|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] Security policy ambiguities - XSA-108 process post-mortem
Xen Project Security Team writes ("Security policy ambiguities - XSA-108
process post-mortem"):
> We welcome any feedback on our decisions and we look forward to
> clearer directions from the community.
Here is my own, purely personal, response with answers to the
questions asked. NB that this is not the opinion of Citrix nor of
the Xen Project Security Team. But I thought I would at least write
down something concrete for people to argue about.
> Sharing amongst predisclosure list members
I think that the answer should be `yes', in principle. There seems
little point forbidding this.
Allowing greater sharing would perhaps allow problems with patches to
be discovered (and the revised patches developed) more easily. We
should provide a clear channel for collaboration between predisclosure
list members.
Therefore, the policy should be extended by adding, before
`Organisations who meet the criteria', the new section:
List members are allowed to share fixes to embargoed issues,
analysis, etc., with the security teams of other list members.
Technical measures must be taken to prevents non-list-member
organisations, or unauthorised staff in list-member organisations,
from obtaining the embargoed materials.
The Xen Project provides the mailing list
xen-security-issues-discuss@xxxxxxxxxxxxxxxxxxxx
for this purpose. List members are encouraged to use it but
may share with other list members' security teams via other
channels.
The -discuss list's distribution is identical to that of the primary
predisclosure list xen-security-issues. Recipient organisations who
do not wish to receive all of the traffic on -discuss should use
recipient-side email filtering based on the provided `List-Id'.
The -discuss list is moderated by the Xen Project Security Team.
Announcements of private availability of fixed versions, and
technical messages about embargoed advisories, will be approved.
Messages dealing with policy matters will be rejected with a
reference to the Security Team contact address and/or public Xen
mailing lists.
(That list obviously doesn't exist yet, but if the policy is approved
we will create it.)
One reason for permitting this is that we want fairness between
service providers who use their own versions of Xen, and ones who use
a version from a software provider. Both kinds of service provider
should be able to test the fix during the embargo.
> Deployment on public systems of fixed versions during embargo
These different understandings have led to some bad feelings - some
people feel that others have breached the embargo, while they felt
prevented from acting similarly. This is very regrettable and I
apologise for my contribution to the unclarity in the policy.
I want to say clearly that I think everyone has acted in good faith.
My view is that the policy should be clarified to permit deployment
during embargo. I see no practical reason for preventing it. I would
add, following that list of bullet points:
List members who are service providers may deploy fixed versions
during the embargo, PROVIDED THAT any action taken by the service
provider gives no indication (to their users or anyone else) as to
the nature of the vulnerability.
This question is IMO partly linked to the previous one.
The Security Team should not be invited to give permission
specifically for the release of patched software. I think the rider
was mistakenly merged into the final the bullet point in the list. It
should be separated out. Also, the predisclosure list members should
not be invited to consult the discoverer.
The note about CVE numbers should be moved into the list of
forbidden-disclosures, as a new bullet point. So overall I would
delete that whole paragraph about CVEs (we don't need the historical
information) and adjust the end of the forbidden disclosures to read:
...
* patched software (even in binary form)
* CVE number(s)
without prior consultation with security@xenproject.
> Service announcements to non-list-member users during embargo
We should add just below the list of bullet points of things which may
be disclosed:
Where the list member is a service provider who intends to take
disruptive action such as rebooting as part of deploying a fix (see
above): the list member's communications to its users about the
service disruption may mention that the disruption is to correct a
security issue, and relate it to the public information about the
issue (as listed above).
> Predisclosure list memembership
The policy should be amended to require applicants to provide the
information required, in the form of public URLs. The team should not
be required to judge email aliases or enquire about their recipients
except to ensure that they don't look like personal aliases.
Applicants should be required to:
- Provide information on their public web pages which makes
it clear that and why they are eligible;
- Specifically, publicly state that and how they are using Xen
(so that the Security Team can verify eligibility);
- Provide a way for members of the public to responsibly report
security problems to the applicant, just as the Xen Project does.
The Security Team should be forbidden from trying to hunt down
eligibility information etc. and should instead be mandated to reject
incomplete requests.
Specifically, I propose that the section on list membership
applications be entirely replaced with this:
Organisations who meet the criteria should contact
security@xenproject if they wish to receive pre-disclosure of
advisories. You must include in the e-mail:
* The name of your organization.
* Domain name(s) which you use to provide Xen software/services.
* A brief description of why you fit the criteria.
* If not all of your products/services use Xen, a list of (some
of) your products/services (or categories thereof) which do.
* Link(s) to current public web pages, belonging to your
organisation, for each of following pieces of information:
o Evidence of your status as a service/software provider:
+ If you are a public hosting provider, your public rates
or how to get a quote
+ If you are a software provider, how your
software can be downloaded or purchased
+ If you are an open-source project, a mailing list
archive and/or version control repository, with
active development
o Evidence of your status as a user of Xen:
+ Statements about, or descriptions of, your eligible
production services or released software, from which it is
immediately evident that they use Xen.
o Information about your handling of security problems:
+ Your invitation to members of the public, who discover
security problems with your products/services, to report
them in confidence to you;
+ Specifically, the contact information (email addresses or
other contact instructions) which such a member of the
public should use.
Blog postings, conference presentations, social media pages,
Flash presentations, videos, sites which require registration,
anything password-protected, etc., are not acceptable. PDFs of
reasonable size are acceptable so long as the URL you provide is
of a ordinary HTML page providing a link to the PDF.
If the pages are long and/or PDFs are involved, your email
should say which part of the pages and documents are relevant.
* A statement to the effect that you have read this policy and
agree to abide by the terms for inclusion in the list,
specifically the requirements regarding confidentiality during
an embargo period.
* The single (non-personal) email alias you wish added to the
predisclosure list.
The Security Team has no discretion to accept applications which do
not provide all of the information required above.
Please provide URLs which are accessible and legible on mobile phone
browsers, which do not require cookies enabled to load, and which
are useable with text mode browsers, browsers which do not execute
Javascript, and with screen readers and other accessibility
software. If the member of the Xen Project Security Team who
processes your application finds that their usual web browser does
not display the required information, when presented with the URLs
in your email, your application might be delayed or even rejected.
Ian.
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |