
Best possible outcome is that Linus now looks at the problem with new eyes, takes the enormous satisfaction he's due in making the kernel the beautiful beast it is with respect to performance and stability, and turns his undivided attention to security.jonathan183 wrote:I guess the masking of hardened-sources forces people to make a decision about what to do with the kernel.
Did not Linus have criticisms of Grsec code? Yet he let it in. While Linus' blessing may help, if a serious team got together to engineer a solution, past performance suggests Linux would allow it into the kernel.nokilli wrote:[All he really needs to do is just make the proclamation. Say that now is the time to move on security. I truly believe this; he does that, this gets done. So many people want to see this happen but he's, well, he's Linus... it's a hard road without his blessing. And security was already an enormously frustrating problem.
Unfortunately, politics appear to be part of the human condition. Maybe we'll eventually evolve out of that.nokilli wrote:Complicate it with politics? There shouldn't be politics here.
Bolting security on as an afterthought is probably the wrong security-minded approach. Coming up with a secure design from scratch is probably a better end game. Then make Linux a legacy hardware compatibility layer. Anytime you buy crap from a crappy vendor, call the vendor out on it when their crap results in security problems.nokilli wrote:Well, it's close to ending now. I believe that the kernel today is very close to a state where every kind of idiocy on the part of device manufacturers has been dealt with in one form or the other and I don't understand why security can't be treated in the same way.
Security isn't something everyone knows how to do well. Linus readily admits not being a great SA or in the past having had difficulty installing Debian. So it is quite reasonable to believe he isn't a security expert, and it may be a Good Thing that he's not the champion for security in Linux.nokilli wrote:Maybe security is harder than that. But doesn't that then mean we should be embracing its solution all the more?
Failing that, the outlook is fairly terrible. Sitting from my very unprivileged position, it isn't entirely clear why security hasn't been given greater priority.
I don't for one second believe they have our interests on any list of priorities. Their list of priorities is the ability to bypass security in the pursuit of "National Security." I'll leave that as it is, otherwise it is likely to derail the thread, if it isn't already too late.nokilli wrote:And living in a post-Snowden world, I do see the priority my government has placed on compromising the security of the systems I run and I'm forced to wonder how far their pursuit of total control has taken them. Linus has hinted that he's had these kinds of conversations with the NSA-types. We want to believe that the outcome of these conversations have been favorable to our interests, but we can't know that for sure, because we're actually living in a world where the government can order you to do something and then also order you to not reveal that fact.
I think it primarily says that the NSA wanted to use Linux but recognized that it was inappropriate for their requirements. I also think it is likely for Linux to me more secure with SELinux than without. That may include protections from the NSA as well (though I'm skeptical).nokilli wrote:I remember back when SELinux was first introduced. Maybe this will be controversial in this place but at the time my impression was that OpenBSD was the preferred OS if your priority was security. So it was odd to see the NSA work to add mandatory access control to an OS that didn't then and doesn't now make security a priority.
The solution will be for people to stop chasing after the newest, shiniest development toys.nokilli wrote:Might this not have been a ploy to simply negate the momentum something like OpenBSD was enjoying at the time? And looking at the mindshare enjoyed by OpenBSD and Linux today, is it fair to say that if this was the mission then that the mission has succeeded?
What do they offer to make them a compelling choice?mx_ wrote:Some guy porting the patches seems like a bad idea to me.
What about using CentOS or SLES kernel sources and create an ebuild for those?
https://software.opensuse.org/package/kernel-source
https://git.centos.org/summary/?r=rpms/kernel.git
there was one project sys-kernel/geek-sources::init_6 with USE="aufs bfq bld branding cjktty ck deblob exfat fedora gentoo grsec ice lqx mageia openelec openvz openwrt optimize pax pf reiser4 rh rsbac rt suse uek uksm zen zfs" I quit working on it because no one was interested in it.mx_ wrote:Some guy porting the patches seems like a bad idea to me.
What about using CentOS or SLES kernel sources and create an ebuild for those?
https://software.opensuse.org/package/kernel-source
https://git.centos.org/summary/?r=rpms/kernel.git
Both companies pay developer teams to create a stable kernel with bugfixes, security patches and backports. They are also involved in kernel developing.pjp wrote:What do they offer to make them a compelling choice?mx_ wrote:Some guy porting the patches seems like a bad idea to me.
What about using CentOS or SLES kernel sources and create an ebuild for those?
https://software.opensuse.org/package/kernel-source
https://git.centos.org/summary/?r=rpms/kernel.git
If all it took was Linus reciting some magic words, the nvidia driver would be dead by now.nokilli wrote:All he really needs to do is just make the proclamation. Say that now is the time to move on security. I truly believe this; he does that, this gets done.
Ah, thanks. I thought maybe there was some specific security alternative.mx_ wrote:Both companies pay developer teams to create a stable kernel with bugfixes, security patches and backports. They are also involved in kernel developing.
The kernels are validated for commercial server hardware and include security features like apparmor and selinux. At least the SLES12 kernel supports live patching and they ship live patches.
There is likely much more, I did not lookup a documentation yet.
And they won't shut down their work of course :-)
That depends on your definition of "security".pjp wrote:Ah, thanks. I thought maybe there was some specific security alternative.mx_ wrote:Both companies pay developer teams to create a stable kernel with bugfixes, security patches and backports. They are also involved in kernel developing.
The kernels are validated for commercial server hardware and include security features like apparmor and selinux. At least the SLES12 kernel supports live patching and they ship live patches.
There is likely much more, I did not lookup a documentation yet.
And they won't shut down their work of course :-)

Will Gentoo continue to support its line of "hardened" profiles?... we will be masking the hardened-sources on the 27th of August and will proceed to remove them from the tree by the end of September... Our recommendation is that users should consider using instead sys-kernel/gentoo-sources



Code: Select all
emerge --infoCode: Select all
emerge --info Code: Select all
emerge -pve @world
Hardened have a sub profile under the 17.0 profile and will be added to more of the sub profiles.NeddySeagoon wrote:Moonboots,
Try the experiment for yourself. This is harmless as long as you do not install anynting whilu the /17.0/ profile is selected.
RunSelect the the /17.0/ profile of your choice. Its not in eselect profile yet, so make the symline by hand.Code: Select all
emerge --info
Runagain and compare the two outputs.Code: Select all
emerge --info
For per package USE changes runSwitch back to your old profile before you forget.Code: Select all
emerge -pve @world
Is the "17.0" series going to subsume the "hardened" profile? Currently we have "/usr/portage/profiles/hardened/linux/amd64" beside "/usr/portage/profiles/default/linux/amd64/13.0" and its children. In the "17.0" series we also have "/usr/portage/profiles/default/linux/amd64/17.0/hardened".zorry wrote: Hardened have a sub profile under the 17.0 profile and will be added to more of the sub profiles.