Torvalds on the Linux Security Process 280
darthcamaro writes "Linus Torvalds thinks that Linux kernel security disclsoure should be completely open and he really doesn't like the vendor-security model of having a time embargo on security disclosure. 'I think kernel bugs should be fixed as soon as humanly possible, and any delay is basically just about making excuses,' Torvalds wrote. 'And that means that as many people as possible should know about the problem as early as possible, because any closed list (or even just anybody sending a message to me personally) just increases the risk of the thing getting lost and delayed for the wrong reasons.'"
You should listen to him... (Score:3, Funny)
Re:You should listen to him... (Score:5, Insightful)
sPh
Re:You should listen to him... (Score:5, Insightful)
Re:You should listen to him... (Score:2)
I agree. Not only are your systems vulnerable, but someone knows they are, too. Maybe only the good guys know, but there's enough chance that there's a black hat who found out too.
If you get a message as simple as "there's a security hole in Tux that could potentially lead to a remote root exploit," even if there is no fix, at least you can disable Tux and move your pages over to Apache--just for now until the patch is relea
Re:You should listen to him... (Score:3, Interesting)
Your damned if you disclose, Black Hats can read the Kernel News groups, Butraq, and other popular outlets just like the rest of us do.
Your damned if you don't disclose and a breach occures. The public will cry, "Security through Obscurity!"
Re:You should listen to him... (Score:2)
Now, I understand the need to open up the process in order to fuel the power of open source development, but I'm worried about script kiddies having a constant
Re:You should listen to him... (Score:2)
I don't usually read security advisories--I just run "apt-get update && apt-get dist-upgrade" once a day. Takes a few seconds. Windows update can do the same, right?
--Bruce Fields
Re:You should listen to him... (Score:4, Informative)
Ah, what a nice world you live in.
I do that at home. At work, I would be in a world of hurt if I did that. I have thousands of machines running a mix of in-house and external software which customers rely on for mission-critical stuff. I can't install every little patch just because it might make my frobnitzer go faster, and even when I WANT a fix, it's got to be tested in various production configurations first to see if it breaks something (you'd be surprised how often a security fix breaks something).
So I read security updates from the vendor, and install what needs to be installed as soon as I can. If those security updates are coming to me days, weeks or even months after the script kiddies started playing with the exploit code... ugh.
Re:You should listen to him... (Score:5, Insightful)
Re:You should listen to him... (Score:3, Insightful)
What you're saying makes it sound like the bug doesn't exist until somebody talks about it.
Bugs, and problems in general, cannot be fixed until someone starts talking about it. To try to limit the knowledge of problem also limits the ability to find a solution.
Re:You're missing the point (Score:2)
Re:You should listen to him... (Score:5, Informative)
Keeping it a secret might put you at a greater risk - you don't know you might be in trouble but the bad people know about the problem.
So reducing the number of people who know about the problem could make it worse rather than better.
Re:You should listen to him... (Score:2)
If the researcher has evidence, or strongly suspects, that the exploit is in
Re:You should listen to him... (Score:2)
Re:You should listen to him... (Score:5, Informative)
Just to note, im reading LKML for over a year now and i read most of the mail about this thread aswell.
I found Linus' arguments rather inconsistent (Score:3, Interesting)
He says he never wants to wait applying a fix, because he wants to give users the best kernel possible. Then he says that it probably doesn't matter that the kernel.org kernel gets fixes last, because most users run vendor kernel anyway.
But I think what annoys me most is that he is constantly claiming he is not forcing his (in his own admittance extreme) views on anybody. Bu
Re:I found Linus' arguments rather inconsistent (Score:3, Informative)
I just want to point out aswell that the reason why Linus doesn't want to do with anything with vendor-sec is politics.
I have to point out on a sidenote though, but it seems to fit here that Andres Salomon
Re:You should listen to him... (Score:2)
I would have thought the embargo should be n-1 days, where n is the number of days it would take a company to serve the individual courteous enough to notify the vendor before the public with a gagging order on some frivoulous pretext (DMCA etc)
Phillip.
