On 01/05/15 at 04:23pm, Jiri Benc wrote:
> On Fri, 2 Jan 2015 17:57:14 -0800, Ben Pfaff wrote:
> >     1) Consider provisions for ensuring privacy and integrity of
> >     communications around disclosure (eg, use PGP for all comms).
> 
> That never hurts. I'd argue that's not strictly required though, as the
> code speaks for itself and anybody can verify the patch does what it
> does and the reasoning is correct.

I agree and I would put the emphasize on the communication around the
disclosure. Requiring GPG for all reports is pretty much pointless
without a previous web of trust between the team and the reporter.

We should however sign the messages when we disclose the vulnerability
publicly.

> >     2) Consider provisions for handling the vuln info to prevent it from
> >     being leaked / stolen from developers (this info can often be worth a
> >     lot of money to certain parties with a lot of interest and motivation to
> >     get hold of them). This means keeping info in some sort of secured
> >     enclaves, and perhaps mixing patch code with other commits to obfuscate
> >     the presence of the flaw.
> 
> I strongly disagree with that. Distributions need to be able to cherry
> pick the security fixes, any kind of obfuscation and mixing commits for
> different things makes the life of distro maintainers harder, leading
> to more mistakes, thus less security for those who use ovs via a
> distro. Such thing would not improve security of the ovs project anyway
> --the yet undiscovered bugs do not have a patch to obfuscate, and
> discovered and patched bugs are, well, patched. Anybody running on the
> latest code base has the fix applied; for backports, a clear patch to
> backport is needed.

+1

This is pointless in my eyes and doesn't add any real security.

> 
> >     3) Consider revising patch release process to ensure patched code
> >     reaches deployments without disclosing the vulnerability; and release
> >     the vuln info after allowing sufficient time for fixed code to percolate
> >     into running environments. Currently proposed process does not appear to
> >     allow for this.
> 
> It does, through the embargoed disclosure. Committing the patch without
> sending it to ovs-dev list and releasing the disclosure only later does
> not make sense. It would draw the attention to the fix anyway. And
> sending it for review to ovs-dev without telling what the patch fixes
> won't work, either.

I think (3) is actually covered in the embargo process as nicely
described by Ben already. I would agree to not change a thing in that
regard.
_______________________________________________
dev mailing list
dev@openvswitch.org
http://openvswitch.org/mailman/listinfo/dev

Reply via email to