> On Jan 24, 2025, at 1:44 PM, PJ Fanning <fannin...@apache.org> wrote:
> 
> The ASF generally mandates a min of 3 days for votes on release
> candidates. This can be significantly shortened if there is a security
> issue that needs a quick release.
> With Podlings, they typically require 2 rounds of voting (PPMC and
> then the Incubator PMC) but again if a podling needs a quick release
> they can forewarn the PPMC and Incubator PMC about the need for a
> curtailed voting schedule.
> 
> In my experience, fixes for Zero Day exploits are only a small
> proportion of the security related fixes that get made.
> 
> This is somewhat tangential to what this discussion is about.

Security issues whether the above or reporting about them should be 
confidential.

The PPMC should inform the IPMC via private@incubator then in the Incubator 
board report the IPMC can add a <private> section like any TLP does in their 
board reports.

I can see reporting that they had dealt with a security issue in public before 
its solution being an issue.

I’m not sure if I’m repeating anyone, but for a podling report this can be a 
simple Yes/No - “Has the podling ever issued a Security Alert or CVE?”

Best,
Dave

> 
> On Fri, 24 Jan 2025 at 22:34, Jochen Theodorou
> <blackd...@gmx.org.invalid> wrote:
>> 
>> Maybe one more thing we should think about. What if there is a security
>> issue, the response of the podling is good and the issue gets fixed very
>> fast. And can only be fixed by a new release. But then the incubator
>> finds issues with the release and the release issues cannot be fixed
>> right away. I doubt the security process describes this kind of scenario.
>> 
>> 
>> On 24.01.25 17:32, PJ Fanning wrote:
>>> Thanks Calvin for your response. Maybe we could start by having the ASF
>>> Security team track progress on reported issues - as they already do. In
>>> the Incubator public reporting, we would not disclose anything other than
>>> self reporting that the PPMC feels confident that they are in a good
>>> position to deal with issues and follow the ASF Security process.
>>> 
>>> Maybe the Incubator shepherds could independently check this too.
>>> 
>>> I'm open to forming a consensus on the right level of reporting.
>>> 
>>> When it comes to graduating, I would like to be able to vote -1 for
>>> podlings who appear not to be following the security process.
>>> 
>>> 
>>> 
>>> On Fri 24 Jan 2025, 16:11 Calvin Kirs, <k...@apache.org> wrote:
>>> 
>>>> I completely agree with this proposal, even though some podlings rarely
>>>> encounter security issues during incubation. (This may change as they
>>>> transition to TLP status and gain more visibility.) However, understanding
>>>> and recognizing the importance of security issues is also something
>>>> podlings need to learn during the incubation period.
>>>> 
>>>> If podlings are required to report existing security issues and their
>>>> progress, how should this be done? Through private@i.a.o? Currently, our
>>>> reports are fully public.
>>>> 
>>>> In the final board submission, the Incubator will also need to provide a
>>>> consolidated private report on security issues. This report should include
>>>> the number of security issues and identify any podlings that are in an
>>>> unhealthy state regarding their handling of security problems.
>>>> 
>>>> That said,  the successful submission of this report will likely rely
>>>> heavily on the efforts of shepherds and mentors.
>>>> 
>>>> On Fri, Jan 24, 2025 at 9:36 PM PJ Fanning <fannin...@gmail.com> wrote:
>>>> 
>>>>> Hi everyone,
>>>>> 
>>>>> I didn't follow up on this when I raised it in December 2023. I'd like
>>>>> to propose it again.
>>>>> Basically, the idea is that the podling reports, that we do every 3
>>>>> months, would have a question about whether the podling believes that
>>>>> they are being sufficiently responsive to issues raised on their
>>>>> private mailing list (particularly security issues). There would maybe
>>>>> also be a reminder about the ASF policies related to dealing with
>>>>> disclosures about vulnerabilities [1].
>>>>> I would also like to see a section about this in the Graduation Report
>>>>> - having podlings declare that they have been and intend to continue
>>>>> to be responsive to disclosures about vulnerabilities. This is covered
>>>>> by QU30 in the Project Maturity Model [2] but I wonder if the text
>>>>> could be adjusted to also mention the need to be responsive to
>>>>> vulnerability reports.
>>>>> With efforts like the CRA [3] and other regulatory requirements around
>>>>> the world, this area is becoming even more important.
>>>>> 
>>>>> What do people think?
>>>>> 
>>>>> Thanks,
>>>>> PJ
>>>>> 
>>>>> [1] https://www.apache.org/security/
>>>>> [2]
>>>>> 
>>>> https://community.apache.org/apache-way/apache-project-maturity-model.html#quality
>>>>> [3] https://en.wikipedia.org/wiki/Cyber_Resilience_Act
>>>>> 
>>>>> On Wed, 13 Dec 2023 at 16:21, Craig Russell <apache....@gmail.com>
>>>> wrote:
>>>>>> 
>>>>>> Hi PJ,
>>>>>> 
>>>>>> I agree that there should be a section in podlings' reports that
>>>>> highlights <private/> security issues.
>>>>>> 
>>>>>> Regards,
>>>>>> Craig
>>>>>> 
>>>>>>> On Dec 13, 2023, at 05:22, PJ Fanning <fannin...@apache.org> wrote:
>>>>>>> 
>>>>>>> Hi everyone,
>>>>>>> 
>>>>>>> I'm wondering if podlings should include some details about their
>>>>>>> security issues [1] in their 3 podling reports. We won't want to
>>>>>>> release information about any security issues that are still under
>>>>>>> investigation or where the fix is not yet released. I still think
>>>>>>> there is little harm in podlings giving high level numbers and maybe
>>>>>>> some indication of how quickly security issues are being dealt with.
>>>>>>> 
>>>>>>> I've seen evidence that some TLPs are unaware of the importance of
>>>>>>> dealing quickly with security reports and I think the Incubator team
>>>>>>> could help with ensuring that podlings are aware of the requirements.
>>>>>>> 
>>>>>>> I will certainly be having a close look at a podling's record of
>>>>>>> handling security reports when it comes to discussions about
>>>>>>> graduation.
>>>>>>> 
>>>>>>> I'm wondering if we could have some consensus on what is expected of
>>>>> podlings.
>>>>>>> 
>>>>>>> Regards,
>>>>>>> PJ
>>>>>>> 
>>>>>>> [1] https://www.apache.org/security/
>>>>>>> 
>>>>>>> ---------------------------------------------------------------------
>>>>>>> To unsubscribe, e-mail: general-unsubscr...@incubator.apache.org
>>>>>>> For additional commands, e-mail: general-h...@incubator.apache.org
>>>>>>> 
>>>>>> 
>>>>>> Craig L Russell
>>>>>> c...@apache.org
>>>>>> 
>>>>>> 
>>>>>> ---------------------------------------------------------------------
>>>>>> To unsubscribe, e-mail: general-unsubscr...@incubator.apache.org
>>>>>> For additional commands, e-mail: general-h...@incubator.apache.org
>>>>>> 
>>>>> 
>>>>> ---------------------------------------------------------------------
>>>>> To unsubscribe, e-mail: general-unsubscr...@incubator.apache.org
>>>>> For additional commands, e-mail: general-h...@incubator.apache.org
>>>>> 
>>>>> 
>>>> 
>>>> --
>>>> Best wishes!
>>>> CalvinKirs
>>>> 
>>> 
>> 
>> 
>> ---------------------------------------------------------------------
>> To unsubscribe, e-mail: general-unsubscr...@incubator.apache.org
>> For additional commands, e-mail: general-h...@incubator.apache.org
>> 
> 
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: general-unsubscr...@incubator.apache.org
> For additional commands, e-mail: general-h...@incubator.apache.org
> 


---------------------------------------------------------------------
To unsubscribe, e-mail: general-unsubscr...@incubator.apache.org
For additional commands, e-mail: general-h...@incubator.apache.org

Reply via email to