SlideShare a Scribd company logo
1 of 39
Download to read offline
Security Overview 2022
Marcus Meissner
Projectmanager Security / Distinguished Engineer
meissner@suse.de
2
Agenda
●
Introduction to the SUSE Product Security Team
●
Retrospecting year 2022/2021
●
Closing the (openSUSE) Leap Gap
●
Supply Chain Security
●
Outlooks
3
Introducing the team
Teamlead: Stoyan Manolov
Reactive:
• Projectmanager/DE: Marcus Meissner
• Security Engineers: Alexander Bergmann, Robert Frohl, Gianluca Gabrielli,
Carlos Lopez, Gabriele Sonnu, Thomas Leroy, Mæve Rey, Cathy Hu
• Trainee: Michael Muschner
Proactive:
• Lead: Johannes Segitz
• Security Engineers: Matthias Gerstner, Wolfgang Frisch, Paolo Perego, Filipo
Bonazzi
4
Proactive vs Reactive
Reactive:
• Incident response and handling (PSIRT)
• Tracking CVEs, coordinating fixes, monitoring
• also working on proactive projects
Proactive:
• Audit programs and system services (systemd, dbus, network)
• Approving product releases
• All security work before shipment
• SELinux
5
Reactive Security
6
Reactive Security
• Reacting on reported security issues
• Roles: Incident and Update Managers
• Coordinating from begin to end, delegate
– Fixing to package maintainer
– Source review to OBS/IBS reviewers
– Testing to QA
• Release
• Documentation
– Human and machine readable
7
Incident Management
Open bug:
• Summary line: VUL-x: CVE: package: summary
• In SUSE Security Incidents product
• Description with references / links
• Patches and reproducers attached
• Assign to packager / bugowner
SMASH Issue:
• Rating and CVSSv3 scoring
• Affected Software (for SLE)
8
Opened bugs per week: 2006 - 2022
11
Update Management
Packager submits updates
Security Team
• Writes metadata (summary, description, issues)
• Checks if building
• Pushes to QA
QA tests update
Security Team
• Releases update
• Additional documentation work
14
Reactive work – what is delivered
The updates themselves
Notifications for every update
• E-Mail and web https://www.suse.com/support/update/
• E-Mail to security-announce@lists.opensuse.org
Autogenerated information:
• CVE webpages https://www.suse.com/security/cve/
• OVAL data https://www.suse.com/support/security/oval/
• Advisory CVRF data http://ftp.suse.com/pub/projects/security/cvrf/ (CVRF 1.1,
1.2)
• CVE CVRF 1.2 data: https://ftp.suse.com/pub/projects/security/cvrf-cve/
16
High Impact Vulnerabilities
Usual incidents are handled in a pipeline, but some stand out:
HEARTBLEED, SHELLSHOCK … , MELTDOWN, SYSTEM DOWN, MDS
Issues that need:
• Quick reaction
• More communication
• More documentation
• Tricky fixes
Special category
Special process and special team to handle it
24
Proactive Security
25
Proactive Security
Making products secure before shipment
Secure Development Lifecycle
Automated checks during build
• setuid binaries
• DBUS services
• PolicyKit rules
• PAM modules
And:
• systemd and network services
• Whatever comes up
26
Proactive Security
Security audits are “rolling”
• Based on Factory development
• Based on packages
• But also on final product
Most of our work for SUSE Linux Enterprise is done in openSUSE!
27
Retrospecting 2021 and 2022
28
Reactive Security Stats
Year 2019 2020 2021 2022
Total CVE 2645 2461 2559 1197 (30.5.)
CVE released 2139 2176 1911 1131 (30.5)
Updates
released
2032 2129 2364 965 (30.5.)
OpenSUSE
updates
862 729 880 211 (30.5.)
29
High Impact Vulnerabilities 2021-2022
2021:
●
LOG4SHELL
●
Boothole2 – 2nd
iteration of grub2 secure boot issues
●
DHEATER – exploit Diffie Hellman key exchange (e.g. in TLS)
●
DNSPooq, FREAKOUT, Baron Samedit, FRAGATTACK, Sequoia,
OMIGOD
●
Various CPU side channel issues – similar to last years
2022:
●
Dirty Pipe, Pwnkit, Samba vfs_fruit, More CPU side channel issues
●
… and the year is not over yet ...
30
Proactive highlights
●
RPMLINT 2 migration
●
More whitelisting methods (logrotate, rpm scripts, hashes of
monitored config files)
●
AUDITs happened on a lot of packages
●
Factory uses “-z now” linking (Full RELRO)
●
Factory supports crypto-policies (and SLES 15 SP4 too)
●
We are picking up more SELinux work
31
Closing the Leap Gap
32
Closing the Leap Gap
History:
OpenSUSE Leap 42.x, 15.0 - 15.2
●
Imported and rebuilt SLES sources after their release
●
Pushed through separate maintenance pipeline
●
SLE PackageHub imported and rebuilt Leap sources
Problems:
●
Always delays, due to build times and double QA
●
especially visible with Mozilla Firefox
●
Always hand-holding updates even though they passed SLES
●
Fragile origin-manager
33
Closing the Leap Gap
Now:
OpenSUSE Leap 15.3 and newer:
●
Instead of rebuilding sources ship SLE binaries directly
●
PackageHub shared between SLE and openSUSE
●
No source rebuilds anymore at all
●
Rough start, but now working with way less effort
34
Supply Chain Security
35
Supply Chain Security
Code
review
Package
selection
Building Testing Signing
Delivery
Network
Community
Code
36
Supply Chain Security
Trusting incoming Sources
We take sources from thousands of OSS developers, from a very
diverse ecosystem.
Ensuring Maintainer provided the sources:
Today:
●
Source URLs (largely https, but still http and ftp, old git protocol, or
none)
●
GPG signatures (rare)
●
GIT services
●
Storing all tarballs in OBS for history
37
Supply Chain Security
Trusting incoming Sources
Tomorrow:
●
Bring up usage of https and GPG signatures!
●
More Git storage with implicit hash integrity and/or GPG signing?
●
Better signing methods? Sigstore.dev?
●
Help by centralized hosting like e.g. github?
CALL TO ACTION: Easy clean up work:
●
Adjust Source URLs to be https (spec-cleaner work by Johannes)
●
If we don’t reference GPG signature, check if its there and add it
38
Supply Chain Security – Building with SLSA
What is SLSA? (https://slsa.dev/)
Google supplied standardization framework on build processes and
build services assurance to mitigate supply chain attacks.
●
Sources
●
Building
●
Provenance
●
Common
39
SLSA
How does it match what SUSE and openSUSE do?
●
The open build service shines, it helps us meet most criteria
already.
●
Some process adjustments
●
Two person reviews
●
Strong user authentication: MFA finally!
●
Something new: Provenance
●
Proof it to the outside, via automation
●
In-toto attestation data
●
TODO: reproducible builds
40
Supply chain security – cryptographic signatures
All deliverables must be signed and verifiable!
Today we sign:
●
RPMs, repos, ISOs with GPG
●
UEFI secure boot binaries (pkcs12/x509)
●
Containers with Notary v1 , Atomic and Cosign
Challenges:
●
Root of trust … how do you know it is the openSUSE key?
●
Web of trust for 3rd
party repos
41
Supply chain security – cryptographic signatures
What is missing?
●
Container signature verification nearly non existent
●
Always optional and needs to be configured
●
Kubernetes however is doing Cosign from sigstore now
●
GPG checks often bypassed in automation
●
Seeing a LOT of zypper –no-gpg-checks or –gpg-auto-import-keys
●
Means no signature checking is done!
42
Supply chain security – sigstore
What is sigstore? ( https://www.sigstore.dev/ )
Sigstore is an initiative to make signing of artefacts easier.
●
Yet another approach to container signing (cosign)
●
Keyless signing with short lived keys during automated builds
(cosign and fulcio)
●
Transparency Logfile to store signatures for later verification
(rekor)
43
Supply chain security – sigstore
What is SUSE doing with sigstore?
●
Sign containers on registry.suse.com with cosign
●
Store SLE RPM-MD and container signatures in rekor log
Todo:
●
Implement also on OBS / registry.opensuse.org
●
Verification in system against rekor log
44
Outlook and Call To Action
45
Outlook – Call To Action
For Security:
●
Keeping up our existing work and improvements
●
Working on ALP (Adaptable Linux Platform)
●
More Supply Chain Hardening
Where you can help (easy to moderate tasks):
●
If you spot security issues without a CVE, tell us!
●
Add / Adjust Source URLs / GPG signatures of packages
●
Increase crypto-policies Adoption
50
Landing page: https://www.suse.com/security/
E-Mail: security@suse.de
We are looking for:
• Security Engineers
• Students (for bachelor/master work)
Questions?
51
52
54
Internal Use Slides
Presentation Title(36pt)
Subhead or Second Line (20pt)
Presenter Name (14pt)
Title
Company/Email
For Internal Use Only

More Related Content

Similar to openSUSE Conference 2022: An overview over SUSE Product Security

Vulnex app secusa2013
Vulnex app secusa2013Vulnex app secusa2013
Vulnex app secusa2013drewz lin
 
Weave GitOps 2022.09 Release: A Fast & Reliable Path to Production with Progr...
Weave GitOps 2022.09 Release: A Fast & Reliable Path to Production with Progr...Weave GitOps 2022.09 Release: A Fast & Reliable Path to Production with Progr...
Weave GitOps 2022.09 Release: A Fast & Reliable Path to Production with Progr...Weaveworks
 
Open Source Defense for Edge 2017
Open Source Defense for Edge 2017Open Source Defense for Edge 2017
Open Source Defense for Edge 2017Adrian Sanabria
 
OSC2023_security_automation_data.pdf
OSC2023_security_automation_data.pdfOSC2023_security_automation_data.pdf
OSC2023_security_automation_data.pdfMarcus Meissner
 
DevSecOps: The Open Source Way
DevSecOps: The Open Source WayDevSecOps: The Open Source Way
DevSecOps: The Open Source WayGordon Haff
 
PHP Unconference Continuous Integration
PHP Unconference Continuous IntegrationPHP Unconference Continuous Integration
PHP Unconference Continuous IntegrationNils Hofmeister
 
Leveraging Analytics for DevOps
Leveraging Analytics for DevOpsLeveraging Analytics for DevOps
Leveraging Analytics for DevOpsMichael Floyd
 
Zephyr-Overview-20230124.pdf
Zephyr-Overview-20230124.pdfZephyr-Overview-20230124.pdf
Zephyr-Overview-20230124.pdfibramax
 
Mitigate potential compliance risks
Mitigate potential compliance risksMitigate potential compliance risks
Mitigate potential compliance risksJürgen Brüder
 
Deepfence.pdf
Deepfence.pdfDeepfence.pdf
Deepfence.pdfVishwas N
 
Introducing GitSwarm: Pure Git with Globally Scalable DevOps
Introducing GitSwarm: Pure Git with Globally Scalable DevOpsIntroducing GitSwarm: Pure Git with Globally Scalable DevOps
Introducing GitSwarm: Pure Git with Globally Scalable DevOpsPerforce
 
DevSecOps: Taking a DevOps Approach to Security
DevSecOps: Taking a DevOps Approach to SecurityDevSecOps: Taking a DevOps Approach to Security
DevSecOps: Taking a DevOps Approach to SecurityAlert Logic
 
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4Qualcomm Developer Network
 
Estimating Security Risk Through Repository Mining
Estimating Security Risk Through Repository MiningEstimating Security Risk Through Repository Mining
Estimating Security Risk Through Repository MiningTamas K Lengyel
 
Dutchcontainerdays
DutchcontainerdaysDutchcontainerdays
Dutchcontainerdays4bakker
 
Logz.io Jenkins Meetup
Logz.io Jenkins MeetupLogz.io Jenkins Meetup
Logz.io Jenkins MeetupGrigoryAvsyuk
 
Devops phase-1
Devops phase-1Devops phase-1
Devops phase-1G R VISHAL
 
Are your DevOps and Security teams friends or foes?
Are your DevOps and Security teams friends or foes?Are your DevOps and Security teams friends or foes?
Are your DevOps and Security teams friends or foes?Reuven Harrison
 
Dev secops security and compliance at the speed of continuous delivery - owasp
Dev secops  security and compliance at the speed of continuous delivery - owaspDev secops  security and compliance at the speed of continuous delivery - owasp
Dev secops security and compliance at the speed of continuous delivery - owaspDag Rowe
 

Similar to openSUSE Conference 2022: An overview over SUSE Product Security (20)

Vulnex app secusa2013
Vulnex app secusa2013Vulnex app secusa2013
Vulnex app secusa2013
 
Weave GitOps 2022.09 Release: A Fast & Reliable Path to Production with Progr...
Weave GitOps 2022.09 Release: A Fast & Reliable Path to Production with Progr...Weave GitOps 2022.09 Release: A Fast & Reliable Path to Production with Progr...
Weave GitOps 2022.09 Release: A Fast & Reliable Path to Production with Progr...
 
Open Source Defense for Edge 2017
Open Source Defense for Edge 2017Open Source Defense for Edge 2017
Open Source Defense for Edge 2017
 
OSC2023_security_automation_data.pdf
OSC2023_security_automation_data.pdfOSC2023_security_automation_data.pdf
OSC2023_security_automation_data.pdf
 
C days2015
C days2015C days2015
C days2015
 
DevSecOps: The Open Source Way
DevSecOps: The Open Source WayDevSecOps: The Open Source Way
DevSecOps: The Open Source Way
 
PHP Unconference Continuous Integration
PHP Unconference Continuous IntegrationPHP Unconference Continuous Integration
PHP Unconference Continuous Integration
 
Leveraging Analytics for DevOps
Leveraging Analytics for DevOpsLeveraging Analytics for DevOps
Leveraging Analytics for DevOps
 
Zephyr-Overview-20230124.pdf
Zephyr-Overview-20230124.pdfZephyr-Overview-20230124.pdf
Zephyr-Overview-20230124.pdf
 
Mitigate potential compliance risks
Mitigate potential compliance risksMitigate potential compliance risks
Mitigate potential compliance risks
 
Deepfence.pdf
Deepfence.pdfDeepfence.pdf
Deepfence.pdf
 
Introducing GitSwarm: Pure Git with Globally Scalable DevOps
Introducing GitSwarm: Pure Git with Globally Scalable DevOpsIntroducing GitSwarm: Pure Git with Globally Scalable DevOps
Introducing GitSwarm: Pure Git with Globally Scalable DevOps
 
DevSecOps: Taking a DevOps Approach to Security
DevSecOps: Taking a DevOps Approach to SecurityDevSecOps: Taking a DevOps Approach to Security
DevSecOps: Taking a DevOps Approach to Security
 
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4
 
Estimating Security Risk Through Repository Mining
Estimating Security Risk Through Repository MiningEstimating Security Risk Through Repository Mining
Estimating Security Risk Through Repository Mining
 
Dutchcontainerdays
DutchcontainerdaysDutchcontainerdays
Dutchcontainerdays
 
Logz.io Jenkins Meetup
Logz.io Jenkins MeetupLogz.io Jenkins Meetup
Logz.io Jenkins Meetup
 
Devops phase-1
Devops phase-1Devops phase-1
Devops phase-1
 
Are your DevOps and Security teams friends or foes?
Are your DevOps and Security teams friends or foes?Are your DevOps and Security teams friends or foes?
Are your DevOps and Security teams friends or foes?
 
Dev secops security and compliance at the speed of continuous delivery - owasp
Dev secops  security and compliance at the speed of continuous delivery - owaspDev secops  security and compliance at the speed of continuous delivery - owasp
Dev secops security and compliance at the speed of continuous delivery - owasp
 

Recently uploaded

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 

Recently uploaded (20)

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 

openSUSE Conference 2022: An overview over SUSE Product Security

  • 1. Security Overview 2022 Marcus Meissner Projectmanager Security / Distinguished Engineer meissner@suse.de
  • 2. 2 Agenda ● Introduction to the SUSE Product Security Team ● Retrospecting year 2022/2021 ● Closing the (openSUSE) Leap Gap ● Supply Chain Security ● Outlooks
  • 3. 3 Introducing the team Teamlead: Stoyan Manolov Reactive: • Projectmanager/DE: Marcus Meissner • Security Engineers: Alexander Bergmann, Robert Frohl, Gianluca Gabrielli, Carlos Lopez, Gabriele Sonnu, Thomas Leroy, Mæve Rey, Cathy Hu • Trainee: Michael Muschner Proactive: • Lead: Johannes Segitz • Security Engineers: Matthias Gerstner, Wolfgang Frisch, Paolo Perego, Filipo Bonazzi
  • 4. 4 Proactive vs Reactive Reactive: • Incident response and handling (PSIRT) • Tracking CVEs, coordinating fixes, monitoring • also working on proactive projects Proactive: • Audit programs and system services (systemd, dbus, network) • Approving product releases • All security work before shipment • SELinux
  • 6. 6 Reactive Security • Reacting on reported security issues • Roles: Incident and Update Managers • Coordinating from begin to end, delegate – Fixing to package maintainer – Source review to OBS/IBS reviewers – Testing to QA • Release • Documentation – Human and machine readable
  • 7. 7 Incident Management Open bug: • Summary line: VUL-x: CVE: package: summary • In SUSE Security Incidents product • Description with references / links • Patches and reproducers attached • Assign to packager / bugowner SMASH Issue: • Rating and CVSSv3 scoring • Affected Software (for SLE)
  • 8. 8 Opened bugs per week: 2006 - 2022
  • 9. 11 Update Management Packager submits updates Security Team • Writes metadata (summary, description, issues) • Checks if building • Pushes to QA QA tests update Security Team • Releases update • Additional documentation work
  • 10. 14 Reactive work – what is delivered The updates themselves Notifications for every update • E-Mail and web https://www.suse.com/support/update/ • E-Mail to security-announce@lists.opensuse.org Autogenerated information: • CVE webpages https://www.suse.com/security/cve/ • OVAL data https://www.suse.com/support/security/oval/ • Advisory CVRF data http://ftp.suse.com/pub/projects/security/cvrf/ (CVRF 1.1, 1.2) • CVE CVRF 1.2 data: https://ftp.suse.com/pub/projects/security/cvrf-cve/
  • 11. 16 High Impact Vulnerabilities Usual incidents are handled in a pipeline, but some stand out: HEARTBLEED, SHELLSHOCK … , MELTDOWN, SYSTEM DOWN, MDS Issues that need: • Quick reaction • More communication • More documentation • Tricky fixes Special category Special process and special team to handle it
  • 13. 25 Proactive Security Making products secure before shipment Secure Development Lifecycle Automated checks during build • setuid binaries • DBUS services • PolicyKit rules • PAM modules And: • systemd and network services • Whatever comes up
  • 14. 26 Proactive Security Security audits are “rolling” • Based on Factory development • Based on packages • But also on final product Most of our work for SUSE Linux Enterprise is done in openSUSE!
  • 16. 28 Reactive Security Stats Year 2019 2020 2021 2022 Total CVE 2645 2461 2559 1197 (30.5.) CVE released 2139 2176 1911 1131 (30.5) Updates released 2032 2129 2364 965 (30.5.) OpenSUSE updates 862 729 880 211 (30.5.)
  • 17. 29 High Impact Vulnerabilities 2021-2022 2021: ● LOG4SHELL ● Boothole2 – 2nd iteration of grub2 secure boot issues ● DHEATER – exploit Diffie Hellman key exchange (e.g. in TLS) ● DNSPooq, FREAKOUT, Baron Samedit, FRAGATTACK, Sequoia, OMIGOD ● Various CPU side channel issues – similar to last years 2022: ● Dirty Pipe, Pwnkit, Samba vfs_fruit, More CPU side channel issues ● … and the year is not over yet ...
  • 18. 30 Proactive highlights ● RPMLINT 2 migration ● More whitelisting methods (logrotate, rpm scripts, hashes of monitored config files) ● AUDITs happened on a lot of packages ● Factory uses “-z now” linking (Full RELRO) ● Factory supports crypto-policies (and SLES 15 SP4 too) ● We are picking up more SELinux work
  • 20. 32 Closing the Leap Gap History: OpenSUSE Leap 42.x, 15.0 - 15.2 ● Imported and rebuilt SLES sources after their release ● Pushed through separate maintenance pipeline ● SLE PackageHub imported and rebuilt Leap sources Problems: ● Always delays, due to build times and double QA ● especially visible with Mozilla Firefox ● Always hand-holding updates even though they passed SLES ● Fragile origin-manager
  • 21. 33 Closing the Leap Gap Now: OpenSUSE Leap 15.3 and newer: ● Instead of rebuilding sources ship SLE binaries directly ● PackageHub shared between SLE and openSUSE ● No source rebuilds anymore at all ● Rough start, but now working with way less effort
  • 23. 35 Supply Chain Security Code review Package selection Building Testing Signing Delivery Network Community Code
  • 24. 36 Supply Chain Security Trusting incoming Sources We take sources from thousands of OSS developers, from a very diverse ecosystem. Ensuring Maintainer provided the sources: Today: ● Source URLs (largely https, but still http and ftp, old git protocol, or none) ● GPG signatures (rare) ● GIT services ● Storing all tarballs in OBS for history
  • 25. 37 Supply Chain Security Trusting incoming Sources Tomorrow: ● Bring up usage of https and GPG signatures! ● More Git storage with implicit hash integrity and/or GPG signing? ● Better signing methods? Sigstore.dev? ● Help by centralized hosting like e.g. github? CALL TO ACTION: Easy clean up work: ● Adjust Source URLs to be https (spec-cleaner work by Johannes) ● If we don’t reference GPG signature, check if its there and add it
  • 26. 38 Supply Chain Security – Building with SLSA What is SLSA? (https://slsa.dev/) Google supplied standardization framework on build processes and build services assurance to mitigate supply chain attacks. ● Sources ● Building ● Provenance ● Common
  • 27. 39 SLSA How does it match what SUSE and openSUSE do? ● The open build service shines, it helps us meet most criteria already. ● Some process adjustments ● Two person reviews ● Strong user authentication: MFA finally! ● Something new: Provenance ● Proof it to the outside, via automation ● In-toto attestation data ● TODO: reproducible builds
  • 28. 40 Supply chain security – cryptographic signatures All deliverables must be signed and verifiable! Today we sign: ● RPMs, repos, ISOs with GPG ● UEFI secure boot binaries (pkcs12/x509) ● Containers with Notary v1 , Atomic and Cosign Challenges: ● Root of trust … how do you know it is the openSUSE key? ● Web of trust for 3rd party repos
  • 29. 41 Supply chain security – cryptographic signatures What is missing? ● Container signature verification nearly non existent ● Always optional and needs to be configured ● Kubernetes however is doing Cosign from sigstore now ● GPG checks often bypassed in automation ● Seeing a LOT of zypper –no-gpg-checks or –gpg-auto-import-keys ● Means no signature checking is done!
  • 30. 42 Supply chain security – sigstore What is sigstore? ( https://www.sigstore.dev/ ) Sigstore is an initiative to make signing of artefacts easier. ● Yet another approach to container signing (cosign) ● Keyless signing with short lived keys during automated builds (cosign and fulcio) ● Transparency Logfile to store signatures for later verification (rekor)
  • 31. 43 Supply chain security – sigstore What is SUSE doing with sigstore? ● Sign containers on registry.suse.com with cosign ● Store SLE RPM-MD and container signatures in rekor log Todo: ● Implement also on OBS / registry.opensuse.org ● Verification in system against rekor log
  • 32. 44 Outlook and Call To Action
  • 33. 45 Outlook – Call To Action For Security: ● Keeping up our existing work and improvements ● Working on ALP (Adaptable Linux Platform) ● More Supply Chain Hardening Where you can help (easy to moderate tasks): ● If you spot security issues without a CVE, tell us! ● Add / Adjust Source URLs / GPG signatures of packages ● Increase crypto-policies Adoption
  • 34. 50 Landing page: https://www.suse.com/security/ E-Mail: security@suse.de We are looking for: • Security Engineers • Students (for bachelor/master work) Questions?
  • 35. 51
  • 36. 52
  • 37.
  • 39. Presentation Title(36pt) Subhead or Second Line (20pt) Presenter Name (14pt) Title Company/Email For Internal Use Only