Feed lwn LWN.net

Favorite IconLWN.net

Link https://lwn.net/
Feed http://lwn.net/headlines/rss
Updated 2025-09-14 12:15
[$] KRACK, ROCA, and device insecurity
<p>Monday October 16 was not a particularly good day for those who areeven remotely security conscious—or, in truth, even for those who aren't. Twoseparate security holes came to light; one probably affects almost allusers of modern technology. The other is more esoteric at some level, butstill serious. In both cases, the code in question is baked into variousdevices, which makes it more difficult to fix; in many cases, the devicesin question may not even have a plausible path toward a fix. Encryptionhas been a boon for internet security, but both of these vulnerabilitieshave highlighted that there is more to security than simply cryptography.
Tips to Secure Your Network in the Wake of KRACK (Linux.com)
Konstantin Ryabitsev argueson Linux.com that WiFi security is only a part of the problem."Wi-Fi is merely the first link in a long chain of communicationhappening over channels that we should not trust. If I were to guess, theWi-Fi router you’re using has probably not received a security update sincethe day it got put together. Worse, it probably came with default or easilyguessable administrative credentials that were never changed. Unless youset up and configured that router yourself and you can remember the lasttime you updated its firmware, you should assume that it is now controlledby someone else and cannot be trusted."
[$] Achieving DisplayPort compliance
At the X.Org Developers Conference, hosted by Google in Mountain View, CASeptember 20-22, Manasi Navare gave a talk about her journey learningabout kernel graphics on the way to achieving DisplayPort (DP)compliance for Intel graphics devices.Making that work involved learning about DP, the kernel graphics subsystem,and how to dokernel development, as well. There were plenty of details to absorb,including the relatively new atomic modesetting support, the design of which was described in a two-part LWNarticle.
Ruiz: Fleet Commander: production ready!
Alberto Ruiz announcesthat Fleet Commander is ready for production use."Fleet Commander is an integrated solution for large Linux desktopdeployments that provides a configuration management interface that iscontrolled centrally and that covers desktop, applications and networkconfiguration. For people familiar with Group Policy Objects in ActiveDirectory in Windows, it is very similar."
Stable kernel updates
Greg Kroah-Hartman has released stable kernels 4.13.8, 4.9.57, 4.4.93, and 3.18.76. All of them contain important fixesand users should upgrade.
Security updates for Wednesday
Security updates have been issued by Arch Linux (kernel, linux-hardened, and linux-zen), CentOS (wpa_supplicant), Debian (xorg-server), Fedora (selinux-policy), Gentoo (libarchive, nagios-core, ruby, and xen), openSUSE (wpa_supplicant), Oracle (wpa_supplicant), Red Hat (Red Hat Single Sign-On, rh-nodejs6-nodejs, rh-sso7-keycloak, and wpa_supplicant), Scientific Linux (wpa_supplicant), SUSE (git, wpa_supplicant, and xen), and Ubuntu (xorg-server, xorg-server-hwe-16.04, xorg-server-lts-xenial).
ACME Support in Apache HTTP Server Project
Let's Encrypt has announcedthat Automatic Certificate Management Environment (ACME) protocol supportis being integrated into the Apache HTTP Server (httpd). "ACME support being built in to one of the world’s most popular Web servers, Apache httpd, is great because it means that deploying HTTPS will be even easier for millions of websites. It’s a huge step towards delivering the ideal certificate issuance and management experience to as many people as possible."
[$] A comparison of cryptographic keycards
An earlier LWN article showed thatprivate key storage is an importantproblem to solve in any cryptographic system and established keycardsas a good way to store private key material offline. But which keycardshould we use? This article examines the form factor, openness, andperformance of four keycards to try to help readers choose the one thatwill fit their needs.
Security updates for Tuesday
Security updates have been issued by Arch Linux (flashplugin, hostapd, lib32-flashplugin, and wpa_supplicant), Debian (sdl-image1.2), Fedora (curl, openvswitch, weechat, and wpa_supplicant), openSUSE (GraphicsMagick, kernel, mbedtls, and wireshark), Red Hat (flash-plugin), and Ubuntu (wpa).
Green: Falling through the KRACKs
Matthew Green exploresthe origins of the KRACK vulnerability."I don’t want to spend much time talking about KRACK itself, becausethe vulnerability is pretty straightforward. Instead, I want to talk aboutwhy this vulnerability continues to exist so many years after WPA wasstandardized. And separately, to answer a question: how did this attackslip through, despite the fact that the 802.11i handshake was formallyproven secure?"
[$] Point releases for the GNU C Library
The GNU C Library (glibc) project produces regular releases on anapproximately six-month cadence. The current release is 2.26from early August; the 2.27 release is expected at the beginning ofFebruary 2018. Unlike many other projects, though, glibc does not normallycreate point releases for important fixes between the major releases.The last point release from glibc was 2.14.1, which came out in 2011.A discussion on the need for a 2.26 point release led to questions aboutwhether such releases have a useful place in the currentsoftware-development environment.
DragonFly BSD 5.0
DragonFly BSD 5.0 has been released. "Preliminary HAMMER2 support has been released into the wild as-of the 5.0 release. This support is considered EXPERIMENTAL and should generally not yet be used for production machines and important data. The boot loader will support both UFS and HAMMER2 /boot. The installer will still use a UFS /boot even for a HAMMER2 installation because the /boot partition is typically very small and HAMMER2, like HAMMER1, does not instantly free space when files are deleted or replaced.DragonFly 5.0 has single-image HAMMER2 support, with live dedup (for cp's), compression, fast recovery, snapshot, and boot support. HAMMER2 does not yet support multi-volume or clustering, though commands for it exist. Please use non-clustered single images for now."
Millions of high-security crypto keys crippled by newly discovered flaw (Ars Technica)
Ars Technica is reporting on a flaw in the RSA library developed by Infineon that drastically reduces the amount of work needed to discover a private key from its corresponding public key. This flaw, dubbed "ROCA", mainly affects key pairs that have been generated on keycards. "While all keys generated with the library are much weaker than they should be, it's not currently practical to factorize all of them. For example, 3072-bit and 4096-bit keys aren't practically factorable. But oddly enough, the theoretically stronger, longer 4096-bit key is much weaker than the 3072-bit key and may fall within the reach of a practical (although costly) factorization if the researchers' method improves.To spare time and cost, attackers can first test a public key to see if it's vulnerable to the attack. The test is inexpensive, requires less than 1 millisecond, and its creators believe it produces practically zero false positives and zero false negatives. The fingerprinting allows attackers to expend effort only on keys that are practically factorizable. The researchers have already used the method successfully to identify weak keys, and they have provided a tool here to test if a given key was generated using the faulty library. A blog post with more details is here."
Security updates for Monday
Security updates have been issued by Debian (wpa), Fedora (perl, recode, and tor), Gentoo (elfutils, gnutls, graphite2, libtasn1, puppet-agent, shadow, and webkit-gtk), Mageia (pjproject, thunderbird, and weechat), and SUSE (kernel).
An enforcement clarification from the kernel community
The Linux Foundation's Technical Advisory board, in response to concernsabout exploitative license enforcement around the kernel, has put togetherthis patch adding a document to the kerneldescribing its view of license enforcement. This document has been signedor acknowledged by a long list of kernel developers.In particular, it seeks toreduce the effect of the "GPLv2 death penalty" by stating that a violator'slicense to the software will be reinstated upon a timely return tocompliance. "We view legal action as a last resort, to be initiatedonly when other community efforts have failed to resolve the problem.Finally, once a non-compliance issue is resolved, we hope the user will feelwelcome to join us in our efforts on this project. Working together, we willbe stronger."See thisblog post from Greg Kroah-Hartman for more information.
"KRACK": a severe WiFi protocol flaw
The "krackattacks" web sitediscloses a set of WiFi protocol flaws that defeat most of the protectionthat WPA2 encryption is supposed to provide. "In a keyreinstallation attack, the adversary tricks a victim into reinstalling analready-in-use key. This is achieved by manipulating and replayingcryptographic handshake messages. When the victim reinstalls the key,associated parameters such as the incremental transmit packet number(i.e. nonce) and receive packet number (i.e. replay counter) are reset totheir initial value. Essentially, to guarantee security, a key should onlybe installed and used once. Unfortunately, we found this is not guaranteedby the WPA2 protocol".
Kernel prepatch 4.14-rc5
The 4.14-rc5 kernel prepatch is out."We've certainly had smaller rc5's, but we've had bigger ones too, andthis week finally felt fairly normal in a release that has up untilnow felt a bit messier than it perhaps should have been.So assuming this trend holds, we're all good. Knock wood."
Bottomley: Using Elliptic Curve Cryptography with TPM2
James Bottomley describesthe use of the trusted platform module with elliptic-curvecryptography, with a substantial digression into how the elliptic-curvealgorithm itself works."The initial attraction is the same as for RSA keys: making itimpossible to extract your private key from the system. However, themathematical calculations for EC keys are much simpler than for RSA keysand don’t involve finding strong primes, so it’s much simpler for the TPM(being a fairly weak calculation machine) to derive private and public ECkeys."
Stable kernel 4.13.7
The 4.13.7 stable kernel update has beenreleased; it contains a fix for an unpleasantlocal vulnerability that affects only 4.13 kernels.
[$] unsafe_put_user() turns out to be unsafe
When a veteran kernel developer introduces a severe security hole into thekernel, it can be instructive to look at how the vulnerability came about.Among other things, it can point the finger at an API that lends itselftoward the creation of such problems. And, as it turns out, the knowledgethat the API is dangerous at the outset and marking it as such may not beenough to prevent problems.
Security updates for Friday
Security updates have been issued by Arch Linux (botan, flyspray, go, go-pie, pcre2, thunderbird, and wireshark-cli), Fedora (chromium and mingw-poppler), Red Hat (Red Hat JBoss BPM Suite 6.4.6 and Red Hat JBoss BRMS 6.4.6), SUSE (git and kernel), and Ubuntu (libffi and xorg-server, xorg-server-hwe-16.04, xorg-server-lts-xenial).
[$] The trouble with text-only email
Mozilla's manifesto commitsthe organization to a number of principles, including support forindividual privacy and an individual's right to control how they experiencethe Internet. As a result, when Mozilla recently stated its intent toremove the "text only" option from its mailing lists — for the purpose oftracking whether recipients are reading its emails — the reaction was, toput it lightly, not entirely positive. The text-only option has beensaved, but the motivation behind this change is indicative of thechallenges facing independent senders of email.
Four new stable kernels
Greg Kroah-Hartman has announced the release of the 4.13.6, 4.9.55, 4.4.92, and 3.18.75 stable kernels. As usual, theycontain fixes throughout the tree, so users should upgrade.Update: Kroah-Hartman released 4.9.56: "It fixes a networkingbug in 4.9.55. Don't use 4.9.55, it's busted, sorry about that, Ishould have held off and gotten more testing on it, my fault :("
Security updates for Thursday
Security updates have been issued by CentOS (httpd and thunderbird), Debian (nss), Fedora (git), openSUSE (krb5, libvirt, samba, and thunderbird), Oracle (httpd and thunderbird), Red Hat (httpd, rh-mysql57-mysql, and thunderbird), Scientific Linux (httpd and thunderbird), and Ubuntu (ceph).
[$] LWN.net Weekly Edition for October 12, 2017
The LWN.net Weekly Edition for October 12, 2017 is available.
[$] Continuous-integration testing for Intel graphics
<p>Two separate talks, at two different venues, give us a look into thekinds of testing that the Intel graphics team isdoing. Daniel Vetter had a short presentation as part of the Testing and Fuzzing microconference atthe Linux Plumbers Conference (LPC). His colleague, Martin Peres, gave asomewhat longer talk, complete with demos, at the X.Org Developers Conference(XDC). The picture they paint is a pleasing one: there is lots of testinggoing on there. But there are problems as well; that amount of testingruns afoul of bugs elsewhere in the kernel, which makes the jobharder.
Security updates for Wednesday
Security updates have been issued by Arch Linux (lame, salt, and xorg-server), Debian (ffmpeg, imagemagick, libxfont, wordpress, and xen), Fedora (ImageMagick, rubygem-rmagick, and tor), Oracle (kernel), SUSE (kernel, SLES 12 Docker image, SLES 12-SP1 Docker image, and SLES 12-SP2 Docker image), and Ubuntu (curl, glance, horizon, kernel, keystone, libxfont, libxfont1, libxfont2, libxml2, linux, linux-aws, linux-gke, linux-kvm, linux-raspi2, linux-snapdragon, linux, linux-raspi2, linux-gcp, linux-hwe, linux-lts-xenial, nova, openvswitch, swift, and thunderbird).
Plasma 5.11
KDE Plasma 5.11 has been released."Plasma 5.11 brings a redesigned settings app, improved notifications, a more powerful task manager. Plasma 5.11 is the first release to contain the new “Vault”, a system to allow the user to encrypt and open sets of documents in a secure and user-friendly way, making Plasma an excellent choice for people dealing with private and confidential information."
[$] Cramming features into LTS kernel releases
While the 4.14 development cycle has not been the busiest ever (12,500changesets merged as of this writing, slightly more than 4.13 at this stageof the cycle), it has been seen as a rougher experience than itspredecessors.There are all kinds of reasons why one cycle might besmoother than another, but it is not unreasonable to wonder whether thefact that 4.14 is a long-term support (LTS) release has affected how thiscycle has gone. Indeed, when he released 4.14-rc3, LinusTorvalds complained that this cycle was more painful than most, and suggested thatthe long-term support status may be a part of the problem. A couple of recent pulls into the mainline highlight thepressures that, increasingly, apply to LTS releases.
Purism Meets Its $1.5 Million Goal for Security Focused Librem 5 Smartphone
Purism has reachedits crowdfunding goal to create the Librem 5, an encrypted, opensmartphone ecosystem that gives users complete device control. "Reaching the $1.5 million milestone weeks ahead of schedule enables Purism to accelerate the production of the physical product. The company plans to move into hardware production as soon as possible to assemble a developer kit as well as initiate building the base software platform, which will be publicly available and open to the developer community." LWN looked at the privacy features planned for the phone in an article for this week's edition.
[$] An update on GnuPG
The GNU Privacy Guard (GnuPG) is one of thefundamental tools that allows a distributed group to have trust in its communications. Werner Koch, lead developer of GnuPG,spoke about it at Kernel Recipes: what's in the new 2.2 version, when older versionswill reach their end of life, and how development will proceed going forward.He also spoke at some length on the issue of best-practice key managementand how GnuPG is evolving to assist. Subscribers can click below for areport on the talk by guest author Tom Yates.
Security updates for Tuesday
Security updates have been issued by Fedora (WebCalendar), openSUSE (mpg123 and openjpeg2), Red Hat (kernel), and SUSE (firefox, nss).
[$] Improving the kernel timers API
The kernel's timer interface has been around for a long time, and its APIshows it. Beyond a lack of conformance with current in-kernel interfacepatterns, the timer API is not as efficient as it could be and stands inthe way of ongoing kernel-hardening efforts. A late addition to the 4.14 kernel paves the way toward awholesale change of this API to address these problems.
Linux Foundation Technical Advisory Board election call for nominations
The next election for members of the Linux Foundation's Technical AdvisoryBoard will be held on October 25 at the Kernel Summit in Prague. Thecall has gone out for candidates to fill the five available seats."The Linux Foundation Technical Advisory Board (TAB) serves as theinterface between the kernel development community and the Foundation.The TAB advises the Foundation on kernel-related matters, helps membercompanies learn to work with the community, and works to resolvecommunity-related problems before they get out of hand. The board hasten members, one of whom sits on the LF board of directors."
Stable kernel updates
Stable kernels 4.9.54, 4.4.91, and 3.18.74 have been released. They all containimportant fixes and users should upgrade.
Security updates for Monday
Security updates have been issued by CentOS (kernel and postgresql), Debian (botan1.10, curl, dnsmasq, libxfont, nautilus, qemu, qemu-kvm, sam2p, and tor), Fedora (dnsmasq, libmspack, and samba), Gentoo (file, icu, libpcre2, munin, ocaml, pacemaker, postgresql, rubygems, and sudo), Mageia (clamav, dnsmasq, flightgear, libidn, and x11-server), openSUSE (libvirt), Oracle (kernel), SUSE (portus), and Ubuntu (poppler).
Kernel prepatch 4.14-rc4
The 4.14-rc4 kernel prepatch is out fortesting. "So I do have some hope that things are approachingnormal. I'd expect that to continue, and things start calming down."
Debian 9.2 released
The Debian 9.2 point release is available; it includes fixes for a longlist of problems. "As a special case for this point release, thoseusing the 'apt-get' tool to perform the upgrade will need to ensure thatthe 'dist-upgrade' command is used, in order to update to the latest kernelpackages."
systemd 235 released
Version 235 of the systemd service manager is out; it includes a long listof new features. See this blogpost for a description of the dynamic user feature in particular."One major benefit of dynamic user IDs is that running aprivilege-separated service leaves no artifacts in the system. A systemuser is allocated and made use of, but it is discarded automatically in asafe and secure way after use, in a fashion that is safe for laterrecycling. Thus, quickly invoking a short-lived service for processing somejob can be protected properly through a user ID without having topre-allocate it and without this draining the available UID pool any longerthan necessary."
An end to jprobes
"Jprobes" are an ancient kernel mechanism used to trace entry into kernelfunctions; they were described in this 2005 LWNarticle. Recently, the kernel community has come to the conclusionthat jprobes have few (if any) remaining users, they have long beensuperseded by the function tracing (ftrace) mechanism, and they are amaintenance burden. As a result, the jprobeAPI will likely be disabled in a near-future kernel. If anybody outthere is still using jprobes, now would be a good time to either move on ormake the case for retaining that feature in the kernel.
Security updates for Friday
Security updates have been issued by Arch Linux (curl, krb5, lib32-curl, lib32-krb5, lib32-libcurl-compat, lib32-libcurl-gnutls, libcurl-compat, and libcurl-gnutls), Debian (golang), Fedora (MySQL-zrm), Mageia (firefox, ghostscript, libgd, libraw, libwpd, open-vm-tools, poppler, and rawtherapee), Oracle (kernel and postgresql), Red Hat (kernel), Scientific Linux (kernel), Slackware (curl, openjpeg, and xorg), and Ubuntu (ruby1.9.1).
[$] Steps toward a privacy-preserving phone
What kind of cell phone would emerge from a concerted effort to design privacy in fromthe beginning, using free software as much as possible? Someanswers are provided by a crowdfunding campaign launched inAugust by Purism SPC, which has used two suchcampaigns successfully in the past to build a business around securelaptops. The Librem 5, with a five-inch screen and radio chip forcommunicating with cell phone companies, represents Purism's hope to bringthe same privacy-enhancing vision to the mobile space, which is much moredemanding in its threats, technology components, and user experience.
[$] What's the best way to prevent kernel pointer leaks?
An attacker who seeks to compromise a running kernel by overwritingkernel data structures or forcing a jump to specific kernel code must, ineither case, have some idea of where the target objects are in memory.Techniques like kernel address-space layout randomization have been createdin the hope of denying that knowledge, but that effort is wasted if the kernelleaks information about where it has been placed in memory. Developershave been plugging pointer leaks for years but, as a recent discussionshows, there is still some disagreement over the best way to preventattackers from learning about the kernel's address-space layout.
Merging SUSE Studio and Open Build Service
SUSE has announcedthat SUSE Studio and the Open Build Service (OBS) will be merged into acombined solution, delivered as SUSE Studio Express."Looking at the feature requests for SUSE Studio on image buildingand looking at our technologies, we decided to use OBS as the base for ourimage building service. Since OBS already builds images for various environments, we will first add a new image building GUI to OBS."
Stable kernels 4.13.5, 4.9.53, 4.4.90, and 3.18.73
The latest batch of stable kernels has been released: 4.13.5, 4.9.53, 4.4.90, and 3.18.73 are now available. As usual, theycontain fixes throughout the tree; users of those series should upgrade.
Videos from the GNU Tools Cauldron
The 2017 GNU Tools Cauldron was held September 8 to 10 inPrague. Videos from thesessions are now available. The sessions cover ongoing work with GCC,the GDB debugger, the GNU C Library, and more.
Security updates for Thursday
Security updates have been issued by Debian (asterisk and curl), Fedora (kernel), Red Hat (postgresql and samba), Scientific Linux (postgresql), and Ubuntu (firefox and git).
PyPy v5.9 released
PyPy is a Python interpreter with a focus on performance; the project hasjust announcedits 5.9 release. This version has full support for NumPy and Pandas inPython 2.7, along with many other improvements. The Python 3.5interpreter is still described as "beta quality".
PostgreSQL 10 released
Version 10 of thePostgreSQL database management system has been released. "A criticalfeature of modern workloads is the ability to distribute data across manynodes for faster access, management, and analysis, which is also known as a'divide and conquer' strategy. The PostgreSQL 10 release includessignificant enhancements to effectively implement the divide and conquerstrategy, including native logical replication, declarative tablepartitioning, and improved query parallelism." See therelease notes and this LWN article fromJune for details.
[$] LWN.net Weekly Edition for October 5, 2017
The LWN.net Weekly Edition for October 5, 2017 is available.
...160161162163164165166167168169...