|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] Security policy ambiguities - XSA-108 process post-mortem
George Dunlap writes ("Security policy ambiguities - XSA-108 process
post-mortem"):
> [snip]
>
> As far as I can tell we basically have the following options:
>
> 1. Never allow people to deploy during the embargo period.
>
> This eliminates the possibility that someone will be helped to gain
> information about the vulnerability by comparing a patched system to an
> unpatched one. However, it means that cloud operators may spend a short
> amount of time "publicly vulnerable" while they reboot their systems. I
> assume it would significantly increase the difficulty of coordinating
> such a deployment, as you would have to reboot *all* your servers in the
> smallest time window possible, instead of being able to stage it over
> several days.
>
> It also increases the temptation for operators to "cheat" by starting
> the process a little bit early. This I think could lead to more
> significant problems community-wise: with incentive to break the rules,
> enforcement becomes an issue -- and I'm sure none of the team want to
> have to deal with that.
>
> 2. Always allow people to deploy during the embargo period.
>
> This is simple on the security team, and minimizes the "publicly
> vulnerable time". It makes deployments easier to coordinate, and avoids
> adding an incentive for "bending" the rules.
>
> However, it does in theory allow an attacker the ability to gain
> information about the vulnerability by comparing patched systems to
> unpatched systems. In practice, the vast majority of the time the
> measurable difference in functionality will be like finding a needle in
> a haystack; and if the attacker had ever even thought to try the
> functionality (e.g., XSA-7), she would have already known about the
> bug. But that may not always be the case.
>
> 3. Have the security team attempt to evaluate the risk.
>
> This adds work to the security team. But it at least allows the
> possibility that, in cases where it's pretty clear that early deployment
> *would* give clear hints to an attacker, they could decide to include
> deployment in the embargo.
>
> 4. Have individual cloud operators evaluate the risk.
>
> This seems like a recipe for disaster.
>
> I think #1 is too risky, particularly from a community perspective. But
> maybe I'm being a bit pessimistic.
>
> In my mind, #3 is basically exactly the same as #2, except that in cases
> where there would clearly be a problem, the team has an option of
> embargoing deployment as well.
>
> I just spent about 10 minutes skimming through the 80 or so XSAs on
> http://xenbits.xen.org/xsa/. In most of the cases, it was pretty clear
> that the only behavior that changed would be behavior which would
> already have clued an attacker into the existence of a potential
> vulnerability. For example, in XSA-108, beforehand some reads from the
> reserved x2apic range would have returned values whereas now they would
> #GP. But if the attacker knew that they returned values, it already
> would have occurred to her to see if they returned anything of interest.
>
> I didn't notice a single exception to this, though admittedly I didn't
> spend much time looking at it.
>
> This suggests to me that #2 is probably not that dangerous the majority
> of the time. It also suggests that there may be a simple criteria that
> can be applied for #3 that can eliminate most of the guesswork: Is
> anything in the original behavior being changed likely to lead an
> attacker to think that there may be a vulnerability there? In the case
> of basically all of them, I think the answer there would be "yes".
>
> So at the moment I would favor #3, then #2; I'm not in favor of #1 but I
> wouldn't strenuously argue against it. But the main thing is that we
> have a clear policy.
I like #3 but as clarified in this paragraph:
> In my mind, #3 is basically exactly the same as #2, except that in cases
> where there would clearly be a problem, the team has an option of
> embargoing deployment as well.
i.e. embargoing deployment is an exceptional case.
Cheers,
James
--
James Bulpin
Sr. Director, Technology, XenServer/Networking, Cloud & Service Provider Group
Citrix Systems Inc.
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |