Re: access policy for Java Open Review Project

2006-12-26 Thread Brian Chess
Hi there, I didn't see any replies to my question about what to do with
outside auditors for the Java Open Revew Project. Our default position is
that we do not allow access to outsiders without permission from the code
maintainers, so unless I hear otherwise, we won't grant access to outsiders
for Lucene projects.  That's a fine policy as far as I'm concerned.  I just
wanted to let people know where we stand.

Meanwhile, we're moving closer to performing regular analysis of the code.
On Friday we uploaded our second pass at Lucene.  I only took a quick glance
through the results, but this one caught my eye:

Lucli.java line 286:
name.toLowerCase(); //treat uppercase and lower case commands the same

I'm pretty sure that line should be:
name = name.toLowerCase();

I'll send another note when we've switched over to a regular recurring
analysis.

Happy holidays,
Brian


 From: Brian Chess [EMAIL PROTECTED]
 Date: Mon, 18 Dec 2006 21:16:06 -0800
 To: java-dev@lucene.apache.org
 Conversation: access policy for Java Open Review Project
 Subject: access policy for Java Open Review Project
 
 Hi all, I've been busy creating JOR accounts this weekend, and it was cool to
 see so many names from Lucene.  Lucene, Solr, and Nutch have the lowest defect
 rates among the projects we've looked at, and I'm beginning to see why.
 
 One of the things JOR is doing is inviting people to come and help review
 issues we find with static analysis.  We've had a fair number of signups
 since the project was on slashdot.
 
 My question is, would you like to allow outsiders to go through results and
 help sort the real bugs from the chaff?  The upside is that volunteers may
 perform useful work and that it may be another avenue to get people involved
 with the code.  The down side is that things like XSS in admin pages may lead
 them to make more ruckus than is really appropriate.
 
 The situation may change if we can establish a mechanism for efficiently
 moving issues into Jira, but for now, I could imagine a number of different
 policies, including:
   - Allow anyone access who asks for it.
   - Allow access on a case-by-case basis.
   - Don't allow access to outsiders.
 
 Here are the outsiders who've requested access so far, along with a few
 words to summarize what they've told me about themselves.
 
 Lucene
 --
 Varun Nair [EMAIL PROTECTED]: budding code auditor at TCS
 Martin Englund [EMAIL PROTECTED]: Experienced auditor at Sun
 [EMAIL PROTECTED]: Looks like he's just testing the waters
 
 Lucene, Nutch, Solr
 --
 Thierry De Leeuw [EMAIL PROTECTED]: experienced vulnerability hunter
 Michael Bunzel [EMAIL PROTECTED]: experienced auditor, but new to
 auditing Java
 
 Thoughts?
 Brian


-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



access policy for Java Open Review Project

2006-12-18 Thread Brian Chess
Hi all, I've been busy creating JOR accounts this weekend, and it was cool
to see so many names from Lucene.  Lucene, Solr, and Nutch have the lowest
defect rates among the projects we've looked at, and I'm beginning to see
why.

One of the things JOR is doing is inviting people to come and help review
issues we find with static analysis.  We've had a fair number of signups
since the project was on slashdot.

My question is, would you like to allow outsiders to go through results and
help sort the real bugs from the chaff?  The upside is that volunteers may
perform useful work and that it may be another avenue to get people involved
with the code.  The down side is that things like XSS in admin pages may
lead them to make more ruckus than is really appropriate.

The situation may change if we can establish a mechanism for efficiently
moving issues into Jira, but for now, I could imagine a number of different
policies, including:
  - Allow anyone access who asks for it.
  - Allow access on a case-by-case basis.
  - Don't allow access to outsiders.

Here are the outsiders who've requested access so far, along with a few
words to summarize what they've told me about themselves.

Lucene
--
Varun Nair [EMAIL PROTECTED]: budding code auditor at TCS
Martin Englund [EMAIL PROTECTED]: Experienced auditor at Sun
[EMAIL PROTECTED]: Looks like he's just testing the waters

Lucene, Nutch, Solr
--
Thierry De Leeuw [EMAIL PROTECTED]: experienced vulnerability hunter
Michael Bunzel [EMAIL PROTECTED]: experienced auditor, but new to
auditing Java

Thoughts?
Brian


-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: Lucene code review

2006-12-15 Thread Brian Chess
Hi Erik, thanks for the intro.  I'd be happy to set up an account for anyone
involved with the projects who'd like to take a look.  (Because we're
checking for security problems, we don't share specific findings with the
general public.)

Erik is right, from Lucene, Nutch, and Solr, the most important things we
found were the cross-site scripting bugs in Solr.  There are a few more bugs
that I think are worth looking at, but nothing to get worked up about.

Brian

 From: Erik Hatcher [EMAIL PROTECTED]
 Date: Thu, 14 Dec 2006 23:43:33 -0500
 To: java-dev@lucene.apache.org
 Cc: Brian Chess [EMAIL PROTECTED], Gary McGraw [EMAIL PROTECTED]
 Subject: Re: Lucene code review
 
 
 On Dec 13, 2006, at 1:00 AM, Otis Gospodnetic wrote:
 Just spotted this on Slashdot:  http://
 opensource.fortifysoftware.com/welcome.html
 I wonder what the 3 defects they found and reviewed are... I don't
 see a way to see them from their site.
 
 I had an early peek at the Fortify analysis of several open source
 projects, primarily Lucene, Nutch, and Solr.  Lucene and Nutch both
 had very minor cosmetic issues (don't recall off the top of my head
 what they were).  Solr had cross-site scripting issues in its JSP
 pages, which I think are now all fixed (?).
 
 Brian Chess at Fortify was instrumental in the analysis and is eager
 to work with open source communities closely to have these types of
 analyses automated and useful to the projects.  I'm sure we'll hear
 more from his organization in the near future.
 
 Erik
 


-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]