ksummit.lists.linux.dev archive mirror
 help / color / mirror / Atom feed
From: Mauro Carvalho Chehab <mchehab+samsung@kernel.org>
To: Thomas Gleixner <tglx@linutronix.de>
Cc: ksummit-discuss@lists.linuxfoundation.org
Subject: Re: [Ksummit-discuss] [MAINTAINERS SUMMIT] Handling of embargoed security issues
Date: Sat, 8 Sep 2018 08:21:41 -0300	[thread overview]
Message-ID: <20180908082141.15d72684@coco.lan> (raw)
In-Reply-To: <alpine.DEB.2.21.1809081037440.1402@nanos.tec.linutronix.de>

Em Sat, 8 Sep 2018 10:56:35 +0200 (CEST)
Thomas Gleixner <tglx@linutronix.de> escreveu:

> On Fri, 7 Sep 2018, Andy Lutomirski wrote:
> > (There was another CVE that got much less press that I was involved,
> > and it didn't get much attention in Linux land because Linux was only
> > minimally affected.  Despite being an Intel/AMD issue, all of the
> > coordination was done by Microsoft, and it was done remarkably well
> > once the process actually got started.)  
> 
> The point is that the coordination done by the entity who 'owns' the thing
> is the key.

I didn't participate on handing those bugs. So, I'll give just my
2 cents here.

IMO, the problem with embargoed security issues is that the affected
vendor will very likely want to contain the ones that have access to
the bug-related information. They also want to have some legal ways
to protect their asses^Wassets if data gets disclosed.

In other words, they'll very likely require some sort of NDA. As 
we're working on different places, each one is under a different NDA
agreement with the affected vendor (and some may even not have any
signed NDA at all). I suspect that identifying who has a signed NDA
that would cover the assets for everyone that would have access to
the embargoed data can take quite some time.

> Contrary to Meltdown/Spectre Intel informed us about L1Tf halfways early
> and allowed _all_ involved parties to talk to each other.

That's probably because they had already gave some sort of 
"clearance" to the ones that handled Meltdown/Spectre.

I suspect that, if L1Tf were affecting some other vendor, it would 
also be as painful as it was for Meltdown/Spectre.

IMHO, the best would be to have a formal/legal way to handle it.

I suspect that having a single entity like LF handling a formal
process for embargoed issues could help making it smoother.
That would likely envolve having a single NDA model that could
be signed with vendors (either before of after an event like that),
and LF having pre-signed NDA with the group of maintainers/developers
that would more likely handle such issues.

> There were still
> some rough edges to bring key people like Greg in, but that was a minor
> nuisance compared to the whole Meltdown/Spectre mess.
> 
> Of course there was no communication channel which allowed us to talk in a
> workable way, but that got resolved by ourself setting up a encrypted
> mailing list which made halfways normal kernel style cooperation
> possible. That still has its rough edges vs. limited review capacity and
> testing, but compared to Meltdown/Spectre L1TF was halfways workable.

A formal agreement with a single entity could help there too.

I mean, provided that everyone's involved is under a legal umbrella,
it should be possible for the vendor to give logical access to some
of their own labs where it would be possible to run the tests with
the real thing.

> 
> So we surely have the ability to communicate properly in an embargo
> situation, but that requires that the entity who controls the issue is
> 
>  1) Telling us in time and putting all cards on the table
>  2) Setting no silly restrictions vs. who can talk to whom
> 
> That said, I agree that a more formal process with clear rules might make
> it easier for companies to handle that proper. It's definitely worth to
> try.
> 
> Though it won't make the issues which come inherently with embargo
> development go away. Mechanisms we rely on like 0-bot, kernel-ci and others
> need to grow an embargo mode as well.
> 
> Thanks,
> 
> 	tglx
> 
> 
> _______________________________________________
> Ksummit-discuss mailing list
> Ksummit-discuss@lists.linuxfoundation.org
> https://lists.linuxfoundation.org/mailman/listinfo/ksummit-discuss



Thanks,
Mauro

  reply	other threads:[~2018-09-08 11:21 UTC|newest]

Thread overview: 54+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2018-09-06 19:18 Jiri Kosina
2018-09-06 20:56 ` Linus Torvalds
2018-09-06 21:14   ` Jiri Kosina
2018-09-06 22:51     ` Eduardo Valentin
2018-09-07  9:17   ` Jani Nikula
2018-09-07 14:43   ` David Woodhouse
2018-09-06 22:55 ` Eduardo Valentin
2018-09-07  8:21   ` Geert Uytterhoeven
2018-09-10 23:26     ` Eduardo Valentin
2018-09-11  8:45       ` Greg KH
2018-09-11 17:10         ` Dave Hansen
2018-09-11 18:28           ` Greg KH
2018-09-11 18:44           ` Thomas Gleixner
2018-09-07 13:30   ` Jiri Kosina
2018-09-09 12:55     ` Greg KH
2018-09-09 19:48       ` Jiri Kosina
2018-09-10  4:04         ` Eduardo Valentin
2018-09-12  7:03           ` Greg KH
2018-09-10  4:12       ` Eduardo Valentin
2018-09-10 11:10       ` Mark Brown
2018-09-12  4:22   ` Balbir Singh
2018-09-08  4:21 ` Andy Lutomirski
2018-09-08  8:56   ` Thomas Gleixner
2018-09-08 11:21     ` Mauro Carvalho Chehab [this message]
2018-09-08 11:34       ` Greg KH
2018-09-08 14:20         ` Andy Lutomirski
2018-09-08 15:29           ` Greg KH
2018-09-08 15:00         ` James Bottomley
2018-09-08 15:32           ` Greg KH
2018-09-08 15:54             ` James Bottomley
2018-09-08 19:49               ` Linus Torvalds
2018-09-08 21:24                 ` James Bottomley
2018-09-08 22:33                   ` Andy Lutomirski
2018-09-09 12:18                     ` Mauro Carvalho Chehab
2018-09-10 22:59                 ` Dave Hansen
2018-09-11  8:48                   ` Greg KH
2018-09-09 12:51               ` Greg KH
2018-09-09 14:20                 ` Linus Torvalds
2018-09-09 14:38                   ` James Bottomley
2018-09-09 14:51                     ` Andy Lutomirski
2018-09-09 17:20                       ` Theodore Y. Ts'o
2018-09-09 17:48                         ` David Woodhouse
2018-09-09 18:17                         ` Andy Lutomirski
2018-09-09 18:56                           ` Theodore Y. Ts'o
2018-09-09 19:19                             ` Andy Lutomirski
2018-09-09 20:20                             ` Jiri Kosina
2018-09-09 21:36                               ` James Bottomley
2018-09-10  9:25                             ` Thomas Gleixner
2018-09-10 14:40                               ` James Bottomley
2018-09-11  8:20                               ` Jiri Kosina
2018-09-11  9:03                                 ` Thomas Gleixner
2018-09-09 19:41                   ` Jiri Kosina
2018-09-08 19:26           ` Jiri Kosina
2018-09-08 19:47             ` James Bottomley

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20180908082141.15d72684@coco.lan \
    --to=mchehab+samsung@kernel.org \
    --cc=ksummit-discuss@lists.linuxfoundation.org \
    --cc=tglx@linutronix.de \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox