!NBBFPbiuttRgTqbrcY:nixos.org

NixOS Security Discussions

365 Members
Discussions around Security | Triaging happens in #security:nixos.org127 Servers

Load older messages


SenderMessageTime
10 Oct 2024
@qyliss:fairydust.spaceAlyssa Rossperformance will be degraged for approximately three hours while it recovers16:06:29
@qyliss:fairydust.spaceAlyssa Ross(the yellow question mark btw means that checking that branch failed, which usually means something has gone wrong on the backend)16:10:19
11 Oct 2024
@tollb1:matrix.orgtollb1 joined the room.13:21:06
12 Oct 2024
@elvishjerricco:matrix.orgElvishJerricco Jan Tojnar, emily: So what do we want to do about the gdm-autologin LUKS exfiltration thing? I have a working demo of the problem. 17:35:53
@emilazy:matrix.orgemilywe should decide on a fix for ourselves and write up an advisory of the vulnerability and send it to oss-security, cc'ing the arch security team, probably requesting a CVE too however that's done17:36:46
@elvishjerricco:matrix.orgElvishJerriccoIt's worth noting that it's a very niche problem, in the sense that the autologin'd user is almost certainly owned by the same human being who just entered the LUKS password in the first place.17:37:05
@elvishjerricco:matrix.orgElvishJerriccobut yea I don't think that will affect the severity rating of it17:37:18
@emilazy:matrix.orgemilythere are still viable threat models & niche security vulnerabilities should still be reported17:37:27
@emilazy:matrix.orgemilyi think the CVSS probably won't be too bad but we can brainstorm it here17:37:34
@emilazy:matrix.orgemilyI might not be able to do too much today but if you start drafting up an advisory I can probably help tomorrow17:37:49
@elvishjerricco:matrix.orgElvishJerriccobut that means having to know how to write an advisory :P17:38:41
@emilazy:matrix.orgemilylook at the calamares one :p17:39:54
@emilazy:matrix.orgemilyI can help write it if it'd be easier, just have things on my TODO today17:40:28
@emilazy:matrix.orgemilyremind me tomorrow maybe17:40:34
@elvishjerricco:matrix.orgElvishJerriccoAs for the fix for ourselves, I don't know if we should disable it by default or if we should just include a noticeable warning in whatever option description17:40:35
@emilazy:matrix.orgemilyI think we should do both17:41:35
@emilazy:matrix.orgemilyit's too dodgy to be leaking LUKS keys to non-root userspace17:41:50
@emilazy:matrix.orgemilyor really to be retaining them at all in userspace after they're loaded17:41:59
@elvishjerricco:matrix.orgElvishJerriccoyea that's fair17:42:34
@elvishjerricco:matrix.orgElvishJerricco actually, it makes me wonder if systemd ought to be clearing the cryptsetup keyring key before reaching sysinit.target 17:43:07
@elvishjerricco:matrix.orgElvishJerricco like After=cryptsetup.target and Before=sysinit.target, have a service that removes that key 17:43:28
@elvishjerricco:matrix.orgElvishJerriccobecause leaving that key even in the kernel keyring for an extended period of time seems a little odd to me17:43:48
@emilazy:matrix.orgemilyit's in kernel RAM anyway right? but sure17:44:12
@elvishjerricco:matrix.orgElvishJerriccowell the master key is (and can be dumped from userspace), but this is the passphrase that unwraps the master key17:44:34
13 Oct 2024
@rosscomputerguy:matrix.orgTristan RossHow are hardening options enabled by default in nixpkgs? It looks like in the stdenv?06:34:44
@rosscomputerguy:matrix.orgTristan Ross Interesting, it all comes from pkgs/build-support/bintools-wrapper/default.nix 06:37:02
@rosscomputerguy:matrix.orgTristan Ross Next question, what sort of impact on build failures could we see if we did stackclashprotection by default? 06:37:43
@emilazy:matrix.orgemilyyou'd want to talk to ris06:47:49
@hexa:lossy.networkhexabetterbird is on 115.9.0 on release-24.05 while master has 115.14.0, latest is 115.16.116:56:07
@hexa:lossy.networkhexaI think it should not live in nixpkgs if this is how it gets maintained16:57:32

Show newer messages


Back to Room ListRoom Version: 9