Re: [openbsd] fwd: [deraadt lt;atgt; cvs.openbsd.org: http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability/]

2010-06-27 Thread pourlori
Haters please go off-list, identity is not relevant on a discussion list, I do
not need attention nor personal implication. I'd be delighted to speak about
privacy and stuff with my detractors, off-list.

SELinux is another debate, I don't want to waste your time with it. Thanks for
your participation, I was still able to get some clever answers.

It's frightening to see how easy it is to lie to people and make them believe
you're right and the others are wrong, god bless demagogy. But I'm relieved to
see that Internet is not only a place where liars and fools can speak but also a
place where truth can be unveiled.

Regards.



Re: [openbsd] fwd: [dera...@cvs.openbsd.org: http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability/]

2010-06-24 Thread pourlori
On Tue, 22 Jun 2010 21:39:10 +0200 Aaron Glenn 
aaron.gl...@gmail.com wrote:
On Tue, Jun 22, 2010 at 7:26 PM,  pourl...@hushmail.com wrote:

 I do not wish to begin a troll-like thread, I just want the 
truth.

yes you do; no you don't.
no one cares; please go away.

You are wrong, if you are unable to reply properly to my request, 
go away.
I don't know, go out, do some sports.
Didn't you just want to appear on misc@, if not you would not have 
kept misc in the discussion.

There will always be OpenBSD haters, I want to be able to have a 
constructive, fact based discussion with them.
Staying ignorant and saying go away just prove yourself ignorant 
and childish.

If someone HAS valuable information, they can reply directly, 
without replying to misc. Thank you.



Re: [openbsd] fwd: [dera...@cvs.openbsd.org: http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability/]

2010-06-24 Thread STeve Andre'
On Thursday 24 June 2010 12:52:35 pourl...@hushmail.com wrote:
 On Tue, 22 Jun 2010 21:39:10 +0200 Aaron Glenn

 aaron.gl...@gmail.com wrote:
 On Tue, Jun 22, 2010 at 7:26 PM,  pourl...@hushmail.com wrote:
  I do not wish to begin a troll-like thread, I just want the
 
 truth.
 
 yes you do; no you don't.
 no one cares; please go away.

 You are wrong, if you are unable to reply properly to my request,
 go away.
 I don't know, go out, do some sports.
 Didn't you just want to appear on misc@, if not you would not have
 kept misc in the discussion.

 There will always be OpenBSD haters, I want to be able to have a
 constructive, fact based discussion with them.
 Staying ignorant and saying go away just prove yourself ignorant
 and childish.

 If someone HAS valuable information, they can reply directly,
 without replying to misc. Thank you.

The fact of the matter is that N groups of people can think of much
the same things quite independantly of one another.  This being the
case, trying to claim 'we did it first!' is much like digging a hole in
water.  It's great exercise, amsuing for others to watch, but utterly
useless.

--STeve Andre'



Re: [openbsd] fwd: [dera...@cvs.openbsd.org: http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability/]

2010-06-24 Thread Andres Genovez
2010/6/24 STeve Andre' and...@msu.edu

 On Thursday 24 June 2010 12:52:35 pourl...@hushmail.com wrote:
  On Tue, 22 Jun 2010 21:39:10 +0200 Aaron Glenn
 
  aaron.gl...@gmail.com wrote:
  On Tue, Jun 22, 2010 at 7:26 PM,  pourl...@hushmail.com wrote:
   I do not wish to begin a troll-like thread, I just want the
  
  truth.
  
  yes you do; no you don't.
  no one cares; please go away.
 
  You are wrong, if you are unable to reply properly to my request,
  go away.
  I don't know, go out, do some sports.
  Didn't you just want to appear on misc@, if not you would not have
  kept misc in the discussion.
 
  There will always be OpenBSD haters, I want to be able to have a
  constructive, fact based discussion with them.
  Staying ignorant and saying go away just prove yourself ignorant
  and childish.
 
  If someone HAS valuable information, they can reply directly,
  without replying to misc. Thank you.

 The fact of the matter is that N groups of people can think of much
 the same things quite independantly of one another.  This being the
 case, trying to claim 'we did it first!' is much like digging a hole in
 water.  It's great exercise, amsuing for others to watch, but utterly
 useless.

 --STeve Andre'


Life is pretty simple: You do some stuff. Most fails. Some works. You
do more of what works. If it works big, others quickly copy it. Then
you do something else. The trick is the doing something else.

Leonardo da Vinci

--
Atentamente

Andris Genovez Tobar / Sistemas
http://www.crice.org



Re: [openbsd] fwd: [dera...@cvs.openbsd.org: http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability/]

2010-06-24 Thread Jacob Yocom-Piatt

pourl...@hushmail.com wrote:
There will always be OpenBSD haters, I want to be able to have a 
constructive, fact based discussion with them.
  
If someone HAS valuable information, they can reply directly, 
without replying to misc. Thank you.


  




fact: you are some douchebag who is late to the argument
fact: i am an openbsd supporter and user who does not want to listen to 
your whining


valuable information: reallocate your time doing something that does not 
expose you to be a douchebag who is too worried about being painted a 
douchebag to use a real identity. posting from anonymous hushmail 
accounts is no longer such a great idea, have a look into how 
untrustworthy hushmail.com is when it comes to the authorities.




Re: [openbsd] fwd: [dera...@cvs.openbsd.org: http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability/]

2010-06-24 Thread Henning Brauer
* pourl...@hushmail.com pourl...@hushmail.com [2010-06-22 21:31]:
 Their official explanation

sorry, but we have vacancies in our PR department, expect no
official explanations anytime soon

-- 
Henning Brauer, h...@bsws.de, henn...@openbsd.org
BS Web Services, http://bsws.de
Full-Service ISP - Secure Hosting, Mail and DNS Services
Dedicated Servers, Rootservers, Application Hosting



Re: [openbsd] fwd: [dera...@cvs.openbsd.org: http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability/]

2010-06-22 Thread pourlori
Hello misc,

I was wondering if these accusations against OpenBSD were true, 
I doubt he is lying, maybe he is just not telling the whole truth.

http://www.uaoug.org.ua/archive/msg01088.html

The first part is irrelevant, Linux may have implemented the sysctl 
switch before OpenBSD. 
However, their min_map_addr was set to 0 by default for a long 
time. Which did lead to vulnerabilities in Linux.

hey keep coming up with the same exact innovations others came up
with years before them.  Their official explanation for where they
got the W^X/ASLR ideas was a drunk guy came into their tent at one 
of
their hack-a-thons and started talking about the idea.  They had
never heard of PaX when we asked them in 2003.

I do not wish to begin a troll-like thread, I just want the truth.

Regards.

Michel Antoine
User



Re: [openbsd] fwd: [dera...@cvs.openbsd.org: http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability/]

2010-06-22 Thread Aaron Glenn
On Tue, Jun 22, 2010 at 7:26 PM,  pourl...@hushmail.com wrote:

 I do not wish to begin a troll-like thread, I just want the truth.

yes you do; no you don't.
no one cares; please go away.



Re: [openbsd] fwd: [dera...@cvs.openbsd.org: http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability/]

2010-06-22 Thread E.T
Quote from theo :

-  our kernels have no bugs 


On Tue, 22 Jun 2010 21:26:18 +0200, pourl...@hushmail.com wrote:
 Hello misc,
 
 I was wondering if these accusations against OpenBSD were true, 
 I doubt he is lying, maybe he is just not telling the whole truth.
 
 http://www.uaoug.org.ua/archive/msg01088.html
 
 The first part is irrelevant, Linux may have implemented the sysctl 
 switch before OpenBSD. 
 However, their min_map_addr was set to 0 by default for a long 
 time. Which did lead to vulnerabilities in Linux.
 
 hey keep coming up with the same exact innovations others came up
 with years before them.  Their official explanation for where they
 got the W^X/ASLR ideas was a drunk guy came into their tent at one 
 of
 their hack-a-thons and started talking about the idea.  They had
 never heard of PaX when we asked them in 2003.
 
 I do not wish to begin a troll-like thread, I just want the truth.
 
 Regards.
 
 Michel Antoine
 User

-- 
@plus



Re: http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability

2009-11-09 Thread Dale Rahn
On Sun, Nov 08, 2009 at 11:19:39PM -0500, Steve Shockley wrote:
 On 11/8/2009 1:17 PM, Dave Wilson wrote:
 An ARM laptop would be especially win :-)
 
 http://www.6ave.com/shop/Product.aspx?sku=VSLVL760-4GB
 
 Was on sale recently for $150 shipped.  No clue if it sucks.
 
I would love to see a decent (cortex based?) arm laptop/netbook.

But this one isn't: 64MB ram, 800x480 resolution, unmentioned arm processor
at unmentioned MHz, WindowsCE instead of linux?


Dale Rahn   dr...@dalerahn.com



Re: http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability

2009-11-09 Thread Laurens Vets

Dale Rahn wrote:

On Sun, Nov 08, 2009 at 11:19:39PM -0500, Steve Shockley wrote:

On 11/8/2009 1:17 PM, Dave Wilson wrote:

An ARM laptop would be especially win :-)

http://www.6ave.com/shop/Product.aspx?sku=VSLVL760-4GB

Was on sale recently for $150 shipped.  No clue if it sucks.


I would love to see a decent (cortex based?) arm laptop/netbook.

But this one isn't: 64MB ram, 800x480 resolution, unmentioned arm processor
at unmentioned MHz, WindowsCE instead of linux?


The Always Innovating Touch Book maybe?

http://www.alwaysinnovating.com/home/index.htm



Re: http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability

2009-11-09 Thread Ted Unangst
On Mon, Nov 9, 2009 at 12:40 PM, Laurens Vets laur...@daemon.be wrote:
 Dale Rahn wrote:
 But this one isn't: 64MB ram, 800x480 resolution, unmentioned arm
 processor
 at unmentioned MHz, WindowsCE instead of linux?

 The Always Innovating Touch Book maybe?

 http://www.alwaysinnovating.com/home/index.htm

My current laptop also weighs three pounds, same as the touch book,
but has a 113% bigger screen with 110% more pixels, 12 times as much
RAM, 10 times as much storage, a keyboard that works, and probably
about 16 times the processing power.

OK, I get that I'm not in the market for a netbook, but that's exactly
the point.  For people who want a real computer, suggesting they use
arm chips is a joke.  This is not the first time the issue has come
up, nor is it the first time that someone has posted a link to a
company selling a product nobody has actually ever seen.



Re: http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability

2009-11-09 Thread Luke Seubert

Dave Wilson wrote:

Toni Mueller wrote:

It's not like I was in love with x86/amd64, but it's *really*hard* to
go for something else.


Further to this, if anyone is aware of any non-x86/x64 machines which
are of similar bang-for-buck as off-the-shelf PCs, I for one would be
*very* interested to know about them.

An ARM laptop would be especially win :-)



Dave,

The Netbooked website does a good job of keeping up with the latest 
developments in netbooks, including those with ARM processors, which are 
usually referred to as Smartbooks. Run a search on arm or 
smartbook to find plenty of articles:

http://netbooked.net/home/

Expect to see more ARM powered netbooks in the coming year. And 
eventually I expect, laptops. Asus seems to be slowly re-committing to 
ARM based netbooks. Other companies are moving more quickly - I found 
the following article:

http://netbooked.net/blog/tegra-powered-mobinnova-smartbook-launches-early-jaunary-2010/

Also, digging around in the ARM Powered Products links on the 
following page will turn up some smartbooks/netbooks/small laptops:

http://www.arm.com/markets/

Cheers,
Luke Seubert



Re: http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability

2009-11-09 Thread Laurens Vets

Ted Unangst wrote:

On Mon, Nov 9, 2009 at 12:40 PM, Laurens Vets laur...@daemon.be wrote:

Dale Rahn wrote:

But this one isn't: 64MB ram, 800x480 resolution, unmentioned arm
processor
at unmentioned MHz, WindowsCE instead of linux?

The Always Innovating Touch Book maybe?

http://www.alwaysinnovating.com/home/index.htm


My current laptop also weighs three pounds, same as the touch book,
but has a 113% bigger screen with 110% more pixels, 12 times as much
RAM, 10 times as much storage, a keyboard that works, and probably
about 16 times the processing power.

OK, I get that I'm not in the market for a netbook, but that's exactly
the point.  For people who want a real computer, suggesting they use
arm chips is a joke.  This is not the first time the issue has come
up, nor is it the first time that someone has posted a link to a
company selling a product nobody has actually ever seen.


But it's not ARM, is it? :)

Tbh, I was just replying to Dale's comment: I would love to see a 
decent (cortex based?) arm laptop/netbook.




Re: http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability

2009-11-09 Thread Martin Schröder
2009/11/9 Laurens Vets laur...@daemon.be:
 Tbh, I was just replying to Dale's comment: I would love to see a decent
 (cortex based?) arm laptop/netbook.

Anybody tried porting OBSD to the Nokia N800++?

Best
Martin



Re: http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability

2009-11-09 Thread Dale Rahn
On Mon, Nov 09, 2009 at 08:59:55PM +0100, Martin Schr?der wrote:
 2009/11/9 Laurens Vets laur...@daemon.be:
  Tbh, I was just replying to Dale's comment: I would love to see a decent
  (cortex based?) arm laptop/netbook.
 
 Anybody tried porting OBSD to the Nokia N800++?
 

I wanted to try at one point in the past. However, not being able
to find out how to wire up the serial port (plus NDA documentation),
kind of put a halt on that (over 2 years ago). Now with Qemu supporting
it as a target, that effort could be worked on, however I have too many
other projects on newer faster hardware that dont get my time.

The base code for the beagle port was actually derived from the early
2420 code I had written, if one checks the copyrights. I was careful
to make certain that all of the remaining bits corresponded to beagle docs...

Dale Rahn   dr...@dalerahn.com



Re: http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability

2009-11-09 Thread Steve Shockley

On 11/9/2009 11:38 AM, Dale Rahn wrote:

I would love to see a decent (cortex based?) arm laptop/netbook.

But this one isn't: 64MB ram, 800x480 resolution, unmentioned arm processor
at unmentioned MHz, WindowsCE instead of linux?


There's also no evidence of its existence on the manufacturer's web 
site.  It's probably just an mp3 player with a keyboard so they can call 
it a netbook.




Re: http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability

2009-11-08 Thread Toni Mueller
Hi,

On Fri, 06.11.2009 at 13:41:13 +0200, Lars Nooden lars.cura...@gmail.com 
wrote:
 Unless you aren't running shit-for-architecture x86 systems still.
 It is 2009 and there are sparc, mips, freescale and arm on the market.

now you only need to educate us about how such machines can be used
in an economic fashion.

Blaming people for not running PDA cpus for core routers or not
shelling out $40k for Niagara machines (supported by OpenBSD???) when
these are even outperformed by $4k PCs in almost all practical
scenarios, just doesn't cut it. Much less so if you take the rest of
the supply chain into account.

It's not like I was in love with x86/amd64, but it's *really*hard* to
go for something else.


Kind regards,
--Toni++



Re: http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability

2009-11-08 Thread Dave Wilson
Toni Mueller wrote:
 
 now you only need to educate us about how such machines can be used
 in an economic fashion.
 
 Blaming people for not running PDA cpus for core routers or not
 shelling out $40k for Niagara machines (supported by OpenBSD???) when
 these are even outperformed by $4k PCs in almost all practical
 scenarios, just doesn't cut it. Much less so if you take the rest of
 the supply chain into account.
 
 It's not like I was in love with x86/amd64, but it's *really*hard* to
 go for something else.

Further to this, if anyone is aware of any non-x86/x64 machines which
are of similar bang-for-buck as off-the-shelf PCs, I for one would be
*very* interested to know about them.

An ARM laptop would be especially win :-)

Dave W



Re: http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability

2009-11-08 Thread Tomáš Bodžár
Then here it is http://www.alwaysinnovating.com/touchbook/

On Sun, Nov 8, 2009 at 7:17 PM, Dave Wilson richard.wil...@senokian.com wrote:
 Toni Mueller wrote:

 now you only need to educate us about how such machines can be used
 in an economic fashion.

 Blaming people for not running PDA cpus for core routers or not
 shelling out $40k for Niagara machines (supported by OpenBSD???) when
 these are even outperformed by $4k PCs in almost all practical
 scenarios, just doesn't cut it. Much less so if you take the rest of
 the supply chain into account.

 It's not like I was in love with x86/amd64, but it's *really*hard* to
 go for something else.

 Further to this, if anyone is aware of any non-x86/x64 machines which
 are of similar bang-for-buck as off-the-shelf PCs, I for one would be
 *very* interested to know about them.

 An ARM laptop would be especially win :-)

 Dave W



Re: http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability

2009-11-08 Thread Steve Shockley

On 11/8/2009 1:17 PM, Dave Wilson wrote:

An ARM laptop would be especially win :-)


http://www.6ave.com/shop/Product.aspx?sku=VSLVL760-4GB

Was on sale recently for $150 shipped.  No clue if it sucks.



Re: http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability

2009-11-07 Thread SJP Lists
2009/11/5 Justin Smith odnomz...@gmail.com:

 By default, Ubuntu 8.04 and later with a non-zero
 /proc/sys/vm/mmap_min_addr setting were not vulnerable.

 Ubuntu 8.04 released in 2008 april.


They've moved on from this then...

http://ubuntuforums.org/showthread.php?t=143334



Re: http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability/

2009-11-05 Thread ropers
2009/11/5 Tobias Ulmer tobi...@tmux.org:
 Dear sweetheart,

 On Thu, Nov 05, 2009 at 01:12:58AM +0100, Claire beuserie wrote:
 Yes, I know, I was present in the room when Illja gave the talk in 2006 at
 the CCC Kongress and the two OpenBSD developers in the room decided to
 completely ignore the exploit he showed until Miod reproduced it two weeks
 later...


 http://events.ccc.de/congress/2006/Fahrplan/day_4.en.html:
 Schedule Day 4: 30.12.2006
 11:30
 Unusual bugs Ilja

 http://openbsd.org/errata39.html:
 017: SECURITY FIX: January 3, 2007   i386 only
 Insufficient validation in vga(4) may allow an attacker to gain root
 privileges if the kernel is compiled with option PCIAGP and the actual
 device is not an AGP device. The PCIAGP option is present by default on
 i386 kernels only.

 http://blogs.23.nu/ilja/2007/01/:
 So one of the things I noticed after my unusual bugs talk, the OpenBSD
 guys fix bugs _FAST_. I mean really fast ! bugfix and announcement
 within a few days. Not many vendors can pull that off.

 Two weeks, eh? Want it in a black frame with a white caption
 reading EPIC FAIL? I'd start gimp for that.

Way ahead of you here: http://imgur.com/f5UZ9.jpg



Re: http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability/

2009-11-04 Thread ropers
From http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability/ :

 or desktop environments such as Wine

For some definitions of desktop environments.



Re: http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability/

2009-11-04 Thread Artur Grabowski
Claire beuserie claire.beuse...@gmail.com writes:

 That came out a bit weird: are you saying you knew about the bug for 2 years
 but did not fix it?

Yes. Because the solution sucks. And all others we tried were just not
workable.

Just like we knew that executable stacks can be used for exploits and
didn't fix that for many years.

//art



Re: http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability/

2009-11-04 Thread Otto Moerbeek
On Wed, Nov 04, 2009 at 02:57:59AM +0100, Claire beuserie wrote:

 Hi,
 
 On Wed, Nov 4, 2009 at 12:58 AM, Theo de Raadt dera...@cvs.openbsd.orgwrote:
 
  2) At least three of our developers were aware of this exploitation
method going back perhaps two years before than the commit, but we
gnashed our teeth a lot to try to find other solutions.  Clever
cpu architectures don't have this issue because the virtual address
spaces are seperate, so i386/amd64 are the ones with the big impact.
We did think long and hard about tlb bashing page 0 everytime we
switch into the kernel, but it still does not look attractive from
a performance standpoint.
 
 
 I'm confused.
 
 That came out a bit weird: are you saying you knew about the bug for 2 years
 but did not fix it?

Allowing a mapping at address zero is not a bug per se, but it opens a
door for other bugs to be exploited more effectively. This door has
been closed, but only after hard thinking went into how to close it.

-Otto



Re: http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability/

2009-11-04 Thread Donald Allen
On Wed, 4 Nov 2009 at 1:46 PM, Aaron Mason
simplersolut...@gmail.com wrote:
On Wed, Nov 4, 2009 at 1:04 PM, Gonzalo Lionel Rodriguez
gonz...@sepp0.com.ar wrote:
 2009/11/3 Claire beuserie claire.beuse...@gmail.com:
 Hi,

 On Wed, Nov 4, 2009 at 12:58 AM, Theo de Raadt
 dera...@cvs.openbsd.orgwrote:

 2) At least three of our developers were aware of this exploitation
   method going back perhaps two years before than the commit, but we
   gnashed our teeth a lot to try to find other solutions.  Clever
   cpu architectures don't have this issue because the virtual address
   spaces are seperate, so i386/amd64 are the ones with the big impact.
   We did think long and hard about tlb bashing page 0 everytime we
   switch into the kernel, but it still does not look attractive from
   a performance standpoint.


 I'm confused.

 That came out a bit weird: are you saying you knew about the bug for 2
 years
 but did not fix it?


 c.b-



 Linux way.



What a knob.  It makes me sad to say I used his crap now if he has
that much contempt for those who value security before practicality.

It's good to see Theo et al stick to their guns on this issue.  I'd
rather have a machine that is secure than one that can run Windows
binaries.

Wine is a good idea, but it's stifling an even better idea - making
applications compatible across multiple OSes, something that hasn't
needed to be done in the M$ world because of the stranglehold they
had/have over the consumer market.

Let's put this into perspective: Linux would absolutely jump in
popularity if Valve ported Steam and the Source engine to it, meaning
games like the Half Life series, Left 4 Dead and Team Fortress 2 could
run natively - not to mention that it would prompt other games that
sell their wares through the Steam CDS to port their games as well -
but since most of the games run just fine in Wine these days, there's
no incentive.

Linus is shooting himself in the foot and he has no idea.  Linux tries
to be everything to everyone, and by doing it the way is does, it
greatly limits its potential.

OpenBSD does one thing and does it well - being secure.  That's all
there is to it.

I think that sells OpenBSD unintentionally short. Yes, the attention
to security is of enormous value, but the care and intelligence that
characterizes the whole effort results in a system that is extremely
stable, very easy to administer, and very well documented. It is the
only system I know of, and I've tried almost all of them, that pays
attention to the things that really matter. The result is an
environment where you do your work, rather than fighting with your
tools. I replaced Linux on three laptops and a workstation with
OpenBSD (after a quick divorce from FreeBSD -- too many bugs) that I use
for general computing tasks including a lot of software development
and database work, and you couldn't pay me to go back.

