[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] Security policy ambiguities - XSA-108 process post-mortem
On 8 Oct 2014, at 16:06, Ian Jackson <ijackson@xxxxxxxxxxxxxxxxxxxxxx> wrote: > Xen Project Security Team writes ("Security policy ambiguities - XSA-108 > process post-mortem"): >> We welcome any feedback on our decisions and we look forward to >> clearer directions from the community. > > Here is my own, purely personal, response with answers to the > questions asked. NB that this is not the opinion of Citrix nor of > the Xen Project Security Team. But I thought I would at least write > down something concrete for people to argue about. > > >> Sharing amongst predisclosure list members > > I think that the answer should be `yes', in principle. There seems > little point forbidding this. > > Allowing greater sharing would perhaps allow problems with patches to > be discovered (and the revised patches developed) more easily. We > should provide a clear channel for collaboration between predisclosure > list members. > > Therefore, the policy should be extended by adding, before > `Organisations who meet the criteria', the new section: > > List members are allowed to share fixes to embargoed issues, > analysis, etc., with the security teams of other list members. > Technical measures must be taken to prevents non-list-member > organisations, or unauthorised staff in list-member organisations, > from obtaining the embargoed materials. > > The Xen Project provides the mailing list > xen-security-issues-discuss@xxxxxxxxxxxxxxxxxxxx > for this purpose. List members are encouraged to use it but > may share with other list members' security teams via other > channels. > > The -discuss list's distribution is identical to that of the primary > predisclosure list xen-security-issues. Recipient organisations who > do not wish to receive all of the traffic on -discuss should use > recipient-side email filtering based on the provided `List-Id'. > > The -discuss list is moderated by the Xen Project Security Team. > Announcements of private availability of fixed versions, and > technical messages about embargoed advisories, will be approved. > Messages dealing with policy matters will be rejected with a > reference to the Security Team contact address and/or public Xen > mailing lists. > > (That list obviously doesn't exist yet, but if the policy is approved > we will create it.) Ian, this is a very good suggestion. > > One reason for permitting this is that we want fairness between > service providers who use their own versions of Xen, and ones who use > a version from a software provider. Both kinds of service provider > should be able to test the fix during the embargo. > > >> Deployment on public systems of fixed versions during embargo > > These different understandings have led to some bad feelings - some > people feel that others have breached the embargo, while they felt > prevented from acting similarly. This is very regrettable and I > apologise for my contribution to the unclarity in the policy. > > I want to say clearly that I think everyone has acted in good faith. > > My view is that the policy should be clarified to permit deployment > during embargo. I see no practical reason for preventing it. I agree. If we didn’t allow deployment during an embargo a lot more users would be at risk. However, in this context we do need to look at a number of questions: a) Risk of someone reverse engineering the vulnerability during deployment. b) GPL (or license) compliance - this may be a non-issue, but I would like to get some advice on it. In the case of XSA 108 both were not an issue, because the hypervisor is not accessible by a user of a cloud provider. However, if the vulnerability had been in another component this may be different. > I would > add, following that list of bullet points: > > List members who are service providers may deploy fixed versions > during the embargo, PROVIDED THAT any action taken by the service > provider gives no indication (to their users or anyone else) as to > the nature of the vulnerability. I think this does text does not address a) and b) > > This question is IMO partly linked to the previous one. > > > The Security Team should not be invited to give permission > specifically for the release of patched software. I think the rider > was mistakenly merged into the final the bullet point in the list. It > should be separated out. Also, the predisclosure list members should > not be invited to consult the discoverer. > > The note about CVE numbers should be moved into the list of > forbidden-disclosures, as a new bullet point. So overall I would > delete that whole paragraph about CVEs (we don't need the historical > information) and adjust the end of the forbidden disclosures to read: > > ... > * patched software (even in binary form) > * CVE number(s) > > without prior consultation with security@xenproject. > > >> Service announcements to non-list-member users during embargo > > We should add just below the list of bullet points of things which may > be disclosed: > > Where the list member is a service provider who intends to take > disruptive action such as rebooting as part of deploying a fix (see > above): the list member's communications to its users about the > service disruption may mention that the disruption is to correct a > security issue, and relate it to the public information about the > issue (as listed above). > > >> Predisclosure list memembership > > The policy should be amended to require applicants to provide the > information required, in the form of public URLs. The team should not > be required to judge email aliases or enquire about their recipients > except to ensure that they don't look like personal aliases. > > Applicants should be required to: > > - Provide information on their public web pages which makes > it clear that and why they are eligible; > > - Specifically, publicly state that and how they are using Xen > (so that the Security Team can verify eligibility); > > - Provide a way for members of the public to responsibly report > security problems to the applicant, just as the Xen Project does. > > The Security Team should be forbidden from trying to hunt down > eligibility information etc. and should instead be mandated to reject > incomplete requests. > > > Specifically, I propose that the section on list membership > applications be entirely replaced with this: > > Organisations who meet the criteria should contact > security@xenproject if they wish to receive pre-disclosure of > advisories. You must include in the e-mail: > > * The name of your organization. > > * Domain name(s) which you use to provide Xen software/services. > > * A brief description of why you fit the criteria. > > * If not all of your products/services use Xen, a list of (some > of) your products/services (or categories thereof) which do. > > * Link(s) to current public web pages, belonging to your > organisation, for each of following pieces of information: > > o Evidence of your status as a service/software provider: > + If you are a public hosting provider, your public rates > or how to get a quote > + If you are a software provider, how your > software can be downloaded or purchased > + If you are an open-source project, a mailing list > archive and/or version control repository, with > active development > > o Evidence of your status as a user of Xen: > + Statements about, or descriptions of, your eligible > production services or released software, from which it is > immediately evident that they use Xen. > > o Information about your handling of security problems: > + Your invitation to members of the public, who discover > security problems with your products/services, to report > them in confidence to you; > + Specifically, the contact information (email addresses or > other contact instructions) which such a member of the > public should use. > > Blog postings, conference presentations, social media pages, > Flash presentations, videos, sites which require registration, > anything password-protected, etc., are not acceptable. PDFs of > reasonable size are acceptable so long as the URL you provide is > of a ordinary HTML page providing a link to the PDF. > > If the pages are long and/or PDFs are involved, your email > should say which part of the pages and documents are relevant. > > * A statement to the effect that you have read this policy and > agree to abide by the terms for inclusion in the list, > specifically the requirements regarding confidentiality during > an embargo period. > > * The single (non-personal) email alias you wish added to the > predisclosure list. > > The Security Team has no discretion to accept applications which do > not provide all of the information required above. This is a good list. I do think we should test this though to make sure it actually works. I think there are a few areas which may be ambiguous or not clear enough. I also think we do need to address websites in non-english languages would be handled. Of course we do not want to discriminate. > > Please provide URLs which are accessible and legible on mobile phone > browsers, which do not require cookies enabled to load, and which > are useable with text mode browsers, browsers which do not execute > Javascript, and with screen readers and other accessibility > software. If the member of the Xen Project Security Team who > processes your application finds that their usual web browser does > not display the required information, when presented with the URLs > in your email, your application might be delayed or even rejected. > > > Ian. > > > _______________________________________________ > Xen-devel mailing list > Xen-devel@xxxxxxxxxxxxx > http://lists.xen.org/xen-devel _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |