Ben Reser wrote:

  > On Thu, Sep 19, 2002 at 08:15:23AM +0200, Giuseppe Ghibò wrote:
  >
  >>Well, and if the patch doesn't exists yet? And furthermore I repeat,
  >>in most cases there aren't ANY sysadmin who worries about upgrades.
  >
  >
  > It exists it just hasn't been kept up to date with the current gcc...
  > Which I have to wonder why?

Which patch are you talking for? I wasn't talking about StackGuard patch. I was
talking of an application/daemon for which could exists a known buffer
overrun but not a patch (or the patch has not yet been packaged). What to do in
this case? Turn off the machine or the services or hope not being attacked?

  > I didn't say they
  > What you're not taking in consideration here is the potential real
  > problems Mandrake would have in implementing stackguard.  Compiling
  > everything in the distro with it wouldn't probably be an option because
  > I'm positive there are at least a few things that it wouldn't work right
  > with.  Making it an option to use isn't exactly an easy thing to do
  > because it's a compile time option.  Not a run time option.  Mandrake is
  > already limited on space for new RPMS....  Where are we going to find
  > the MB if not GB's to put the duplicated RPMS?

I'm not saying compiling everything, which IMHO is too much, because for
instance there are application where  speed is of main importance (e.g. I
wouldn't like have the XFree or OpenGL SG enabled, or for instance scientific
application like Octave, etc.), but ONLY the MAIN network daemons, and as an
option. I.e. when you install them, the installer could ask you: "would you like
to install stackguarded version of networked daemons?". You answer yes, they are
installed, you answer "no", the standard RPMs (i.e. like the current ones) are
installed. How much space could take? 30-40 MBs of duplicated RPMs? Furthermore
it's not said it should be in the CDs. Could be an option and the SG daemons
could be downloaded from the net, as in the past was done with crypto things. I
don't see any difference in doing this and in what currently could be obtained
having libsafe enabled (you can disable libsafe <-> you can install regular
unstackguarded daemons).

  >
  >>If we had based our security to what other distros do, then we wouldn't
  >>have had any msec, libsafe, kernel-secure, etc. and all our security tools
  >>would
  >>have been tcp_wrappers...
  >
  >
  > You're certainly not the only distro shipping libsafe or secured
  > kernels.  And the stackguard patch to gcc isn't exactly new it's been
  > around for years.  There has to be a reason why other distros haven't
  > adopted it.   Or for that matter why Mandrake hasn't adopted it.

probably mainly for speed (since we take also a 1-5% gain of speed in
consideration, otherwise we wouldn't have had -O3 in %optflags)
and because it's not supported on recent [recents means gcc 2.9X at least] 
compilers (latest SG is of two years ago).

  >
  > However the last fear I have about implementing it is that it will make
  > the very thing worse that you claim is a reason for implementing it.
  > Patches are necessary with or without stackguard.  As I've seen happen

Nobody said that with stackguard enabled you'll don't need regular
patches: A HUGE BANNER SHOULD SAY IT when you install. It's like saying that
since you use the safety belts, you can drove safe everywhere at 250 Kph
ala Schumacher. But on the other hand it's better to use safety belts that don't
use them at all.

On the other hand since you'll probably get a DOS, you have to update anyway.

  > time and time again firewalls became an excuse for poorly implemented
  > security.  It's not that firewalls don't have a place in a security
  > regime.  It's that many of the newbie type admins you are targeting
  > your issues to will think that's all they have to do.  So indeed I fear

No it's targetted to those not doing updates anyway, either because
they can't (because the machine could not go down even for 1 second, or
because they don't know a bug exists:), either because they don't want. Yes, you
could say "You don't upgrade! Your fault, be exploited!!!".

  > that applying a bandaide (stackguard) and then the ensuing PR/marketing
  > that will surround it will create a false sense of security.  And will
  > in fact make the problem worse.

This seems the old Linus sentence: since the security is not total,
better to not use any kind of these schemes and use as only security the relying
on regular updates. A "false sense of security" is meaningless: or it protect
against a reasonable class of attacks [demonstrated by trying/attempts] (maybe 
combined together with other protection artifact: kernel, libsafe, etc.) or even 
a kid can easily defeace it, and in this case is not a protection.

  >
  > In the end between the difficulty in implementing this change and the
  > problems with the attitudes it might create I tend to think it wouldn't
  > benefit us in the long run.  I could be wrong.  But that's my opinion.

also that was MY, and only MY opinion, which, as always is VERY HUMBLE.

  >
  > At any rate though you didn't answer my question.  *WHY* have other
  > distros ignored this.  It's not like it's something nobody has known
  > about (it's been on slashdot at least once).  There has to be a reason
  > for it.  Even if it is the attitude fear that I have about it.

probably for benchmarking, the other could be that it maybe could CAUSING
crashes or because could be easily defeaced (and in this case it would be
interesting to see the papers).

  >
  > We certainly should take advantage of analysis that other distros have
  > made of the technology in determining if we should implement it.  Don't
  > you think?
  >

I think that this is important, but also not doing anything on this subject
because other distro hasn't yet done this is not the right way. Maybe they
are wondering the same of us...

Bye.
Giuseppe.




Reply via email to