[ https://issues.apache.org/jira/browse/VCL-1121?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16852383#comment-16852383 ]
Mike Jennings commented on VCL-1121: ------------------------------------ I have added in the cpan mirrors and created a pull request with the change. > Review all non-HTTPS dependency URLs > ------------------------------------ > > Key: VCL-1121 > URL: https://issues.apache.org/jira/browse/VCL-1121 > Project: VCL > Issue Type: Task > Components: database, vcld (backend), web gui (frontend) > Affects Versions: 2.5 > Reporter: Andy Kurth > Priority: Major > > See the email sent by the Apache Security Team below. We need to review all > non-HTTPS URLs used in various places. > One location I know has non-HTTPS URLs is > *managementnode/bin/install_perl_libs.pl*. It references an EPEL > *_mirrorlist_* and a CPAN *_urllist_* by http. I could imagine how these > could be used in a MITM attack. I'm not sure if an HTTPS alternative exists > for these and don't know if these can be changed. The email only says to > "_fix them asap_", but gives no guidance for things that don't have an > alternative. > *install_perl_libs.pl* is only provided as an example. We need to do an > exhaustive check and are required to report back by May 31, 2019. > {noformat} > Created at: Tue, May 21, 2019 at 7:29 AM (Delivered after 53 seconds) > From: Apache Security Team <[secur...@apache.org> > Subject: PRIORITY Action required: Security review for non-https dependency > urls > ASF Security received a report that a number of Apache projects have > build dependencies downloaded using insecure urls. The reporter states > this could be used in conjunction with a man-in-the-middle attack to > compromise project builds. The reporter claims this a significant > issue and will be making an announcement on June 10th and a number of > press releases and industry reaction is expected. > We have already contacted each of the projects the reporter detected. > However we have not run any scanning ourselves to identify any other > instances hence this email. > We request that you review any build scripts and configurations for > insecure urls where appropriate to your projects, fix them asap, and > report back if you had to change anything to secur...@apache.org by > the 31st May 2019. > The most common finding was HTTP references to repos like maven.org in > build files (Gradle, Maven, SBT, or other tools). Here is an example > showing repositories being used with http urls that should be changed > to https: > https://github.com/apache/flink/blob/d1542e9561c6235feb902c9c6d781ba416b8f784/pom.xml#L1017-L1038 > Note that searching for http:// might not be enough, look for http\:// > too due to escaping. > Although this issue is public on June 10th, please make fixes to > insecure urls immediately. Also note that some repos will be moving > to blocking http transfers in June and later: > https://central.sonatype.org/articles/2019/Apr/30/http-access-to-repo1mavenorg-and-repomavenapacheorg-is-being-deprecated/ > The reporter claims that a full audit of affected projects is required > to ensure builds were not made with tampered dependencies, and that > CVE names should be given to each project, however we are not > requiring this – we believe it’s more likely a third party repo could > be compromised with a malicious build than a MITM attack. If you > disagree, let us know. Projects like Lucene do checksum whitelists of > all their build dependencies, and you may wish to consider that as a > protection against threats beyond just MITM. > Best Regards, > Mark J Cox > VP, ASF Security Team{noformat} > -- This message was sent by Atlassian JIRA (v7.6.3#76005)