[Openstack-security] Security Note (OSSN) Process

Nathan Kinder nkinder at redhat.com
Tue Jan 14 01:39:04 UTC 2014


On 01/13/2014 04:27 PM, Grant Murphy wrote:
> 
> 
> On Mon, 2014-01-13 at 08:24 -0800, Nathan Kinder wrote:
>> Hi,
> 
> Hi Nathan, 
> 
>>
>> I have started to put together a wiki page skeleton outlining the
>> process to follow when writing a new Security Note (OSSN).  I think it's
>> far enough along to share.  Any feedback and suggestions would be
>> appreciated!  The new page is available here:
>>
>>     https://wiki.openstack.org/wiki/Security/Security_Note_Process
>>
>> There are a few things that I think need to be added or clarified:
>>
>> - Do we want to change the numbering scheme?  We've discussed using
>> something similar to the OSSA numbering scheme (YYYY-XX).  This would be
>> an improvement over what we currently use (Launchpad bug #).
>>
> 
> I have no strong opinion about a numbering system. My only concern would
> be if people get confused about the difference between an OSSA and a
> OSSN. 

My problem with the current OSSN numbering scheme is that it gives no
indication of when the OSSN was published.  For example, a newer
Launchpad bug could result in a published OSSN before an older one.  It
would be nice to be able to compare two OSSN numbers and immediately
tell which is newer.

> One thing I would like to start doing is to track OSSA & OSSN in a
> more 'computer friendly' format. For example rubysec keeps advisories in
> github in yaml format. This allows tooling to be built around ensuring
> deployments are secure, and also allows us to see trends in what we are
> getting wrong as developers.  

This is a goal of mine as well.  I did some brief investigation a while
back into CVRF, which looks like a good potential option.  This is a
discussion I'd like to bring up with the VMT to get their thoughts.

> 
> 
> 
>> - When is a CVE needed, and how is CVE filing handled?  Should we
>> consult with the VMT team and let them make the determination?
>>
> 
> The VMT process is documented here:
>  https://wiki.openstack.org/wiki/VulnerabilityManagement
> 
> Anything that is considered a vulnerability should be reported to the
> VMT. If it is deemed that a CVE is not warranted a OSSN may be issued. 

We've published OSSNs that have a CVE associated with them.  I believe
that what happened in those cases is that the issue was looked at by the
VMT and a CVE was assigned while assessing the issue.  The issues were
low priority enough that it was determined that they should be handled
as OSSNs instead of OSSAs.

> 
> 
> HTH
> 
> - Grant.

Thanks for the feedback.  It's much appreciated!

-NGK
> 
> 
>> Thanks,
>> -NGK
>>
>>
>> _______________________________________________
>> Openstack-security mailing list
>> Openstack-security at lists.openstack.org
>> http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-security
> 
> 
> 





More information about the Openstack-security mailing list