"Stable" kernel 2.6.25.7 released
"Stable" kernel 2.6.25.7 released
Posted Jun 17, 2008 12:00 UTC (Tue) by spender (guest, #23067)In reply to: "Stable" kernel 2.6.25.7 released by NAR
Parent article: Stable kernel 2.6.25.7 released
First, a correction to my original post. The fix for the TPM bug on vendorsec came from Michael Halcrow, not Serge Hallyn. I should have linked to the proper URL, which is: http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.... Here we see Greg committed it into -stable, and Al Viro and Chris Wright both signed off on it. Unless Greg or any of the other people signing off on the commit didn't read any of the link which was pasted (which I find very hard to believe) the information about it being a local DoS was intentionally suppressed. If you don't bother to spend the time to go and read the links to everything the PaX team and I have posted, then it would be easy to assume that this is just some huge series of incompetence (which extends back far beyond these last two releases where I started to actually point things out). If you go and actually read the references though, I think you'd have to be pretty naive and distort the evidence in every case to come to a conclusion of mere incompetence. Like I mentioned before though, the public doesn't have all of the information at hand since so much goes on behind the scenes in private mailing lists with no accountability. I alluded to a few of the instances earlier if you actually read all my previous posts, but I'm compiling the full details of this information and will be submitting it to LKML and other mailing lists, since it's too good to waste here. It should clear up any lingering doubts. -Brad
Posted Jun 17, 2008 12:31 UTC (Tue)
by NAR (subscriber, #1313)
[Link] (43 responses)
Posted Jun 17, 2008 13:11 UTC (Tue)
by PaXTeam (guest, #24616)
[Link] (42 responses)
Posted Jun 17, 2008 15:10 UTC (Tue)
by nix (subscriber, #2304)
[Link] (36 responses)
Posted Jun 17, 2008 15:43 UTC (Tue)
by PaXTeam (guest, #24616)
[Link] (35 responses)
Posted Jun 17, 2008 17:37 UTC (Tue)
by khim (subscriber, #9252)
[Link] (28 responses)
this mentality is called security by obscurity. congratulations for having made the basic mistake in computer security ;-). This one comment explains it all: you DON'T care about security. What you DO care about is your reputation. You will happily increase risk for users as long as everything is done by your rules. Why? Oh, it's simple: anyone who claims that security by obscurity never works is a troll. Actual rule is "You can fool all the people some of the time, and some of the people all the time, but you cannot fool all the people all the time". Case to the point: PSP had easily exploitable backdoor in firmware from the day one - and still has it today. Yet crackers needed two years to find and exploit it. Why? Because of the obscurity. And you can be pretty sure A LOT OF guys wanted to this: hardware solitions were offered, rare disks (needed to use previously known cracks) were sold for $100 or more, etc. BIG BUSINESS. BIG MONEY. Yet no crack for TWO YEARS. THAT is the power of "security by obscurity". It DOES work. Forever? Of course not! But for a long time. If you don't accept thios simple fact that there are nothing to discuss further - you have different set of axioms then kernel developers do. about this particular commit: why does it make sense to mention the DoS at all then? don't you think it draws attention from the bad guys who can sniff an exploitable bug where others smell a DoS only? wouldn't it have been better (from your point of view, that is) to simply not mention anything at all? Bingo! This particular commit is bad NOT because it does not mention all security implications, but because it talks about DoS at all. Poor phrasing, but not the end of the world.
Posted Jun 17, 2008 18:58 UTC (Tue)
by zakalwe2 (guest, #50472)
[Link] (27 responses)
Posted Jun 17, 2008 22:04 UTC (Tue)
by man_ls (guest, #15091)
[Link] (26 responses)
Et voilĂ ! You have an unpatched vulnerability (with a published exploit in the wild) on millions of machines worldwide, and everyone who doesn't update their kernels daily is vulnerable. Is this responsible disclosure?
You may think that Linus et al are burying their heads in the sand, but try to picture yourself in their shoes; there is little else they can do but try to raise the bar, however little they can, for exploitation. Occasionally a really serious issue arises with obviously dangerous implications. Such rare events can be disclosed and publicized so hopefully everyone will patch their kernel before an exploit is published, but it cannot be done for every bug with potential security implications (i.e. a hundred times a month). Kernel users would stop paying attention quickly if every esoteric bug was magnified by the maintainers.
Posted Jun 17, 2008 22:38 UTC (Tue)
by PaXTeam (guest, #24616)
[Link] (24 responses)
Posted Jun 17, 2008 23:28 UTC (Tue)
by man_ls (guest, #15091)
[Link] (12 responses)
The policy for security bugs you cite is specifically for people who contact the security team. If a specific bug doesn't reach them I don't see why that policy should apply at all. In some of the bugs you have brought up the security implications seem minor at best, so maybe that is why they were not sent to the security team; or maybe it was due to incompetence. Anyway for these bugs kernel devs are free to apply whatever disclosure policy they see fit (i.e. not bound by any document), and we are free to discuss if they do it sensibly, whether you care about it or not.
Posted Jun 18, 2008 0:41 UTC (Wed)
by PaXTeam (guest, #24616)
[Link] (11 responses)
Posted Jun 18, 2008 6:57 UTC (Wed)
by man_ls (guest, #15091)
[Link] (10 responses)
From what we have seen bugs are disclosed, just not the way you like. You are getting all worked up because commit messages do not reflect the kind of information you would like to be there, and that is fine, but it does not follow from the document that it should be there. "Full disclosure" is not "crying wolf".
Posted Jun 18, 2008 11:55 UTC (Wed)
by PaXTeam (guest, #24616)
[Link] (9 responses)
Posted Jun 18, 2008 21:39 UTC (Wed)
by man_ls (guest, #15091)
[Link] (8 responses)
If you or any other security pros are willing to discuss it further (and help the three remaining readers get bored to death) feel free to. But please keep in mind that "full disclosure" is a means to an end: make kernel devs fix dangerous bugs and close security holes. It is not the other way around: fixing bugs is not the way to full disclosure. If kernel devs are already fixing the bugs, full disclosure might not be so necessary.
Posted Jun 18, 2008 21:53 UTC (Wed)
by spender (guest, #23067)
[Link] (4 responses)
Posted Jun 19, 2008 9:39 UTC (Thu)
by nix (subscriber, #2304)
[Link] (3 responses)
Posted Jun 19, 2008 14:34 UTC (Thu)
by spender (guest, #23067)
[Link] (2 responses)
Posted Jun 19, 2008 20:16 UTC (Thu)
by man_ls (guest, #15091)
[Link] (1 responses)
Posted Jun 19, 2008 21:30 UTC (Thu)
by nix (subscriber, #2304)
[Link]
Posted Jun 18, 2008 23:17 UTC (Wed)
by PaXTeam (guest, #24616)
[Link] (2 responses)
Posted Jun 19, 2008 13:18 UTC (Thu)
by man_ls (guest, #15091)
[Link] (1 responses)
Maybe kernel devs need more training in security, or maybe an independent body doing risk analysis would be the way to go. As a developer who is not a security expert, I can tell you that things look pretty different from the inside. When Linus talks about the tendency to hide bugs and the need to fight it, he has a point.
Posted Jun 19, 2008 14:06 UTC (Thu)
by PaXTeam (guest, #24616)
[Link]
Posted Jun 17, 2008 23:32 UTC (Tue)
by drag (guest, #31333)
[Link] (10 responses)
Posted Jun 18, 2008 0:58 UTC (Wed)
by PaXTeam (guest, #24616)
[Link] (9 responses)
Posted Jun 18, 2008 12:49 UTC (Wed)
by nix (subscriber, #2304)
[Link] (8 responses)
Posted Jun 18, 2008 13:06 UTC (Wed)
by PaXTeam (guest, #24616)
[Link]
Posted Jun 18, 2008 13:44 UTC (Wed)
by spender (guest, #23067)
[Link] (6 responses)
Posted Jun 18, 2008 16:52 UTC (Wed)
by nix (subscriber, #2304)
[Link] (5 responses)
Posted Jun 18, 2008 17:59 UTC (Wed)
by PaXTeam (guest, #24616)
[Link] (4 responses)
Posted Jun 19, 2008 9:45 UTC (Thu)
by nix (subscriber, #2304)
[Link] (3 responses)
Posted Jun 19, 2008 10:31 UTC (Thu)
by PaXTeam (guest, #24616)
[Link] (2 responses)
Posted Jun 19, 2008 21:47 UTC (Thu)
by nix (subscriber, #2304)
[Link] (1 responses)
Posted Jun 20, 2008 1:37 UTC (Fri)
by zakalwe2 (guest, #50472)
[Link]
Posted Jun 17, 2008 22:57 UTC (Tue)
by zakalwe2 (guest, #50472)
[Link]
Posted Jun 17, 2008 18:11 UTC (Tue)
by nix (subscriber, #2304)
[Link] (5 responses)
Posted Jun 17, 2008 22:26 UTC (Tue)
by PaXTeam (guest, #24616)
[Link] (4 responses)
Posted Jun 17, 2008 22:44 UTC (Tue)
by nix (subscriber, #2304)
[Link] (3 responses)
Posted Jun 17, 2008 22:57 UTC (Tue)
by PaXTeam (guest, #24616)
[Link] (2 responses)
Posted Jun 18, 2008 12:52 UTC (Wed)
by nix (subscriber, #2304)
[Link] (1 responses)
Posted Jun 18, 2008 13:20 UTC (Wed)
by PaXTeam (guest, #24616)
[Link]
Posted Jun 18, 2008 13:52 UTC (Wed)
by NAR (subscriber, #1313)
[Link] (4 responses)
Posted Jun 18, 2008 14:13 UTC (Wed)
by PaXTeam (guest, #24616)
[Link] (3 responses)
Posted Jun 18, 2008 16:55 UTC (Wed)
by nix (subscriber, #2304)
[Link] (2 responses)
Posted Jun 18, 2008 17:47 UTC (Wed)
by PaXTeam (guest, #24616)
[Link] (1 responses)
Posted Jun 19, 2008 9:47 UTC (Thu)
by nix (subscriber, #2304)
[Link]
"Stable" kernel 2.6.25.7 released
Well, I haven't noticed the DoS in the bug report for the first look, I had to do a search in
the browser.
I think there are very very few security consious developers like yourself. Most of them won't
notice that a "double free" is a security bug. Most of them start to read the bugzilla entry
from the "Description" part and would miss the summary.
Given the speed of kernel development, the amount of changes and the lack of common bug
database (and it's integration with the version control system), I still think it's
incompetence, not malice. I haven't examined all of the links in details, but haven't read a
"it's a security fault, let's hide it" comment which would prove malice.
Not that's it all that reassuring.
"Stable" kernel 2.6.25.7 released
> I haven't examined all of the links in details, but haven't read a
> "it's a security fault, let's hide it" comment which would prove malice.
well, you really should check them out, but here's a choice quote from Paul Mackerras posted
to the security list a while ago:
I'd appreciate advice about the best way forward here, and to what
degree we should be candid about the reason for the patch in the
commit message when it gets committed to Linus' git repository.
how 'candid' it became you can check in that thread and the posted links (hint: no mention of
the more serious security impact).
"Stable" kernel 2.6.25.7 released
I imagine this is because the bad guys must be assumed to read the commit logs too, before
releases are made, and it's intentionally hard to edit commit logs immediately before
releasing, especially if it's a big tree (i.e., a new major release, not -stable): it would
likely mean a massive rebase.
"Stable" kernel 2.6.25.7 released
> I imagine this is because the bad guys must be assumed to read the
> commit logs too, before releases are made,
this mentality is called security by obscurity. congratulations for having made the basic
mistake in computer security ;-).
more seriously, you're saying that the bad guys in desperation read commit logs and use the
little time between that and the actual release/widespread adoption to exploit the holes (that
takes some skill in case of kernel bugs), because the same (skilled) bad guys are unable to
find exploitable bugs themselves? do you have the *slightest* evidence to support this view
(yeah i was paraphrasing, hope you got the point and won't get sidetracked in my choice of
words)?
second, what about the good guys who need to know the same information (think IDS/IPS vendors
for one, then the many trees tracking that of Linus and trying to keep their side secure)? oh
yeah, the two sides of the coin. the problem is that you, the ultimate end user and most
affected person didn't get to flip it. maybe you personally don't want to, but there're many
others who do.
third, about this particular commit: why does it make sense to mention the DoS at all then?
don't you think it draws attention from the bad guys who can sniff an exploitable bug where
others smell a DoS only? wouldn't it have been better (from your point of view, that is) to
simply not mention anything at all? i think your imagination needs a little more consistency.
last but not least, now that you're done using your imagination, will you actually try to do
something to figure out what's really going on? you know, talking here won't get you far, your
answers are in the mailing list archives.
Congratulations are in order!
Congratulations are in order!
What you've just said is that experts who spent their time reverse engineering a binary
firmware failed to find an easily exploitable method, but instead found a method that enabled
them to make money. That is human nature. What guarantees do I have that some linux
contributers don't deliberately introduce or obscure exploitable bugs so that they can profit
from them in some way? The vast majority of other people who understand and find them are
likely to keep them to themselves, or sell them on.
If there is no accountability or transparency in how these serious flaws are dealt with, no
incentives to disclose or not put them there in the first place, bad things will almost
certainly happen. It's inevitable. These corruptions happen in every other field, it's naive
to think they won't happen here.
Everything that is even remotely a "security" threat should be labeled as such. If this makes
linux look bad when some smart researcher compares all the major OS' security by counting
publicly known flaws, so be it. That is the incentive to not put them there in the first
place. Hiding them is, at best, leading to a culture of complacency, and at worst an
indication of malice.
I salute spender and the PaX team for bringing these issues to the fore. They have made a
considerable impact in the field of security, when they speak it is worth listening.
But wait, you have to realize the consequences of the way advocated by spender and PaXTeam: let us follow the path suggested by nix below. First find a bug, and search for a related vulnerability; then publish it along with an exploit so people take you seriously, and obtain a CVE identifier. That is the moment to send a patch to a public list pointing to the CVE so people can make informed decisions.
Not so fast
Not so fast
besides a few strawmen, you missed the entire point of what we were saying. it's not about
what disclosure policy is best for the kernel. i don't care, really. what i do care about is
that what the kernel devs commit to in Documentation/SecurityBugs (as of now, full
disclosure), they stick to it. and i explained many times now the reason for that: people
assessing security risks need to know whether the kernel commits are a reliable source of
information of that or not. because if they aren't then these people will know they'll have to
assign resources to that. as simple as that, it's called risk management.
Not so fast
besides a few strawmen [...]
"Straw man" commonly refers to the misrepresentation of someone's position. I don't see where I misrepresented your position, but I'm sorry that you feel I did.
people
assessing security risks need to know whether the kernel commits are a reliable source of
information of that or not.
People assessing security risks should make their own assessments. They should not trust commit messages, and I don't see how you can suggest that they might even think about it.
Not so fast
> "Straw man" commonly refers to the misrepresentation of someone's
> position. I don't see where I misrepresented your position, but I'm
> sorry that you feel I did.
where did we suggest that 'our way' is to unleash full blown exploits on the unsuspecting
public in order to stress the bug's importance?
> The policy for security bugs you cite is specifically for people who
> contact the security team.
stop right there. we weren't talking about anything else but security issues discussed and
subsequently covered up in secret lists. what happens in public forums is not under
discussion.
> If a specific bug doesn't reach them I don't see why that policy should
> apply at all.
in that case what's the question at all? what they don't know they can't cover up.
> In some of the bugs you have brought up the security implications seem
> minor at best, so maybe that is why they were not sent to the security
> team;
which ones are you talking about? FYI, every one of the commits we brought up had been
discussed on either the kernel security list or vendor-sec. besides, what do you call 'minor'?
does your definition of 'minor' also match that of the rest of the world? did you make sure?
then what entitles you to make that judgement call instead of the world? see, you already
showed the exact bad mindset that plauges the kernel devs engaged in covering up security
bugs. *you* don't get to decide what is important information for *other* people. the *other*
people do. understand?
> Anyway for these bugs kernel devs are free to apply whatever disclosure
> policy they see fit
what bugs again? if bugs are not on a secret list then they're in a public one, what's there
to 'disclose' that isn't already public?
> They should not trust commit messages,
says who? 'man_ls' or is it the agreed-upon kernel policy? do you even realize what you just
said?
Not so fast
where did we suggest that 'our way' is to unleash full blown exploits on the unsuspecting
public in order to stress the bug's importance?
I think my scenario (find vuln, exploit it, publish and get CVE id, then send commit with CVE in message) is almost as dangerous without a published exploit. I can see why giving this kind of information away in the kernel commits (even a CVE id) scares people. I don't think it was a misrepresentation, but whatever.
FYI, every one of the commits we brought up had been
discussed on either the kernel security list or vendor-sec.
If it is vendor-sec then Documentation/SecurityBugs does not apply. When it is the kernel security list it applies, but this policy document doesn't say what you seem to think it says. It clearly states that kernel security officers will disclose what they are told as they see fit, and anyone reporting the bug cannot rely on secrecy upon their part.
does your definition of 'minor' also match that of the rest of the world?
In this thread we have seen a bug which cannot be exploited ("still, this pattern is dangerous, someone had better
audit the code for it."), another one only exploitable by root and a local DoS (i.e. a crash). I sincerely hope the rest of the world also thinks these things are minor.
says who? 'man_ls' or is it the agreed-upon kernel policy?
I say that security professionals who rely upon kernel commits to perform security assessments are crazy. If you think it is sound professional conduct, let me know where you get your security. If for "agreed-upon kernel policy" you are referring again to Documentation/SecurityBugs, then you are still deluding yourself. Where does it say that "kernel commits will contain all available information for security professionals"? Bugs are disclosed and that is what they agreed to.
Not so fast
> I think my scenario (find vuln, exploit it, publish and get CVE id, then
> send commit with CVE in message) is almost as dangerous without a
> published exploit.
i see you haven't seen my other posts in the thread, so i'll ask you as well: how do you know
you're the *first* one to find and exploit a given bug? answer: you don't. from that point on
your entire argument falls apart because that was the one assumption it rested on (if you're
not the first one then you're not saving anyone but yourself, from embarrasment). not to
mention that you're talking about something we never did: nowhere did we say that we want
exploit code in commits for example. as for how putting even as little info as a CVE in
commits scares people, go tell that to the -stable guys because they're trying their best at
doing exactly that. will you crucify them because they're spreading terror among the populace,
to paraphrase you?
> I don't think it was a misrepresentation, but whatever.
you don't? did you even read how you introduced that scenario? here it is for you again:
> you have to realize the consequences of the way advocated by spender and
> PaXTeam
now you tell me how this is not putting words into our mouth. where did we say anything
remotely resembling that? unless you can point to a post we made, you put up a strawman and
attacked it as if it was relevant to the discussion (it wasn't, for other reasons as well, see
my comments on disclosure policy vs. consistency/honesty).
> If it is vendor-sec then Documentation/SecurityBugs does not apply.
other rules still do and they don't call for hiding security impact information. but you're
not a member of either list therefore you couldn't know.
> When it is the kernel security list it applies, but this policy document
> doesn't say what you seem to think it says.
it says full disclosure. the initial participants knew full well what that means. to show that
the whole concept isn't exactly foreign to them, here's a few choice Linus quotes:
I really _despise_ people who think security is an issue of hiding bugs.
If they then try to make themselves look good ("no zero-day exploit, we
fixed it immediately"), they're worse than low.
The only thing that seems to work for security is public shaming.
and another addressed to vendor-sec:
I don't care what the hell people do on vendor-sec, and you can do your
"responsible" mental masturbation all you want, but as far as I'm
concerned, the _only_ responsibility I have is to fight that tendency to
hide bugs as much as I can.
you tell me if he was advocating withholding security impact info or not. yet we showed how he
did exactly that himself.
> It clearly states that kernel security officers will disclose what they > are told as they
see fit,
no, it doesn't say that. the only wiggle factor it mentions is about setting the disclosure
*date*, not its amount.
> and anyone reporting the bug cannot rely on secrecy upon their part.
no secrecy = full disclosure. thanks for confirming it.
> From what we have seen bugs are disclosed, just not the way you like.
you either don't read or understand what i'm saying. you're once again talking about
disclosure policy, not consistency. i will say it again then, in the hope you get it: i do
*not* care about the chosen disclosure policy per se, i *do* care about holding it up. so when
the current Documentation/SecurityBugs says 'full disclosure', i expect that. if it said
something else, i'd expect that then. clear enough now?
> You are getting all worked up because commit messages do not reflect the
> kind of information you would like to be there, and that is fine, but it
> does not follow from the document that it should be there. "Full
> disclosure" is not "crying wolf".
you don't know what full disclosure is about, that's clear already. please, if you want to
save further embarrasment for yourself, go read up on the subject before making further silly
comments like the above. hint: disclosing security impact information is not "crying wolf".
> In this thread we have seen a bug which cannot be exploited
those commits were mentioned in passing only because they looked suspicious, not because there
was any coverup related to them. the subject of this discussion is commits where we did say
coverup and you tell us what happened there (go ask for the mailing list archives, the answer
is there).
> I say that security professionals who rely upon kernel commits to
> perform security assessments are crazy.
and i say that you're not a security professional. the ultimate goal/job of said professionals
is helping the risk management process and any useful piece of information is valuable input
to that. if a given piece of information turns out to be false (because, say, someone decides
to not hold up to his publicly declared full disclosure policy), then there can be
misjudgement and bad decisions affecting innocent people down the ladder. so in case you still
didn't get it: kernel commits are one source of information and it's of great help (read: time
and human resource saver) when one can simply grep the changelogs for keywords. and one would
rely on that because he believes that commits are actually part of the full disclosure
process. when they aren't, one can miss things unless he invests in a whole lot more resources
to figure that out himself (don't only think of companies but also other distro maintainers
for example).
> Where does it say that "kernel commits will contain all available
> information for security professionals"?
here:
We prefer to fully disclose the bug as soon as possible.
for actual security professionals (unlike you, that is), 'fully disclose' has a specific
meaning. the kernel devs know it as well. go ask *them* if you're in doubt. so when a commit
and the bug its fixing doesn't get a CVE, we have a problem (i gave an example of that, read
the thread).
Not so fast
how do you know
you're the *first* one to find and exploit a given bug? answer: you don't.
Who cares. For all we know the underworld might be teeming with exploits, it doesn't change a thing. If you think it does change, then my point was not clear enough.
as for how putting even as little info as a CVE in
commits scares people, go tell that to the -stable guys because they're trying their best at
doing exactly that.
Talk about straw men... What is scary is not talking about a published CVE, but going out of your way to obtain one for every bug with possible security ramifications, instead of just fixing the damn thing. As spender said:
Generally when a kernel bug is identified as security-relevant, someone creates a CVE for it.
This was after complaining at length that several "security" bugs didn't have a CVE.
Well, if there is a CVE provided with the patch then let it be published; but for these not-so-important issues it would only increase the risk for everyone. In other cases (for crying out loud, a local DoS -- i.e. a crash) I don't see the point. When there are other more pressing affairs it is reasonable to just fix the things and forget about them. If it is done in broad daylight and not in a proprietary dungeon then it is even better.
the only wiggle factor it mentions is about setting the disclosure
*date*, not its amount.
The point is that security devs have a responsibility to disclose whatever information is passed to them; but kernel devs are free to research it themselves and disclose their findings at will. Even if Linus fills his mouth with "full disclosure" panegyrics. In fact he talks about disclosing the bugs, and that is what they do, along with a terse evaluation. See spender's original message for three good examples. They are not silently fixed as in other proprietary operating systems.
hint: disclosing security impact information is not "crying wolf".
Of course it is not, and you will notice that my original sentence was very similar to yours (even if the sense was very different). Let me try to rephrase it so it is more understandable: "Full
disclosure" [of information passed to kernel devs] is not [kernel devs themselves] "crying wolf" [at every opportunity]. You will see it makes more sense this way.
those commits were mentioned in passing only because they looked suspicious, not because there
was any coverup related to them.
They were actually mentioned in spender's original message. I assumed they were important, and yet they appear to have been deconstructed in this long thread.
the subject of this discussion is commits where we did say
coverup and you tell us what happened there (go ask for the mailing list archives, the answer
is there).
So those commits he complained about are no good? We have to dig in additional list archives? No thanks.
and i say that you're not a security professional.
Who said I was? If I told you I play one on TV, would it help the discussion? Neither are most kernel devs, and yet there they are happily building their kernel.
and one would
rely on that because he believes that commits are actually part of the full disclosure
process.
when they aren't, one can miss things unless he invests in a whole lot more resources
to figure that out himself (don't only think of companies but also other distro maintainers
for example).
I hope my distro maintainers are keeping up with important issues, and not worrying about every "local DoS" that appears in kernel commits. Likewise with root-exploitable bugs.
for actual security professionals (unlike you, that is), 'fully disclose' has a specific
meaning.
Yes: do not hide bugs and do not hide security implications. "Do not hide" is the relevant part here. It is not "research them yourself" nor "publish an exploit" nor "search for the relevant CVE or get one if none exist". Those things are worthwhile but not part of "full disclosure", I think.
Not so fast
I had hoped the 100th post to this thread wouldn't have been from a troll who doesn't have one
iota of understanding about the meaning of "full disclosure." You talk a lot for someone who
is obviously not involved in security at all ("the underworld"..really?) and yet you choose to
disagree about things you admit you won't even bother to research yourself. You're the
epitome of a delusional zealot.
-Brad
Not so fast
man_ls compliments you, and you respond that he's a delusional zealot.
This thread is giving me so *very* many examples of how not to communicate...
Not so fast
I'm guessing you were fooled by the juxtaposition of "spender" and "good examples." If you
had actually read his entire post in context, as I did, you wouldn't have replied in such a
way so as to blatantly expose your poor reading comprehension and "reply-without-reading"
mentality (which seems to be a common theme in your postings).
-Brad
nix is usually a very lucid commenter. Your post says quite more about you than about him.
Not so fast
Not so fast
Hay fever drugs *are* kind of turning my mind off at the moment, but
still...
Not so fast
> For all we know the underworld might be teeming with exploits, it
> doesn't change a thing. If you think it does change, then my point was
> not clear enough.
your point was clear in fact, and i told you it rested on this one assumption. maybe you
didn't realize it, in that case let me explain it in more detail. you said this:
> I think my scenario (find vuln, exploit it, publish and get CVE id, then
> send commit with CVE in message) is almost as dangerous without a
> published exploit.
then added:
> Et voilĂ ! You have an unpatched vulnerability (with a published exploit > in the wild) on
millions of machines worldwide, and everyone who doesn't > update their kernels daily is
vulnerable. Is this responsible disclosure?
this comment of yours makes sense *only* if you're the first one to find and exploit a bug. if
you're not then those 'millions of machines worldwide' have been exploitable all along, well
before *you* found the bug. your entire argument falls apart since the
'end-of-the-world-if-i-disclose' situation you describe had already happened. see the point?
the only thing that changes when you, the second or later comer publishes an exploit is that
more people become able to use it - the amount of vulnerable machines does *not* change, only
the amount of actually exploited machines may. your argument is a typical fallacy coming from
advocates of various forms of 'responsible disclosure', check bugtraq and other security lists
for endless debates about it, or just the Linus quote ;).
> Talk about straw men...
well, let's see again what you said:
> I can see why giving this kind of information away in the kernel commits
> (even a CVE id) scares people.
am i misunderstanding this or did you actually say that 'giving away even a CVE id in kernel
commits scares people'?
> What is scary is not talking about a published CVE, but going out of
> your way to obtain one for every bug with possible security
> ramifications, instead of just fixing the damn thing.
that's not how CVE ID assignment works: you publish to a security list (vendor-sec, kernel
security, etc) and you get one assigned *automatically* by one of the guys monitoring these
lists. you don't go out of your way to get one.
> This was after complaining at length that several "security" bugs didn't
> have a CVE.
it wasn't 'security' bugs, it was security bugs. or at least one specific example i provided
that was known to be a local DoS yet nothing happened.
> Well, if there is a CVE provided with the patch then let it be
> published;
i'm glad we agree on this. now go tell that to Linus because he consistently omits the CVE
even if one's got already assigned by the time of the commit.
> but for these not-so-important issues it would only increase the risk
> for everyone.
what are these 'not-so-important issues? any example? and what risk are you talking about?
> In other cases (for crying out loud, a local DoS -- i.e. a crash) I
> don't see the point. When there are other more pressing affairs it is
> reasonable to just fix the things and forget about them.
i hope you're not a kernel contributor either. this attitude of 'fix and forget' is what puts
your users into danger because they will never know they were vulnerable. you may not care
about that fact, but some users do and fortunately you don't get to decide that for them.
> The point is that security devs have a responsibility to disclose
> whatever information is passed to them;
who are these 'security devs'? apparently not the kernel devs because you separated them next,
so i'm left wondering.
> but kernel devs are free to research it themselves and disclose their
> findings at will. Even if Linus fills his mouth with "full disclosure"
> panegyrics.
i'm sorry but that's not what Documentation/SecurityBugs says. of course you're free to
submit a patch to correct it, then everyone will know the state of affairs (provided that what
you stated above actually reflects the consensus of kernel devs - did you even ask them before
making that comment?).
> In fact he talks about disclosing the bugs, and that is what they do,
> along with a terse evaluation.
in fact he doesn't, he says a bit more than that ('this' was about the embargo):
The "security@kernel.org" list had lots of discussion about this when it
was created, and quite frankly, I argued pretty strongly for total and
full disclosure.
notice 'total and full disclosure'. it doesn't mean omitting security impact of bugs, no
matter how else you'd like to explain it away. if you're still in doubt about what full
disclosure means, i suggest that you ask the people of the mailing list of the same name.
> They were actually mentioned in spender's original message.
uhm, then i didn't get which commits you were referring to. myself, i was talking about the
ones in the previous thread and the one or two extra posted in this one.
> I assumed they were important, and yet they appear to have been
> deconstructed in this long thread.
where was, say, the double-free one deconstructed?
> So those commits he complained about are no good? We have to dig in
> additional list archives? No thanks.
there're several commits mentioned in this and the previous thread on the same subject, go
look them up before you dismiss them. reading the rest of the posts would also not be a bad
idea before making comments ;). to get you started, find the link to the ptrace self-attach
fix and tell us its story. among others, why it didn't get a CVE.
> I hope my distro maintainers are keeping up with important issues, and
> not worrying about every "local DoS" that appears in kernel commits.
> Likewise with root-exploitable bugs.
fortunately you don't get to tell them what they should worry about. and i hope there's no
distro that thinks that way. if you know of any that has such a security bug handling policy,
please do make it known to the world at large.
> Yes: do not hide bugs and do not hide security implications. "Do not
> hide" is the relevant part here.
correct.
> It is not "research them yourself"
correct but also strawman, noone expected them to do so.
> nor "publish an exploit"
incorrect, 'full' implies disclosing such information as well, and hard-core full-disclosure
believers actually do that. but i personally don't care if kernel devs publish such code, i
care about knowing that a given commit fixes a bug with security impact at all or not.
> nor "search for the relevant CVE"
i don't understand this one. why would they have to search for a CVE that gets created as soon
as someone submits a security issue to the security lists?
> "or get one if none exist".
it's automatic as explained above.
> If kernel devs are already fixing the bugs, full disclosure might not be
> so necessary.
it is their declared policy for security bugs. go convince them that what they're doing 'might
not be so necessary' ;).
OK, I see your point now: publicize all vulnerabilities as much as possible. Still I am not sure that you see mine: kernel devs are not security experts (most of them are probably not in the security list), and you cannot expect that they go out of their way doing security impact analysis. Also, you probably don't want them to. You have shown us several examples of sloppy security assessments; they are probably just not very good at it.
Not so fast
Not so fast
> OK, I see your point now: publicize all vulnerabilities as much as
> possible.
well, that's not so much *my* point, it's what full disclosure means and it's what kernel devs
have committed to. i never said whether i liked/disliked this form of disclosure myself, i
just said that if someone publicly declared to follow such a policy, he'd better do that else
people will be misled and may make bad judgements affecting innocent users.
> kernel devs are not security experts (most of them are probably not in
> the security list), and you cannot expect that they go out of their way
> doing security impact analysis. Also, you probably don't want them to
actually, i did say the very same thing myself, e.g., here: http://lwn.net/Articles/286439/
(there was a reason i asked you to read all the previous posts before making your own).
> You have shown us several examples of sloppy security assessments; they
> are probably just not very good at it.
no, the examples we wanted to draw attention to were cases where the kernel devs *knowingly*
omitted the security impact information (such as the ptrace self-attach fix). figuring out the
security impact of bugs is a whole different problem and noone expects regular kernel devs to
solve that. but when they see or are told what a given bug does, they'd better not sweep it
under the carpet yet that's exactly what happened.
Not so fast
Always with the strawmen. Strawmen here, strawmen there. What is this?
Lets learn pointless internet debate techniques 101?
"If you call something a strawman, then you don't have to respond to it in a meaningful way.
If you don't have to respond to it in a meaningful way then they can't reply to you about it.
If they can't respond, then you get the last word.. that means you win!!"
"See also: Avoiding the dreaded 'tldr' that spells ultimate failure for any argument. Did he
not reply because your intellect humiliated him? Or was it because he got to bored and decided
to get drunk with his friends instead? Use the 'strawman' reply to keep replies down to a
minimum and allow you to skillfully divert the argument to something you can easily be right
about."
Hint:
When knocking down strawmen, it takes a bit more effort then just to say 'that's a strawman!'
and ignore it. In fact saying 'strawmen' is like crying wolf and is a very weak technique. I
can't even make heads or tails of what you exactly mean or what parts of the OP's comments you
find irrelevant.
=====================
I mean, seriously.
The problems are:
If you announce to the world that something is a security bug then every script kiddies and
their mom will know about it.
If you are careful about keeping quiet it then distributors may miss a important security fix
they need to provide to their end users.
followed by:
If you sound like a arrogant dick on a public forum people will classify you as a arrogant
dick no matter how right you are. Rightfully so. (not so much, you, PaX as other people)
Being forceful with facts and well considered opinions is not the same thing as being
insulting, even if people take it the wrong way. Being insulting is always insulting and it
may get people's attention once or twice, but after that they'll just ignore you out of spite.
This is the reality of the situations and a balance or solution must be found. There is no
absolute, no perfect way to approach this problem and the best solution _will_ be different on
many occasions.
followed by:
Arguing the same things over and over again is pointless. Do not cast pearls before swine.
Your time, your effort, is much more precious then to waste on some pointless internet fart
fest.
That's all.
Not so fast
i didn't elaborate on man_ls's strawmen because he missed the point entirely, so i didn't see
it important besides mentioning the fact (he was arguing disclosure policy like you do,
instead of that of consistency). now i just mentioned one, see somewhere above. satisfied? ;)
> If you announce to the world that something is a security bug then every
> script kiddies and their mom will know about it.
> If you are careful about keeping quiet it then distributors may miss a
> important security fix they need to provide to their end users.
you too didn't get the point. i don't care about the disclosure policy per se, i care about
being consistent, or shall i say, truthful about it. if Documentation/SecurityBugs says 'full
disclosure' then the people on that list had better practice it. if they don't, they should
say so in Documentation/SecurityBugs. above you're trying to argue about the disclosure
policy, feel free to take it to where it belongs, but it's not the subject of this discussion.
as for the rest of your post, does that really belong here?
Not so fast
So very many people are failing to get the point: might it be that you're not expressing
yourself very well?
(Either that or you're saying this to divert attention from questions you can't answer. Well,
I suppose there is the alternative that virtually everyone else on this forum can't understand
English. I know which I think is more likely.)
Not so fast
> So very many people are failing to get the point: might it be that
> you're not expressing yourself very well?
not many, only first time posters who simply didn't read what i said before.
> Either that or you're saying this to divert attention from questions you
> can't answer.
which questions would they be (and you probably meant "don't want to", as you can't seriously
expect me to answer questions that i, well, "can't" ;)? if i missed anything, feel free to
point them out to me.
Not so fast
Some get it, but some do not (the ones trying to misinterpret all the provided evidence to
support their view). Unfortunately for them, the way things are is often not as how we
imagine or would like them to be.
If even Willy is saying that Linus intentionally omits security information at times in his
commits, which he is fully aware of at the time of the commit, why are you still quibbling
with us? I was surprised myself Willy was so honest about this (I appreciate it), and it
meshes with the private evidence I have.
In general, from the evidence I have, the people in charge of handling security put forth a
lot of effort and in most cases handle things properly. This is especially true of bugs that
are submitted to them from the outside, where security-relevance is either explicitly
mentioned or suggested.
But in some cases (the specific examples already provided and others I'm currently compiling),
things aren't handled properly. It seems so far that these involve bugs that haven't been
labeled as security-relevant by individuals/companies in the public realm. Many of these bugs
seem to be DoS-related. On their private lists will exist PoC code to trigger them, so their
security-relevance is well known to the members of the private lists, and yet often it's these
that get handled improperly.
Like we had been arguing, this isn't a conspiracy. They don't coordinate on the lists on how
to cover up the security bugs for the day. But there does seem to be some adherence among
some to an "unwritten rule", that if they aren't being publicly held accountable for
something, the rules can be relaxed. The problem is they end up hurting themselves (and all
of us) this way, since when things aren't mentioned properly publicly through the changelogs,
it often never gets proper classification (see the SELinux remote DoS at the bottom of the
page).
As to why you continue to argue, this might help explain the uncomfortableness you're feeling:
http://en.wikipedia.org/wiki/Cognitive_dissonance
-Brad
Not so fast
I agree with everything you've said in that comment.
I just don't think it's 'dishonest'. Everyone involved is quite open about what's going on, so
how it could be considered dishonest is quite beyond me (and it's not as if we see holes with
actual significant impact being not fixed: please, 'root can get complete control of the
system' is likely to impact a number of systems given in single digits, given that on
virtually every system out there root *already* has complete control: and 'hold back for a few
days until the major distros have updated' also seems reasonable. CPU bugs with security
impact are an entirely different kettle of silicon, and I have no idea what the right thing is
to do there, especially if the bug is one that can't be fixed with a microcode update:
someone's going to get hurt sooner or later no matter what you do).
Not so fast
> Everyone involved is quite open about what's going on, so
> how it could be considered dishonest is quite beyond me
where did you see 'everyone involved' being open? not here. not a single person who
participated in the withholding of known security impact info posted to this thread or
admitted doing so.
>and it's not as if we see holes with actual significant impact being not fixed:
strawman warning ;)! we did *not* talk about bugs not getting fixed. we talked about bugs not
getting properly described in the commits. where did you pull this one from? but now that you
did, i'll actually ask you a question: if a commit doesn't contain security info (such as the
ptrace self-attach fix), how are people running their own kernels supposed to know to pick
such commits up (think of distibutors, not only individuals)? they can't therefore all *their*
users are unnecessarily exposed to risk.
Not so fast
Er, I was pointing out that it would be significant if we saw things getting covered up and
not fixed. We don't.
(Are you *so* confrontational that you assume that when I'm agreeing with you, I'm actually
trying to argue against you, so my point is thus a 'straw man'? If this is actually what's
happening, you're functionally incapable of reading English as far as I'm concerned.)
Not so fast
> Er, I was pointing out that it would be significant if we saw things
> getting covered up and not fixed. We don't.
er, i was pointing out that it was *not* what we had been talking about all along. we talked
about things getting fixed but *not* communicated properly, in particular, the security impact
of fixes was sometimes omitted even when it was full well known. that *is* dishonest, no
matter how much you argue the opposite:
> I just don't think it's 'dishonest'.
that is *not* 'I'm agreeing with you', no matter how you spin it later.
but i said all this a 100 times already by now yet *you* keep diverging into irrelevant
possibilities that we have never raised. you tell me who has a reading comprehension propblem.
also it has been your strategy to change the subject of discussion slightly in order to be
able attack it then. that meets the dictionary definition of a strawman. i know you never
liked it when i exposed every one of your attempts, but that should not be reason to resort to
ad hominem in lieu of rational arguments (you probably figured out by now that i'm not a
native speaker, right?). as you so aptly said:
> This thread is giving me so *very* many examples of how not to communicate...
Not so fast
The dictionary definition of a straw man argument is arguing !A and then
concluding !B, where A is not a precondition of B.
What I'm doing is considering slight variations on what you're discussing
in order to figure out if *they* have any merit (since your claim of some
peculiar form of non-malicious dishonesty is incoherent I haven't wasted
any time considering that case at all).
My apologies for *daring* to consider tangential cases at all. I wasn't
aware I wasn't allowed to discuss such things.
(Your claims of 'exposure' reek of paranoia. In fact pretty much
everything you've posted reeks of paranoia.)
Not so fast
>>since your claim of some peculiar form of non-malicious dishonesty is incoherent
No honey, your ass doesn't look big in that at all.
Not so fast
Writing an exploit for every potentially exploitable bug could end up taking more work than
developing the kernel for a start. I don't think anybody sane is suggesting that. If the
number of security bugs is so high that the kernel developers can not possibly keep up with
labeling them as such, then we have a more obvious problem than disclosure. The entire
development model must then come into question if that is the case.
If there are so many public security bugs, how many more must go unnoticed? Bugs that may
never trigger under any normal use? Like the PaX team suggested, it's hard to imagine people
even need to resort to disclosure lists.
I think the only people raising the bar for exploitation are Spender and the PaX team, yet
their work has been completely dismissed for inclusion in the mainline kernel on the basis
that Linus doesn't like the segmentation logic of PaX.
"Stable" kernel 2.6.25.7 released
The 'little time' you refer to can be anything from months to years. Not everyone keeps their
kernels bang-up-to-date, and fixes to things which might be security holes in mainline are not
always instantly propagated to -stable. Thus a window exists, and given the existence of
rapidly-propagating worms it is unwise to make that window wider than necessary.
(This is of course the entire justification for the existence of private lists like vendor-sec
and the BIND security list in the first place. You might not like it but it *is* defensible. I
don't much like it either, not being on any of those private lists, but nonetheless I can't
really argue against it.)
