Security release criterion proposal

2011-05-19 Thread J B
Josh Bressers bressers at redhat.com Thu May 19 12:57:46 UTC 2011 wrote: > Perhaps the correct answer is to have firstboot update the system > for a user (do it in the background so they can still login do things). Should we do that ? I mean an update in the background without user's knowledge, c

Re: Security release criterion proposal

2011-05-19 Thread Richard Ryniker
>if a remote root hole is found 2 days after release, what do we do? >(the current answer is nothing) One can suppose a re-spin is possible, given sufficient motivation. There already exists some informal respin activity. For example, see: http://jbwillia.fedorapeople.org/ -- test mailing li

Re: Security release criterion proposal

2011-05-19 Thread Josh Bressers
- Original Message - > > I say, local privilege escalations with publicly available exploits, and > remotely triggerable vulnerabilities. If such an issue is known before > Final, we should attempt to address it before releasing. > I think it makes sense to address these prior to a relea

Re: Security release criterion proposal

2011-05-18 Thread Adam Williamson
On Thu, 2011-05-19 at 10:00 +0800, Eugene Teo wrote: > I say, local privilege escalations with publicly available exploits, and > remotely triggerable vulnerabilities. If such an issue is known before > Final, we should attempt to address it before releasing. Note, a release criterion would have

Re: Security release criterion proposal

2011-05-18 Thread Michał Piotrowski
2011/5/18 Adam Jackson : > On 5/18/11 1:14 PM, J B wrote: > >> So, even a local DoS could qualify for a security blocker. > > Denial of service is not a security issue.  Full stop.  Those words mean > different things.  Do not conflate them. IMHO this is a matter of definition. It seems to me that

Re: Security release criterion proposal

2011-05-18 Thread Michał Piotrowski
Hi, 2011/5/18 Adam Williamson : > On Wed, 2011-05-18 at 19:14 +0200, J B wrote: >> Hi, >> >> > I don't know if anyone >> > would want to go as far as making DoS vulns release blocking, but speak >> > up if you would! (Of course there is again the local/remote distinction >> > to consider there: 'a

Re: Security release criterion proposal

2011-05-18 Thread Adam Williamson
On Wed, 2011-05-18 at 13:45 -0400, Adam Jackson wrote: > On 5/18/11 1:14 PM, J B wrote: > > > So, even a local DoS could qualify for a security blocker. > > Denial of service is not a security issue. Full stop. Those words mean > different things. Do not conflate them. Well, it's considered

Re: Security release criterion proposal

2011-05-18 Thread Adam Jackson
On 5/18/11 1:14 PM, J B wrote: > So, even a local DoS could qualify for a security blocker. Denial of service is not a security issue. Full stop. Those words mean different things. Do not conflate them. - ajax -- test mailing list test@lists.fedoraproject.org To unsubscribe: https://admin.

Re: Security release criterion proposal

2011-05-18 Thread Adam Williamson
On Wed, 2011-05-18 at 19:14 +0200, J B wrote: > Hi, > > > I don't know if anyone > > would want to go as far as making DoS vulns release blocking, but speak > > up if you would! (Of course there is again the local/remote distinction > > to consider there: 'all DoS vulns' would be a much tighter st

Re: Security release criterion proposal

2011-05-18 Thread Adam Jackson
On 5/18/11 11:57 AM, Adam Williamson wrote: > # There must be no known remote code execution vulnerability which could > be exploited during installation or during use of a live image shipped > with the release Seems reasonable at first glance. One anecdotal experience: FC5 (wow) shipped with an

Security release criterion proposal

2011-05-18 Thread J B
Hi, > I don't know if anyone > would want to go as far as making DoS vulns release blocking, but speak > up if you would! (Of course there is again the local/remote distinction > to consider there: 'all DoS vulns' would be a much tighter standard than > 'remote DoS vulns'). I think the "use of a

Re: Security release criterion proposal

2011-05-18 Thread Adam Williamson
On Wed, 2011-05-18 at 16:28 +, "Jóhann B. Guðmundsson" wrote: > On 05/18/2011 03:57 PM, Adam Williamson wrote: > > Feedback please! Thanks:) > > Given that we ship selinux on by default should this proposal only be > applicable to exploits/vulnerability that selinux cant catch and prevent >

Re: Security release criterion proposal

2011-05-18 Thread Bruno Wolff III
On Wed, May 18, 2011 at 08:57:17 -0700, Adam Williamson wrote: > > # There must be no known remote code execution vulnerability which could > be exploited during installation or during use of a live image shipped > with the release > > Points to consider: I think there may be some remote expl

Re: Security release criterion proposal

2011-05-18 Thread Jóhann B. Guðmundsson
On 05/18/2011 03:57 PM, Adam Williamson wrote: > Feedback please! Thanks:) Given that we ship selinux on by default should this proposal only be applicable to exploits/vulnerability that selinux cant catch and prevent which leaves us with https://admin.fedoraproject.org/mailman/listinfo/test

Re: Security release criterion proposal

2011-05-18 Thread Adam Williamson
On Wed, 2011-05-18 at 08:57 -0700, Adam Williamson wrote: > # There must be no known remote code execution vulnerability which could > be exploited during installation or during use of a live image shipped > with the release > > Points to consider: One more 'point to consider' that I forgot: for

Security release criterion proposal

2011-05-18 Thread Adam Williamson
Hey, all. The topic of whether and which security issues should block releases has come up several times before. While we haven't actually had many really serious security issues to worry about since the introduction of the current release criteria system, I think it's certainly something we should