oss-sec mailing list archives

Re: membership request to the closed linux-distros security mailing list


From: Anthony Liguori <anthony () codemonkey ws>
Date: Fri, 20 Mar 2015 08:16:24 -0700

On Fri, Mar 20, 2015 at 7:54 AM, Solar Designer <solar () openwall com> wrote:
On Fri, Mar 20, 2015 at 02:00:29PM +0100, Sona Sarmadi wrote:
On behalf of Enea  Software AB, I would like to request membership to
the closed linux-distros security mailing list.

Oh, recent attention to OpenSSL does wonders.  I already got off-list
reminders from IBM and VMware this same week.

Of course, this is primarily about PR, and only secondarily about
security.  But should this be stopping us, if early security updates are
also, unsurprisingly, good for security?

OK, we got to handle these requests, and more.  Yes, there were several
more off-list requests (obviously, they would not be handled without
bringing them to oss-security first) during the 11 months that distros
list membership has essentially been locked (in terms of which distros
are represented; there were minor changes in who is subscribed for
distros already on the list).

Oh, and I need to announce that one distro left the list earlier this
month: the person previously subscribed for Android determined that "the
mail going to those lists hasn't been actionable" for Android.

(Full disclosure, while I am sending this from my personal mail
account, I'm on distros@ representing Amazon Linux AMI)

I have noticed that there are two types of disclosures on distros.
Most disclosures are sent directly to the list with or without an
embargo date attached.  These are usually low impact.  The second are
higher impact and typically sent as "there is a vulnerability in X,
please contact this person directly for more information."  The recent
OpenSSL disclosure fell into the later category.

I actually like this model a lot.  I think more upstreams will be
inclined to use distros@ if they can maintain veto power over who
actually gets the disclosure.  I also think that this allows distros@
to increase its membership in a reasonable way while not making the
list not useful.

I think it might even make sense to have a stated policy that high
impact vulnerabilities should be sent to the list in such a way.
There have been a number of issues sent to the list where I explicitly
did not request more details because I knew we were not affected
because of what we package.  I would prefer not to be disclosed on
things that we do not need to take action on (and I suspect upstreams
prefer this too).

So, our options are:

1. Shut down the (linux-)distros lists and be done with this. ;-)  To me,
they were more clearly doing more good than bad when they were a subset
of the old vendor-sec.  With more membership requests coming in, and
with simply ignoring such requests being unfair, maybe the time of these
lists is over.  No, this does not mean that's my current opinion, but
when doing something as controversial as this, I think we should at all
times be reconsidering whether the "more good than bad" condition is
possibly no longer met.  (Of course, some people are convinced that it
never was.  I am not.  Rather, I am unsure.)

Definitely not good.


-OR-

2. We can just go ahead and review each request for acceptance for the
existing (linux-)distros lists.  In this case, we'd be less likely to
satisfy all of the pending requests.  And maybe we should question the
subscription of Amazon Linux AMI, MontaVista, and Wind River, which are
now linux-distros members.

I think this is fair.  If we do this, I think having clear guidelines
on what is required to be on linux-distros is helpful although I can
see being a long and difficult discussion.


-OR-

3. Setup a separate list for primarily non-free software and primarily
non-software vendors.  Of the existing linux-distros members, maybe
Amazon Linux AMI, MontaVista, and Wind River should be moved there.

I have to object to being labelled with either of those tags :-)

(Maybe also Chrome OS?)  And then maybe Enea and VMware would reasonably
be added, too.  Not sure if IBM is non-free enough to be restricted to
that list.

The idea behind such list is that we'd let people decide who they want
to notify: all distros (including this separate list) or just the more
free'ish subset (not including this separate list).

I think the alternative is to formalize what already appears to be the
existing practice: disclose distros@ on the existence of a
vulnerability but require direct contact for the details of the
vulnerability if the submitter/upstream thinks the impact is high.

I think this is both simple and defers decisions on scope of
notification to upstreams which are both seemingly good goals.

Regards,

Anthony Liguori


Current thread: