From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Authentication-Results: lists.ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=fuzziesquirrel.com (client-ip=173.167.31.197; helo=bajor.fuzziesquirrel.com; envelope-from=bradleyb@fuzziesquirrel.com; receiver=) Authentication-Results: lists.ozlabs.org; dmarc=none (p=none dis=none) header.from=fuzziesquirrel.com Received: from bajor.fuzziesquirrel.com (mail.fuzziesquirrel.com [173.167.31.197]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by lists.ozlabs.org (Postfix) with ESMTPS id 48Hyc04S0fzDqSF for ; Thu, 13 Feb 2020 11:50:38 +1100 (AEDT) X-Virus-Scanned: amavisd-new at fuzziesquirrel.com Content-Type: text/plain; charset=us-ascii Mime-Version: 1.0 (Mac OS X Mail 13.0 \(3608.60.0.2.5\)) Subject: Re: Functionality vs Security From: Brad Bishop In-Reply-To: <99262b0e-fca2-71c9-ff1f-3526ed26efd0@linux.intel.com> Date: Wed, 12 Feb 2020 19:50:33 -0500 Cc: OpenBMC Maillist , Gunnar Mills , "Mihm, James" , Joseph Reynolds Content-Transfer-Encoding: quoted-printable Message-Id: <895D5B68-8442-4E76-9143-782572C85A25@fuzziesquirrel.com> References: <62005ec9-e004-1041-7c5b-9272f8c2d854@linux.intel.com> <6F13EC73-E3F0-43D5-8E3F-1A8585918C2A@fuzziesquirrel.com> <99262b0e-fca2-71c9-ff1f-3526ed26efd0@linux.intel.com> To: James Feist X-BeenThere: openbmc@lists.ozlabs.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Development list for OpenBMC List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 13 Feb 2020 00:50:41 -0000 > On Feb 12, 2020, at 7:11 PM, James Feist = wrote: >=20 > On 2/12/20 4:05 PM, Brad Bishop wrote: >>> On Feb 12, 2020, at 4:16 PM, James Feist = wrote: >>>=20 >>> In IRC yesterday I proposed the question of whether to change the = default of bmcweb to disable REST D-Bus, or to change it in our = meta-layers only. I created the patch here: = https://gerrit.openbmc-project.xyz/c/openbmc/bmcweb/+/29344 and I am = looking for feedback. While REST D-Bus does expose many useful APIs, and = phosphor-webui depends heavily on it, it does leak information to any = logged in user. This comes to the question, should we prefer = functionality by default or security by default? It is a compile switch = either way, so each user can still decide which they prefer. I have the = opinion that the default should be the safest configuration, and if = someone wants to change that, then they can accept the risk and change = the build flag. >>>=20 >>> Thoughts? >>>=20 >>> Thanks, >>>=20 >>> James >> One idea I have is adding a new distro configuration. Today we have = openbmc-phosphor - we could add a DISTRO=3Dopenbmc-secure-at-all-costs = to meta-phosphor, and the legacy API could be disabled by default there, = and remain enabled by default in openbmc-phosphor. >=20 > I would rather see OpenBMC by default secure. I would as well. This is why I would like to see the webui patches = upstreamed. > I don't want to see CVEs caused by an insecure default configuration = in anybody's platform. Is anyone planning on opening a CVE? -brad=