aboutsummaryrefslogtreecommitdiffstats
path: root/l.patch
diff options
Diffstat (limited to 'l.patch')
-rw-r--r--l.patch348
1 files changed, 0 insertions, 348 deletions
diff --git a/l.patch b/l.patch
deleted file mode 100644
index 3a687a892dd5e5..00000000000000
--- a/l.patch
+++ /dev/null
@@ -1,348 +0,0 @@
-Subject: [PATCH] Documentation/admin-guide: Embargoed hardware security issues
-
-From: Thomas Gleixner <tglx@linutronix.de>
-
-To address the requirements of embargoed hardware issues, like Meltdown,
-Spectre, L1TF etc. it is necessary to define and document a process for
-handling embargoed hardware security issues.
-
-Following the discussion at the maintainer summit 2018 in Edinburgh
-(https://lwn.net/Articles/769417/) the volunteered people have worked
-out a process and a Memorandum of Understanding. The latter addresses
-the fact that the Linux kernel community cannot sign NDAs for various
-reasons.
-
-The initial contact point for hardware security issues is different from
-the regular kernel security contact to provide a known and neutral
-interface for hardware vendors and researchers. The initial primary
-contact team is proposed to be staffed by Linux Foundation Fellows, who
-are not associated to a vendor or a distribution and are well connected
-in the industry as a whole.
-
-The process is designed with the experience of the past incidents in
-mind and tries to address the remaining gaps, so future (hopefully rare)
-incidents can be handled more efficiently. It won't remove the fact,
-that most of this has to be done behind closed doors, but it is set up
-to avoid big bureaucratic hurdles for individual developers.
-
-The process is solely for handling hardware security issues and cannot
-be used for regular kernel (software only) security bugs.
-
-This memo can help with hardware companies who, and I quote, "[my
-manager] doesn't want to bet his job on the list keeping things secret."
-This despite numerous leaks directly from that company over the years,
-and none ever so far from the kernel security team. Cognitive
-dissidence seems to be a requirement to be a good manager.
-
-To accelerate the adoption of this process, we introduce the concept of
-ambassadors in participating companies. The ambassadors are there to
-guide people to comply with the process, but are not automatically
-involved in the disclosure of a particular incident.
-
-Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
-Reviewed-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
-Reviewed-by: Josh Poimboeuf <jpoimboe@redhat.com>
-Acked-by: Laura Abbott <labbott@redhat.com>
-Acked-by: Ben Hutchings <ben@decadent.org.uk>
-Reviewed-by: Tyler Hicks <tyhicks@canonical.com>
-Reviewed-by: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
-Reviewed-by: Jiri Kosina <jkosina@suse.cz>
-Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
-
----
- Documentation/process/embargoed-hardware-issues.rst | 279 ++++++++++++++++++++
- Documentation/process/index.rst | 1
- 2 files changed, 280 insertions(+)
-
---- /dev/null
-+++ b/Documentation/process/embargoed-hardware-issues.rst
-@@ -0,0 +1,279 @@
-+Embargoed hardware issues
-+=========================
-+
-+Scope
-+-----
-+
-+Hardware issues which result in security problems are a different category
-+of security bugs than pure software bugs which only affect the Linux
-+kernel.
-+
-+Hardware issues like Meltdown, Spectre, L1TF etc. must be treated
-+differently because they usually affect all Operating Systems ("OS") and
-+therefore need coordination across different OS vendors, distributions,
-+hardware vendors and other parties. For some of the issues, software
-+mitigations can depend on microcode or firmware updates, which need further
-+coordination.
-+
-+.. _Contact:
-+
-+Contact
-+-------
-+
-+The Linux kernel hardware security team is separate from the regular Linux
-+kernel security team.
-+
-+The team only handles the coordination of embargoed hardware security
-+issues. Reports of pure software security bugs in the Linux kernel are not
-+handled by this team and the reporter will be guided to contact the regular
-+Linux kernel security team (:ref:`Documentation/admin-guide/
-+<securitybugs>`) instead.
-+
-+The team can be contacted by email at <hardware-security@kernel.org>. This
-+is a private list of security officers who will help you to coordinate an
-+issue according to our documented process.
-+
-+The list is encrypted and email to the list can be sent by either PGP or
-+S/MIME encrypted and must be signed with the reporter's PGP key or S/MIME
-+certificate. The list's PGP key and S/MIME certificate are available from
-+https://www.kernel.org/....
-+
-+While hardware security issues are often handled by the affected hardware
-+vendor, we welcome contact from researchers or individuals who have
-+identified a potential hardware flaw.
-+
-+Hardware security officers
-+^^^^^^^^^^^^^^^^^^^^^^^^^^
-+
-+The current team of hardware security officers:
-+
-+ - Linus Torvalds (Linux Foundation Fellow)
-+ - Greg Kroah-Hartman (Linux Foundation Fellow)
-+ - Thomas Gleixner (Linux Foundation Fellow)
-+
-+Operation of mailing-lists
-+^^^^^^^^^^^^^^^^^^^^^^^^^^
-+
-+The encrypted mailing-lists which are used in our process are hosted on
-+Linux Foundation's IT infrastructure. By providing this service Linux
-+Foundation's director of IT Infrastructure security technically has the
-+ability to access the embargoed information, but is obliged to
-+confidentiality by his employment contract. Linux Foundation's director of
-+IT Infrastructure security is also responsible for the kernel.org
-+infrastructure.
-+
-+The Linux Foundation's current director of IT Infrastructure security is
-+Konstantin Ryabitsev.
-+
-+
-+Non-disclosure agreements
-+-------------------------
-+
-+The Linux kernel hardware security team is not a formal body and therefore
-+unable to enter into any non-disclosure agreements. The kernel community
-+is aware of the sensitive nature of such issues and offers a Memorandum of
-+Understanding instead.
-+
-+
-+Memorandum of Understanding
-+---------------------------
-+
-+The Linux kernel community has a deep understanding of the requirement to
-+keep hardware security issues under embargo for coordination between
-+different OS vendors, distributors, hardware vendors and other parties.
-+
-+The Linux kernel community has successfully handled hardware security
-+issues in the past and has the necessary mechanisms in place to allow
-+community compliant development under embargo restrictions.
-+
-+The Linux kernel community has a dedicated hardware security team for
-+initial contact, which oversees the process of handling such issues under
-+embargo rules.
-+
-+The hardware security team identifies the developers (domain experts) who
-+will form the initial response team for a particular issue. The initial
-+response team can bring in further developers (domain experts) to address
-+the issue in the best technical way.
-+
-+All involved developers pledge to adhere to the embargo rules and to keep
-+the received information confidential. Violation of the pledge will lead to
-+immediate exclusion from the current issue and removal from all related
-+mailing-lists. In addition, the hardware security team will also exclude
-+the offender from future issues. The impact of this consequence is a highly
-+effective deterrent in our community. In case a violation happens the
-+hardware security team will inform the involved parties immediately. If you
-+or anyone becomes aware of a potential violation, please report it
-+immediately to the Hardware security officers.
-+
-+
-+Process
-+^^^^^^^
-+
-+Due to the globally distributed nature of Linux kernel development,
-+face-to-face meetings are almost impossible to address hardware security
-+issues. Phone conferences are hard to coordinate due to time zones and
-+other factors and should be only used when absolutely necessary. Encrypted
-+email has been proven to be the most effective and secure communication
-+method for these types of issues.
-+
-+Start of Disclosure
-+"""""""""""""""""""
-+
-+Disclosure starts by contacting the Linux kernel hardware security team by
-+email. This initial contact should contain a description of the problem and
-+a list of any known affected hardware. If your organization builds or
-+distributes the affected hardware, we encourage you to also consider what
-+other hardware could be affected.
-+
-+The hardware security team will provide an incident-specific encrypted
-+mailing-list which will be used for initial discussion with the reporter,
-+further disclosure and coordination.
-+
-+The hardware security team will provide the disclosing party a list of
-+developers (domain experts) who should be informed initially about the
-+issue after confirming with the developers that they will adhere to this
-+Memorandum of Understanding and the documented process. These developers
-+form the initial response team and will be responsible for handling the
-+issue after initial contact. The hardware security team is supporting the
-+response team, but is not necessarily involved in the mitigation
-+development process.
-+
-+While individual developers might be covered by a non-disclosure agreement
-+via their employer, they cannot enter individual non-disclosure agreements
-+in their role as Linux kernel developers. They will, however, agree to
-+adhere to this documented process and the Memorandum of Understanding.
-+
-+
-+Disclosure
-+""""""""""
-+
-+The disclosing party provides detailed information to the initial response
-+team via the specific encrypted mailing-list.
-+
-+From our experience the technical documentation of these issues is usually
-+a sufficient starting point and further technical clarification is best
-+done via email.
-+
-+Mitigation development
-+""""""""""""""""""""""
-+
-+The initial response team sets up an encrypted mailing-list or repurposes
-+an existing one if appropriate. The disclosing party should provide a list
-+of contacts for all other parties who have already been, or should be
-+informed about the issue. The response team contacts these parties so they
-+can name experts who should be subscribed to the mailing-list.
-+
-+Using a mailing-list is close to the normal Linux development process and
-+has been successfully used in developing mitigations for various hardware
-+security issues in the past.
-+
-+The mailing-list operates in the same way as normal Linux development.
-+Patches are posted, discussed and reviewed and if agreed on applied to a
-+non-public git repository which is only accessible to the participating
-+developers via a secure connection. The repository contains the main
-+development branch against the mainline kernel and backport branches for
-+stable kernel versions as necessary.
-+
-+The initial response team will identify further experts from the Linux
-+kernel developer community as needed and inform the disclosing party about
-+their participation. Bringing in experts can happen at any time of the
-+development process and often needs to be handled in a timely manner.
-+
-+Coordinated release
-+"""""""""""""""""""
-+
-+The involved parties will negotiate the date and time where the embargo
-+ends. At that point the prepared mitigations are integrated into the
-+relevant kernel trees and published.
-+
-+While we understand that hardware security issues need coordinated embargo
-+time, the embargo time should be constrained to the minimum time which is
-+required for all involved parties to develop, test and prepare the
-+mitigations. Extending embargo time artificially to meet conference talk
-+dates or other non-technical reasons is creating more work and burden for
-+the involved developers and response teams as the patches need to be kept
-+up to date in order to follow the ongoing upstream kernel development,
-+which might create conflicting changes.
-+
-+CVE assignment
-+""""""""""""""
-+
-+Neither the hardware security team nor the initial response team assign
-+CVEs, nor are CVEs required for the development process. If CVEs are
-+provided by the disclosing party they can be used for documentation
-+purposes.
-+
-+Process ambassadors
-+-------------------
-+
-+For assistance with this process we have established ambassadors in various
-+organizations, who can answer questions about or provide guidance on the
-+reporting process and further handling. Ambassadors are not involved in the
-+disclosure of a particular issue, unless requested by a response team or by
-+an involved disclosed party. The current ambassadors list:
-+
-+ ============= ========================================================
-+ ARM
-+ AMD
-+ IBM
-+ Intel
-+ Qualcomm
-+
-+ Microsoft
-+ VMware
-+ XEN
-+
-+ Canonical Tyler Hicks <tyhicks@canonical.com>
-+ Debian Ben Hutchings <ben@decadent.org.uk>
-+ Oracle Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
-+ Red Hat Josh Poimboeuf <jpoimboe@redhat.com>
-+ SUSE Jiri Kosina <jkosina@suse.cz>
-+
-+ Amazon
-+ Google
-+ ============== ========================================================
-+
-+If you want your organization to be added to the ambassadors list, please
-+contact the hardware security team. The nominated ambassador has to
-+understand and support our process fully and is ideally well connected in
-+the Linux kernel community.
-+
-+Encrypted mailing-lists
-+-----------------------
-+
-+We use encrypted mailing-lists for communication. The operating principle
-+of these lists is that email sent to the list is encrypted either with the
-+list's PGP key or with the list's S/MIME certificate. The mailing-list
-+software decrypts the email and re-encrypts it individually for each
-+subscriber with the subscriber's PGP key or S/MIME certificate. Details
-+about the mailing-list software and the setup which is used to ensure the
-+security of the lists and protection of the data can be found here:
-+https://www.kernel.org/....
-+
-+List keys
-+^^^^^^^^^
-+
-+For initial contact see :ref:`Contact`. For incident specific mailing-lists
-+the key and S/MIME certificate are conveyed to the subscribers by email
-+sent from the specific list.
-+
-+Subscription to incident specific lists
-+^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
-+
-+Subscription is handled by the response teams. Disclosed parties who want
-+to participate in the communication send a list of potential subscribers to
-+the response team so the response team can validate subscription requests.
-+
-+Each subscriber needs to send a subscription request to the response team
-+by email. The email must be signed with the subscriber's PGP key or S/MIME
-+certificate. If a PGP key is used, it must be available from a public key
-+server and is ideally connected to the Linux kernel's PGP web of trust. See
-+also: https://www.kernel.org/signature.html.
-+
-+The response team verifies that the subscriber request is valid and adds
-+the subscriber to the list. After subscription the subscriber will receive
-+email from the mailing-list which is signed either with the list's PGP key
-+or the list's S/MIME certificate. The subscriber's email client can extract
-+the PGP key or the S/MIME certificate from the signature so the subscriber
-+can send encrypted email to the list.
-+
---- a/Documentation/process/index.rst
-+++ b/Documentation/process/index.rst
-@@ -45,6 +45,7 @@ Other guides to the community that are o
- submit-checklist
- kernel-docs
- deprecated
-+ embargoed-hardware-issues
-
- These are some overall technical guides that have been put here for now for
- lack of a better place.