|
|
Subscribe / Log in / New account

Security quotes of the week

So the real "hard truth" is that Linux is just now starting to play catch-up in the game of kernel self-protection that we've [grsecurity/PaX] been playing for 13 years. Finally perhaps they've gotten the message that relying on updates alone doesn't provide any security, even against the least skilled attacker. You're always one 0day away from complete system compromise using the same old techniques that are known and dead in grsecurity for years. For all the talk of raising attacker cost, what's the cost to an attacker that downloads a fully-functional public exploit? Real security defenses make exploitation impossible for relevant bug classes and exploit vectors, and force attacks to more difficult unpublished techniques that are more time-consuming, harder to automate, and harder to perfect in an attacker's test environment.
Brad Spengler in the grsecurity forums

Nearly one in two Internet users say privacy and security concerns have now stopped them from doing basic things online — such as posting to social networks, expressing opinions in forums or even buying things from websites, according to a new government survey released Friday.

This chilling effect, pulled out of a survey of 41,000 U.S. households who use the Internet, show the insecurity of the Web is beginning to have consequences that stretch beyond the direct fall-out of an individual losing personal data in breach. The research suggests some consumers are reaching a tipping point where they feel they can no longer trust using the Internet for everyday activities.

Andrea Peterson in The Washington Post

To achieve this marketing triumph, Tesla did not buy digital ads from online marketplaces that use third-party data to identify potential customers. It did not, in any apparent way, intrude on the privacy of its potential customers by surreptitiously gathering information about their online activities. What it did do is persuasively demonstrate that brands could achieve great success without using customer-abusive, data-gathering methods.
Mark Hass in the "Freedom to Tinker" blog

to post comments

Security quotes of the week

Posted May 19, 2016 15:27 UTC (Thu) by ortalo (guest, #4654) [Link]

Brad, seconded.

Security quotes of the week

Posted May 19, 2016 16:30 UTC (Thu) by smitty_one_each (subscriber, #28989) [Link] (1 responses)

"they feel they can no longer trust using the Internet for everyday activities"

Joining an Amish community, then?

Security quotes of the week

Posted May 20, 2016 13:49 UTC (Fri) by ortalo (guest, #4654) [Link]

Or just refrain from using the Internet for sensitive non-essential tasks (such as news reading in some countries).
Sure we were really out of schedule for 1984, but now many areas of the world are catching up.

Security quotes of the week

Posted May 19, 2016 22:25 UTC (Thu) by flussence (guest, #85566) [Link]

grsec and 90's Microsoft have a lot of things in common.

Security quotes of the week

Posted May 20, 2016 0:21 UTC (Fri) by spender (guest, #23067) [Link] (1 responses)

Just as an update:

The linux.com PR piece which both the Linux Foundation and Greg KH promoted with an "EXCLUSIVE:" title:
https://plus.google.com/+LinuxfoundationOrg/posts/FkSbr3P...
https://plus.google.com/+gregkroahhartman/posts/2rM46nj9RsL

has been updated! The update claims:
"Editor's Note: This article has been updated to clarify security changes in the 4.6 release."

Feel free to compare the archived version of the linux.com post to the new "clarified" version:
https://web.archive.org/web/20160515221843/https://www.li...

You will find that the only change made (other than to refer to the release of 4.6 in the past tense) is replacing the following sentence:
"If something happens and you can't override a data structure, you can't."
to
"If a bug happens where you would normally be able to overwrite a portion of memory, now with the added protections in place, you aren't allowed to do that so the bug does not cause any additional "harm.""

So the only change was to replace a nonsensical sentence with one that's factually incorrect. It acts as if stopping one minor post-mem corruption exploit vector is the same as stopping a bug class. As I already explained in the original LWN post about __ro_after_init, an attacker abusing the VDSO generally already has an arbitrary write primitive. Thus it's not at all the case, as the linux.com article claims, that the bug cannot cause any additional harm. Trivial proof of this is given by the other exploit published for the CTF which instead of targeting the VDSO, did a direct modification of the task's cred struct. It's unconscionable to me that Kees and Greg would stand behind this piece of security word salad, but I'm sure it's indicative of their future strategy to compete by trying to co-opt our "kernel self-protection" term while offering little more than cargo-culted, minimal effort, fluff. And we'll continue to fight back with facts.

You can see Greg's response to my blog post in his post above. Clearly he's not concerned about spreading misinformation while trying to market upstream's cargo cult security attempts.

What Greg's comment on the article (and his final comment where he, funded full time by the Linux Foundation, dreams of a world where we wouldn't be able to work on security full-time) really exposes, is that Kees is being used merely as a surrogate to lessen the blows to upstream egos. To admit to us personally that they were wrong all these years would be too much for their egos to bear, so instead they'll take the same exact advice (see my LSS 2010 talk) from someone else who sucks up to them while they copy+paste and remains silent as they disrespect our work as Greg did in his above comments.

Believers in the KSPP need to ask themselves a hard question: with the people doing the upstreaming work incapable of understanding the code enough to do anything more than literal copy+pastes (see the RANDSTRUCT, USERCOPY, and KSTACKOVERFLOW copy+paste "work" as evidence of this) -- who is going to maintain that code if it ever lands upstream? The submitted patch for USERCOPY today couldn't possibly have ever been tested; it's a straight copy+paste with irrelevant grsecurity hunks left in and significant portions entirely missing.

So that I don't get accused of being anti-everything, I will add that there are other people doing useful security-related work for Linux: Hannes Frederic Sowa, Andy Lutomirski, Daniel Borkmann, Dan Carpenter, and Mathias Krause. Though much of it was already done in i386 UDEREF in 2006, Andy's uaccess branch that overloads uaccess exception handling to put some limits on KERNEL_DS activity is a welcome change. Daniel Borkmann recently put out the first version of the eBPF JIT constant blinding (which I did for the older BPF years ago) and has made the effort to have it support a wide array of architectures. Understood in the proper context, this is all good stuff. In the ideal world, it would be these people doing real work we're acknowledging instead of people copy+pasting code and making the minimal effort to claim some new security feature. In this world, unfortunately, we ignore 15 years of work and pretend someone sweet-talking us into copy+pasting some code is the only thing deserving of recognition. As I mentioned before, this is a highly short-sighted strategy that isn't going to work out well in the long term.

-Brad

Security quotes of the week

Posted May 20, 2016 13:33 UTC (Fri) by ortalo (guest, #4654) [Link]

Well, note we had already understood in your first (quoted) comment that playing catch-up was not the best thing to do.


Copyright © 2016, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds