and different locations around the world contributing to the software. For instance somebody from Harris corp. could submit patches to software written by Raytheon. Up until now there was no way to accomplish this. The best you could hope for, was to submit a request, and hope

  • by 3seas ( 184403 ) on Sunday February 01, 2009 @10:18AM (#26684325) Homepage Journal

    STANDARD MANDATORY NOTICE AND CONSENT BANNER
    YOU ARE ACCESSING A U.S. GOVERNMENT (USG) INFORMATION SYSTEM (IS) THAT IS PROVIDED FOR USG-AUTHORIZED USE ONLY. By using this IS (which includes any device attached to this IS), you consent to the following conditions: -The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data stored on this IS. -Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose. -This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details.
    Use of this system constitutes consent to monitoring for all lawful purposes.

    • I am guessing that you have not been paying attention to Russel Tice or the ongoing case about W's admin spying on all American's communication. And if they are spying on us, what make you think that they are not spying on the majority of the world?

      And you think that a little bitty notice on an obvious DOD site is scary?
      • by 3seas ( 184403 )

        Did you miss the "devices connected" part? And what happens when you access the site... connection wise?

      • by 3seas ( 184403 )

        I don't need Russels commentary. I'm well aware of the spying and know that we do not yet have the processing power to analyze such data stream in such amount for terrorist identification. Especially when you realize that terrorist communication can be so well hidden as to be common conversation where the communicating parties know a different meaning to what is said. Words, abstractions are only of value when used with agreed upon meaning, where the meaning can be established to be something quite differen

    • by aksansai ( 56788 )

      Duh.

      [sarcasm]I would feel a whole lot better if all the people of the world could access our government systems and do whatever the hell they could possibly want to with those systems[/sarcasm].

      Yes, indeed, big brother is watching over who uses their systems, how they use it, and for what purpose and intent. Just like if someone were to come over to your house and use YOUR system, you'd feel better knowing the purpose of the use. "No, sir, that was certainly not MY kiddie porn on MY computer..."

    • Everything in that statement is in reference to the "forge.mil" server. Communications to and from that server can (will) be monitored. You should accept that possibility with any system on the Internet, if you're smart. "device attached" refers to anything attached to the server, like a USB HD or other media. You can be paranoid and think your computer is "attached" to the server when you make an HTTP(S) connection, but you know that's not what they mean.

      This is a standard warning that says you're connecti

    • by DoDRob ( 1467295 )
      Yep, it's the standards Government Consent Banner which is required on all DoD web sites
  • by superid ( 46543 ) on Sunday February 01, 2009 @10:20AM (#26684341) Homepage

    When I was first hired as a budding DoD programmer a long time ago, one of the first things I asked is "where is our library of stuff that has been developed locally?"

    I might as well have asked "where is my +3 mace?" because we didn't have that either.

    I'm glad this is finally happening.

    • I might as well have asked "where is my +3 mace?" because we didn't have that either.

      I think perhaps you're confusing "DoD" with "DnD". Unless you have need-to-know access to a program I'm unfamiliar with...

    • by WED Fan ( 911325 )

      I might as well have asked "where is my +3 mace?"

      Why settle for a +3 mace when you can sit next to a +5 WMD? Really, you were thinking small. To conquer, one must think larger. Bwaahaahaahaa, bwaahaahaa, bwa...

  • Open the flood gates (Score:5, Interesting)

    by auric_dude ( 610172 ) on Sunday February 01, 2009 @10:25AM (#26684367)
    Open source code, Open Government http://www.whitehouse.gov/ [whitehouse.gov] and Open Source Intelligence http://en.wikipedia.org/wiki/Open_source_intelligence [wikipedia.org] all good ideas that may well speed things along and save the tax payers some cash.
    • Re: (Score:2, Informative)

      by Hazelesque ( 1423711 )
      From the linked wikipedia article...

      In the Intelligence Community (IC), the term "open" refers to overt, publicly available sources (as opposed to covert or classified sources); it is not related to open-source software.

  • Studies? (Score:4, Funny)

    by Wolfbone ( 668810 ) on Sunday February 01, 2009 @10:26AM (#26684375)

    Years ago studies declared open source a security risk.

    Since when did risible falsehood and fallacy filled rants written by swivel-eyed ideologues count as 'studies'?

    http://www.sourcewatch.org/index.php?title=Ken_Brown [sourcewatch.org]

  • [JoinCommunity]*

    *DOD CAC or ECA Certificate Required

    How easy is it to get one of these certificates?

    • Re: (Score:1, Funny)

      by Anonymous Coward

      Plenty easy. I know some recruiters that would be more than happy to give you a PKI enabled CaC...all it would take is a few signatures on your part, and raise your hand for one little oath...

  • by robkill ( 259732 ) on Sunday February 01, 2009 @10:27AM (#26684385)

    In most cases, if software was developed under a government contract, then the government has full rights to the source code. It would be a great starting place for updating a number of existing applications. Version control and vetting of results could be problematic in some cases, but not impossible to overcome.

  • by Bearhouse ( 1034238 ) on Sunday February 01, 2009 @10:30AM (#26684409)

    "Though it currently only holds three projects and is limited to DoD personnel for security reasons, all code is publicly viewable"

    No, it's not. Code posted to .mil is only available to those with sufficient authorisation. The .com site is publicly available for those seeking more information.

    So, code will be NOT be 'publicly' available - only to those on secure. Kinda as you'd expect, but rather a long way away from real FOSS.

  • by will_die ( 586523 ) on Sunday February 01, 2009 @10:49AM (#26684529) Homepage
    It looks like the military has solve the problem of time travel and web master has let it slip. According to the FAQ
    The Forge.mil effort started development in October 2009 and the first capability, SoftwareForge, is now available for limited, unclassified use.
  • The military has being using open source for more than 2 decades. They even have a huge repository of approved/certified open source products that people with the right clearance can access to assist with day to day work. This is not new in any way or shape. This is nothing more than the incompetent in the Whitehouse taking credit for other people's work to make himself look good in the eyes of the bubbling idiots who ate his turds during the election.
    • On the contrary, the miltary is culturally paranoid of anything open source. The rare open source package that makes it on an "approved" list is nearly always shot down by local IT staff, who consider open source to be a security risk. The only exception is the software that comes pre-packaged with Solaris, and Sun workstations are being rapidly replaced by Windows boxes. If this initiative has any impact at all on the software actually used by the DoD, it will be an improvement.
      • You must be referring to Open Source desktop apps installed on your computer. To get something installed on a locked-down box does require putting in a request - although I've never had one turned down (I have Eclipse, Subversion, Python, Firefox and more installed).

        As for custom applications - DoD has been using Open Source software in development of custom apps for years - myself for 7+ years, personally. I've never encountered resistence to developing and deploying apps that utilize Open Source software

        • I've had experiences both with desktops and servers...in my experience approval of open source is rare, and far more difficult to push through. I've never seen Apache or an open source database installed on a DoD system, only the proprietary Netscape web server and using ColdFusion rather than PHP for server-side scripting. I've seen requests to use PHP rather than ColdFusion get shot down purely on the grounds that PHP is open source. That's not to say I haven't seen open source on DoD systems. I have see
  • HUH (Score:2, Funny)

    by Anonymous Coward

    " Though it currently only holds three projects and is limited to DoD personnel for security reasons, all code is publicly viewable and...."

    ok how do you limit the site and make it public at same time, good journalism guys.
    and

    "Slashdot only allows a user with your karma to post 2 times per day (more or less, depending on moderation). You've already shared your thoughts with us that many times. Take a breather, and come back and see us in 24 hours or so. If you think this is unfair, please email posting@slas

  • by yorkshiredale ( 1148021 ) on Sunday February 01, 2009 @12:12PM (#26685175)

    Clicked through the site a little to the 'PKI Online Training' section, and I'm informed that I must :

    1. enable flash

    2. enable cookies

    3. enable javascript

    4. disable pop-up blocking

    I desperately hope this is a scam, since the alternative possibility is just frightening

    • Re: (Score:2, Informative)

      by Anonymous Coward
      The military uses cookies, flash, javascript, and pop-ups for just about everything. You have to enable all of the above to get a .mil site to load properly. It gets on everyone's nerves when we have to enable all of the above to do mandatory training.
    • by Jaqui ( 905797 )

      ahh, wonderful,

      critical SECURITY holes MUST be enabled to use the "secure" site.

      make perfect sense... if you are a government drone.

  • I'm really starting to like this Barrack Osama guy! Finally a president who knows how to take advantage of technology and open source
  • at 8:30 eastern time, on Feb 2. The site is still /.'ed. We have brought down a gov web site. (are we terrorists?)
  • I want to clear up some confusion .... The real site is at https://www.forge.mil/ [forge.mil] not www.forgemil.com. Forgemil.com was a site we were using during the development of forge.mil. Unfortunately, the wrong URL somehow made it in to the article. Right now the site requires a user to authenticate using a DOD PKI certificate (either a Common Access Card or a certificate from one of the DoD external certificate authorities (ECA)). See http://iase.disa.mil/pki/eca/index.html [disa.mil] for more information.
  • "Well," he said, "it's to do with the project which first made the software incarnation of the company profitable. It was called Reason, and in its own way it was sensational."

    "What was it?"

    "Well, it was a kind of back-to-front program. It's funny how many of the best ideas are just an old idea back-to-front. You see there have already been several programs written that help you to arrive at decisions by properly ordering and analysing all the relevant facts so that they then point naturally towards the rig

You know you've landed gear-up when it takes full power to taxi.

Working...