back to article Report picks holes in the Linux kernel release signing process

A report looking into the security of the Linux kernel's release signing process has highlighted a range of areas for improvement, from failing to mandate the use of hardware security keys for authentication to use of static keys for SSH access. The Linux kernel is at the heart of a wealth of modern technology, from embedded …

  1. Anonymous Coward
    Anonymous Coward

    Honest question. Why is SSH key rotation any better than, say, having to change passwords periodically? Cannot an intruder with one key leverage it to get the next one and keep going?

    As for requiring physical interaction to smart cards, has consideration been made to the frequency by which these interactions would be necessary, to probe at the risk of click fatigue resulting in the development of bypasses?

    1. DS999 Silver badge

      I assume the recommendation to change SSH keys is due to the possibility of brute force attacks if a weakness in DSA (or whatever type of key is being used) is found that reduces its effectively length.

      Seems a bit silly though, even if a weakness was found that would allow cracking someone's DSA you'd invest a ton of time and money in the cracking. There are a lot of options if you are willing to invest that much, including the simpler (but more risky as far as jail) breaking into their house and threatening them with a $5 wrench.

      1. Ozzard

        Threatening with a $5 wrench is effective in the short term but will be reported within minutes to weeks, at which point the team will take countermeasures.

        That's not what most people who are interested in hacking the Linux kernel are after. They want to be an advanced, persistent threat.

        1. DS999 Silver badge

          Threatening with a $5 wrench is effective in the short term but will be reported within minutes to weeks

          Depends on whether there is a credible threat of returning, or visiting their daughter's school. The people using $5 wrenches are going to be prepared for the possibility the victim might consider reporting it.

          There are also a range of possibilities between $5 wrench and tens of millions of dollars worth of CPU time to crack an SSH key (which itself still relies finding a weakness in DSA or whatever first)

          I mean, sure it is cheap and easy to replace SSH keys on a regular schedule, but that's so far above the low hanging fruit if that's really the biggest potential hole you have exposed you are more secure than anyone else on the planet.

      2. Anonymous Coward
        Anonymous Coward

        Obligatory XKCD

        https://xkcd.com/538/

    2. claimed Bronze badge

      I dont think so, unless you're a lunatic that's using SSH keys for symmetric access.

      You could use a shared key to get the public key of the next token, but that is not going to be of help to you.

      Using your existing access to the developer machine is going to help get the next key, but having the key only works as long as its accepted by the target server, a new laptop and new key and you're locked out, even if you havnt been noticed (horizontal movement obviously ignored).

      Changing passwords means you're reliant on humans to invent new ones, who, we've found, will generate weaker ones or open alternate security holes in the process. The same isn't true for SSH keys as they are machine generated so there is no fatigue going into the process.

  2. Ozzard

    Well done to the Linux Foundation

    It's never much fun to invite independent auditors in who you know will publish their findings openly. The first time you do that, you *know* there's going to be stuff you hadn't seen hauled out into the open, and a certain amount of egg on face as a result.

    Much kudos to the folks who chose this approach, and co-operated with it, despite the inevitable findings.

  3. Dr Paul Taylor

    force majeure

    I wonder what protection the Linux kernel master source has from interference by "higher powers" such as Tech Giants or authoritarian states?

    1. Anonymous Coward
      Anonymous Coward

      Re: force majeure

      At the moment, on top of multiple levels of code review, it has Linus telling them to get stuffed and not being afraid to do so at length. There's a reason people have been trying to compromise him for years.

  4. Anonymous Coward
    Anonymous Coward

    Are the smart cards also to be used as 2FA for SSH when remoting?

    Rotating SSH keys has two disadvantages, (1) it's almost always already too late if there -has- been a breach (2) the act of changing keys is itself a moment of heightened risk.

  5. anothercynic Silver badge

    This review is good

    Reviews and audits are always a good thing. They cast external eyes on what you do, how you do it, and what you can do better.

    No doubt the kernel folk will look at this and improve what they do. :-)

  6. alain williams Silver badge

    Few install directly from kernel.org

    It would be good to see an audit of the security procedures at the distributions as well.

    1. stiine Silver badge

      Re: Few install directly from kernel.org

      And of the auditors themselves...

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Other stories you might like