[Mageia-dev] Meeting for secteam start

Michael Scherer misc at zarb.org
Sat Apr 16 10:10:36 CEST 2011

 On Fri, 15 Apr 2011 08:35:40 -0400, Stew Benedict wrote:
> Sorry if I break the thread, just signed back up to the list.
> Just to kick things off for secteam, I thought I'd list the process 
> as I
> remember it from when I worked with Vincent for a couple of years.
> Not to say Mageia needs to follow any of this, and as we're a 
> volunteer
> organization, I suspect things will be structured a bit differently 
> from
> a staffing POV than "2 guys mostly dedicated to updates"

 I would personnaly think we should have something as open as possible :
 - people could learn from looking on how thing goes ( quite important 
 to make sure new
 blood can come in )
 - not all updates requires secrecy, and I think that most doesn't ( ie, 
 public POC, public patches, or are simply not security related )
 - this would put less pressure on sysadmins to be sure security is not 

 So try to be open by default, except if we cannot for some specific 
 case ( embargo, non public
 POC ). This would requires :
 - acl on task tracker ( likely bugzilla )
 - some policy about declassification ( ie open issues after publication 
 if the POC can be published,
 or restrict access )

> Old Process:
> * monitor vendor-sec, discuss vulns, patches, negotiate release 
> schedule,
>    also watch other distro updates, for things we may have missed

 We could ask to maintainers to help on that regard,
 or, like proposed for mageia-app-db and package testing, have a list of 
 dedicated on gathering such informations. For example, someone say "I 
 care of watching security for libreoffice and will warn secteam if
 something need to be done".

> * check our srpm database (Vincent later reworked this) for all the
> places the affected source code
>    may be buried (many packages embed copies of other source)

 I would propose to have a policy of using system wide library and do 
 allow bundled copy ( but this would be likely annoying for some case ).

 And also, if you need some specific support on Sophie, do not hesitate 
 to ask.

> * apply/adapt patches for all supported releases/architectures (may 
> have
> been published on vendor-sec,
>    or from another distro package, or extracted from upstream)
>    ** when we we supporting several releases, with Enterprise stuff
> being quite old, reworking the patches at times was difficult
>    ** policy changed over time and these days many things bump up to 
> a
> new release, rather than patching

 Depend on the effort, and the software. While I think minimal change is 
 not everybody agree so we should discuss to find a common ground or a 
> * build in chroot to preserve the original build env (moved to iurt
> around the time I left)
>    ** if we had trouble building the package, contact the maintainer 
> for
> help

 This mean that we need to make sure packages are easy to rebuild. But 
 helped a lot on that regard.

> * acquire or write a POC (proof of concept) to test that the vuln is
> corrected, if not, re-patch/re-test
> * test the app for basic functionality, that we haven't introduced
> regressions
>    ** bugfix updates went to QA for testing, this was a big
> blocker/delay at times
> * upload packages to main mirror, wait a few hours and release the
> announcement (we had several scripts
>    that facilitated getting packages in the right place, signing 
> them,
> uploading, etc.)

 This would be doable with youri, so we need to do some kind of wrapper 
 around this to
 take in account the advisory. Something that would be needed too is a 
 of such advisory ( and so we can start to give id of such advisory such
 as MGA-2011-001, etc ).
 Michael Scherer

More information about the Mageia-dev mailing list