From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from smtp1.linuxfoundation.org (smtp1.linux-foundation.org [172.17.192.35]) by mail.linuxfoundation.org (Postfix) with ESMTPS id 34448CC4 for ; Wed, 12 Sep 2018 04:22:47 +0000 (UTC) Received: from mail-pf1-f182.google.com (mail-pf1-f182.google.com [209.85.210.182]) by smtp1.linuxfoundation.org (Postfix) with ESMTPS id C53D38D for ; Wed, 12 Sep 2018 04:22:46 +0000 (UTC) Received: by mail-pf1-f182.google.com with SMTP id b11-v6so346155pfo.3 for ; Tue, 11 Sep 2018 21:22:46 -0700 (PDT) Date: Wed, 12 Sep 2018 14:22:41 +1000 From: Balbir Singh To: Eduardo Valentin Message-ID: <20180912042241.GA8537@350D> References: <20180906225531.GB2251@localhost.localdomain> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20180906225531.GB2251@localhost.localdomain> Cc: ksummit-discuss@lists.linuxfoundation.org Subject: Re: [Ksummit-discuss] [MAINTAINERS SUMMIT] Handling of embargoed security issues List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , On Thu, Sep 06, 2018 at 03:55:33PM -0700, Eduardo Valentin wrote: > Hey, > > On Thu, Sep 06, 2018 at 09:18:07PM +0200, Jiri Kosina wrote: > > I believe we have reasonably well-established process for handling > > security issues that are a matter of a single, reasonably self-contained > > fixup. > > > > Past experiences with Meltdown, Spectre and L1TF have shown that we're not > > really ready to handle that in a reasonably sane way yet. > > > > Yeah, at the end of the day we managed to have the fixes propagated in > > time to Linus' tree, to stable, and to distros as well, but it was > > completely out of anything regular, and definitely had permanent damaging > > effects (I'd say both in personal and business aspects for almost > > everybody who had to participate). > > > > I'd believe that everybody involved would agree that this didn't work > > really well, and if it potentially would have to happen again (and we > > already went through it at least twice this year), it would not be > > sustainable. > > > > I am not completely sure what we could do to improve this, especially with > > our kernel community hats on -- I am pretty sure a lot is happening on the > > corporate level between individual "corporate stakeholders". Ideas I think > > would be worth discussing: > > > > - how to adapt our processess to be able to deal with such situations > > better should they happen in the future again. So far all our > > longer-term development has been concentrated around LKML (and other > > MLs) and the existing maintainership communities / structures, but the > > embargos for new big features don't really fit into this > > > > - how to make sure that proper pressure is applied on the companies that > > are handling embargoes irresponsibly wrt. linux/opensource development > > (well, even some proprietary vendors were rather unhappy with those > > events) from us as the linux kernel community > > + and perhaps even more importantly, what exactly we should be pressing > > for > > Should we add maybe a point here to discuss which kernels are to be > considered for patching in these cases? All the stable branches? Only > mainline? Obviously, either extreme cases can hurt people. Patching > older kernels requires insane amount of work and patching only mainline > leaves distros on limbo. > I don't think we can decide, may be the right thing to do is to consider where the pressure is coming from 1. Security researcher's wanting to set aggressive embargo schedules? 2. Are distros supporting older kernels for too long? The spectre/meltdown affected all architectures/variants of CPUs and so the overhead was massive and I don't think that will change depending the layer in which a security vulnerability is discovered. > Honestly, the fact that somehow the community managed to make this to > stable (and eventually to distros) is really good. Imagine for a second > a world in which these made only mainline and no stable branch.. > Half the world would have bugs in their patches :) > In any case, maybe the community should consider what really is going to > be effectively patched. That may be an extra push for distros to upgrade > older kernels as well. > > Balbir Singh.