The NSA, the original primary developer of SELinux, released the first version to the open source development community under the GNU GPL on December 22, 2000.[6] The software was merged into the mainline Linux kernel 2.6.0-test3, released on 8 August 2003. Other significant contributors include Red Hat, Network Associates, Secure Computing Corporation, Tresys Technology, and Trusted Computer Solutions.

https://en.wikipedia.org/wiki/Security-Enhanced_Linux

  • frezik@midwest.social
    link
    fedilink
    arrow-up
    41
    ·
    2 days ago

    That’s the trubble with the NSA. They want to spy on people, but they also need to protect American companies from foreign spies. When you use their stuff, it’s hard to be sure which part of the NSA was involved, or if both were in some way.

    • Possibly linux@lemmy.zip
      link
      fedilink
      English
      arrow-up
      23
      arrow-down
      1
      ·
      2 days ago

      The NSA has a fairly specific pattern of behavior. They work in the shadows not in the open. If they target things with low visibility so it is hard to trace. Backdooring SELinux would be uncharacteristic and silly. They target things like hardware supply chains and ISPs. There operations aren’t even that covert as they work with companies.

      • The_Decryptor@aussie.zone
        link
        fedilink
        English
        arrow-up
        8
        ·
        1 day ago

        They were a bit too public with “Dual_EC_DRBG”, to the point where everybody just assumed it had a backdoor and avoided it, the NSA ended up having to pay people to use it.

      • frezik@midwest.social
        link
        fedilink
        arrow-up
        15
        ·
        2 days ago

        The specific example I’m thinking of is DES. They messed with the S-boxes, and nobody at the time knew why. The assumption was that they weakened them.

        However, some years later, cryptographers working in public developed differential cryptanalysis to break ciphers. Turns out, those changed S-boxes made it difficult to apply differential cryptanalysis. So it appears they actually made it stronger.

        But then there’s this other wrinkle. They limited the key size to 56-bits, which even at the time was known to be too small. Computers would eventually catch up to that. Nation states would be able to break it, and eventually, well funded corporations would be able to break it. That time came in the 90s.

        It appears they went both directions with that one. They gave themselves a window where they would be able to break it when few others could, including anything they had stored away over the decades.

        • Possibly linux@lemmy.zip
          link
          fedilink
          English
          arrow-up
          4
          ·
          2 days ago

          Honestly I think it ultimately comes down to the size of the organization. Chances are the right hand doesn’t know what the left hand is doing.

          I do like the direction the US is heading it. Some top brass have finally caught on that you can’t limit access to back doors.