From: George Dunlap <george.dunlap@eu.citrix.com>
To: Jan Beulich <JBeulich@suse.com>
Cc: Lars Kurth <lars.kurth.xen@gmail.com>,
xen-devel <xen-devel@lists.xenproject.org>,
Ian Jackson <ijackson@chiark.greenend.org.uk>
Subject: Re: Security policy ambiguities - XSA-108 process post-mortem
Date: Mon, 13 Oct 2014 13:17:26 +0100 [thread overview]
Message-ID: <543BC2D6.8070701@eu.citrix.com> (raw)
In-Reply-To: <5438088F020000780003DCDC@mail.emea.novell.com>
On 10/10/2014 03:25 PM, Jan Beulich wrote:
>>>> On 09.10.14 at 13:24, <George.Dunlap@eu.citrix.com> wrote:
>> I think that the security team should attempt to determine whether
>> pre-disclosure deployment might give away too much information, and
>> specifically say in each advisory whether early deployment is allowed
>> or not, potentially with specifications about what kind of deployments
>> will be allowed (if necessary). Most of the time this will just be,
>> "Rebooting servers to deploy this fix is allowed", but it leaves the
>> option open to change it if necessary.
> We're sometimes already struggling determining the set of
> consequences a certain issue may have (see statements like
> "... cannot be excluded"). I think anticipating what sufficiently
> "qualified" people may be able to guess from early deployment
> would end up being rather difficult.
Perhaps -- but it seems to me to be the least risky of all the alternatives.
As far as I can tell we basically have the following options:
1. Never allow people to deploy during the embargo period.
This eliminates the possibility that someone will be helped to gain
information about the vulnerability by comparing a patched system to an
unpatched one. However, it means that cloud operators may spend a short
amount of time "publicly vulnerable" while they reboot their systems. I
assume it would significantly increase the difficulty of coordinating
such a deployment, as you would have to reboot *all* your servers in the
smallest time window possible, instead of being able to stage it over
several days.
It also increases the temptation for operators to "cheat" by starting
the process a little bit early. This I think could lead to more
significant problems community-wise: with incentive to break the rules,
enforcement becomes an issue -- and I'm sure none of the team want to
have to deal with that.
2. Always allow people to deploy during the embargo period.
This is simple on the security team, and minimizes the "publicly
vulnerable time". It makes deployments easier to coordinate, and avoids
adding an incentive for "bending" the rules.
However, it does in theory allow an attacker the ability to gain
information about the vulnerability by comparing patched systems to
unpatched systems. In practice, the vast majority of the time the
measurable difference in functionality will be like finding a needle in
a haystack; and if the attacker had ever even thought to try the
functionality (e.g., XSA-7), she would have already known about the
bug. But that may not always be the case.
3. Have the security team attempt to evaluate the risk.
This adds work to the security team. But it at least allows the
possibility that, in cases where it's pretty clear that early deployment
*would* give clear hints to an attacker, they could decide to include
deployment in the embargo.
4. Have individual cloud operators evaluate the risk.
This seems like a recipe for disaster.
I think #1 is too risky, particularly from a community perspective. But
maybe I'm being a bit pessimistic.
In my mind, #3 is basically exactly the same as #2, except that in cases
where there would clearly be a problem, the team has an option of
embargoing deployment as well.
I just spent about 10 minutes skimming through the 80 or so XSAs on
http://xenbits.xen.org/xsa/. In most of the cases, it was pretty clear
that the only behavior that changed would be behavior which would
already have clued an attacker into the existence of a potential
vulnerability. For example, in XSA-108, beforehand some reads from the
reserved x2apic range would have returned values whereas now they would
#GP. But if the attacker knew that they returned values, it already
would have occurred to her to see if they returned anything of interest.
I didn't notice a single exception to this, though admittedly I didn't
spend much time looking at it.
This suggests to me that #2 is probably not that dangerous the majority
of the time. It also suggests that there may be a simple criteria that
can be applied for #3 that can eliminate most of the guesswork: Is
anything in the original behavior being changed likely to lead an
attacker to think that there may be a vulnerability there? In the case
of basically all of them, I think the answer there would be "yes".
So at the moment I would favor #3, then #2; I'm not in favor of #1 but I
wouldn't strenuously argue against it. But the main thing is that we
have a clear policy.
-George
next prev parent reply other threads:[~2014-10-13 12:18 UTC|newest]
Thread overview: 95+ messages / expand[flat|nested] mbox.gz Atom feed top
2014-10-08 15:54 Security policy ambiguities - XSA-108 process post-mortem Xen Project Security Team
2014-10-08 23:06 ` Ian Jackson
2014-10-08 23:55 ` Lars Kurth
2014-10-09 9:37 ` Ian Jackson
2014-10-09 11:24 ` George Dunlap
2014-10-09 16:19 ` Ian Campbell
2014-10-10 14:25 ` Jan Beulich
2014-10-13 12:17 ` George Dunlap [this message]
2014-10-29 13:27 ` James Bulpin
2015-01-19 20:36 ` James McKenzie
2015-01-20 8:54 ` Jan Beulich
2015-01-20 12:29 ` George Dunlap
2015-02-12 10:44 ` Lars Kurth
2014-11-10 18:01 ` Ian Jackson
2014-11-11 12:39 ` John Haxby
2014-11-12 18:09 ` George Dunlap
2014-11-13 17:36 ` Ian Jackson
2014-11-14 12:10 ` Lars Kurth
2014-11-14 12:50 ` Ian Jackson
2014-11-14 17:37 ` Lars Kurth
2015-01-16 19:23 ` Ian Jackson
2015-01-16 19:48 ` [PATCH SECURITY-POLICY 0/9] " Ian Jackson
2015-01-16 19:52 ` [PATCH SECURITY-POLICY 1/9] Grammar fix: Remove a comma splice Ian Jackson
2015-01-16 19:52 ` [PATCH SECURITY-POLICY 2/9] Add headings Ian Jackson
2015-01-16 19:52 ` [PATCH SECURITY-POLICY 3/9] Deployment with Security Team Permission Ian Jackson
2015-01-19 10:20 ` Jan Beulich
2015-01-19 11:18 ` Lars Kurth
2015-01-19 13:38 ` Ian Jackson
2015-01-19 14:25 ` Ian Campbell
2015-01-19 15:55 ` George Dunlap
2015-01-19 19:48 ` Lars Kurth
2015-01-19 12:36 ` Ian Campbell
2015-01-19 13:50 ` Jan Beulich
2015-01-19 12:35 ` Ian Campbell
2015-01-19 13:08 ` Ian Jackson
2015-01-19 13:10 ` Ian Campbell
2015-01-16 19:52 ` [PATCH SECURITY-POLICY 4/9] Use a public mailing list for predisclosure membership applications Ian Jackson
2015-01-19 12:49 ` Ian Campbell
2015-01-19 13:10 ` Ian Jackson
2015-01-19 13:19 ` Ian Campbell
2015-01-19 16:21 ` Don Koch
2015-01-19 17:57 ` Ian Jackson
2015-01-16 19:52 ` [PATCH SECURITY-POLICY 5/9] Tighten, and make more objective, predisclosure list application Ian Jackson
2015-01-16 19:52 ` [PATCH SECURITY-POLICY 6/9] Explicitly permit within-list information sharing during embargo Ian Jackson
2015-01-16 19:52 ` [PATCH SECURITY-POLICY 7/9] Clarify and fix prior consultation text Ian Jackson
2015-01-16 19:52 ` [PATCH SECURITY-POLICY 8/9] Clarify what announcements may be made by to service users Ian Jackson
