!ZRgXNaHrdpGqwUnGnj:nixos.org

NixOS Security Triage

694 Members
Coordination and triage of security issues in nixpkgs215 Servers

Load older messages


SenderMessageTime
19 Jun 2021
@sandro:supersandro.deSandroWhy is NixOS/nixops-committers not a real team?18:27:20
@hexa:lossy.networkhexanot really a security related question, is it?18:29:08
@sandro:supersandro.deSandroI wanted to assign them to the PR above18:35:52
@hexa:lossy.networkhexatalk to one of the project owners then, domen, zimbatm18:44:26
20 Jun 2021
@leo:gaspard.ninjaEkleogmeh, can anyone describe me an actual threat model for shipping an expirated certificate store?18:58:09
@leo:gaspard.ninjaEkleogI mean we definitely shouldn't do it if we can avoid it, but IMO it's not at all worth a knownVulnerabilities18:58:34
@leo:gaspard.ninjaEkleog (haven't investigated this specific case though, just the text in knownVulnerabilities in the PR above) 18:59:22
@leo:gaspard.ninjaEkleogand using knownVulnerabilities too often makes people much more used to working around it so IMO unless there's another motivation not listed yet, adding knownVulnerabilities in this specific case would be a net negative for security for NixOS19:01:29
@leo:gaspard.ninjaEkleog(commented on the PR with more details so the conversation is actually logged somewhere)19:09:00
@hexa:lossy.networkhexaI don't think it's a good to eval at every step whether the mozilla trust store does a revert here and there19:12:16
@hexa:lossy.networkhexathere won't be any security bulletins about this19:12:30
@hexa:lossy.networkhexathe abstract threat model would be a reverted certificate gets accepted, because the revert happened between 2019..today19:13:14
@hexa:lossy.networkhexa * there likely won't be any security bulletins about this19:16:23
@hexa:lossy.networkhexa * there likely won't be any security bulletins about this, certainly no CVE19:16:33
@hexa:lossy.networkhexaof course this is not specific to nixops usage, but who knows what uses certifi (via requests) on python219:17:13
@leo:gaspard.ninjaEkleogI mean CA breakages that actually are bad get publicity literally all over the place, because like 90% of the world runs off outdated CA bundles (yes the number is straight off my hat :p)20:12:46
@leo:gaspard.ninjaEkleogIf your fear is “everything using certifi on python2 could be broken”, one solution might be to have the certifi package be local to nixops so only it could see it? But it's additional complexity I guess, I just don't think the benefit of maybe protecting someone once from a compromised CA (which is basically already state-level attackers so people who should already do security review way beyond what NixOS can humanly do) is greater than the issue that making people used to working around knownVulnerabilities makes it much less efficient at actually preventing real vulnerabilities in other cases20:15:52
@leo:gaspard.ninjaEkleogIOW: I think that knownVulnerabilities should be used, in cases where there is no known fix to the issue, only be used when the vulnerability can actually be used by criminal-group-level attackers, not only state-level attackers (and yes I know that the groups sometimes overlap, doesn't change much)20:17:11
@leo:gaspard.ninjaEkleog * IOW: I think that knownVulnerabilities should, in cases where there is no known fix to the issue, only be used when the vulnerability can actually be used by criminal-group-level attackers, not only state-level attackers (and yes I know that the groups sometimes overlap, doesn't change much)20:17:25
@leo:gaspard.ninjaEkleog * IOW: I think that knownVulnerabilities should, in cases where there is no known fix to the issue, only be used when the vulnerability can actually reasonably be used by criminal-group-level attackers, not only state-level attackers (and yes I know that the groups sometimes overlap, doesn't change much)20:17:51
@sandro:supersandro.deSandroThe entire python2 tree is as badly maintained as it gets. No one tests it while bumping and nixops might be broken in other ways.21:16:12
@hexa:lossy.networkhexafragattacks patches were introduced in v5.13-rc422:06:29
@hexa:lossy.networkhexaalso in v5.12.922:07:15
@hexa:lossy.networkhexaand v5.10.4222:08:37
@hexa:lossy.networkhexaand v5.4.12422:09:13
21 Jun 2021
@emilazy:matrix.orgemily joined the room.00:35:35
@industrialrobot:matrix.orgindustrialrobot joined the room.08:12:49
@andreas.schraegle:helsinki-systems.deajs124seems like there was a dovecot + pigeonhole security release just now11:50:21
@janne.hess:helsinki-systems.dedas_j

changelog says:

 * CVE-2021-29157: Dovecot does not correctly escape kid and azp fields in
   JWT tokens. This may be used to supply attacker controlled keys to
   validate tokens, if attacker has local access.
 * CVE-2021-33515: On-path attacker could have injected plaintext commands
   before STARTTLS negotiation that would be executed after STARTTLS
   finished with the client.
11:51:49
@hexa:lossy.networkhexa ajs124: das_j are you taking care of that? 13:07:05

Show newer messages


Back to Room ListRoom Version: 6