I've talked about these issues a lot, and in a lot of depth. I recommend watching this talk to help with understanding the scale of the issues and the sorry state of software engineering not just in the Linux kernel but most other major software projects:
youtube.com/watch?v=qrBVXx
Conversation
The Linux kernel uses a fundamentally insecure architecture, insecure tools, and has a development culture treating correctness and especially security as an afterthought. It ultimately needs to replaced, but until then, best effort approaches minimizing the harm are important.
2
9
16
This Tweet is from a suspended account. Learn more
Replying to
The Linux kernel and other fundamentally insecure software projects designed and implemented without robustness and security as core principles. The Linux kernel is likely getting less secure over time, not more secure, and there is no feasible way to fix a problem of this scale.
2
5
7
Replying to
Almost entirely security theater with no real impact. Not relevant in any way to solving these kinds of problems or mitigating kernel vulnerabilities. It's based around providing a bogus, incomplete form of secure boot not actually providing any real security value to end users.
1
1
It's a marketing-focused, incomplete and useless approach to secure boot. The total value of it is negligible and it's very unfortunate that it's all grouped together as part of something that's almost completely nonsense with no real threat model or use case thought out for it.
1
1
Replying to
I've complained a lot about this patch series and the marketing-based nonsense approach to secure boot motivating it. Unfortunately, that fell on deaf ears, and in the end security theater is what triumphs. It's part of the general problem with the Linux approach to "security".
1
1
Security and privacy features need to have a clear threat model and practical purpose, or they do more harm than good by layering on even more complexity and permanently taking away complexity budget / resources from meaningful work. This whole thing didn't make much sense.
1
1
2
Secure boot that only protects firmware and the kernel doesn't make any sense. The kernel doesn't do anything useful by itself. Also, treating the kernel boundary this way is *extremely* harmful in terms of being able to reduce kernel attack surface and move complexity out of it.
Complexity should be moving out of the kernel into isolated userspace processes, not into the kernel, which is what's happening. Code moves into the kernel as a bad workaround for ecosystem fragmentation and based on this nonsense that kernel code is more trustworthy/secure.
2
5

