Apple Submits Mac OS X For Security Evaluation 51
ranger8x writes "Apple has submitted Mac OS X and Mac OS X Server to the U.S. government's National Information Assurance Partnership to evaluate various security features. It seems Apple is looking for some respect by the government, and to 'get more exposure.'"
Not look for holes (Score:5, Informative)
I guess they needed this so that Windows could be used.
If that is the case, OS X should not have any trouble at all. Let's look at some of the security features:
Re:Not look for holes (Score:2)
Defaultly hidden Unix structure from the GUI
A real Multy User mode.
Re:Not look for holes (Score:1)
Re:Government Security (Score:2)
A good move. (Score:3, Insightful)
Re:A good move. (Score:2)
Win2000 has been in the lab for a LONG time now, and still isn't certified. Is Microsoft playing the "submitted for" advertising game, hoping that it can run out the clock yet again?
gov't: a good market for apple (Score:3, Interesting)
particularly now that they use OS X
Gov't workers are getting tired of code red, nimda, etc, which hilite how insecure Windows is when not properly configured.
Even though it would require new hardware, OS X has an advantage over linux due to native MS Office support, as well as more commercial applications.
Re:gov't: a good market for apple (Score:1)
Re:gov't: a good market for apple (Score:2)
In fact, if there is any type of clone agreement that Steve Jobs might go for it would be a nice design shop that would simply design different cases in smaller runs than Apple would be comfortable doing. Imagine a 'Red Delicious, Inc.' that would simply design cases that have the same mount points as current models (and similar or superior cooling values) and put current model guts in them using channels that Apple is either uncomfortable using or is simply not feasible at the unit runs Apple would have to have.
Re:gov't: a good market for apple (Score:1)
Imagine a flat panel imac with the entire case looking like its brushed metal underside instead of that cheap looking whiter-than-white plastic. I think those would fit in well in a government install. All net-booting Jaguar, too, for easy administration.
So yeah, while your IT mangler might not be inclined toward Apple, sometimes these decisions come from on high, with a bit of boot to back them up. Doncha think Tony Blair would just love to have some showpiece ministry completely kitted out with super-stylish yet oh-so practical imac workstations? Roll cameras, it's new labour, switching and thinking different.
Can it match up to Windows? (Score:2, Interesting)
Well, I for one would prefer to run an enterprise system on top of a MacOS X Server with XServe than on top a Dell with Windows 2000. My day job has me on Windows all the time but on my own time I use an iBook with MacOS X and a FreeBSD server on a PC. From what I have seen with MacOS X security, I think Apple will get great marks.
And hopefully they will show they do not need some Palladium system to secure their OS. That is just silliness by Microsoft. They seem to be blaming the hardware for the OS being so insecure all this time.
Smart Move (Score:5, Insightful)
Now with this move, Jobs is deftly putting a thumb in the eye of Gates. Microsoft talks about 2006 for security, Apple says, "Hey, why not today?". Having a respected third party audit will ring loud against Microsoft's tight lipped security policy. Apple already exposes the base source code for Mac OS X called Darwin to anyone that wants to take the time to download it.
I had something else important to point out but the FedEx guy just showed up with Warcraft III. I am sure you will understand...
What OS X needs for better security (Score:5, Insightful)
Re:What OS X needs for better security (Score:2, Informative)
just a comment: the default install includes various servers, yet they're all disabled by default. only after a completed install can those services be enabled.
Re:What OS X needs for better security (Score:2)
I guess this wouldn't be a problem if users could get by without administrator access, but Mac vendors don't seem to understand that software installs should rarely require admin password. Why does internet explorer require an administrator password to install?
Re:What OS X needs for better security (Score:2)
The reason IE requires a password to install is because it makes changes to directories that a regular user doesn't have permission to change . This is a good practice. Otherwise, what's to stop some dumbass from tearing out critical config files or libraries?
Re:What OS X needs for better security (Score:3, Insightful)
Good OS X apps put everything in their own ".app" directory so you can install and uninstall the app easily.
You don't even need to be in the admin group to install software on OS X... You can create an "~/Applications" directory in your user directory and install software there. Well written apps function just as well from ~/Applications as
Re:What OS X needs for better security (Score:2, Interesting)
I think the reason IE doesn't do this is laziness on the part of the developers... It's an app ported (carbonized) from OS 9. OS 9 apps had free reign to run roughshod over the directory tree. It was (and is) bad practice, but there was nothing stopping you. They just haven't bothered to make it self-contained for whatever reason.
