[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] Disclosure process poll results



Monday we closed the poll [1] for the security discussion.  Thank you
everyone who participated!  The process has not turned up a hidden
option that everyone agreed on; however, it has helped find what I
hope will be a "median" option which best addresses the concerns and
desires as the community as a whole.  Below I give a description of
the results of the poll, and a recommendation as to what I think is
the best way forward.

You may wish to read this analysis on the Xen.org blog instead; the
text is the same, but it includes inline graphs of the results as
well.  You can find the blog here:

http://blog.xen.org/index.php/2012/08/23/disclosure-process-poll-results/

= Analysis =

We had 33 votes, from what seems like a good cross-section of the
community.  This includes four committers, eight regular contributors.
 It also included representatives from three large service providers
and a number of smaller service providers, as well as a number of
individual users.  Only four of the votes were anonymous.

Because the goal of the poll was not a formal decision, but to find
out what peole in the community thought, I not only looked at the
numbers for each response, but who voted for each one, and how they
voted on the other options, to understand the data.  I don't include
the names in the summary here, but I will make the raw data (minus a
couple of e-mails that people asked not to be published) available to
anyone who e-mails me.

The votes are listed numerically as:
Excellent / Happy / Unhappy / Terrible / No opinion

== No pre-disclosure ==

Description: People are brought in only to help produce a fix.  The
fix is released to everyone publicly when it's ready (or, if the
discloser has asked for a longer embargo period, when that embargo
period is up).

Votes: 3 / 5 / 6 / 17 / 2
Graph: http://blog.xen.org/wp-content/uploads/2012/08/no-predisclosure.png

This option has little support, and lots of opposition, including
several core developers.  It will probably be removed from
consideration.

== Pre-disclosure only to software vendors ==

Description: Pre-disclosure list consists only of software vendors --
people who compile and ship binaries to others.  No updates may be
given to any user until the embargo period is up.

Votes: 8 / 6 / 10 / 8 / 1
Graph: http://blog.xen.org/wp-content/uploads/2012/08/software-only.png

This one is a fairly mixed bag; is has support from a few core
developers and regular contributors (along with some software
providers), but also opposition from core developers and regular
contributors (along with some service providers).  Of the people who
did not say they would argue either way, more people are unhappy than
not.  Overall a pretty unattractive option.

== Pre-disclosure to software vendors and a strict subset of users ==

Description: Privleged users will be provided with patches at the same
time as software vendors.  They will be permitted to update their
systems at any time.  Software vendors will be permitted to send code
updates to service providers who are on the pre-disclosure list.  The
subset could be the current set (i.e,. based on size), or could
include some other criteria to be discussed.

Votes: 10 / 5 / 7 / 10 / 1
Graph: http://blog.xen.org/wp-content/uploads/2012/08/strict.png

Looking at just the numbers, there are an even split of advocates and
opponents.  However, when you look at the results in detail, it turns
out that it is opposed by several core developers, and supported
mainly by large service providers.  This kind of division makes it an
unattractive option.

== Pre-disclosure to sofware vendors and a wide set of users ==

Description: User list would have some minimal standards; but it is
likely that any genuine cloud provider would be able to get onto the
list. Users on the list will be provided with patches at the same time
as software vendors.  They will be permitted to update their systems
at any time.  Software vendors will be permitted to send code updates
to service providers who are on the pre-disclosure list.

Graph: http://blog.xen.org/wp-content/uploads/2012/08/easy.png
Votes: 11 / 9 / 4 / 9 / 0

Looking at the numbers, this looks the best: it has more "argue for"
votes than any other option, and of those who didn't say they would
argue either way, people seem the happiest with this one.

Looking at the results in detail, it looks even better.  This one has
the support of many of the core developers, and also either the
support or the acquiescence of the majority of service providers,
large and small.

Furthermore, when I looked at those who said they would "argue
against" it, it seemed clear that there are two groups who oppose it
for opposite reasons: some because they think allowing any users to
know before other users is unfair, and prefer either no pre-disclosure
or disclosure only to software providers; others (presumably) because
they think it's not restrictive enough, and favor pre-disclosure to a
smaller group.  Given the difference of opinions in the community,
having people oppose it for opposite reasons probably indicates that
this is in the "center" of community opinion.

= Moving the discussion forward =

The Xen.org governance process[2] specifies that we should try to form
a community consensus, via voting, and if that fails, that the
committers will take a vote on the issue to decide.

It seems to me that given the results above, there's really only one
option that might be able to achieve consensus, and that's
"Pre-disclosure to a wide set of users".  How I recommend we proceed,
then, is that we have a formal community vote to make that change to
the security disclosure process.  That voting process, you may recall,
involves members giving a "+1" or "-1".  Those who vote "-1" should
give an alternate solution, and are encouraged to do so.

If that vote does not turn up consensus, and there seems to be another
option that might, we will vote on that; otherwise, the committers
will vote to choose an option that the think will serve the community
the best.

[1] http://blog.xen.org/index.php/2012/08/06/security-discussion-poll/
[2] http://www.xen.org/projects/governance.html

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.