I realize that I'm preaching to the choir -- you know all this. But I
think it's a mistake for (especially) the OpenBSD community to speak
of OpenBSD as just about security, when it's so much more than that.

/Don Allen


--
Aaron Mason - Programmer, open source addict
- Oh, why does everything I whip leave me?



Re: http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability

2009-11-04 Thread Justin Smith
Theo wrote:

 For the record, this particular problem was resolved in OpenBSD a
while back, in 2008.

Nice, but:

Since 2.6.23, it has been possible to prevent applications from
mapping low pages (to prevent null pointer dereferencing in the
kernel) via the /proc/sys/vm/mmap_min_addr sysctl, which sets the
minimum address allowed for such mappings.

2.6.23 released:  Tue, 9 Oct 2007

Ref:
http://lkml.org/lkml/2007/10/9/241
http://james-morris.livejournal.com/26303.html

--
JS



Re: http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability

2009-11-04 Thread Otto Moerbeek
On Wed, Nov 04, 2009 at 03:45:33PM +0100, Justin Smith wrote:

 Theo wrote:
 
  For the record, this particular problem was resolved in OpenBSD a
 while back, in 2008.
 
 Nice, but:
 
 Since 2.6.23, it has been possible to prevent applications from
 mapping low pages (to prevent null pointer dereferencing in the
 kernel) via the /proc/sys/vm/mmap_min_addr sysctl, which sets the
 minimum address allowed for such mappings.
 
 2.6.23 released:  Tue, 9 Oct 2007
 
 Ref:
 http://lkml.org/lkml/2007/10/9/241
 http://james-morris.livejournal.com/26303.html
 
 --
 JS

Optional prevention is not worth a lot.

-Otto



Re: http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability

2009-11-04 Thread Jacob Yocom-Piatt

Otto Moerbeek wrote:

On Wed, Nov 04, 2009 at 03:45:33PM +0100, Justin Smith wrote:

  

Theo wrote:



For the record, this particular problem was resolved in OpenBSD a
  

while back, in 2008.

Nice, but:

Since 2.6.23, it has been possible to prevent applications from
mapping low pages (to prevent null pointer dereferencing in the
kernel) via the /proc/sys/vm/mmap_min_addr sysctl, which sets the
minimum address allowed for such mappings.

2.6.23 released:  Tue, 9 Oct 2007

Ref:
http://lkml.org/lkml/2007/10/9/241
http://james-morris.livejournal.com/26303.html

--
JS



Optional prevention is not worth a lot.

  



not exactly on topic but Pope Benedict XVI would likely agree with otto.

see, even the pope doesn't like linus.



Re: http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability

2009-11-04 Thread Todd T. Fries
Penned by Justin Smith on 20091104 15:45.33, we have:
| Theo wrote:
| 
|  For the record, this particular problem was resolved in OpenBSD a
| while back, in 2008.
| 
| Nice, but:
| 
| Since 2.6.23, it has been possible to prevent applications from
| mapping low pages (to prevent null pointer dereferencing in the
| kernel) via the /proc/sys/vm/mmap_min_addr sysctl, which sets the
| minimum address allowed for such mappings.
| 
| 2.6.23 released:  Tue, 9 Oct 2007
| 
| Ref:
| http://lkml.org/lkml/2007/10/9/241
| http://james-morris.livejournal.com/26303.html
| 
| --
| JS

And now we get into the fun stuff.

Ever heard of 'secure by default' ?

This knob is set to '0' by default.

How many Linux installations actually read the above paragraph, understood
what value it could have to set to something other than zero, and changed
it accordingly.

'Nuff said.
-- 
Todd Fries .. t...@fries.net

 _
| \  1.636.410.0632 (voice)
| Free Daemon Consulting, LLC \  1.405.227.9094 (voice)
| http://FreeDaemonConsulting.com \  1.866.792.3418 (FAX)
| ..in support of free software solutions.  \  sip:freedae...@ekiga.net
| \  sip:4052279...@ekiga.net
 \\
 
  37E7 D3EB 74D0 8D66 A68D  B866 0326 204E 3F42 004A
http://todd.fries.net/pgp.txt



Re: http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability

2009-11-04 Thread Theo de Raadt
  For the record, this particular problem was resolved in OpenBSD a
 while back, in 2008.
 
 Nice, but:
 
 Since 2.6.23, it has been possible to prevent applications from
 mapping low pages (to prevent null pointer dereferencing in the
 kernel) via the /proc/sys/vm/mmap_min_addr sysctl, which sets the
 minimum address allowed for such mappings.
 
 2.6.23 released:  Tue, 9 Oct 2007
 
 Ref:
 http://lkml.org/lkml/2007/10/9/241
 http://james-morris.livejournal.com/26303.html

And that knob was turned off.



Re: http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability

2009-11-04 Thread Justin Smith
On Wed, Nov 4, 2009 at 4:14 PM, Todd T. Fries t...@fries.net wrote:
 Penned by Justin Smith on 20091104 15:45.33, we have:
 | Theo wrote:
 |
 |  For the record, this particular problem was resolved in OpenBSD a
 | while back, in 2008.
 |
 | Nice, but:
 |
 | Since 2.6.23, it has been possible to prevent applications from
 | mapping low pages (to prevent null pointer dereferencing in the
 | kernel) via the /proc/sys/vm/mmap_min_addr sysctl, which sets the
 | minimum address allowed for such mappings.
 |
 | 2.6.23 released:  Tue, 9 Oct 2007
 |
 | Ref:
 | http://lkml.org/lkml/2007/10/9/241
 | http://james-morris.livejournal.com/26303.html
 |
 | --
 | JS

 And now we get into the fun stuff.

 Ever heard of 'secure by default' ?

 This knob is set to '0' by default.

 How many Linux installations actually read the above paragraph, understood
 what value it could have to set to something other than zero, and changed
 it accordingly.

 'Nuff said.


By default, Ubuntu 8.04 and later with a non-zero
/proc/sys/vm/mmap_min_addr setting were not vulnerable.

Ubuntu 8.04 released in 2008 april.


--
JS



Re: http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability/

2009-11-04 Thread Stefan Wollny
 -Urspr|ngliche Nachricht-
 Von: Donald Allen donaldcal...@gmail.com
 Gesendet: 04.11.09 14:23:04
 An: misc@openbsd.org
 Betreff: Re:
http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability/

Don Allen wrote
...

 I realize that I'm preaching to the choir -- you know all this. But I
 think it's a mistake for (especially) the OpenBSD community to speak
 of OpenBSD as just about security, when it's so much more than that.

I second that - it is the attitude of how the devs (and Theo in particular)
strive for a clean code and fight the temptation to implement a 'twist' only
to allow some poorly written app to run on OpenBSD. Remember the outcry some
years ago when a change broke backward compatibility disabling some poorly
written apps to run under OpenBSD since then? 'Security' is just another
result out of this firm stand for their believes.

BTW: Anyone around who has not yet bought his set of CDs? Believe me - this is
a clever investment in future development and a fine way saying THANK YOU!

STEFAN

Mail: ste...@wollny.de
GnuPG-Key ID: 0x9C26F1D0



Re: http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability

2009-11-04 Thread Ted Unangst
On Wed, Nov 4, 2009 at 10:55 AM, Justin Smith odnomz...@gmail.com wrote:
 By default, Ubuntu 8.04 and later with a non-zero
 /proc/sys/vm/mmap_min_addr setting were not vulnerable.

 Ubuntu 8.04 released in 2008 april.

Ubuntu 8 also ships with a setuid pulseaudio by default, which renders
the mmap_min_addr protection useless.



Re: http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability

2009-11-04 Thread Ross Cameron
On Wed, Nov 4, 2009 at 5:54 PM, Theo de Raadt dera...@cvs.openbsd.org
wrote:
  For the record, this particular problem was resolved in OpenBSD a
 while back, in 2008.

 Nice, but:

 Since 2.6.23, it has been possible to prevent applications from
 mapping low pages (to prevent null pointer dereferencing in the
 kernel) via the /proc/sys/vm/mmap_min_addr sysctl, which sets the
 minimum address allowed for such mappings.

 2.6.23 released: B Tue, 9 Oct 2007

 Ref:
 http://lkml.org/lkml/2007/10/9/241
 http://james-morris.livejournal.com/26303.html

 And that knob was turned off.

Actually no it was turned on.

Fedora 8 was released in Nov 2007 and to run certain Wine applications
as non-root you had to disable the vm.mmap_min_addr sysctl.
By default it was set to a value of 65536 and you had to change this to
0.

This is well documented all over the Wine forums.
I know because this drove me up the bend when they introduced this patch.


--
Opportunity is most often missed by people because it is dressed in
overalls and looks like work.
Thomas Alva Edison
Inventor of 1093 patents, including:
The light bulb, phonogram and motion pictures.



Re: http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability

2009-11-04 Thread Matthias Kilian
On Wed, Nov 04, 2009 at 04:55:58PM +0100, Justin Smith wrote:
  And now we get into the fun stuff.
 
  Ever heard of 'secure by default' ?
 
  This knob is set to '0' by default.
 
  How many Linux installations actually read the above paragraph, understood
  what value it could have to set to something other than zero, and changed
  it accordingly.
 
  'Nuff said.
 
 
 By default, Ubuntu 8.04 and later with a non-zero
 /proc/sys/vm/mmap_min_addr setting were not vulnerable.
 
 Ubuntu 8.04 released in 2008 april.

And if you install something like wine, the knob is set back to 0,
probably without any notice (at least in ubuntu-8.10). You don't
even have to run it, just installing it is enough, if I understand
the mechanism correctly.

But more important is the fact that the original kernel sources
have the knob set to 0 by default.

Ciao,
Kili



Re: http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability

2009-11-04 Thread Jacob Meuser
On Wed, Nov 04, 2009 at 04:55:58PM +0100, Justin Smith wrote:
 On Wed, Nov 4, 2009 at 4:14 PM, Todd T. Fries t...@fries.net wrote:
  Penned by Justin Smith on 20091104 15:45.33, we have:
  | Theo wrote:
  |
  |  For the record, this particular problem was resolved in OpenBSD a
  | while back, in 2008.
  |
  | Nice, but:
  |
  | Since 2.6.23, it has been possible to prevent applications from
  | mapping low pages (to prevent null pointer dereferencing in the
  | kernel) via the /proc/sys/vm/mmap_min_addr sysctl, which sets the
  | minimum address allowed for such mappings.
  |
  | 2.6.23 released:  Tue, 9 Oct 2007
  |
  | Ref:
  | http://lkml.org/lkml/2007/10/9/241
  | http://james-morris.livejournal.com/26303.html
  |
  | --
  | JS
 
  And now we get into the fun stuff.
 
  Ever heard of 'secure by default' ?
 
  This knob is set to '0' by default.
 
  How many Linux installations actually read the above paragraph, understood
  what value it could have to set to something other than zero, and changed
  it accordingly.
 
  'Nuff said.
 
 
 By default, Ubuntu 8.04 and later with a non-zero
 /proc/sys/vm/mmap_min_addr setting were not vulnerable.
 
 Ubuntu 8.04 released in 2008 april.

quote from the article in the subject:

  The latest bug is mitigated by default on most Linux distributions,
  thanks to their correct implementation of the mmap_min_addr feature.
  But to make RHEL compatible with a larger body of applications, that
  distribution is vulnerable to attack even when the OS shows the
  feature is enabled, Spengler said.

so, on RedHat, one can't even turn it on?  doesn't Linus work for RedHat?

-- 
jake...@sdf.lonestar.org
SDF Public Access UNIX System - http://sdf.lonestar.org



Re: http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability

2009-11-04 Thread Marco Peereboom
And it is totally on on *all* 90239490234873984 distros right?

On Wed, Nov 04, 2009 at 06:43:14PM +0200, Ross Cameron wrote:
 On Wed, Nov 4, 2009 at 5:54 PM, Theo de Raadt dera...@cvs.openbsd.org
 wrote:
   For the record, this particular problem was resolved in OpenBSD a
  while back, in 2008.
 
  Nice, but:
 
  Since 2.6.23, it has been possible to prevent applications from
  mapping low pages (to prevent null pointer dereferencing in the
  kernel) via the /proc/sys/vm/mmap_min_addr sysctl, which sets the
  minimum address allowed for such mappings.
 
  2.6.23 released: B Tue, 9 Oct 2007
 
  Ref:
  http://lkml.org/lkml/2007/10/9/241
  http://james-morris.livejournal.com/26303.html
 
  And that knob was turned off.
 
 Actually no it was turned on.
 
 Fedora 8 was released in Nov 2007 and to run certain Wine applications
 as non-root you had to disable the vm.mmap_min_addr sysctl.
 By default it was set to a value of 65536 and you had to change this to
 0.
 
 This is well documented all over the Wine forums.
 I know because this drove me up the bend when they introduced this patch.
 
 
 --
 Opportunity is most often missed by people because it is dressed in
 overalls and looks like work.
 Thomas Alva Edison
 Inventor of 1093 patents, including:
 The light bulb, phonogram and motion pictures.



Re: http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability

2009-11-04 Thread Tom Van Looy
Ross Cameron wrote:
 Actually no it was turned on.

This is from the commit to the Linux kernel:

The amount of space protected is indicated by the new proc tunable
proc/sys/vm/mmap_min_addr and defaults to 0, preserving existing behavior.

It was turned off, 0 means no protection.



Re: http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability

2009-11-04 Thread Tom Van Looy
Matthias Kilian wrote:
 And if you install something like wine, the knob is set back to 0,
 probably without any notice (at least in ubuntu-8.10).

That can explain why it's off on my system (karmic koala).

By the way, this is from the debian wiki:

Debian 5.0.3 ships with a default mmap_min_addr of '0'. This means that
the Debian system, by default, is susceptible to these NULL-pointer
privilege escalation techniques. Unless you know that you have
applications that require this functionality, it is recommended that you
increase the value of mmap_min_addr on your system.

Off by default.



Re: http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability/

2009-11-04 Thread Henry Sieff
On Wed, Nov 4, 2009 at 5:18 AM, Donald Allen donaldcal...@gmail.com wrote:

[SNIP]

 I realize that I'm preaching to the choir -- you know all this. But I
 think it's a mistake for (especially) the OpenBSD community to speak
 of OpenBSD as just about security, when it's so much more than that.

I think I would rephrase that - OpenBSD is just about security, and
security implies far more than simply patching holes. Stability,
administrative transparency, and thorough documentation are all
critical and overly neglected aspects of security. If you don't know
the proper way to configure feature X, you cannot be sure it is
configured securely.

OpenBSD simply looks at security in a holistic fashion, while every
other OS I have to suffer through views security as a 'feature'.



Re: http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability/

2009-11-04 Thread Donald Allen
On Wed, Nov 4, 2009 at 1:48 PM, Henry Sieff henry.si...@gmail.com wrote:
 On Wed, Nov 4, 2009 at 5:18 AM, Donald Allen donaldcal...@gmail.com wrote:

 [SNIP]

 I realize that I'm preaching to the choir -- you know all this. But I
 think it's a mistake for (especially) the OpenBSD community to speak
 of OpenBSD as just about security, when it's so much more than that.

