Gentoo Archives: gentoo-hardened

From: philipp.ammann@××××××.de
To: gentoo-hardened@l.g.o
Subject: Re: [gentoo-hardened] The state of grsecurity in gentoo
Date: Fri, 04 Sep 2015 11:33:42
Message-Id: d29b64b9d11193e4a5d0caaf70ab3a0c@posteo.de
In Reply to: Re: [gentoo-hardened] The state of grsecurity in gentoo by Marc Schiffbauer
1 Am 03.09.2015 23:08 schrieb Marc Schiffbauer:
2 > * Matthew Thode schrieb am 03.09.15 um 21:46 Uhr:
3 >> On 09/03/2015 02:28 PM, Marc Schiffbauer wrote:
4 >> > * Anthony G. Basile schrieb am 02.09.15 um 18:13 Uhr:
5 >> >> Hi everyone,
6 >> >>
7 >> >> So by now most people have heard the news that the Grsecurity/PaX team
8 >> >> are no longer going to be making their stable patches available. The
9 >> >> reason is that they are in dispute with a certain embedded systems
10 >> >> vendor and those negotiations broke down. So they decided to make their
11 >> >> stable patches only available to the sponsors. [1]
12 >> >>
13 >> >> What does this mean for Gentoo? Up until now I have been maintaining
14 >> >> both the grsec upstream stable and testing patchsets in our
15 >> >> hardened-sources. Currently the upstream stable kernels are 3.2.71 and
16 >> >> 3.14.51 and the testing are 4.1.6. In about one week, the 3.2.71 and
17 >> >> 3.14.51 patchsets will no longer be available and I'll continue pushing
18 >> >> out the 4.1.6. Unfortunately the testing patchset is precisely as the
19 >> >> name suggests --- for testing and not production. For the embedded
20 >> >> systems company this will be the kiss of death because those patches are
21 >> >> not suitable for long term. For Gentoo it will mean that I will have to
22 >> >> be more vigilant about bugs and trying to stick with a well known kernel
23 >> >> before moving on. You can still use these kernels in production, but
24 >> >> you must be carefull about instabilities as upstream pushes out
25 >> >> experimental feature that may oops or panic. Keep older kernel images
26 >> >> around and revert if it doesn't work. Look to this list for
27 >> >> announcements about more serious issues like things that can cause data
28 >> >> loss.
29 >> >>
30 >> >> I'm hoping that once this company feels the sting of what has just
31 >> >> happened, they'll come back to the table and talk with Grsec/PaX people.
32 >> >> They won't be able to ship boards with grsec anymore because its not so
33 >> >> easy to switch out a kernel on a board! If they ship a board with a
34 >> >> bug, they loose. We just reboot :)
35 >> >>
36 >> >> [1] https://grsecurity.net/
37 >> >
38 >> > Can't Gentoo be a sponsor? I think we could easly croudfund a
39 >> > sponsorship.
40 >> >
41 >> > This would help Gentoo and Grsecurty/PaX but OTOH that vendor might just
42 >> > use the gentoo kernel if they not already did so.
43 >> >
44 >> > Thoughts?
45 >> >
46 >> We can't do that because it would make the LTS patches public, which
47 >> spender is trying to avoid.
48 >
49 > True and what I wanted to say with the OTOH part. But doesn't this
50 > apply
51 > to any sponsor? I mean we are talking about GPL'ed Software... does the
52 > GPL permit to distribute source under some kind of NDA?
53 >
54 > I fully respect their decision but I hope things will be back to normal
55 > again soon.
56 >
57
58 No you can't override the GPL with an NDA. But a sponsor - who is
59 selling products based on grsecurity - is not required to make the code
60 available to the general public, only to the customer who pays for the
61 product. They're also not required to make their /patches/ available,
62 only the complete source. So even if you get the sources from a customer
63 (or you buy the product yourself), you would have to diff the code
64 against a vanilla kernel - and then you only get a huge patch that
65 includes *all* changes. Extracting just the grsecurity patch from that
66 is complicated and error prone. You'll probably run into less bugs if
67 you just stick to the public testing patches.
68
69 Philipp

Replies

Subject Author
Re: [gentoo-hardened] The state of grsecurity in gentoo Marc Schiffbauer <mschiff@g.o>