Konstantin Ryabitsev
First presented at Linux Security Summit 2015
Securing your IT infrastructure by expecting user error
and, most importantly...
(and so are you)
Raw power and comfort
Safety features:
"Vehicle interiors are so poorly constructed from a safety standpoint that it is surprising that anyone escapes from an automobile accident without serious injury."
- Journal of the American Medical Association, 1955
Ralph Nader's 1965 book famously blamed car manufactures for "designed-in dangers of the American automobile."
What the hell are you talking about?
The car is designed to drive, not to crash!
Cute and green
but still plenty of torque
Safety features:
Only 4-star safety rating!
- Matthew Garrett, 2015
source
This is as damning of a quote as the one from the American Medical Association
Right?
(that's you!)
(and you should!)
"How did they get in?"
You laugh, but I know your darkest fears.
Because they are also my own.
Source: DUH
How can we reduce damage when something has already gone
terribly wrong?
What you're probably already doing:
What you're probably NOT doing:
https://letsencrypt.org
Stop turning it off!
Yes, I did just say that.
They help to confine and isolate complex software stacks
That's when you end up with
curl http://coolapp.io | sudo sh
Attackers don't even need root access.
Yay Wayland, amiright?
For quite some time
That said, I've been running Wayland for months with excellent results. Try it!
And we can't live without them.
The PDF reader in Mozilla Firefox allows remote attackers to read arbitrary files or gain privileges, as exploited in the wild in August 2015.
Don't get cocky, Webkit users, this could have happened to you.
To watch in 2016-2017
So prepare for failures.
FYI, sysadmins will hate you for this.
Checklists are your most powerful tool to avoid the "oh sh*t moments"
It is our job to make sure they are not fatal
We are here ⇒
For our industry's own "unsafe at any speed" moment.
(And with in-vehicle computing taking off, it's not going to be a metaphor for much longer.)
And a large dose of victim blaming.
Use them in your stuff!
And learn how encrypted email works,
it won't kill you.
We are opening up and sharing the policies the Linux Foundation IT team uses.
Help us improve them.