 I think I would rephrase that - OpenBSD is just about security, and
 security implies far more than simply patching holes. Stability,
 administrative transparency, and thorough documentation are all
 critical and overly neglected aspects of security. If you don't know
 the proper way to configure feature X, you cannot be sure it is
 configured securely.

 OpenBSD simply looks at security in a holistic fashion, while every
 other OS I have to suffer through views security as a 'feature'.

Perhaps. I don't presume to know enough about what Theo and the other
developers think or how the development is done to have an opinion on
that. But my point is that whether your assertion is true or not, the
net result is the best platform for general computing that I know of,
and not just in situations where security concerns are (or should be)
paramount. OpenBSD has been a type-cast as a smart choice in
high-vulnerability situations (where you certainly wouldn't dare use
Windows or Linux), which is true, but the problem is that the
descriptions tend to *limit* its usefulness or applicability to such
situations, leading to questions like does OpenBSD run on a laptop?.
My point is that OpenBSD is also the best choice (except if you care a
lot about Flash :-) in situations where you *would* dare to use
Windows or Linux . If I were doing software development on a machine
located in a bank vault with no network connection, that machine would
be running OpenBSD.

/Don



Re: http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability/

2009-11-04 Thread Egon E. Braun Filho
On Wed, 4 Nov 2009 13:46:26 +1100
Aaron Mason simplersolut...@gmail.com wrote:

 Wine is a good idea, but it's stifling an even better idea - making
 applications compatible across multiple OSes, something that hasn't
 needed to be done in the M$ world because of the stranglehold they
 had/have over the consumer market.
 

Microsoft will not follow free standanrds, Linux will follow
Microsoft/IBM/Intel/W3C/bullshit_human_slaving_private standards.

And I believe that is not portability in no way. That is just
assassinating legacy and freedom.

 Let's put this into perspective: Linux would absolutely jump in
 popularity if Valve ported Steam and the Source engine to it, meaning
 games like the Half Life series, Left 4 Dead and Team Fortress 2 could
 run natively - not to mention that it would prompt other games that
 sell their wares through the Steam CDS to port their games as well -
 but since most of the games run just fine in Wine these days, there's
 no incentive.

This will happen. We just have to wait for Linus/Redhat/Suse/etc to sign
more NDAs.

Look after your kids.

-- 
Egon E. Braun Filho egonbr...@gmail.com



Re: http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability/

2009-11-04 Thread Egon E. Braun Filho
On Wed, 4 Nov 2009 13:46:26 +1100
Aaron Mason simplersolut...@gmail.com wrote:

 Wine is a good idea, but it's stifling an even better idea - making
 applications compatible across multiple OSes, something that hasn't
 needed to be done in the M$ world because of the stranglehold they
 had/have over the consumer market.
 

Microsoft will not follow free standanrds, Linux will follow
Microsoft/IBM/Intel/W3C/bullshit_human_slaving_private standards.

And I believe that is not portability in no way. That is just
assassinating legacy and freedom.

 Let's put this into perspective: Linux would absolutely jump in
 popularity if Valve ported Steam and the Source engine to it, meaning
 games like the Half Life series, Left 4 Dead and Team Fortress 2 could
 run natively - not to mention that it would prompt other games that
 sell their wares through the Steam CDS to port their games as well -
 but since most of the games run just fine in Wine these days, there's
 no incentive.

This will happen. We just have to wait for Linus/Redhat/Suse/etc to sign
more NDAs.

Look after your kids.

-- 
Egon E. Braun Filho mundoa...@gmail.com



Re: http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability/

2009-11-04 Thread Tomáš Bodžár
Ok to add more idiotic ideas to debate about Linux/MS and
interoperability and so on why not add this one?

http://www.computerworlduk.com/community/blogs/index.cfm?entryid=2620blogid=
14

EU Wants to Re-define bClosedb as bNearly Openb

'.While there is a correlation between openness and
interoperability, it is also true that interoperability can be
obtained without openness, for example via homogeneity of the ICT
systems, which implies that all partners use, or agree to use, the
same solution to implement a European Public Service..'

On Wed, Nov 4, 2009 at 5:39 PM, Egon E. Braun Filho egonbr...@gmail.com
wrote:
 On Wed, 4 Nov 2009 13:46:26 +1100
 Aaron Mason simplersolut...@gmail.com wrote:

 Wine is a good idea, but it's stifling an even better idea - making
 applications compatible across multiple OSes, something that hasn't
 needed to be done in the M$ world because of the stranglehold they
 had/have over the consumer market.


 Microsoft will not follow free standanrds, Linux will follow
 Microsoft/IBM/Intel/W3C/bullshit_human_slaving_private standards.

 And I believe that is not portability in no way. That is just
 assassinating legacy and freedom.

 Let's put this into perspective: Linux would absolutely jump in
 popularity if Valve ported Steam and the Source engine to it, meaning
 games like the Half Life series, Left 4 Dead and Team Fortress 2 could
 run natively - not to mention that it would prompt other games that
 sell their wares through the Steam CDS to port their games as well -
 but since most of the games run just fine in Wine these days, there's
 no incentive.

 This will happen. We just have to wait for Linus/Redhat/Suse/etc to sign
 more NDAs.

 Look after your kids.

 --
 Egon E. Braun Filho egonbr...@gmail.com





--
http://www.openbsd.org/lyrics.html



Re: http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability/

2009-11-04 Thread Tobias Ulmer
Dear sweetheart,

On Thu, Nov 05, 2009 at 01:12:58AM +0100, Claire beuserie wrote:
 Yes, I know, I was present in the room when Illja gave the talk in 2006 at
 the CCC Kongress and the two OpenBSD developers in the room decided to
 completely ignore the exploit he showed until Miod reproduced it two weeks
 later...


http://events.ccc.de/congress/2006/Fahrplan/day_4.en.html:
Schedule Day 4: 30.12.2006
11:30
Unusual bugs Ilja

http://openbsd.org/errata39.html:
017: SECURITY FIX: January 3, 2007   i386 only
Insufficient validation in vga(4) may allow an attacker to gain root
privileges if the kernel is compiled with option PCIAGP and the actual
device is not an AGP device. The PCIAGP option is present by default on
i386 kernels only.

http://blogs.23.nu/ilja/2007/01/:
So one of the things I noticed after my unusual bugs talk, the OpenBSD
guys fix bugs _FAST_. I mean really fast ! bugfix and announcement
within a few days. Not many vendors can pull that off.

Two weeks, eh? Want it in a black frame with a white caption
reading EPIC FAIL? I'd start gimp for that.

 
 If you are not an OpenBSD developer, don't make public statements like that,
 if OpenBSD developers decide to sit on a bug for a couple of months, it does
 not justify their full disclosure conflict where bugs are swept under the
 carpet

Newsflash: I decide what I write on a public mailinglist. The rest of
the sentence doesn't even parse, but i think it's something like Theo
once hurt my feelings on the internets.

What i always wanted to know, how do I join the secret Facebook group of
people that have been flamed by Theo or another OpenBSD developer? Do
you have an IRC channel? Is an emo haircut and a pic from weird angles
really required in the application?


I should have roasted you in the first reply like my guts told me to,
instead i gave you the benefit of the doubt, my mistake. Doesn't happen
again. Promise.

Misc'ed for entertainment

 
 On Thu, Nov 5, 2009 at 12:55 AM, Tobias Ulmer tobi...@tmux.org wrote:
 
  On Wed, Nov 04, 2009 at 01:46:52PM +0100, Claire beuserie wrote:
   Dear Tobias,
  
   what you stated contradicts what Otto and Art posted.
 
  Ehm, no it doesn't. There are two different components, the actual null
  pointer dereference and the ability to map a page to address zero.
 
  What i'm pointing out is that mapping a page at adress 0 isn't new. It's
  also not a bug (this is true for the executable stack as well, as Art
  points out with some sarcasm). The ability for a programm to do so was
  recognised in 2006 by some developers, and prevented by a change to the
  kernel in 2008.
 
  It only becomes a problem once someone finds a NULL pointer dereference
  in the kernel. One such problem was discovered recently, and was fixed
  asap.
 
  If you had done some research for the file i linked to, you would find
  that Ilja gave a talk in 2006, called unusual bugs, where he
  demonstrated this class of vulnerabilities on OpenBSD. I'm sure plenty
  of Linux developers were sitting in the audience as well, laughing about
  us...
 
  Again, the bug was fixed asap:
  ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.9/i386/017_agp.patch
 
 
  
   Are you to be quoted as an OpenBSD developer on this?
 
  Certainly not, since I'm no OpenBSD developer.
 
  
   Salutions,
  
   Claire
  
   On Wed, Nov 4, 2009 at 3:46 AM, Tobias Ulmer tobi...@tmux.org wrote:
  
On Wed, Nov 04, 2009 at 02:57:59AM +0100, Claire beuserie wrote:
 Hi,

 On Wed, Nov 4, 2009 at 12:58 AM, Theo de Raadt 
  dera...@cvs.openbsd.org
wrote:

  2) At least three of our developers were aware of this exploitation
method going back perhaps two years before than the commit, but
  we
gnashed our teeth a lot to try to find other solutions.  Clever
cpu architectures don't have this issue because the virtual
  address
spaces are seperate, so i386/amd64 are the ones with the big
  impact.
We did think long and hard about tlb bashing page 0 everytime we
switch into the kernel, but it still does not look attractive
  from
a performance standpoint.
 

 I'm confused.

 That came out a bit weird: are you saying you knew about the bug for
  2
years
 but did not fix it?
   
It's not the bug, it's a class of vulnerabilities that allows to
exploit a NULL pointer dereference under certain circumstances.
   
http://packetstorm.linuxsecurity.com/poisonpen/8lgm/ptchown.c
is commonly cited as the oldest public source (1994). Use google for
more.
   


 c.b-
   
--
Sent from my noname server.
   
 
  --
  Sent from my noname server.
 

-- 
Sent from my noname server.



Re: http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability/

2009-11-03 Thread Claire beuserie
Hi,

On Wed, Nov 4, 2009 at 12:58 AM, Theo de Raadt dera...@cvs.openbsd.orgwrote:

 2) At least three of our developers were aware of this exploitation
   method going back perhaps two years before than the commit, but we
   gnashed our teeth a lot to try to find other solutions.  Clever
   cpu architectures don't have this issue because the virtual address
   spaces are seperate, so i386/amd64 are the ones with the big impact.
   We did think long and hard about tlb bashing page 0 everytime we
   switch into the kernel, but it still does not look attractive from
   a performance standpoint.


I'm confused.

That came out a bit weird: are you saying you knew about the bug for 2 years
but did not fix it?


c.b-



Re: http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability/

2009-11-03 Thread Gonzalo Lionel Rodriguez
2009/11/3 Claire beuserie claire.beuse...@gmail.com:
 Hi,

 On Wed, Nov 4, 2009 at 12:58 AM, Theo de Raadt
dera...@cvs.openbsd.orgwrote:

 2) At least three of our developers were aware of this exploitation
   method going back perhaps two years before than the commit, but we
   gnashed our teeth a lot to try to find other solutions.  Clever
   cpu architectures don't have this issue because the virtual address
   spaces are seperate, so i386/amd64 are the ones with the big impact.
   We did think long and hard about tlb bashing page 0 everytime we
   switch into the kernel, but it still does not look attractive from
   a performance standpoint.


 I'm confused.

 That came out a bit weird: are you saying you knew about the bug for 2
years
 but did not fix it?


 c.b-



Linux way.



Re: http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability/

2009-11-03 Thread Tobias Ulmer
On Wed, Nov 04, 2009 at 02:57:59AM +0100, Claire beuserie wrote:
 Hi,
 
 On Wed, Nov 4, 2009 at 12:58 AM, Theo de Raadt dera...@cvs.openbsd.orgwrote:
 
  2) At least three of our developers were aware of this exploitation
method going back perhaps two years before than the commit, but we
gnashed our teeth a lot to try to find other solutions.  Clever
cpu architectures don't have this issue because the virtual address
spaces are seperate, so i386/amd64 are the ones with the big impact.
We did think long and hard about tlb bashing page 0 everytime we
switch into the kernel, but it still does not look attractive from
a performance standpoint.
 
 
 I'm confused.
 
 That came out a bit weird: are you saying you knew about the bug for 2 years
 but did not fix it?

It's not the bug, it's a class of vulnerabilities that allows to
exploit a NULL pointer dereference under certain circumstances.

http://packetstorm.linuxsecurity.com/poisonpen/8lgm/ptchown.c
is commonly cited as the oldest public source (1994). Use google for
more.

 
 
 c.b-

-- 
Sent from my noname server.



Re: http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability/

2009-11-03 Thread Cor
My interpretation is that yes, they identified it as a possibility, but 
due to limitations of the Intel platform, there wasn't an obvious, 
clean, correct way to fix it.


I don't think this is a primary exploit, however.  You would have to 
have a buffer overflow or something in some other app first.  Fixing 
this, as someone stated, mitigates the consequences of other primary 
exploits.  But feel free to correct me if I'm wrong (do I really need to 
say that? :)


C2

Claire beuserie wrote:

Hi,

On Wed, Nov 4, 2009 at 12:58 AM, Theo de Raadt dera...@cvs.openbsd.orgwrote:

  

2) At least three of our developers were aware of this exploitation
  method going back perhaps two years before than the commit, but we
  gnashed our teeth a lot to try to find other solutions.  Clever
  cpu architectures don't have this issue because the virtual address
  spaces are seperate, so i386/amd64 are the ones with the big impact.
  We did think long and hard about tlb bashing page 0 everytime we
  switch into the kernel, but it still does not look attractive from
  a performance standpoint.




I'm confused.

That came out a bit weird: are you saying you knew about the bug for 2 years
but did not fix it?


c.b-




Re: http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability/

2009-11-03 Thread Aaron Mason
On Wed, Nov 4, 2009 at 1:04 PM, Gonzalo Lionel Rodriguez
gonz...@sepp0.com.ar wrote:
 2009/11/3 Claire beuserie claire.beuse...@gmail.com:
 Hi,

 On Wed, Nov 4, 2009 at 12:58 AM, Theo de Raadt
 dera...@cvs.openbsd.orgwrote:

 2) At least three of our developers were aware of this exploitation
   method going back perhaps two years before than the commit, but we
   gnashed our teeth a lot to try to find other solutions.  Clever
   cpu architectures don't have this issue because the virtual address
   spaces are seperate, so i386/amd64 are the ones with the big impact.
   We did think long and hard about tlb bashing page 0 everytime we
   switch into the kernel, but it still does not look attractive from
   a performance standpoint.


 I'm confused.

 That came out a bit weird: are you saying you knew about the bug for 2
 years
 but did not fix it?


 c.b-



 Linux way.



What a knob.  It makes me sad to say I used his crap now if he has
that much contempt for those who value security before practicality.

It's good to see Theo et al stick to their guns on this issue.  I'd
rather have a machine that is secure than one that can run Windows
binaries.

Wine is a good idea, but it's stifling an even better idea - making
applications compatible across multiple OSes, something that hasn't
needed to be done in the M$ world because of the stranglehold they
had/have over the consumer market.

Let's put this into perspective: Linux would absolutely jump in
popularity if Valve ported Steam and the Source engine to it, meaning
games like the Half Life series, Left 4 Dead and Team Fortress 2 could
run natively - not to mention that it would prompt other games that
sell their wares through the Steam CDS to port their games as well -
but since most of the games run just fine in Wine these days, there's
no incentive.

Linus is shooting himself in the foot and he has no idea.  Linux tries
to be everything to everyone, and by doing it the way is does, it
greatly limits its potential.

OpenBSD does one thing and does it well - being secure.  That's all
there is to it.

--
Aaron Mason - Programmer, open source addict
- Oh, why does everything I whip leave me?



Re: http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability/

2009-11-03 Thread Gilles Chehade
On Tue, Nov 03, 2009 at 04:58:25PM -0700, Theo de Raadt wrote:
 [bcc'd to Dan Goodin @ theregister]
 
 If anyone wants a choice quote from me about the recent Linux holes,
 this is what I have to say:
 
 Linus is too busy thinking about masturabating monkeys, he doesn't
 have time to care about Linux security.
 

I was considering offering him this:

http://www.wellcoolstuff.com/Merchant2/graphics/0001/20-Apr-07-05.jpg

But couldn't get my hands on one yet ;-)

Gilles

-- 
Gilles Chehade
freelance developer/sysadmin/consultant

   http://www.poolp.org



http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability/

2009-11-03 Thread Theo de Raadt
[bcc'd to Dan Goodin @ theregister]

If anyone wants a choice quote from me about the recent Linux holes,
this is what I have to say:

Linus is too busy thinking about masturabating monkeys, he doesn't
have time to care about Linux security.

For the record, this particular problem was resolved in OpenBSD a
while back, in 2008.  We are not super proud of the solution, but it
is what seems best faced with a stupid Intel architectural choice.
However, it seems that everyone else is slowly coming around to the
same solution.

The commit message:

CVSROOT:/cvs
Module name:src
Changes by: dera...@cvs.openbsd.org 2008/06/24 15:24:03

Modified files:
sys/arch/alpha/include: vmparam.h 
sys/arch/amd64/include: vmparam.h 
sys/arch/arm/include: vmparam.h 
sys/arch/i386/include: vmparam.h 
sys/arch/sh/include: vmparam.h 
sys/arch/sparc/include: vmparam.h 
sys/arch/vax/include: vmparam.h 
sys/arch/sh/sh : trap.c 

Log message:
On user/kernel shared page table machines, do not let processes map their
own page 0, as discussed with miod (and many others previously, including
art and toby).  On sparc, make this __LDPGSZ because PAGE_SIZE is non-constant
ok miod tedu

There are four things interesting about this change:

1) The #1 reason why the Linux team has not commited this by default
   is because it breaks Wine, which wants to play with page 0 -- so
   basically they are resisting this for Windows binary compatibility
   Ironic, isn't it?  If anyone else tells you that is not the #1
   reason, they are lying.  We decided we don't care about Wine.

2) At least three of our developers were aware of this exploitation
   method going back perhaps two years before than the commit, but we
   gnashed our teeth a lot to try to find other solutions.  Clever
   cpu architectures don't have this issue because the virtual address
   spaces are seperate, so i386/amd64 are the ones with the big impact.
   We did think long and hard about tlb bashing page 0 everytime we
   switch into the kernel, but it still does not look attractive from
   a performance standpoint.

3) Last week a bug was found in OpenBSD's kernel which was locally
   exploitable before the commit on Jun 24, 2008.  Afterwards that fix,
   it simply becomes a kernel crash; you cannot gain priviledge from
   it.  The reality is that kernel bugs will always exist, no matter
   how hard we try.  Our focus therefore is always on finding innovative
   ideas which make bugs very hard to exploit succesfully.  Bugs will
   exist.  At least they should be more difficult to exploit.

3) Note the date of the commit, 2008/06/24.  Interestingly, this commit
   was done 1 month before Linus posted this:

   http://article.gmane.org/gmane.linux.kernel/706950

   I'm glad we care about security and trying to make things better, and
   I am glad that Linus prefers to write articles about monkey
   masturbation.  In life, everyone should stick to what they know the
   most about.  Because Linus knows dick all about security research.



Re: http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability/

2009-11-03 Thread Scott McEachern

Theo de Raadt wrote:

   http://article.gmane.org/gmane.linux.kernel/706950


  
I replaced Linux around '01 or '02 with OpenBSD both at companies I've 
worked for since and at home.  I don't really care what other people use 
for their needs, and I've been neutral in my opinion about Torvalds and 
Linux (mostly because I don't pay any attention to what he or anyone 
else in the Linux crowd have to say.)  I didn't move to, or stick with, 
OpenBSD as an anti-Linux (or anti-anything) statement.


My opinion changed today when I read Linus' email from Theo's link.

Linus seriously thinks that any random bug in any app that causes a 
crash is just as important as a security hole that gets your box rooted?


Now I don't just think he's an idiot, I know it.  Now I understand the 
background to the disparaging comments Theo has made about Linus now and 
then.


--

-RSM

http://www.erratic.ca



Re: http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability/

2009-11-03 Thread Theo de Raadt
 Theo de Raadt wrote:
 http://article.gmane.org/gmane.linux.kernel/706950
 
 

 I replaced Linux around '01 or '02 with OpenBSD both at companies I've 
 worked for since and at home.  I don't really care what other people use 
 for their needs, and I've been neutral in my opinion about Torvalds and 
 Linux (mostly because I don't pay any attention to what he or anyone 
 else in the Linux crowd have to say.)  I didn't move to, or stick with, 
 OpenBSD as an anti-Linux (or anti-anything) statement.
 
 My opinion changed today when I read Linus' email from Theo's link.
 
 Linus seriously thinks that any random bug in any app that causes a 
 crash is just as important as a security hole that gets your box rooted?
 
 Now I don't just think he's an idiot, I know it.  Now I understand the 
 background to the disparaging comments Theo has made about Linus now and 
 then.

Don't tell us; we know.

Tell linus.  You can google for his email address.

Not that he'll care.  He's too busy watching monkey porn instead of
building researching last-year's security technology that will stop an
exploit technique that has been exploited multiple times.  He's got
redhat to try to cover for that now, they're a public company filling
his bank account, and the best way to increase his stock is to accuse
other people of having the wrong standards. 

Security technology?  Why does he need to bother.  He's got NSA to
write that code for him!  (a previous exploitable hole using this
exploit mechanism was in NSA-donated code.  And God bless America.)



Re: http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability/

2009-11-03 Thread Bob Beck
2009/11/3 Gilles Chehade gil...@openbsd.org:
 On Tue, Nov 03, 2009 at 04:58:25PM -0700, Theo de Raadt wrote:
 [bcc'd to Dan Goodin @ theregister]

 If anyone wants a choice quote from me about the recent Linux holes,
 this is what I have to say:

 Linus is too busy thinking about masturabating monkeys, he doesn't
 have time to care about Linux security.


 I was considering offering him this:

 http://www.wellcoolstuff.com/Merchant2/graphics/0001/20-Apr-07-05.jpg

 But couldn't get my hands on one yet ;-)

God damn Gilles.. And you didn't find one to bring to us at a hackathon!

Linus doesn't *deserve* one of those - I thought because I work on
OpenBSD only I do!

I will be deeply offended if Linus gets one of those before OpenBSD
developers do..  Well, the hell with the rest of you.. *I* at least
want one first.. Proudly!  Linus doesn't deserve one 'till he has a
commit in our tree. ;)

-Bob