All of lore.kernel.org
 help / color / mirror / Atom feed
* [kernel-hardening] Linux Security Workgroup
@ 2012-09-27 19:26 Corey Bryant
  2012-10-02 16:23 ` [kernel-hardening] " Kees Cook
  0 siblings, 1 reply; 14+ messages in thread
From: Corey Bryant @ 2012-09-27 19:26 UTC (permalink / raw)
  To: kernel-hardening, James Morris, Theodore Tso, Kees Cook,
	Paul Moore, Eric Paris, Tyler Hicks, zohar, john.johansen

At the Linux Security Summit we began discussing the Linux Security 
Workgroup and some of the efforts that we can focus on.

The charter of the workgroup is to provide on-going security
verification of Linux kernel subsystems in order to assist in securing 
the Linux Kernel and maintain trust and confidence in the security of 
the Linux ecosystem.

This may include, but is not limited to, topics such as tooling to 
assist in securing the Linux Kernel, verification and testing of 
critical subsystems for vulnerabilities, security improvements for build 
tools, and providing guidance for maintaining subsystem security.

For communication, we have permission to use the following mail list: 
kernel-hardening@lists.openwall.com
The list can be subscribed to at: http://www.openwall.com/lists/#subscribe

If you would like to participate or know anyone else who would like to, 
please join the mailing list or feel free to pass the word on.

The bullets below are further details based on our discussion at the 
Linux Security Summit:

General Notes:
--------------
* The idea of the workgroup came from the Linux Foundation and Ted Tso 
after the kernel.org attack.

* Malicious code wasn't inserted into the kernel tree.  git hashing 
would have detected a mismatch in kernel code quickly.  Also the PGP web 
of trust and kernel signing was an important validation measure that's 
since been taken.

* Guidelines for subsystems could be created to provide guidance for 
best practices to consider when reviewing code (e.g. detecting common 
vulnerabilities, don't leave ssh private keys around, etc).

* Development and maintenance of automated tools would assist in 
securing the kernel on an ongoing basis.

* Maintainers should have more automated tooling available to enforce 
security checks on patches as they come in.

* Daily execution (perhaps on linux-next tree or as part of build 
system) of static analysis and emailing reports out to a list and CC'ing 
authors using git blame.  Red Hat's Coverity license allows results to 
be shared with the upstream project.

* Provide verification of critical kernel subsystems (Kernel build 
infrastructure, Networking, Network file systems, KVM, Cryptographic 
library).

* Fuzz testing could be used to find potential problems in the kernel's 
interface to userspace (syscall, ioctl, KVM paravirt calls).

* More stringent rules could be adopted such as patch signing.

* The security community should share and coordinate their efforts on 
the mail list so that overlap of work items does not occur.

Resource requirements:
----------------------
* We should narrow down the working group's scope and/or priorities 
before we narrow down the resources.

* Perhaps allocating people for a limited amount of time that rotates 
would be the most attainable resource possibility.


-- 
Regards,
Corey Bryant

^ permalink raw reply	[flat|nested] 14+ messages in thread

* [kernel-hardening] Re: Linux Security Workgroup
  2012-09-27 19:26 [kernel-hardening] Linux Security Workgroup Corey Bryant
@ 2012-10-02 16:23 ` Kees Cook
  2012-10-02 16:44   ` Corey Bryant
  0 siblings, 1 reply; 14+ messages in thread
From: Kees Cook @ 2012-10-02 16:23 UTC (permalink / raw)
  To: Corey Bryant
  Cc: kernel-hardening, James Morris, Theodore Tso, Paul Moore,
	Eric Paris, Tyler Hicks, zohar, john.johansen, Dan Carpenter,
	Fengguang Wu

On Thu, Sep 27, 2012 at 12:26 PM, Corey Bryant
<coreyb@linux.vnet.ibm.com> wrote:
> At the Linux Security Summit we began discussing the Linux Security
> Workgroup and some of the efforts that we can focus on.
>
> The charter of the workgroup is to provide on-going security
> verification of Linux kernel subsystems in order to assist in securing the
> Linux Kernel and maintain trust and confidence in the security of the Linux
> ecosystem.
>
> This may include, but is not limited to, topics such as tooling to assist in
> securing the Linux Kernel, verification and testing of critical subsystems
> for vulnerabilities, security improvements for build tools, and providing
> guidance for maintaining subsystem security.

Thanks for getting this rolling!

What are the next steps? Does it make sense to try to gather a list of
active projects to try and see where things currently stand? (i.e who
is actively running smatch, trinity, etc?) Or to call attention to a
specific subsystem that needs direct auditing (e.g. KVM)?

-Kees

-- 
Kees Cook
Chrome OS Security

^ permalink raw reply	[flat|nested] 14+ messages in thread

* [kernel-hardening] Re: Linux Security Workgroup
  2012-10-02 16:23 ` [kernel-hardening] " Kees Cook
@ 2012-10-02 16:44   ` Corey Bryant
  2012-10-02 22:17     ` Kees Cook
  0 siblings, 1 reply; 14+ messages in thread
From: Corey Bryant @ 2012-10-02 16:44 UTC (permalink / raw)
  To: Kees Cook
  Cc: kernel-hardening, James Morris, Theodore Tso, Paul Moore,
	Eric Paris, Tyler Hicks, zohar, john.johansen, Dan Carpenter,
	Fengguang Wu



On 10/02/2012 12:23 PM, Kees Cook wrote:
> On Thu, Sep 27, 2012 at 12:26 PM, Corey Bryant
> <coreyb@linux.vnet.ibm.com> wrote:
>> At the Linux Security Summit we began discussing the Linux Security
>> Workgroup and some of the efforts that we can focus on.
>>
>> The charter of the workgroup is to provide on-going security
>> verification of Linux kernel subsystems in order to assist in securing the
>> Linux Kernel and maintain trust and confidence in the security of the Linux
>> ecosystem.
>>
>> This may include, but is not limited to, topics such as tooling to assist in
>> securing the Linux Kernel, verification and testing of critical subsystems
>> for vulnerabilities, security improvements for build tools, and providing
>> guidance for maintaining subsystem security.
>
> Thanks for getting this rolling!
>
> What are the next steps? Does it make sense to try to gather a list of
> active projects to try and see where things currently stand? (i.e who
> is actively running smatch, trinity, etc?) Or to call attention to a
> specific subsystem that needs direct auditing (e.g. KVM)?
>
> -Kees
>

No problem, thanks for the input!

I think having a list of active projects is a good place to start.

Perhaps we can also add desired projects to this list, and if anyone has 
cycles to cover a project they can put their name to the project.

I'm personally trying to get time allocated to work on KVM fuzzing 
and/or static analysis in 2013.

A wiki probably makes sense for the list.  Google sites has wikis.  I 
can start one there unless there are other ideas.

-- 
Regards,
Corey Bryant

^ permalink raw reply	[flat|nested] 14+ messages in thread

* [kernel-hardening] Re: Linux Security Workgroup
  2012-10-02 16:44   ` Corey Bryant
@ 2012-10-02 22:17     ` Kees Cook
  2012-10-03  5:38       ` Julia Lawall
                         ` (3 more replies)
  0 siblings, 4 replies; 14+ messages in thread
From: Kees Cook @ 2012-10-02 22:17 UTC (permalink / raw)
  To: Corey Bryant, Julia Lawall
  Cc: kernel-hardening, James Morris, Theodore Tso, Paul Moore,
	Eric Paris, Tyler Hicks, zohar, john.johansen, Dan Carpenter,
	Fengguang Wu

On Tue, Oct 2, 2012 at 9:44 AM, Corey Bryant <coreyb@linux.vnet.ibm.com> wrote:
>
>
> On 10/02/2012 12:23 PM, Kees Cook wrote:
>>
>> On Thu, Sep 27, 2012 at 12:26 PM, Corey Bryant
>> <coreyb@linux.vnet.ibm.com> wrote:
>>>
>>> At the Linux Security Summit we began discussing the Linux Security
>>> Workgroup and some of the efforts that we can focus on.
>>>
>>> The charter of the workgroup is to provide on-going security
>>> verification of Linux kernel subsystems in order to assist in securing
>>> the
>>> Linux Kernel and maintain trust and confidence in the security of the
>>> Linux
>>> ecosystem.
>>>
>>> This may include, but is not limited to, topics such as tooling to assist
>>> in
>>> securing the Linux Kernel, verification and testing of critical
>>> subsystems
>>> for vulnerabilities, security improvements for build tools, and providing
>>> guidance for maintaining subsystem security.
>>
>>
>> Thanks for getting this rolling!
>>
>> What are the next steps? Does it make sense to try to gather a list of
>> active projects to try and see where things currently stand? (i.e who
>> is actively running smatch, trinity, etc?) Or to call attention to a
>> specific subsystem that needs direct auditing (e.g. KVM)?
>>
>> -Kees
>>
>
> No problem, thanks for the input!
>
> I think having a list of active projects is a good place to start.

I know Dan Carpenter is running smatch, as well as Fengguang Wu.
Getting details on which trees are being scanned would be good.

I know Fengguang Wu is running trinity too.

There is a collection of coccinelle scripts in the tree, but I'm not
sure if/when those are getting run by anyone. Julia, do you know if
those are being regularly run?

> Perhaps we can also add desired projects to this list, and if anyone has
> cycles to cover a project they can put their name to the project.

I was keeping a list of potential hardening work here:
https://wiki.ubuntu.com/SecurityTeam/Roadmap/KernelHardening#Upstream_Hardening
some of it is out of date.

> I'm personally trying to get time allocated to work on KVM fuzzing and/or
> static analysis in 2013.

Sounds good.

> A wiki probably makes sense for the list.  Google sites has wikis.  I can
> start one there unless there are other ideas.

Kernel.org hosts wikis as well, and James Morris already has
http://kernsec.org/. Perhaps we can use that? James, would this be
something you'd be okay with?

Thanks,

-Kees

-- 
Kees Cook
Chrome OS Security

^ permalink raw reply	[flat|nested] 14+ messages in thread

* [kernel-hardening] Re: Linux Security Workgroup
  2012-10-02 22:17     ` Kees Cook
@ 2012-10-03  5:38       ` Julia Lawall
  2012-10-03  5:45       ` Dan Carpenter
                         ` (2 subsequent siblings)
  3 siblings, 0 replies; 14+ messages in thread
From: Julia Lawall @ 2012-10-03  5:38 UTC (permalink / raw)
  To: Kees Cook
  Cc: Corey Bryant, Julia Lawall, kernel-hardening, James Morris,
	Theodore Tso, Paul Moore, Eric Paris, Tyler Hicks, zohar,
	john.johansen, Dan Carpenter, Fengguang Wu



On Tue, 2 Oct 2012, Kees Cook wrote:

> On Tue, Oct 2, 2012 at 9:44 AM, Corey Bryant <coreyb@linux.vnet.ibm.com> wrote:
>>
>>
>> On 10/02/2012 12:23 PM, Kees Cook wrote:
>>>
>>> On Thu, Sep 27, 2012 at 12:26 PM, Corey Bryant
>>> <coreyb@linux.vnet.ibm.com> wrote:
>>>>
>>>> At the Linux Security Summit we began discussing the Linux Security
>>>> Workgroup and some of the efforts that we can focus on.
>>>>
>>>> The charter of the workgroup is to provide on-going security
>>>> verification of Linux kernel subsystems in order to assist in securing
>>>> the
>>>> Linux Kernel and maintain trust and confidence in the security of the
>>>> Linux
>>>> ecosystem.
>>>>
>>>> This may include, but is not limited to, topics such as tooling to assist
>>>> in
>>>> securing the Linux Kernel, verification and testing of critical
>>>> subsystems
>>>> for vulnerabilities, security improvements for build tools, and providing
>>>> guidance for maintaining subsystem security.
>>>
>>>
>>> Thanks for getting this rolling!
>>>
>>> What are the next steps? Does it make sense to try to gather a list of
>>> active projects to try and see where things currently stand? (i.e who
>>> is actively running smatch, trinity, etc?) Or to call attention to a
>>> specific subsystem that needs direct auditing (e.g. KVM)?
>>>
>>> -Kees
>>>
>>
>> No problem, thanks for the input!
>>
>> I think having a list of active projects is a good place to start.
>
> I know Dan Carpenter is running smatch, as well as Fengguang Wu.
> Getting details on which trees are being scanned would be good.
>
> I know Fengguang Wu is running trinity too.
>
> There is a collection of coccinelle scripts in the tree, but I'm not
> sure if/when those are getting run by anyone. Julia, do you know if
> those are being regularly run?

Fengguang Wu runs at least some of them as well.

Artem Bityutskiy also runs them on the patces he receives (aiaiai).

julia

>> Perhaps we can also add desired projects to this list, and if anyone has
>> cycles to cover a project they can put their name to the project.
>
> I was keeping a list of potential hardening work here:
> https://wiki.ubuntu.com/SecurityTeam/Roadmap/KernelHardening#Upstream_Hardening
> some of it is out of date.
>
>> I'm personally trying to get time allocated to work on KVM fuzzing and/or
>> static analysis in 2013.
>
> Sounds good.
>
>> A wiki probably makes sense for the list.  Google sites has wikis.  I can
>> start one there unless there are other ideas.
>
> Kernel.org hosts wikis as well, and James Morris already has
> http://kernsec.org/. Perhaps we can use that? James, would this be
> something you'd be okay with?
>
> Thanks,
>
> -Kees
>
> -- 
> Kees Cook
> Chrome OS Security
>

^ permalink raw reply	[flat|nested] 14+ messages in thread

* [kernel-hardening] Re: Linux Security Workgroup
  2012-10-02 22:17     ` Kees Cook
  2012-10-03  5:38       ` Julia Lawall
@ 2012-10-03  5:45       ` Dan Carpenter
  2012-10-03 21:59       ` Corey Bryant
  2012-10-08 17:52       ` Corey Bryant
  3 siblings, 0 replies; 14+ messages in thread
From: Dan Carpenter @ 2012-10-03  5:45 UTC (permalink / raw)
  To: Kees Cook
  Cc: Corey Bryant, Julia Lawall, kernel-hardening, James Morris,
	Theodore Tso, Paul Moore, Eric Paris, Tyler Hicks, zohar,
	john.johansen, Fengguang Wu

On Tue, Oct 02, 2012 at 03:17:29PM -0700, Kees Cook wrote:
> On Tue, Oct 2, 2012 at 9:44 AM, Corey Bryant <coreyb@linux.vnet.ibm.com> wrote:
> >
> >
> > On 10/02/2012 12:23 PM, Kees Cook wrote:
> >>
> >> On Thu, Sep 27, 2012 at 12:26 PM, Corey Bryant
> >> <coreyb@linux.vnet.ibm.com> wrote:
> >>>
> >>> At the Linux Security Summit we began discussing the Linux Security
> >>> Workgroup and some of the efforts that we can focus on.
> >>>
> >>> The charter of the workgroup is to provide on-going security
> >>> verification of Linux kernel subsystems in order to assist in securing
> >>> the
> >>> Linux Kernel and maintain trust and confidence in the security of the
> >>> Linux
> >>> ecosystem.
> >>>
> >>> This may include, but is not limited to, topics such as tooling to assist
> >>> in
> >>> securing the Linux Kernel, verification and testing of critical
> >>> subsystems
> >>> for vulnerabilities, security improvements for build tools, and providing
> >>> guidance for maintaining subsystem security.
> >>
> >>
> >> Thanks for getting this rolling!
> >>
> >> What are the next steps? Does it make sense to try to gather a list of
> >> active projects to try and see where things currently stand? (i.e who
> >> is actively running smatch, trinity, etc?) Or to call attention to a
> >> specific subsystem that needs direct auditing (e.g. KVM)?
> >>
> >> -Kees
> >>
> >
> > No problem, thanks for the input!
> >
> > I think having a list of active projects is a good place to start.
> 
> I know Dan Carpenter is running smatch, as well as Fengguang Wu.
> Getting details on which trees are being scanned would be good.
> 

I run it against linux-next x86_64 allmodconfig.

regards,
dan carpenter

^ permalink raw reply	[flat|nested] 14+ messages in thread

* Re: [kernel-hardening] Re: Linux Security Workgroup
  2012-10-02 22:17     ` Kees Cook
  2012-10-03  5:38       ` Julia Lawall
  2012-10-03  5:45       ` Dan Carpenter
@ 2012-10-03 21:59       ` Corey Bryant
  2012-10-04  5:29         ` James Morris
  2012-10-08 17:52       ` Corey Bryant
  3 siblings, 1 reply; 14+ messages in thread
From: Corey Bryant @ 2012-10-03 21:59 UTC (permalink / raw)
  To: kernel-hardening, Kees Cook, James Morris
  Cc: Julia Lawall, Theodore Tso, Paul Moore, Eric Paris, Tyler Hicks,
	zohar, john.johansen, Dan Carpenter, Fengguang Wu



On 10/02/2012 06:17 PM, Kees Cook wrote:
> On Tue, Oct 2, 2012 at 9:44 AM, Corey Bryant <coreyb@linux.vnet.ibm.com> wrote:
>>
>>
>> On 10/02/2012 12:23 PM, Kees Cook wrote:
>>>
>>> On Thu, Sep 27, 2012 at 12:26 PM, Corey Bryant
>>> <coreyb@linux.vnet.ibm.com> wrote:
>>>>
>>>> At the Linux Security Summit we began discussing the Linux Security
>>>> Workgroup and some of the efforts that we can focus on.
>>>>
>>>> The charter of the workgroup is to provide on-going security
>>>> verification of Linux kernel subsystems in order to assist in securing
>>>> the
>>>> Linux Kernel and maintain trust and confidence in the security of the
>>>> Linux
>>>> ecosystem.
>>>>
>>>> This may include, but is not limited to, topics such as tooling to assist
>>>> in
>>>> securing the Linux Kernel, verification and testing of critical
>>>> subsystems
>>>> for vulnerabilities, security improvements for build tools, and providing
>>>> guidance for maintaining subsystem security.
>>>
>>>
>>> Thanks for getting this rolling!
>>>
>>> What are the next steps? Does it make sense to try to gather a list of
>>> active projects to try and see where things currently stand? (i.e who
>>> is actively running smatch, trinity, etc?) Or to call attention to a
>>> specific subsystem that needs direct auditing (e.g. KVM)?
>>>
>>> -Kees
>>>
>>
>> No problem, thanks for the input!
>>
>> I think having a list of active projects is a good place to start.
>
> I know Dan Carpenter is running smatch, as well as Fengguang Wu.
> Getting details on which trees are being scanned would be good.
>
> I know Fengguang Wu is running trinity too.
>
> There is a collection of coccinelle scripts in the tree, but I'm not
> sure if/when those are getting run by anyone. Julia, do you know if
> those are being regularly run?
>

Great, thanks for the info.

>> Perhaps we can also add desired projects to this list, and if anyone has
>> cycles to cover a project they can put their name to the project.
>
> I was keeping a list of potential hardening work here:
> https://wiki.ubuntu.com/SecurityTeam/Roadmap/KernelHardening#Upstream_Hardening
> some of it is out of date.
>

Ok so I guess it doesn't make sense to re-invent these details on 
another wiki.  Although in the long run it may be nice to have 
everything in one place (active projects and desired projects).

>> I'm personally trying to get time allocated to work on KVM fuzzing and/or
>> static analysis in 2013.
>
> Sounds good.
>
>> A wiki probably makes sense for the list.  Google sites has wikis.  I can
>> start one there unless there are other ideas.
>
> Kernel.org hosts wikis as well, and James Morris already has
> http://kernsec.org/. Perhaps we can use that? James, would this be
> something you'd be okay with?

That sounds good to me if it's okay with James.

-- 
Regards,
Corey Bryant

>
> Thanks,
>
> -Kees
>

^ permalink raw reply	[flat|nested] 14+ messages in thread

* Re: [kernel-hardening] Re: Linux Security Workgroup
  2012-10-03 21:59       ` Corey Bryant
@ 2012-10-04  5:29         ` James Morris
  0 siblings, 0 replies; 14+ messages in thread
From: James Morris @ 2012-10-04  5:29 UTC (permalink / raw)
  To: Corey Bryant
  Cc: kernel-hardening, Kees Cook, Julia Lawall, Theodore Tso,
	Paul Moore, Eric Paris, Tyler Hicks, zohar, john.johansen,
	Dan Carpenter, Fengguang Wu

On Wed, 3 Oct 2012, Corey Bryant wrote:

> > http://kernsec.org/. Perhaps we can use that? James, would this be
> > something you'd be okay with?
> 
> That sounds good to me if it's okay with James.

Sounds good -- email me if you want an account there.


-- 
James Morris
<jmorris@namei.org>

^ permalink raw reply	[flat|nested] 14+ messages in thread

* Re: [kernel-hardening] Re: Linux Security Workgroup
  2012-10-02 22:17     ` Kees Cook
                         ` (2 preceding siblings ...)
  2012-10-03 21:59       ` Corey Bryant
@ 2012-10-08 17:52       ` Corey Bryant
  2012-10-08 20:00         ` Kees Cook
  2012-10-08 21:11         ` Paul Moore
  3 siblings, 2 replies; 14+ messages in thread
From: Corey Bryant @ 2012-10-08 17:52 UTC (permalink / raw)
  To: kernel-hardening
  Cc: Kees Cook, Julia Lawall, James Morris, Theodore Tso, Paul Moore,
	Eric Paris, Tyler Hicks, zohar, john.johansen, Dan Carpenter,
	Fengguang Wu



On 10/02/2012 06:17 PM, Kees Cook wrote:
> On Tue, Oct 2, 2012 at 9:44 AM, Corey Bryant <coreyb@linux.vnet.ibm.com> wrote:
>>
>>
>> On 10/02/2012 12:23 PM, Kees Cook wrote:
>>>
>>> On Thu, Sep 27, 2012 at 12:26 PM, Corey Bryant
>>> <coreyb@linux.vnet.ibm.com> wrote:
>>>>
>>>> At the Linux Security Summit we began discussing the Linux Security
>>>> Workgroup and some of the efforts that we can focus on.
>>>>
>>>> The charter of the workgroup is to provide on-going security
>>>> verification of Linux kernel subsystems in order to assist in securing
>>>> the
>>>> Linux Kernel and maintain trust and confidence in the security of the
>>>> Linux
>>>> ecosystem.
>>>>
>>>> This may include, but is not limited to, topics such as tooling to assist
>>>> in
>>>> securing the Linux Kernel, verification and testing of critical
>>>> subsystems
>>>> for vulnerabilities, security improvements for build tools, and providing
>>>> guidance for maintaining subsystem security.
>>>
>>>
>>> Thanks for getting this rolling!
>>>
>>> What are the next steps? Does it make sense to try to gather a list of
>>> active projects to try and see where things currently stand? (i.e who
>>> is actively running smatch, trinity, etc?) Or to call attention to a
>>> specific subsystem that needs direct auditing (e.g. KVM)?
>>>
>>> -Kees
>>>
>>
>> No problem, thanks for the input!
>>
>> I think having a list of active projects is a good place to start.
>
> I know Dan Carpenter is running smatch, as well as Fengguang Wu.
> Getting details on which trees are being scanned would be good.
>
> I know Fengguang Wu is running trinity too.
>
> There is a collection of coccinelle scripts in the tree, but I'm not
> sure if/when those are getting run by anyone. Julia, do you know if
> those are being regularly run?
>
>> Perhaps we can also add desired projects to this list, and if anyone has
>> cycles to cover a project they can put their name to the project.
>
> I was keeping a list of potential hardening work here:
> https://wiki.ubuntu.com/SecurityTeam/Roadmap/KernelHardening#Upstream_Hardening
> some of it is out of date.
>
>> I'm personally trying to get time allocated to work on KVM fuzzing and/or
>> static analysis in 2013.
>
> Sounds good.
>
>> A wiki probably makes sense for the list.  Google sites has wikis.  I can
>> start one there unless there are other ideas.
>
> Kernel.org hosts wikis as well, and James Morris already has
> http://kernsec.org/. Perhaps we can use that? James, would this be
> something you'd be okay with?

Here's a start on the wiki.  There's not really a whole lot on it other 
than what we've discussed on the list, but it's a start.  Comments and 
updates are very much welcome.

http://kernsec.org/wiki/index.php/Linux_Security_Workgroup

A couple of questions:
  * What should the work group's scope be?  The charter mentions " ... 
on-going security verification of Linux kernel subsystems ... ".  I was 
thinking it would focus more on items like: fuzzing, static analysis, 
education for reviewing code, tooling/build security enhancements.  But 
I have a feeling it will start to include Kernel development projects too.
  * Where should we document inactive, but desired, projects?  I know 
Kees has https://wiki.ubuntu.com/SecurityTeam/Roadmap/KernelHardening 
but I'm wondering if it makes sense to keep track of work items on the 
same wiki.

-- 
Regards,
Corey Bryant

^ permalink raw reply	[flat|nested] 14+ messages in thread

* Re: [kernel-hardening] Re: Linux Security Workgroup
  2012-10-08 17:52       ` Corey Bryant
@ 2012-10-08 20:00         ` Kees Cook
  2012-10-08 20:59           ` Corey Bryant
  2012-10-08 21:11         ` Paul Moore
  1 sibling, 1 reply; 14+ messages in thread
From: Kees Cook @ 2012-10-08 20:00 UTC (permalink / raw)
  To: Corey Bryant
  Cc: kernel-hardening, Julia Lawall, James Morris, Theodore Tso,
	Paul Moore, Eric Paris, Tyler Hicks, zohar, john.johansen,
	Dan Carpenter, Fengguang Wu

On Mon, Oct 8, 2012 at 10:52 AM, Corey Bryant <coreyb@linux.vnet.ibm.com> wrote:
> Here's a start on the wiki.  There's not really a whole lot on it other than
> what we've discussed on the list, but it's a start.  Comments and updates
> are very much welcome.
>
> http://kernsec.org/wiki/index.php/Linux_Security_Workgroup

Cool! This looks good.

