Security Holes Draw Linux Developers' Ire 477
jd writes "In what looks to be a split that could potentially undermine efforts to assure people that Linux is secure and stable, the developers of the GRSecurity kit and RSBAC are getting increasingly angry over security holes in Linux and the design of the Linux Security Modules. LWN has published a short article by Brad Spengler, the guy behind GRSecurity and it has stoked up a fierce storm, with claims of critical patches being ignored, good security practices being ignored for political reasons, etc. Regardless of the merits of the case by either side, this needs to be aired and examined before it becomes more of a problem. Especially in light of the recent kernel vulnerability debated on Slashdot."
Time for (even) better security? (Score:5, Insightful)
Re:Time for (even) better security? (Score:2)
That's really all that keeps Linux abuzz aside from hobbiests.
They really need to break out with these updates otherwise they'll get a worse rep on release times than Win too.
Re:Time for (even) better security? (Score:3)
Listen to this and decide if it sounds more like a kid whining because they didn't get their way:
Re:Time for (even) better security? (Score:4, Informative)
Re:Time for (even) better security? (Score:3, Informative)
He's a hypocrite to complain about how linux needs to be organized to receive patches, when he is himself ignoring the protocols already in place to deal with the problem.
Imagine what would happen if linus had to personally look at every email about the kernel - nothing wold get done.
Re:Time for (even) better security? (Score:3, Insightful)
Re:Time for (even) better security? (Score:5, Insightful)
That's not the point. I am getting ready to force my Unix admins to patch their boxes on a more frequent basis than "yearly", and they are already screaming bloody murder. I am sick and tired of our Unix boxes getting rooted because some admin wants 365+ days of uptime and can't be bothered to test and install a kernel patch that fixes some important hole. That there is NO scheduled maintenance to start is an even larger problem that I'll rant about in a different post.
And by the way, other Unix systems have capabilities, MAC labels, etc., and you know how most admins implement security on their systems? Every one of the Unix support team knows the root password, and the application support people use setuid scripts to administer their software, like they were doing in 1985. Capabilities, labels, and friends are extremely difficult to implement, and these features cannot save you from the one time a tired kernel programmer accidentally performs an unbounded input or forgets to check a counter. You will always need to patch your kernel (and reboot) in order to maintain operational security. Period. End of discussion.
And if your only availability measurements are along the lines of
please get a clue: Availability doesn't include all of those times when your users tries to access a rooted system (even though the system is "up"), and it isn't a bad thing to schedule maintenance windows and notify the users and take the system down for patches or upgrades. In fact, I would much rather do so in a controlled fashion, as I can have backups made and documentation updated and I can take my time to do things correctly because I had time to test everything beforehand. Versus a 50+ hour nightmare/marathon starting with the pages from the instrusion detection system (or worse, from someone else's IT security department) at the wee hours of (if you are lucky) Saturday morning.So don't complain to me about lousy uptimes. Because when your server gets hacked because of a kernel bug patched three months ago, and you didn't apply the update because "my uptime counter will get reset" (i.e. you are lazy), I have to clean up your mess: Investigating the attack, determining the extent of the intrusion, validating the backups, etc.
BAH. Rant mode off. I will spare you a discussion of the proper engineering processes that help to lessen (but not eliminate) the risk of security-related software flaws.
Re:Time for (even) better security? (Score:3, Interesting)
If you're bashing me because you thought that I claim that uptime should take any priority over security: well, I do not hold that position.
We routinely patch other software running on our systems, but those do not involve reboots and are easier to fix in case of problems. I do not see a problem with wishing for a lower frequency of mandat
Re:Time for (even) better security? (Score:5, Insightful)
Next time there's a small hole in Apache that for instance allows execution as the apache or nobody users, that local kernel security hole will come back to bite you in the ass and lead to your box being rooted.
It doesn't even have to be a Apache hole. Say some little bit of user supplied input is being used in some chrooted or otherwise jailed context, perhaps you're generating a PS or PDF file in some temp directory on the fly. Again that little security mistake you've made combined with the local privilege escalation flaw you didn't patch will stretch the hole to goatse.cx proportions.
Unless your machine is unplugged from the net, patch that kernel. Seriously, it's like insurance, a little pain every now and then so that when the shit hits the fan you'll hopefully live through it.
Re:Time for (even) better security? (Score:4, Insightful)
Re:Time for (even) better security? (Score:5, Informative)
Re:Time for (even) better security? (Score:5, Interesting)
Either you aim for excellence or you don't. Getting this right is a pretty hard thing, but if you start making excuses and getting into workarounds you end up some years down where MS is today: A nightmare of workarounds and makeshift solutions barely held together with pieces of string and duct tape. They also started out with making a compromise here and a compromise there and saying "Oh, this won't matter much, let's do this later". You see where it got them.
Trying to get the code right is an important part of this. If you don't get it right the first time, fine, then review the code and patch it, but do it right. Not just one bug today, and another one of the same kind tomorrow, and the third the next week.
If someone knowledgeable is able to find a series of similar bugs in a widely used and widely reviewed piece of code like the Linux kernel in a couple if minutes and if bugs are mostly fixed in a piecemeal fashion getting us to the kernel security bug of the day (we are now almost at the kernel bug of the week already) the Linux community should say "Hey, could we do something better ?" instead of saying "Doesn't matter, use a workaround and there are worse vulnerabilities anyway, so what ?"
You're basically right, but... (Score:5, Insightful)
But just to add a couple of minor details:
A) I'd argue that Microsoft didn't start secure and slowly get down the drain. They started by ignoring security outright.
E.g., if I remember right, for example, the file server security in NT 3.5 and the pre-SP1 NT 4.0 was entirely in the client. Yes, the client was supposed to check for itself if it's allowed to access a file, and if not, back down. However, if the client was not that nice, it could go ahead and request the file anyway... and get it.
E.g., MS Bob, in the name of userfriendliness, asked you to change the password if you miss-typed it 3 times. No, not if you successfully logged in after mis-typing it 3 times. That's it. Three failed attempts in a row, and you can set a new password.
Etc. I could go on for ever, but these are ludicrious enough to illustrate the point: MS didn't start making a compromise here and there. It outright ignored security until it bit them in the ass.
B) But to be fair, so did everyone else, and some still do.
E.g., it's not a case of Linux eventually getting as insecure as MS Windows. Linux already _was_ less secure than Windows, oh, say around the time Windows 2000 was released.
Sorry, I'll probably annoy the pinguinistas, but taking a Linux system as root online back then, meant you had a script kiddie logged in withing hours at most. _And_ most distros made the same MS mistake of installing and starting every possible service by default, and no firewall either. I know my SuSE systems got Apache, MySQL and God knows what else if I didn't uncheck those at install time.
It took some code reviews paid for by RedHat and the like, before Linux was anywhere _near_ secure.
C) Basically, sad to say, much as nerds balk at "clueless lusers" running without a firewall or MS for having exploitable bugs, most are just as clueless themselves when it comes to writing secure code.
And I don't mean just bugs or lack of communication ("oh, I thought YOUR function checked the buffer length already.") I mean outright lacking even the most elementary clue about secure design, and not giving even the bare minimum thought to what could happen.
Just as end lusers think they're safe without a firewall because they don't directly see the script kiddie breaking in, coders tend to ignore the unseen threats just as well. Mentalities like "oh, surely noone will edit the id in the URL and make themselves superuser" are the norm, not the exception. Or at most they'll repeat mantras they've heard before, without even understanding what those mantras mean.
It's not even a MS vs Linux thing. Windows, Linux, Solaris, whatever. Unless you have some security minded people trying hard to find a bug or way in, you end up with a catastrophe. The average coder's work is a heap of security holes waiting to be exploited.
Re:You're basically right, but... (Score:5, Funny)
MS Bob, in the name of userfriendliness, asked you to change the password if you miss-typed it 3 times. No, not if you successfully logged in after mis-typing it 3 times. That's it. Three failed attempts in a row, and you can set a new password.
In all fairness, MS Bob was never intended for corporate use. It can be forgiven for not being very secure, as the only person with access to the console is likely Melinda herself (the last active Bob user).
Re:You're basically right, but... (Score:5, Funny)
Anybody who brings up Microsoft Bob in a Linux vs. Windows discussion not only instantly ends the discussion, but loses whatever their point of view is. Blakey Rat's Law.
Holy shit, you just complained that a product that was on the market for maybe a year and a half a *decade* ago, and intended for children and neophytes on a single-user machine, has bad security because it doesn't enforce passwords strictly? Are you serious?
Are you so divorced from common everyday experience that you:
1) Are still obsessed over Microsoft Bob a decade after it failed and everybody else has forgotten it?
2) Think enough other people are still obsessed over Microsoft Bob that using it in an argument would support your point?
3) That a security hole in Microsoft Bob is even a valid argument?
The saddest part is that I agree with your basic argument. Security on computers, until about Windows 2000, was completely crappy across the board. It wasn't until the 21st century that people really started looking at it and figuring out ways to improve it... and I think that people are still looking in the wrong direction. (We know how to secure computers, more or less, let's work on social engineering.)
Oh well, at least people like you keep Slashdot interesting... but, man, get a grip on reality and hang on for dear life.
Bzzt... get off the high horse (Score:3)
Want non-Bob examples?
How about the NT file security I mentioned in the same post? That _is_ a corporate product, and was pushed as a corporate product. That design is so cretinous, idiotic, lobotomized and clueless, that there aren't enough words to that effect in the dictionary to express it.
How about the password protection fo
Re:You're basically right, but... (Score:3, Insightful)
"MS people" don't need to defend the company based on Microsoft Bob because Microsoft Bob was sold for about a year a decade ago, then was dropped, and nobody has given a second thought about it since then.
That would be like criticizing Ford because their cars made in 1935 lacked seatbelts. "Ford is the worst auto-maker because their 1935 sedan had no seatbelts, they were trying to kill their users!" Does that make any sense as an argument? N
Re:You're basically right, but... (Score:3, Informative)
Where did you get that silly idea? NT has always used impersonation [microsoft.com] of the client's account to detirmine access.
1. The client connects to the file server with the SMB protocol t
Re:Time for (even) better security? (Score:5, Insightful)
Don't be an idiot. (Score:5, Insightful)
Re:Time for (even) better security? (Score:4, Interesting)
Re:Time for (even) better security? (Score:5, Insightful)
Personally, I make sure I know the answers to that sort of question before ANY changes are made to my production systems.
Re:Time for (even) better security? (Score:5, Insightful)
Personally, I know my servers can survive a reboot, because I test them for that. If I make any serious change that may affect startup I assume it will fail, and then set out to prove myself wrong.
PS: I wish I did not have to.
Re:Time for (even) better security? (Score:5, Insightful)
andy
Re:Time for (even) better security? (Score:4, Informative)
andy
Re:Time for (even) better security? (Score:3, Insightful)
Preproduction is key here generaly working of of split mirrors and the like to insure things are exact replica's. It's just an issue of procedure if you dont have good procedure here you wotn have good tests. So I would differ on the nigh-on impractical part as matches hardware and a good mirror is the same thing
Course I may be biased I work with exact matching boxes we I can bring up a s
Re:Time for (even) better security? (Score:2, Interesting)
What change would you ever be making that affects startup? Especially if it's a non-shell server, the chances of you needing to change something that affects bootup is miniscule. My Solaris servers have been running for 2 years straight. I don't bother to upgrade the kernel because: a) It's running stable,
Re:Time for (even) better security? (Score:3, Informative)
This does not involve rebooting production servers after any and all changes "just in case" which is what the original poster was indicating when he said that an uptime of more than a couple of months indicated poor skills.
If the change i
Re:Time for (even) better security? (Score:2)
The time and manpower required to keep an exact mirror of each production system may be larger than the time and effort needed to test the production system.
Additionally, every production machine should be rebooted now and again to make sure it will come back in case of an unplanned reboot.Or, have you never had a machine which went down and then refused to come back because of a hard
Re:Time for (even) better security? (Score:3, Insightful)
At work we have 2 nearly identical systems that can each cope with the entire load and they don't need to talk to each other except for non real time things like end of month reports. The reboot test is a gre
Re:Time for (even) better security? (Score:5, Funny)
Interesting. [netcraft.com]
Re:Time for (even) better security? (Score:3, Funny)
Interesting
I gave up modding for this.
thogard: BURN !!!!
Unless you rip out what you don't need. (Score:3, Insightful)
If you aren't running it, you don't need to patch it.
Which only leaves the security/bug fixes for what you do run. Do I worry about a "reboot test" after I upgrade perl? No. Why should I?
On my Debian systems, the only patch that requires a reboot is a kernel upgrade.
A "reboot test" might still be a good idea, in the 0.0001% of non-kernel situations where it would show a software problem
Re:Unless you rip out what you don't need. (Score:4, Insightful)
Interesting point of view (Score:2, Interesting)
Re:Interesting point of view (Score:5, Informative)
Re:Interesting point of view (Score:2)
Let's ignore the fac
Re:Interesting point of view (Score:2)
Re:Interesting point of view (Score:3, Insightful)
Tom
Re:Interesting point of view (Score:4, Insightful)
No, an important security rule of thumb. Don't waste effort fixing the holes which no one would need to exploit because you are wide open in other places.
Eg, would you worry about people being able to drill into your safe if the safe had no door?
There are special cases where you might (front of safe visible to trusted people 24/7 or something), but generally speaking, priorities are important.
Re:Interesting point of view (Score:3, Insightful)
The Linux guys failed more on the netiquette than the PaX guys. They failed to put forward a real working contact list. Security guys don't like to trust random results from google. How do you know your sending it to the 'real' security person? I can't put the blame on them for this
Re:Interesting point of view (Score:5, Informative)
Kind of an interesting contrast (Score:5, Insightful)
Re:Kind of an interesting contrast (Score:2)
The people that are clammoring for this kind of extreme security are fringe factions. They know that if they want a posix environment with 007 grade military security, fedora core isn't what they should run. They're just raising a stink.
Not to mention that, as mentioned elsewhere, I think one of the "holes" mentioned is something that is able to be attacked by DDoS. Newsflash: there are a lot of things that are attackable by DDoS, and it isn't as
Re:OK, if not Fedora Core.. (Score:4, Insightful)
So it begins. (Score:5, Insightful)
Will Linux strike the perfect balance? Will Linux be taken over by a lunatic like Theo and go the OpenBSD route? Will Linux lose it's viginity to Windows and become a security nightmare? Stay tuned! All this and more on the next episode of OS wars!
Re:So it begins. (Score:2)
Perhaps. If it does, I'm betting heavily on the latter. A useful product with poor security has much more value than a secure product with poor usability.
Re:So it begins. (Score:3, Insightful)
Yeah, those OPENBSD'ers are stuck in the mud and never think about new development.
Gee, maybe I should run Novell... (Score:2, Funny)
Maybe I should implement security measures and have a good backup system?
Nah!
This kind of reminds me about all the people telling me you could die while driving a car - no s---, Sherlock! Use common sense.
Here it comes (Score:2, Insightful)
Re:Here it comes (Score:5, Interesting)
If I read you correctly you're saying that Linux's new-found popularity will cause lots of previously unknown security flaws to become evident. Do you believe either (a) Linux will ultimately have a similar number of security flaws as the Windows kernel, or (b) Linux will ultimately have a similar number of security flaws as Apache (an open-source, industry-leading application)?
What I'm getting at is: security through obscurity is largely regarded as flawed (outside military intelligence circles), and the open-source/free-software development model has - time and again - resulted in bugs being shallow (IIS is closed-source and buggy. Apache is open-source and - relatively - secure).
Everytime - everytime! - there's a security issue with Linux a troll pops up and says "ha! ha!" in their best Nelson Muntz voice: as if Linux was somehow perfect, but has now spectacularly fallen from grace. I don't know whether you're trolling as you don't really say much, and I found it difficult to understand much of what you did say, so my apologies if I'm way off base here, but...are you suggesting that Windows is "more secure than Linux", or what?
Re:Here it comes (Score:2)
The problem with the current Linux community is that they want to be known.
Nowt wrong with that, surely?
Troll am I not, but drunk ass mofo who loves open source and is a bit pissed off am I.
I hear you, brother! Apologies for the troll-slur.
The prolblem with secuity through obscuirty is that it's exaclty the course that people who code for Open Source are following. They think that because the free coding loving people are the only ones who inspect what they are doing, that little things like secur
Re:Here it comes (Score:3)
Not at all. I'm saying keep it in proportion: "one swallow does not a summer make", and a limited number of bugs do not an insecure system make. Truth is, no system is - or can be - totally secure unless you encase it in steel and disconnect it from the 'net.
Windows is insecure. Linux is also insecure. So's Trusted Solaris. It's a question of degrees: how far are you prepared to trust Windows with different levels of secure data? How far would you trust Linux? Solaris? For my part, I'd use Windows.
Re:Here it comes (Score:5, Insightful)
holes in the kernel have been allowed to go on as long as they have?
Allowed to go as long as they have...by whom? By the volunteers devoting their time to kernel hacking? I'll give you the benefit of the doubt and assume you're an active kernel hacker...
You compared Linux to Windows in your original post: how many security holes in Windows still remain, years after they were first reported? (For that matter, how many holes are we still unaware of, because the source-code is closed?) Why have these security holes been allowed to go on as long as they have? (Answer: because resources are finite; and Microsoft has other things to focus on. Likewise for Linux. If you feel that too few resources are devoted to security in the kernel: volunteer. Or criticize and offer no helpful solutions. I choose option A).
Maybe it's time... (Score:5, Insightful)
My Windows XP machine is solid and secure. My FreeBSD machine is solid and secure. My Windows ME machine -- well -- it runs, and it's quarenteened so I suppose in some ways it's secure.
Right now I'm installing Gentoo on a box so I'm going to see where this goes, but I am going into it with full realization that no OS is perfect, nor is it perfectly secure. This means that I'm going to take security as seriously with this machine as I do the rest of them.
Having the source to an OS doesn't make it more secure if you don't read (or understand) every line of it.
Why people think OSS is automatically more secure is something I never have really understood. There is some added comfort in knowing that most holes will be discovered and fixed promptly, but even that is an assumption one shouldn't bank on.
Re:Maybe it's time... (Score:5, Insightful)
I pretty much agree with you, but... (!)
Having the source to an OS doesn't make it more secure if you don't read (or understand) every line of it. (my emphaisis)
Having the source available for anyone to read can lead to the OS (app, library, whatever) being more secure. Assuming that a wide-enough group of people do actually read the code. I'm confident that this happens with Linux, the *BSDs, etc.
Most people tend to equate OSS with secure, I'd guess, because security-through-obscurity is largely a false promise, and we recall that many-eyes-make-bugs-shallow. Both concepts that appeal to the type of geeks who are interested in security ;)
Re:Maybe it's time... (Score:3, Insightful)
Maybe it's time everybody get off of their OS Religious High Horse and finally admited that an OS is only as stable and secure as the user who is administering it.
Everybody acknowledges that. But that doesn't mean that operating systems are all alike. Linux - out of the box - is far more secure than Windows, and far less secure than OpenBSD.
My Windows XP machine is solid and secure.
Really? The last time I tried to secure a Windows machine, Microsoft had a list of 200-odd things to change, inclu
Re:Maybe it's time... (Score:3, Interesting)
what does that mean? only a few serious exploits compared to dozens? That may be the case, but a naughty person only needs one to root you
Re:Maybe it's time... (Score:3, Interesting)
Oh I do love the sweet innocence of youth. It's so refreshing to us old cynics.
Where on earth did you get the idea that boneheaded mistakes aren't designed into Unix-like systems? Do you really believe that the Berkely r-commands (rcp, rsh, ...) weren't known to
Grsecurity is for real (Score:4, Insightful)
They are just the sort of real gurus that can spot new vulnerabilities from code and exploit them in a matter of minutes. When Grsecurity was having serious funding problems last summer Brad was forced to sell new vulnerabilities from Linux kernel code to unmentioned blackhat companies. (Those do exist, believe me. They are doing commercial intelligence, stealing trade secrets with the knownledge..)
Those guys are technically brilliant, years ahead of what Linux stock kernel has in security features. They are just a bit arrogant and bad with people. Also at the same moment the upstream kernel developers don't like being told that their stuff is complete crap on some area. They downplay it, ignore and use the "whoareyou,Iamthekerneldeveloper,youknownothing" tactic.
Grsecurity guys could absolutely smash LSM by showing the vulnerabilities they are talking about as pocs. They are just a bit too disgusted and pissed off. There are several other areas like the exec_shield (that *is* atm getting to upstream kernel) that have big faults as well...
They could prove their other points as well.. But it would be moot since they ARE correct in any case.
Re:Grsecurity is for real (Score:5, Insightful)
It'd be nice if someone would ask the PAX developers why they modified their test suite to fail under exec shield. Run the pax test suite in a exec shield kernel and all the vulnerability simulations will succeed. That's not why exec shield is bad, it's because the test suite disables exec shield on purpose (you can disable exec shield, that's a feature)
BTW, exec shield is not going in the kernel. Exec shield != "amd NX bit". The amd nx bit support has already gone in the kernel, but I'm not surprised at all that no grsecurity patch is going to the kernel. Grsecurity developers have NEVER submitted their patches to mainstream, they haven't even tried it, they haven't listened to constructive criticism. That's why grsecurity is not in the kernel and LSM is. They have just sit back saying "our stuff is better, use it" without even caring. There're lots of projects that have go poop because of that attitude. Remember the guy who rewrote the whole building infrastructure which never go in mainline? He updated his stuff regularly and critized Linus for not getting his obviosly better alternative. He didn't listen to Linus when he said "ok, just split it in small, individual parts" (like everybody else does) "and I'll merge it". When some other guy started to fix the available building system, the "Better stuff" went poop. Same will happen with LSM. LSM is bad? Well, what will happen if the developers decide to fix it, where will go grsecurity?
I very much prefer a good developers/maintainer than a bad one, so I'll choose LSM at any time even if it is technically inferior. A good maintainer means that in the future he can rewrite his stuff if it's not good enought. That's much better than some guys who sit back in their mailing lists saying "our stuff is better"
Re:Grsecurity is for real (Score:5, Insightful)
So basically what you're saying is that these are the sort of guys who're so morally broken that they wouldn't pass even the most superficial of background checks for a sensitive position, which is no doubt why they need to get money by selling to blackhats rather than getting a real job in computer security. Basically, exactly the opposite of the sort of person you'd want to trust as a contributor security information and patches. Thanks, I'll remember to disregard anything I see from these morally challenged turdballs in the future.
distro with grsecurity (Score:3, Interesting)
Gentoo (Score:2)
Ok, so where are the patches? (Score:3, Interesting)
The fact that it doesn't even show up in bugzilla makes me think it's still under embargo for some reason. Shouldn't the leak be sufficient reason to change their timeline? For those of us running production servers, this waiting game is more than a little inconvenient.
On a side note, from what I've seen, the exploit has only been demonstrated on uniprocessor 2.4 kernels. Anyone get it to work on an SMP kernel, or a 2.6 kernel?
Re:Ok, so where are the patches? (Score:2, Informative)
Re:Ok, so where are the patches? (Score:4, Informative)
Comment removed (Score:5, Insightful)
It's all too political (Score:5, Insightful)
Re:True, all politics (Score:3, Insightful)
I bet that Linux has alot better device-support out of the box than Windows XP or Windows Server 2003 has. Windows relies on third-party drivers that may or may not work, whereas in Linux they are already in the Kernel, where they receive more attention than third-party drivers would receive. And that's thanks to Linus's stance on drive ABI's. Without that, we would have a
Re:True, all politics (Score:3, Insightful)
Absotively.
Windows relies on third-party drivers that may or may not work, whereas in Linux they are already in the Kernel, where they receive more attention than third-party drivers would receive.
More attention than from Microsoft? Certainly. More attention from the people selling the hardware in question? I would hope not, for the company making it's sake. The fact of the matter is that it is cr
Start over, basing on OpenBSD for a change... (Score:5, Insightful)
Long-time shell-provider SDF used Linux
Now, it's a 64-bit version of NetBSD.
OpenBSD claims:
"Only one remote hole in the default install,
in more than 8 years!"
Why not start with a core built for security,
- ie, rather than one built for popularity?
My two cents...
Re:Start over, basing on OpenBSD for a change... (Score:3, Informative)
Re:No holes in default install due to no services (Score:3, Informative)
Time with some corrections for a default OpenBSD install ;-) First fingerd is not started, and has not for quite some time. Sendmail is started, but only listen on localhost. From OpenBSD 3.6 you get the question during install if you want to enable sshd. Via inetd is the following enabled : ident, comsat (mail submission), daytime and time. syslog is enabled, but
Wrong Recipient? (Score:4, Interesting)
Waaah! 3 weeks without an answer! (Score:5, Insightful)
So ... rather than ask on the mailing list who is the best person for security submissions relating to whatever bug he found, he emails the top dude (during Christmas holidays no less) and then whines when no answer is forthcoming within his preferred timeline. Gimme a break!
As a total noob, I went to kernel,org and found this on the first page:n g-bugs.html if you want to report a Linux kernel bug.
Please see http://www.kernel.org/pub/linux/docs/lkml/reporti
http://www.tux.org/lkml/#ss5 explains why XX doesn't answer emails - too fricking busy is the usual reason.
If I were concerned about publishing the bug, I would have asked ON THE LKML LIST for who would be the best person to submit security-related bug and patch to for the XX module.
Re:Waaah! 3 weeks without an answer! (Score:5, Funny)
I emailed Bill Gates to say that with a tunnelling electron microscope someone could adjust the logic in the CPU and DOS WindowsXP, and he hasn't answered me. Pout!
Whoever doesn't want to read all... (Score:2)
Patches are here (Score:3, Informative)
>Is there a patch to uselib() bug ->
>> http://www.isec.pl/vulnerabilities/isec-0021-usel
Date: Sun, 09 Jan 2005 17:28:35 +0100
From: Henrik Persson
To: Breno Silva Pinto
Cc: linux-kernel@vger.kernel.org
Subject: Re: patch to uselib()
It's patched in 2.4.29-rc1 and 2.6.10-ac6. A patch for 2.4 can also be found here:
http://marc.theaimsgroup.com/?l=linux-kern
and for 2.6:
http://marc.theaimsgroup.com/?l=linux-kerne
Browsing the archives usually gives you alot of answers, you know.
----------------
Cut-n-pasted from the LKML
wow... (Score:4, Informative)
broken development process (Score:5, Insightful)
If I'm running 2.6.8, and a new bug comes out, I'm forced to either A) upgrade to the most recent 'stable' kernel, introducing new features about which I know nothing, and which themselves may be security problems, or B) can hope that someone will backport the security fixes to the kernel version I'm running. I don't know enough about kernel development to patch it myself, but I can no longer just drop in the most recent stable kernel and expect it to work unchanged.
A sysadmin's most precious commodities are time and attention. With this new development model, suddenly I am forced to either pay a great deal of attention (and a great deal of time) to each and every version of the Linux kernel, or I need to pay a vendor to do it for me.
The kernel developers are, in my opinion, shirking their single most fundamental duty... to ship a stable, secure product. Suddenly, because it's easier for them, they have abrogated the fundamental contract, that they will write great software. (buggy, insecure software is not great, no matter how many features it has.) They just wave their hands vaguely in the air and say tha the distributions will take care of those problems.
