One reason to use up-to-date kernels on your production servers is that they can do things faster. Linux 4.13+ has kTLS or kernel-level (!) TLS stack.

kernel.org/doc/html/latest/net

@kravietz Wow, TLS in the kernel? Doesn't that pose a risk of slower rollout for bugfixes? Hasn't basically every TLS implementation suffered a critical vulnerability at one time or another?

@abliss
It was OpenSSL, an implementation developed since 90's with lots of legacy baggage. I think kTLS could have been implemented in a flawless way.

@kravietz @abliss except for the gigantic hole that happens any time an encryption standard is broken/weakened.

Hey, remember that time a kernel maintainer resigned because an Intel-influenced RDRAND decision decisively weakened the kernel's ability to generate random numbers? That was fun to watch. IIRC, Ted Tso took over afterwards.

@anornymorse

I don't think any extra randomness source can weaken anything, it's not like entropy pools work. BTW kernel already has plenty of crypto code eg for IPSec, secure boot etc

@abliss

@kravietz @abliss and there's never been issues with any of that "robust" code ever.

You'll recall that the resignation happened because an extra randomness source was *removed* by relying directly on intel's hardware solely, thus showing that bad management decisions (this was pushed by Linus himself) can sometimes compromise security by weakening entropy. Might be best to keep that stuff out-of-kernel.
Follow

@anornymorse

If you're trying to advocate for microkernels then well, both kTLS and IPSec are already available as modules

@abliss

Β· Β· 0 Β· 0 Β· 0
Sign in to participate in the conversation
Mastodon πŸ” privacytools.io

Fast, secure and up-to-date instance. PrivacyTools provides knowledge and tools to protect your privacy against global mass surveillance.

Website: privacytools.io
Matrix Chat: chat.privacytools.io
Support us on OpenCollective, many contributions are tax deductible!