!NBBFPbiuttRgTqbrcY:nixos.org

NixOS Security Discussions

363 Members
Discussions around Security | Triaging happens in #security:nixos.org126 Servers

Load older messages


SenderMessageTime
13 Oct 2024
@hexa:lossy.networkhexabut yeah, I don't want the additional load18:30:23
14 Oct 2024
@hexa:lossy.networkhexahttps://github.com/NixOS/nixpkgs/pull/348396 coturn hardening, any takers?01:46:33
@hexa:lossy.networkhexahttps://github.com/NixOS/nixpkgs/pull/348406 avahi maybe?02:25:52
@hexa:lossy.networkhexa💤02:26:26
@mattleon:matrix.orgmattleonI recently learned about this, but you can prevent access to any binaries not in the dependency closure with the `confinement.enable` setting, which should be step #1 for just about any service imho.12:27:03
@mattleon:matrix.orgmattleonhttps://github.com/NixOS/nixpkgs/blob/master/nixos/modules/security/systemd-confinement.nix12:27:09
@sandro:supersandro.deSandro 🐧
In reply to @hexa:lossy.network
https://github.com/NixOS/nixpkgs/pull/348406 avahi maybe?
If I don't forget I can try later with pulse network discovery
13:49:43
15 Oct 2024
@hexa:lossy.networkhexahttps://matrix.org/blog/2024/10/security-disclosure-matrix-js-sdk-and-matrix-react-sdk/12:02:09
@hexa:lossy.networkhexa

We are disclosing two high-severity vulnerabilities in matrix-js-sdk and matrix-react-sdk related to MSC3061, which specifies sharing room keys with newly invited users for message history access.

12:02:25
@Valodim:stratum0.orgValodimugh12:02:36
@hexa:lossy.networkhexadid you?12:03:08
@emilazy:matrix.orgemily
In reply to @hexa:lossy.network

We are disclosing two high-severity vulnerabilities in matrix-js-sdk and matrix-react-sdk related to MSC3061, which specifies sharing room keys with newly invited users for message history access.

"in the legacy (pre-Rust) encryption implementation" 🫠
18:12:28
@emilazy:matrix.orgemilynot libolm itself, but still18:12:38
@hexa:lossy.networkhexaWhere would we store a shared list of bogon cidrs used across various modules?18:18:58
@hexa:lossy.networkhexanixos/lib somewhere18:19:36
@hexa:lossy.networkhexaBut I wonder if we have prior art18:19:43
@ma27:nicht-so.sexyma27don't we have some networking functions from gsoc in lib? perhaps there?18:22:13
@hexa:lossy.networkhexanot sure if that ever landed19:10:27
@hexa:lossy.networkhexalib/network apparently19:11:03
@hexa:lossy.networkhexalib/network/const.nix it'll be19:14:50
@f0x:pixie.townf0x https://github.com/NixOS/nixpkgs/pull/348779 I think this also patches element-web correctly (separate security advisory). Just wanted to confirm since it wasn't mentioned in the PR 22:35:13
@f0x:pixie.townf0xand if something was done to Hydra for element-desktop, maybe the same also needs to happen for -web? I'm not really sure how that aspect of nixpkgs works, especially for security/backport related stuff22:37:18
@hexa:lossy.networkhexagood catch22:41:11
@hexa:lossy.networkhexawdym with "done to Hydra"?22:41:25
@hexa:lossy.networkhexawe don't have a separate pipeline for security stuff unfortunately22:41:43
@emilazy:matrix.orgemilykicking Hydra to get an early channel eval maybe?22:46:21
@hexa:lossy.networkhexabumped the -small jobsets to front22:49:28
@hexa:lossy.networkhexa * bumped the -small jobsets to the front of the queue22:49:35
@f0x:pixie.townf0x
In reply to @hexa:lossy.network
I'm kicking the hydra jobsets next
not really sure what it entails, like what you mentioned here for the firefox stuff
22:49:42
@hexa:lossy.networkhexathat meant triggering an evaluation22:49:59

Show newer messages


Back to Room ListRoom Version: 9