On Mon, Jan 5, 2015 at 9:23 AM, Jiri Benc <jb...@redhat.com> wrote: > On Fri, 2 Jan 2015 17:57:14 -0800, Ben Pfaff wrote: > > 1) Consider provisions for ensuring privacy and integrity of > > communications around disclosure (eg, use PGP for all comms). > > That never hurts. I'd argue that's not strictly required though, as the > code speaks for itself and anybody can verify the patch does what it > does and the reasoning is correct. > > > 2) Consider provisions for handling the vuln info to prevent it from > > being leaked / stolen from developers (this info can often be worth a > > lot of money to certain parties with a lot of interest and > motivation to > > get hold of them). This means keeping info in some sort of secured > > enclaves, and perhaps mixing patch code with other commits to > obfuscate > > the presence of the flaw. > > I strongly disagree with that. Distributions need to be able to cherry > pick the security fixes, any kind of obfuscation and mixing commits for > different things makes the life of distro maintainers harder, leading > to more mistakes, thus less security for those who use ovs via a > distro. Such thing would not improve security of the ovs project anyway > --the yet undiscovered bugs do not have a patch to obfuscate, and > discovered and patched bugs are, well, patched. Anybody running on the > latest code base has the fix applied; for backports, a clear patch to > backport is needed. > > > Parts of OVS are in kernel space, making it a > > quite an “interesting” target, so I wouldn’t take this one lightly. > > The kernel patches will need to go through the kernel security > reporting process: > > https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/tree/Documentation/SecurityBugs > > Which is maybe a good idea to include in the documentation? > > ++
I think including a link to the kernel security reporting process is necessary here. > > 3) Consider revising patch release process to ensure patched code > > reaches deployments without disclosing the vulnerability; and release > > the vuln info after allowing sufficient time for fixed code to > percolate > > into running environments. Currently proposed process does not > appear to > > allow for this. > > It does, through the embargoed disclosure. Committing the patch without > sending it to ovs-dev list and releasing the disclosure only later does > not make sense. It would draw the attention to the fix anyway. And > sending it for review to ovs-dev without telling what the patch fixes > won't work, either. > > Overall, these suggestions seem to be from somebody who's not familiar > with how open source development works. > > Jiri > > -- > Jiri Benc > _______________________________________________ > dev mailing list > dev@openvswitch.org > http://openvswitch.org/mailman/listinfo/dev > _______________________________________________ dev mailing list dev@openvswitch.org http://openvswitch.org/mailman/listinfo/dev