Dirty COW (CVE-2016-5195) is a privilege escalation vulnerability in the Linux Kernel
And?
Honestly, the way people create names and websites for these things, you'd think it's a fund-raiser for something, not a critical security bug.
On Fri, Oct 21, 2016 at 5:22 PM, I beatthebastards@inbox.com wrote:
Dirty COW (CVE-2016-5195) is a privilege escalation vulnerability in the Linux Kernel
tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
On 10/21/2016 06:23 PM, Tristan wrote:
And?
Honestly, the way people create names and websites for these things, you'd think it's a fund-raiser for something, not a critical security bug.
Tristan, they know this. They are even good-natured enough to make fun of it themselves. From http://dirtycow.ninja/
What's with the stupid (logo|website|twitter|github account)?
It would have been fantastic to eschew this ridiculousness, because we
all make fun of branded vulnerabilities too, but this was not the right time to make that stand. So we created a website, an online shop, a twitter account, and used a logo that a professional designer created.
The point is, please check for the latest kernel patches for your relay's Linux distribution. Each effort to harden and secure your relay strengthens the entire network.
Test, not working on my side. Some demos on your side?
Le 22/10/2016 à 00:22, I a écrit :
Dirty COW (CVE-2016-5195) is a privilege escalation vulnerability in the Linux Kernel
tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
https://security-tracker.debian.org/tracker/CVE-2016-5195
Remember, to know your current debian linux kernel : uname -a
If your kernel is not up to date : apt-get update && apt-get dist-upgrade && reboot
I :
Dirty COW (CVE-2016-5195) is a privilege escalation vulnerability in the Linux Kernel
Would it be acceptable to configure unattended-upgrades to automatically reboot the system when required? I already have it configured to check for and install all updates to Ubuntu and Tor once a day, but I still need to manually reboot to apply kernel upgrades.
On Sat, Oct 22, 2016 at 6:26 PM, Petrusko petrusko@riseup.net wrote:
https://security-tracker.debian.org/tracker/CVE-2016-5195
Remember, to know your current debian linux kernel : uname -a
If your kernel is not up to date : apt-get update && apt-get dist-upgrade && reboot
I :
Dirty COW (CVE-2016-5195) is a privilege escalation vulnerability in the
Linux Kernel
-- Petrusko PubKey EBE23AE5 C0BF 2184 4A77 4A18 90E9 F72C B3CA E665 EBE2 3AE5
tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
I don't think it would be a terrible idea but it is always possible that your server will fail to reboot after a kernel upgrade. This leaves it offline without a general idea of why it is offline. I do use unattended-upgrades to automatically restart most services though.
On Sat, Oct 22, 2016 at 07:02:21PM -0500, Tristan wrote:
Would it be acceptable to configure unattended-upgrades to automatically reboot the system when required? I already have it configured to check for and install all updates to Ubuntu and Tor once a day, but I still need to manually reboot to apply kernel upgrades.
On Sat, Oct 22, 2016 at 6:26 PM, Petrusko <[1]petrusko@riseup.net> wrote:
[2]https://security-tracker.debian.org/tracker/CVE-2016-5195 Remember, to know your current debian linux kernel : uname -a If your kernel is not up to date : apt-get update && apt-get dist-upgrade && reboot I : > Dirty COW (CVE-2016-5195) is a privilege escalation vulnerability in the Linux Kernel > > [3]http://dirtycow.ninja/ -- Petrusko PubKey EBE23AE5 C0BF 2184 4A77 4A18 90E9 F72C B3CA E665 EBE2 3AE5 _______________________________________________ tor-relays mailing list [4]tor-relays@lists.torproject.org [5]https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
-- Finding information, passing it along. ~SuperSluether
References
- mailto:petrusko@riseup.net
- https://security-tracker.debian.org/tracker/CVE-2016-5195
- http://dirtycow.ninja/
- mailto:tor-relays@lists.torproject.org
- https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
On 10/22/2016 08:02 PM, Tristan wrote:
Would it be acceptable to configure unattended-upgrades to automatically reboot the system when required? I already have it configured to check for and install all updates to Ubuntu and Tor once a day, but I still need to manually reboot to apply kernel upgrades.
This is not a good idea. For one, the new kernel could break your network connection, which happened to me this morning after I rebooted a personal machine. Second, you will reduce the uptime and stability of your relay, thus it will lose consensus weight if you reboot the machine once a day.
You also need to be careful with automatically installing updates in a production environment, as one of them could break something and it would be some time before you noticed. I prefer to review the updates before I install them and watch the apt-get log in case there are any issues. Debian systems may even show you the changelogs. If an update breaks SSH for whatever reason, at least I'm logged on and can fix it. It would be difficult to fix if the update happened automatically.
Some downsides are documented here: https://wiki.ubuntu.com/AutomaticUpdates and elsewhere online.
Hate to tell you this, but both problems are still a reality whether the machine reboots automatically or not. If I manually reboot for a kernel update that breaks network access, I still won't have SSH. And if I reboot manually after every kernel update, my stability will still suffer.
On Oct 22, 2016 8:26 PM, "Jesse V" kernelcorn@torproject.org wrote:
On 10/22/2016 08:02 PM, Tristan wrote:
Would it be acceptable to configure unattended-upgrades to automatically reboot the system when required? I already have it configured to check for and install all updates to Ubuntu and Tor once a day, but I still need to manually reboot to apply kernel upgrades.
This is not a good idea. For one, the new kernel could break your network connection, which happened to me this morning after I rebooted a personal machine. Second, you will reduce the uptime and stability of your relay, thus it will lose consensus weight if you reboot the machine once a day.
You also need to be careful with automatically installing updates in a production environment, as one of them could break something and it would be some time before you noticed. I prefer to review the updates before I install them and watch the apt-get log in case there are any issues. Debian systems may even show you the changelogs. If an update breaks SSH for whatever reason, at least I'm logged on and can fix it. It would be difficult to fix if the update happened automatically.
Some downsides are documented here: https://wiki.ubuntu.com/AutomaticUpdates and elsewhere online.
-- Jesse
tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Second, you will reduce the uptime and stability of your relay, thus it will lose consensus weight if you reboot the machine once a day.
Unattended-Upgrade::Automatic-Reboot "true";
Does not reboot your machine "once a day", it reboots when a new kernel requires a reboot. Which on Debian stable / Ubuntu LTS is far from being a daily event. And the frequency of reboots actually should not differ compared to manual reboots.
I know some people using this for applying kernel updates without rebooting, but don't know how good it is:
https://www.cloudlinux.com/all-products/product-overview/kernelcare
On 23 October 2016 at 09:16, nusenu nusenu@openmailbox.org wrote:
Second, you will reduce the uptime and stability of your relay, thus it will lose consensus weight if you reboot the machine once a day.
Unattended-Upgrade::Automatic-Reboot "true";
Does not reboot your machine "once a day", it reboots when a new kernel requires a reboot. Which on Debian stable / Ubuntu LTS is far from being a daily event. And the frequency of reboots actually should not differ compared to manual reboots.
tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Hi folks,
I think this is a very extreme and unnecessary solution. While it is good to keep relays up, this may be unreliable. It is good to perform maintenance regularly, and reboots are often best. Also, it appears to be proprietary technology. I would not advise proprietary technology on a Tor relay as it opens up a whole other can of worms, who controls the software etc. Can people really not afford to reboot once a month or similar? Uptime is good but the only reliable way to apply kernel updates has always been reboots. Restarting also can apply updates to certain system services as well, if I am correct.
-- D
On 23 October 2016 09:42:38 BST, Jonathan Baker-Bates jonathan@bakerbates.com wrote:
I know some people using this for applying kernel updates without rebooting, but don't know how good it is:
https://www.cloudlinux.com/all-products/product-overview/kernelcare
On 23 October 2016 at 09:16, nusenu nusenu@openmailbox.org wrote:
Second, you will reduce the uptime and stability of your relay, thus it will lose consensus weight if you reboot the
machine
once a day.
Unattended-Upgrade::Automatic-Reboot "true";
Does not reboot your machine "once a day", it reboots when a new
kernel
requires a reboot. Which on Debian stable / Ubuntu LTS is far from
being
a daily event. And the frequency of reboots actually should not differ compared to manual reboots.
tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Rebooting also makes sure updates are applied correctly. If a shared library updates, the old version is still in use until whatever program using it stops, and the new version is loaded on the next run.
On Oct 23, 2016 10:07 PM, "Duncan Guthrie" dguthrie@posteo.net wrote:
Hi folks,
I think this is a very extreme and unnecessary solution. While it is good to keep relays up, this may be unreliable. It is good to perform maintenance regularly, and reboots are often best. Also, it appears to be proprietary technology. I would not advise proprietary technology on a Tor relay as it opens up a whole other can of worms, who controls the software etc. Can people really not afford to reboot once a month or similar? Uptime is good but the only reliable way to apply kernel updates has always been reboots. Restarting also can apply updates to certain system services as well, if I am correct.
-- D
On 23 October 2016 09:42:38 BST, Jonathan Baker-Bates < jonathan@bakerbates.com> wrote:
I know some people using this for applying kernel updates without rebooting, but don't know how good it is:
https://www.cloudlinux.com/all-products/product-overview/kernelcare
On 23 October 2016 at 09:16, nusenu nusenu@openmailbox.org wrote:
Second, you will reduce the uptime and stability of your relay, thus it will lose consensus weight if you reboot the
machine
once a day.
Unattended-Upgrade::Automatic-Reboot "true";
Does not reboot your machine "once a day", it reboots when a new kernel requires a reboot. Which on Debian stable / Ubuntu LTS is far from being a daily event. And the frequency of reboots actually should not differ compared to manual reboots.
tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
I don't know if it's possible to load a new kernel without rebooting...
But I think people who doesn't want to reboot because feared of a bad reboot, loose SSH or anything else... If OS's teams are updating a system for security, I prefer a bad reboot (backups are done before!) than a system with a lot of security holes, sick of botnets or sending spams every seconds, a Tor relay controlled by bad hands... :s
On other servers (debian/raspbian) I usually use "apticron", it sends everyday mails to root or another admin@domain.com, with summary about updates available for the host.
but I still need to manually reboot to apply kernel upgrades.
Would it be acceptable to configure unattended-upgrades to automatically reboot the system when required? I already have it configured to check for and install all updates to Ubuntu and Tor once a day, but I still need to manually reboot to apply kernel upgrades.
I think
Unattended-Upgrade::Automatic-Reboot "true";
is a good practice for (lazy) tor servers operators to keep running patched kernels automatically, since automation usually reduces the time until the system is patched (and if necessary rebooted) - even if the operator does not follow security announce mailing lists.
tor-relays@lists.torproject.org