1 |
Am 03.09.2015 23:08 schrieb Marc Schiffbauer: |
2 |
> * Matthew Thode schrieb am 03.09.15 um 21:46 Uhr: |
3 |
>> On 09/03/2015 02:28 PM, Marc Schiffbauer wrote: |
4 |
>> > * Anthony G. Basile schrieb am 02.09.15 um 18:13 Uhr: |
5 |
>> >> Hi everyone, |
6 |
>> >> |
7 |
>> >> So by now most people have heard the news that the Grsecurity/PaX team |
8 |
>> >> are no longer going to be making their stable patches available. The |
9 |
>> >> reason is that they are in dispute with a certain embedded systems |
10 |
>> >> vendor and those negotiations broke down. So they decided to make their |
11 |
>> >> stable patches only available to the sponsors. [1] |
12 |
>> >> |
13 |
>> >> What does this mean for Gentoo? Up until now I have been maintaining |
14 |
>> >> both the grsec upstream stable and testing patchsets in our |
15 |
>> >> hardened-sources. Currently the upstream stable kernels are 3.2.71 and |
16 |
>> >> 3.14.51 and the testing are 4.1.6. In about one week, the 3.2.71 and |
17 |
>> >> 3.14.51 patchsets will no longer be available and I'll continue pushing |
18 |
>> >> out the 4.1.6. Unfortunately the testing patchset is precisely as the |
19 |
>> >> name suggests --- for testing and not production. For the embedded |
20 |
>> >> systems company this will be the kiss of death because those patches are |
21 |
>> >> not suitable for long term. For Gentoo it will mean that I will have to |
22 |
>> >> be more vigilant about bugs and trying to stick with a well known kernel |
23 |
>> >> before moving on. You can still use these kernels in production, but |
24 |
>> >> you must be carefull about instabilities as upstream pushes out |
25 |
>> >> experimental feature that may oops or panic. Keep older kernel images |
26 |
>> >> around and revert if it doesn't work. Look to this list for |
27 |
>> >> announcements about more serious issues like things that can cause data |
28 |
>> >> loss. |
29 |
>> >> |
30 |
>> >> I'm hoping that once this company feels the sting of what has just |
31 |
>> >> happened, they'll come back to the table and talk with Grsec/PaX people. |
32 |
>> >> They won't be able to ship boards with grsec anymore because its not so |
33 |
>> >> easy to switch out a kernel on a board! If they ship a board with a |
34 |
>> >> bug, they loose. We just reboot :) |
35 |
>> >> |
36 |
>> >> [1] https://grsecurity.net/ |
37 |
>> > |
38 |
>> > Can't Gentoo be a sponsor? I think we could easly croudfund a |
39 |
>> > sponsorship. |
40 |
>> > |
41 |
>> > This would help Gentoo and Grsecurty/PaX but OTOH that vendor might just |
42 |
>> > use the gentoo kernel if they not already did so. |
43 |
>> > |
44 |
>> > Thoughts? |
45 |
>> > |
46 |
>> We can't do that because it would make the LTS patches public, which |
47 |
>> spender is trying to avoid. |
48 |
> |
49 |
> True and what I wanted to say with the OTOH part. But doesn't this |
50 |
> apply |
51 |
> to any sponsor? I mean we are talking about GPL'ed Software... does the |
52 |
> GPL permit to distribute source under some kind of NDA? |
53 |
> |
54 |
> I fully respect their decision but I hope things will be back to normal |
55 |
> again soon. |
56 |
> |
57 |
|
58 |
No you can't override the GPL with an NDA. But a sponsor - who is |
59 |
selling products based on grsecurity - is not required to make the code |
60 |
available to the general public, only to the customer who pays for the |
61 |
product. They're also not required to make their /patches/ available, |
62 |
only the complete source. So even if you get the sources from a customer |
63 |
(or you buy the product yourself), you would have to diff the code |
64 |
against a vanilla kernel - and then you only get a huge patch that |
65 |
includes *all* changes. Extracting just the grsecurity patch from that |
66 |
is complicated and error prone. You'll probably run into less bugs if |
67 |
you just stick to the public testing patches. |
68 |
|
69 |
Philipp |