Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20141007104342.GA6808@openwall.com>
Date: Tue, 7 Oct 2014 14:43:43 +0400
From: Solar Designer <solar@...nwall.com>
To: oss-security@...ts.openwall.com
Cc: chet.ramey@...e.edu
Subject: Re: Shellshocker - Repository of "Shellshock" Proof of Concept Code

On Tue, Oct 07, 2014 at 09:05:40AM +0000, mancha wrote:
> it would help if you'd clarify your position more explicitely.

I recognize that embargoes are not necessarily beneficial overall and
they have clear drawbacks and may be unfair to some (hence my easy
adoption of the opponents' term "selective disclosure" despite of its
negative connotation), yet I think that sometimes they are in fact
beneficial overall, and I have little or no control over whether they
are imposed by the reporter of an issue.

For now, I intend to continue hosting the distros list as a tool to
facilitate safer handling and discussion of embargoed issues between
representatives of the (selected) distros.

I suggest and ask that existing members of the distros list try to
volunteer extra time to review proposed patches and the software being
patched for possible related flaws.  I doubt that this suggestion and
request will change things much, but it "costs" nothing in terms of
extra risks or slippery slopes (which would be a concern if we start
adding non-distro security researchers to the list), so we have nothing
to lose by asking.

In case of Shellshock, there wasn't a clear enough opportunity for
distros list members to change how the vulnerability would be fixed
pre-disclosure, but I mean the above in general.

A related aspect is that the distros list is currently specified as
being intended for medium overall severity issues.  The rationale behind
this is that low severity issues don't need embargoes, and high severity
issues are worthy of special handling where they are to be disclosed to
affected distros only rather than to all at once.  I think it's the
latter aspect which correctly prompted Florian to post just a heads-up
to the distros list, requiring that affected distros who actually intend
to work on the issue within the allotted 2 days actively request the
information.  Unfortunately, this approach, while safer against leaks,
precludes pre-disclosure reviews by distros who do not feel they require
to patch the issue for themselves before it becomes public.  Maybe this
implies that those distros' representatives would not care to review the
patch anyway, or maybe not.  Possibly more importantly, it precludes
discussion of high severity issues between distros on the distros list,
if those issues were (correctly) only announced in the form of heads-up
messages requiring direct contact for detail.  I think an exception
needs to be made to encourage discussion of high severity issues taking
advantage of the distros list PGP-re-encryption when that is expected
to be beneficial, although unfortunately that is hard to know in advance.

Alexander

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.