all messages for Guix-related lists mirrored at yhetil.org
 help / color / mirror / code / Atom feed
* FW: [oss-security] accepting new members to (linux-)distros lists
@ 2017-06-28 21:36 Leo Famulari
  2017-06-28 22:45 ` ng0
                   ` (3 more replies)
  0 siblings, 4 replies; 11+ messages in thread
From: Leo Famulari @ 2017-06-28 21:36 UTC (permalink / raw)
  To: guix-devel

[-- Attachment #1: Type: text/plain, Size: 13559 bytes --]

It was hinted at ~1 week ago in the public "Stack Clash" discussion on
oss-security, but now there has been an announcement: the private
linux-distros early-notice security discussion and coordination mailing
list is accepting new members:

http://seclists.org/oss-sec/2017/q2/638

The criteria are listed in the forwarded message below. I'd say we can
meet them. Perhaps they'd say that Guix is too obscure, but I don't have
any idea how many users we have. We'd need to have a good plan for #7,
"Be able and willing to contribute back". I'm assuming we'd have
somebody to vouch for us (#9).

I've seen some members of Guix express doubts about the utility of
private discussion forums like linux-distros, and I'm sympathetic.

In fact, even without early notification, we are usually shipping
security updates for embargoed issues within 24 hours of public
disclosure, and usually within a few hours. And for non-embargoed
issues, we are shipping fixes earlier than the major distros very often.
I read the "security update round-ups" on LWN, and typically they are
full of bugs we already fixed. So, perhaps it wouldn't make a big
difference in most cases.

But, the "Stack Clash" issues took us by surprise and we spent a few
days writing and testing our fixes. We are committed to supporting
32-bit platforms where these bugs are apparently easy to exploit.
Without access to the exploits or detailed discussion, it was very
difficult to know if our fixes actually worked. So, we could have
responded more quickly and effectively with early notice.

What do people think? Is anyone else interested in applying to join this
mailing list? Is anyone else willing to stick to the rules and to
participate?

Leo

----- Forwarded message from Solar Designer <solar@openwall.com> -----

Date: Wed, 28 Jun 2017 22:02:40 +0200
From: Solar Designer <solar@openwall.com>
To: oss-security@lists.openwall.com
Subject: [oss-security] accepting new members to (linux-)distros lists
User-Agent: Mutt/1.4.2.3i

Hi,

I have finally specified the criteria for accepting new members to the
(linux-)distros lists.  I intend to process the requests, which are to
be posted to new threads each (one thread per distro wanting to join).

I put quite some thought (and experience so far) into these criteria,
but I welcome any comments and suggested changes this community might
have.  The list of criteria will be maintained on the wiki:

http://oss-security.openwall.org/wiki/mailing-lists/distros#membership-criteria

Currently, to be eligible for (linux-)distros list membership, your
distro should:

1. Be an actively maintained Unix-like operating system distro with
substantial use of Open Source components

2. Have a userbase not limited to your own organization

3. Have a publicly verifiable track record, dating back at least 1 year
and continuing to present day, of fixing security issues (including some
that had been handled on (linux-)distros, meaning that membership would
have been relevant to you) and releasing the fixes within 10 days (and
preferably much less than that) of the issues being made public (if it
takes you ages to fix an issue, your users wouldn't substantially
benefit from the additional time, often around 7 days and sometimes up
to 14 days, that list membership could give you)

4. Not be (only) downstream or a rebuild of another distro (or else we
need convincing additional justification of how the list membership
would enable you to release fixes sooner, presumably not relying on the
upstream distro having released their fixes first?)

5. Be a participant and preferably an active contributor in relevant
public communities (most notably, if you're not watching for issues
being made public on oss-security, which are a superset of those that
had been handled on (linux-)distros, then there's no valid reason for
you to be on (linux-)distros)

6. Accept the list policy:
http://oss-security.openwall.org/wiki/mailing-lists/distros#list-policy-and-instructions-for-members
(also quoted below)

7. Be able and willing to contribute back, preferably in specific ways
announced in advance (so that you're responsible for a specific area and
so that we know what to expect from which member), and demonstrate
actual contributions once you've been a member for a while:
http://oss-security.openwall.org/wiki/mailing-lists/distros#contributing-back
(also quoted below)

8. Be able and willing to handle PGP-encrypted e-mail

9. Have someone already on the private list, or at least someone else
who has been active on oss-security for years but is not affiliated with
your distro nor your organization, vouch for at least one of the people
requesting membership on behalf of your distro (then that one
vouched-for person will be able to vouch for others on your team, in
case you'd like multiple people subscribed)

Membership requests should provide answers per each of these criteria.

I came up with many current tasks/roles that a new or existing member
could usefully help with, thereby contributing to the team effort.
Currently the wiki page lists a total of 18 such items: 5 technical and
13 administrative.  I'd prefer that new membership requests include
specifics on what the new member will contribute - this can be work on
some of these 18 items or/and something else.

Right now, most of these things I listed are everyone's and thus no
one's responsibility (and they often fall back on me as list admin).
I want this to change.  Ideally, we'd list specific distros for each one
of these tasks/roles... and if something required is not done or goes
wrong per one of those roles, we'll ask them to explain why and correct
that for further occasions.  This will also serve to verify that they're
still active and paying attention, replacing my responsiveness tests.

Here are the current tasks/roles to choose from or/and add to:

Technical (in arbitrary order):

1. Propose (other) ways to fix, work around, or mitigate the reported
issues

2. Develop and share fixes, workarounds, or mitigations

3. Review and/or test the proposed patches and point out potential
issues with them (such as incomplete fixes for the originally reported
issues, additional issues you might notice, and newly introduced bugs)

4. Generalize the reported issues to see if other closely related issues
exist (e.g., if a bug is reported against one implementation of X, see
if a similar bug exists in another implementation of X and inform the
list of either result)

5. Produce and share well-reasoned estimates for the time required to
handle the issues under embargo (such as to (re)negotiate the public
disclosure date and/or to choose between the different ways to handle an
issue)

Administrative (roughly in chronological order, although many of these
activities overlap):

1. Promptly review new issue reports for meeting the list's requirements
and confirm receipt of the report and, when necessary, inform the
reporter of any issues with their report (e.g., obviously not actionable
by the distros) and request and/or propose any required yet missing
information (most notably, a tentative public disclosure date)

2. See if the proposed public disclosure date is within list policy, and
if not then insist on getting this corrected and propose a suitable
earlier date

3. Evaluate if the issue (or one of the issues) is effectively already
public (e.g., a fix is committed upstream with a descriptive message)
or/and is low severity and thus the report (or its portion pertaining to
the issue) should be made public right away for one or both of these
reasons, get a few other list members to confirm this understanding, and
if there are no objections then communicate this strong preference to
the reporter

4. Evaluate relevance to other parties, such as the upstream, other
affected distros (not present here), and other Open Source projects, see
if the report mentions notifying any of these, communicate your findings
and possible concerns to the reporter and the list, and stay on top of
the resulting discussion until a decision is made on who else to
possibly notify (or not) and any such notifications are in fact made

5. If multiple issues are reported at once, see if any of them can
reasonably be made public sooner than the rest, and if so help untangle
them and stay on top of their disclosure process

6. If CVE IDs are requested, the report is valid, and you're a CNA,
assign those (requesting any required information from the reporter
first)

7. If the report does not mention CVE IDs (neither requests nor provides
them, and doesn't mention the reporter having requested them elsewhere),
yet the report is valid and it looks like distros will need CVE IDs, and
you're a CNA, ask the reporter whether they have already requested CVE
IDs elsewhere, then assign those if they haven't been requested
elsewhere

8. Stay on top of issues to ensure progress is being made, remind others
when there's no apparent progress, as well as when the public disclosure
date for an issue is approaching and when it's finally reached (unless
the reporter beats you to it by making their mandatory posting to
oss-security first)

9. Monitor relevant public channels (mailing lists, code repositories,
etc.) and inform the reporter and the list in case an issue is made
public prematurely (that is, leaks or is independently rediscovered)

10. Make sure the mandatory oss-security posting is made promptly and is
sufficiently detailed, and remind the reporter if not

11. If exploit(s) were shared on the list, make sure that either they're
included in the oss-security posting along with the issue detail or the
posting includes an announcement of planned later posting of the
exploits (with the delay being within list policy), and in the latter
case also make sure that the later posting is in fact made as planned,
and remind the reporter if not

12. Help evaluate new (linux-)distros list membership requests per the
current criteria (participating in the corresponding oss-security
threads)

13. Vouch for people wanting to join in on behalf of a new distro member
as long as you are confident of their trustworthiness, expected proper
use of the list, and contributions

Finally, I also came up with specific policy on handling of embargoed
information.  Most of this was taken for granted so far, and this worked
well, but there were a few gray areas.  The currently proposed policy,
which list members have to agree to, is as follows:

Aside from your participation in discussions with the reporter and on
the (linux-)distros lists (including possibly continuing to CC other
prior recipients of the information), the information you receive
through the (linux-)distros lists must not be made public, shared, nor
even hinted at anywhere beyond the need-to-know within your distro's
team, until the agreed upon public disclosure date/time, the reporter's
explicit approval, or substantially complete publication by others.

Neither you nor others you inform may use the information for anything
other than getting the issue fixed for your distro's users and, only in
rare extreme cases, for deployment of maximally non-revealing changes to
maintain security of your distro's infrastructure most essential to the
distro users' security in face of the security issue being dealt with.
The need-to-know condition is met only if the person needs to
participate in one of these two activities.

Before you share the information with others within your distro's team
based on their need-to-know, you need to get these people to agree to
these same terms, optionally (and preferably) with the additional
limitation that they may not share the information further (not even
with others on the team, not even based on need-to-know) without
explicit approval by you or another individual directly subscribed to
the (linux-)distros list for your distro.

In the unfortunate event that you happen to share or/and use the
information beyond what's allowed by this policy (thus, creating a
leak), you must urgently (right after you became aware of the leak)
inform the reporter and the (linux-)distros (sub-)list you had received
the information from of the leak and of its extent (if readily known).
You must also conduct an internal investigation of the leak, and inform
the reporter and the list of the exact extent of the leak (to the best
of your knowledge) and of measures (intended to be) taken to prevent
such leaks going forward.

The above is the main policy definition, but in case you prefer the
Traffic Light Protocol, in its terms this is TLP:AMBER with the
need-to-know condition as specified above and with the following
additional limitation on sharing: you must not share the information
with anyone outside of your distro's team, including not within the rest
of your organization nor with your clients or customers, including not
in any derived form (not even through delivering or deploying
undocumented fixes).  Once the embargo is over, this is TLP:WHITE.

I am sorry for the long message.  I quote these pieces from the wiki in
here to allow for quoting in a possible discussion thread - such as for
distros (both those already on the private lists and not) to volunteer
for specific roles (please do!)

Alexander

----- End forwarded message -----

[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 833 bytes --]

^ permalink raw reply	[flat|nested] 11+ messages in thread

end of thread, other threads:[~2017-07-10 17:24 UTC | newest]

Thread overview: 11+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2017-06-28 21:36 FW: [oss-security] accepting new members to (linux-)distros lists Leo Famulari
2017-06-28 22:45 ` ng0
2017-06-29  4:48 ` Alex Vong
2017-07-07 19:18   ` Leo Famulari
2017-07-10 15:56     ` Ludovic Courtès
2017-06-29 19:27 ` Marius Bakke
2017-07-01 13:26 ` Ludovic Courtès
2017-07-05 17:33   ` Mark H Weaver
2017-07-07 19:38     ` Leo Famulari
2017-07-10 15:53       ` Ludovic Courtès
2017-07-10 17:24         ` Leo Famulari

Code repositories for project(s) associated with this external index

	https://git.savannah.gnu.org/cgit/guix.git

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.