Guys, it's not gonna happen. The way you get stable software is by not adding features. In your case, by branching off to 2.7, and letting us beat the unchanging (except for bugfixes) 2.6 tree to death. If you keep adding features, you keep adding bugs. That's how it works.
You had this NAILED for years and years... there is a huge community that has built up around the fundamental social contract that even numbered kernels are as stable and secure as you know how to make them, and the odd-numbered branches are the home for new code and new features. Changing that contract simply becuase it makes your lives mildly easier is a hugely destructive idea. You may save yourselves a bit of work, but you create an enormous amount of it for everyone else.
Ted T'So said:
In other words, he thinks it's perfectly fine if only 1 out of 3 'stable' kernels are actually stable.This is not acceptable.
You can bet that Bill has a big grin on his face about this one. If I want new features with my security fixes, I might as well choose Microsoft and their service packs.
Heck, they even have a QA team!
That word doesn't mean what you think it means. (Score:3, Insightful)
Just a few questions:
Right on! (Score:5, Insightful)
2.6 is currently a developer's dream and an administrator's nightmare.
It is a smoking pile of bleeding edge patchwork. It can do everything in double time and brew coffee concurrently, but it cannot serve a file reliably (for example - as outrageous as it sounds that last part is actually the truth).
The absolute major top-1 problem is the huge flux of patches; 4000 changesets between 2.6.9 and 2.6.10... One kernel fixes maybe 100 bugs and introduces the same number along with a heap of new features while it deprecates a few old interfaces.
If 2.6.5 is the latest stable 2.6 kernel for one particular use (which I know for a fact that it is for some uses), you're stuck with a local root vulnerability because most likely 2.6.11 which may have a fix for this one bug will crash with that workload (as 2.6.6-2.6.10 did).
And the examples I'm pulling out here (file serving and many unstable kernels in a row) are not unreported problems. They are not new problems. They have been worked on, partially fixed, etc. etc. but with the development model as it is, you just cannot expect fixes to have a very long life-time.
It is very very sad. But I think it will change as someone realizes how bad the situation is. Probably half a year or so from now, when people start getting really annoyed that you *still* cannot route, web-serve or file-serve in any significant volume with Linux 2.6.
Until then, it's Linux 2.4 and Solaris - both slow compared to 2.6 maybe, but at least they stay up over night
Re:Right on! (Score:3, Informative)
True, 2.4 was an absolute nightmare up to around 2.4.16 as you said. The difference from then to now is, as I see it, that there were a few well focused attempts at solving that one huge problem, and then there was the general bugfixing going on meanwhile. Today, you have some general bugfixing going on, but all while that is happening, lots and lots of new features are added - core parts are touched in places where they (evidently) do not like
Re:broken development process (Score:4, Insightful)
There are actually improvements with 2.6: the distros have been invited to take over 2.6.x.y series, so that if they're going to be backporting patches, they can contribute this effort back to the community. In 2.4, the distros carry so many patches that you'd have an easier time backporting from the latest 2.4 vanilla kernel than from a distro kernel with the same nominal version. They have so many patches because they feel the need to add functionality in their stable series.
Also, Alan Cox is maintaining a tree of "really stable" kernels, where he takes only bugfixes from the current work and adds them to the base version he's using. I haven't determined if he's planning to continue 2.6.9-ac indefinitely, or if he's going to only release 2.6.10-ac kernels once he judges 2.6.10-ac to be sufficiently tested.
The real issue is that Linus is currently in charge of releasing the stable versions. He's really good at identifying what should go into the stable series, from the perspective of guiding development, but he doesn't have the discipline to identify a completely-working version and call that 2.6.x. My prediction is that, in accordance with the ManagementStyle document, he will eventually decide that people complain about his release descisions, and therefore he should get somebody else (probably Alan Cox) to do that.
As for development causing security problems, there has yet to be a 2.6 security hole in code that was added during 2.6. In general, new code is checked for all known patterns of bugs (almost all security holes fall into some pattern) and bad practices before being accepted. On occasion, a bug is found which is part of a new pattern, and future code with the same sort of bug will be caught, but existing code with that bug is not necessarily identified. This means that bugs are generally in code that hasn't been changed in a long time, not code which has been changed recently. In fact, there have often been bugs found in old versions which had already been eliminated unknowingly from new versions by people writing replacement code using improved techniques.
For example, the recent hole was in code written ten years ago to facilitate the switch from a.out to ELF. The hole was a race condition due to changes made several years ago in the requirements of common code.
same feeling with S-ATA (Score:5, Informative)
New development model to blame? (Score:5, Insightful)
Some of these bugs, according to the article, have been around for ages, so the new dev model isn't to blame. But Linus and Andrew didn't even respond to these critical vulnerabilities....
