TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Grsecurity Developer Spender's Feelings on the State of Linux Security

197 pointsby jsnathanover 9 years ago

15 comments

akerroover 9 years ago
It always make me sad when I hear BSDs are underfunded, OpenBSD was about to &quot;turn off the lights&quot;, FreeBSD was in sersious problems before they got 1M$ donation from WhatsApp. Heartbleed bug in OpenSSL? They also didn&#x27;t have enough (full time) developers to even review the code. Now grsecurity makes me feel bad about it.<p>Everyone uses their software, firewalls, servers, email serves, openssl is everywhere, corporate&#x2F;bank cluster without BSD or Linux with grsecurity is unimaginable.<p>I recently started donating to opensource project I use everyday. I realised how little they ask for, F-Droid, I easily doubled their BTC found used to cover server maintenance, LibreOffice asks for 3EURO donation by default (also BTC)! OpenBSDFundation asks for 10$ per month.<p><a href="https:&#x2F;&#x2F;grsecurity.net&#x2F;contribute.php" rel="nofollow">https:&#x2F;&#x2F;grsecurity.net&#x2F;contribute.php</a><p>Edit: I also found a nice way how to donate to Tor, there is a site <a href="https:&#x2F;&#x2F;oniontip.com&#x2F;" rel="nofollow">https:&#x2F;&#x2F;oniontip.com&#x2F;</a> where you can donate others for running Tor nodes, one of two top 200nodes has WikiLeaks BTC address, another one goes to my wallet and I send it back to TorProject. I had enough free resources, I used them :)
评论 #10519190 未加载
评论 #10519303 未加载
评论 #10519299 未加载
vezzy-fnordover 9 years ago
Aye, too many people have this defeatist attitude that since perfect security will never be possible, therefore the only valid solution is reactive security (bug-patch cycles). Patch dependence is considered too entrenched for making some changes like replacing ambient authority with capabilities, using failure-oblivious computing [1] to redirect invalid reads and writes, using separation kernels, information flow control, proper MLS [2], program shepherding for origin and control flow monitoring [3] and general fault tolerance&#x2F;self-healing [4].<p>I used to look up to Linus Torvalds as many did, but am increasingly beginning to see him as a threat to the advancement of the industry with his faux pragmatism that has led him to speak out against everything from security to microkernels and kernel debuggers.<p>[1] <a href="https:&#x2F;&#x2F;www.doc.ic.ac.uk&#x2F;~cristic&#x2F;papers&#x2F;fo-osdi-04.pdf" rel="nofollow">https:&#x2F;&#x2F;www.doc.ic.ac.uk&#x2F;~cristic&#x2F;papers&#x2F;fo-osdi-04.pdf</a><p>[2] <a href="http:&#x2F;&#x2F;citeseerx.ist.psu.edu&#x2F;viewdoc&#x2F;download?doi=10.1.1.52.366&amp;rep=rep1&amp;type=pdf" rel="nofollow">http:&#x2F;&#x2F;citeseerx.ist.psu.edu&#x2F;viewdoc&#x2F;download?doi=10.1.1.52....</a><p>[3] <a href="https:&#x2F;&#x2F;www.usenix.org&#x2F;legacy&#x2F;events&#x2F;sec02&#x2F;full_papers&#x2F;kiriansky&#x2F;kiriansky.pdf" rel="nofollow">https:&#x2F;&#x2F;www.usenix.org&#x2F;legacy&#x2F;events&#x2F;sec02&#x2F;full_papers&#x2F;kiria...</a><p>[4] <a href="https:&#x2F;&#x2F;www.cs.columbia.edu&#x2F;~angelos&#x2F;Papers&#x2F;2007&#x2F;mmm-acns-self.pdf" rel="nofollow">https:&#x2F;&#x2F;www.cs.columbia.edu&#x2F;~angelos&#x2F;Papers&#x2F;2007&#x2F;mmm-acns-se...</a>
评论 #10519147 未加载
评论 #10519378 未加载
评论 #10519444 未加载
评论 #10520904 未加载
forgottenpassover 9 years ago
<i>There&#x27;s no real leadership in Linux as far as security goes from within the kernel community itself.</i><p>I&#x27;m beginning to get the impression this (in general, not just for Linux) is because the talented security folks rather just do the fun parts. It&#x27;d be really awesome if more security conscious people were like the OpenBSD developers and worked on products, not just security.<p>I got into software through security. Getting a dump of my high school&#x27;s faculty and staff password database was my first high and I chased it for years. My current job is in engineering where security is part of, but not all of, my focus. Since taking on this role, I&#x27;ve started feeling alienated participating in the &quot;security community.&quot;<p>Work isn&#x27;t always fun in the moment, work is sometimes just work. There seems to be a gap between how much work the &quot;security community&quot; wants to be able to push on the rest of the open source developer&#x27;s plate, and how much those developers are willing to take. Security already (rightly) gets a shortcut over a lot of things, but it takes man-hours to make security happen.<p>Why can&#x27;t it be the security guys? If spender doesn&#x27;t want to send his kernel patches through the same review and legal processes the rest of us do, that&#x27;s his problem. Why doesn&#x27;t he stand up and become that security leadership in the kernel? Of course the submission process could be better, and of course he&#x27;s not going to get everything he wants from the other maintainers right away... because it&#x27;s <i>work,</i> and <i>work</i> isn&#x27;t always fun.
评论 #10520178 未加载
评论 #10520057 未加载
Tepixover 9 years ago
Perhaps the way to push security into the industry is to use consumer&#x27;s rights to their full capacity. In the EU if you buy something, you get 6 months of warranty and 24 months of implied warranty.<p>If you buy an Android phone and stop getting updates after 18 months and there is a new security hole, you should return the phone to your dealer and demand your money back. After all, it&#x27;s relatively easy to prove that the defect (the security hole) was already present when you bought the phone. The dealer must fix the defect. If he can&#x27;t, he must take back the article. He will then complain to the manufacturer. The pressure from these complaints hopefully lead to a change of behaviour by the manufacturers (i.e. provide two years of security updates, for example, even if you buy a new phone that&#x27;s already been available for a year or two).
评论 #10519418 未加载
_yyover 9 years ago
This is the Washington Post interview he wrote this for: <a href="http:&#x2F;&#x2F;www.washingtonpost.com&#x2F;sf&#x2F;business&#x2F;2015&#x2F;11&#x2F;05&#x2F;net-of-insecurity-the-kernel-of-the-argument&#x2F;" rel="nofollow">http:&#x2F;&#x2F;www.washingtonpost.com&#x2F;sf&#x2F;business&#x2F;2015&#x2F;11&#x2F;05&#x2F;net-of-...</a><p>Source: <a href="https:&#x2F;&#x2F;twitter.com&#x2F;grsecurity&#x2F;status&#x2F;662393322699415554" rel="nofollow">https:&#x2F;&#x2F;twitter.com&#x2F;grsecurity&#x2F;status&#x2F;662393322699415554</a><p>&gt; Very fair article on the topic of Linux security: [...] … Was a pleasure talking with @craigtimberg
评论 #10518882 未加载
pjfover 9 years ago
&gt; The industry is entirely broken in terms of what it values.<p>Couldn&#x27;t agree more. I feel that we, as entire IT industry, have failed to provide robustness, security, and privacy after dozens of years of development of Internet technologies. Just take the recent vulnerabilities in Android and iPhones, used everyday by millions of people worldwide. How could that happen after so many billions of dollars invested in the development of the major technology used nowadays? We failed miserably and don&#x27;t even understand the root problems.<p>Of course, completely different thing is functionality: here we&#x27;ve seen tremendous improvements over the years - which is very positive - but that&#x27;s another story.
评论 #10519036 未加载
arca_voragoover 9 years ago
I&#x27;ve been follow grsec for a while now, and I really like the honesty around it. They admit what they are and aren&#x27;t good at, and as for the product itself (grsec), it has become my go to hardening system for the kernel over SELinux (I know you can combine the two, I don&#x27;t though). Combined with other measures I think I am doing a pretty good job in balancing out the usability security scale.<p>If you haven&#x27;t taken the time to learn grsec, you will thank yourself later if you do. Keep in mind though there was some recent drama with some people&#x2F;companies not properly attributing grsec, so you want to use current instead of stable imho. Alpine linux has grsec build in, gentoo has some good guides, and so does arch, but I tend to add it to debian.<p>As far as the state of linux&#x2F;kernel security, I blame one thing in particular, and that is complexity and amount of code. The many eyes theory has a fault, in that it assumes a lot of people will look at the code and with enough people the bugs (security bugs) will be found. Well the problem is that the linux kernel is now at 10 million+ loc. So even with a shitton of people digging through the code, lots of stuff is going to get missed, and the real problem is that there are a lot less people looking at the code than we all want to think.<p>I think the primary way we will be able to move to <i>security</i> in the future is in efforts to refactor and reduce complexity of code in general, along with working on making it easier to read (or better commented).<p>This is one reason why I find minix 3 to be a very interesting project, at &lt;10k loc.
评论 #10523021 未加载
评论 #10523013 未加载
fulafelover 9 years ago
Grsecurity languishes in (relative) obscurity because no distribution ships it. I know several people who know about it and would pick the option if it was distro-supported. If you don&#x27;t get automatic updates it&#x27;s a non-starter.<p>Popularity in distros would put a lot of pressure on the mainline kernel and might get things moving there.
评论 #10519445 未加载
评论 #10519728 未加载
评论 #10519504 未加载
jakeoghover 9 years ago
The Gentoo Hardened Project makes using grsec&#x2F;PaX relatively easy. <a href="https:&#x2F;&#x2F;wiki.gentoo.org&#x2F;wiki&#x2F;Project:Hardened" rel="nofollow">https:&#x2F;&#x2F;wiki.gentoo.org&#x2F;wiki&#x2F;Project:Hardened</a>
评论 #10519012 未加载
评论 #10518972 未加载
评论 #10518970 未加载
heinrich5991over 9 years ago
See also this story: <a href="https:&#x2F;&#x2F;grsecurity.net&#x2F;announce.php" rel="nofollow">https:&#x2F;&#x2F;grsecurity.net&#x2F;announce.php</a>.
grandinjover 9 years ago
There is no monolithic upstream organization. The real problem is that it&#x27;s really hard work to upstream code, particularly when it touches core parts of the kernel. Look how long it took to get other invasive stuff like tickless or preempt RT. But it got done, it just took time and patience.<p>And insulting the upstream people like this doesn&#x27;t make your job any easier.
评论 #10521110 未加载
NickHaflingerover 9 years ago
I would think that everyone here agrees that &#x27;computer&#x27; security is in a state of turmoil. Is it possible to design a computing system that fails-safe in the event of a bug in a component, instead of opening the entire system up to exploits. Fails Safe as in the process does nothing or restricts the targeted surface area of the malware.
评论 #10523004 未加载
评论 #10519455 未加载
zbyover 9 years ago
That looks like a political problem. Maybe the state should fund security for its citizens - maybe we need some new kind of institutions to do this.
评论 #10519179 未加载
antocvover 9 years ago
Well there is no Linux security.<p>L4 provides that.
评论 #10523030 未加载
digi_owlover 9 years ago
Mother of all pissing matches...