Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Sun, 1 Oct 2023 21:13:03 +0200
From: Solar Designer <solar@...nwall.com>
To: oss-security@...ts.openwall.com
Subject: "Linux Kernel security demistified"

Hi,

Greg KH gave a talk entitled "Linux Kernel security demistified" at
Kernel Recipes 2023 (10th Edition) on September 26 in Paris, France.

Thank you, Greg!

Here are the slides:

https://git.sr.ht/~gregkh/presentation-security
https://git.sr.ht/~gregkh/presentation-security/blob/3547183843399d693c35b502cf4a313e256d0dd8/security-stuff.pdf

Video:

https://www.youtube.com/watch?v=xDHTn0auo2w&t=14975s (4:09:30 to 5:00:40)

My summary and thoughts:

The talk is primarily about the Linux kernel security process.  It
starts with a mention of the European Union Cyber Resiliance Act (CRA)
and how it is problematic for Open Source, a topic we haven't yet
touched here on oss-security, but many relevant organizations have, e.g.
here's Apache Foundation's summary from July:

https://news.apache.org/foundation/entry/save-open-source-the-impending-tragedy-of-the-cyber-resilience-act

(If we want to discuss in here, which I'm not sure of, please start a
separate thread for this sub-topic, do not just reply to this one.)

A relevant point is that governments and companies want "early security
notices".  Another is that "early notice lists are leaks and should be
considered public."  A way out of this mess is not to play the game.
This adds to the many technical reasons also given in the talk not to
document security fixes as such, not to assign CVEs, and to recommend
usage of upstream stable kernel trees over "enterprise" distro kernels.

There are relevant questions and answers after the talk, including on
(not) notifying the linux-distros list.  I can see how this fits in with
not playing the game to avoid the slippery slope.  As usual, it remains
up to issue reporters to choose who or what lists they notify.

I wonder whether the kernel documentation could, however, be encouraging
rather than discouraging (as it currently is) about issue reporters
themselves contacting linux-distros after a fix is ready.  I wonder if a
patch like that would be accepted?

In an answer, Greg blames linux-distros for "blackmailing" the kernel
security team by our requirement to make everything including exploits
(if posted to the list) public, a requirement we had already lifted:

https://www.openwall.com/lists/oss-security/2023/09/08/4

and by having a (low) maximum embargo time (14 days).  Google P0's 90
days is mentioned as adequate maximum (with typical times until a Linux
kernel fix is ready being way shorter than that).  Yet a slide says "No
embargoes longer than 7 days" without a mention this is 7 days after fix
is ready (I assume an inadvertent omission).

I was/am of course thinking whether we should possibly make the
linux-distros embargo times consistent with s@...'s as an exception.
We had already granted the Linux kernel and curl exceptions allowing
semi-public fixes, then relaxed the rules on exploit posting, and now
this remains the final inconsistency.  We could address it, too.

However, if a reason to stop notifying linux-distros is avoiding a
precedent of s@k.o providing early security notices to any other group,
then us adjusting the rules would be counter-productive as it'd remove
the needed excuse.  Of course, I don't expect any reply to this - it's
just an impression/insight I got from the talk, and it's kind of fine.
I understand the kernel security team works under pressure as-is and I
don't want to add to that.

There's also an upcoming Webinar:

https://www.linuxfoundation.org/webinars/demystifying-the-linux-kernel-security-process

> Demystifying the Linux Kernel Security Process
> October 3, 2023 | 07:00 AM PDT (UTC-7)
> 
> Join an interactive, complimentary Mentorship Session exploring
> Demystifying the Linux Kernel Security Process with Greg Kroah-Hartman,
> Kernel Maintainer & Fellow, The Linux Foundation
> 
> There is a lot of misunderstanding about how the Linux kernel deals with
> security vulnerabilities.  This talk will go into how the Linux kernel
> security team works, how changes are propagated out to the public, and
> how users must take advantage of these changes in order to have a secure
> system.

(Announcements of upcoming events generally don't fit oss-security, but
including this along with material from the prior event is acceptable.)

Alexander

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.