|
Message-ID: <20231001191303.GA8910@openwall.com> Date: Sun, 1 Oct 2023 21:13:03 +0200 From: Solar Designer <solar@...nwall.com> To: oss-security@...ts.openwall.com Subject: "Linux Kernel security demistified" Hi, Greg KH gave a talk entitled "Linux Kernel security demistified" at Kernel Recipes 2023 (10th Edition) on September 26 in Paris, France. Thank you, Greg! Here are the slides: https://git.sr.ht/~gregkh/presentation-security https://git.sr.ht/~gregkh/presentation-security/blob/3547183843399d693c35b502cf4a313e256d0dd8/security-stuff.pdf Video: https://www.youtube.com/watch?v=xDHTn0auo2w&t=14975s (4:09:30 to 5:00:40) My summary and thoughts: The talk is primarily about the Linux kernel security process. It starts with a mention of the European Union Cyber Resiliance Act (CRA) and how it is problematic for Open Source, a topic we haven't yet touched here on oss-security, but many relevant organizations have, e.g. here's Apache Foundation's summary from July: https://news.apache.org/foundation/entry/save-open-source-the-impending-tragedy-of-the-cyber-resilience-act (If we want to discuss in here, which I'm not sure of, please start a separate thread for this sub-topic, do not just reply to this one.) A relevant point is that governments and companies want "early security notices". Another is that "early notice lists are leaks and should be considered public." A way out of this mess is not to play the game. This adds to the many technical reasons also given in the talk not to document security fixes as such, not to assign CVEs, and to recommend usage of upstream stable kernel trees over "enterprise" distro kernels. There are relevant questions and answers after the talk, including on (not) notifying the linux-distros list. I can see how this fits in with not playing the game to avoid the slippery slope. As usual, it remains up to issue reporters to choose who or what lists they notify. I wonder whether the kernel documentation could, however, be encouraging rather than discouraging (as it currently is) about issue reporters themselves contacting linux-distros after a fix is ready. I wonder if a patch like that would be accepted? In an answer, Greg blames linux-distros for "blackmailing" the kernel security team by our requirement to make everything including exploits (if posted to the list) public, a requirement we had already lifted: https://www.openwall.com/lists/oss-security/2023/09/08/4 and by having a (low) maximum embargo time (14 days). Google P0's 90 days is mentioned as adequate maximum (with typical times until a Linux kernel fix is ready being way shorter than that). Yet a slide says "No embargoes longer than 7 days" without a mention this is 7 days after fix is ready (I assume an inadvertent omission). I was/am of course thinking whether we should possibly make the linux-distros embargo times consistent with s@...'s as an exception. We had already granted the Linux kernel and curl exceptions allowing semi-public fixes, then relaxed the rules on exploit posting, and now this remains the final inconsistency. We could address it, too. However, if a reason to stop notifying linux-distros is avoiding a precedent of s@k.o providing early security notices to any other group, then us adjusting the rules would be counter-productive as it'd remove the needed excuse. Of course, I don't expect any reply to this - it's just an impression/insight I got from the talk, and it's kind of fine. I understand the kernel security team works under pressure as-is and I don't want to add to that. There's also an upcoming Webinar: https://www.linuxfoundation.org/webinars/demystifying-the-linux-kernel-security-process > Demystifying the Linux Kernel Security Process > October 3, 2023 | 07:00 AM PDT (UTC-7) > > Join an interactive, complimentary Mentorship Session exploring > Demystifying the Linux Kernel Security Process with Greg Kroah-Hartman, > Kernel Maintainer & Fellow, The Linux Foundation > > There is a lot of misunderstanding about how the Linux kernel deals with > security vulnerabilities. This talk will go into how the Linux kernel > security team works, how changes are propagated out to the public, and > how users must take advantage of these changes in order to have a secure > system. (Announcements of upcoming events generally don't fit oss-security, but including this along with material from the prior event is acceptable.) Alexander
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.