2015-01-16 19:52 ` [PATCH SECURITY-POLICY 9/9] Document changes in changelog and heading Ian Jackson
2015-01-19 10:29 ` [PATCH SECURITY-POLICY 0/9] Re: Security policy ambiguities - XSA-108 process post-mortem Jan Beulich
2015-01-19 13:36 ` Ian Jackson
2015-01-19 19:45 ` Lars Kurth
2015-01-19 14:57 ` George Dunlap
2015-01-23 19:31 ` [PATCH v2 SECURITY-POLICY 0/9] " Ian Jackson
2015-01-23 19:31 ` [PATCH v2 SECURITY-POLICY 1/9] Grammar fix: Remove a comma splice Ian Jackson
2015-01-23 19:31 ` [PATCH v2 SECURITY-POLICY 2/9] Add headings Ian Jackson
2015-01-23 19:31 ` [PATCH v2 SECURITY-POLICY 3/9] Deployment with Security Team Permission Ian Jackson
2015-01-23 19:31 ` [PATCH v2 SECURITY-POLICY 4/9] Use a public mailing list for predisclosure membership applications Ian Jackson
2015-01-23 19:31 ` [PATCH v2 SECURITY-POLICY 5/9] Tighten, and make more objective, predisclosure list application Ian Jackson
2015-01-23 19:31 ` [PATCH v2 SECURITY-POLICY 6/9] Explicitly permit within-list information sharing during embargo Ian Jackson
2015-01-23 19:31 ` [PATCH v2 SECURITY-POLICY 7/9] Clarify and fix prior consultation text Ian Jackson
2015-01-23 19:31 ` [PATCH v2 SECURITY-POLICY 8/9] Clarify what announcements may be made by to service users Ian Jackson
2015-01-23 19:31 ` [PATCH v2 SECURITY-POLICY 9/9] Document changes in changelog and heading Ian Jackson
2015-02-02 17:27 ` [PATCH v2 SECURITY-POLICY 0/9] Security policy ambiguities - XSA-108 process post-mortem Ian Jackson
2015-02-03 9:49 ` Lars Kurth
2014-10-09 11:09 ` George Dunlap
2014-10-10 14:47 ` Jan Beulich
2014-10-13 11:23 ` George Dunlap
2014-10-13 12:16 ` Lars Kurth
2014-11-10 17:25 ` Ian Jackson
2014-10-29 13:27 ` James Bulpin
2014-11-10 17:21 ` Ian Jackson
2014-10-21 12:32 ` Ian Campbell
2014-10-21 14:31 ` Matt Wilson
2014-10-21 15:06 ` Jan Beulich
2014-11-10 17:29 ` Ian Jackson
2014-11-10 17:39 ` George Dunlap
2014-11-10 18:04 ` Ian Jackson
2014-10-30 11:58 ` Ian Jackson
2014-10-31 22:40 ` Matt Wilson
2014-11-03 11:37 ` George Dunlap
2014-11-03 17:23 ` Matt Wilson
2014-11-05 11:17 ` Ian Campbell
2014-11-06 16:01 ` Lars Kurth
2014-11-10 12:35 ` Ian Campbell
2014-10-22 23:23 ` Bastian Blank
2014-10-29 13:27 ` James Bulpin
2014-11-10 17:42 ` Ian Jackson
2014-10-09 8:29 ` Ian Campbell
2014-10-09 8:45 ` Processed: " xen
2014-10-29 13:27 ` James Bulpin
2014-10-30 10:51 ` Tim Deegan
-- strict thread matches above, loose matches on Subject: below --
2014-10-21 18:20 Lars Kurth
2014-10-22 0:41 ` Matt Wilson
2014-10-22 13:05 ` Lars Kurth
2014-10-22 15:53 ` Matt Wilson
2014-11-10 17:44 ` Ian Jackson
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=543BC2D6.8070701@eu.citrix.com \
--to=george.dunlap@eu.citrix.com \
--cc=JBeulich@suse.com \
--cc=ijackson@chiark.greenend.org.uk \
--cc=lars.kurth.xen@gmail.com \
--cc=xen-devel@lists.xenproject.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.