From mboxrd@z Thu Jan 1 00:00:00 1970 Reply-To: kernel-hardening@lists.openwall.com From: Peter Huewe Date: Fri, 1 Feb 2013 00:18:52 +0100 References: <510A8F11.6050908@linux.vnet.ibm.com> <510ADDAB.3010500@linux.vnet.ibm.com> In-Reply-To: <510ADDAB.3010500@linux.vnet.ibm.com> MIME-Version: 1.0 Content-Type: Text/Plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit Message-Id: <201302010018.52274.PeterHuewe@gmx.de> Subject: Re: [kernel-hardening] Secure Open Source Project Guide To: kernel-hardening@lists.openwall.com Cc: Corey Bryant , Kees Cook , Anthony Liguori , Frank Novak , George Wilson , Joel Schopp , Kevin Wolf , Warren Grunbok II List-ID: Hi, > We should probably start by gathering a list of ideas to include in the > guide. Some initial ideas that come to mind are: > > * Secure programming practices (Secure "Programming for Linux > and Unix HOWTO" is a good reference for Linux though probably > out of date) > * Performing secure code reviews and detecting common > vulnerabilities > * Ensuring code is reviewed by trusted parties and proper patch > tagging is used > * Signing of releases, pull requests, patches, commits, etc by > trusted parties > * Removing vulnerabilities with automated tooling (Static/Dynamic > analysis, Fuzzing) > > Any thoughts? I'd definitely add * creating semantic patches out of the secure coding reviews / common vulnerabilities with coccinelle/spatch. (Usually the same bugs happen over and over again - see e.g. the CWE list ;) I know this goes into the direction of your last point, but is not that trivial to use like e.g. spatch but on the other hand provides "automatic" fixing. Just my two cents. PeterH