oss-sec mailing list archives

Re: linux-distros list membership application - CIQ Rocky Linux Security Team


From: Martin Hecht <martin.hecht () hlrs de>
Date: Fri, 13 Oct 2023 22:21:35 +0200 (CEST)

Hi,

On Fri, Oct 13, 2023 at 12:50 "Neal Gompa" <ngompa13 () gmail com> wrote:
The publicly verifiable track record currently consists of timely
rebuild and re-release of RHEL security update packages and security
advisories, as published here:

https://errata.rockylinux.org

Not currently verifiable publicly, but Gregory further tells me:

"We've been doing LTS privately to our customers for over a year now.
This means we maintain security fixes for customers who need long term
support for point releases."

From my point of view, this does not count. Rocky's public track record
of rebuilding RHEL updates and shipping them in a timely fashion does
not indicate that Rocky/CIQ can respond effectively when you have a craft
updates from scratch. Furthermore, there are public posts and articles
indicating that Rocky Linux/CIQ has trouble with shipping updates in a
timely fashion at all.

I'd like to give an example against this. With the recent glibc issue 
(CVE-2023-4911) we were closely following the upcoming fixed packages. 
While we were installing the Rocky packages in the late evening of Thu Oct 5, 
I had the impression that the Redhat packages became available later on Friday.
It might be attributed to some hours of delay between arriving on the repo 
servers vs. being announced via advisory. But, anyhow, accusing Rocky being
late in providing packages at least is not valid in general imho. At least 
important ones, like this one, seem to arrive rather quickly. Without mentioning 
the distros, I have seen quite some announcements even around a week later.

Not be (only) downstream or a rebuild of another distro (or else we need convincing additional justification of 
how the list membership would enable you to release fixes sooner, presumably not relying on the upstream distro 
having released their fixes first?)

Besides being a "downstream or a rebuild of another distro", CIQ has its
LTS branches and Rocky Linux has its additional and replacement packages
via the SIGs.  Security maintenance for these should be provided by CIQ
and Rocky Linux.

Special interest groups cannot count because they are intended to be
public community projects. Unless you're saying that all Rocky Linux
SIGs are shadows of CIQ work that can be held back for public consumption,
that is effectively out of scope for consideration.

I think the point here is "*not only* being a rebuild of another distro". 
So, their engagement with SIG should already be a valid add-on to be honored.
Anyhow, the fact that CIQ offers LTS branches and professional support, 
as well as their promise to provide backports of upstream fixes independent 
of RHEL clearly distinguishes them from a "pure distro rebuild".

https://ciq.com/products/rocky-linux/benefits/enterprise-level-support/


Some security issues in upstream packages may be mitigated or fixed by
pushing "security override" packages via CIQ's customer-facing repos and
the Security SIG repos, without waiting on upstream distro's fixes and
for issues or point releases where no upstream fixes are expected.

Related previously accepted membership application (precedent) is
CloudLinux's, which is now perhaps best known for AlmaLinux, another
prominent EL distribution:

http://www.openwall.com/lists/oss-security/2017/07/02/2

CloudLinux's membership was based on the fact that they replaced and
maintained a very large chunk of the distribution for their own
purpose. They used a RHEL compatible userland, but most of the server
software stacks and the kernel were replaced with their own builds.
They wanted access for the maintenance of that stuff, which is very
reasonable.

Rocky/CIQ has not demonstrated a similar need from my point of view.

You could take the hardened glibc version of the before mentioned SIG for this

https://rockylinux.org/news/security-sig-update/

Note, this is a different story than the backport of the fix for CVE-2023-4911.

Fedora is not a member because there is no mechanism in the project to
hide anything from the community. For this reason, I have not
considered joining as a representative of CentOS Hyperscale, Mageia,
or Fedora (all distributions that I do participate in security
response for).

Well, assuming there was a security team in these projects able to obey
the embargo regulations, wouldn't they have tried to join? 
But, nevertheless, what is the relation of the organizational structure 
of these projects with the current application of CIQ/Rocky, after all?

While I certainly recognize you and value your contributions
over the years, I do not feel that you alone is sufficient for
Rocky/CIQ to be accepted onto linux-distros@.

The membership on the list is always by person, and it is always 
on behalf of a distro. The fact that Alexander is already engaged in
the Security SIG @Rocky already makes it a reasonable next step
to represent them on the linux-distros list.

Furthermore, I would like to express my deep admiration for his 
very professional way of working. Especially in this case, when it 
is about his own person, he handles the application process transparently
as if it was any other distro's. Sure, that's one would expect in 
this position, but it's just another proof in a long list that he is 
the right person to do this job of running, maintaining, and moderating
these lists.

Not being member of any distribution, but a long-time subscriber to
oss-sec, fd, and others, I give my vote for Alexander as a representative
of CIQ Rocky Linux Security Team on linux-distros list.  

Best regards,
Martin


Current thread: