* [Qemu-devel] QEMU CII Best Practices record @ 2017-10-13 13:25 Daniel P. Berrange 2017-10-23 17:31 ` Stefan Hajnoczi 2017-10-23 17:55 ` Peter Maydell 0 siblings, 2 replies; 6+ messages in thread From: Daniel P. Berrange @ 2017-10-13 13:25 UTC (permalink / raw) To: qemu-devel Many projects these days are recording progress wrt CII best practices for FLOOS projects. I filled out a record for QEMU: https://bestpractices.coreinfrastructure.org/projects/1309 I only looked at the 'Passing' criteria, not considered the 'Silver' and 'Gold' criteria. So if anyone else wants to contribute, register an account there and tell me the username whereupon I can add you as a collaborator. Two items I don't think QEMU achieves for the basic "Passing" criteria - The release notes MUST identify every publicly known vulnerability that is fixed in each new release. I don't see a list of CVEs mentioned in our release Changelogs or indeed a historic list of CVEs anywhere even outside the release notes ? - It is SUGGESTED that if the software produced by the project includes software written using a memory-unsafe language (e.g., C or C++), then at least one dynamic tool (e.g., a fuzzer or web application scanner) be routinely used in combination with a mechanism to detect memory safety problems such as buffer overwrites. NB this is not 'coverity' which falls under the 'static anlaysis' group. I'm unclear if anyone in the community does regular fuzzing or analysis with ASAN & equiv ? If i'm wrong just say.... There's many questions under Silver/Gold level we likely don't meet and some of them start to get quiet opinionated about the way a project should be run, so IMHO its not unreasonable to say we're not going to aim for perfection in this respect. Regards, Daniel -- |: https://berrange.com -o- https://www.flickr.com/photos/dberrange :| |: https://libvirt.org -o- https://fstop138.berrange.com :| |: https://entangle-photo.org -o- https://www.instagram.com/dberrange :| ^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: [Qemu-devel] QEMU CII Best Practices record 2017-10-13 13:25 [Qemu-devel] QEMU CII Best Practices record Daniel P. Berrange @ 2017-10-23 17:31 ` Stefan Hajnoczi 2017-10-23 17:55 ` Peter Maydell 1 sibling, 0 replies; 6+ messages in thread From: Stefan Hajnoczi @ 2017-10-23 17:31 UTC (permalink / raw) To: Daniel P. Berrange; +Cc: qemu-devel On Fri, Oct 13, 2017 at 02:25:07PM +0100, Daniel P. Berrange wrote: > Many projects these days are recording progress wrt CII best practices > for FLOOS projects. I filled out a record for QEMU: > > https://bestpractices.coreinfrastructure.org/projects/1309 > > I only looked at the 'Passing' criteria, not considered the 'Silver' and > 'Gold' criteria. So if anyone else wants to contribute, register an > account there and tell me the username whereupon I can add you as a > collaborator. > > Two items I don't think QEMU achieves for the basic "Passing" criteria > > - The release notes MUST identify every publicly known vulnerability > that is fixed in each new release. > > I don't see a list of CVEs mentioned in our release Changelogs or > indeed a historic list of CVEs anywhere even outside the release > notes ? > > - It is SUGGESTED that if the software produced by the project includes > software written using a memory-unsafe language (e.g., C or C++), then > at least one dynamic tool (e.g., a fuzzer or web application scanner) > be routinely used in combination with a mechanism to detect memory > safety problems such as buffer overwrites. > > NB this is not 'coverity' which falls under the 'static anlaysis' > group. I'm unclear if anyone in the community does regular fuzzing > or analysis with ASAN & equiv ? I'm not aware of automated ASAN or Valgrind runs although developers tend to run them in ad-hoc fashion during development. Stefan ^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: [Qemu-devel] QEMU CII Best Practices record 2017-10-13 13:25 [Qemu-devel] QEMU CII Best Practices record Daniel P. Berrange 2017-10-23 17:31 ` Stefan Hajnoczi @ 2017-10-23 17:55 ` Peter Maydell 2017-10-24 7:42 ` Daniel P. Berrange 1 sibling, 1 reply; 6+ messages in thread From: Peter Maydell @ 2017-10-23 17:55 UTC (permalink / raw) To: Daniel P. Berrange; +Cc: QEMU Developers On 13 October 2017 at 14:25, Daniel P. Berrange <berrange@redhat.com> wrote: > Many projects these days are recording progress wrt CII best practices > for FLOOS projects. I filled out a record for QEMU: > > https://bestpractices.coreinfrastructure.org/projects/1309 > > I only looked at the 'Passing' criteria, not considered the 'Silver' and > 'Gold' criteria. So if anyone else wants to contribute, register an > account there and tell me the username whereupon I can add you as a > collaborator. For the questions about "50% of bug reports must be acknowledged" and ditto enhancement requests, did you mine the launchpad data or are you just guessing? :-) Similarly for vulnerability report response time. I think you're fudging the test-policy questions in our favour a bit. > - The release notes MUST identify every publicly known vulnerability > that is fixed in each new release. > > I don't see a list of CVEs mentioned in our release Changelogs or > indeed a historic list of CVEs anywhere even outside the release > notes ? Indeed I don't think we do this. I would say that as a project we essentially push the job of rolling new releases for CVEs, informing users about CVE fixes, etc, to our downstream distributors. I suspect we only pass the "no vulns unpatched for more than 60 days" if you allow "patched in bleeding edge master and in distros but not in any upstream release" to count. thanks -- PMM ^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: [Qemu-devel] QEMU CII Best Practices record 2017-10-23 17:55 ` Peter Maydell @ 2017-10-24 7:42 ` Daniel P. Berrange 2017-10-24 7:46 ` Daniel P. Berrange 0 siblings, 1 reply; 6+ messages in thread From: Daniel P. Berrange @ 2017-10-24 7:42 UTC (permalink / raw) To: Peter Maydell; +Cc: QEMU Developers On Mon, Oct 23, 2017 at 06:55:44PM +0100, Peter Maydell wrote: > On 13 October 2017 at 14:25, Daniel P. Berrange <berrange@redhat.com> wrote: > > Many projects these days are recording progress wrt CII best practices > > for FLOOS projects. I filled out a record for QEMU: > > > > https://bestpractices.coreinfrastructure.org/projects/1309 > > > > I only looked at the 'Passing' criteria, not considered the 'Silver' and > > 'Gold' criteria. So if anyone else wants to contribute, register an > > account there and tell me the username whereupon I can add you as a > > collaborator. > > For the questions about "50% of bug reports must be acknowledged" > and ditto enhancement requests, did you mine the launchpad data > or are you just guessing? :-) Similarly for vulnerability report > response time. I didn't measure it, just used gut feeling. I see people like Thomas Huth and David Gilbert in particular responding to many bugs which come in and triaging existing bugs. So I think we're in the ballpark give or take 10%. For vulnerability reports I think we get good response, between QEMU's secalert team, and the distros security teams, we've got good coverage & response. > I think you're fudging the test-policy questions in our favour a bit. IMHO the way the CII website is setup with everyone self-certifying, means it is largely a game. I view it is a way of identifying notable gaps where we might consider improving our working practice, and as a rough guide to outsides to understand our project, rather than a 100% accurate reflection of what we do. But if people think I've got something that is grossly inaccurate please do point it out. > > - The release notes MUST identify every publicly known vulnerability > > that is fixed in each new release. > > > > I don't see a list of CVEs mentioned in our release Changelogs or > > indeed a historic list of CVEs anywhere even outside the release > > notes ? > > Indeed I don't think we do this. I would say that as a project we > essentially push the job of rolling new releases for CVEs, informing > users about CVE fixes, etc, to our downstream distributors. > I suspect we only pass the "no vulns unpatched for more than 60 days" > if you allow "patched in bleeding edge master and in distros > but not in any upstream release" to count. I think patched in git master is sufficient to consider it a pass on the criteria - they don't mention any specifics about having to maintain multiple stable branches and backport. Regards, Daniel -- |: https://berrange.com -o- https://www.flickr.com/photos/dberrange :| |: https://libvirt.org -o- https://fstop138.berrange.com :| |: https://entangle-photo.org -o- https://www.instagram.com/dberrange :| ^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: [Qemu-devel] QEMU CII Best Practices record 2017-10-24 7:42 ` Daniel P. Berrange @ 2017-10-24 7:46 ` Daniel P. Berrange 2017-10-24 8:12 ` Peter Maydell 0 siblings, 1 reply; 6+ messages in thread From: Daniel P. Berrange @ 2017-10-24 7:46 UTC (permalink / raw) To: Peter Maydell; +Cc: QEMU Developers On Tue, Oct 24, 2017 at 08:42:03AM +0100, Daniel P. Berrange wrote: > On Mon, Oct 