[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <29361.1216238905@turing-police.cc.vt.edu>
Date: Wed, 16 Jul 2008 16:08:25 -0400
From: Valdis.Kletnieks@...edu
To: Cheradenine Zakalwe <sc.contact@...il.com>
Cc: linux-kernel@...r.kernel.org
Subject: Re: The state of linux security
On Wed, 16 Jul 2008 16:05:07 -0000, Cheradenine Zakalwe said:
> This (for most people I'd guess) is far more dangerous than simply
> having their computers crash. Also, I'd bet that many security bugs
> aren't triggerable under any normal workload. If my machines have
> been running for 2 months why bother bringing them down in order to
> bugfix something that doesn't seem to affect them anyway?
You just convinced me that you've never *really* thought about it the way
a security professional would.
The key point you overlooked is that if it's only triggered under an abnormal
workload, the attacker can usually *arrange* said workload. Need at least
10K processes for something to trigger, and there's usually only 400 on the
box? No problem, just fork-bomb yourself 9,600 processes and then run the
exploit. You can only avoid the reboot for a bugfix if you can *prove*
that the setup condition(s) cannot possibly happen on the system unless
the security has already been breached (for example, "we don't need to
reboot to fix this because there is a system-wide process limit of 1,250
per user, there are only 7 userids on the system, and you need to already
be root to reset the limit").
Just woe unto you if you add an 8th userid before you reboot.. :)
> Obfuscating the risk people are exposed to means you have no real
> accountability and thus no incentive to not put so many security bugs
> there in the first place. If other developers or users don't know how
> bad things are how can they make informed decisions about development
> processes or where they can afford to deploy linux?
If I wrote up a 'DoS Advisory' for every time I manage to find another way
to oops or panic a -mm kernel, I'd probably have a a very large pile of
advisories. However, the fact that I managed to oops or panic their software
has almost always been incentive enough for the maintainers to fix it, there's
no need to add more.
> know what I've been exposed to and for how long. From the looks of
> what the paxteam has been saying, it seems linux security is pretty
> bad and has been getting worse. This must be in no small part to you
> putting your head in the sand, sticking your fingers in your ears and
> going "lalalalala".
It should however be noted that a number of people who take security seriously
think the paxteam is totally out to lunch with some of their ideas. The last
time I looked at their "security patch" (admittedly, that was back around
2.6.17 or so), a large chunk of it was pretty much cargo-cult security that
addressed specific gotcha's that have in the past been used (like symlink races
in /tmp), rather than address the *actual* security issue (for instance,
"compilers shouldn't overwrite system config files") in a comprehensive manner.
A big chunk of the rest was their version of execshield, which required
cutting the available address space in half (a big issue for 32-bit archs).
The telling point is that they didn't see this as being possibly a problem for
some users.
> If it turns out that the current development model has produced too
> many security problems then the development model must change.
You've apparently overlooked the fact that although there are probably still
a lot of security bugs in the kernel, an attacker is *always* going to
approach the path of least resistance. No sense in looking for a kernel
exploit, when it's probably a lot easier to find one you can package up
in Firefox, or OpenOffice, or the pcre library, or any of the zillions
of other packages that get security advisories all the time...
And tell me - how many is "too many"? Who gets to judge? You don't like
the way Linus and Andrew handle it, there's this guy Theo, you can go talk
to him....
> One more thing I'd like to throw out there on the issue of
> accountability is this: How do I know that some developers have not
> been paid to specifically introduce some obscure security flaw?
Which is more likely - that somebody will manage to sneak a malicious patch
past the relevant subsystem maintainer, and Andrew Morton, *and* Linus,
without anybody being the wiser, or that they'll drop their malicious code
into one of the *other* 5,932 packages currently in Fedora Rawhide?
Go read up on the Underhanded C contest. Then go read Ken Thompson's Turing
Award Lecture "On Trusting Trust" - and then go see if anybody's audited the
gcc tree lately, while thinking about what Thompson wrote. Or audited
the *other 5,931 packages besides the kernel and gcc...
(Incidentally, the "unnamed Air Force Document" that Ken mentions is none
other than Karger&Schell's paper on Multics security - also a good read,
as it discusses a *lot* of attack methods you may not have really thought
about in detail...)
Content of type "application/pgp-signature" skipped
Powered by blists - more mailing lists