oss-sec mailing list archives

Re: linux-distros list membership application - CIQ Rocky Linux Security Team


From: Jeremy Stanley <fungi () yuggoth org>
Date: Sat, 14 Oct 2023 12:53:30 +0000

On 2023-10-13 23:19:18 -0400 (-0400), Neal Gompa wrote:
[...]
The point I'm making is that SIGs do not count because they cannot
obey embargo regulations. No open project or community project can
do that without having some mechanism for private controls, which
is antithetical to the community process. They fundamentally are
ineligible to join because they cannot keep anything secret.

This is the part of your argument I understand the least. Is your
objection specific to the Rocky Linux community's definition of the
term "Special Interest Group," or a preconceived notion on your part
as to what that term means more generally, or an opinion that
volunteer community members are simply incapable of maintaining
embargoes and only people employed by a company to that purpose are
able to do so reliably?

I participate in an open software community, as a member of subteam
on a SIG with a mandate to perform vulnerability management on
behalf of the rest of the community. We set and manage the project's
embargoes and coordinate its public disclosure process (including
supplying advance notice to the linux-distros list as well as other
downstream stakeholders).

When we've experienced premature disclosures, it's been because
developers under the employ of a particular distribution have felt
pressured to notify their managers or employer's security group
about the fixes they're writing, reviewing or testing in violation
of our embargo policies, not because of a failure on the part of of
SIG members. If anything, involving people employed by a commercial
distribution is a greater liability than involving community
volunteers who are not under those same sorts of pressures.

There are a number of tools which help provide long-term
transparency for such activities, including using a defect tracker
that supports eventually switching private reports to public,
following a published process for intake and coordination efforts,
community maintenance of testsuites which can be run locally on
developers' systems to test proposed fixes in private, agreeing on
conventions for a private code review process, etc.

Yes, trying to maintain the secrecy of embargoes is at odds to
participating in an open community project with publicly accessible
code review and CI/CD systems, it's been the subject of conference
talks I've given in the past, but it's not impossible to balance
these competing forces. I don't see how that would be different in a
GNU/Linux distribution than for any other large project.
-- 
Jeremy Stanley

Attachment: signature.asc
Description:


Current thread: