Re: Security release criterion proposal

2011-05-20 Thread Björn Persson
Kevin Kofler wrote: > The "heaps" of users do not install Fedora the day of the release. > Only very few very enthousiastic and very impatient early adopters do that > (and I blame them for needlessly swamping our mirrors). If they are so very few, how can they swamp a couple hundred big FTP archi

Re: Security release criterion proposal

2011-05-20 Thread Björn Persson
Adam Williamson wrote: > # There must be no known remote code execution vulnerability which could > be exploited during installation or during use of a live image shipped > with the release If the installer would download packages during the installation, and an attacker could trick it into downl

Re: Security release criterion proposal

2011-05-18 Thread Adam Williamson
On Thu, 2011-05-19 at 10:00 +0800, Eugene Teo wrote: > I say, local privilege escalations with publicly available exploits, and > remotely triggerable vulnerabilities. If such an issue is known before > Final, we should attempt to address it before releasing. Note, a release criterion would have

Re: Security release criterion proposal

2011-05-18 Thread Kevin Kofler
Adam Jackson wrote: > On 5/18/11 4:49 PM, Kevin Kofler wrote: >> The thing is, if we block the release for each and every known security >> issue, considering the time passing between notification and public >> availability of a fix, we will never be able to release anything. We have >> to draw th

Re: Security release criterion proposal

2011-05-18 Thread Kevin Kofler
Simo Sorce wrote: > Is it unthinkable to respin the images with those fixes ? > Usually the patches are quite simple to backport, and we are talking > about a limited set of bugs (remote root exploit on install) after all. Then we'd need a second (or third, if the Features repo finally happens) u

Re: Security release criterion proposal

2011-05-18 Thread Adam Williamson
On Wed, 2011-05-18 at 22:49 +0200, Kevin Kofler wrote: > The thing is, if we block the release for each and every known security > issue, considering the time passing between notification and public > availability of a fix, we will never be able to release anything. We have to > draw the line s

Re: Security release criterion proposal

2011-05-18 Thread Kevin Kofler
Tomas Mraz wrote: > Also note that targeting the heaps of poor users that are eager to try > the newly shipped Fedora release would be probably much more easy and > efficient than targeting one user installing the Fedora here or there a > few months later. Huh? The "heaps" of users do not install

Re: Security release criterion proposal

2011-05-18 Thread Adam Jackson
On 5/18/11 4:49 PM, Kevin Kofler wrote: > The thing is, if we block the release for each and every known security > issue, considering the time passing between notification and public > availability of a fix, we will never be able to release anything. We have to > draw the line somewhere, and the b

Re: Security release criterion proposal

2011-05-18 Thread Adam Williamson
On Wed, 2011-05-18 at 15:43 -0500, dr johnson wrote: > > Few questions here: > > What does this scope include? Is it merely the LiveCD for GNOME and > KDE? Does it also include the DVD install selections for both of > these packages? (They are different) Well, that's part of the discussion I

Re: Security release criterion proposal

2011-05-18 Thread Kevin Kofler
Adam Jackson wrote: > It's a rationally argued position, but argued from an initial state that > does not reflect reality. > > I mean, the conclusion from that line of reasoning is that all releases > are futile: any sufficiently severe bug unknown at release time could be > discovered later, and

Re: Security release criterion proposal

2011-05-18 Thread dr johnson
Few questions here: What does this scope include? Is it merely the LiveCD for GNOME and KDE? Does it also include the DVD install selections for both of these packages? (They are different) What about clearly vulnerable areas, like "Web Sever" that is push-button selectable on install? Do we ma

Re: Security release criterion proposal

2011-05-18 Thread Kevin Kofler
Adam Jackson wrote: > The difference between a known and an unknown security bug is that, if > _you_ know about it, it's virtually certain that someone malicious > already does too. > > We can't avoid unknown risk exposure. You're arguing for ignoring known > risk exposure entirely. Seems a touc

Re: Security release criterion proposal

2011-05-18 Thread Tomas Mraz
On Wed, 2011-05-18 at 14:02 -0400, Adam Jackson wrote: > On 5/18/11 1:44 PM, Adam Williamson wrote: > > On Wed, 2011-05-18 at 13:37 -0400, Adam Jackson wrote: > >> On 5/18/11 1:22 PM, Kevin Kofler wrote: > >>> Adam Williamson wrote: > # There must be no known remote code execution vulnerabili

Re: Security release criterion proposal

2011-05-18 Thread Adam Williamson
On Wed, 2011-05-18 at 14:40 -0400, Simo Sorce wrote: > Is it unthinkable to respin the images with those fixes ? > Usually the patches are quite simple to backport, and we are talking > about a limited set of bugs (remote root exploit on install) after all. Unthinkable, no, but there are various

Re: Security release criterion proposal

2011-05-18 Thread Simo Sorce
On Wed, 2011-05-18 at 10:44 -0700, Adam Williamson wrote: > On Wed, 2011-05-18 at 13:37 -0400, Adam Jackson wrote: > > On 5/18/11 1:22 PM, Kevin Kofler wrote: > > > Adam Williamson wrote: > > >> # There must be no known remote code execution vulnerability which could > > >> be exploited during inst

Re: Security release criterion proposal

2011-05-18 Thread Tomas Mraz
On Wed, 2011-05-18 at 08:57 -0700, Adam Williamson wrote: > Hey, all. The topic of whether and which security issues should block > releases has come up several times before. While we haven't actually had > many really serious security issues to worry about since the > introduction of the current