Re:Really? (Score:2)
Re:You should listen to him... (Score:2)
Those systems are *already* vulnerable, it's just that not everyone knows it yet.
And I especially don't believe that a vulnerability is still a secret after it's been disclosed to a mailing list (even a "closed" one). That just means all a black hat has to d
Re:You should listen to him... (Score:3, Insightful)
Again keeping in mind that I am not disagreeing with you, it is still necessary to consider that (1) the patch is probably more than "5 lines", because otherwise it would have been found earler (2) security patches almost always IME have substantial side-effects and must be tested carefully (3) it takes longer than 5 days to QC, prepare, and release a patch for an enterprise-cla
Re:You should listen to him... (Score:3, Insightful)
A developer creates a fix and submits it to the maintainer. Note that the more people who know, the sooner on average somebody who can fix the bug will fix it and submit it.
A maintainer checks the patch, and tries it out. If it seems to fix the problem, it's checked into the main code base, or possibly just to the development branch depending on severity and complexity. There's g
Re:You should listen to him... (Score:2)
Not true. To quote Linus, "In the case of "uselib()", it was literally four lines of obvious code - all the rest was just to make sure that there weren't any other cases like that lurking around." From other patches I've seen, this is typical. Often it's just a small oversight
Re:You should listen to him... (Score:2)
The CIA, Clinton, and Bush administrations were aware of Osama Bin Laden and the risk to the country that he represented. They did not disclose this information, nor prepare for the inevitable. It didn't stop Osama from doing what he was going to do.
Had we acted pre-emptively, we would have avoided the years of war that ensued.
Re:You should listen to him... (Score:3, Insightful)
Secondly the number of "hackers" (I know wrong term but security people refuse to use the proper term) is actually quite low, (yes this is true, go to HOPE, CCC camps and other events, 9 out of 10 people you meet are wannabe's, the number can omly increase cince the last ones I attended a few years ago) most of them out there are wannabe's and script-kiddies simply standing on the
Re:You should listen to him... (Score:2)
Most security exploits are just another buffer overrun, or just another race. That stuff can be fixed in a matter of 5-60 minutes by a competent developer. Lots of things can happen in 90 days, and the black hats definitely won't give you that long.
I'd give 3 or 5 days maximum. There's no reason why a patch can't be made in that time.
Re:You should listen to him... (Score:3, Informative)
If there is one person out there who knows about a vulnerability and/or exploit, there is more than one, and that means your systems are at risk instantly, embargo or not.
I'd rather know right away my systems are at risk...worst case, I walk over and yank the ethernet cable until the issue can be resolved. Waiting even 5 days means I'm vulnerable for those 5 days, which is unacceptable. I want the vulnerability fixed immediately. My company's
Re:You should listen to him... (Score:2)
sPh
Re:You should listen to him... (Score:2)
In your example it would be up to Oracle to certify and support the kernel released by Red Hat, not up to Red Hat to make sure their patch plays nice in every possible way with every possible application.
Re:You should listen to him... (Score:2)
I doubt it. You're a liar, an idiot, or a cracker. Sometimes you can't take systems down even if you know there is a root level exploit. Tell Citibank and NASDAQ to take
What !? (Score:5, Funny)
Thou shalt not speak ill of the linux kernel!
Oh wait, it's Linus.
One person can't fix it alone. (Score:5, Insightful)
I think he really hit the nail on the head with that comment. I can't tell you the number of times CRs or issues have been sent to me through e-mail which have either been lost or forgotten about on my part (sorry). However, using tracking programs which the entire group has access to (we use Mantis [mantisbt.org]) not only are the problems kept on fresh but people will remind me of them or if they are feeling particularly bold, fix them themselves.
Summation of the article (Score:5, Insightful)
Bingo.
