Re: New pkg audit / vuln.xml failures (php55, unzoo)

2015-06-11 Thread Eitan Adler
On 11 June 2015 at 06:47, Matthew Seaman matt...@freebsd.org wrote:
 On 11/06/2015 09:15, Mark Linimon wrote:
 On Wed, Jun 10, 2015 at 11:45:29PM -0600, Janky Jay, III wrote:
 Hrm... Numerous inquiries regarding this and no response is somewhat
 disappointing.

 This is not an excuse, but a number of us are at BSDCan and distracted.

 There have been discussions about how to solve the larger ports security
 problem but no conclusive decision yet.  It is, however, a hot topic.

 I'd like to add that the situation with ports-secteam -- not having a
 published list of members and so forth -- has come to the attention of
 the Core team and things are in motion to improve the situation.  In the
 mean time, Xin Li has posted some useful information to freebsd-security@ --

There is also https://reviews.freebsd.org/D2761 for adding the list of
team members to the https://www.freebsd.org/administration.html page



-- 
Eitan Adler
___
freebsd-ports@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-ports
To unsubscribe, send any mail to freebsd-ports-unsubscr...@freebsd.org


Re: New pkg audit / vuln.xml failures (php55, unzoo)

2015-06-11 Thread Matthew Seaman
On 11/06/2015 09:15, Mark Linimon wrote:
 On Wed, Jun 10, 2015 at 11:45:29PM -0600, Janky Jay, III wrote:
 Hrm... Numerous inquiries regarding this and no response is somewhat
 disappointing.
 
 This is not an excuse, but a number of us are at BSDCan and distracted.
 
 There have been discussions about how to solve the larger ports security
 problem but no conclusive decision yet.  It is, however, a hot topic.

I'd like to add that the situation with ports-secteam -- not having a
published list of members and so forth -- has come to the attention of
the Core team and things are in motion to improve the situation.  In the
mean time, Xin Li has posted some useful information to freebsd-security@ --


https://lists.freebsd.org/pipermail/freebsd-security/2015-June/008458.html

Cheers,

Matthew




signature.asc
Description: OpenPGP digital signature


Re: New pkg audit / vuln.xml failures (php55, unzoo)

2015-06-11 Thread Mark Linimon
On Wed, Jun 10, 2015 at 11:45:29PM -0600, Janky Jay, III wrote:
 Hrm... Numerous inquiries regarding this and no response is somewhat
 disappointing.

This is not an excuse, but a number of us are at BSDCan and distracted.

There have been discussions about how to solve the larger ports security
problem but no conclusive decision yet.  It is, however, a hot topic.

mcl
___
freebsd-ports@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-ports
To unsubscribe, send any mail to freebsd-ports-unsubscr...@freebsd.org


Re: New pkg audit / vuln.xml failures (php55, unzoo)

2015-06-10 Thread Janky Jay, III

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hrm... Numerous inquiries regarding this and no response is somewhat
disappointing. If anyone gets any feedback from anywhere else, please
update the rest of us (BSDCan contacts/update included... I can't make
it... :( )

Regards,
Janky Jay, III

On 06/08/2015 09:34 PM, Mark Felder wrote:


 On Mon, Jun 8, 2015, at 15:55, Roger Marquis wrote:
 On Fri, May 29, 2015 at 5:15 PM, Robert Simmons
rsimmo...@gmail.com wrote:
 Crickets.

 May I ask again:

 How do we find out who the members of the Ports Secteam are?

 How do we join the team?

 Anyone?


 I really hope this can be resolved face-to-face at BSDCan...
 ___
 freebsd-ports@freebsd.org mailing list
 http://lists.freebsd.org/mailman/listinfo/freebsd-ports
 To unsubscribe, send any mail to freebsd-ports-unsubscr...@freebsd.org

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iEYEARECAAYFAlV5IHUACgkQGK3MsUbJZn5JGACbBzSKVHZJDukPpnyEOIh8/WZD
aIMAoII9Q0V7iS1gDME1okX3BL864Qb7
=tVRd
-END PGP SIGNATURE-

___
freebsd-ports@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-ports
To unsubscribe, send any mail to freebsd-ports-unsubscr...@freebsd.org


Re: New pkg audit / vuln.xml failures (php55, unzoo)

2015-06-08 Thread Roger Marquis
 On Fri, May 29, 2015 at 5:15 PM, Robert Simmons rsimmo...@gmail.com wrote:
 Crickets.

 May I ask again:

 How do we find out who the members of the Ports Secteam are?

 How do we join the team?

Anyone?


 On Thu, May 28, 2015 at 12:47 PM, Bryan Drewery bdrew...@freebsd.org
 wrote:
 I think the VUXML database needs to be simpler to contribute to. Only a
 handful of committers feel comfortable touching the file. We have also
 had the wrong pervasive mentality by committers and users that the vuxml
 database should only have an entry if there is a committed fix. This is
 totally wrong. These CVE are _already public_ in all of these cases.
 Users deserve to know that there is a known issue with a package they
 have installed. I can understand how the mentality grew to what it is
 with some people, but the fact that there is not an update doesn't
 change that the user's system is insecure and needs to be dealt with. If
 the tool can't reliably report issues then it is not worth trusting.
 TL;DR; the file needs to be simpler. I know there is an effort to use
 CPE but I'm not too familiar with where it is going.

 As for maintainers tracking upstream mailing lists, this is hard. I'm
 subscribed to a lot of lists and can't keep up with all of the traffic.

 The RedHat security team and reporting is very impressive. Don't forget
 that they are a funded company though. Perhaps the FreeBSD Foundation
 needs to fund a fulltime security officer that is devoted to both Ports
 and Src. Just the Ports piece is easily a fulltime job.

 It seems from this thread that we have a group of people who are
 passionate enough about fixing this problem.

 How do we find out who the members of the Ports Secteam are? Once we
 know that, I'd say that at least some of the people on this thread are
 willing to join the Ports Secteam (myself included). How do we join
 the team?