Re: Security release criterion proposal

2011-05-18 Thread Adam Williamson
On Wed, 2011-05-18 at 19:22 +0200, Kevin Kofler wrote: > Adam Williamson wrote: > > Hey, all. The topic of whether and which security issues should block > > releases has come up several times before. > > Indeed it has. The decision was always that it's not a good idea. I don't > see how the situ

Re: Security release criterion proposal

2011-05-18 Thread Adam Jackson
On 5/18/11 1:44 PM, Adam Williamson wrote: > On Wed, 2011-05-18 at 13:37 -0400, Adam Jackson wrote: >> On 5/18/11 1:22 PM, Kevin Kofler wrote: >>> Adam Williamson wrote: # There must be no known remote code execution vulnerability which could be exploited during installation or during use

Re: Security release criterion proposal

2011-05-18 Thread cdahlin
On Wed, May 18, 2011 at 10:44:16AM -0700, Adam Williamson wrote: > Well, I think his point is that it's almost certain that some 'unknown' > exposures will become 'known' during the life cycle of a release, at > which point the live images we release three months previously are > vulnerable to a kn

Re: Security release criterion proposal

2011-05-18 Thread Adam Williamson
On Wed, 2011-05-18 at 13:37 -0400, Adam Jackson wrote: > On 5/18/11 1:22 PM, Kevin Kofler wrote: > > Adam Williamson wrote: > >> # There must be no known remote code execution vulnerability which could > >> be exploited during installation or during use of a live image shipped > >> with the release

Re: Security release criterion proposal

2011-05-18 Thread Adam Jackson
On 5/18/11 1:22 PM, Kevin Kofler wrote: > Adam Williamson wrote: >> # There must be no known remote code execution vulnerability which could >> be exploited during installation or during use of a live image shipped >> with the release > > This is just completely and utterly moot considering that th

Re: Security release criterion proposal

2011-05-18 Thread Jóhann B. Guðmundsson
On 05/18/2011 05:18 PM, Adam Miller wrote: > On Wed, May 18, 2011 at 10:27:07PM +0530, Rahul Sundaram wrote: >> On 05/18/2011 09:58 PM, "Jóhann B. Guðmundsson" wrote: >>> On 05/18/2011 03:57 PM, Adam Williamson wrote: Feedback please! Thanks:) >>> Given that we ship selinux on by default shoul

Re: Security release criterion proposal

2011-05-18 Thread Kevin Kofler
Adam Williamson wrote: > Hey, all. The topic of whether and which security issues should block > releases has come up several times before. Indeed it has. The decision was always that it's not a good idea. I don't see how the situation has changed to warrant beating that dead horse again. > # Th

Re: Security release criterion proposal

2011-05-18 Thread Adam Miller
On Wed, May 18, 2011 at 10:27:07PM +0530, Rahul Sundaram wrote: > On 05/18/2011 09:58 PM, "Jóhann B. Guðmundsson" wrote: > > On 05/18/2011 03:57 PM, Adam Williamson wrote: > >> Feedback please! Thanks:) > > Given that we ship selinux on by default should this proposal only be > > applicable to exp

Re: Security release criterion proposal

2011-05-18 Thread Adam Jackson
On 5/18/11 11:57 AM, Adam Williamson wrote: > # There must be no known remote code execution vulnerability which could > be exploited during installation or during use of a live image shipped > with the release Seems reasonable at first glance. One anecdotal experience: FC5 (wow) shipped with an

Re: Security release criterion proposal

2011-05-18 Thread Adam Williamson
On Wed, 2011-05-18 at 16:28 +, "Jóhann B. Guðmundsson" wrote: > On 05/18/2011 03:57 PM, Adam Williamson wrote: > > Feedback please! Thanks:) > > Given that we ship selinux on by default should this proposal only be > applicable to exploits/vulnerability that selinux cant catch and prevent >

Re: Security release criterion proposal

2011-05-18 Thread Rahul Sundaram
On 05/18/2011 09:58 PM, "Jóhann B. Guðmundsson" wrote: > On 05/18/2011 03:57 PM, Adam Williamson wrote: >> Feedback please! Thanks:) > Given that we ship selinux on by default should this proposal only be > applicable to exploits/vulnerability that selinux cant catch and prevent > which leaves us

Re: Security release criterion proposal

2011-05-18 Thread Bruno Wolff III
On Wed, May 18, 2011 at 08:57:17 -0700, Adam Williamson wrote: > > # There must be no known remote code execution vulnerability which could > be exploited during installation or during use of a live image shipped > with the release > > Points to consider: I think there may be some remote expl

Re: Security release criterion proposal

2011-05-18 Thread Jóhann B. Guðmundsson
On 05/18/2011 03:57 PM, Adam Williamson wrote: > Feedback please! Thanks:) Given that we ship selinux on by default should this proposal only be applicable to exploits/vulnerability that selinux cant catch and prevent which leaves us with https://admin.fedoraproject.org/mailman/listinfo/devel

Re: Security release criterion proposal

2011-05-18 Thread Adam Williamson
On Wed, 2011-05-18 at 08:57 -0700, Adam Williamson wrote: > # There must be no known remote code execution vulnerability which could > be exploited during installation or during use of a live image shipped > with the release > > Points to consider: One more 'point to consider' that I forgot: for

Security release criterion proposal

2011-05-18 Thread Adam Williamson
Hey, all. The topic of whether and which security issues should block releases has come up several times before. While we haven't actually had many really serious security issues to worry about since the introduction of the current release criteria system, I think it's certainly something we should