Just go ahead and create a 2.7 branch, and then assign a maintainer to the 2.6 branch and let it stabilize. I don't see any reason for not doing this.
Leaving the Door open for someone else (Score:5, Interesting)
These kinds of security problems leave the door open for someone else to determine the future of Linux.
You've just handed Microsoft a huge Public Relations goodie that they can beat to death as definitive proof that Linux fails to promptly fix security bugs. And now it can be extended to a universal problem with all Open Source Software. And now everything is back to being Microsoft or Death.
Sure I exaggerate, but don't you think others will try to do the same?
I don't know if the guy from GRsecurity can be classified as an asshole or not. I have found a lot of people who do post security patches tend to be very arrogant buttholes, but I've never met the guy. So there's some room here to determine just who's the bitch now.
But if these are real security holes and have been around this long, we've lost a tremendous edge on what advantage Linux has been able to claim in the past. The door is open.
My guess is that the best candidate is going to be OpenBSD or one of the other BSD's. It wouldn't surprise me. As something goes mainstream, it's political fat starts to overwhelm it's technical agility. To prevent this you have to fight very hard. Feature Creep is one name for this phenomenon. It could be argued that Linux has become focused on providing new and interesting features over old and boring performance expectations. This is to be expected as more people start pressing for wish list features and begin to ignore the original problems of security and stability. If you've ever wanted to see this in action - watch Debian. People are bitching now that Debian Unstable should be the defacto distribution version today and just wave their hands in dismissal when someone complains about packages breaking in Unstable. Apparently they too have accepted inherent stability problems in lieu of stability.
This is dangerous for all organizations who do this. As the foundation is ignored, you will start to permit some really illusive bugs into the system.
Similar extensions can be found when comparing Debian's Stable to Mandrake et al. Debian tends to be much slower on new developments, but they have a very good track record for basic performance. Similarly OpenBSD has it's software/hardware limitations, but it's definitely secure.
And any arguements regarding the security of a system as installed from the distro-provider is pretty much BS. They have each decided to install towards a target audience. To expect to be able to execute an installation on an unprotected machine and have no security holes appear at any point in the process is more trouble than it's worth. The price of doing an installation behind a firewall is far lower and a waste of development resources.
Re:FUD (Score:3, Insightful)
Re:FUD (Score:2)
I wonder how many insecure installations had a box to come out of? Very few, I would think. Those with RHE susbscriptions and the like would be classed as 'out of the box', but admins installing because they prefer it are more likely to suffer these issues. No box required.
Re:FUD (Score:2)
Maybe linux needs to come up with an easy way to manage security. That is one of the apple things is that your system is a tool.... should be easy to use to
Re:linux vs ??? (Score:5, Informative)
OpenBSD [openbsd.org] has implemented security [openbsd.org] similar to grsecurity. Note that this is part of OpenBSD operating system, so the user does not need to do anything to use it. Contrast this to grsecurity that is a set of patches against Linux kernel.
As far as I know, only Gentoo and Mandrake supports grsecurity.
Re:Misunderstanding of words (Score:2)
What is being argued is that the community is not working to patch such things. Whether that's true or not is the debate at hand.
Better to fix an issue than know about it and leave it be *cough*microsoft*cough*.
A hilarious dig at Microsoft. Reread the article - they are stating that the Linux kernel people know about the
Re:Misunderstanding of words (Score:2)
in all of these exploits I don't see a single one that is remotely exploitable. If you give a user access to a system, presumably you have some hold over him (employee, service contract, etc). If someone breaks a username/password, good job... but hey, why not try to just break into root...
This isn't to say that local exploits aren't bad, or that they shouldn't be fixed, I've just always assumed that if someone has local access, they have root. There are entirely too many programs that can
Re:Misunderstanding of words (Score:2)
I always wonder if the same people who say "it's not a remote exploit, who cares?" are the same people who say "it's not a root exploit, who cares?"
Re:Microsoft? (Score:5, Interesting)
Re:Microsoft? (Score:3)
What the standard Unix (and Windows) model is discretionary access control.
What this means is that your access is based on your UID and GUID. If you have permission or not to access a file.
You are confusing Mandatory Access Control (which Windows and SELinux both have), and Rôle Based Access Control (which SELinux has). Mandatory Access Control simply means that objects have access control associated with which is defined by system policies, ra
Re:Bugtraq rulez. (Score:3, Interesting)
Re:Patches are in -ac7 (Score:4, Insightful)
Linux isn't just a hobby toy anymore. If Linus is holding on to things too tightly, he's doing himself and the community a disservice.
Re:Patches are in -ac7 (Score:3, Insightful)
Absolutely friggin brilliant. Because we all know no one ever fakes their idenity in IRC. You sir are a genius!