public inbox for kernel-hardening@lists.openwall.com
 help / color / mirror / Atom feed
* Get involved
@ 2019-06-04 17:08 Romain Perier
  2019-06-07 17:54 ` Romain Perier
  0 siblings, 1 reply; 12+ messages in thread
From: Romain Perier @ 2019-06-04 17:08 UTC (permalink / raw)
  To: kernel-hardening

Hi,

I have discussed briefly with Kees on IRC, who has suggested to me to
say hello here :) .
As part of the debian kernel team (still a padawan), I would like to
be more involved on upstream on security related topics.

Kees confirmed that the todolist at
http://kernsec.org/wiki/index.php/Kernel_Self_Protection_Project/Work
is up-to-date.

Which task would you recommend (I was mostly involved on SoC related
tasks on upstream in the mainline kernel) ?

I am on ##linux-hardened on IRC (nick: rperier)

Thanks,
Regards,
Romain

^ permalink raw reply	[flat|nested] 12+ messages in thread
* RE: Get involved
@ 2019-06-18 10:36 Gote, Nitin R
  2019-06-18 11:35 ` Jann Horn
  0 siblings, 1 reply; 12+ messages in thread
From: Gote, Nitin R @ 2019-06-18 10:36 UTC (permalink / raw)
  To: Kees Cook; +Cc: Kernel Hardening, Shyam Saini

Hi Kees,

I would like to be involved on upstream on security related topics.
I'm planning to work on below items from KSPP to do list:
	1. deprecate strcpy() in favor of strscpy().
	2. deprecate strlcpy() in favor of strscpy().
	3. deprecate strncpy() in favor of strscpy(), strscpy_pad(), or str2mem_pad().

I'm thinking of following approach for above items :

Approach 1 : Do we need to blindly replace strcpy() or strlcpy() or strncpy() with strscpy() in entire linux kernel tree ?
	         (This approach is time consuming as lots of changes need to do in single patch or multiple patch)

Approach 2 : Do we need to implement script or some mechanism which checks for functions likes strcpy(), strlcpy() or strncpy() and 
	         throw some deprecate error, if these functions found and suggest to use strscpy() ? 

Could you please provide some point on these ? 

If none of above approach is correct, Could you please give some idea, So that I can start work on mentioned items ?
One more question, Is there any CI is maintained for KSPP ? If yes, how to check CI current status ?

Thanks and Regards,
Nitin Gote.

-----Original Message-----
From: Shyam Saini [mailto:mayhs11saini@gmail.com] 
Sent: Saturday, June 8, 2019 11:32 AM
To: Kees Cook <keescook@chromium.org>
Cc: Romain Perier <romain.perier@gmail.com>; Kernel Hardening <kernel-hardening@lists.openwall.com>
Subject: Re: Get involved

Hi Kees,



>
> Hi! Sorry for the late reply: I've been travelling this week. :P

> > Okay, np. I will select another one then :) (hehe that's the game ;) 
> > )
> >
> > @Kees: do you have something in mind (as a new task) ?
> Shyam, you'd also started FIELD_SIZEOF refactoring, but never sent a 
> v2 patch if I was following correctly? Is there one or the other of 
> these tasks you'd like help with?  
> https://patchwork.kernel.org/patch/10900187/

sorry for being too late.

You assigned me 3 tasks
1) FIELD_SIZEOF
2) WARN on kfree() of ERR_PTR range
3) NLA_STRING

I'll send patches for task 1 and 2 today or tomorrow.

If Roman is taking NLA_STRING task, I'd pick some other once i send patches for 1 and 2.


> Romain, what do you think about reviewing NLA code? I'd mentioned a 
> third task here:
> https://www.openwall.com/lists/kernel-hardening/2019/04/17/8
>
> Quoting...
>
>
> - audit and fix all misuse of NLA_STRING
>
> This is a following up on noticing the misuse of NLA_STRING (no NUL 
> terminator), getting used with regular string functions (that expect a 
> NUL termination):
> https://lore.kernel.org/lkml/1519329289.2637.12.camel@sipsolutions.net
> /T/#u
>
> It'd be nice if someone could inspect all the NLA_STRING 
> representations and find if there are any other problems like this 
> (and see if there was a good way to systemically fix the problem).
>
>
>
> For yet another idea would be to get syzkaller[1] set up and enable 
> integer overflow detection (by adding "-fsanitize=signed-integer-overflow"
> to KBUILD_CFLAGS) and start finding and fixes cases like this[2].
>
> Thanks and let me know what you think!
>
> -Kees
>
> [1] 
> https://github.com/google/syzkaller/blob/master/docs/linux/setup.md
> [2] https://lore.kernel.org/lkml/20180824215439.GA46785@beast/
>
>
> --
> Kees Cook

^ permalink raw reply	[flat|nested] 12+ messages in thread
* Get involved
@ 2020-04-27 15:26 Oscar Carter
  0 siblings, 0 replies; 12+ messages in thread
From: Oscar Carter @ 2020-04-27 15:26 UTC (permalink / raw)
  To: kernel-hardening

Hi, my name is Oscar. I would like to get involved in the kernel self protection
project because I love the software security and I think this is one of the most
challenging fields.

I have experience in microcrontrollers and working with low level software, but
my experience with the linux kernel development is a few commits in the staging
area.

For now, and due to my low experience with the linux kernel code and software
security, I do not care about the area and task to be done. What I pretend is to
help this great community and improve my knowledge and skills in this
challenging field.

So, I would like to know if I can be assigned to some task that suits me. I've
taken a look at https://github.com/KSPP/linux/issues but I don't know which task
to choose and if something else is working on it.

Thanks,

Oscar Carter

^ permalink raw reply	[flat|nested] 12+ messages in thread

end of thread, other threads:[~2020-04-27 17:33 UTC | newest]

Thread overview: 12+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2019-06-04 17:08 Get involved Romain Perier
2019-06-07 17:54 ` Romain Perier
2019-06-07 18:04   ` Shyam Saini
2019-06-07 18:16     ` Romain Perier
2019-06-08  4:32       ` Kees Cook
2019-06-08  6:02         ` Shyam Saini
2019-06-08  8:16           ` Romain Perier
2019-06-08  9:19             ` Shyam Saini
  -- strict thread matches above, loose matches on Subject: below --
2019-06-18 10:36 Gote, Nitin R
2019-06-18 11:35 ` Jann Horn
2019-06-20 10:27   ` Gote, Nitin R
2020-04-27 15:26 Oscar Carter

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox