CVE-2023-7008 Christmas drama notes

Petr Menšík pemensik at redhat.com
Tue Dec 26 00:11:25 UTC 2023


Hello systemd users and developers,

I have experienced something in issue #25676 [1], which has been closed 
and I am not allowed to comment there anymore. But the experience I had 
there were so terrible, I feel a need to comment a little bit.

I were accused I did something on purpose and were unwilling to 
cooperate. I don't think that is true.

Yes, I have sent a request to our security team to review RH bugzilla 
bug #2222261 [2], because I felt systemd team fail to own the problem 
reported to them appropriately. That were on day 2003-07-12, 15:38. No, 
it were NOT at 7th of December.

This was the text I have sent:

    Hi Security team,

    can you please evaluate bug
    https://bugzilla.redhat.com/show_bug.cgi?id=2222261, whether it is
    deserves own CVE? It contains DNSSEC support, but it can be
    trivially made into serving unsigned content even on signed zones
    data. It does not crash, but allows DNS spoofing.

    Unforunately that were reported publicly on upstream:

    https://github.com/systemd/systemd/issues/25676

    /Is it just a bug or vulnerability? /

That were somehow end of my role. Just a day after that Lukáš Nykrýn 
commented new bug [3], acknowledging they knew about the issue. I have 
told them I consider it important. It were received and waited for 6 
months without any visible progress and 6 days ago, the ticket for it 
has changed and CVE-2023-7008 were assigned to it. Yes, I admit the 
timing were far from ideal, because it happened few days before 
Christmas Eve, where I think most of involved people has holidays. Not 
anything I had any influence on. Including me, I were at that time on 
vacation for two weeks already. It were done by person living in India, 
possibly not aware how bad the time for the change is now.

Why I have not been helpful in adding note it is happens only with 
DNSSEC=yes? Because with DNSSEC=no it is not a single bit safer, as it 
might appear. In unfixed versions on-path attacker can insert any 
response to your DNS cache, regardless DNSSEC setting you have. Of 
course, with DNSSEC=no or DNSSEC=allow-downgrade that is common and 
expected and not a vulnerability. But is it better or more secure? Of 
course not, not a single bit! With recently fixed versions, only 
DNSSEC=yes prevents bogus responses.

Yet, I were accused to have abused something. I did not. But I would 
like to thank Luca for removing me from systemd organization. Yes, none 
of my proposed commits have been never been merged. I have received 
limited rights to be able to mark selected issues with tags like 
downstream/rhel or downstream/fedora, so those issues can be 
prioritized. In order to help systemd team prioritize important fixed to 
systemd-resolved for RHEL, given I possess higher DNS expertise than 
they do (my opinion without a proof). I am glad I were removed.

It is very surprising how poisonous atmosphere I have found in such very 
important project in open source operating systems, as is the *systemd*. 
I admit I have been warned by my former manager to not expect any 
positive negotiations from systemd people, because more people failed 
before me, but I have tried. But I would not recommend anyone to even 
try to collaborate on systemd, if they may disagree with anyone. I have 
never met more toxic and unhelpful behavior from upstream maintainers 
than on systemd. Not in my 7 years I work on different RHEL components. 
I now understand why flame wars about systemd vs other process managers 
were always that emotional. I don't think there are important technical 
deficiencies, but the communication style I have met here is plain terrible.

For my whole 7 years I have been working in Red Hat, I have not met more 
frustrating upstream than at systemd. I had quite friendly discussion 
with our people working on systemd at Brno or from Poland. But for 
reason unknown to me, I struggled quite much with other people in the 
project, most often Lennart himself. Especially on issues discussions.

It may look I hate everything systemd, that is far from correct. I think 
systemd service manager is great tool, as is for example systemd-nspawn. 
But systemd-resolved is full of unnecessary bugs and strange design 
choices nobody is willing to fix. If they are willing, they get fixed so 
fast.

I don't want to be connected with systemd project in any way anymore. I 
would be ashamed to be connected with it. I would like to thank Evgeny 
Vereshchagin for standing on my side, I value it very much. Link to Code 
of Conduct [4] made me laugh. It seems it were just copied from some 
random other project, where they truly meant what is written in it.

I will still report issues in systemd if I found them. I consider it my 
unpleasant and worthless duty, because it seems they are ignored anyway. 
If they are fixed, that is usually done in a way I consider wrong. 
systemd-resolved is included as a default installed DNS cache in Fedora, 
that is why I am willing to do offer some help. Bad mistake in my 
opinion, but even that deserves to have issues to be known, reported 
(and ignored). I will try to minimize my reports to unemotional facts as 
much as I will able to.

I think I deserve an apology from Luca, but I doubt I will receive some.

Thank you for reading it so far,

Happy new year everyone and less drama in it!

Best Regards,
Petr Menšík

1. https://github.com/systemd/systemd/issues/25676
2. https://bugzilla.redhat.com/show_bug.cgi?id=2222261
3. https://bugzilla.redhat.com/show_bug.cgi?id=2222672#c3
4. https://github.com/systemd/systemd/blob/main/docs/CODE_OF_CONDUCT.md

-- 
Petr Menšík
Software Engineer, RHEL
Red Hat,https://www.redhat.com/
PGP: DFCF908DB7C87E8E529925BC4931CA5B6C9FC5CB

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.freedesktop.org/archives/systemd-devel/attachments/20231226/84b3b36d/attachment-0001.htm>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_0x4931CA5B6C9FC5CB.asc
Type: application/pgp-keys
Size: 9098 bytes
Desc: OpenPGP public key
URL: <https://lists.freedesktop.org/archives/systemd-devel/attachments/20231226/84b3b36d/attachment-0001.key>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature.asc
Type: application/pgp-signature
Size: 495 bytes
Desc: OpenPGP digital signature
URL: <https://lists.freedesktop.org/archives/systemd-devel/attachments/20231226/84b3b36d/attachment-0001.sig>


More information about the systemd-devel mailing list