How to stop Bleeding Hearts and Shocking Shells

Hanno's Blog

Monday, October 6. 2014

How to stop Bleeding Hearts and Shocking Shells


Trackbacks

What the GHOST tells us about free software vulnerability management
On Tuesday details about the security vulnerability GHOST in Glibc were published by the company Qualys. When severe security vulnerabilities hit the news I always like to take this as a chance to learn what can be improved and how to avoid similar incide
Weblog: Hanno's blog
Tracked: Jan 30, 00:52

Comments
Display comments as (Linear | Threaded)

What about the elephant in the room: the kernel.
#1 Constantine on 2014-10-07 05:49 (Reply)
The kernel certainly is a target, however it has a very active community and there are security minded people having a look. So I'm not that worried.

Given its complexity it's surprising that we haven't seen any damning thing there like a remotely exploitable issue in the network code. Small issues are found all the time, e. g. you'll find a bunch of driver-related security issues in the list of vulnerabilities squashed by Project Zero.
#1.1 Hanno (Homepage) on 2014-10-07 10:44 (Reply)
First up, bzip2.
Single maintainer. Massive use.
No release since 2010?
Has anyone actually looked at this code from an auditing/style point of view?
Can't see any kind of official github or hosted source from the main page.
#2 Jim T on 2014-10-07 11:38 (Reply)
Nice entry. I was at first shocked to read that bash has only one major volunteer, but then I thought of our position here in Gentoo. As I write this there are so many things I need to fix or do. I'm cronically behind. And every time I hear of some major Gentoo project in need, I try to give it help, only to find I'm fighting an uphill battle.

I'd like to extend the "many eyes" metaphor: sure there are many eyes in open source, but the area they must survey is vast. Many things go unseen.
#3 Anthony G. Basile on 2014-10-07 12:50 (Reply)
I imagine that now there have been a few security holes found now within Open Source software that hackers are going to target linux systems even more and try and expose more weaknesses, especially when projects are run by only a few volunteers. Perhaps we need an all encompassing security suite to try and stop intruders in the first place (ala f-secure) but some systems have this already (not sure how good though). Would this approach work? It may be incredibly difficult to look through 1000s of packages checking for a weakness, let alone a program with source code of 10,000 lines.

It feels like there are too many projects with not enough people. Perhaps we should have less projects with more persons per projects.

I expect a few more problems within the next year or so. Linux is no longer safe as a lot love to think it is.

John
#3.1 ArcticWolf on 2014-10-08 13:16 (Reply)
Hmm. There are probably more Android systems out there than all other kinds of (MMU) Linux systems together.

Now, which shell does Android use, again? ;-)

(Google did give us a security review. I also do this occasionally. Still, more contributions welcome.)
#4 mirabilos (Homepage) on 2014-10-08 12:27 (Reply)
The whole area of other shells is certainly an interesting target. Debian was mostly safe from Shellshock because they use dash, many embedded devices use busybox.
Regarding mksh/android it'd be interesting to look what it actually does there and how much it is interacting with possibly dangerous input.
#4.1 Hanno (Homepage) on 2014-10-08 14:15 (Reply)
Yeah, I looked at it. All these shellshock bugs don’t affect it, but there was an mksh-specific issue I found myself during careful code review: “env 'x+=y' sh …” was interpreted as appending to $x, on import. Fixed, of course.
#4.1.1 mirabilos (Homepage) on 2014-10-08 17:24 (Reply)
> I was brainstorming if we could have something like a "free software audit action day". A regular call where an important but neglected project is chosen and the security community is asked to have a look at it. This is just a vague idea for now, if you like it please leave a comment.

Security is a process. Audit day will not help you. Audit week will not help. You need to do this over and over again, frome time to time. And that's why you need to change 'just hack it' attitude, because if your program has a shitty design, shitty code and shitty coding style it will definitely have security issues. Second -- stop using dead and useless software like tcp-wrappers. Dead for years, sorry. Also you should consider switching to some distro where maintainers actualy do something, not whining around about respect and tolerance. How about that?
#5 Anonymous on 2014-10-09 21:49 (Reply)
Great comment, I agree in full!

Luckily, mksh was mostly good design when I took it over, so I, having
learned from the best (OpenBSD) – and still learning! – merely did
what it took, constantly, to finish that and improve even more.
#5.1 mirabilos (Homepage) on 2014-10-09 22:57 (Reply)

Add Comment

E-Mail addresses will not be displayed and will only be used for E-Mail notifications.

To prevent automated Bots from commentspamming, please enter the string you see in the image below in the appropriate input box. Your comment will only be submitted if the strings match. Please ensure that your browser supports and accepts cookies, or your comment cannot be verified correctly.
CAPTCHA

 
 

About

This blog is written by Hanno Böck. Unless noted otherwise, its content is licensed as CC0.

You can find my web page with links to my work as a journalist here.

I am also publishing a newsletter about climate change and decarbonization technologies.

The blog uses the free software Serendipity and is hosted at schokokeks.org.

Hanno on Mastodon | Contact / Imprint | Privacy / Datenschutz