Re: [SC-L] Security in open source components

2012-10-28 Thread Grant Murphy
Hi Christian,

Thanks for the additional info I'll definitely be in touch with the
author of this project. We are currently having a bit of a rethink about
our approach so input from somebody that has tackled things from a
different angle will be really useful.

Cheers,

Grant.


On 10/28/2012 11:51 AM, Christian Heinrich wrote:
> ... and I found https://github.com/jeremylong/DependencyCheck#readme today
> (i.e. Sunday 28 October 2012) via GitHub.
> 
> On Fri, Oct 26, 2012 at 10:34 AM, Christian Heinrich <
> christian.heinr...@cmlh.id.au> wrote:
> 
>> Grant,
>>
>> ... and
>> http://www.scmagazine.com.au/News/320617,redhat-project-fights-java-vulnerabilities.aspx
>> was published yesterday (25 Oct).
>>
>> On Mon, Oct 1, 2012 at 3:19 PM, Christian Heinrich
>>  wrote:
>>> Grant,
>>>
>>> Below are the discussions related to Maven and the paper referenced:
>>> 1. http://krvw.com/pipermail/sc-l/2012/002786.html
>>> 2. http://krvw.com/pipermail/sc-l/2012/002788.html
>>>
>>> On Fri, Sep 28, 2012 at 9:10 AM, Grant Murphy 
>> wrote:
 I don't have the original mail but some time ago a thread on this list
 mentioned this article:


>> http://www.sonatype.com/Products/Why-Sonatype/Reduce-Security-Risk/Security-Brief
>>
>>
>> --
>> Regards,
>> Christian Heinrich
>>
>> http://cmlh.id.au/contact
>>
> 
> 
> 




signature.asc
Description: OpenPGP digital signature
___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
Follow KRvW Associates on Twitter at: http://twitter.com/KRvW_Associates
___


Re: [SC-L] Security in open source components

2012-10-28 Thread Christian Heinrich
... and I found https://github.com/jeremylong/DependencyCheck#readme today
(i.e. Sunday 28 October 2012) via GitHub.

On Fri, Oct 26, 2012 at 10:34 AM, Christian Heinrich <
christian.heinr...@cmlh.id.au> wrote:

> Grant,
>
> ... and
> http://www.scmagazine.com.au/News/320617,redhat-project-fights-java-vulnerabilities.aspx
> was published yesterday (25 Oct).
>
> On Mon, Oct 1, 2012 at 3:19 PM, Christian Heinrich
>  wrote:
> > Grant,
> >
> > Below are the discussions related to Maven and the paper referenced:
> > 1. http://krvw.com/pipermail/sc-l/2012/002786.html
> > 2. http://krvw.com/pipermail/sc-l/2012/002788.html
> >
> > On Fri, Sep 28, 2012 at 9:10 AM, Grant Murphy 
> wrote:
> >> I don't have the original mail but some time ago a thread on this list
> >> mentioned this article:
> >>
> >>
> http://www.sonatype.com/Products/Why-Sonatype/Reduce-Security-Risk/Security-Brief
>
>
> --
> Regards,
> Christian Heinrich
>
> http://cmlh.id.au/contact
>



-- 
Regards,
Christian Heinrich

http://cmlh.id.au/contact
___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
Follow KRvW Associates on Twitter at: http://twitter.com/KRvW_Associates
___


Re: [SC-L] Security in open source components

2012-10-26 Thread Christian Heinrich
Grant,

... and 
http://www.scmagazine.com.au/News/320617,redhat-project-fights-java-vulnerabilities.aspx
was published yesterday (25 Oct).

On Mon, Oct 1, 2012 at 3:19 PM, Christian Heinrich
 wrote:
> Grant,
>
> Below are the discussions related to Maven and the paper referenced:
> 1. http://krvw.com/pipermail/sc-l/2012/002786.html
> 2. http://krvw.com/pipermail/sc-l/2012/002788.html
>
> On Fri, Sep 28, 2012 at 9:10 AM, Grant Murphy  wrote:
>> I don't have the original mail but some time ago a thread on this list
>> mentioned this article:
>>
>> http://www.sonatype.com/Products/Why-Sonatype/Reduce-Security-Risk/Security-Brief


-- 
Regards,
Christian Heinrich

http://cmlh.id.au/contact
___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
Follow KRvW Associates on Twitter at: http://twitter.com/KRvW_Associates
___


Re: [SC-L] Security in open source components

2012-10-02 Thread Christian Heinrich
Grant,

Below are the discussions related to Maven and the paper referenced:
1. http://krvw.com/pipermail/sc-l/2012/002786.html
2. http://krvw.com/pipermail/sc-l/2012/002788.html

On Fri, Sep 28, 2012 at 9:10 AM, Grant Murphy  wrote:
> I don't have the original mail but some time ago a thread on this list
> mentioned this article:
>
> http://www.sonatype.com/Products/Why-Sonatype/Reduce-Security-Risk/Security-Brief


-- 
Regards,
Christian Heinrich

http://cmlh.id.au/contact
___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
Follow KRvW Associates on Twitter at: http://twitter.com/KRvW_Associates
___


[SC-L] Security in open source components

2012-09-28 Thread Grant Murphy
I don't have the original mail but some time ago a thread on this list
mentioned this article:

http://www.sonatype.com/Products/Why-Sonatype/Reduce-Security-Risk/Security-Brief

It might be of interest to you that the Red Hat Security Response Team
has put together a database containing fingerprints of vulnerable Maven
artifacts. We have just recently released a Maven Enforcer rule that
scans a projects dependencies against the entries in this database.

An example of the configuration options and the source code is available
here:   

  https://github.com/gcmurphy/enforce-victims-rule

Try it out. I would be interested to get your feedback.

Regards,

Grant Murphy | Red Hat Product Security Team



signature.asc
Description: OpenPGP digital signature
___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
Follow KRvW Associates on Twitter at: http://twitter.com/KRvW_Associates
___


Re: [SC-L] security in open source components

2012-05-04 Thread Jeffrey Walton
On Tue, Apr 24, 2012 at 4:22 PM, Johan Peeters  wrote:
> I was very happy to see
> http://www.sonatype.com/Products/Sonatype-Insight/Why-Insight/Reduce-Security-Risk/Security-Brief.
> Finally some attention to the elephant in the room; what is the use of
> secure coding if your software depends on third party components with
> flaws?
> ...
> How can I be sure that the binary component my build script retrieves
> from, say, Maven Central is the one released by the relevant open
> source project? I know there are checksums and such, but I remain to
> be convinced that this typically affords adequate protection or that
> it even could do so...
The problem with Maven in particular is the project stresses stability
over all others. The project is more than happy to distribute stable,
but buggy, code. How Stable vs Buggy is not muttually exclusive is an
oxymoron to me, though.

Jeff
___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
Follow KRvW Associates on Twitter at: http://twitter.com/KRvW_Associates
___


Re: [SC-L] security in open source components

2012-05-04 Thread Christian Heinrich
Johan,

Since each git commit is SHA-1 and is popular with open source
projects then it would be possible incorporate them as a "submodule"
as part of your larger superproject within git but it does have some
limitations outlined within
http://stackoverflow.com/questions/996164/is-anyone-really-using-git-super-subprojects

Let me know if this addresses your concern or if I am way off?

On Wed, Apr 25, 2012 at 6:22 AM, Johan Peeters  wrote:
> These points are important. However, I am also concerned about
> component distribution.
> How can I be sure that the binary component my build script retrieves
> from, say, Maven Central is the one released by the relevant open
> source project? I know there are checksums and such, but I remain to
> be convinced that this typically affords adequate protection or that
> it even could do so. If my fears are well-founded, current
> distribution mechanisms of open source components provide the ideal
> opportunity for installing back-doors on the server side.
> I hope I am just being paranoid and the authors neglected to talk
> about distribution because it is obviously secure. I certainly would
> have been happier if distribution had been analysed and found secure,
> or, even, not terribly insecure.
> Does anyone else share these concerns? Or can anyone allay my fears?


-- 
Regards,
Christian Heinrich

http://cmlh.id.au/contact
___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
Follow KRvW Associates on Twitter at: http://twitter.com/KRvW_Associates
___


[SC-L] security in open source components

2012-04-25 Thread Johan Peeters
I was very happy to see
http://www.sonatype.com/Products/Sonatype-Insight/Why-Insight/Reduce-Security-Risk/Security-Brief.
Finally some attention to the elephant in the room; what is the use of
secure coding if your software depends on third party components with
flaws?
The paper makes some very good points on the general lack of
governance for open source components. It mainly focuses on the lack
of visibility and control of project dependencies. I.e. what does a
build pull in? Are these trustworthy components? Does the build select
component versions with flaws? Is any attention paid to security
advisories and dependencies updated to versions with the flaws fixed?
These points are important. However, I am also concerned about
component distribution.
How can I be sure that the binary component my build script retrieves
from, say, Maven Central is the one released by the relevant open
source project? I know there are checksums and such, but I remain to
be convinced that this typically affords adequate protection or that
it even could do so. If my fears are well-founded, current
distribution mechanisms of open source components provide the ideal
opportunity for installing back-doors on the server side.
I hope I am just being paranoid and the authors neglected to talk
about distribution because it is obviously secure. I certainly would
have been happier if distribution had been analysed and found secure,
or, even, not terribly insecure.
Does anyone else share these concerns? Or can anyone allay my fears?

kr,

Yo
-- 
Johan Peeters
http://johanpeeters.com
___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
Follow KRvW Associates on Twitter at: http://twitter.com/KRvW_Associates
___