Brief items
Security
Linux Security Summit schedule published
On his blog, summit organizer James Morris has announced that the schedule for the 2017 Linux Security Summit is now available. The summit will be held September 14-15 in Los Angeles, CA, co-located with Open Source Summit North America and overlapping the also co-located Linux Plumbers Conference.Highlights from the schedule include the following refereed presentations:
- Landlock LSM: Toward Unprivileged Sandboxing — Mickaël Salaün, ANSSI
- The State of Kernel Self-Protection — Kees Cook, Google
- Making Security Invisible — Jessica Frazelle, Mesosphere
- ARMv8.3 Pointer Authentication — Mark Rutland, ARM
- Defeating Invisible Enemies: Firmware Based Security in the OpenPOWER Platform — George Wilson, IBM
There's also be the usual Linux kernel security subsystem updates, and BoF sessions (with LSM namespacing and LSM stacking sessions already planned).
Security quotes of the week
...or do you sell your bug to a group that resells it to some government which then uses it to try to spy on people like Ahmed Mansoor, "an internationally recognized human rights defender, based in the United Arab Emirates (UAE), and recipient of the Martin Ennals Award (sometimes referred to as a "Nobel Prize for human rights")".
Kernel development
Kernel release status
The 4.13 merge window is still open as of this writing; it will likely close on July 16.Stable updates: 4.12.1, 4.11.10, and 4.9.37 were released on July 12.
Quotes of the week
Distributions
Fedora 26 released
The Fedora 26 release is out. "First, of course, we have thousands improvements from the various upstream software we integrate, including new development tools like GCC 7, Golang 1.8, and Python 3.6. We’ve added a new partitioning tool to Anaconda (the Fedora installer) — the existing workflow is great for non-experts, but this option will be appreciated by enthusiasts and sysadmins who like to build up their storage scheme from basic building blocks. F26 also has many under-the-hood improvements, like better caching of user and group info and better handling of debug information. And the DNF package manager is at a new major version (2.5), bringing many new features." More details can be found in the release notes.
Qubes: Toward a Reasonably Secure Laptop
The Qubes OS project has announced a program for the certification of "reasonably secure" laptops, but users will have to wait to get such a machine: "So far, no third-party manufacturers have produced a computer that satisfies these requirements. However, ITL has entered initial talks with a promising partner with whom we can foresee creating a true Reasonably Secure Laptop."
Distribution quotes of the week
Development
Roland McGrath bows out as glibc maintainer
In what seems to be an acknowledgment of the status quo, rather than a big change, GNU C library (glibc) founder and maintainer Roland McGrath has stepped down from the project. This is not caused by any "big news with me", he said, just a recognition that he has drifted away from the project. "
This summer marks 30 years since I began writing the GNU C Library. (That's two thirds of my lifespan so far.) It's long enough. So, I'm hereby declaring myself maintainer emeritus and withdrawing from direct involvement in the project. These past several months, if not the last few years, have proven that you don't need me any more. You'll make good decisions, as you've already made good decisions. You'll actually get around to implementing some of the things I've been suggesting or meaning to do (or saying I would do) for years, as you've already made progress on some of those ideas in recent months. If I stayed around to give advice, you'd ignore my advice to be more paranoid and more cautious, plow ahead anyway, ship it, and then have to redress the problem when the practical issues manifested, as you've already done and had to do. :-) All in all, I have no doubt at all that the job you're doing now and will do in the future maintaining glibc is better than I ever did that job myself and at least as good as my presence in the project might ever make it." As several responses to the post have already indicated, McGrath will be missed.
Dynamic tracing in Linux user and kernel space (Opensource.com)
Over at Opensource.com, Pratyush Anand looks at dynamic tracing for both user space programs and the kernel. He gives an introduction to using uprobes and kprobes directly as well as using them via the perf tool. "We can insert kprobe within most of the symbols in /proc/kallsyms; other symbols have been blacklisted in the kernel. A kprobe insertion into the kprobe_events file for the symbols that aren't compatible with a kprobe insertion should result in a write error. A probe can be inserted at some offset from the symbol base, as well. Like uprobe, we can also trace the return of a function using kretprobe. The value of a local variable can also be printed in trace output."
Jones: Patch review and message brokers
On his blog, Richard WM Jones describes work he has done on an automated patch testing system that is similar to the kernel 0-day test service. "Today I thought I’d write something like this, partly to reinvent the wheel, but mostly to learn more about the RabbitMQ message broker. You see, if you have to receive emails, run large tests, and send more emails, then at least two and possibly more machines and going to be involved, and as soon as you are using two or more machines, you are writing a distributed system and you need to use the right tools. Message brokers and RabbitMQ in particular make writing distributed systems easy — trust me, I’ll show you how!"
Development quote of the week
It's sad that Openmoko (or similar projects) have not survived even as a special-interest project for FOSS enthusiasts. Today, virtually all options of smartphones are encumbered with way more proprietary blobs than we could ever imagine back then.
Miscellaneous
Encrypted Media Extensions a W3C Recommendation
Encrypted Media Extensions (EME) have been under review by the W3C Advisory Committee since last March. This report from the committee addresses comments and objections to EME. "After consideration of the issues, the Director reached a decision that the EME specification should move to W3C Recommendation. The Encrypted Media Extensions specification remains a better alternative for users than other platforms, including for reasons of security, privacy, and accessibility, by taking advantage of the Web platform. While additional work in some areas may be beneficial for the future of the Web Platform, it remains appropriate for the W3C to make the EME specification a W3C Recommendation. Formal publication of the W3C Recommendation will happen at a later date. We encourage W3C Members and the community to work in both technical and policy areas to find better solutions in this space."
The Free Software Foundation's Defective by Design campaign opposes
EME arguing that it infringes on Web users' control of their own
computers, and weakens their security and privacy. "Opponents' last opportunity to stop EME is an appeal by the Advisory Committee of the World Wide Web Consortium (W3C), the body which Tim Berners-Lee heads. Requiring 5% of the Committee's 475 members (corporate, nonprofit, and educational institutions) to sign on within a two-week period, the appeal would then trigger a vote from the whole Committee to make a final decision to ratify or reject EME.
"
SPI 2016 Annual Report
Software in the Public Interest (SPI) has announced the availability of its 2016 Annual Report [PDF], covering the 2016 calendar year. "We’ve seen a lot of change this year. Several long-term board members retired from the board, including Bdale Garbee who served as SPI’s President for many years. There was a lot of interest in SPI’s board election and several new contributors joined the board. The board met in person in February to discuss outstanding issues and work on long-term plans."
Page editor: Jake Edge
Next page:
Announcements>>