We may want to add a mailing list pointer to this top-level page, so
people can find this list more directly.

> A couple of questions:
>  * What should the work group's scope be?  The charter mentions " ...
> on-going security verification of Linux kernel subsystems ... ".  I was
> thinking it would focus more on items like: fuzzing, static analysis,
> education for reviewing code, tooling/build security enhancements.  But I
> have a feeling it will start to include Kernel development projects too.

I think it should, yes. Finding bugs is, of course, important, but I'd
like to have a single point of contact for development tasks too.

>  * Where should we document inactive, but desired, projects?  I know Kees
> has https://wiki.ubuntu.com/SecurityTeam/Roadmap/KernelHardening but I'm
> wondering if it makes sense to keep track of work items on the same wiki.

I'll take a TODO to build up a Development section on the wiki and
move things from the ubuntu wik

-Kees

-- 
Kees Cook
Chrome OS Security

^ permalink raw reply	[flat|nested] 14+ messages in thread

* Re: [kernel-hardening] Re: Linux Security Workgroup
  2012-10-08 20:00         ` Kees Cook
@ 2012-10-08 20:59           ` Corey Bryant
  0 siblings, 0 replies; 14+ messages in thread
From: Corey Bryant @ 2012-10-08 20:59 UTC (permalink / raw)
  To: Kees Cook
  Cc: kernel-hardening, Julia Lawall, James Morris, Theodore Tso,
	Paul Moore, Eric Paris, Tyler Hicks, zohar, john.johansen,
	Dan Carpenter, Fengguang Wu



On 10/08/2012 04:00 PM, Kees Cook wrote:
> On Mon, Oct 8, 2012 at 10:52 AM, Corey Bryant <coreyb@linux.vnet.ibm.com> wrote:
>> Here's a start on the wiki.  There's not really a whole lot on it other than
>> what we've discussed on the list, but it's a start.  Comments and updates
>> are very much welcome.
>>
>> http://kernsec.org/wiki/index.php/Linux_Security_Workgroup
>
> Cool! This looks good.
>
> We may want to add a mailing list pointer to this top-level page, so
> people can find this list more directly.

Good idea, I've added this.

>
>> A couple of questions:
>>   * What should the work group's scope be?  The charter mentions " ...
>> on-going security verification of Linux kernel subsystems ... ".  I was
>> thinking it would focus more on items like: fuzzing, static analysis,
>> education for reviewing code, tooling/build security enhancements.  But I
>> have a feeling it will start to include Kernel development projects too.
>
> I think it should, yes. Finding bugs is, of course, important, but I'd
> like to have a single point of contact for development tasks too.
>

That's fine with me.  I just want to have a clear understanding more 
than anything.

>>   * Where should we document inactive, but desired, projects?  I know Kees
>> has https://wiki.ubuntu.com/SecurityTeam/Roadmap/KernelHardening but I'm
>> wondering if it makes sense to keep track of work items on the same wiki.
>
> I'll take a TODO to build up a Development section on the wiki and
> move things from the ubuntu wik

Awesome, thanks!

-- 
Regards,
Corey Bryant

^ permalink raw reply	[flat|nested] 14+ messages in thread

* Re: [kernel-hardening] Re: Linux Security Workgroup
  2012-10-08 17:52       ` Corey Bryant
  2012-10-08 20:00         ` Kees Cook
@ 2012-10-08 21:11         ` Paul Moore
  2012-10-08 21:49           ` Kees Cook
  2012-10-09 14:07           ` Corey Bryant
  1 sibling, 2 replies; 14+ messages in thread
From: Paul Moore @ 2012-10-08 21:11 UTC (permalink / raw)
  To: Corey Bryant
  Cc: kernel-hardening, Kees Cook, Julia Lawall, James Morris,
	Theodore Tso, Eric Paris, Tyler Hicks, zohar, john.johansen,
	Dan Carpenter, Fengguang Wu

On Monday, October 08, 2012 01:52:02 PM Corey Bryant wrote:
> Here's a start on the wiki.  There's not really a whole lot on it other
> than what we've discussed on the list, but it's a start.  Comments and
> updates are very much welcome.
> 
> http://kernsec.org/wiki/index.php/Linux_Security_Workgroup

Thanks for pulling this together.

I haven't forgotten about my TODO from the summit to look into running 
Coverity on the upstream kernel on a regular basis, I've just been stuck on 
other things since returning.  Unfortunately, the next couple of weeks will be 
a bit tricky too, but I hope to be able to report something back in early 
November.

-- 
paul moore
security and virtualization @ redhat

^ permalink raw reply	[flat|nested] 14+ messages in thread

* Re: [kernel-hardening] Re: Linux Security Workgroup
  2012-10-08 21:11         ` Paul Moore
@ 2012-10-08 21:49           ` Kees Cook
  2012-10-09 14:07           ` Corey Bryant
  1 sibling, 0 replies; 14+ messages in thread
From: Kees Cook @ 2012-10-08 21:49 UTC (permalink / raw)
  To: Paul Moore
  Cc: Corey Bryant, kernel-hardening, Julia Lawall, James Morris,
	Theodore Tso, Eric Paris, Tyler Hicks, zohar, john.johansen,
	Dan Carpenter, Fengguang Wu

On Mon, Oct 8, 2012 at 2:11 PM, Paul Moore <pmoore@redhat.com> wrote:
> On Monday, October 08, 2012 01:52:02 PM Corey Bryant wrote:
>> Here's a start on the wiki.  There's not really a whole lot on it other
>> than what we've discussed on the list, but it's a start.  Comments and
>> updates are very much welcome.
>>
>> http://kernsec.org/wiki/index.php/Linux_Security_Workgroup
>
> Thanks for pulling this together.
>
> I haven't forgotten about my TODO from the summit to look into running
> Coverity on the upstream kernel on a regular basis, I've just been stuck on
> other things since returning.  Unfortunately, the next couple of weeks will be
> a bit tricky too, but I hope to be able to report something back in early
> November.

Cool, thanks. I've added your name next to the Coverity project item.
(And I renamed the page to just "Active Projects".)

-Kees

-- 
Kees Cook
Chrome OS Security

^ permalink raw reply	[flat|nested] 14+ messages in thread

* Re: [kernel-hardening] Re: Linux Security Workgroup
  2012-10-08 21:11         ` Paul Moore
  2012-10-08 21:49           ` Kees Cook
@ 2012-10-09 14:07           ` Corey Bryant
  1 sibling, 0 replies; 14+ messages in thread
From: Corey Bryant @ 2012-10-09 14:07 UTC (permalink / raw)
  To: Paul Moore
  Cc: kernel-hardening, Kees Cook, Julia Lawall, James Morris,
	Theodore Tso, Eric Paris, Tyler Hicks, zohar, john.johansen,
	Dan Carpenter, Fengguang Wu



On 10/08/2012 05:11 PM, Paul Moore wrote:
> On Monday, October 08, 2012 01:52:02 PM Corey Bryant wrote:
>> Here's a start on the wiki.  There's not really a whole lot on it other
>> than what we've discussed on the list, but it's a start.  Comments and
>> updates are very much welcome.
>>
>> http://kernsec.org/wiki/index.php/Linux_Security_Workgroup
>
> Thanks for pulling this together.
>
> I haven't forgotten about my TODO from the summit to look into running
> Coverity on the upstream kernel on a regular basis, I've just been stuck on
> other things since returning.  Unfortunately, the next couple of weeks will be
> a bit tricky too, but I hope to be able to report something back in early
> November.
>

Thanks Paul!

-- 
Regards,
Corey Bryant

^ permalink raw reply	[flat|nested] 14+ messages in thread

end of thread, other threads:[~2012-10-09 14:07 UTC | newest]

Thread overview: 14+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2012-09-27 19:26 [kernel-hardening] Linux Security Workgroup Corey Bryant
2012-10-02 16:23 ` [kernel-hardening] " Kees Cook
2012-10-02 16:44   ` Corey Bryant
2012-10-02 22:17     ` Kees Cook
2012-10-03  5:38       ` Julia Lawall
2012-10-03  5:45       ` Dan Carpenter
2012-10-03 21:59       ` Corey Bryant
2012-10-04  5:29         ` James Morris
2012-10-08 17:52       ` Corey Bryant
2012-10-08 20:00         ` Kees Cook
2012-10-08 20:59           ` Corey Bryant
2012-10-08 21:11         ` Paul Moore
2012-10-08 21:49           ` Kees Cook
2012-10-09 14:07           ` Corey Bryant

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.