> On 11.04.2017, at 12:03, 'Bruno P. Kinoshita' via Jenkins Developers 
> <[email protected]> wrote:
> 
> Surprised to see scriptler there, wasn't expecting it given the number of 
> people using it. If there is anything I can do to help, just let me know. I 
> am a bit busy this week, but can definitely stop a couple of hours two or 
> three days this week and maybe during the upcoming holidays to help fixing 
> some issues.

Scriptler is also the one I hated most to delist. The advisory lists all the 
things currently wrong with Scriptler that we know of. Some of these I expect 
to be rather straightforward to fix. What needs some thinking is how to 
implement script execution in jobs in a way that's safe to use. Giving 
non-admins Run Scripts is not a good idea (in fact, this quirk of Scriptler is 
a major reason we threw in the changes to the auth strategies in this 
advisory), and build step configuration protection as implemented is rather 
easily circumvented, as demonstrated.

> It is not clear from your e-mail if that was a case of a problem in the 
> process used to communicate issues to plug-in maintainers, or if it was 
> caused due to the number of issues vs. number of people working on the issues.

Both.

It's not enough to just assign an issue in SECURITY to plugin maintainers -- 
many haven't had to deal with a privately reported security issue before, so 
the process required to prepare a fix is unusual, and we need to explain how to 
go about doing that. Then there's the problem that they may not even react, so 
I need to follow up via email, etc.

Once we have maintainers' attention, and they understand the process we'd like 
them to follow, there's the issue of implementation. Especially wrt scripting 
issues, some more advanced features may not map cleanly to sandboxing/approval. 
So these fixes took a lot more supporting effort than usual. And in cases where 
there's no maintainer, or they're not able to spend the time to fix them, 
implementation falls back to the security team.

And even once the issue is fixed, there's overhead in coordinating release of 
the fix, writing and publishing the advisory, blog, and warnings, sending 
notifications, etc.

Even just getting these ~8 plugin releases out at the same time has required 
some pretty major coordination (well, for me -- maybe I just suck at this). 
Luckily for me, ikedam, Ulli Hafner, and Daniel Spilker were absolutely amazing 
to work with, and also handled fixing their plugins very well. (And the rest of 
the releases were performed by members of the security team, and they of course 
also know what they're doing!)

> Do we need to increase the number of people in the security team

We're always looking for more volunteers! Membership is open to most active 
contributors. Prerequisites and process at https://jenkins.io/security/#team

-- 
You received this message because you are subscribed to the Google Groups 
"Jenkins Developers" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/d/msgid/jenkinsci-dev/6EA3819C-6BB0-4FB6-898F-DB09549F61B2%40beckweb.net.
For more options, visit https://groups.google.com/d/optout.

Reply via email to