✨ We've just launched our NEW website design!

Learn More Here
News

NSA Has Code Running In the Linux Kernel And Android

Linux

The saying “how deep does the rabbit hole go” has never been more appropriate with regards to NSA speculation as everyday people seem to pull up something new. With the USA’s National Security Agency, or NSA, in the spotlight recently over the whole PRISM saga, it seems to have made pretty big news everywhere. Now it emerges that the NSA has code running in both the Linux Kernel and in Android. Though this isn’t anything new, as it has been known since 2003, it has only just come to mainstream public attention.

The NSA had an active role in developing SELinux, that is security enhanced Linux. I am sure it won’t be long before sceptics pull the “Surveillance enhanced Linux” out of the bag.

The SELinux project was merged into the Linux Kernel back in 2003 meaning it is present in all Android and Linux distributions available today. The tool is an implementation of mandatory access controls for the Linux distribution. It is described below:

SELinux is a security enhancement to Linux which allows users and administrators more control over access control.

Access can be constrained on such variables as which users and applications can access which resources. These resources may take the form of files. Standard Linux access controls, such as file modes (-rwxr-xr-x) are modifiable by the user and the applications which the user runs. Conversely, SELinux access controls are determined by a policy loaded on the system which may not be changed by careless users or misbehaving applications.

SELinux also adds finer granularity to access controls. Instead of only being able to specify who can read, write or execute a file, for example, SELinux lets you specify who can unlink, append only, move a file and so on. SELinux allows you to specify access to many resources other than files as well, such as network resources and interprocess communication (IPC).

Not being a very Linux educated person I can’t really comment on the likelihood of SELinux being a backdoor. However, I can point out that people have speculated SELinux is an NSA backdoor to all Linux and Android devices. On the other hand other people have rubbished those claims stating that with Linux being an open source operating system there is no way such a backdoor could have existed unnoticed. Furthermore all source code for the NSA’s SELinux project is open source and available for examination.

What are your thoughts on this?

Image courtesy of Linux

Related Articles

34 Comments

      1. ^^ Fedora/Red-hat forums have some old discussions related to this topic. You can classify them as speculation. But when we think from where part of the development cost comes, we can assume a lot of things – one being this.

  1. You exaggerate a lot. In Linux, can contribute to anyone if it would be useful to the community. There is a code from Microsoft, so what?

    By the way SELinux which is used quite a bit. By default, only in products Red Hat (including Fedora).

  2. Stupid hypothesis – Kernel developers can smell the tiniest rat – So many eyeballs on the code – No one can sneak in large backdoors into Linux

    1. Considering the way they treat security vulnerabilities* unlikely. Also I doubt there are really many eyeballs, much less the ones being able to spot vulnerability. (Too few experts in that area to begin with) And claim of “m,any eyeballs” is frankly myth. Nobody has time to go over large code, much less to validate and audit it – assuming they¨d even have necesary knowledge and experience.

      * http://arstechnica.com/security/2013/05/critical-linux-vulnerability-imperils-users-even-after-silent-fix/

    2. maybe its a propaganda made by the nsa. they are sad, psychically derailed people, so you can expect only the worst from them. the list of crimes they are commiting is far from over, i believe. it feels almost like a complete end of law. lawl.

    3. I want to believe what you’re saying, but I can’t just go on a hunch that “somebody would have noticed by now” if it was malicious code. How many people do you know personally that have sifted through every single line of code to see if there are any holes? You can’t just assume that somebody would. Are there any companies, organizations, independent groups, individuals that have staked their reputation and money on a claim that they have reviewed all the code and confirms it is “clean”? Until then I remain skeptical.

    4. Really? Maybe if you declare “No one” to be the average developer. NSA certainly doesn’t apply here. There is only one certainty, they have the knowledge, time and resources to engineer the most ochestrated backdoor ever into something like a linux kernel. A little very tiny bug here that does nothing on its own a bug there and there and then all together by some strange weird attack pattern start opening a door there or here… whatever. You would be pretty naive to believe that OpenSource does mean there can’t be backdoors. The effort is certainly much higher than telling Microsoft to just add one, but its far from impossible no matter how many eyes look over the code.

  3. It’s really unfortunate that you’d publish this. You even said you don’t know enough to comment, so please don’t. SELinux is what allows all of the shit-tier mass hosting providers to put thousands of sites on the same box without issues. It’s not impossible to bypass, but it’s not easy either. Because it’s just an access control system, it’d be pretty fucking hard for it to be a “backdoor”. Maybe if you’ve already got shell on the box, but that’s a given. It’s very hard to secure anything if someone already has proper access.

    1. The article doesn’t state that SELinux is a backdoor, my opinion is not that and my article does not state that opinion. It states both sides of other peoples’ opinion on SELinux, one which says it is a backdoor and one which says it isn’t a backdoor but a legitimate piece of code. All you have to do is read the title to see what the article is about. There is no opinion here so commenting as if there is shows you have not read it properly.

      1. There’s not ‘two opinions’, there’s the fact that SELinux is open source and well audited, and the ignorant uninformed opinion that it’s a backdoor.

        Look, I’m as paranoid as anyone about the NSA and what they are possibly doing to subvert democracy and freedom, but if there is anything that the NSA did that actually benefited the security of the Internet for ordinary people and businesses, this is the thing that I’d point to.

      2. I’ll give you the benefit of the doubt, but the time of day is given to SELinux as a backdoor. One paragraph of “SELinux could just be legit code” and the rest of the article weighs on the other side. I don’t see that as balanced. Talking about one side of an argument and a solitary nod to the other side at the end doesn’t cut it, for me.

        I read the article, not the title. Titles grab pageviews. A balanced title does not a balanced article make.

        Please please please do not spread further fud {fear, uncertainty, and doubt}.

  4. I came upon this site asking a simple question. Can this be built into the hardware that all or most computers use. Able to backdoor in from the bios or the Nic.

  5. I mean if I was NSA or anyone else, I would do the hardware approach to gain access. You wouldn’t even know the hardware was calling daddy. Has anyone looked into the hardware?

  6. I myself don’t trust the hardware at all, as it is very easy to embed code into it. I don’t know if you all remember the old Amigia computers but they didn’t need drivers for the hardware as it was all on board within the boards. Yea I am a geezer.

  7. More and more folks are leaving Windows and going to Linux. Perhaps this is a scare to those folks who want to leave the world of MS’ products of “open back doors”. There are HUNDREDS of different distros out there to check out and find the right one for each person so I don’t see a threat at all here.

  8. Oh please for god’s sake, the back-door has always been in the Crypto_API not in the security enhanced contexts!

    cd /etc/security/cacerts

    They hastily removed the one marked DoD and replaced it with another one. If you want privacy, learn about x.509 security certificates and why your X-Display && X-Terminal does this: stty
    speed 38400 baud; line =0; commands interupt, erase, kill etc && etc.

    Remember most servers Run headless.. ie: no x-display now can you tell me why?

  9. The answer is simple, dont run X or remove the PKI belonging to the corperations that operate on the ICANN network, thusly you can create a totally new network, not dependant upon COMMODO, SYMANTIC, MICROSOFT. If there PKI is not on your machine then obviously they can not get in! Hence most hobby operating systems, like ones for the Amiga, RISC OS, etc do not support the Crypto_API library or taking over the damned display.

  10. According to some security researchers the SSL function was all just a bit of a hand wave – Hand wave my ass!

  11. NSA’s arguement: we’ve only been doing this since the Bush Administration

    My interpritation: Then why was the NSAKey.dll in Windows 95 OS2 shortly after Richard Nixon had office?

    1. You are an idiot. Windows 95 OS2 … that doesn’t even exist. And Even Windows 95 or OS/2 didn’t exist after Nixon took office… you are a moron!

    2. You are an idiot. Windows 95 OS2 … that doesn’t even exist. And Even Windows 95 or OS/2 didn’t exist after Nixon took office… you are a moron!

  12. You guys are all itching to figure out how to hack them back, well that’s easy – evilOLive let me explain OLive is a fucntion built into Plan 9 from Bell-Labs it’s primary feature is being able to pull or push to any X compatible device simply by using the x.509 so if your all itching to know how they’re doing it. Well all you need to do is copy and past your entire folder in /etc/security/cacerts and now load those x.509 Root PEM’s into it and let it chop some android devices.

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button
Close

Adblock Detected

Please consider supporting us by disabling your ad blocker!   eTeknix prides itself on supplying the most accurate and informative PC and tech related news and reviews and this is made possible by advertisements but be rest assured that we will never serve pop ups, self playing audio ads or any form of ad that tracks your information as your data security is as important to us as it is to you.   If you want to help support us further you can over on our Patreon!   Thank you for visiting eTeknix