Sounds good.
-Donald
Joe Bohn wrote:
Donald Woods wrote:
Sounds good. I was assuming the SNAPSHOT build in #10 would be
handled by Jarek's automated builds and we would just say "yyyymmdd or
later SNAPSHOT build" and include the URL to our published snapshot
builds.
Thanks Donald - I agree with using the automated build snapshots for the
announce.
So, is everybody OK with announcing vulnerabilities basically at the
same time we create the JIRA and check the code in (the modified steps I
listed below)?
We would not be able to reference a SNAPSHOT in the announcement until
one of our regularly scheduled builds runs ... which would imply that
the basic information on the vulnerability would be "public" in the JIRA
and code for perhaps a few hours before the official announce. Official
release(s) that contained the fix would be as soon as reasonably
possible after the announcement - probably several days or so for a new
maintenance release on a major release that is already out there. Any
new major release(s) under development would continue on the original
schedule.
Joe
-Donald
Joe Bohn wrote:
I think the key question is when we will announce the vulnerability
(current #11).
My preference would be that we create a JIRA for the issue so that it
can be included in the release notes (#9 - either with or without the
CVE referenced).
But that (along with the code check-in) creates a chicken and egg
scenario which exposes some information about the vulnerability prior
to the announce (currently step #11). I'm wondering if we should
just go ahead and announce as soon as the code is checked-in and we
have a SNAPSHOT available for download. In the announcement we could
reference any appropriate workarounds and the availability of the fix
in the latest SNAPSHOTS so that users can take appropriate action.
Updated steps might look something like this (picking up at step #8):
8. Reach an agreement for the fix, announcement and release schedule
with the submitter.
9. Create a JIRA and commit the fix in all actively maintained releases.
10. Announce the vulnerability (users, dev, secur...@a.o, bugtraq at
securityfocus.com, full-disclosure at lists.grok.org.uk and project
security pages) sighting workarounds and latest SNAPSHOT published.
11. Update the JIRA and svn log to include the CVE number.
12. Roll a release for each actively maintained branch (unreleased
trunk can wait.)
It's not optimal (would be much better to have a release in hand) but
perhaps it is an appropriate compromise given that we can't prevent
some information from going public when code is checked-in.
Joe
Kevan Miller wrote:
On Jan 19, 2009, at 12:32 PM, Donald Woods wrote:
Joe Bohn wrote:
Is the omission of any discussion of a JIRA intentional? In other
words, is it expected that a JIRA will *not* be created to
document or track the code change and that CVE will be the only
documentation of the issue (and then only after a server image has
already been released by changing the commit log)?
Good point. I believe we should create the JIRA as part of step #9.
OK. That sounds good. I'm assuming the RELEASE_NOTES will also
contain information regarding the vulnerability (including CVE, etc).
If we are not creating a JIRA, then this brings up a documentation
issue. Not announcing the issue until after a server release also
causes some doc issues.
- We typically use JIRAs to identify all changes within a release.
- We include the list of JIRAs fixed and outstanding within the
RELEASE_NOTES for each server release.
- The RELEASE_NOTES are included in the server images so that
anyone downloading a server image can easily understand what
issues are resolved or still outstanding with that release.
- So typically JIRAs must be resolved before we create a release
candidate. The entire release (including the release notes) is
then validated during the vote for the release candidate.
Security fixes are important, so it seems that they should be
mentioned in the release notes. I also understand the sensitive
nature of these issues and the possibility of exploitation.
However, it seems that the code check-in itself already has the
potential to make the exposure public for those watching carefully.
One possible solution would be to announce the vulnerability once
we have a work-around available and/or a fix available in a
SNAPSHOT image.
Agree that we need to be as open as possible. As part of step #9,
I'd like to see us add a reference to the fix (but not the complete
details) on our Security pages for each release. Step #12 would
also be updated, to go back and add the CVE number and more details
to the Security pages as each branch is released.
OK. Is it necessary to hide the CVE until 12? If so, I guess the
RELEASE_NOTES shouldn't include the CVE...
--kevan