23, 2017 at 06:55:44PM +0100, Peter Maydell wrote: > > On 13 October 2017 at 14:25, Daniel P. Berrange <berrange@redhat.com> wrote: > > > Many projects these days are recording progress wrt CII best practices > > > for FLOOS projects. I filled out a record for QEMU: > > > > > > https://bestpractices.coreinfrastructure.org/projects/1309 > > > > > > I only looked at the 'Passing' criteria, not considered the 'Silver' and > > > 'Gold' criteria. So if anyone else wants to contribute, register an > > > account there and tell me the username whereupon I can add you as a > > > collaborator. > > > > For the questions about "50% of bug reports must be acknowledged" > > and ditto enhancement requests, did you mine the launchpad data > > or are you just guessing? :-) Similarly for vulnerability report > > response time. > > I didn't measure it, just used gut feeling. I see people like Thomas Huth > and David Gilbert in particular responding to many bugs which come in and > triaging existing bugs. So I think we're in the ballpark give or take 10%. > > For vulnerability reports I think we get good response, between QEMU's secalert > team, and the distros security teams, we've got good coverage & response. > > > I think you're fudging the test-policy questions in our favour a bit. > > IMHO the way the CII website is setup with everyone self-certifying, > means it is largely a game. I view it is a way of identifying notable > gaps where we might consider improving our working practice, and as a > rough guide to outsides to understand our project, rather than a 100% > accurate reflection of what we do. > > But if people think I've got something that is grossly inaccurate > please do point it out. > > > > > > - The release notes MUST identify every publicly known vulnerability > > > that is fixed in each new release. > > > > > > I don't see a list of CVEs mentioned in our release Changelogs or > > > indeed a historic list of CVEs anywhere even outside the release > > > notes ? > > > > Indeed I don't think we do this. I would say that as a project we > > essentially push the job of rolling new releases for CVEs, informing > > users about CVE fixes, etc, to our downstream distributors. > > > I suspect we only pass the "no vulns unpatched for more than 60 days" > > if you allow "patched in bleeding edge master and in distros > > but not in any upstream release" to count. > > I think patched in git master is sufficient to consider it a pass on the > criteria - they don't mention any specifics about having to maintain > multiple stable branches and backport. That said, I wonder if we should put 'security response handling' on the agenda for the QEMU mini summit tomorrow. In particular I think it is pretty bad that we don't publish any list of what CVEs affect QEMU and the GIT hash of the corresponding GIT master fix, nor mention them in the release notes for each major release. Regards, Daniel -- |: https://berrange.com -o- https://www.flickr.com/photos/dberrange :| |: https://libvirt.org -o- https://fstop138.berrange.com :| |: https://entangle-photo.org -o- https://www.instagram.com/dberrange :| ^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: [Qemu-devel] QEMU CII Best Practices record 2017-10-24 7:46 ` Daniel P. Berrange @ 2017-10-24 8:12 ` Peter Maydell 0 siblings, 0 replies; 6+ messages in thread From: Peter Maydell @ 2017-10-24 8:12 UTC (permalink / raw) To: Daniel P. Berrange; +Cc: QEMU Developers On 24 October 2017 at 08:46, Daniel P. Berrange <berrange@redhat.com> wrote: > That said, I wonder if we should put 'security response handling' on the > agenda for the QEMU mini summit tomorrow. In particular I think it is > pretty bad that we don't publish any list of what CVEs affect QEMU and > the GIT hash of the corresponding GIT master fix, nor mention them in > the release notes for each major release. Yep, happy to talk about that. Personally I'd like to see us doing better here, but since I don't have the time to do it myself I can understand if nobody else has the time to do it either :-) thanks -- PMM ^ permalink raw reply [flat|nested] 6+ messages in thread
end of thread, other threads:[~2017-10-24 8:12 UTC | newest] Thread overview: 6+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- 2017-10-13 13:25 [Qemu-devel] QEMU CII Best Practices record Daniel P. Berrange 2017-10-23 17:31 ` Stefan Hajnoczi 2017-10-23 17:55 ` Peter Maydell 2017-10-24 7:42 ` Daniel P. Berrange 2017-10-24 7:46 ` Daniel P. Berrange 2017-10-24 8:12 ` Peter Maydell
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for NNTP newsgroup(s).