A few minor typo corrections in-line and one potential additional topic.

On 31/12/2021 19:06, Sam Ruby wrote:
In addition to the in-person meeting next month, we are invited to send read-ahead material and there will be a brief phone call.  Given that the call will only last 30 minutes, I presume that call will be consumed by introductions, logistics, and perhaps questions about the read-ahead material.  That call will be on Wednesday, so I would like to send any read-ahead material that we might have late morning EST on Monday.

My thoughts are to lead with a summary/bulletized version of what has been discussed recently on this list, followed by actual pointers to the original emails.  Here's a first draft... additions/corrections welcome, both to the bullet points and new posts (preferably to this list) that should be added.

Key bullet points

  * This will require collective action
      o There are things we can do, both individually and together, to
        reduce the number of vulnerabilities.
      o There are things, such as SBOMs, that can help identify what is
        affected once a vulnerability is found.
      o Much of this is moot if patches are never applied.
  * Volunteers/community/participation
      o Out contributors tend to be seasoned software professionals
        whose employers include ASF releases in their commercial products.

Out -> Our

      o Our communities are healthy, open, and transparent.
      o Companies an government agencies that want to help don't need
        money or formal contracts to do so.  Join our mailing lists,
        review our code, contribute fixes.

an - > and


One side-effect of the original log4j issue is that a lot more eyes have been focused on that code. As a result of this increased scrutiny, there have been a handful of additional security issues identified. I think we need to make clear that we view this as a good thing.

This isn't unique to log4j. We have seen it in other projects as well. Generally, the more severe the issue, the more security researchers are attracted to look at the code more closely.

This additional scrutiny on the original issue, the applied fix, the surrounding code and any similar functionality is something that only happens with open source. This is because security researchers have free access to the source and the fix and are able to go and poke around and see what else they can find. It is a lot harder (arguably impractical) to do something similar with closed source.

Mark


Background reading:

  * EO - Mark Cox - https://s.apache.org/3nctr
  * SBOM - David Nalley - https://s.apache.org/hccur
  * Applying updates - Mark Thomas - https://s.apache.org/5jqab
  * Collective action - Phil Steitz - https://s.apache.org/ljzn0
  * Volunteers - Sam Ruby - https://s.apache.org/3vkpr
  * Contributors/maintenance - Dominik Psenner - https://s.apache.org/3lrk1
  * CISA - David Nalley - https://s.apache.org/1gr1c
  * Get Involved - https://www.apache.org/foundation/getinvolved.html

- Sam Ruby


---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to