Monday, October 6. 2014How to stop Bleeding Hearts and Shocking ShellsComments
Display comments as
(Linear | Threaded)
The kernel certainly is a target, however it has a very active community and there are security minded people having a look. So I'm not that worried.
Given its complexity it's surprising that we haven't seen any damning thing there like a remotely exploitable issue in the network code. Small issues are found all the time, e. g. you'll find a bunch of driver-related security issues in the list of vulnerabilities squashed by Project Zero.
First up, bzip2.
Single maintainer. Massive use. No release since 2010? Has anyone actually looked at this code from an auditing/style point of view? Can't see any kind of official github or hosted source from the main page.
Nice entry. I was at first shocked to read that bash has only one major volunteer, but then I thought of our position here in Gentoo. As I write this there are so many things I need to fix or do. I'm cronically behind. And every time I hear of some major Gentoo project in need, I try to give it help, only to find I'm fighting an uphill battle.
I'd like to extend the "many eyes" metaphor: sure there are many eyes in open source, but the area they must survey is vast. Many things go unseen.
I imagine that now there have been a few security holes found now within Open Source software that hackers are going to target linux systems even more and try and expose more weaknesses, especially when projects are run by only a few volunteers. Perhaps we need an all encompassing security suite to try and stop intruders in the first place (ala f-secure) but some systems have this already (not sure how good though). Would this approach work? It may be incredibly difficult to look through 1000s of packages checking for a weakness, let alone a program with source code of 10,000 lines.
It feels like there are too many projects with not enough people. Perhaps we should have less projects with more persons per projects. I expect a few more problems within the next year or so. Linux is no longer safe as a lot love to think it is. John
Hmm. There are probably more Android systems out there than all other kinds of (MMU) Linux systems together.
Now, which shell does Android use, again? ;-) (Google did give us a security review. I also do this occasionally. Still, more contributions welcome.)
The whole area of other shells is certainly an interesting target. Debian was mostly safe from Shellshock because they use dash, many embedded devices use busybox.
Regarding mksh/android it'd be interesting to look what it actually does there and how much it is interacting with possibly dangerous input.
Yeah, I looked at it. All these shellshock bugs don’t affect it, but there was an mksh-specific issue I found myself during careful code review: “env 'x+=y' sh …” was interpreted as appending to $x, on import. Fixed, of course.
> I was brainstorming if we could have something like a "free software audit action day". A regular call where an important but neglected project is chosen and the security community is asked to have a look at it. This is just a vague idea for now, if you like it please leave a comment.
Security is a process. Audit day will not help you. Audit week will not help. You need to do this over and over again, frome time to time. And that's why you need to change 'just hack it' attitude, because if your program has a shitty design, shitty code and shitty coding style it will definitely have security issues. Second -- stop using dead and useless software like tcp-wrappers. Dead for years, sorry. Also you should consider switching to some distro where maintainers actualy do something, not whining around about respect and tolerance. How about that?
Great comment, I agree in full!
Luckily, mksh was mostly good design when I took it over, so I, having learned from the best (OpenBSD) – and still learning! – merely did what it took, constantly, to finish that and improve even more. |
About meYou can find my web page with links to my work as a journalist at https://hboeck.de/.
You may also find my newsletter about climate change and decarbonization technologies interesting. Hanno Böck mail: hanno@hboeck.de Hanno on Mastodon Impressum Show tagged entries |
On Tuesday details about the security vulnerability GHOST in Glibc were published by the company Qualys. When severe security vulnerabilities hit the news I always like to take this as a chance to learn what can be improved and how to avoid similar incide
Tracked: Jan 30, 00:52