"Stable" kernel 2.6.25.7 released
it does *not* matter what that 'little time' is. that's because your *whole* argument is based
on a false assumption, namely that it's the kernel devs (or whoever reports a bug to them) who
are the *first* to find a given security bug. it's obvious that there's exactly one such
person in the world who can make that claim, and based on what resources kernel devs spend on
finding security bugs vs. the rest of the world does, it's easy to see that this one lucky guy
isn't one of the kernel devs. it then follows that you can't in general assume that the
security bugs found by kernel devs aren't already being exploited in the wild. it then also
follows that this 'hide the bugs from the bad guys' doesn't actually do that, but it does hide
them from honest but less knowledgable people who nevertheless still need to know about them
to be able to properly assess the risks of a given bug *themselves* (and what the kernel devs
think they can do better themselves - good luck proving that, if anything, they so far proved
the exact opposite).
"Stable" kernel 2.6.25.7 released
It likely isn't always one of the kernel devs, but I fail to see how you
can make claims regarding relative probabilities without data (and I can't
figure out how to get useful data without being a major black hat whom a
lot of other black hats talk to).
(You really do talk a lot about straw men for someone who produces so
many.)
"Stable" kernel 2.6.25.7 released
> It likely isn't always one of the kernel devs, but I fail to see how you
> can make claims regarding relative probabilities without data
because in my carrier i have seen part of what we now call the security industry and i know
for a fact that the kernel devs can't match their resources.
> (and I can't figure out how to get useful data without being a major
> black hat whom a lot of other black hats talk to).
see, one way i can tell a security professional from the armchair one is that the latter's
world consist of simple black and white whereas the former knows it's way more complex. so
however disappointing it will sound to you, no, you don't need to be a 'major black hat'
(whatever that means anyway) to know the capabilities acquired by the security industry.
> (You really do talk a lot about straw men for someone who produces so
many.)
i see you feel very stronly when yours are being exposed one by one (notice how you never even
contested any of them or chose to chicken out, and btw, i thought you were done with this
thread ;), so you're welcome to expose every single one of mine ;).
"Stable" kernel 2.6.25.7 released
No thanks. You're simply too unpleasant to respond to anymore, and your debate technique is
frankly enraging.
(I'm frankly not surprised PaX isn't in the kernel if you're always this confrontational,
whatever its technical merits.)
"Stable" kernel 2.6.25.7 released
the truth isn't always pleasant. neither are strawmen, that seems to be your debate technique
and that didn't work here ;). nevertheless that didn't stop me from responding to you, did it?
i asked you once already, let me repeat that here again: what do you really want from *us*? we
made our point, explained it a dozen times already, what's left for you to do is to check the
facts out for yourself. you said you weren't interested or something like that, then why do
you keep posting irrelevant things?
> (I'm frankly not surprised PaX isn't in the kernel if you're always this
> confrontational, whatever its technical merits.)
i'm frankly not surprised you brought up yet another irrelevant point here. FYI, PaX isn't in
the kernel because, drumroll.... it has *never* been submitted. imagine that! ;) and as a
sidenote, PaX features *are* in the kernel but that's whole different story.
"Stable" kernel 2.6.25.7 released
OK, this is a kind of "smoking gun" - in spite of the "full disclosure policy", a kernel
developer tried to avoid full disclosure. But still, I'd like to get back to the Napoleon
quote. Maybe the translations altered the meaning of the proverb, but I understood that
"incompetence" contained "simple human mistake" too. This quote you shoved does not prove
malice for me, it could be a simple human mistake (or if a security professional goes for
"security through obscurity", than it's a sign of incompetence).
As a software developer, I know that we have a couple of rules that we should obey (just like
the kernel developers have rules e.g. for full disclosure). I also know that we tend to break
these rules: out of ignorance, convenience, lack of time, sometimes incompetence - but I've
never seen someone break these rules maliciously.
Even the amount of exploitable security bugs not labelled as such does not prove malice for me
- after all, there are many people fixing these errors, they can make many mistakes. I believe
your standards are just too high. A security professional should be exceptionally paranoid,
but even most kernel developers are not that paranoid.
I think this thread shows that there are other problems with the current kernel development
process, not just those that are usually mentioned (lack of review, regressions, etc.).
"Stable" kernel 2.6.25.7 released
i don't think i ever talked about malice, what i did say was dishonesty (they're not the
same). dishonesty about having a commitment to the public yet doing something else behind the
scenes. no bad ill is required for such behaviour, my *guess* is that it's normal human
psychology: you don't need to deal with the problems you don't admit you have. just look at
last week's LWN interview with Andrew Morton (he's fully aware of what's going on on the
security lists) and how he downplays the problem of security bugs, almost as if they were on
the verge of dying out because they're in fringe driver code and so rarely in core code. yeah,
of course they're rare if they don't publish the security impact of those bugs. watch this
quote:
That being said, I have the impression that most of our "security holes"
are bugs in ancient crufty old code, mainly drivers, which nobody runs
and which nobody even loads. So most metrics and measurements on kernel
security holes are, I believe, misleading and unuseful.
of course said "metrics and measurements" are "misleading and unuseful" if the kernel devs
falsify the input data.
"Stable" kernel 2.6.25.7 released
Sheesh. Dishonesty *implies* bad intent. If something is accidental or unintentional it's not
dishonest.
(Quibbling over the meanings of words only works if you know what the meanings of those words
actually *are*.)
"Stable" kernel 2.6.25.7 released
> (Quibbling over the meanings of words only works if you know what the
> meanings of those words actually *are*.)
hear hear brother! and let me help you out while i'm at it:
http://dictionary.reference.com/search?q=malice . malice requires intent to harm another out
of hostility, or something like that, you're the native speaker, i'm sure you can interpret it
properly. now, the kernel devs did not actually want to do anything like that, they simply
wanted to save face and look better in statistics, or so. that's not malice, only dishonesty
(they did know what they committed to in Documentation/SecurityBugs and did violate that
promise).
> If something is accidental or unintentional it's not dishonest.
strawman warning ;)! the suppression of security info in the commits we pointed out as such
was neither accidental nor unintentional (nor malicious, just dishonest), so i have no idea
what you're talking about.
"Stable" kernel 2.6.25.7 released
If you're not a native speaker, might I suggest *not* engaging in vast flamewars based solely
on parsing fine details of the meanings of words?
(Sheesh.)