 Once the team has new and energized members, I would envision the team
 then working through the problems that have been outlined in this
 thread and putting together a plan for fixing them.


___
freebsd-ports@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-ports
To unsubscribe, send any mail to freebsd-ports-unsubscr...@freebsd.org


Re: New pkg audit / vuln.xml failures (php55, unzoo)

2015-06-08 Thread Mark Felder


On Mon, Jun 8, 2015, at 15:55, Roger Marquis wrote:
  On Fri, May 29, 2015 at 5:15 PM, Robert Simmons rsimmo...@gmail.com wrote:
  Crickets.
 
  May I ask again:
 
  How do we find out who the members of the Ports Secteam are?
 
  How do we join the team?
 
 Anyone?
 

I really hope this can be resolved face-to-face at BSDCan...
___
freebsd-ports@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-ports
To unsubscribe, send any mail to freebsd-ports-unsubscr...@freebsd.org


Re: New pkg audit / vuln.xml failures (php55, unzoo)

2015-06-02 Thread Robert Simmons
On Fri, May 29, 2015 at 5:15 PM, Robert Simmons rsimmo...@gmail.com wrote:
 On Thu, May 28, 2015 at 12:47 PM, Bryan Drewery bdrew...@freebsd.org wrote:
 I think the VUXML database needs to be simpler to contribute to. Only a
 handful of committers feel comfortable touching the file. We have also
 had the wrong pervasive mentality by committers and users that the vuxml
 database should only have an entry if there is a committed fix. This is
 totally wrong. These CVE are _already public_ in all of these cases.
 Users deserve to know that there is a known issue with a package they
 have installed. I can understand how the mentality grew to what it is
 with some people, but the fact that there is not an update doesn't
 change that the user's system is insecure and needs to be dealt with. If
 the tool can't reliably report issues then it is not worth trusting.
 TL;DR; the file needs to be simpler. I know there is an effort to use
 CPE but I'm not too familiar with where it is going.

 As for maintainers tracking upstream mailing lists, this is hard. I'm
 subscribed to a lot of lists and can't keep up with all of the traffic.

 The RedHat security team and reporting is very impressive. Don't forget
 that they are a funded company though. Perhaps the FreeBSD Foundation
 needs to fund a fulltime security officer that is devoted to both Ports
 and Src. Just the Ports piece is easily a fulltime job.

 It seems from this thread that we have a group of people who are
 passionate enough about fixing this problem.

 How do we find out who the members of the Ports Secteam are? Once we
 know that, I'd say that at least some of the people on this thread are
 willing to join the Ports Secteam (myself included). How do we join
 the team?

 Once the team has new and energized members, I would envision the team
 then working through the problems that have been outlined in this
 thread and putting together a plan for fixing them.

Crickets.

May I ask again:

How do we find out who the members of the Ports Secteam are?

How do we join the team?
___
freebsd-ports@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-ports
To unsubscribe, send any mail to freebsd-ports-unsubscr...@freebsd.org


Re: New pkg audit / vuln.xml failures (php55, unzoo)

2015-05-29 Thread Don Lewis
On 29 May, Robert Simmons wrote:
 On Thu, May 28, 2015 at 12:47 PM, Bryan Drewery bdrew...@freebsd.org wrote:
 I think the VUXML database needs to be simpler to contribute to. Only a
 handful of committers feel comfortable touching the file. We have also
 had the wrong pervasive mentality by committers and users that the vuxml
 database should only have an entry if there is a committed fix. This is
 totally wrong. These CVE are _already public_ in all of these cases.
 Users deserve to know that there is a known issue with a package they
 have installed. I can understand how the mentality grew to what it is
 with some people, but the fact that there is not an update doesn't
 change that the user's system is insecure and needs to be dealt with. If
 the tool can't reliably report issues then it is not worth trusting.
 TL;DR; the file needs to be simpler. I know there is an effort to use
 CPE but I'm not too familiar with where it is going.

 As for maintainers tracking upstream mailing lists, this is hard. I'm
 subscribed to a lot of lists and can't keep up with all of the traffic.

 The RedHat security team and reporting is very impressive. Don't forget
 that they are a funded company though. Perhaps the FreeBSD Foundation
 needs to fund a fulltime security officer that is devoted to both Ports
 and Src. Just the Ports piece is easily a fulltime job.
 
 It seems from this thread that we have a group of people who are
 passionate enough about fixing this problem.
 
 How do we find out who the members of the Ports Secteam are? Once we
 know that, I'd say that at least some of the people on this thread are
 willing to join the Ports Secteam (myself included). How do we join
 the team?

Ports Secteam really should be documented here:
https://www.freebsd.org/administration.html, but it is not.

___
freebsd-ports@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-ports
To unsubscribe, send any mail to freebsd-ports-unsubscr...@freebsd.org


Re: New pkg audit / vuln.xml failures (php55, unzoo)

2015-05-29 Thread Sevan / Venture37
On 28 May 2015 at 17:47, Bryan Drewery bdrew...@freebsd.org wrote:
 I think the VUXML database needs to be simpler to contribute to. Only a
 handful of committers feel comfortable touching the file. We have also
 had the wrong pervasive mentality by committers and users that the vuxml
 database should only have an entry if there is a committed fix. This is
 totally wrong. These CVE are _already public_ in all of these cases.
 Users deserve to know that there is a known issue with a package they
 have installed. I can understand how the mentality grew to what it is
 with some people, but the fact that there is not an update doesn't
 change that the user's system is insecure and needs to be dealt with. If
 the tool can't reliably report issues then it is not worth trusting.
 TL;DR; the file needs to be simpler. I know there is an effort to use
 CPE but I'm not too familiar with where it is going.

May a I suggest a more pragmatic format of package+version, type of
issue, url for further info.

 The RedHat security team and reporting is very impressive. Don't forget
 that they are a funded company though. Perhaps the FreeBSD Foundation
 needs to fund a fulltime security officer that is devoted to both Ports
 and Src. Just the Ports piece is easily a fulltime job.

