Gentoo Archives: gentoo-security

From: Robert Joslyn <rjmars97@×××××.com>
To: gentoo-security@l.g.o
Subject: Re: [gentoo-security] Kernel Security + KISS
Date: Thu, 21 Feb 2008 13:11:16
Message-Id: 2d11f51c0802210509w770934c1wf52e3d6ce5d1d3a7@mail.gmail.com
In Reply to: Re: [gentoo-security] Kernel Security + KISS by George Prowse
1 I would like to help as well. I have limited C experience unfortunately,
2 and most of that is programming PIC microcontrollers. Been using Gentoo for
3 years, and would love to give something back.
4
5
6 Robert
7
8
9 On Thu, Feb 21, 2008 at 4:34 AM, George Prowse <cokehabit@×××××.com> wrote:
10
11 > Im interested, no C knowledge but plenty of time, passed the dev exam
12 > and a willingness to learn. It's been on my agenda for a long time.
13 >
14 > nick loeve wrote:
15 > > I can help also... i have limited free time but am willing to put in
16 > > some hours...
17 > >
18 > > I have medium C knowledge, reasonable kernel experience, and also a
19 > > strong linux background
20 > >
21 > > On Thu, Feb 21, 2008 at 8:02 AM, Arthur Bispo de Castro
22 > > <arthur@××××××××××××××.br> wrote:
23 > >> I'm interested... little C knowledge, very curious about kernel, strong
24 > >> linux background...
25 > >>
26 > >> is there another prereq to join this?
27 > >>
28 > >>
29 > >>
30 > >> On Thu, Feb 21, 2008 at 04:20:02AM -0200, Juan Pablo Olivera wrote:
31 > >> > I am interested too :)
32 > >> >
33 > >> > No C knowledge but strong linux background and very organized guy.
34 > >> >
35 > >> > On Thu, 2008-02-21 at 01:05 -0500, Casey Link wrote:
36 > >> > > It would probably help if we knew how many people were interested.
37 > >> > >
38 > >> > > I am. +1
39 > >> > >
40 > >> > > Casey
41 > >> > >
42 > >> > > On Wed, Feb 20, 2008 at 10:16 PM, Eduardo Tongson <
43 > propolice@×××××.com> wrote:
44 > >> > > > Alright how do we proceed to get this team started.
45 > >> > > >
46 > >> > > > ed*eonsec
47 > >> > > >
48 > >> > > >
49 > >> > > >
50 > >> > > > On Thu, Feb 21, 2008 at 6:55 AM, Ned Ludd <solar@g.o>
51 > wrote:
52 > >> > > > >
53 > >> > > > >
54 > >> > > > > On Wed, 2008-02-20 at 13:59 -0500, Harlan Lieberman-Berg
55 > wrote:
56 > >> > > > > > On Sunday 17 February 2008 23:12:35 Robert Buchholz wrote:
57 > >> > > > > > > On Sunday, 17. February 2008, Eduardo Tongson wrote:
58 > >> > > > > > > > What specific kernel knowledge is needed to get a
59 > Kernel advisory up
60 > >> > > > > > > > and running ?
61 > >> > > > > > >
62 > >> > > > > > > Between becoming aware of a vulnerability in Linux and
63 > drafting an advisory
64 > >> > > > > > > for one or all kernel sources comes the part where you
65 > review which
66 > >> > > > > > > versions of which kernel sources are affected and
67 > unaffected. You also
68 > >> > > > > > > need to pay attention to specifics of the added
69 > patchsets, which might
70 > >> > > > > > > duplicate vulnerabilities.
71 > >> > > > > > >
72 > >> > > > > > > Parts of the job can indeed be done without Kernel and C
73 > knowledge, but
74 > >> > > > > > > some cannot. So if we draft a new kernel security
75 > *team*, people without C
76 > >> > > > > > > and kernel knowledge are helpful -- some others need to
77 > have it, though.
78 > >> > > > > > >
79 > >> > > > > > > Robert
80 > >> > > > > >
81 > >> > > > > > To be honest, 99% of what is done in the kernel security
82 > team can be done with
83 > >> > > > > > no C knowledge at all.
84 > >> > > > > >
85 > >> > > > > > I'm not an expert C person - far from it - but I
86 > eventually became the head of
87 > >> > > > > > Kernel Security until I retired a few months ago.
88 > >> > > > > >
89 > >> > > > > > Most of it is bug handling. The major problem is a
90 > social, not a technical
91 > >> > > > > > one. Because of the manner in which our kernels are
92 > organized, a single
93 > >> > > > > > vulnerability involves checking upstream version numbers,
94 > coordinating them
95 > >> > > > > > into our downstream version numbers for all sources,
96 > checking to see if the
97 > >> > > > > > sources are effected, figuring out who to CC for the bugs,
98 > then harassing
99 > >> > > > > > them until they do it.
100 > >> > > > > >
101 > >> > > > > > Unlike other security sources, any attempt to hardmask the
102 > package is shutdown
103 > >> > > > > > instantly. The chaos that would result from a kernel
104 > hardmask, even one of
105 > >> > > > > > the lesser used ones, caused me to only successfully order
106 > one over my entire
107 > >> > > > > > career in Gentoo Kernsec... even though more around 30
108 > would have been
109 > >> > > > > > needed. It is not infrequently that bugs will last six
110 > months without any
111 > >> > > > > > action coming about them, and users are blissfully
112 > unaware.
113 > >> > > > > >
114 > >> > > > > > I am happy to give my input as the former head of Kernel
115 > Security, but it is
116 > >> > > > > > my personal opinion that any advances in kernel security
117 > will require the
118 > >> > > > > > full cooperation of security, and letting the head of
119 > kernel security be able
120 > >> > > > > > to actually enforce threats, as that seems to be the only
121 > way bugs ever get
122 > >> > > > > > resolved. Pleading didn't work - I tried.
123 > >> > > > > >
124 > >> > > > > > -Harlan Lieberman-Berg
125 > >> > > > > > Gentoo Developer Emeritus
126 > >> > > > >
127 > >> > > > >
128 > >> > > > > Every word of what you said is painfully true. The only way
129 > to
130 > >> > > > > accomplish this would be with an Iron Fist(fail) or a team
131 > of ~15 guys
132 > >> > > > > who do nothing but patch and push new kernels and the PR
133 > that goes along
134 > >> > > > > with them every few days.
135 > >> > > > > --
136 > >> > > > > Ned Ludd <solar@g.o>
137 > >> > > > >
138 > >> > > > >
139 > >> > > > >
140 > >> > > > > --
141 > >> > > > > gentoo-security@l.g.o mailing list
142 > >> > > > >
143 > >> > > > >
144 > >> > > > --
145 > >> > > > gentoo-security@l.g.o mailing list
146 > >> > > >
147 > >> > > >
148 > >> >
149 > >> > --
150 > >> > gentoo-security@l.g.o mailing list
151 > >>
152 > >> --
153 > >> Arthur Bispo de Castro
154 > >> Laboratório de Administração e Segurança (LAS/IC)
155 > >> Universidade Estadual de Campinas (UNICAMP)
156 > >> --
157 > >>
158 > >>
159 > >> gentoo-security@l.g.o mailing list
160 > >>
161 > >>
162 > >
163 > >
164 > >
165 >
166 > --
167 > gentoo-security@l.g.o mailing list
168 >
169 >

Replies

Subject Author
Re: [gentoo-security] Kernel Security + KISS Casey Link <unnamedrambler@×××××.com>