Re:Summation of the article (Score:5, Funny)
Re:Summation of the article (Score:2)
If, however, I just connect it directly to the network (behind a firewall, large corporate), the VM is as good as dead.
So the OEM installs with XPSP2 and the slipstreamed install media which is apparently being dist
Re:Summation of the article (Score:5, Insightful)
You should never depend on a single point of failure. If kernel security is your single point of failure, then you're at risk.
However, you also shouldn't depend solely on "other shields in place" for security. Those shields might fail too.
A simple example is apache. It almost never is run as root, as a security measure. However, when an attacker succeeds in gaining webuser privileges, you'll have to depend on kernel security.
In short: try to make software as bugfree as possible and use multiple barriers that will have to fail before an attacker can 0wn your machine.
Re:Summation of the article (Score:3, Insightful)
Only pirates depend on points of failure
I think you meant You should never depend on a single layer of protection. Multiple (and redundant, if possible) protections are less likely to fail at the same time.
OTOH, multiple points of failure are no better than a single point of failure...
Re:Summation of the article (Score:2)
That's why I always wear condoms and my gf is on the pill.
Oh, sorry, didn't realize we were still dealing with kernel security...
Re:I LOVE slashdot. (Score:2, Insightful)
Gates doesn't (didn't) code anything himself. The two do not compare.
Re:I LOVE slashdot. (Score:2)
Re:I LOVE slashdot. (Score:2)
No, the idea is that they did try. They try and try until market dominance is theirs. Then they stop. When was the last time you've seen something truly innovative / awesome in a Microsoft product that completely dominates it's market?
BUZZT! Wrong (Score:2)
Re:I LOVE slashdot. (Score:2)
Re:I LOVE slashdot. (Score:2)
Re:I LOVE slashdot. (Score:2, Funny)
If Gates says this, people think: "Ah, a Linux based firewall/router, to protect my MSWindows systems!"
Realistically, that's not a bad idea.
If Torvalds says this, people think: "what should I now protect my system with? A Linux firewall doesn't make sense..."
So there again MSWindows scores! With MSWindows, you can add Linux as an extra layer of protection, with Linux, it doesn't make sense!
1-0 for Win vs Lin!
But... (Score:5, Insightful)
I don't disagree with what Linus is saying, but what difference does it make if 10 people are informed rather than 10 million when it still doesn't change the fact that only a select few can change the official kernel source? People in production environments aren't going to apply a patch created by Joe in his basement, they're going to want an official kernel patch.
If the ones responsible for the affected part of the kernel are slow to handle a security issue, full disclosure IMHO is a bad thing.
One could argue that full disclosure would motivate those responsible to fix the problem faster, but this is not always the case.
If Linus is the only person that can change a specific part of the kernel, what good does notifying the world instead of just him do?
Re:But... (Score:2, Interesting)
Linus isn't the only one that can change any part of the kernel. You may be correct by saying that an enterprise level operation isn't going to accept a patch from you or me.
I'd expect that most enterprise level IT operations have developers on staff (or available through some sort of outsourcing or support contract) that may add a temporary fix until an official patch is available.
At the bare minimum, even if they don't want to craft a patch themselves, they can evaluate for themselves the sec
Re:But... (Score:3, Interesting)
Few people are using the "official" kernel these days anyway.
Re:But... (Score:2)
Re:But... (Score:2)
It's a cool system, and 2.6 shows it works. I'd lookup the
Re:But... (Score:2)
And it runs rtcw masterfully.
Re:But... (Score:5, Insightful)
Because some of us can change our own kernels while we wait for the official patch.
But Nothing!! (Score:2)
On the other hand, if the maintainer responsible for an errant kernel module is "slow" then guess what happens? Someone else fixes it. Most importantly, you can fix it if you chose to do so. If you know there is a problem, you have the source, and ultimately you can fix it. You don't have to
Re:But... (Score:2)
For example, if I knew of a brand new critical security flaw in Apache, I personally do not have the expertise to fix it. But I do have the expertise to close port 80 on my rou
Re:But... (Score:2)
Closed Security (Score:5, Funny)
Especially in the position that Microsoft is in, with the lion's share of the market, and a supposed interest in keeping my data secure, I would assume that the first move would be to notify their customers of any security hole that might be potentially harmful to me. Given the number of them, I guess it would keep my mailbox full, but I wouldn't mind.
Oh, I don't use Windows. Nevermind. Yay for Linux (and Linus)!
There's a reason why Linus is Alpha-Geek.... (Score:4, Insightful)
"Otherwise it just becomes politics..." -- Linus Torvalds
Best line from the article (Score:3, Informative)
Why would you have all your ports exposed with nothing running on them? I have a hardware firewall. I only run HTTP ad FTP when I need them and then turn them off when I am through. It is really just simple security. Be smart. Oh yeah I subscribe to security lists and patch when security patches are released.
Re:Best line from the article (Score:3, Informative)
Kernel local root escalations don't affect MOST systems, but those few systems where a large number of arbritrary users can log into them to work on projects and such are highly vulnerable to them. Especially in an academic environment where a student might be tempted to try to crack root to peek at someone else's work.
-Z
Re:Best line from the article (Score:2)
Re:Best line from the article (Score:2)
hardly.... at the school i went to, and i suspect many others, the systems administrators (on the systems students had access to) were just work study students, many of whom barely knew what they were doing.
also, not having a compiler installed isn't always an option- a lot of the higher level cs classes that i took required us to turn in irix or solaris binaries along with t
Re:Best line from the article (Score:2)
Always happens, all around the world. That's the time of the year when the sysadmins storm out of their office in rage, walk into the students lab, and yell "Who the fuck is [username]?". After a cowering [username] identifies himself, the sysadmin yells in his face "Next time run your homework in the workstation where you are sitting, not the central server you @%#$^@&#!@#$!^#^$&##%#%!@$!!!" and
Re:Best line from the article (Score:2)
there's more to life than websites
Re:Best line from the article (Score:2)
A port "exposed" with nothing listening on it (ie, SYN packets to this port get an RST answer) is not any more exposed than if it was denied (SYN gets no answer). The only attack possible on a closed port is one based on an IP stack security bug, in which case ports with something listening are just as vulnerable.
On Linus (Score:2, Insightful)
Everything he says is practical. He's all about technology, not new-age computer "philosophy" or rhetoric. He doesn't go around promoting linux because he thinks "M$ is Gayer Thean AIdz!@!!", he does so only when he truly believes it's a good solution.
Here he is showing it again. He believes in full disclosure of bugs, not for any philosophical bullshit or imaginary right-to-know, but because it gets bugs fi
Re:On Linus (Score:3, Informative)
No he doesn't.
From the article:
"I'd be very happy with a 'private' list in the sense that people wouldn't feel pressured to fix it that day," Torvalds wrote. "And I think it makes sense to have some policy where we don't necessarily make them public immediately in order to give people the time to discuss them.
Re:On Linus (Score:2)
"I'd be very happy with a 'private' list in the sense that people wouldn't feel pressured to fix it that day," Torvalds wrote.
I read that as he'd accept a private list solely for internal discussion in the very short-term; I'm not convinced it suggests Linus opposes full disclosure at the earliest convenient opportunity. For example, he continues this quote with:
Re:On Linus (Score:2)
So for vendor-sec it bad if they keep things secret for a timeperiod defined by them but its ok to keep it secret for a short-term as defined by Linus? This makes things different because we trust one person?
Re:On Linus (Score:2)
Reading his quote from LKML:
But it should be very clear that no entity (neither the reporter nor any particular vendor/developer) can require silence, or ask for anything more than "let's find the right solution". A purely _technical_ delay, in other words, with no politics or other issues involved.
