Thank you for your suggestion, Lari.

I opened a PR to add a SECURITY.md file:
https://github.com/apache/pulsar/pull/10829. Note that I decided to use 12
months instead of 18 for our support window. I describe why in the PR.

I am hoping this concrete step will push us toward a concrete solution.
Please take a look at the PR and provide feedback.

Thanks,
Michael

On Mon, May 31, 2021 at 3:17 AM Lari Hotari <lhot...@apache.org> wrote:

> +1 , Thanks for the suggestion, Michael.
>
> I hope we can get the security policy documented for Apache Pulsar asap.
>
> GitHub suggests adding a SECURITY.md file to the repository.
> When committers go to https://github.com/apache/pulsar/security , the UI
> suggests "Setup a security policy":
> [image: image.png]
>
> Clicking on the button takes to editing a SECURITY.md file
>
> [image: image.png]
> This is also documented in
> https://docs.github.com/en/code-security/getting-started/adding-a-security-policy-to-your-repository
> .
>
> Perhaps this could be the way how to document the security policy in
> Apache Pulsar?
>
> The GitHub provided template has these sections:
> - Supported Versions
> - Reporting a Vulnerability
>
> There are a lot more extensive templates available such as
> https://github.com/Trewaters/security-README/blob/master/security.md . It
> seems that some projects also document it in SECURITY.md how to securely
> use the product. One example is SECURITY.md in TensorFlow,
> https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md .
>
> Michael, could you create a PR for the SECURITY.md file? It might be
> easier to revisit the details of the security policy in a PR review.
>
> BR, Lari
>
>
> On Fri, May 28, 2021 at 12:49 AM Michael Marshall <mikemars...@gmail.com>
> wrote:
>
>> Hi Pulsar Community,
>>
>>
>> I would like to discuss defining and documenting a process for an official
>> Pulsar version EOL policy. This process will help users know when the
>> version they are running will no longer be supported with security
>> patches.
>>
>> After the recent announcement of CVE-2021-22160, I looked on the official
>> pulsar website for a documented process describing which branches will
>> receive security patches when vulnerabilities are discovered. I could not
>> find a process on the website. I did find a policy for handling version
>> EOL
>> described in PIP-47, though (
>>
>> https://github.com/apache/pulsar/wiki/PIP-47%3A-Time-Based-Release-Plan#what-is-our-eol-policy
>> ).
>> Based on the policy, I would have expected a release of 2.6.4 with the
>> security patch for CVE-2021-22160, but that patch was not cherry-picked to
>> branch-2.6 until this week after the publication of the CVE, and we’re
>> only
>> just now starting the process to release 2.6.4.
>>
>> I think it’s also relevant to consult the ASF guide for vulnerability
>> handling. The process is outlined here:
>> https://www.apache.org/security/committers.html. Regarding releasing
>> fixes,
>> it only mentions the following:
>>
>> > 15. The project team creates a release that includes the fix.
>>
>> > 16. The project team announces the vulnerability. The vulnerability
>> announcement should be sent after, or at the same time as, the release
>> announcement to the following destinations.
>>
>> Given the above information, I think it would be appropriate to have a
>> policy that ensures all active/supported branches receive security patches
>> before a CVE is announced.
>>
>> I propose we adopt a policy similar to Apache Spark’s policy, which is to
>> provide security fixes for feature branches for at least 18 months after
>> the initial minor version release:
>> https://spark.apache.org/versioning-policy.html. If we apply this policy
>> to
>> Pulsar, 2.6.x will receive security patches until December 2021 (2.6.0 was
>> released in June 2020).
>>
>> When I brought this up at the community meeting today, Matteo mentioned
>> supporting releases for a year. I am open to that time frame as well. My
>> main objective is to have a policy that is documented and easily
>> discovered
>> by our users.
>>
>> I look forward to your thoughts and suggestions.
>>
>> Thanks,
>>
>> Michael Marshall
>>
>

Reply via email to