There seems to be a lot of eyes on the ports-bugs@ list from the
community, a heads up about vulnerabilities via the bug tracker may
help in the meantime?


Sevan / Venture37
___
freebsd-ports@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-ports
To unsubscribe, send any mail to freebsd-ports-unsubscr...@freebsd.org


Re: New pkg audit / vuln.xml failures (php55, unzoo)

2015-05-29 Thread Robert Simmons
On Thu, May 28, 2015 at 12:47 PM, Bryan Drewery bdrew...@freebsd.org wrote:
 I think the VUXML database needs to be simpler to contribute to. Only a
 handful of committers feel comfortable touching the file. We have also
 had the wrong pervasive mentality by committers and users that the vuxml
 database should only have an entry if there is a committed fix. This is
 totally wrong. These CVE are _already public_ in all of these cases.
 Users deserve to know that there is a known issue with a package they
 have installed. I can understand how the mentality grew to what it is
 with some people, but the fact that there is not an update doesn't
 change that the user's system is insecure and needs to be dealt with. If
 the tool can't reliably report issues then it is not worth trusting.
 TL;DR; the file needs to be simpler. I know there is an effort to use
 CPE but I'm not too familiar with where it is going.

 As for maintainers tracking upstream mailing lists, this is hard. I'm
 subscribed to a lot of lists and can't keep up with all of the traffic.

 The RedHat security team and reporting is very impressive. Don't forget
 that they are a funded company though. Perhaps the FreeBSD Foundation
 needs to fund a fulltime security officer that is devoted to both Ports
 and Src. Just the Ports piece is easily a fulltime job.

It seems from this thread that we have a group of people who are
passionate enough about fixing this problem.

How do we find out who the members of the Ports Secteam are? Once we
know that, I'd say that at least some of the people on this thread are
willing to join the Ports Secteam (myself included). How do we join
the team?

Once the team has new and energized members, I would envision the team
then working through the problems that have been outlined in this
thread and putting together a plan for fixing them.
___
freebsd-ports@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-ports
To unsubscribe, send any mail to freebsd-ports-unsubscr...@freebsd.org


Re: New pkg audit / vuln.xml failures (php55, unzoo)

2015-05-28 Thread Janky Jay, III

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


On 05/28/2015 11:31 AM, Mark Felder wrote:


 On Thu, May 28, 2015, at 11:47, Bryan Drewery wrote:

 Personally I agree on all points. Our ports security regime is not
 working.

 I already communicated further with Roger off-list, but would like to
 point out that I *do* think there is a problem, but I don't think it's
 the sky is falling / don't use FreeBSD yet. This is a solvable problem
 that simply requires some defined processes and
 participation/organization.

 It seems like we're talking to ourselves here, so do we need to hijack
 the ports-secteam@ alias and start figuring things out ourselves?


It appears no one has been able to join the ports-secteam@ list, but if
there is way for me to contribute in any way, I'd certainly like to be
on the list as well. If anyone knows of a way to join this list, please
let me know.

Regards,
Janky Jay, III
-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iEYEARECAAYFAlVniZsACgkQGK3MsUbJZn78mQCfYA9HqU8/94CqMfle8wbKdAdS
syQAnjp+Hptkc8hsfbh4bWzFEJpI2Zi7
=dvQG
-END PGP SIGNATURE-

___
freebsd-ports@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-ports
To unsubscribe, send any mail to freebsd-ports-unsubscr...@freebsd.org


Re: New pkg audit / vuln.xml failures (php55, unzoo)

2015-05-28 Thread Bryan Drewery
On 5/28/2015 12:16 PM, Mark Felder wrote:
 
 
 On Thu, May 28, 2015, at 11:47, Bryan Drewery wrote:

 I think the VUXML database needs to be simpler to contribute to. Only a
 handful of committers feel comfortable touching the file.
 
 We could use a very friendly user-facing form that they can fill out to
 create a valid vuxml entry. And then the entry could create a github
 pull request. It would be very easy then to accept or reject the
 request, and accepted requests could be auto-committed to the ports tree
 or wherever it needs to go so pkgaudit can pull it.
 
 This would be leaps and bounds better than what we have. It would
 simplify the process and permit crowdsourcing CVE reporting. 
 
 Everybody wins.
 

swills@ wrote up something a few years ago for an html form.

-- 
Regards,
Bryan Drewery



signature.asc
Description: OpenPGP digital signature


Re: New pkg audit / vuln.xml failures (php55, unzoo)

2015-05-28 Thread Mark Felder


On Thu, May 28, 2015, at 11:57, Bryan Drewery wrote:
 On 5/28/2015 11:47 AM, Bryan Drewery wrote:
  On 5/27/2015 12:40 PM, Roger Marquis wrote:
 ...
 
  This php one came up in the week and I almost
  just fixed it, but doing those things burns me out as I have my own
  priorities.
 
 Once of which is maintaining the package builders for FreeBSD.org. On
 the topic of security we used to only provide packages weekly, but have
 recently stepped up to almost-daily. I have been meaning to get a
 general announcement out about this.
 

This is great news! I knew this was on the radar, but didn't know it was
happening yet. 

Thank you for your hard work!!!
___
freebsd-ports@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-ports
To unsubscribe, send any mail to freebsd-ports-unsubscr...@freebsd.org


Re: New pkg audit / vuln.xml failures (php55, unzoo)

2015-05-28 Thread Mark Felder


On Thu, May 28, 2015, at 11:47, Bryan Drewery wrote:
 
 Personally I agree on all points. Our ports security regime is not
 working. 

I already communicated further with Roger off-list, but would like to
point out that I *do* think there is a problem, but I don't think it's
the sky is falling / don't use FreeBSD yet. This is a solvable problem
that simply requires some defined processes and
participation/organization. 

It seems like we're talking to ourselves here, so do we need to hijack
the ports-secteam@ alias and start figuring things out ourselves?
___
freebsd-ports@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-ports
To unsubscribe, send any mail to freebsd-ports-unsubscr...@freebsd.org


Re: New pkg audit / vuln.xml failures (php55, unzoo)

2015-05-28 Thread Mark Felder


On Thu, May 28, 2015, at 11:47, Bryan Drewery wrote:
 
 I think the VUXML database needs to be simpler to contribute to. Only a
 handful of committers feel comfortable touching the file.

We could use a very friendly user-facing form that they can fill out to
create a valid vuxml entry. And then the entry could create a github
pull request. It would be very easy then to accept or reject the
request, and accepted requests could be auto-committed to the ports tree
or wherever it needs to go so pkgaudit can pull it.

This would be leaps and bounds better than what we have. It would
simplify the process and permit crowdsourcing CVE reporting. 

Everybody wins.
___
freebsd-ports@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-ports
To unsubscribe, send any mail to freebsd-ports-unsubscr...@freebsd.org


Re: New pkg audit / vuln.xml failures (php55, unzoo)

2015-05-28 Thread Bryan Drewery
On 5/27/2015 12:40 PM, Roger Marquis wrote:
 If you find a vulnerability such as a new CVE or mailing list
 announcement please send it to the port maintainer and
 ports-sect...@freebsd.org as quickly as possible.  They are whoefully
 understaffed and need our help.
 Mark Felder wrote:
 Who is ports-secteam?
 
 It was Xin Li who alerted me to the ports-sect...@freebsd.org address
 i.e., as being distinct from the FreeBSD Security Team
 (sect...@freebsd.org) address noted on
 https://www.freebsd.org/security/.
 
 There has been no Call For Help that I've ever seen. If people are needed
 to process these CVEs so they are entered into VUXML, sign me up to
 ports-secteam please.
 
 I believe that is part of the problem, or the multiple problems, that
 lead me to believe that FreeBSD is operating without the active
 involvement of a security officer.  Specifically:
 
  * port vulnerability alerts sent to secteam@, as indicated on the
  /security/ page, are neither forwarded to ports-secteam@ for review nor
  returned to the sender with a note regarding the correct destination
  address,
 
  * the freebsd.org/security web page is not correct and not being
  updated,
 
  * aside from Xin nobody from either ports-secteam@ or secteam@ much
  less security-officer@ seems to be reading or participating in the
  security@ mailing list,
 
  * nobody @freebsd.org appears to be following CVE announcements and the
  maintainers of several high profile ports are also not following it or
  even their application's -announce list,
 
  * there appears to be no automated process to alert vuln.xml maintainers
  (ports-secteam@) of potential new port vulnerabilities,
 
  * offers of help to secteam@ and ports-secteam@ are neither replied to
  nor acted upon (except for Xin Li's request, thanks Xin!),
 
  * perhaps as a result the vuln.xml database is no longer reliable, and
  by extension,
 
  * operators of FreeBSD servers (unlike Debian, Ubuntu, RedHat, Suse and
  OpenBSD server operators) have no assurance that their systems are secure.
 
 This is a MAJOR CHANGE from just a couple of years ago which calls for an
 equally major heads-up to be sent to those running FreeBSD servers and
 looking to the freebsd.org website for help securing their systems.
 
 The signifiance of these 7 bullets should not be overlooked or
 understated.  They call in to question the viability of FreeBSD itself.
 
 IMO,
 Roger Marquis

Personally I agree on all points. Our ports security regime is not
working. As someone who has personally jumped on updating ports during
security crisis, I have found it difficult to get others engaged. I
would usually implore others to just fix it and once it was not done
after a period of time I would do it. I don't have time to react to
every security incident. This php one came up in the week and I almost
just fixed it, but doing those things burns me out as I have my own
priorities. I'm not on ports-secteam, but I did ask to join last year
and had no response. The request was even about recruiting more help.

I think the VUXML database needs to be simpler to contribute to. Only a
handful of committers feel comfortable touching the file. We have also
had the wrong pervasive mentality by committers and users that the vuxml
database should only have an entry if there is a committed fix. This is
totally wrong. These CVE are _already public_ in all of these cases.
Users deserve to know that there is a known issue with a package they
have installed. I can understand how the mentality grew to what it is
with some people, but the fact that there is not an update doesn't
change that the user's system is insecure and needs to be dealt with. If
the tool can't reliably report issues then it is not worth trusting.
TL;DR; the file needs to be simpler. I know there is an effort to use
CPE but I'm not too familiar with where it is going.

As for maintainers tracking upstream mailing lists, this is hard. I'm
subscribed to a lot of lists and can't keep up with all of the traffic.

The RedHat security team and reporting is very impressive. Don't forget
that they are a funded company though. Perhaps the FreeBSD Foundation
needs to fund a fulltime security officer that is devoted to both Ports
and Src. Just the Ports piece is easily a fulltime job.

-- 
Regards,
Bryan Drewery



signature.asc
Description: OpenPGP digital signature


Re: New pkg audit / vuln.xml failures (php55, unzoo)

2015-05-28 Thread Bryan Drewery
On 5/28/2015 11:47 AM, Bryan Drewery wrote:
 On 5/27/2015 12:40 PM, Roger Marquis wrote:
...

 This php one came up in the week and I almost
 just fixed it, but doing those things burns me out as I have my own
 priorities.

Once of which is maintaining the package builders for FreeBSD.org. On
the topic of security we used to only provide packages weekly, but have
recently stepped up to almost-daily. I have been meaning to get a
general announcement out about this.

-- 
Regards,
Bryan Drewery



signature.asc
Description: OpenPGP digital signature


Re: New pkg audit / vuln.xml failures (php55, unzoo)

2015-05-27 Thread Roger Marquis

If you find a vulnerability such as a new CVE or mailing list
announcement please send it to the port maintainer and
ports-sect...@freebsd.org as quickly as possible.  They are whoefully
understaffed and need our help.

Mark Felder wrote:

Who is ports-secteam?


It was Xin Li who alerted me to the ports-sect...@freebsd.org address
i.e., as being distinct from the FreeBSD Security Team
(sect...@freebsd.org) address noted on
https://www.freebsd.org/security/.


