Re: Security release criterion proposal

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Adam Jackson wrote:
> It's a rationally argued position, but argued from an initial state that
> does not reflect reality.
> 
> I mean, the conclusion from that line of reasoning is that all releases
> are futile: any sufficiently severe bug unknown at release time could be
> discovered later, and could be so crippling as to make the release
> useless.
> 
> I don't necessarily disagree with that logic either.  However, we've
> decided to do releases.  Therefore we ought to have some standard of
> quality for release content definition.  After that it's all a matter of
> drawing the line.  I'd argue that knowingly exposing the user to a
> remote root exploit is actively negligent behaviour; remote user code
> execution, less so but still very bad; local privilege escalation, less
> so still.

The thing is, if we block the release for each and every known security 
issue, considering the time passing between notification and public 
availability of a fix, we will never be able to release anything. We have to 
draw the line somewhere, and the best way to do it is to use our time-based 
schedule.

We have done 15 releases successfully that way, what's the reason for 
changing this approach now? And how can this not lead to a chain of slippage 
where each slippage for a security fix causes several new security fixes to 
pop up, for which we slip again, ad infinitum?

We cannot fix all security issues any more that we can fix all bugs. We have 
to get SOMETHING out at some point.

> I'd rather not ship something that I _know_ will result in the user
> getting rooted.  This is so fundamental a tenet of quality that I have
> difficulty even believing someone could disagree.  I guess Kevin's brain
> is simply something I should stop being surprised by.

You don't KNOW that it will get the user rooted. Now if the hole is in a 
service listening to the Internet by default and is getting exploited by an 
automated worm, you can reasonably say that it WILL get the user rooted, but 
if it's e.g. a browser vulnerability, it will only hit the users if and when 
they access an infected or malicious site. Hopefully they'll have installed 
our 0-day security fix by then! (I'd hope sites like start.fedoraproject.org 
will not carry some trojan horse!)

And your logic is flawed in that you assume that every user installs Fedora 
the day of the release. That's actually very far from the truth. All your 
efforts to release without known security vulnerabilities are for naught 
when the next one inevitably comes up soon after the release and there won't 
be a fixed set of live images for 6 months.

        Kevin Kofler

-- 
devel mailing list
devel@xxxxxxxxxxxxxxxxxxxxxxx
https://admin.fedoraproject.org/mailman/listinfo/devel


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Fedora Announce]     [Fedora Kernel]     [Fedora Testing]     [Fedora Formulas]     [Fedora PHP Devel]     [Kernel Development]     [Fedora Legacy]     [Fedora Maintainers]     [Fedora Desktop]     [PAM]     [Red Hat Development]     [Gimp]     [Yosemite News]
  Powered by Linux