Home Blog Page 895

Countries Making the Most Impact on Tech Innovation

1 global-contextA report from the Information Technology and Innovation Foundation ranks nations based on the impact their economic and trade policies have on global innovation. Here’s a look at who came in first and last and a few in-between….

But a new report from a think tank that works on high-tech issues encourages leaders to think bigger, to consider innovation policies in a global context. To that end, the Information Technology and Innovation Foundation (ITIF) has produced a ranking of 56 nations comprising nearly 90 percent of worldwide economic activity based on the impact their economic and trade policies have on global innovation.

Read more at IT World

6 of the Best Free Linux Firewalls

Most modern routers come with firewalls to help protect you, but if yours doesn’t then a firewall distro should be able to help you, whether we’re talking about a home or office network.

With the massive choice of firewall distributions that’s available today (check out Distrowatch.com for a comprehensive list), we’ll look at what makes some options better than others, and which might be best for you and your particular computer setup. 

Read more at TechRadar

How to create unprivileged LXC container on Ubuntu Linux 14.04 LTS

Unprivileged containers run the same way as privileged ones, simply without using sudo or root access. This is more secure as you can’t be root on the host even if you managed to escape container. This tutorial explains how to install, create and manage unprivileged LXC containers on Ubuntu Linux version 14.04 LTS server.

Read more…

Cluster Computing with Ansible and Raspberry Pi

BUSINESS BureacracyIn this brief video introduction, I’ll walk you through the basics of Ansible using a cluster of six Raspberry Pi 2 model B computers. The video begins with the basics—like installation and telling Ansible about your servers—then shows how you can manage your infrastructure with playbooks.

Read more at OpenSource.com

Dell Will Ship XPS 13 Developer Edition “Project Sputnik” Linux Laptops with Skylake Chips

Linux enthusiasts rejoice: Super-thin “Project Sputnik” XPS 13 laptops from Dell with Ubuntu and Intel Skylake chips should be just around the corner.

Dell’s Project Sputnik laptops have attained something of a cult status with a segment of Linux users since their introduction in 2012. The XPS 13 Developer Edition will be the only dedicated, thin-and-light Linux laptop with Skylake from the top-five PC makers. The next XPS 13 Developer Edition is “closer” to shipping and so discounts are being offered on older models, George Barton, a senior technologist at Dell, said… 

Read more at PCWorld

AMD’s New Desktop Chips Run Faster, Cooler and Quieter Than Ever

AMD has garnered a reputation in the PC component world of focusing on throughput over thermals, or power over practicality. That’s been true for some time, but the chipmaker is looking to turn that around with its latest desktop processors for 2016.

The company’s big ticket item is more of an upgrade to one of the firm’s most popular chips: the AMD FX-8370 has now been equipped with a newly-designed cooler called the Wraith. This massive black cooler replaces the chip’s current stock cooler.

Read more at TechRadar

14 Linux-Based Gift Ideas for Your Geeky Valentine

valentine-1Linux is in the air.

For Linux lovers, there is nothing better than getting a Linux running device. And if you’re the Linux fan, what better opportunity to plant the seed of Linux in your valentine’s heart? Here are 14 cool Linux-based devices that I would want to receive — and I bet you will too.

Read more at CIO

Linux Kernel 4.3.5 Is the Biggest Update in the Series, Users Urged to Update Now

linux-kernel-After informing us about the availability of Linux kernel 4.4.1 LTSLinux kernel 4.1.17 LTSLinux kernel 3.10.96 LTS, and Linux kernel 3.14.60 LTS, kernel maintainer Greg Kroah-Hartman has now published details about the fifth maintenance release in the Linux 4.3 kernel series….

“I’m announcing the release of the 4.3.5 kernel. All users of the 4.3 kernel series must upgrade,” said Greg Kroah-Hartman in the announcement

 

Push Is On to Bring Standardization to the Internet of Things

Industrial Internet Consortium works with Object Management Group and other bodies to open up the world’s devices to communication and data exchange.

OMG, Dr. Richard Soley is at it again. The chairman/CEO of the Object Management Group (OMG), which led the way in standardizing many of the web services seen in today’s enterprise architectures, has set his sites on the next great frontier: the Internet of Things (IoT). He is also now executive director of the the Industrial Internet Consortium (IIC), a two-year-old organization which seeks to bring order and sanity to the chaos we associate with IoT.

Read more at ZDNet News

7 Things to Consider Before Fuzzing a Large Open Source Project

fuzzy lights

One of the best practices for secure development is dynamic analysis. Among the various dynamic analysis techniques, fuzzing has been highly popular since its invention and a multitude of fuzzing tools of varying sophistication have been developed. It can be enormously fun to take the latest fuzzing tool and see just how many ways you can crash your favorite application. But what if you are a developer of a large project which does not lend itself to being fuzzed easily? How should you approach dynamic analysis in this case?

1. Decide your goals

First, decide whether you are looking only for security issues, or whether you are looking for all types of correctness issues. Fuzzing finds a lot of low severity issues which may never be encountered in normal use. These may look exactly like security vulnerabilities with the only difference being that no trust boundary is being crossed. For example, if you fuzz a tool that only ever expects input to come from the output of a trusted tool, you may finds lots of crashes which will never be encountered in normal usage. Are there other ways to get corrupt input into the tool? If so, you have found a security vulnerability, if not, then you have found a low priority correctness issue which may never get fixed. Will the project be willing to address all of the issues found or only the security issues? You can save yourself a lot of time and frustration by setting expectations for dynamic analysis up front.

2. Understand your trust boundaries

Understand (and document) where the error checking should occur

It is easy for security boffins like me to create a mental model of strong security whereby every function defensively checks every input. Sadly for us, the real world is more complex than that. This type of hypervigilance is hugely wasteful and therefore never survives in production. We have to work a little harder to establish a correct mental model of the security boundaries for the project. It is necessary to understand where in the program control flow that the checks should be made and where they can be omitted.

3. Segment your project based on interface

Different fuzzers have different specialities. Segment your project into buckets appropriate for the different types of fuzzers based on the interface – file, network, API.

4. Explore existing tools

New fuzzing tools are being developed all the time and old tools are getting new capabilities. Take a fresh look at some of the most popular tools and see whether or not they can help with even a subset of your project. David Birdwell recently added network fuzzing to a derivative of American Fuzzy Lop which is worth checking out. Hanno Böck has written useful tutorials on how to use some common fuzzing tools at The Fuzzing Project.

5. Write your own tools

When faced with the question of how to perform dynamic analysis on a large mixed language project which did not lend itself to existing tools, I turned to David A. Wheeler to see how he would approach this problem. Dr. Wheeler recommends, “I’d consider writing a fuzzer specific to the project’s APIs & generate random inputs based on them, and adding lots of assertions that are at least enabled during fuzzing.  If you know your API (or can introspect it), creating a specific fuzzer is pretty easy – grab your random number generator, set up an isolated container or VM for the fireworks, and go. “

6. Is fuzzing really worth it?

A common critique of fuzzing tools is that after you run them for a while they stop finding bugs. This is a good thing! Just like you wouldn’t throw out your automated test suite because it finds so few regressions, you shouldn’t use this rationale to avoid fuzzing your project. If your fuzzing tools are no longer finding bugs, Congratulations! It’s time to celebrate! And now, onto finding the more difficult bugs.

7. Sounds like a lot of work

Do you really expect me to do all that? Just give me the name of a good tool to run. (American Fuzzy Lop) You don’t have to do all of this, at least not at once. If you find a tool that works with your project to cover even a subset of the project, then you can just start running it. You will wind up figuring out whether the project developers (or you) are willing to fix low priority issues and where the project’s trust boundaries are along the way. You may find a crash, generate a patch and submit it to the project only to find that it gets rejected because the incorrect input generated by the fuzzer can never reach that part of the project and so adding your check is too expensive. Whichever approach you take, do the people following in your footsteps a favor and write it down. Sure it will get outdated, but it makes for a fun read and helps people coming along behind you to stand on your shoulders.

One final reminder, if you are fuzzing someone else’s project and you have any suspicion that you have found a security vulnerability, remember to use the project’s security vulnerability reporting process!

Emily Ratliff is senior director of infrastructure security for the Core Infrastructure Initiative at The Linux Foundation. Ratliff is a Linux, system and cloud security expert with more than 20 year’s experience. Most recently she worked as a security engineer for AMD and logged nearly 15 years at IBM.