Re:On Linus (Score:5, Insightful)
Now, if you're just thinking of the handfull of interview-bait folks like RMS, ESR, etc. then yes Linus does tend to stand out as a non-politico.
Re:On Linus (Score:2)
But... (Score:2)
I think most of what you say is very valid but right here you lost me a bit.
The OSS movement is not alone in having some more extreme members. I'll take RMS any day over Ballmer jumping around like a monkey screaming, "Developers! Developers! Developers!"
Politics (Score:5, Insightful)
Linus is just trying to keep the politics out of it, is all. He's not saying that every bug should be made public knowledge immediately, only that things shouldn't be kept secret for reasons other than the security of the users' systems.
Mailing list thread (Score:5, Informative)
He's right, and here's why (Score:3, Interesting)
The other reason why this is the right way to go is because we should be moving towards a model of damage containment with all forms of electronic security. Faults should be isolated. A security problem in one part of the code should not result in a total compromise of the system, even if that fault is in the kernel. That's where Linux should be heading. Part of that would be moving more stuff out of the kernel and also having less stuff running as root. The end goal would be to get rid of root entirely.
Re:He's right, and here's why (Score:2)
so we should remove remote access to ssh from our users every time a bug is found ?
get real
As for root, you are totally correct, plan9 did that over 15 years ago. You can't escalate privileges because there's nothing to escalate to!
Re:He's right, and here's why (Score:2)
No, the information that a bug has been found should be made available to you so you can take whatever action you deem appropriate.
Another good writeup on KernelTrap (Score:2, Informative)
IMHO we need some regulations (Score:2)
We need a simple bill (preferably a UN decision that countries agree to abide by and enforce among their citizens).
1. All vendors must provide an email contact for security issues.
2. There will be 1 official list for security disclosures. Mantained internationally.
3. The vendor gets 48hr advanced notification. To allow them to patch/research if it's high profile.
4. If vendor feels the security issue is extremely crit
Re:IMHO we need some regulations (Score:2)
Wow, if you're a troll, you're good. My hat's off.
If you're serious, you're a moron. Getting governments and lawyers involved is a recipe for disaster. It's bad enough that they already legislate their incompetence and corrruption into every other aspect of our lives, but it's a necessary evil. The
Re:What a wonderful idea - government regulation.. (Score:2)
No! (Score:4, Interesting)
Result: Mallory uses exploit. Alice releases a bugfix, Bob applies the fix. If it takes Alice andBob longer than Mallory, the server is compromised.
Scenario 2: Bug is detected. Kept quiet.
Result: Eventually Mallory detects the same bug. Exploits it. Server compromised.
Scenario 3: Bug is detected. Released only to trusted developers.
Result: Alice releases bugfix. Announces that it fixes a security hole. Gives general details of what the bug is. Mallory has to work out the details and exploit it. This gives bob a lot more time to apply the patch than scenario 1.
So what's so great about full immediate disclosure?
Re:No! (Score:2)
sweet time putting together a patch because nobody supposedly knows about it.
I also want immediate disclosure so I can defend myself. I don't need to wait for a patch I can patch my own software if I know about it.
Take for instance a while back there was a linux worm
Re:No! (Score:2)
Scenario 1: Damn! We've got to fix that one before out customers start getting hacked!
Scenario 3: No big deal, the policy is to keep the exploit secret for 30 days. We can add that to the queue of things to do.
The problem is that the blackhats aren't going to wait. Given enough time, which can easily be measured in days or even hours, Scenario 3 can become Scenario 2. And then you're in big trouble.
As an admin, some organizati
Re:No! (Score:2)
Trusted in this case usually means people who pony up money to be in the know, it doesn't mean people who actually know how to fix the bug.
Re:No! (Score:2)
Often security patches aren't contributed by people who've contributed many other patches but by semi-random individuals.
Read up on the bazaar.
