Hi Michael,

> Now that's not to say you may not have a point about better documentation and 
> guidance on what should go through the vulnerability reporting process and 
> what shouldn't.

Yes, this can be improved.

> Or even that this particular issue could ultimately end up being classed a 
> CVE.

It has been assigned CVE-2023-33297


/dev/fd0
floppy disk guy

Sent with Proton Mail secure email.

------- Original Message -------
On Wednesday, May 17th, 2023 at 6:14 PM, Michael Folkson 
<michaelfolk...@protonmail.com> wrote:


> Hi alicexbt
> 
> "Open source" has the word "open" in it. Pushing everything into closed, 
> private channels of communication and select groups of individuals is what 
> I've been trying to push back upon. As I said in my initial response "it 
> doesn't scale for all bug reports and investigations to go through this tiny 
> funnel" though "there are clearly examples where the process is critically 
> needed".
> 
> 
> Now that's not to say you may not have a point about better documentation and 
> guidance on what should go through the vulnerability reporting process and 
> what shouldn't. Or even that this particular issue could ultimately end up 
> being classed a CVE. But rather than merely complaining and putting "open 
> source" into quote marks perhaps suggest what class of bug reports should go 
> through the tiny funnel and what shouldn't. Unless you think everything 
> should go through the funnel in which case you are advocating for less 
> openness whilst simultaneously complaining it isn't "open source". Square 
> that circle.
> 
> 
> Thanks
> Michael
> 
> --
> Michael Folkson
> Email: michaelfolkson at protonmail.com
> GPG: A2CF5D71603C92010659818D2A75D601B23FEE0F
> 
> 
> Learn about Bitcoin: https://www.youtube.com/@portofbitcoin
> 
> 
> ------- Original Message -------
> On Tuesday, May 16th, 2023 at 23:39, alicexbt <alice...@protonmail.com> wrote:
> 
> 
> > Hi Michael,
> > 
> > A disagreement and some thoughts already shared in an email although its 
> > not clear to some "open source" devs:
> > 
> > Impact of this vulnerability:
> > 
> > - Denial of Service
> > - Stale blocks affecting mining pool revenue
> > 
> > Why it should have been reported privately to secur...@bitcoincore.org, 
> > even if initially found affecting only debug build?
> > 
> > 
> > Example: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3129
> > 
> > 
> > CVE is a different process and I am aware of it. It would be good for 
> > certain developers in the core team to reflect on their own approach to 
> > security, regardless of whether their work receives CVE recognition or not.
> > 
> > /dev/fd0
> > floppy disk guy
> > 
> > 
> > Sent with Proton Mail secure email.
> > 
> > ------- Original Message -------
> > On Friday, May 12th, 2023 at 1:14 AM, Michael Folkson 
> > <michaelfolk...@protonmail.com> wrote:
> > 
> > 
> > > Hi alicexbt
> > > 
> > > The vulnerability reporting process requires communication and resolution 
> > > via a small group of individuals [0] rather than through open 
> > > collaboration between any contributors on the repo. There are clearly 
> > > examples where the process is critically needed, the most obvious past 
> > > example being the 2018 inflation bug [1]. However, it doesn't scale for 
> > > all bug reports and investigations to go through this tiny funnel. For an 
> > > issue that isn't going to result in loss of onchain funds and doesn't 
> > > seem to present a systemic issue (e.g. network DoS attack, inflation bug) 
> > > I'm of the view that opening a public issue was appropriate in this case 
> > > especially as the issue initially assumed it was only impacting nodes 
> > > running in debug mode (not a mode a node in production is likely to be 
> > > running in).
> > > 
> > > An interesting question though and I'm certainly happy to be corrected by 
> > > those who have been investigating the issue. Some delicate trade-offs 
> > > involved including understanding and resolving the issue faster through 
> > > wider collaboration versus keeping knowledge of the issue within a 
> > > smaller group.
> > > 
> > > Thanks
> > > Michael
> > > 
> > > [0]: https://github.com/bitcoin/bitcoin/blob/master/SECURITY.md
> > > [1]: https://bitcoincore.org/en/2018/09/20/notice/
> > > 
> > > --
> > > Michael Folkson
> > > Email: michaelfolkson at protonmail.com
> > > GPG: A2CF5D71603C92010659818D2A75D601B23FEE0F
> > > 
> > > 
> > > Learn about Bitcoin: https://www.youtube.com/@portofbitcoin
> > > 
> > > 
> > > ------- Original Message -------
> > > On Tuesday, May 9th, 2023 at 03:47, alicexbt via bitcoin-dev 
> > > <bitcoin-dev@lists.linuxfoundation.org> wrote:
> > > 
> > > 
> > > > Hi Bitcoin Developers,
> > > > 
> > > > There is an open issue in bitcoin core repository which was created 
> > > > last week: https://github.com/bitcoin/bitcoin/issues/27586
> > > > 
> > > > I think this should have been reported privately as vulnerability 
> > > > instead of creating a GitHub issue even if it worked only in debug 
> > > > mode. Some users in the comments have also experienced similar issues 
> > > > without debug build used for bitcoind. I have not noticed any decline 
> > > > in the number of listening nodes on bitnodes.io in last 24 hours so I 
> > > > am assuming this is not an issue with majority of bitcoin core nodes. 
> > > > However, things could have been worse and there is nothing wrong in 
> > > > reporting something privately if there is even 1% possibility of it 
> > > > being a vulnerability. I had recently reported something to LND 
> > > > security team based on a closed issue on GitHub which eventually was 
> > > > not considered a vulnerability: 
> > > > https://github.com/lightningnetwork/lnd/issues/7449 
> > > > 
> > > > In the CPU usage issue, maybe the users can run bitcoind with bigger 
> > > > mempool or try other things shared in the issue by everyone.
> > > > 
> > > > This isn't the first time either when vulnerability was reported 
> > > > publicly: https://gist.github.com/chjj/4ff628f3a0d42823a90edf47340f0db9 
> > > > and this was even exploited on mainnet which affected some projects.
> > > > 
> > > > 
> > > > This email is just a request to consider the impact of any 
> > > > vulnerability if gets exploited could affect lot of things. Even the 
> > > > projects with no financial activity involved follow better practices.
> > > > 
> > > > /dev/fd0
> > > > floppy disk guy 
> > > > 
> > > > 
> > > > Sent with Proton Mail secure email.
_______________________________________________
bitcoin-dev mailing list
bitcoin-dev@lists.linuxfoundation.org
https://lists.linuxfoundation.org/mailman/listinfo/bitcoin-dev

Reply via email to