[pkg-go] Go security support in buster

Michael Stapelberg stapelberg at debian.org
Wed Sep 5 22:05:29 BST 2018


Can you give some pointers as to how one would go about developing a
solution to this?

I.e., can one set up the archive locally, or is there a test instance, or
how would one go about that?

Also, are we looking to develop a separate tool, or a feature integrated
into some existing tool? (dak?)

Have you had a chance to look at the Built-Using query by ansgar which I
referenced upthread? That should reliably figure out the affected packages.

On Wed, Sep 5, 2018 at 10:56 PM, Moritz Muehlenhoff <jmm at inutil.org> wrote:

> On Wed, Sep 05, 2018 at 08:34:10PM +0200, Florian Weimer wrote:
> > * Michael Stapelberg:
> >
> > > I thought haskell was in a similar boat? They have tooling to schedule
> > > binNMUs for affected packages.
> >
> > My understanding is that you can't simply schedule binNMUs on the
> > security archive because the security archive does not have the
> > sources until the first upload of the package.  (But I'm a bit out of
> > touch; this may have changed.)
>
> Indeed. There's two problems we need to solve:
>
> 1. Find a reliable mechanism if/which packages need to be rebuild. I guess
>    typical use cases are
>    * Vulnerability issue in Golang itself
>    * Vulnerability in some golang-foo package which is used in build
> dependencies
>      (and transitive ones). Let's say some crypto libs need to be fixed.
>
> 2. Once we have a list of affected packages needing a rebuild, there's the
>    issue of actually building them. Due to some underlying complexities
> the security
>    archive and the main archive are separate. Ideally that would be
> resolved
>    in general, but I have no idea how hard it is and there's very little
> people
>    involved in dak development. So for all practical purpose this will need
>    a solution kludging around it: If package foo is to be updated
>    in bar-security, the first upload of bar needs to include source (-sa
>    option in dpkg-buildpackage). That's annoying, and still manageable for
>    single packages, but doesn't scale for rebuilding statically linked
> applications.
>    So we need a reliable mechanism which imports the list of affected
> packages
>    derived in 1.) and triggers binNMUs for them along with an automated
> source
>    import to the security archive.
>
> As for Michael's earlier question wrt Haskell, it's true that this also
> affects
> Haskell, but it hasn't been a practical issue (while in buster we'll have
> applications like Prometheus or Docker which will definitely need updates
> across
> the lifetime of buster). Ideally whatever it being done for Go is generic
> enough
> to also cater for Haskell if we ever need it (or for Rust when it becomes
> more
> prevalent).
>
> Cheers,
>         Moritz
>



-- 
Best regards,
Michael
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/pkg-go-maintainers/attachments/20180905/1fa7e815/attachment-0001.html>


More information about the Pkg-go-maintainers mailing list