Re:No! (Score:2)
Scenario 4:
Bug is detected by *untrusted* source and exploited quietly for months.
Result: when bug is detected by whitehat person and kept quiet, little do they realize that the bug is being exploited as they wait with their thumbs up their
Blackhats on the inside (Score:2)
PaXTeam's Defense (Score:2)
(Posted Jan 10, 2005 11:26 UTC (Mon) by guest PaXTeam) (Post reply)
lots of speculation so let's see the actual timeline a bit. spender emailed Linus sometime early december about the few issues he had found. he also mentioned some of the fixes that were in PaX, the result of one of them was this commit: http://linux.bkbits.net:8080/linux-2.6/cset@41bc9 0 0azV2y9... . understand please that we (well, spender at least) already had had a working two-way email connection with Linus. duri
As fast as ... (Score:2)
My problem with this is that some people will interpret it as how quickly you can patch over the symptom, rather than how quickly you can correct the underlying problem. This will lead to "workarounds" being called "patches".
Personal experience shows that most bugs involve issues that might take a few days to resolve conflicts. "If I insert this fix here, does anything el
He's wrong, PLEASE READ (Score:3, Interesting)
The way to do this is to have a multiple vendor coordinated release, where all agree on a date to release all together the alert and fix. This usually takes a few days, as most of them need to go through QA and other processes, as they are responsible to their customers.
SecurityFocus [securityfocus.com] offers such a service for FREE to any researcher/vendor.
Blowing the whistle too early:
Even with that, there is always some a**hole or some idiot vendor breaking this blanket period. See how RH fsckd up this [securityfocus.com], many times, and got themselves up to the point of being told late. Some other linux groups also did this, by "mentioning" the bug to uncontrolled developers who went fixing on their own, thus blowing the whistle.
IF LINUS & CO LEAVE THIS COORDINATED SCHEMA, THEY'LL LOCK THEMSELVES OUT NOTIFICATIONS FROM RESPECTED RESEARCHERS.
NOTE1: i have nothing against the 0day or the cracking comunities, im only stating IF a researcher wants to give a blanket to vendors. (a very common case)
NOTE2: im not affiliated with SF, and even HATE the split bugtraq times for special vendors (i think this really killed it, a VV BAD move)
NOTE3: you might not agree with this schema, but consider most top name security firms follow it and it is to protect the users.
NOTE4: there is a defined period, so vendors are urged to come up with patch/alert
NOTE5: think also for the poor devs working for those vendors, making them work overnight hurried is not polite, they are devs like all of us
(im sure i miss some note and i'll get flamed anyway... flame on grrrrr)
I disagree (Score:2)
I do believe in partial disclosure for a limited time, and then full disclosure. This time limit should be variable and discussed by the private community that has access to the report. The private community should respect this disclosure time limit.
The article does suggest something like this.
percentages (Score:2)
If 0% of the security comes from the ability of others to keep secrets (obscurity), then 100% of the security comes from my configuration, my password, my private key, etc.
Me controlling 100% of my security is a Good Thing.
Linus is Right (by slippery slope) (Score:3, Interesting)
Re:Lost? (Score:2)
Linus has stated on many occasions that he discards the first 2 or 3 e-mails he receives on a given topic from anyone except the trusted few.
sPh
Re:Lost? (Score:2, Informative)
I think the sentence is saying that things getting lost is not a desirable reason for a delay, which makes sense to me.
Maybe if it said: "the risk of the thing getting lost and thus delayed for the wrong reasons", its intent would be clearer.
Re:So basically... (Score:2)
1. Take the bs out about who knows about security vulnerabilities
2. If you make a patch, send it to kernel.org so they can release it. This is as opposed to just patching the kernel for the distro you're working on.
Re:So basically... (Score:2, Informative)
Re:Notify on Vulnerability, dont release the (Score:2)
Re:Notify on Vulnerability, dont release the (Score:2, Interesting)