[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: my thoughts on the Vancouver Prospectus



On Tue, Mar 22, 2005 at 12:55:16AM -0800, Steve Langasek wrote:
> On Mon, Mar 21, 2005 at 08:08:57PM +0100, Wouter Verhelst wrote:
> > On Fri, Mar 18, 2005 at 06:44:46PM -0800, Steve Langasek wrote:
> > > - Architectures which need more than 2 buildds to keep up with package
> > >   uploads on an ongoing basis are very slow indeed; while slower,
> > >   low-powered chips are indeed useful in certain applications, they are
> > >   a) unlikely to be able to usefully run much of the software we currently
> > >   expect our ports to build,
> 
> > Please leave it to our users to define what is useful.
> 
> Does this mean "build it all and let the users decide for themselves what
> they want to use"?

That's our current approach, yes.

> Or does it mean "ask the users before getting rid of packages that
> aren't used on the architectures"?

Of all the other alternatives that have been proposed, I would think
this is the only valid one. It's hard to do that correctly, though,
because you can't be sure that you've contacted even a majority of
users.

> If the former, that doesn't seem to leave much room for ever improving
> the return porters to embedded/slow systems will ever get on their
> buildd investment, does it?

I don't see why not.

> > >   and b) definitely too slow in terms of
> > >   single-package build times to avoid inevitably delaying high-priority
> > >   package fixes for RC bugs.
> 
> > I would not have any problem with multi-staged security announcements,
> > for example.
> 
> Well, I guess just as I can't speak on behalf of all users and say they
> won't use KDE on m68k, you can't speak on behalf of them and say they're ok
> with having delayed security support for m68k. :)

Good point. However, what I meant to say is that the multi-staged
security announcements could be an option for the security team in case
a build really takes an awful lot of time, such as in the KDE case, when
this isn't wanted (if there is no embargo set, or the embargo time is
about to pass). They'd be the exception; and in fact, this has happened
before, f.e. with the kernel builds, or with some other huge package
that was being delayed.

For regular, short-timed builds, multi-staged security announcements
wouldn't be required, and thus, they wouldn't be wanted.

> The security team seems historically unconvinced that staggered
> security announcements are worthwhile -- at least partly this is
> because staggered security announcements are more work, AIUI.  In any
> case, you'd have to persuade them that this is a good idea before the
> release team could consider it.

Okay, that makes sense.

> > * Nobody has ever been offered to maintain a buildd host who was not at
> >   least in NM. I did train Matthias Ulrichs and Goswin von Brederlow
> >   when they were, but Goswin's machines were disconnected from w-b even
> >   before he was rejected.

It was getting late when I wrote that, apparently. Goswin's machines
weren't even ever connected to w-b; what happened is that I discontinued
the manual support I had been putting in even before he was rejected.

> >   I'm also quite sure today I won't do that
> >   again, precisely because Goswin was rejected and I don't want to think
> >   of what might've happened had he been able to upload trojanized
> >   binaries (not that I think he would have done so).
> 
> > I'm interested in what your base for the above assertion is.
> 
> Merely a misunderstanding about the current state of affairs with the m68k
> port, it seems.  Certainly with all the fuss Ingo has made over this issue
> in the past, I had the impression that it was actually a current issue --
> not a hypothetical.

Yes, Ingo's deliberate confusion hasn't really helped us a lot either.

> > >   Whether or not these
> > >   particular individuals should be trusted, the truth is that when you have
> > >   to have 10 buildds running to keep up with unstable, it's very difficult
> > >   to get a big-picture view of the security of your binary uploads.
> > >   Security is only as strong as the weakest link.
> 
> > True; but these concerns can be better addressed by spelling out some
> > security requirements (and somehow ensuring they are being followed)
> > rather than imposing some random, unrelated, limit to the number of
> > hosts in use.
> 
> FSVO "better"; having explicit security standards is good, but increasing
> the number of people (and machines) involved still increases the chances
> that somewhere, they will fail to be met.

Well; this may be just me, but I have the feeling that using "no more
than X hosts" as a security precaution is based on "we don't have enough
time, so let's do this the easy way".

Having explicit security standards is a precondition to running a safe
network. If you have a safe network, then the number of hosts shouldn't
matter. Of course, the fact that Debian's network is widespread over the
globe doesn't really help, but trying to remedy that by reducing the
number of hosts smells like chickening out on what the real issues are,
to me. In any case, it isn't really a good measure -- the end result of
this proposal might be that some of the architectures currently not on
ftp.d.o will end up having some host that must be maintained by DSA,
thus that the number of hosts might increase. Then what?

A buildd host does not need much to work safely, so writing a security
standard should be possible. How about a security standard like the
following:

* A buildd host must not have any port open, except for one SSH port
  (preferably port 22, but may be nonstandard).
* It must run OpenSSH of at least version <version without security
  issues in stable> or <version without security issues in unstable>
* It must run a kernel from the list of <list of kernel packages in all
  distributions that are safe>
* It must not have PermitRootLogin enabled
* It must not have PasswordAuthentication enabled
* It must not have any tunneling enabled, except for scp
* It must not have any enabled accounts except for root and the admin
  user(s)
* ... possibly something more?

Then DSA could set up a cronjob that would run every x days, check
whether the requirements are being met, and would scream like hell if
one of the hosts was insecure?

-- 
         EARTH
     smog  |   bricks
 AIR  --  mud  -- FIRE
soda water |   tequila
         WATER
 -- with thanks to fortune



Reply to: