• [gentoo-dev] [RFC] Removing separate "security supported" arch list

    From =?UTF-8?Q?Micha=C5=82_G=C3=B3rny?=@21:1/5 to All on Thu Oct 21 10:10:01 2021
    Hello,

    Splitting from the discussion in [1] (moving more arhitectures to
    ~arch), I'd like to propose that we remove the "security supported" architecture list from [2] and instead level security support with
    the general architecture support in Gentoo, e.g. by having all
    architectures with stable profiles be "security supported".

    Rationale:

    1. The architecture list seems to date way back and doesn't seem to have
    been maintained properly. According to CVS history, the last time a new architecture was marked "supported" was in 2005; since then,
    architectures were only removed. After the migration to new website,
    the points of contact for architectures aren't even listed anymore.
    The presence of 'ppc' on the list is doubtful at best. At the same
    time, 'arm64' is not supported.

    2. Keeping a separate list can cause confusion, if not make users of architectures such as arm64 feel belittled. I don't really see why
    the Security team should be overriding the overall Gentoo architecture
    support status.

    3. Per the policy, Security team "will not wait for a stable fix on
    these arches before issuing the GLSA and closing the bug". The former
    I don't have a problem with but how could you close the bug before
    cleaning up old versions, and how would you clean up the old versions
    when the new ones aren't stable yet everywhere?

    4. In the end, Security team isn't really respecting this policy.
    In the end, this leads to absurdities like GLSA being released before
    a package is stable on amd64, and confusing the users [4].

    While I agree we could probably establish some criteria when GLSAs
    should be released, the current policy is incorrect and obsolete. In my opinion removing the list is the first step towards cleaning stuff up.


    [1] https://archives.gentoo.org/gentoo-dev/message/fd18905401a1aec78aa6af7238f5ca1c
    [2] https://www.gentoo.org/support/security/vulnerability-treatment-policy.html [3] https://gitweb.gentoo.org/archive/proj/gentoo.git/log/xml/htdocs/proj/en/security/index.xml
    [4] https://bugs.gentoo.org/789240#c2

    --
    Best regards,
    Michał Górny

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Jaco Kroon@21:1/5 to All on Thu Oct 21 10:40:01 2021
    Hi Michał,

    I do agree with the gist of what you're saying, and in absence of a
    better solution I'm in support.

    I also make a disclaimer:  I only use amd64 so none of this really
    affects me, so at the end of the day - I don't really care.

    We have tinderboxes already running that does all kinds of testing for
    amd64 and specifically, both musl and glibc as far as I'm aware.  This
    could be trivially extended to x86 by way of chroot I believe.

    Given emulators I believe it's also possible to extend this to other
    arches at somewhat crazy CPU overhead costs, and I'm not convinced of
    the reliability of these emulators vs real hardware but for the purposes
    of this discussion it may be a moot point (if it works on the emulator
    it's more likely to work on real hardware than the other way around).

    Given the work on nattka, is it possible that nattka could be extended,
    in collaboration with he tinder hosts to submit a specific package for
    compile testing?  Specifically for security (and possibly stablereq)
    bugs I'm thinking have the tinderboxes do the compile tests, as
    requested by nattka, and then once amd64 and possibly x86 has confirmed,
    give the security team the option to force stable on the other arches?

    This may seem to be more controversial than dropping stable for those
    arches, however, consider that ~arch just gets marked anyway, so
    frankly, we're no worse off than with dropping stable for these arches. 
    The point of controversy is that we're taking out a testing point for
    packages, and by implication, control as well as responsibility away
    from the arch teams.

    I'm also wondering about the overall stabilisation process.  To be
    frank:  A LOT of work is being handed over to the arch teams.  I'm not against this, but could we possibly come up with a better way? 
    Specifically, if anyone can request a stable request for an arch, and
    the package maintainer can OK that within certain rules and constraints
    (system enforced, with arch teams allowed to violate that, so if a
    package manager can motivate why then arch can overrule).  So in essence:

    1.  Anyone can request stable for an arch on a package.
    2.  Package maintainer does first ACK (or automatic after a time delay
    and additional parties has requested?)
    3.  Tinderbox for compile tests (At least -* and * on the package
    itself, ideally with "-* single" as well, and any other USE flags as
    required by single ... this will burn a lot of CPU, which is arguably
    better than developer time).
    4.  If there are tests, run these too, and if they all pass, proceed to stable.
    5.  If there are not tests ... ?

    Anyway, just some thoughts, hoping to spark some ideas.  At the end of
    the day I agree with Michał (as I read his message) - differentiation
    between stable supported and security supported doesn't make sense.

    Kind Regards,
    Jaco

    On 2021/10/21 10:05, Michał Górny wrote:

    Hello,

    Splitting from the discussion in [1] (moving more arhitectures to
    ~arch), I'd like to propose that we remove the "security supported" architecture list from [2] and instead level security support with
    the general architecture support in Gentoo, e.g. by having all
    architectures with stable profiles be "security supported".

    Rationale:

    1. The architecture list seems to date way back and doesn't seem to have
    been maintained properly. According to CVS history, the last time a new architecture was marked "supported" was in 2005; since then,
    architectures were only removed. After the migration to new website,
    the points of contact for architectures aren't even listed anymore.
    The presence of 'ppc' on the list is doubtful at best. At the same
    time, 'arm64' is not supported.

    2. Keeping a separate list can cause confusion, if not make users of architectures such as arm64 feel belittled. I don't really see why
    the Security team should be overriding the overall Gentoo architecture support status.

    3. Per the policy, Security team "will not wait for a stable fix on
    these arches before issuing the GLSA and closing the bug". The former
    I don't have a problem with but how could you close the bug before
    cleaning up old versions, and how would you clean up the old versions
    when the new ones aren't stable yet everywhere?

    4. In the end, Security team isn't really respecting this policy.
    In the end, this leads to absurdities like GLSA being released before
    a package is stable on amd64, and confusing the users [4].

    While I agree we could probably establish some criteria when GLSAs
    should be released, the current policy is incorrect and obsolete. In my opinion removing the list is the first step towards cleaning stuff up.


    [1] https://archives.gentoo.org/gentoo-dev/message/fd18905401a1aec78aa6af7238f5ca1c
    [2] https://www.gentoo.org/support/security/vulnerability-treatment-policy.html
    [3] https://gitweb.gentoo.org/archive/proj/gentoo.git/log/xml/htdocs/proj/en/security/index.xml
    [4] https://bugs.gentoo.org/789240#c2


    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Mike Gilbert@21:1/5 to mgorny@gentoo.org on Thu Oct 21 17:20:02 2021
    On Thu, Oct 21, 2021 at 4:05 AM Michał Górny <mgorny@gentoo.org> wrote:
    4. In the end, Security team isn't really respecting this policy.
    In the end, this leads to absurdities like GLSA being released before
    a package is stable on amd64, and confusing the users [4].

    This is certainly an absurd mistake, but I think it is unrelated to
    the topic of your message. It looks like Whissi jumped the gun on
    releasing a GLSA, which could happen regardless of the policy. Am I
    missing some context?

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Aaron Bauman@21:1/5 to All on Thu Oct 21 19:10:01 2021
    On Thu, Oct 21, 2021 at 10:05:20AM +0200, Micha=C5=82 G=C3=B3rny wrote:
    Hello,
    =20
    Splitting from the discussion in [1] (moving more arhitectures to
    ~arch), I'd like to propose that we remove the "security supported" architecture list from [2] and instead level security support with
    the general architecture support in Gentoo, e.g. by having all
    architectures with stable profiles be "security supported".


    I fully support this approach and have long advocated for it.

    Overall, all stables arches should be security supported and if
    they begin lagging behind they should be dropped to unstable.

    I am sure there are some nuances, but this is a great start.

    Let's do it!

    -Aaron

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Thomas Deutschmann@21:1/5 to All on Sat Oct 23 04:00:01 2021
    This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --------------SyZ16GXLf85930gNAnUQtfH2
    Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: base64

    T24gMjAyMS0xMC0yMSAxNzoxNiwgTWlrZSBHaWxiZXJ0IHdyb3RlOg0KPiBPbiBUaHUsIE9j dCAyMSwgMjAyMSBhdCA0OjA1IEFNIE1pY2hhxYIgR8Ozcm55IDxtZ29ybnlAZ2VudG9vLm9y Zz4gd3JvdGU6DQo+PiA0LiBJbiB0aGUgZW5kLCBTZWN1cml0eSB0ZWFtIGlzbid0IHJlYWxs eSByZXNwZWN0aW5nIHRoaXMgcG9saWN5Lg0KPj4gSW4gdGhlIGVuZCwgdGhpcyBsZWFkcyB0 byBhYnN1cmRpdGllcyBsaWtlIEdMU0EgYmVpbmcgcmVsZWFzZWQgYmVmb3JlDQo+PiBhIHBh Y2thZ2UgaXMgc3RhYmxlIG9uIGFtZDY0LCBhbmQgY29uZnVzaW5nIHRoZSB1c2VycyBbNF0u DQo+IA0KPiBUaGlzIGlzIGNlcnRhaW5seSBhbiBhYnN1cmQgbWlzdGFrZSwgYnV0IEkgdGhp bmsgaXQgaXMgdW5yZWxhdGVkIHRvDQo+IHRoZSB0b3BpYyBvZiB5b3VyIG1lc3NhZ2UuIEl0 IGxvb2tzIGxpa2UgV2hpc3NpIGp1bXBlZCB0aGUgZ3VuIG9uDQo+IHJlbGVhc2luZyBhIEdM U0EsIHdoaWNoIGNvdWxkIGhhcHBlbiByZWdhcmRsZXNzIG9mIHRoZSBwb2xpY3kuIEFtIEkN Cj4gbWlzc2luZyBzb21lIGNvbnRleHQ/DQoNClllYWgsICM0IGlzIGJ1bGxzaGl0Lg0KDQpU aGUgc2VjdXJpdHkgdGVhbSB3YXMgbmV2ZXIgaGFwcHkgd2l0aCB0aGUgc2l0dWF0aW9uIHRv IGhvbGQgYmFjayBHTFNBcyANCnVudGlsIGxhc3QgYXJjaGl0ZWN0dXJlIHdhcyBtYXJrZWQg c3RhYmxlLg0KDQpTYXlpbmcgdGhhdCB3ZSBhcmUgbm90IHJlc3BlY3Rpbmcgb3VyIG93biBv d24gcG9saWN5IGlzIGFic3VyZC4gVGhlIHRlYW0gDQpkaXNjdXNzZWQgdGhpcyBpbiAyMDE4 IGFuZCB3ZSBhZ3JlZWQgdGhhdCBpdCBpcyBmaW5lIHRvIGFscmVhZHkgcHVibGlzaCANCmEg R0xTQSBpbiBjYXNlIGEgR0xTQSBpcyByZWFkeSBhbmQgd2hlbiBhdCBsZWFzdCBvbmUgbWFq b3IgYXJjaGl0ZWN0dXJlIA0KKGFtZDY0IG9yIHg4NiBhdCB0aGF0IHRpbWUpIHdhcyBtYXJr ZWQgc3RhYmxlLiBUaGF0IGV4Y2VwdGlvbiBkb2Vzbid0IA0KcmVxdWlyZSBhIGZvcm1hbCBw b2xpY3kgdXBkYXRlLg0KDQpXZSBldmVuIHdhbnRlZCB0byBnbyBvbmUgc3RlcCBmdXJ0aGVy IGFuZCByZWxlYXNlIEdMU0Egd2hlbiBubyBmaXhlZCANCnZlcnNpb24gaXMgYXZhaWxhYmxl IGF0IGFsbCB0byBpbmZvcm0gdXNlcnMgYW5kIGdpdmUgdGhlbSBhIGNoYW5jZSB0byANCnRh a2UgYWN0aW9ucyBvbiB0aGVpciBvd24gKHRvIGJlIGFibGUgdG8gdGFrZSBhY3Rpb25zIG9u IHlvdXIgb3duLCBpLmUuIA0KeW91IGZpcnN0IG5lZWQgdG8gYmUgYXdhcmUgb2YgYSBwcm9i bGVtKS4gSG93ZXZlciwgdGhpcyB3b3VsZCBiZSB0b28gDQpjb21wbGljYXRlZCBhbmQgd291 bGQgZnJ1c3RyYXRlIG1hbnkgdXNlcnMuDQoNClRoZSBsaXZlZCBwcmFjdGljZSB3aXRoIHJl bGVhc2luZyBHTFNBIGFscmVhZHkgd2hlbiBqdXN0IG9uZSBtYWpvciANCmFyY2hpdGVjdHVy ZSBoYXMgc2V0IHN0YWJsZSBrZXl3b3JkIChhbmQgaW4gbW9zdCBjYXNlcyB3ZSBjb3ZlcmVk IGFtZDY0IA0KYW5kIHg4NiBhdCByZWxlYXNlIHRpbWUpIHJlY2VpdmVkIGdvb2QgZmVlZGJh Y2sgYW5kIGlzIGFjY2VwdGVkIGJ5IHVzZXJzIA0KYW5kIGRpZG4ndCBjYXVzZSBhbnkgcHJv YmxlbXMgKGNhbid0IHJlbWVtYmVyIHRoYXQgd2UgZXZlciBnb3QgR0xTQSANCmZlZWRiYWNr IGZvciBvdGhlciBhcmNoaXRlY3R1cmVzIHRoYW4gYW1kNjQgb3IgeDg2KS4NCg0KDQotLSAN ClJlZ2FyZHMsDQpUaG9tYXMgRGV1dHNjaG1hbm4gLyBHZW50b28gTGludXggRGV2ZWxvcGVy DQpmcHI6IEM0REQgNjk1RiBBNzEzIDhGMjQgMkFBMSA1NjM4IDU4NDkgN0VFNSAxRDVEIDc0 QTUNCg==

    --------------SyZ16GXLf85930gNAnUQtfH2--

    -----BEGIN PGP SIGNATURE-----

    wsB5BAABCAAjFiEEExKRzo+LDXJgXHuURObr3Jv2BVkFAmFza6AFAwAAAAAACgkQRObr3Jv2BVkZ 6Af+PW+D2QLzeTzHmVS6QiX+stGbBc+Mqex7tIK5m3Wd+4gYvYD6bCb2U7UO2OU2KB2K5xomFGtk ChwPosdD1ueZTN+mML6YE7hpY8bHEleEQhv/wZcys+DUe17OqAvPwQX8dTnqLFPRlAWo3egM2E8R uNE6BXtOyhC04qgcQPgiA+V6GxV/dodyAfiXDe2xzBmks/5JLlUVS3xo4R49Ja6Ta7/xf8rSWgub j0LSL0YcAAt1G5fz4GO/gVnUzVSwQ37dIdS7wCyXeYhidZFmVRLHIXrfrpqbqCpN1rLc8xa3T10B TzSd55Cz38jsYM/Cblw+aJtEShxZ8p6Ertey1LKlKg==
    =IjPk
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Sam James@21:1/5 to All on Sat Oct 23 15:50:01 2021
    On 21 Oct 2021, at 18:04, Aaron Bauman <bman@gentoo.org> wrote:

    On Thu, Oct 21, 2021 at 10:05:20AM +0200, Micha=C5=82 G=C3=B3rny wrote:
    Hello,
    =20
    Splitting from the discussion in [1] (moving more arhitectures to
    ~arch), I'd like to propose that we remove the "security supported"
    architecture list from [2] and instead level security support with
    the general architecture support in Gentoo, e.g. by having all
    architectures with stable profiles be "security supported".


    I fully support this approach and have long advocated for it.

    Overall, all stables arches should be security supported and if
    they begin lagging behind they should be dropped to unstable.

    I am sure there are some nuances, but this is a great start.

    Let's do it!

    +1 for reasons you said + in the original proposal.

    We don't currently adhere to the stated policy verbatim
    anyway and I don't think it adds anything right now.

    best,
    sam


    -----BEGIN PGP SIGNATURE-----

    iQGTBAEBCgB9FiEEYOpPv/uDUzOcqtTy9JIoEO6gSDsFAmF0Eh9fFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDYw RUE0RkJGRkI4MzUzMzM5Q0FBRDRGMkY0OTIyODEwRUVBMDQ4M0IACgkQ9JIoEO6g SDvZPgf/VsbgCT5dKBtUAjaLnnrx4cFBLYh+Qy5HesvO7L4OBPtwJlT73z5BFxSB fi9kRTwG+t2mZYe+ghvmzUzZ80Tq6DHjlgdrklS7z3oGQSbejCGa9nNa0UswjY5c Xiegu717/yJosyyLSipBK6JQpY7L38jvxIHX03nIbRQM6FeGtwz70U8w/rUv67cU uiIm1/6pkTrSIT1cgZWe5p0UlEPyx08APYNFq9fqbE2ytGaqhtJu3pV2E7iuVMcp 8hYONdNHOjZjq2HbzNf8oMRzIM6bYOyeEbCdKQsZ4Fol6EVKjnLF3cO4ajAWd7t9 SwB/4FTXnly9fJZSKHLf1ZuGvnt0Vg==
    =eswX
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From John Helmert III@21:1/5 to All on Wed Oct 27 17:20:01 2021
    On Thu, Oct 21, 2021 at 10:05:20AM +0200, Michał Górny wrote:
    Hello,

    Splitting from the discussion in [1] (moving more arhitectures to
    ~arch), I'd like to propose that we remove the "security supported" architecture list from [2] and instead level security support with
    the general architecture support in Gentoo, e.g. by having all
    architectures with stable profiles be "security supported".

    This will better align the written policy with what actually happens
    in reality, so I'm all for it! Thanks for bringing this up.
    -----BEGIN PGP SIGNATURE-----

    iQIzBAABCAAdFiEElFuPenBj6NvNLoABXP0dAeB+IzgFAmF5bPEACgkQXP0dAeB+ Izh2PA//SCcERwTJ/SVjYq7jSPzAZkPPFjGtCZuOe0r9DVIHgYV3vBfNCXjOs8zz xrwiKr7W/KGkDaoReKChHlpldskkJStQw0Kahzhp2Gagg1DHRwRcEKAKUe2b2m/d 0Sh780+xcfoMtsFIKW5Elmf5fsBn7s8+ekRhDfOfG8wtJfHRO2f6LE32EDP/g738 b/1iD+vmGbof8TSG/SFESX0CW8BgMm9oyoSVWL/PGG2o3I+J9WB9EQKcVeur7faI 0gD26Y9O915NnkaQKtExl+2/weXnD+3siWy3cmGVwOLdgxmMgpwNrAprnI15/bij PrKBJmWnieig9sYcYqkoegyRGD8T98wa7o+OWz93DflWr7DWn89XvD9nfTinTDt1 VvWwtykje1d1ZE5q5mkk1r9YzyL15LixP+x4t/cVHFMHXMZ/7WwYF8wQJJpFvgV4 o4USZx/Utxl+DaDIVs2N+DbdNUEcoPlF1t+rWk6+8HaXYsaIx64BSQRia9/p2k9s DCE25xEUblwteLoZCla1ikJ6lT5EK3KJoIF0KImaoWFLbCg1VsO7Z7+W+XLiqUmB BldS2PYOknYOrpjcBvR/pkYPdbXOd5oObOSKV8ZYpUZCOi8Kv2Hz8MsYjQ2JVwuY P3jMbx6Mv8XtkFfxsTw052nAdWIOe66yLS3IOAR8xET43yjy+Xg=
    =LU+E
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)