!NBBFPbiuttRgTqbrcY:nixos.org

NixOS Security Discussions

363 Members
Discussions around Security | Triaging happens in #security:nixos.org126 Servers

Load older messages


SenderMessageTime
12 Oct 2024
@emilazy:matrix.orgemilyi think the CVSS probably won't be too bad but we can brainstorm it here17:37:34
@emilazy:matrix.orgemilyI might not be able to do too much today but if you start drafting up an advisory I can probably help tomorrow17:37:49
@elvishjerricco:matrix.orgElvishJerriccobut that means having to know how to write an advisory :P17:38:41
@emilazy:matrix.orgemilylook at the calamares one :p17:39:54
@emilazy:matrix.orgemilyI can help write it if it'd be easier, just have things on my TODO today17:40:28
@emilazy:matrix.orgemilyremind me tomorrow maybe17:40:34
@elvishjerricco:matrix.orgElvishJerriccoAs for the fix for ourselves, I don't know if we should disable it by default or if we should just include a noticeable warning in whatever option description17:40:35
@emilazy:matrix.orgemilyI think we should do both17:41:35
@emilazy:matrix.orgemilyit's too dodgy to be leaking LUKS keys to non-root userspace17:41:50
@emilazy:matrix.orgemilyor really to be retaining them at all in userspace after they're loaded17:41:59
@elvishjerricco:matrix.orgElvishJerriccoyea that's fair17:42:34
@elvishjerricco:matrix.orgElvishJerricco actually, it makes me wonder if systemd ought to be clearing the cryptsetup keyring key before reaching sysinit.target 17:43:07
@elvishjerricco:matrix.orgElvishJerricco like After=cryptsetup.target and Before=sysinit.target, have a service that removes that key 17:43:28
@elvishjerricco:matrix.orgElvishJerriccobecause leaving that key even in the kernel keyring for an extended period of time seems a little odd to me17:43:48
@emilazy:matrix.orgemilyit's in kernel RAM anyway right? but sure17:44:12
@elvishjerricco:matrix.orgElvishJerriccowell the master key is (and can be dumped from userspace), but this is the passphrase that unwraps the master key17:44:34
13 Oct 2024
@rosscomputerguy:matrix.orgTristan RossHow are hardening options enabled by default in nixpkgs? It looks like in the stdenv?06:34:44
@rosscomputerguy:matrix.orgTristan Ross Interesting, it all comes from pkgs/build-support/bintools-wrapper/default.nix 06:37:02
@rosscomputerguy:matrix.orgTristan Ross Next question, what sort of impact on build failures could we see if we did stackclashprotection by default? 06:37:43
@emilazy:matrix.orgemilyyou'd want to talk to ris06:47:49
@hexa:lossy.networkhexabetterbird is on 115.9.0 on release-24.05 while master has 115.14.0, latest is 115.16.116:56:07
@hexa:lossy.networkhexaI think it should not live in nixpkgs if this is how it gets maintained16:57:32
@hexa:lossy.networkhexathere were also no updates between 115.9.0 and 115.14.0 in nixpkgs https://github.com/NixOS/nixpkgs/pull/33901916:59:50
@emilazy:matrix.orgemilyi feel we ought to have a written policy on things that contain browser engines at this point17:03:33
@emilazy:matrix.orgemilywrt requiring both upstream and Nixpkgs maintainers to be responsive to security issues17:03:56
@tgerbet:matrix.orgtgerbetYeah I wanted to create a tracking issue so we can follow this more closely and see how it evolves over time but I did not get the time to do it17:46:20
@emilazy:matrix.orgemilyIIRC stable branch security backports for betterbird were discussed in the past and the response was "meh, don't care about stable".17:57:10
@emilazy:matrix.orgemilyindeed it looks like it hasn't received any backports this cycle17:57:57
@aloisw:kde.orgaloiswThis does not excuse the package being several months out of date on unstable as well.17:58:45
@emilazy:matrix.orgemilyto be clear, I don't think it excuses it being out of date on stable17:59:23

Show newer messages


Back to Room ListRoom Version: 9