-
-
Notifications
You must be signed in to change notification settings - Fork 14.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Get representatives for NixOS assigned to the OSS-Security "distros" mailing list #14819
Comments
Great idea! I'd love to do at least part of it. I have a strong background in security and would set aside some time to do the NixOS work needed for this. How many representatives can we get involved? |
I have little background in security (coursera Crypto), but I'd also like to help on this front. I think we should start by having a team/herd that cares about security and make a roadmap for each NixOS release what to focus on. |
I asked for more details on IRC (#oss-security on freenode):
|
/participate |
The purpose of that mailing list is to coordinate important security updates behind-the-scenes, i.e. serious vulnerabilities are disclosed to the members of that list before the general public learns about them. This gives distributors a head start of, say, 2 weeks until the publication of the CVE so that they have a chance to prepare package updates ahead of time and to release them to their users at the same time as the CVE is published, thereby minimizing the window of exposure of their users. Since the members of that list have access to extremely sensitive material, representatives we suggest should be reliable, long-term contributors of the project who are well connected within the NixOS community. Furthermore, these representatives must have the ability to prepare package updates secretly. For example, suppose a serious vulnerability is discovered in Obviously, that procedure can be re-fined a lot, still, but the point I am trying to make is that our representatives need the ability to mess with This means, IMHO, that our representative pretty much have to be @edolstra and @rbvermaa, because no-one else has the necessary privileges and technical skills to pull off the necessary updates. |
@peti I buy your point today, but I'd like to move away from centralizing further on @edolstra and @rbvermaa. With @nbp's upcoming changes, security fixes don't necessarily need to rebuild the world, so the special tie-ins with Hydra become less necessary. Furthermore, this project is already buckling under the weight of our dependency on Eelco and Rob, and adding more seems like the wrong direction. If anything, I'd like to figure out ways to make access to Hydra less magical while still retaining the nice trust properties we have today. |
Here's more that could simplify our decisions a bit:
|
It would be best if hydra supported jobs invisible to most users. A simpler option would be to create another parallel instance, running on the same HW, but only accessible to the selected individual(s) (and in effect also to anyone with SSH access to those machines). |
I suppose there will always be that information leak when build farm puts unusually little resources to the visible jobs, but I think that's perfectly acceptable, as it's even common to pre-announce security updates. |
I totally agree, some well acknowledged, trust-able, and available community member should apply there. On the other hand, I think this might be a bit premature to do that if we have no way to ship these security updates in a timely manner. (#10851 and the long tail of static analysis reports to fix) |
@peti, do we have any idea of the volume of CVE that these persons would have to handle? |
According to sarnold,there is very little traffic on the mailing list. |
If one is given a week of heads up, even a full rebuild is feasible on our Hydra... What is very little traffic? About a pair of threads with several e-mails in a month? |
Not sure. I asked, but haven't received a reply yet. I would suspect no more than what you said. I believe it might also be helpful to have a team for following oss-security in general and make sure we handle those in a timely manner as well. |
Update: "it's kind of hard to quantify; there's 208 mails in the last year, over what feels like less than a dozen "actionable" things, a handful of CVE assignments." |
OK, I believe I could handle the distros list and the related agenda without any money for it, especially if paired with someone else. I currently can't claim that about the oss-security list. (But note that I'm rather cheap ;-) |
@nbp, the volume on distros is small and the vulnerability reports usually come with ready-to-apply fixes attached. If we'd care only about IMHO, the biggest problem is how to prepare binary packages to release on the CRD without revealing any details about the update beforehand. |
Note, this mailing list does not change the fact that we would have to handle 0-days, without any rebuild. So I do not see why we should enforce rebuilds when we have the option to not do that, as this also involve bandwidth that not all users can spare on a daily bases. |
@nbp I'm treating it as a given that we'll merge your PR. I see this ticket more about organizational issues. |
Yes, I consider that rebuild-reducing work orthogonal to this discussion. |
What is the next step in resolving this issue? I'd hate to see this fall by the way side. |
I think now we "only" need to find who would be on that list; two seems the best number. As I wrote, I can be one if there's lack of interest from others. |
@nbp We can push out Regarding our representatives, how about @copumpkin and @domenkozar? (It wasn't clear to me if @peti was volunteering himself.) |
@edolstra, I didn't mean to nominate myself. I just felt like pointing out work that I'd like other people to do. :-) |
For more information on the last addition to the linux-distros list, I dug up this old thread from when Amazon got a representative added. It might help clarify the sorts of things they look for in a distro and representative: |
In short, what they appear to be looking for:
These all seem like reasonable things to look for. Perhaps we should put together a NixOS security mailing list for those of us who are interested, so we can further discuss the various finer points around this stuff? Or I guess we could do it all on GitHub, but it might get unwieldy to notify all interested parties. |
Heh, that list's not easy to fulfill. |
Also relevant: #13515 |
In my opinion, the community members who volunteer to represent NixOS on the distros mailing list should take matters into their own hands and initiate some kind of "poll for support" via nix-dev to legitimize their claim. Once a significant number of Nix'er has expressed their support for the candidates, our representatives should get in touch with distros and try to make things happen. As it is now, nobody feels responsible for achieving this goal, which means that we won't. That would be a shame. |
I like how Ubuntu notifies it's users. They have a mailing list and webpages with the same informations, for example http://www.ubuntu.com/usn/usn-3089-1/ That is great to give your team leader a link to inform him about a serious update. A RSS feed on the NixOS homepage would also be great. Thanks for taking the initiative. I really appreciate it as a user! |
CoreOS is trying to get on the distro list. Here are some requirements they've noted on the ML:
|
So a private hydra is required? |
Has there been made progress on that front? |
FTR: We discussed this issue during the Hackday @ NixCon 2018 and decided that it is not about time to apply for oss-security now. We are currently not in a position to produce evidence in all required aspects. I'd personally recommend to work hard towards meeting the criteria and reconsider the issue then. Perhaps this issue can be closed and we will open a new when it is really actionable. |
Yeah, let's close this issue as it's not actionable right now. We need to take other, smaller steps first before we can tackle this one. |
As far as I can see this is not done. This also seems to be more relevant today, after 6 years of this issue being closed. Please reopen |
NixOS should have representatives subscribed to the "distros" mailing list at http://oss-security.openwall.org/wiki/mailing-lists/distros so that we are informed about embargoed security issues and have a chance to provide our users with fast updates on the coordinated release date.
The text was updated successfully, but these errors were encountered: