Date: Tue, 29 Oct 2013 16:25:42 -0700 From: Colin Percival <cperciva@freebsd.org> To: Adam McDougall <mcdouga9@egr.msu.edu>, freebsd-hackers@freebsd.org Subject: Re: Automated submission of kernel panic reports Message-ID: <527043F6.7070802@freebsd.org> In-Reply-To: <526FE7ED.5000903@egr.msu.edu> References: <526F8EB3.1040205@freebsd.org> <526FE7ED.5000903@egr.msu.edu>
next in thread | previous in thread | raw e-mail | index | archive | help
On 10/29/13 09:53, Adam McDougall wrote: > On 10/29/2013 06:32, Colin Percival wrote: >> If ${panicmail_autosubmit} is set to NO, an email is sent to root containing >> the panic data in both decrypted and encrypted forms. The system administrator >> can then review the information and decide whether to allow it to be submitted. >> Such emails look like this: >> http://pastebin.com/w18pXah8 >> >> Comments? > > The first thing that comes to mind is privacy so I looked at the > information being submitted. Would it be possible to replace the > hostname(s) and kernel config paths in the report with a hash by > default? That way a site could still match up reports to internal > hostnames without revealing anything specific about the source system. > The hostname is only needed to differentiate sources and is not > guaranteed to be unique anyway. Just thinking ahead about the > information being obtained and reducing what is transmitted/stored in > case it somehow falls into the wrong hands at some point in the future. > Aside from that, I like it and would consider running it myself as long > as I have appropriate control over the content. Thanks. The hostname could be filtered, but depending on how the panic report is submitted there's a good chance that it would be leaked anyway via email headers, so I figured it was better to make it obvious that it was being sent. The kernel config path I think will be very useful to have when it comes to tracking down the cause of a panic -- if there's a panic which keeps on happening with kernels named "DTRACE" but not kernels named "GENERIC", it give us a hint of where to look. I considered including the entire output of `sysctl -n kern.conftxt` but decided that might be too intrusive. Note: The purpose of the encryption is to protect "private" information in these reports from becoming public -- my intention is that access to the raw reports would be limited to a select group within the project. -- Colin Percival Security Officer Emeritus, FreeBSD | The power to serve Founder, Tarsnap | www.tarsnap.com | Online backups for the truly paranoid
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?527043F6.7070802>