public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
From: Marcelo Tosatti <marcelo.tosatti@cyclades.com>
To: Linus Torvalds <torvalds@osdl.org>
Cc: Alan Cox <alan@lxorguk.ukuu.org.uk>,
	Chris Wright <chrisw@osdl.org>,
	akpm@osdl.org,
	Linux Kernel Mailing List <linux-kernel@vger.kernel.org>
Subject: Re: security contact draft
Date: Thu, 13 Jan 2005 17:28:14 -0200	[thread overview]
Message-ID: <20050113192814.GA8176@logos.cnet> (raw)
In-Reply-To: <Pine.LNX.4.58.0501131325560.2310@ppc970.osdl.org>

On Thu, Jan 13, 2005 at 01:31:19PM -0800, Linus Torvalds wrote:
> 
> 
> On Thu, 13 Jan 2005, Alan Cox wrote:
> > 
> > It's not documenting the stuff Linus seems to be talking about which is
> > a public list ? Or does Linus want both ?
> 
> I see myself as pretty extreme when it comes to my approach to security.
> 
> And I actually distrust extremes. I'm at one end of the spectrum, and
> vendor-sec is at the other (I'm not even counting the head-in-the-sand
> approach as part of the spectrum ;). Knowing that, I'd expect that most
> people are somewhere in between.
> 
> Which to me implies that while what I personally _want_ is total openness, 
> that's not necessarily what makes the most sense in real life.

Gooood :) 

> So I want to give people choice. I want to encourage openness. But hell, 
> if we have a closed list with a declared short embargo that is known to 
> not play games (ie clock starts ticking from original discovery, not from 
> somebody elses embargo), that's good too.
> 
> Let people vote with their feet. If vendor-sec ends up being where all the
> "important" things are discussed - so be it. We've not lost anything, and
> at worst a "kernel-security" list would be a way to discuss stuff that was
> already released by vendor-sec.

On my understanding we are about to win several things.

I rather prefer having vendorsec NOT deal with these issues because 
it gives autonomy to the kernel team. It wont depend on "suspicious" criteria
of embargo's - but instead have a clear written policy for embargo's.

And the timeframe, as Alan says, has to be acceptable for the vendors to 
generate their updates and run the QA process, otherwise things will 
continue to be discussed at vendorsec.

Other than that, by not "wrapping" the fixes with non descritive changelogs,
we will have an official list of security problems. Hey, this is a serious 
operating system.

Wrapping up fixes means "disclosure" for the better informed people 
(the bad guys) who read the changesets, and means "lack of knowledge" 
for the less informed - users who dont run the latest kernel and only 
upgrade in case of public security issues (the majority of them?).

So the argument of "wrapping" up fixes for "better and safer code" is actually
very bad if you think about it. 

Once we have that, there will be a "official" list of known issues.

Those MANY who ask
"I'm using v2.6.12 on my customized kernel and I can't upgrade to the latest
v2.6.20 kernel, which security bugs exist that I need fixed?"

Will have an easy answer.

This is better for the Linux kernel developers, better for vendors and better
for users.



  reply	other threads:[~2005-01-13 23:04 UTC|newest]

Thread overview: 14+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2005-01-13 20:55 security contact draft Chris Wright
2005-01-13 20:10 ` Alan Cox
2005-01-13 21:31   ` Linus Torvalds
2005-01-13 19:28     ` Marcelo Tosatti [this message]
2005-01-13 22:02   ` Chris Wright
2005-01-13 21:43 ` Florian Weimer
2005-01-13 22:12   ` Chris Wright
2005-01-15  0:33     ` Alan Cox
2005-01-15  2:43       ` Chris Wright
2005-01-15  4:00         ` Alan Cox
2005-01-18  0:24           ` security contact draft2 (was Re: security contact draft) Chris Wright
2005-01-18 17:39             ` Horst von Brand
2005-02-03 14:28 ` security contact draft Patrick Plattes
2005-02-03 18:08   ` Chris Wright

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20050113192814.GA8176@logos.cnet \
    --to=marcelo.tosatti@cyclades.com \
    --cc=akpm@osdl.org \
    --cc=alan@lxorguk.ukuu.org.uk \
    --cc=chrisw@osdl.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=torvalds@osdl.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox