Received: by 2002:a5d:9c59:0:0:0:0:0 with SMTP id 25csp551774iof; Mon, 6 Jun 2022 08:22:01 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwQL5oVgWIO1v1ULszsdkoM4py+igZYEWXi3FMEAX1lqgRr3udp0c10exApIUF5OcL/c/gV X-Received: by 2002:a63:480c:0:b0:3fa:7277:bf34 with SMTP id v12-20020a63480c000000b003fa7277bf34mr21677468pga.35.1654528921817; Mon, 06 Jun 2022 08:22:01 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1654528921; cv=none; d=google.com; s=arc-20160816; b=uBGf54ylh/XgtVLIgF/k1pTqBrStEScy6mZi9FiQEr7nKIthUhNgOYXvSVq0M7eWjB DIWVGYqcaVWrncljI1gJNk8sDhCtV0Ec9LQu1g6HmvQhAcVO+GgLOEvbJUjGdwoHvfId 36izR+MVdhnbqX2Ngcyk2qRHZXsWFp1HqxjgDQmlTdhOrA5QSbw22WJZbIZZCvklqZnG DmmgWa2VjGB7B1D0YpTVYv9/+cxdCgsCRFIblbebOiF4821w9jxgM1ln40bAGsSuYzRq aupkiMXEa+f1SX4MP/OxdK66AHJlWDTcnGIQxLC2cbEfGjeeVNI1nrGtMYrUYspqbrzi 5hVQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date; bh=luN0dYSt27Clf+yNvXXO9bu4qVPot323D5/C2FQP2lw=; b=FoBjPqEluEnEXLi9HRJeHN8XeAF/BPe95M3731QJK/koiuQm0Eu2Eabt6R4s6Y6kZd BuuA1kGg2sRx34+xsFEEfUCJW/2eCNHZ15urx7NyyU/NWXpSpE+HAJr1aD07F30C2k9D ofGYokSnl6a63urjzaKyxgAYLv50aPbh+MAa3OjvM4rY7Z/SeLXvrBUzT3SvijBx0YVg 4/dyhHnN0IRPbUF1ES3/s8lh/U2PrThnG4acWMsV/aSFwahnvFSLosjDEqj2eDJywM5r 95aFq7i6X+OIBFP5lMNSHg8uz47pE8aJ9RyXXKp7o6x9mGF/mjGOPqr3cZG2mYpcEeWf Vujg== ARC-Authentication-Results: i=1; mx.google.com; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [23.128.96.19]) by mx.google.com with ESMTPS id g22-20020a635656000000b003ab97181f95si20582748pgm.845.2022.06.06.08.22.01 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 06 Jun 2022 08:22:01 -0700 (PDT) Received-SPF: softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) client-ip=23.128.96.19; Authentication-Results: mx.google.com; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 2B030F5D01; Mon, 6 Jun 2022 08:08:56 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S240308AbiFFPIo (ORCPT + 99 others); Mon, 6 Jun 2022 11:08:44 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:52102 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S240093AbiFFPIk (ORCPT ); Mon, 6 Jun 2022 11:08:40 -0400 Received: from 1wt.eu (wtarreau.pck.nerim.net [62.212.114.60]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 5184DC687F; Mon, 6 Jun 2022 08:08:37 -0700 (PDT) Received: (from willy@localhost) by pcw.home.local (8.15.2/8.15.2/Submit) id 256F72xB004867; Mon, 6 Jun 2022 17:07:02 +0200 Date: Mon, 6 Jun 2022 17:07:02 +0200 From: Willy Tarreau To: Vegard Nossum Cc: Jonathan Corbet , linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org, Amit Shah , Dave Hansen , David Woodhouse , Greg Kroah-Hartman , "Gustavo A . R . Silva" , Jiri Kosina , Kees Cook , Laura Abbott , Linus Torvalds , Mauro Carvalho Chehab , Paolo Bonzini , Peter Zijlstra , Solar Designer , Thomas Gleixner , Thorsten Leemhuis , Tyler Hicks , Will Deacon Subject: Re: [PATCH] Documentation/security-bugs: overhaul Message-ID: <20220606150702.GA4838@1wt.eu> References: <20220531230309.9290-1-vegard.nossum@oracle.com> <20220601031254.GB26318@1wt.eu> <42200c3e-fb39-ddab-3d68-5dfb5eb89451@oracle.com> <20220603064924.GC29741@1wt.eu> <303283d9-5f1c-8bc7-6286-ce284de012a8@oracle.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <303283d9-5f1c-8bc7-6286-ce284de012a8@oracle.com> User-Agent: Mutt/1.10.1 (2018-07-13) X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,RDNS_NONE, SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Vegard, On Mon, Jun 06, 2022 at 04:21:40PM +0200, Vegard Nossum wrote: > I think this points to a bigger problem, but not with CVEs being held up > as trophies. There's already a huge monetary incentive to find bugs and > sell them as 0-days so IMHO we _should_ be encouraging people to find > bugs and either fix or report them, whether privately or publicly. If > having CVEs helps with that, that ought to be a good thing... Yes I'm fine with this approach, provided that we encourage the reporters to figure by themselves where to report them. In my opinion, what only refers to very old hardware, to anything that's not built by default, that requires code change to prove the problem, or that is only theoretical ought not be sent to a closed list. The purpose of closed lists is to deal with emergencies, issues that could put users in trouble if they were disclosed before a fix is merged. > If you think a reported issue is not security-relevant, can you not > simply ask/encourage the reporter to make a public post instead? We regularly do, but it's important also not to send a cold shower to the person who already prepared their work and report in a direction that they thought was the most suitable one, just to learn the hard way that what they found was not that important. > If the security team is swamped with legitimate, security-relevant > reports, then that sounds like an issue with manpower and/or > organization. In my (admittedly limited) experience, Linus tends to be > one of the first to reply, so maybe having a designated person or group > to triage issues (maybe in a rota system) before engaging the rest of > the team could take some of the pressure off? Actually all of the members are expected to respond. I personally consider it as a failure when Linus has to respond to a message that stayed there for a while. And it does happen quite a bit, yes. I guess that often none of us feels like we're knowledgeable on a particular report. > > As such I think that we could mention something along: > > > > Upon reporters' request in case a forthcoming presentation of the issue > > is planned, it may occasionally be accepted to temporarily keep out some > > of the detailed impacts of the issue, however the security team reserves > > the right to publicize these details if no other publication happens in > > a reasonable time frame or as soon as the fixes are found to cause a > > regression. > > > > Because quite frankly, not being able to explain exactly why a patch is > > done this way and not slightly differently is not acceptable. > > This unfortunately directly contradicts the current policy as stated: > > "All other information submitted to the security list and any followup > discussions of the report are treated confidentially even after the > embargo has been lifted, in perpetuity." IMHO there's a big difference between disclosing confidential information (which we never do) and explaining what makes a bug have a security impact. The purpose of the commit message is to serve as arguments to defend the commit's presence in the tree. Most of the info must be there, except what's not needed to understand the bug (e.g. exploitation method). Then the rest of the details ought to be disclosed fast enough for the commit to be defended. Of course the context where the issue was discovered has to remain confidential. > So again, unless there's a clear consensus to change this, I wouldn't be > comfortable making the change now. Yeah I'm fine with this of course, but I wanted to take the opportunity of your discussion to bring these concerns since they're also about the instructions in the doc. > If I could make a different suggestion (which is in the same spirit as > the rewrite, actually), the security team could encourage the reporter > to report to linux-distros once there is a patch or the patch is public > -- that way, it's: 1) not on the security team to disclose anything, 2) > distros get a heads up on the patch, and 3) everybody gets to know about > the security impact of the bug when it is eventually posted to > oss-security within 1-2 weeks. Maybe that could work, let's keep thinking about this. > Thanks for your comments/explanations, it certainly helps to have more > perspective. You're welcome. We're all in the same boat :-) Willy