Re:What OS X needs for better security (Score:2)
Don't like IE?... use Mozilla! which so far has got to be the best user experience in a browser I've ever had (flash performance or lack thereof not being a big issue... try Chimera's latest builds if you want to see Windows speed flash on OS X).
Re:What OS X needs for better security (Score:2)
If there's a danger of regular user mucking up some critical config file or library why should so many installers be messing with these config files and libraries??
Re:What OS X needs for better security (Score:2)
You can do this:
System Preferences->Login->Login Window->Display Login Window as->Name and password entry fields
This displays a blank name field instead of the picture/name combo. I don't at work since the PC admin has an account on this box too, but then, he rarely has to mess with it so he's apt to forget it.
Re:What OS X needs for better security (Score:4, Informative)
Re:What OS X needs for better security (Score:2)
Great point about removing the last-person-who-logged-in listing. When I logout, I'm almost never the next person to log back in! Why would I logout if I were? Get rid of that.
Web servers -- Apache is installed by default, but disabled, and only admins can turn it on (presumably admins can be trusted not to screw up, security-wise).
An improvement I'd like: MacOS X has ipfw built-in but disabled, and while apps like Brickhouse are out there to interface with it, I'd like to see a built in OS tool. Maybe in Jaguar? And where's my built in GPG/PGP with GUI? This is Apple, right? Gimme my GUI!
Re:What OS X needs for better security (Score:2)
Then again, I'd be much more interested in a Fink GUI (which would get me GPG et al) first.
Re:What OS X needs for better security (Score:1)
No affiliation, just observation.
Re:What OS X needs for better security (Score:1)
Re:What OS X needs for better security (Score:2)
* let the user turn off the option where you can login with "John Doe" instead of your username
--Not sure what your talking about here, unless you mean the Other User option. Which I find very helpful on machines where root access needs to be enabled for one reason or another. Also, this is off by default, but can be turned on in the Prefs.
I'm pretty sure that he means disabling the use of "Steve Jobs" as a login, instead of the Unix-y name "sjobs". I don't particularly see this as a useful security feature; I suppose it gives you one less chance to guess the right answer--you may know your targets full name, but you may not know if they've chosen 'stevej' or 'sjobs'. Whatever.
* let the user turn off the 'helpful' feature that puts the last user's name on the login screen --This can be turned off via the shell, but an administrator tool to do this would be nice.
Noted above by others, but I'll note it again since I also dislike it: there's a utility to do just this located in kBase 106691 [apple.com]. Basically just a script to flip a bit you can also access from the term.
* put a checkbox in the installation process to install a system with maximum security options... stuff like no list of users on the login screen and no web server installed at all, etc
Finally, you can be quite a bit more secure by installing without the BSD tools installed. I dunno if this installs Apache, but it would disable all command line tools. I'm only speculating about that, actually, as I have never done an install like that--as a matter of fact, I rush right out to install the dev tools as soon as possible. But the security minded may want to try it.
Re:What OS X needs for better security (Score:2)
I assume you mean stuff like the shell, cp, and mv? You can't really not have those. Some of the GUI stuff could in theory depend on it...and in particular one does.
The apple "package" installer (which is actually pretty good!) will look for several "scripts" during the install, and run them. They are almost always shell scripts, and need the fileutils. Go look at your package reciepts and poke around, you can see some examples. I don't know if any use perl or not, but...
The normal boot process may well also need them.
Re:What OS X needs for better security (Score:2)
I should clarify here... I mean give the guy administering a group of machines a simple little checkbox that doesn't even install Apache rather than just disabling it. This is so that a user with administrator password doesn't turn on the web server by clicking the "enable web sharing" box but has to do a little bit of extra work so as to ensure that the user really knows what they are doing.
And I'd like to be able to set a checkbox at instillation time that locks down all of the little things that you have to remember to lock down after the install, like disabling the list of the users on a system.
Perhaps, the best way to do this stuff is just have the sysadmins burn their own CD with their own custom OS X install.
Also, i'm not talking about security options for the average home user. I think Apple has great security for home users. I'm talking about stuff that you want for macs running at atomicsecrets.gov.
Re:What OS X needs for better security (Score:1)
Re:Apple security will be hurt by lazy users (Score:1)
How nice of them to do that for you - but of course, no *nix-lover ever wants any of the "unwashed & unblessed" Windows users to think that *nix is not secure by default - it's their "digital playtime" to patch their *nix OS; in fact, it's almost a game for them to keep up-to-date with the latest patches on top of providing *nix SysAdmins with job security.
Purely Amazing!
ScottKin
Apple and the upgrade exploit (Score:2)