Targeted Fuzzing Is Improving Linux Security, Linus Torvalds Says (iu.edu) 62
On the sidelines of announcing the fifth release candidate for the Linux kernel version 4.14, Linus Torvalds said fuzzing, which involves stress testing a system by generating random code to induce errors, is helping the community find and fix a range of security vulnerabilities. He wrote: The other thing perhaps worth mentioning is how much random fuzzing people are doing, and it's finding things. We've always done fuzzing (who remembers the old "crashme" program that just generated random code and jumped to it? We used to do that quite actively very early on), but people have been doing some nice targeted fuzzing of driver subsystems etc, and there's been various fixes (not just this last week either) coming out of those efforts. Very nice to see.
AI (Score:1)
Re: (Score:2)
Well, this AI is doing a very bad job of impersonating Linus Torvalds. "Very nice to see"? Not a single swear word? No biting sarcasm? There's no way that's the real Linus.
Re: (Score:2)
No. It would be completely worthless. Unless you are talking strong AI, but that does not exist.
Re: AI (Score:1)
Re: (Score:2)
Re: (Score:2)
Indeed. Everyone knows the Mac's OS switched from a proprietary one to FreeBSD back in 2007 when they also switched from the Motorola 6800 to Intel. Or, at least, that's what NetworkWorld reported last week [networkworld.com] and has yet to redact or correct...
You don't suppose the Anonymous Coward that started this thread is the author of that article, do you?
Re: (Score:2)
XNU/Darwin is based on FreeBSD and Mach. [wikipedia.org]
Re: (Score:2)
What in the world are you smoking? Darwin is based on the FreeBSD kernel, a completely different animal.
Re: (Score:3)
Re: (Score:2)
Thanks for the explanation... (Score:1)
..I thought "Targeted Fuzzing" was about growing pubic hair in designated patches.
Fuzzing Furry parties (Score:3)
drop some shrooms and mdma and PLUR your way to random code those security holes out while listening to 4 on the floor Techno.
Re: (Score:2)
drop some shrooms and mdma and PLUR your way to random code those security holes out while listening to 4 on the floor Techno.
Daaaaaaz how its done, son!
Re: (Score:2)
Structured fuzzing is also very effective at finding compiler bugs.
Functional fuzzing is very effective at finding bugs in logical inference.
Crashme (Score:5, Funny)
Re:Crashme (Score:5, Funny)
Re: (Score:2)
Re: (Score:2)
It's funny how absolute fucking dimwits like yourself will cry about so-called "virtue signalling" while parading around making posts like this while jerking each other off with mod points. What else could you even call this but "virtue signalling"?
Good lord. The spectre of Down Syndrome haunts the tech world.
You don't have to be a world-leading expert on sociolinguistic micro aggressions to see that you were triggered by what I posted. I apologize for inflicting this trauma on you. I also apologize for my insensitivity of your SJW culture. I did not intend to make fun of your mating rituals, however strange they might appear to the outsider.
Re: Linus Torvalds is SOB... (Score:2, Informative)
Never mind, I found Creimer, still posting affiliate links. Mod down please.
Question on fuzzing (Score:2)
Re: Question on fuzzing (Score:1)
Definitely Not. Fuzzing can expose incomplete Error Handling or a Lack of validation. All of which are potentially exploitable for Cyber attack.
Re: (Score:2)
I get the idea behind it, but shouldn't it be targeting application layer instead of lower layers?
Re: (Score:2)
If on the other hand you are testing the ethernet driver, you could try to send random bits instead of ethernet frames to the interface.
Re: (Score:2)
Improving? (Score:1)
Only 381 Linux Kernel CVE's so far this year. To date, that is 164 more than last year, and by far the greatest number found. 166 code executions found this year, which is more than 8 times all other years COMBINED.
Granted, most of that is on the Android side of things. But at this point, there is more than 1 vulnerability in the linux Kernel found every day, and a code execution found every other day.
Source:
http://www.cvedetails.com/product/47/Linux-Linux-Kernel.html?vendor_id=33
Re:Improving? (Score:4, Interesting)
Re: (Score:2)
Counting-metrics are unsuitable to accurately describe a state-of-affairs. Too simplistic.
Re: (Score:2)
fuzzing works. (Score:5, Interesting)
As maintainer of a small open source library and program I have benefitted immensely from the efforts of a small number of volunteers running fuzzing programs and using Address Sanitizer to locate bugs in the code I maintain. These volunteers have found bugs and reported them and provided testcases useful for regression testing. I am profoundly grateful to these folks.
Re: (Score:2)
Any chance you have some pointers on how to do fuzzing correctly? Could be fun to use some of that in testing students code to point out mistakes early on.
Re: fuzzing works. (Score:1)
Just use Common Sense. Flip Bits in integer fields, Insert random crap into String fields, Feed too Long Strings, Feed excessively large Data sets, etc etc.
Run your Code in valgrind while doing so.
Re:fuzzing works. (Score:5, Informative)
The difficult part is that you want the random data to get past the initial sanity checks. To do that, you need to have relatively deep knowledge of the thing you are fuzzing. That is why automated fuzzing tools tend to be a bit frustrating.
Re: (Score:3)
Use afl [coredump.cx].
Re: (Score:1)
Re: (Score:3)
Re: (Score:2)
Re: (Score:2)
Reminds me of bugs found by accident (Score:1)
Back in the 70s when there were various mini computer manufacturers each with their own architecture. I worked for one of those, and we tested our code. I don't think anybody did deliberate 'fuzzing' (though I do believe a concept kinda like that was talked about.) But some pretty hairy bugs were found by accident. People making typos when trying to enter legitimate commands, that kind of thing.
Re: (Score:1)
Well, some bugs are found not by typos but by doing exactly what the manual says. Something that should've been tested and wasn't.
How they're found may also depend on how you define 'bug'. To me, most bugs are found by testing, but if you consider testing to be part of the design process, and a bug is found only after the design process is completed, then, by definition, bugs are not found by deliberate testing.
Finally (Score:1)