There has been no Call For Help that I've ever seen. If people are needed
to process these CVEs so they are entered into VUXML, sign me up to
ports-secteam please.


I believe that is part of the problem, or the multiple problems, that
lead me to believe that FreeBSD is operating without the active
involvement of a security officer.  Specifically:

 * port vulnerability alerts sent to secteam@, as indicated on the
 /security/ page, are neither forwarded to ports-secteam@ for review nor
 returned to the sender with a note regarding the correct destination
 address,

 * the freebsd.org/security web page is not correct and not being
 updated,

 * aside from Xin nobody from either ports-secteam@ or secteam@ much
 less security-officer@ seems to be reading or participating in the
 security@ mailing list,

 * nobody @freebsd.org appears to be following CVE announcements and the
 maintainers of several high profile ports are also not following it or
 even their application's -announce list,

 * there appears to be no automated process to alert vuln.xml maintainers
 (ports-secteam@) of potential new port vulnerabilities,

 * offers of help to secteam@ and ports-secteam@ are neither replied to
 nor acted upon (except for Xin Li's request, thanks Xin!),

 * perhaps as a result the vuln.xml database is no longer reliable, and
 by extension,

 * operators of FreeBSD servers (unlike Debian, Ubuntu, RedHat, Suse and
 OpenBSD server operators) have no assurance that their systems are secure.

This is a MAJOR CHANGE from just a couple of years ago which calls for an
equally major heads-up to be sent to those running FreeBSD servers and
looking to the freebsd.org website for help securing their systems.

The signifiance of these 7 bullets should not be overlooked or
understated.  They call in to question the viability of FreeBSD itself.

IMO,
Roger Marquis
___
freebsd-ports@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-ports
To unsubscribe, send any mail to freebsd-ports-unsubscr...@freebsd.org


Re: New pkg audit / vuln.xml failures (php55, unzoo)

2015-05-27 Thread Mark Felder


On Wed, May 27, 2015, at 12:40, Roger Marquis wrote:
 
   * perhaps as a result the vuln.xml database is no longer reliable, and
   by extension,
 
   * operators of FreeBSD servers (unlike Debian, Ubuntu, RedHat, Suse and
   OpenBSD server operators) have no assurance that their systems are
   secure.
 

Slow down here for a second. Where's the command-line tool on RedHat or
Debian that lists only the known vulnerable packages? I don't believe
either one provides such a thing equivalent to pkgaudit out of the box.
On Yum based distros you have to yum install yum-security and then you
can run yum updateinfo list sec or yum list-sec. Considering the
number of failed attempts at backporting patches that I've seen I
wouldn't consider this my only safety blanket.

So in that case there's a tool that may solve your specific concern in a
trivial way, and that's great. But that's not the end of the story. That
command won't list vulnerabilities until they have a patch released.
Let's look at CVE-2015-0209

https://access.redhat.com/security/cve/CVE-2015-0209

Release date was March 23rd. Here's the commit:

https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=1b4a8df38fc9ab3c089ca5765075ee53ec5bd66a

Authored on February 9th, then embargoed it would seem. It was publicly
committed to git on February 25th. Redhat has a bug on this, opened
February 26th: 

https://bugzilla.redhat.com/show_bug.cgi?id=1196737

But still, it wasn't addressed until March 23rd!  That's quite a while
to have vulnerable systems that aren't patched and not showing results
in yum updateinfo list sec. At least we have the capability to update
vuxml and notify people before a patch is ready or the packages are
built and distributed to the package mirrors so they can take any
required remediation steps they require. Even so, this is just a tool to
help admins. It's the admin's responsibility to know what is on their
systems and to sign up to relevant security announcement mailing lists.
Sure, you don't want to do that for everything installed on your OS, but
at least any externally facing services you are concerned about.

And let's not forget all of the missed CVEs that get late assignments
and then finally trickle down to RH/Debian due to the fact that they
don't have a rolling-release packaging strategy. Search for posts by
Kurt Seifried on ossec mailing list if you're curious.

Additionally, utilizing CPE data as a source of known vulnerabilities is
not a perfect solution either because I've seen CVEs take weeks to hit
the database.

The grass is always greener... or is it? 

Let's just concentrate on how to improve things here and not worry about
how they're handling security issues because they have their own unique
problems to solve.
___
freebsd-ports@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-ports
To unsubscribe, send any mail to freebsd-ports-unsubscr...@freebsd.org


Re: New pkg audit / vuln.xml failures (php55, unzoo)

2015-05-27 Thread Matthew Donovan
I found the ports security reporting without issues
http://www.freebsd.org/security/reporting.html. Appears someone  should
read reporting page Instead of saying information is not correct.
On May 27, 2015 12:40 PM, Roger Marquis marq...@roble.com wrote:

 If you find a vulnerability such as a new CVE or mailing list
 announcement please send it to the port maintainer and
 ports-sect...@freebsd.org as quickly as possible.  They are whoefully
 understaffed and need our help.

 Mark Felder wrote:

 Who is ports-secteam?


 It was Xin Li who alerted me to the ports-sect...@freebsd.org address
 i.e., as being distinct from the FreeBSD Security Team
 (sect...@freebsd.org) address noted on
 https://www.freebsd.org/security/.

  There has been no Call For Help that I've ever seen. If people are needed
 to process these CVEs so they are entered into VUXML, sign me up to
 ports-secteam please.


 I believe that is part of the problem, or the multiple problems, that
 lead me to believe that FreeBSD is operating without the active
 involvement of a security officer.  Specifically:

  * port vulnerability alerts sent to secteam@, as indicated on the
  /security/ page, are neither forwarded to ports-secteam@ for review nor
  returned to the sender with a note regarding the correct destination
  address,

  * the freebsd.org/security web page is not correct and not being
  updated,

  * aside from Xin nobody from either ports-secteam@ or secteam@ much
  less security-officer@ seems to be reading or participating in the
  security@ mailing list,

  * nobody @freebsd.org appears to be following CVE announcements and the
  maintainers of several high profile ports are also not following it or
  even their application's -announce list,

  * there appears to be no automated process to alert vuln.xml maintainers
  (ports-secteam@) of potential new port vulnerabilities,

  * offers of help to secteam@ and ports-secteam@ are neither replied to
  nor acted upon (except for Xin Li's request, thanks Xin!),

  * perhaps as a result the vuln.xml database is no longer reliable, and
  by extension,

  * operators of FreeBSD servers (unlike Debian, Ubuntu, RedHat, Suse and
  OpenBSD server operators) have no assurance that their systems are secure.

 This is a MAJOR CHANGE from just a couple of years ago which calls for an
 equally major heads-up to be sent to those running FreeBSD servers and
 looking to the freebsd.org website for help securing their systems.

 The signifiance of these 7 bullets should not be overlooked or
 understated.  They call in to question the viability of FreeBSD itself.

 IMO,
 Roger Marquis
 ___
 freebsd-ports@freebsd.org mailing list
 http://lists.freebsd.org/mailman/listinfo/freebsd-ports
 To unsubscribe, send any mail to freebsd-ports-unsubscr...@freebsd.org

___
freebsd-ports@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-ports
To unsubscribe, send any mail to freebsd-ports-unsubscr...@freebsd.org


Re: New pkg audit / vuln.xml failures (php55, unzoo)

2015-05-27 Thread Roger Marquis
   * operators of FreeBSD servers (unlike Debian, Ubuntu, RedHat, Suse and
   OpenBSD server operators) have no assurance that their systems are
   secure.

 Slow down here for a second. Where's the command-line tool on RedHat or
 Debian that lists only the known vulnerable packages?

In RedHat you can create a security repo list (
grep -security /etc/apt/sources.list), install the security plugin (yum
install yum-plugin-security) and 'yum check-update --security' for the same
functionality as 'pkg audit -F'.  Debian is even more obscure (apt-get upgrade
-o Dir::Etc::SourceList=/etc/apt/security.sources.list --just-print).  FreeBSD
'pkg audit' is much cleaner but what difference does that make, really, when
you have a vulnerable package that isn't in the database?

 But that's not the end of the story. That
 command won't list vulnerabilities until they have a patch released.
 Let's look at CVE-2015-0209
 https://access.redhat.com/security/cve/CVE-2015-0209
 Release date was March 23rd.

No question there's variability in bugfix timeliness, especially for DOS-type
bugs like CVE-2015-0209.  FreeBSD ports maintainers are also able to commit
patches and version updates much more quickly than their binary-only
competitors, as noted with the php55/Makefile tweak.  In the past that's what
made FreeBSD a more secure OS to host applications on.  But that's not the
main issue this thread has been about.

The issue that really matters from a security perspective is the completeness
of the vulnerability database, vuln.xml in our case.

 The grass is always greener... or is it?

 Let's just concentrate on how to improve things here and not worry about
 how they're handling security issues because they have their own unique
 problems to solve.

I must say I am disappointed in the response to this serious and significant
issue.  My Redhat using co-workers, OTOH, are no doubt eating it up.  Problem
is I'm not the only one who has to defend their business unit's use of FreeBSD
in a corporation that has otherwise nearly standardized on Redhat (and RH
security, bash notwithstanding).

Roger


___
freebsd-ports@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-ports
To unsubscribe, send any mail to freebsd-ports-unsubscr...@freebsd.org


Re: New pkg audit / vuln.xml failures (php55, unzoo)

2015-05-27 Thread Roger Marquis
 Mark Felder wrote:
 Who is ports-secteam?

 It was Xin Li who alerted me to the ports-sect...@freebsd.org address
 i.e., as being distinct from the FreeBSD Security Team
 (sect...@freebsd.org) address noted on
 https://www.freebsd.org/security/.

Also have to thank Remko Lodder for pointing out the ports-secteam@ address.
Should also note that while the ports-secteam@ is not mentioned in
freebsd.org/security or various other places where it probably should be
(like the Types of Problem Reports page
/doc/en_US.ISO8859-1/articles/pr-guidelines/pr-types.html)
it is noted in the Port Specific FAQ /doc/
en_US.ISO8859-1/articles/pr-guidelines/pr-types.html and on the port
mainters' page /ports/ports-mgmt.html.

Roger


 There has been no Call For Help that I've ever seen. If people are needed
 to process these CVEs so they are entered into VUXML, sign me up to
 ports-secteam please.

 I believe that is part of the problem, or the multiple problems, that
 lead me to believe that FreeBSD is operating without the active
 involvement of a security officer.  Specifically:

   * port vulnerability alerts sent to secteam@, as indicated on the
   /security/ page, are neither forwarded to ports-secteam@ for review nor
   returned to the sender with a note regarding the correct destination
   address,

   * the freebsd.org/security web page is not correct and not being
   updated,

   * aside from Xin nobody from either ports-secteam@ or secteam@ much
   less security-officer@ seems to be reading or participating in the
   security@ mailing list,

   * nobody @freebsd.org appears to be following CVE announcements and the
   maintainers of several high profile ports are also not following it or
   even their application's -announce list,

   * there appears to be no automated process to alert vuln.xml maintainers
   (ports-secteam@) of potential new port vulnerabilities,

   * offers of help to secteam@ and ports-secteam@ are neither replied to
   nor acted upon (except for Xin Li's request, thanks Xin!),

   * perhaps as a result the vuln.xml database is no longer reliable, and
   by extension,

   * operators of FreeBSD servers (unlike Debian, Ubuntu, RedHat, Suse and
   OpenBSD server operators) have no assurance that their systems are secure.

 This is a MAJOR CHANGE from just a couple of years ago which calls for an
 equally major heads-up to be sent to those running FreeBSD servers and
 looking to the freebsd.org website for help securing their systems.

 The signifiance of these 7 bullets should not be overlooked or
 understated.  They call in to question the viability of FreeBSD itself.

 IMO,
 Roger Marquis



___
freebsd-ports@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-ports
To unsubscribe, send any mail to freebsd-ports-unsubscr...@freebsd.org


Re: New pkg audit / vuln.xml failures (php55, unzoo)

2015-05-26 Thread Mark Felder


On Sat, May 23, 2015, at 10:30, Roger Marquis wrote:

 If you find a vulnerability such as a new CVE or mailing list
 announcement please send it to the port maintainer and
 ports-sect...@freebsd.org as quickly as possible.  They are whoefully
 understaffed and need our help.  

Who is ports-secteam? There has been no Call For Help that I've ever
seen. If people are needed to process these CVEs so they are entered
into VUXML, sign me up to ports-secteam please.
___
freebsd-ports@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-ports
To unsubscribe, send any mail to freebsd-ports-unsubscr...@freebsd.org


Re: New pkg audit / vuln.xml failures (php55, unzoo)

2015-05-24 Thread Kevin Oberman
On Sun, May 24, 2015 at 12:53 AM, Xin Li delp...@delphij.net wrote:

 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA512

 Hi,

 On 5/23/15 09:14, Jason Unovitch wrote:
  On Sat, May 23, 2015 at 11:30 AM, Roger Marquis marq...@roble.com
  wrote:
  If you find a vulnerability such as a new CVE or mailing list
  announcement please send it to the port maintainer and
  ports-sect...@freebsd.org as quickly as possible.  They are
  whoefully understaffed and need our help.  Though freebsd.org
  indicates that security alerts should be sent to
  sect...@freebsd.org this is incorrect.  If the vulnerability is
  in a port or package send an alert to ports-secteam@ and NOT
  secteam@ as the secteam will generally not reply to your email or
  forward the alerts to ports-secteam.
 
  Roger


Can our bugzilla have a button or something similar to tag bugs with CVE
entries and adding ports-secteam to the cc list? Better would be a scan of
bug submissions for the string CVE-. (I have never looked at bugzilla
other than to use it to search or submit bugs, so have no idea if this is
feasible.)

I know that this would generate false positives, but it appears to me that
most all such could be dismissed very quickly and would be better than
having serious security issues lost in the heap of bug reports.

I know that when I opened a PR (pre-bugzilla) for a significant security
issue in a popular port (ImageMagick) a few years ago, even though I marked
it as critical, it was almost 2 weeks before the port was updated,
probably because the maintainer was just routinely updating the port as the
commit did not reference the vulnerability, at all. It was a rather gaping
hole, too. The PR was eventually closed as very stale, as it should have
been by then.
--
Kevin Oberman, Network Engineer, Retired
E-mail: rkober...@gmail.com
___
freebsd-ports@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-ports
To unsubscribe, send any mail to freebsd-ports-unsubscr...@freebsd.org


Re: New pkg audit / vuln.xml failures (php55, unzoo)

2015-05-24 Thread Xin Li
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Hi,

On 5/23/15 09:14, Jason Unovitch wrote:
 On Sat, May 23, 2015 at 11:30 AM, Roger Marquis marq...@roble.com
 wrote:
 If you find a vulnerability such as a new CVE or mailing list 
 announcement please send it to the port maintainer and 
 ports-sect...@freebsd.org as quickly as possible.  They are
 whoefully understaffed and need our help.  Though freebsd.org
 indicates that security alerts should be sent to
 sect...@freebsd.org this is incorrect.  If the vulnerability is
 in a port or package send an alert to ports-secteam@ and NOT
 secteam@ as the secteam will generally not reply to your email or
 forward the alerts to ports-secteam.
 
 Roger
 
 
 I've attempted to knock out a couple of these over the past 2
 days. There's certainly a non-trivial amount of PRs stuck in
 Bugzilla that mention security or CVE that need some care and
 attention.  Here's a few that are now ready for the taking.
 
 vuxml patch ready: emulators/virtualbox-ose --
 https://bugs.freebsd.org/200311

I've added the information to the main entry and discarded virtualbox
specific text from Oracle.  Since Xen is also affected I have applied
the fix to xen-tools; the 2015Q2 branch version is not affected as
Dom0 support is not there so I haven't merged the change there.

 databases/cassandra -- https://bugs.freebsd.org/199091

Committed, thanks!  I've assigned the PR to the maintainer for the
port update.

 databases/cassandra2 -- https://bugs.freebsd.org/200414 (refers to 
 vuxml patch in PR 199091)

I've assigned the PR to the maintainer.

We should probably mark the above two ports as FORBIDDEN and/or
DEPRECATED.

 sysutils/py-salt -- https://bugs.freebsd.org/200172

This was already done by xmj@.  This one seems serious, can the fix be
backported or should the port merged to 2015Q2 branch?

 vuxml previously done and update patch ready: net/chrony --
 https://bugs.freebsd.org/199508

The vuxml entry was committed by jbeich@ and port updated by pi@.  I
think the update should be merged to quarterly branch.

 both vuxml and update patch ready: mail/davmail --
 https://bugs.freebsd.org/198297

This was done by pi@.  I think this fix should also go to 2015Q2 branch?

Thanks everyone working on these issues and thanks for taking time
preparing the patches.

Cheers,
-BEGIN PGP SIGNATURE-
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=tvL9
-END PGP SIGNATURE-
___
freebsd-ports@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-ports
To unsubscribe, send any mail to freebsd-ports-unsubscr...@freebsd.org


Re: New pkg audit / vuln.xml failures (php55, unzoo)

2015-05-23 Thread Remko Lodder

Please send these things to ports-sect...@freebsd.org so that they
can have a look at these please.

Thanks,
Remko

 On 23 May 2015, at 17:30, Roger Marquis marq...@roble.com wrote:
 
 FYI regarding these new and significant failures of FreeBSD security
 policy and procedures.
 
 PHP55 vulnerabilities announced over a week ago
 https://www.dotdeb.org/2015/05/22/php-5-5-25-for-wheezy/) have still
 not been ported to lang/php55.  You can, however, edit the Makefile,
 increment the PORTVERSION from 5.5.24 to 5.5.25, and 'make makesum
 deinstall reinstall clean' to secure a server without waiting for the
 port to be updated.  Older versions of PHP may also have unpatched
 vulnerabilities that are not noted in the vuln.xml database.
 
 New CVEs for unzoo (and likely zoo as well) have not yet shown up in 'pkg
 audit -F' or vuln.xml.  Run 'pkg remove unzoo zoo' at your earliest
 convenience if you have these installed.
 
  HEADS-UP: anyone maintaining public-facing FreeBSD servers who is
  depending on 'pkg audit' to report whether a server is secure it should
  be noted that this method is no longer reliable.
 
 If you find a vulnerability such as a new CVE or mailing list
 announcement please send it to the port maintainer and
 ports-sect...@freebsd.org as quickly as possible.  They are whoefully
 understaffed and need our help.  Though freebsd.org indicates that
 security alerts should be sent to sect...@freebsd.org this is
 incorrect.  If the vulnerability is in a port or package send an alert to
 ports-secteam@ and NOT secteam@ as the secteam will generally not reply
 to your email or forward the alerts to ports-secteam.
 
 Roger
 
 Does anyone know what's going on with vuln.xml updates?  Over the last
 few weeks and months CVEs and application mailing lists have announced
 vulnerabilities for several ports that in some cases only showed up in
 vuln.xml after several days and in other cases are still not listed
 (despite email to the security team).
 ___
 freebsd-secur...@freebsd.org mailing list
 http://lists.freebsd.org/mailman/listinfo/freebsd-security
 To unsubscribe, send any mail to freebsd-security-unsubscr...@freebsd.org

--
/\   Best regards,  | re...@freebsd.org
\ /   Remko Lodder   | remko@EFnet
 Xhttp://www.evilcoder.org/  |
/ \   ASCII Ribbon Campaign  | Against HTML Mail and News



signature.asc
Description: Message signed with OpenPGP using GPGMail


Re: New pkg audit / vuln.xml failures (php55, unzoo)

2015-05-23 Thread Jason Unovitch
On Sat, May 23, 2015 at 11:30 AM, Roger Marquis marq...@roble.com wrote:
 If you find a vulnerability such as a new CVE or mailing list
 announcement please send it to the port maintainer and
 ports-sect...@freebsd.org as quickly as possible.  They are whoefully
 understaffed and need our help.  Though freebsd.org indicates that
 security alerts should be sent to sect...@freebsd.org this is
 incorrect.  If the vulnerability is in a port or package send an alert to
 ports-secteam@ and NOT secteam@ as the secteam will generally not reply
 to your email or forward the alerts to ports-secteam.

 Roger


I've attempted to knock out a couple of these over the past 2 days.
There's certainly a non-trivial amount of PRs stuck in Bugzilla that
mention security or CVE that need some care and attention.  Here's a
few that are now ready for the taking.

vuxml patch ready:
emulators/virtualbox-ose -- https://bugs.freebsd.org/200311
databases/cassandra -- https://bugs.freebsd.org/199091
databases/cassandra2 -- https://bugs.freebsd.org/200414 (refers to
vuxml patch in PR 199091)
sysutils/py-salt -- https://bugs.freebsd.org/200172

vuxml previously done and update patch ready:
net/chrony -- https://bugs.freebsd.org/199508

both vuxml and update patch ready:
mail/davmail -- https://bugs.freebsd.org/198297

Jason
___
freebsd-ports@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-ports
To unsubscribe, send any mail to freebsd-ports-unsubscr...@freebsd.org


Re: New pkg audit / vuln.xml failures (php55, unzoo)

2015-05-23 Thread Andreas Andersson
Is it enough to only update php55?

I could create a patch with relative easyness in that case.

2015-05-23 17:30 GMT+02:00 Roger Marquis marq...@roble.com:

 FYI regarding these new and significant failures of FreeBSD security
 policy and procedures.

 PHP55 vulnerabilities announced over a week ago
 https://www.dotdeb.org/2015/05/22/php-5-5-25-for-wheezy/) have still
 not been ported to lang/php55.  You can, however, edit the Makefile,
 increment the PORTVERSION from 5.5.24 to 5.5.25, and 'make makesum
 deinstall reinstall clean' to secure a server without waiting for the
 port to be updated.  Older versions of PHP may also have unpatched
 vulnerabilities that are not noted in the vuln.xml database.

 New CVEs for unzoo (and likely zoo as well) have not yet shown up in 'pkg
 audit -F' or vuln.xml.  Run 'pkg remove unzoo zoo' at your earliest
 convenience if you have these installed.

   HEADS-UP: anyone maintaining public-facing FreeBSD servers who is
   depending on 'pkg audit' to report whether a server is secure it should
   be noted that this method is no longer reliable.

 If you find a vulnerability such as a new CVE or mailing list
 announcement please send it to the port maintainer and
 ports-sect...@freebsd.org as quickly as possible.  They are whoefully
 understaffed and need our help.  Though freebsd.org indicates that
 security alerts should be sent to sect...@freebsd.org this is
 incorrect.  If the vulnerability is in a port or package send an alert to
 ports-secteam@ and NOT secteam@ as the secteam will generally not reply
 to your email or forward the alerts to ports-secteam.

 Roger

  Does anyone know what's going on with vuln.xml updates?  Over the last
 few weeks and months CVEs and application mailing lists have announced
 vulnerabilities for several ports that in some cases only showed up in
 vuln.xml after several days and in other cases are still not listed
 (despite email to the security team).

 ___
 freebsd-ports@freebsd.org mailing list
 http://lists.freebsd.org/mailman/listinfo/freebsd-ports
 To unsubscribe, send any mail to freebsd-ports-unsubscr...@freebsd.org

___
freebsd-ports@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-ports
To unsubscribe, send any mail to freebsd-ports-unsubscr...@freebsd.org