On Mon, Jan 18, 2010 at 4:52 PM, Santiago Gala <[email protected]>wrote:
> 2010/1/18 ๏̯͡๏ Jasvir Nagra <[email protected]>: > > Hi, > > > > I have some questions regarding our procedures for responsible disclosure > of > > security bugs in Shindig. Instructions from Apache on how to disclose > > security issues in a project are given here: > > http://apache.org/security/committers.html. > > > > 1. Does Shindig have a private list of individuals who respond to > security > > issues? > > If it is not there I think we will need one after promotion to TLP. > I'm not sure if currently we are covered by the generic incubator > security, or just have no representatives in the respective security > lists. I used to be in some of the security lists due to effort in > portals.apache.org. I'm not sure anymore if I'm there. But > infrastructure should now. > > > 2. Is there a published list of past security issues so that people > > deploying Shindig can ensure their versions are patched against known > > security bugs? > > > > Anecdotally, Shindig security issues emailed to [email protected] have > > fallen through the cracks in the past. I'd like us to adopt a policy > which > > ensures that all reported vulnerabilities are eventually fixed and > disclosed > > Do you have concrete examples? The typical policy is sending email to > [email protected], where it will be dispatched to the appropriate > security lists if needed, or just forwarded to private if it is not so > sensitive.... > Just one concrete one - there was an bug with how features were tamed and exposed to cajoled gadgets. The issue was sent to [email protected]. Come to think of it now - it may have made it to shindig-private. I am mostly looking for clarification on what the procedure should be and to ensure its in working order. > > I agree that having private issue reports is a good part of it, but > omitting the use of the standard security infrastructure can have bad > consequences too, such as the security alert not propagating > eventually to all the required parties. > > I would keep external tools out of the loop, and even avoid issue > trackers for sensitive security info. A patch inlined in a text email > is usually enough. In any case, for security rreports coming from, > say, linux distributions sometimes the private issue is already there, > and we get a summary of it. > That works for me. > > > and which gives those who deploy Shindig to have a reasonable amount of > time > > to update. The documentation for JIRA suggests that it can be configured > to > > create private security issues but > > http://issues.apache.org/jira/browse/SHINDIG is not configured this way. > > For security patches under review, the codereview tool supports keeping > an > > issue private to the creator and reviewer until the patch has been > > submitted. > > > > Regards > > Jasvir > > >

