LinuxQuestions.org
Share your knowledge at the LQ Wiki.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - General
User Name
Password
Linux - General This Linux forum is for general Linux questions and discussion.
If it is Linux Related and doesn't seem to fit in any other forum then this is the place.

Notices


Reply
  Search this Thread
Old 01-15-2016, 01:09 AM   #1
PACMANchasingme
Member
 
Registered: Mar 2015
Distribution: Arch
Posts: 62

Rep: Reputation: Disabled
If grsecurity is so great, why isn't the patches it does included in all kernels?


Kernels job is security so why avoid more features till the user decides to add them?
 
Old 01-15-2016, 01:20 PM   #2
MensaWater
LQ Guru
 
Registered: May 2005
Location: Atlanta Georgia USA
Distribution: Redhat (RHEL), CentOS, Fedora, CoreOS, Debian, FreeBSD, HP-UX, Solaris, SCO
Posts: 7,831
Blog Entries: 15

Rep: Reputation: 1669Reputation: 1669Reputation: 1669Reputation: 1669Reputation: 1669Reputation: 1669Reputation: 1669Reputation: 1669Reputation: 1669Reputation: 1669Reputation: 1669
There are thousands of different things available that could be tied to your kernel. Only those things deemed useful to all that meet other criteria (e.g. truly open source) would be embedded in upstream kernel. You'd have to write the kernel team to determine what they like or dislike about grsecurity or if they've even heard of it.

Based on what I just saw on their site about how they will only provide stable for paying customers it doesn't sound to me like it passes the smell test for truly open source:

Quote:
Important Notice Regarding Public Availability of Stable Patches
Due to continued violations by several companies in the embedded industry of grsecurity®'s trademark and registered copyrights, effective September 9th 2015 stable patches of grsecurity are being made available to commercial customers only.
Its a bit like when the president of Peru forcefully closed down Peru's legislature. You can't protect Democracy by overthrowing it and you can't protect Open Source by closing it.
 
Old 01-15-2016, 01:27 PM   #3
Rinndalir
Member
 
Registered: Sep 2015
Posts: 733

Rep: Reputation: Disabled
Grsecurity complained that they could never get their code upstream. But kernel replied that they need to submit patches just like everyone else does. Grsecurity replied it was too difficult to submit patches. Grsecurity always blames upstream for not taking their patches but grsecurity never submits the patches.

Probably grsecurity never intended to submit patches but just tried to spin things to look like upstream was the problem.
 
1 members found this post helpful.
Old 01-17-2016, 10:14 AM   #4
Steven_G
Member
 
Registered: Dec 2015
Location: Western US
Distribution: Home spun
Posts: 142

Rep: Reputation: 67
So my question becomes: Despite all of the hooey does grsecurity offer any measurable increase in overall system security? And I mean in totally b/c nothing is perfect. In addition to whatever positives it brings to the table what are the system level draw backs besides the stability issues going forward. I.E. what does it break, if anything?
 
Old 01-17-2016, 10:34 AM   #5
MensaWater
LQ Guru
 
Registered: May 2005
Location: Atlanta Georgia USA
Distribution: Redhat (RHEL), CentOS, Fedora, CoreOS, Debian, FreeBSD, HP-UX, Solaris, SCO
Posts: 7,831
Blog Entries: 15

Rep: Reputation: 1669Reputation: 1669Reputation: 1669Reputation: 1669Reputation: 1669Reputation: 1669Reputation: 1669Reputation: 1669Reputation: 1669Reputation: 1669Reputation: 1669
We don't use it and based on what I've seen on looking into it since your initial post makes me leery of doing business with them. Ethics are a more important consideration than utility IMHO. I can't say they're definitely unethical since I've never done business with them and hadn't heard of them before your initial post but my brief look at them makes me uneasy.
 
Old 01-17-2016, 10:56 AM   #6
sundialsvcs
LQ Guru
 
Registered: Feb 2004
Location: SE Tennessee, USA
Distribution: Gentoo, LFS
Posts: 10,665
Blog Entries: 4

Rep: Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945
I don't know anything about them, but if I heard that they "do not play by the rules" with regard to kernel patches and/or modifications to the kernel environment, I would for that reason alone immediately dismiss them. I would consider that they are either attempting "security by obscurity," or "security by 'just trust me,'" neither of which are sound security practices.
 
Old 01-21-2016, 02:53 PM   #7
Rinndalir
Member
 
Registered: Sep 2015
Posts: 733

Rep: Reputation: Disabled
Quote:
Originally Posted by sundialsvcs View Post
I would consider that they are either attempting "security by obscurity," or "security by 'just trust me,'" neither of which are sound security practices.
I am ok with security by obscurity. We all engage in that every day, all the time. The "just trust me" notion was rejected by kernel devs.

Oh the kernel itself benefits from security by obscurity to a degree. Right? Only the very best analysis by very smart devs will know the exploits that exist in the kernel and be able to use them transparently.

The sheer code volume makes it impossible to know/find all the kernel bugs and that is why I say security thru obscurity applies to the kernel. And really any OS because the amount of code. Most of which has never had a comprehensive audit.
 
Old 01-21-2016, 06:58 PM   #8
sundialsvcs
LQ Guru
 
Registered: Feb 2004
Location: SE Tennessee, USA
Distribution: Gentoo, LFS
Posts: 10,665
Blog Entries: 4

Rep: Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945
... whereas "I am 'emphatically not(!)' prepared to accept such a notion.

Remember that we are all talking about 'security.' Which is, by definition, "the practical ability to protect your system from those who would do it harm." In my opinion, it is impossible for "someone 'else,' who seeks to conceal the means by which he (claims to ...) achieve what he (claims to have ...) achieved," to have done more than "the people who wrote the damn thing," and who by-design conceal nothing.
 
Old 01-21-2016, 09:49 PM   #9
Emerson
LQ Sage
 
Registered: Nov 2004
Location: Saint Amant, Acadiana
Distribution: Gentoo ~amd64
Posts: 7,661

Rep: Reputation: Disabled
Unstable is still available, Gentoo is using it. They got pissed off because embedded computing industry used widely their code but didn't show any gratitude.
 
Old 01-22-2016, 08:22 AM   #10
MensaWater
LQ Guru
 
Registered: May 2005
Location: Atlanta Georgia USA
Distribution: Redhat (RHEL), CentOS, Fedora, CoreOS, Debian, FreeBSD, HP-UX, Solaris, SCO
Posts: 7,831
Blog Entries: 15

Rep: Reputation: 1669Reputation: 1669Reputation: 1669Reputation: 1669Reputation: 1669Reputation: 1669Reputation: 1669Reputation: 1669Reputation: 1669Reputation: 1669Reputation: 1669
Quote:
Originally Posted by Emerson View Post
Unstable is still available, Gentoo is using it. They got pissed off because embedded computing industry used widely their code but didn't show any gratitude.
Yes, they put that rationale on their site but as I said before you don't defend "open" source by "closing" source.
 
Old 01-22-2016, 10:13 AM   #11
Rinndalir
Member
 
Registered: Sep 2015
Posts: 733

Rep: Reputation: Disabled
Quote:
Originally Posted by Emerson View Post
Unstable is still available, Gentoo is using it. They got pissed off because embedded computing industry used widely their code but didn't show any gratitude.
I wonder what gratitude they expect or were expecting?
 
Old 01-22-2016, 10:18 AM   #12
Emerson
LQ Sage
 
Registered: Nov 2004
Location: Saint Amant, Acadiana
Distribution: Gentoo ~amd64
Posts: 7,661

Rep: Reputation: Disabled
I think they ignored license requirements. See the grsecurity website for more precise information.
 
Old 01-22-2016, 10:23 AM   #13
Rinndalir
Member
 
Registered: Sep 2015
Posts: 733

Rep: Reputation: Disabled
There's another big problem with grsec and that is the idea expressed by most of the kernel devs including Linus. The kernel has bugs fixing the bugs improves security. The whole idea of the security of the kernel is viewed as the wrong way to look at the problem. grsec should report bugs to the kernel and propose them in the way that the kernel dev community reports them.

There is also another side to opensource that I haven't followed closely. That side is that most all of the kernel devs are paid by someone to hack on the kernel. Maybe grsec is _not_ getting paid by anyone and so they are cashing in on their intellectual property by releasing it commercially only.

Maybe grsec has a valid position afterall because they have no benefactor as do the large majority of kernel devs.

BTW someone keeps track of the contributors to the kernel, I think it's Greg K-H.

Haven't you ever wondered who pays Linus' salary?
 
Old 01-24-2016, 03:05 AM   #14
mdooligan
Member
 
Registered: Feb 2009
Location: Vancouver BC
Distribution: Mandrake10/ArchHackery/Gentoo
Posts: 179

Rep: Reputation: 22
As a retired security technician, I can guarantee that most claims about security are misleading at best, and fraudulent at worst. They often accomplish the opposite of what you might think. This includes most computer security methods.

And when did "security" become the kernel's job? That's like saying "the government should do something..."
 
Old 02-09-2016, 11:29 AM   #15
tsulivan
LQ Newbie
 
Registered: Feb 2016
Posts: 3

Rep: Reputation: Disabled
Quote:
Originally Posted by mdooligan View Post
And when did "security" become the kernel's job? That's like saying "the government should do something..."
Congratulations on ridiculing yourselves.

https://twitter.com/grsecurity/statu...68572878176258
 
1 members found this post helpful.
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
LXer: Grsecurity Forced by Multi-Billion Dollar Company to Release Patches Only to Sponsors LXer Syndicated Linux News 0 08-28-2015 12:01 PM
Grsecurity stable patches to be limited to sponsors jeremy Linux - News 0 08-27-2015 10:43 AM
[SOLVED] Patches for OSSv4 and Slackware kernels 3.8 or later ReaperX7 Slackware 2 08-26-2013 06:31 PM
Naming convention of patches (& kernels as well) eg -rc, -mm, -rc-mm etc sudhirkumar Linux - Kernel 6 08-29-2007 05:43 AM
I've tried everything I know of which isn't a great deal........ Iain1974 Linux - Networking 1 03-15-2005 09:46 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - General

All times are GMT -5. The time now is 09:12 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration