Il giorno 12/feb/2013, alle ore 09:46, Giovanni Bajo <ra...@develer.com> ha 
scritto:

> Il giorno 12/feb/2013, alle ore 08:57, Nick Coghlan <ncogh...@gmail.com> ha 
> scritto:
> 
>> On Tue, Feb 12, 2013 at 10:39 AM, Donald von Stufft
>> <donald.stu...@gmail.com> wrote:
>>> The folks on the ruby side of things who are dealing with a lot of
>>> the same problems as Python/PyPI is have put together a document
>>> containing a threat model and requirements of the system. While the
>>> terminology is obviously ruby specific the concepts all apply to us.
>>> 
>>> The document can be found here: http://goo.gl/ybFIO
>>> 
>>> Further more since both languages are trying to solve the same problem
>>> it would probably be a really good idea to join forces and hash out a system
>>> and then diverge to actually implement it instead of both languages having
>>> the same conversations in parallel.
>> 
>> Thanks for posting this Donald - I was just coming to post it myself
>> after it was initially published earlier today (Kurt grabbed me on IRC
>> yesterday and suggested I have a look once he found out I had some
>> involvement with PyPI security discussions).
>> 
>> For Giovanni and others, this is the kind of high level "so what
>> problem are we actually trying to solve?" thinking that I believe is
>> needed before we rush off to devise tactical solutions to strategic
>> problems (there *are* plenty of tactical problems that need to be
>> addressed as well, we just need to make sure we distinguish between
>> the two).
> 
> 
> I think it all depends on how you want to approach the thing. A 
> multi-language threat model discussion between two different languages, with 
> different tools, and with very far-reaching scopes like "Provide a template 
> for unknown threat response", will probably take a good part of 2013. I would 
> respect a decision to embrace such a discussion, but I don't have resources 
> to dedicate to a such large-scale effort.
> 
> On the contrary, my proposal attacks the most urgent issues, implements all 
> the low hanging fruits, and I could probably submit 100% of the required code 
> for review to the respective maintainers in 1 month from now, given an 
> overall approval of the structure (time required for review and rework 
> mandated by maintainers is beyond my reach of course). I am reasonably sure 
> that the design is sound; it might not be the *best* design in the world, and 
> any security design will always be subject to critique (as I've learnt over 
> the years), but it would bring us to a good point, very fast. In fact, I'm 
> sure we can improve it without affecting the implementation time by much, eg: 
> by having a discussion with the TUF guys. Looks like we'll have to wait a few 
> days for that, and that's OK.
> 
> I will add an initial part in my document about design goals and threat 
> model. After that, I'm not willing to write a book about it, since it's 
> already more than enough to evaluate it and accept it or discard it (or 
> evolve it). I would respect if you prefer to have to solve the discussion in 
> a multiple-months discussion; it's just that I won't be part of that. I'm 
> sure there are enough competent people willing to help though.


Hello Nick,

I've added the initial Requirements and Thread Model section to my document. 
I've also added a section "Future scenarios" at the end of the document.

I hope they complete what you were feeling was missing from the proposal.
-- 
Giovanni Bajo   ::  ra...@develer.com
Develer S.r.l.  ::  http://www.develer.com

My Blog: http://giovanni.bajo.it






Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
Catalog-SIG mailing list
Catalog-SIG@python.org
http://mail.python.org/mailman/listinfo/catalog-sig

Reply via email to