xen-devel.lists.xenproject.org archive mirror
 help / color / mirror / Atom feed
* Possible improvement to Xen Security Response Process
@ 2016-12-05 14:17 Matthew Allen
  2016-12-05 15:00 ` Jan Beulich
  0 siblings, 1 reply; 14+ messages in thread
From: Matthew Allen @ 2016-12-05 14:17 UTC (permalink / raw)
  To: xen-devel; +Cc: committers

According to https://xenbits.xen.org/xsa/ we are in the middle of 
4 consecutive Tuesdays of security announcements: XSA-19[1-8]
on Nov. 22, XSA-201 Nov. 29, XSA-199 Dec. 6 and XSA-200 Dec. 13.
The present security policy does not encourage batching of XSAs and
I would like us to consider refining the policy to permit this.

The present approach of frequent security updates causes significant 
disruption to users.  Many organisations test updates before deploying
in production; because security updates are so important this displaces 
other work at short notice and doing so repeatedly is a significant
impact to users of Xen.  Updating the policy to encourage the batching
of updates would reduce the load of using Xen.

From a security purist point of view, any delay in publication could 
increase the possibility of vulnerabilities being exploited in the
wild.  However, given the significant frequency of publication of XSAs,
I’d suggest that users failing to keep up with the publication rate
is presently a much greater security risk.

If XSAs were to be batched, we should also consider if batch updates 
should be encouraged to be on pre-defined dates.  The present
unpredictability makes it unnecessarily more difficult for users of
Xen to plan their lives.  For example, our present process causes 
organisations with few administrators to choose between cancelling
holidays or not patching.

Obviously, some issues are discussed in public before the security 
impact is realised (such as XSA-201); equally, the right to set 
a disclosure date (if any) rests with the discoverer.  However,
my experience of other software (which may not be typical) has been
that discoverers are usually happy to go along with any reasonable
proposed date given in the same way that discoverers of XSAs are
usually happy to conform to our present policy.

If this seems a good idea, then I’ll post a concrete proposal but 
I’d like to get general feedback first.



_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel

^ permalink raw reply	[flat|nested] 14+ messages in thread

* Re: Possible improvement to Xen Security Response Process
  2016-12-05 14:17 Possible improvement to Xen Security Response Process Matthew Allen
@ 2016-12-05 15:00 ` Jan Beulich
  2016-12-05 19:24   ` Stefano Stabellini
  0 siblings, 1 reply; 14+ messages in thread
From: Jan Beulich @ 2016-12-05 15:00 UTC (permalink / raw)
  To: Matthew Allen; +Cc: committers, xen-devel

>>> On 05.12.16 at 15:17, <matthew.allen@citrix.com> wrote:
> From a security purist point of view, any delay in publication could 
> increase the possibility of vulnerabilities being exploited in the
> wild.  However, given the significant frequency of publication of XSAs,
> I’d suggest that users failing to keep up with the publication rate
> is presently a much greater security risk.
> 
> If XSAs were to be batched, we should also consider if batch updates 
> should be encouraged to be on pre-defined dates.  The present
> unpredictability makes it unnecessarily more difficult for users of
> Xen to plan their lives.  For example, our present process causes 
> organisations with few administrators to choose between cancelling
> holidays or not patching.
> 
> Obviously, some issues are discussed in public before the security 
> impact is realised (such as XSA-201); equally, the right to set 
> a disclosure date (if any) rests with the discoverer.  However,
> my experience of other software (which may not be typical) has been
> that discoverers are usually happy to go along with any reasonable
> proposed date given in the same way that discoverers of XSAs are
> usually happy to conform to our present policy.
> 
> If this seems a good idea, then I’ll post a concrete proposal but 
> I’d like to get general feedback first.

I think very much here depends on the concrete aspects of the
proposal (timing, room for exceptions, etc). From just a general
pov, I can see advantages and disadvantages to both, just like
you've indicated yourself already. Also it shouldn't be left out of
consideration that for less severe vulnerabilities consuming
parties could decide for themselves whether to delay patching
(and hence leverage batching); I'm not convinced it would be a
good idea to require the XenProject Security Team to take this
decision in all cases.

Jan

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel

^ permalink raw reply	[flat|nested] 14+ messages in thread

* Re: Possible improvement to Xen Security Response Process
  2016-12-05 15:00 ` Jan Beulich
@ 2016-12-05 19:24   ` Stefano Stabellini
  2016-12-06 14:54     ` Matthew Allen
  0 siblings, 1 reply; 14+ messages in thread
From: Stefano Stabellini @ 2016-12-05 19:24 UTC (permalink / raw)
  To: Jan Beulich; +Cc: committers, Matthew Allen, xen-devel

[-- Attachment #1: Type: TEXT/PLAIN, Size: 2266 bytes --]

On Mon, 5 Dec 2016, Jan Beulich wrote:
> >>> On 05.12.16 at 15:17, <matthew.allen@citrix.com> wrote:
> > From a security purist point of view, any delay in publication could 
> > increase the possibility of vulnerabilities being exploited in the
> > wild.  However, given the significant frequency of publication of XSAs,
> > I’d suggest that users failing to keep up with the publication rate
> > is presently a much greater security risk.
> > 
> > If XSAs were to be batched, we should also consider if batch updates 
> > should be encouraged to be on pre-defined dates.  The present
> > unpredictability makes it unnecessarily more difficult for users of
> > Xen to plan their lives.  For example, our present process causes 
> > organisations with few administrators to choose between cancelling
> > holidays or not patching.
> > 
> > Obviously, some issues are discussed in public before the security 
> > impact is realised (such as XSA-201); equally, the right to set 
> > a disclosure date (if any) rests with the discoverer.  However,
> > my experience of other software (which may not be typical) has been
> > that discoverers are usually happy to go along with any reasonable
> > proposed date given in the same way that discoverers of XSAs are
> > usually happy to conform to our present policy.
> > 
> > If this seems a good idea, then I’ll post a concrete proposal but 
> > I’d like to get general feedback first.
> 
> I think very much here depends on the concrete aspects of the
> proposal (timing, room for exceptions, etc). From just a general
> pov, I can see advantages and disadvantages to both, just like
> you've indicated yourself already. Also it shouldn't be left out of
> consideration that for less severe vulnerabilities consuming
> parties could decide for themselves whether to delay patching
> (and hence leverage batching); I'm not convinced it would be a
> good idea to require the XenProject Security Team to take this
> decision in all cases.

Given that the disclosure date is always chosen by the discoverer, the
only thing the security team can do is to suggest. It could make sense
to have a policy to pick the date the team should propose to the
discoverer, but at the end of the day, it is always, entirely, up to
her.

[-- Attachment #2: Type: text/plain, Size: 127 bytes --]

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel

^ permalink raw reply	[flat|nested] 14+ messages in thread

* Re: Possible improvement to Xen Security Response Process
  2016-12-05 19:24   ` Stefano Stabellini
@ 2016-12-06 14:54     ` Matthew Allen
  2016-12-07 16:23       ` Ian Jackson
  0 siblings, 1 reply; 14+ messages in thread
From: Matthew Allen @ 2016-12-06 14:54 UTC (permalink / raw)
  To: Stefano Stabellini; +Cc: committers, Jan Beulich, xen-devel

On Mon, 2016-12-05 at 11:24 -0800, Stefano Stabellini wrote:
> On Mon, 5 Dec 2016, Jan Beulich wrote:
> > >>> On 05.12.16 at 15:17, <matthew.allen@citrix.com> wrote:
...
> > > Obviously, some issues are discussed in public before the security 
> > > impact is realised (such as XSA-201); equally, the right to set 
> > > a disclosure date (if any) rests with the discoverer.  However,
> > > my experience of other software (which may not be typical) has been
> > > that discoverers are usually happy to go along with any reasonable
> > > proposed date given in the same way that discoverers of XSAs are
> > > usually happy to conform to our present policy.
> > > 
> > > If this seems a good idea, then I’ll post a concrete proposal but 
> > > I’d like to get general feedback first.
> > 
> > I think very much here depends on the concrete aspects of the
> > proposal (timing, room for exceptions, etc). From just a general
> > pov, I can see advantages and disadvantages to both, just like
> > you've indicated yourself already. Also it shouldn't be left out of
> > consideration that for less severe vulnerabilities consuming
> > parties could decide for themselves whether to delay patching
> > (and hence leverage batching); I'm not convinced it would be a
> > good idea to require the XenProject Security Team to take this
> > decision in all cases.
> 
> Given that the disclosure date is always chosen by the discoverer, the
> only thing the security team can do is to suggest. It could make sense
> to have a policy to pick the date the team should propose to the
> discoverer, but at the end of the day, it is always, entirely, up to
> her.

I agree; I'm suggesting changes to the dates that the security team
would propose to a discoverer.  It's clearly entirely up to the
discoverer whether they accept the proposal or decide on a different
date (and they are, of course, under no obligation to contact the
security team in advance at all).
It does seem that discoverers are usually kind enough to contact the
security team and consent to the dates suggested by the present policy;
we should respect that kindness by making best use of the flexibility
offered as well as ensuring timely release.



_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel

^ permalink raw reply	[flat|nested] 14+ messages in thread

* Re: Possible improvement to Xen Security Response Process
  2016-12-06 14:54     ` Matthew Allen
@ 2016-12-07 16:23       ` Ian Jackson
  2016-12-12 17:11         ` Matthew Allen
  0 siblings, 1 reply; 14+ messages in thread
From: Ian Jackson @ 2016-12-07 16:23 UTC (permalink / raw)
  To: Matthew Allen; +Cc: Stefano Stabellini, committers, Jan Beulich, xen-devel

Matthew Allen writes ("Re: [Xen-devel] Possible improvement to Xen Security Response Process"):
> I agree; I'm suggesting changes to the dates that the security team
> would propose to a discoverer.

Right.

Personally I think that batching would be valuable, if it does not
lead to either inordinate delay or precipitate publication.  Of course
opinions about what "inordinate" or "precipitate" mean are likely to
produce some disagreements...

Matthew's suggestion of having fixed dates is a possible way forward
but it might also lead to avoidable delays.


I have an alternative concrete suggestion:

 Unless there are good reasons to diverge, our suggestions to
 discoverer(s) will be based on the following criteria, in order of
 precedence:
 1. Avoiding disclosure on Fridays, weekends, or on or immediately
    before widely respected public holidays.
 2. Minimising the number of distinct publication dates 
    within each 14 day period.
 3. Making the preparation period for each advisory as close,
    on a log scale, to 14 days as possible.
 (The preparation period for an advisory is the period between
 predisclosure and publication.)

Essentially this means that if predisclosure of a second batch occurs
in the first 5 days of a 14 day preparation period, the existing date
will be reused; on or after the 6th day, a new date, beyond, will be
suggested.  So the minimum preparation period is 9 days (9/14 = ie,
1.55x too short), and the maximum is 22 days (22/14 = 1.57x too long).
(Figures slightly fudged due to day-granuarity rounding error.)

That's a suggested compromise between those who will want to do
batching by making the timescales shorter and those who want to make
them longer.  (Using a log scale avoids the problem that a linear
scale would mean that the error factor would be ~2x short but only ~1.5x
long.)


Bunfight, anyone ?


Ian.
(Responding with a personal opinion, and hence from a personal
 email address.  I haven't discussed this with my management at
 Citrix.)

-- 
Ian Jackson <ijackson@chiark.greenend.org.uk>   These opinions are my own.

If I emailed you from an address @fyvzl.net or @evade.org.uk, that is
a private address which bypasses my fierce spamfilter.

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel

^ permalink raw reply	[flat|nested] 14+ messages in thread

* Re: Possible improvement to Xen Security Response Process
  2016-12-07 16:23       ` Ian Jackson
@ 2016-12-12 17:11         ` Matthew Allen
  2016-12-13  1:54           ` Anthony Liguori
  2016-12-13  8:41           ` Jan Beulich
  0 siblings, 2 replies; 14+ messages in thread
From: Matthew Allen @ 2016-12-12 17:11 UTC (permalink / raw)
  To: Ian Jackson; +Cc: Stefano Stabellini, committers, Jan Beulich, xen-devel

On Wed, 2016-12-07 at 16:23 +0000, Ian Jackson wrote:
> ...
> I have an alternative concrete suggestion:
> 
>  Unless there are good reasons to diverge, our suggestions to
>  discoverer(s) will be based on the following criteria, in order of
>  precedence:
>  1. Avoiding disclosure on Fridays, weekends, or on or immediately
>     before widely respected public holidays.
>  2. Minimising the number of distinct publication dates 
>     within each 14 day period.
>  3. Making the preparation period for each advisory as close,
>     on a log scale, to 14 days as possible.
>  (The preparation period for an advisory is the period between
>  predisclosure and publication.)
> ...
> Bunfight, anyone ?
> 
> 
> Ian.
> (Responding with a personal opinion, and hence from a personal
>  email address.  I haven't discussed this with my management at
>  Citrix.)
> 

I'll join in the bunfight with a stronger proposal (noting in passing
that according to https://xenbits.xen.org/xsa/ we are now expecting 5
consecutive weeks of XSA announcements):
1) Where practical, XSA public disclosures will be batched and announced
once per month.
2) The calendar of disclosure dates will be published well in advance
and will avoid Fridays, weekends, or dates on or immediately before
widely respected public holidays.
3) Issues will normally have at least 14 days pre-disclosure; this means
that an issue discovered immediately prior to a scheduled publication
date will normally not be disclosed until the next publication date.

Clearly there will be times when this can't be done; I am also aware
that discoverers always have the final say.  But both of those points
apply to the current policy as well.

I know that this would be a significant change.  However, the present
frequent and unpredictable nature of disclosures consumes a lot of time
that would otherwise be better spent on contributing to and improving
Xen.

Matthew




_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel

^ permalink raw reply	[flat|nested] 14+ messages in thread

* Re: Possible improvement to Xen Security Response Process
  2016-12-12 17:11         ` Matthew Allen
@ 2016-12-13  1:54           ` Anthony Liguori
  2016-12-13  8:41           ` Jan Beulich
  1 sibling, 0 replies; 14+ messages in thread
From: Anthony Liguori @ 2016-12-13  1:54 UTC (permalink / raw)
  To: Matthew Allen
  Cc: Stefano Stabellini, committers, Ian Jackson, Jan Beulich,
	xen-devel@lists.xen.org

On Mon, Dec 12, 2016 at 9:11 AM, Matthew Allen <matthew.allen@citrix.com> wrote:
> On Wed, 2016-12-07 at 16:23 +0000, Ian Jackson wrote:
>> ...
>> I have an alternative concrete suggestion:
>>
>>  Unless there are good reasons to diverge, our suggestions to
>>  discoverer(s) will be based on the following criteria, in order of
>>  precedence:
>>  1. Avoiding disclosure on Fridays, weekends, or on or immediately
>>     before widely respected public holidays.
>>  2. Minimising the number of distinct publication dates
>>     within each 14 day period.
>>  3. Making the preparation period for each advisory as close,
>>     on a log scale, to 14 days as possible.
>>  (The preparation period for an advisory is the period between
>>  predisclosure and publication.)
>> ...
>> Bunfight, anyone ?
>>
>>
>> Ian.
>> (Responding with a personal opinion, and hence from a personal
>>  email address.  I haven't discussed this with my management at
>>  Citrix.)
>>
>
> I'll join in the bunfight with a stronger proposal (noting in passing
> that according to https://xenbits.xen.org/xsa/ we are now expecting 5
> consecutive weeks of XSA announcements):
> 1) Where practical, XSA public disclosures will be batched and announced
> once per month.
> 2) The calendar of disclosure dates will be published well in advance
> and will avoid Fridays, weekends, or dates on or immediately before
> widely respected public holidays.
> 3) Issues will normally have at least 14 days pre-disclosure; this means
> that an issue discovered immediately prior to a scheduled publication
> date will normally not be disclosed until the next publication date.
>
> Clearly there will be times when this can't be done; I am also aware
> that discoverers always have the final say.  But both of those points
> apply to the current policy as well.
>
> I know that this would be a significant change.  However, the present
> frequent and unpredictable nature of disclosures consumes a lot of time
> that would otherwise be better spent on contributing to and improving
> Xen.

I think this assumes that the response is to apply all patches, test
as one unit, and then make available.

OTOH, if you are doing a detailed assessment of each issue,
determining scope of impact, creating regression tests, etc then
batching means that there is a lot more work to fit in a smaller time
period.

Regards,

Anthony Liguori

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel

^ permalink raw reply	[flat|nested] 14+ messages in thread

* Re: Possible improvement to Xen Security Response Process
  2016-12-12 17:11         ` Matthew Allen
  2016-12-13  1:54           ` Anthony Liguori
@ 2016-12-13  8:41           ` Jan Beulich
  2017-01-04 11:58             ` James Bulpin
  1 sibling, 1 reply; 14+ messages in thread
From: Jan Beulich @ 2016-12-13  8:41 UTC (permalink / raw)
  To: Matthew Allen; +Cc: Stefano Stabellini, committers, Ian Jackson, xen-devel

>>> On 12.12.16 at 18:11, <matthew.allen@citrix.com> wrote:
> I'll join in the bunfight with a stronger proposal (noting in passing
> that according to https://xenbits.xen.org/xsa/ we are now expecting 5
> consecutive weeks of XSA announcements):
> 1) Where practical, XSA public disclosures will be batched and announced
> once per month.
> 2) The calendar of disclosure dates will be published well in advance
> and will avoid Fridays, weekends, or dates on or immediately before
> widely respected public holidays.
> 3) Issues will normally have at least 14 days pre-disclosure; this means
> that an issue discovered immediately prior to a scheduled publication
> date will normally not be disclosed until the next publication date.

Hmm - this means 6 weeks of latency in the worst case. I don't
think that's reasonable.

Jan


_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel

^ permalink raw reply	[flat|nested] 14+ messages in thread

* Re: Possible improvement to Xen Security Response Process
  2016-12-13  8:41           ` Jan Beulich
@ 2017-01-04 11:58             ` James Bulpin
  2017-01-04 13:01               ` Jan Beulich
  2017-01-20 19:21               ` Ian Jackson
  0 siblings, 2 replies; 14+ messages in thread
From: James Bulpin @ 2017-01-04 11:58 UTC (permalink / raw)
  To: Jan Beulich, Matthew Allen
  Cc: Stefano Stabellini, committers@xenproject.org, Ian Jackson,
	xen-devel@lists.xen.org

On Tue, 2016-12-13 at 08:42, Jan Beulich wrote:
>>>> On 12.12.16 at 18:11, <matthew.allen@citrix.com> wrote:
>> I'll join in the bunfight with a stronger proposal (noting in passing 
>> that according to https://xenbits.xen.org/xsa/ we are now expecting 5 
>> consecutive weeks of XSA announcements):
>> 1) Where practical, XSA public disclosures will be batched and 
>> announced once per month.
>> 2) The calendar of disclosure dates will be published well in advance 
>> and will avoid Fridays, weekends, or dates on or immediately before 
>> widely respected public holidays.
>> 3) Issues will normally have at least 14 days pre-disclosure; this 
>> means that an issue discovered immediately prior to a scheduled 
>> publication date will normally not be disclosed until the next publication date.
>
>Hmm - this means 6 weeks of latency in the worst case. I don't think that's reasonable.

What if instead we adopted a model similar to Microsoft's "patch Tuesday"[1]
where there is always one scheduled release/disclosure date per month and a
second scheduled date two weeks later that is used if needed. As discussed
earlier in this thread we could issue guidance/recommendations to the
discovers on choice of disclosure date - this could be along the lines of
"the second Tuesday in a month that is at least 14 days after the initial
pre-disclosure; in cases where this creates a significant delay, such as
more than 4 weeks, and the issue is considered to be of significant urgency
due to its severity, then the fourth Tuesday in the month should be
considered so long as this allows for a 14 day pre-disclosure period" (or
something like that).

Thoughts?

Cheers,
James

[1] https://en.wikipedia.org/wiki/Patch_Tuesday
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel

^ permalink raw reply	[flat|nested] 14+ messages in thread

* Re: Possible improvement to Xen Security Response Process
  2017-01-04 11:58             ` James Bulpin
@ 2017-01-04 13:01               ` Jan Beulich
  2017-01-04 13:12                 ` James Bulpin
  2017-01-20 19:21               ` Ian Jackson
  1 sibling, 1 reply; 14+ messages in thread
From: Jan Beulich @ 2017-01-04 13:01 UTC (permalink / raw)
  To: James Bulpin
  Cc: committers@xenproject.org, Stefano Stabellini, Matthew Allen,
	Ian Jackson, xen-devel@lists.xen.org

>>> On 04.01.17 at 12:58, <James.Bulpin@citrix.com> wrote:
> On Tue, 2016-12-13 at 08:42, Jan Beulich wrote:
>>>>> On 12.12.16 at 18:11, <matthew.allen@citrix.com> wrote:
>>> I'll join in the bunfight with a stronger proposal (noting in passing 
>>> that according to https://xenbits.xen.org/xsa/ we are now expecting 5 
>>> consecutive weeks of XSA announcements):
>>> 1) Where practical, XSA public disclosures will be batched and 
>>> announced once per month.
>>> 2) The calendar of disclosure dates will be published well in advance 
>>> and will avoid Fridays, weekends, or dates on or immediately before 
>>> widely respected public holidays.
>>> 3) Issues will normally have at least 14 days pre-disclosure; this 
>>> means that an issue discovered immediately prior to a scheduled 
>>> publication date will normally not be disclosed until the next publication date.
>>
>>Hmm - this means 6 weeks of latency in the worst case. I don't think that's 
> reasonable.
> 
> What if instead we adopted a model similar to Microsoft's "patch Tuesday"[1]
> where there is always one scheduled release/disclosure date per month and a
> second scheduled date two weeks later that is used if needed. As discussed
> earlier in this thread we could issue guidance/recommendations to the
> discovers on choice of disclosure date - this could be along the lines of
> "the second Tuesday in a month that is at least 14 days after the initial
> pre-disclosure; in cases where this creates a significant delay, such as
> more than 4 weeks, and the issue is considered to be of significant urgency
> due to its severity, then the fourth Tuesday in the month should be
> considered so long as this allows for a 14 day pre-disclosure period" (or
> something like that).

Well, that'll leave us with another fuzzy thing - what does "significant
urgency due to its severity" really mean? The more that depending on
use case, people may have significantly differing opinions on this.

Jan


_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel

^ permalink raw reply	[flat|nested] 14+ messages in thread

* Re: Possible improvement to Xen Security Response Process
  2017-01-04 13:01               ` Jan Beulich
@ 2017-01-04 13:12                 ` James Bulpin
  0 siblings, 0 replies; 14+ messages in thread
From: James Bulpin @ 2017-01-04 13:12 UTC (permalink / raw)
  To: Jan Beulich
  Cc: committers@xenproject.org, Stefano Stabellini, Matthew Allen,
	Ian Jackson, xen-devel@lists.xen.org

On Wed, 2017-01-04 at 13:02, Jan Beulich wrote:
>>>> On 04.01.17 at 12:58, <James.Bulpin@citrix.com> wrote:
>> On Tue, 2016-12-13 at 08:42, Jan Beulich wrote:
>>>>>> On 12.12.16 at 18:11, <matthew.allen@citrix.com> wrote:
>>>> I'll join in the bunfight with a stronger proposal (noting in 
>>>> passing that according to https://xenbits.xen.org/xsa/ we are now 
>>>> expecting 5 consecutive weeks of XSA announcements):
>>>> 1) Where practical, XSA public disclosures will be batched and 
>>>> announced once per month.
>>>> 2) The calendar of disclosure dates will be published well in 
>>>> advance and will avoid Fridays, weekends, or dates on or immediately 
>>>> before widely respected public holidays.
>>>> 3) Issues will normally have at least 14 days pre-disclosure; this 
>>>> means that an issue discovered immediately prior to a scheduled 
>>>> publication date will normally not be disclosed until the next publication date.
>>>
>>>Hmm - this means 6 weeks of latency in the worst case. I don't think 
>>>that's
>> reasonable.
>> 
>> What if instead we adopted a model similar to Microsoft's "patch 
>> Tuesday"[1] where there is always one scheduled release/disclosure 
>> date per month and a second scheduled date two weeks later that is 
>> used if needed. As discussed earlier in this thread we could issue 
>> guidance/recommendations to the discovers on choice of disclosure date 
>> - this could be along the lines of "the second Tuesday in a month that 
>> is at least 14 days after the initial pre-disclosure; in cases where 
>> this creates a significant delay, such as more than 4 weeks, and the 
>> issue is considered to be of significant urgency due to its severity, 
>> then the fourth Tuesday in the month should be considered so long as 
>> this allows for a 14 day pre-disclosure period" (or something like that).
>
> Well, that'll leave us with another fuzzy thing - what does "significant
> urgency due to its severity" really mean? The more that depending on use
> case, people may have significantly differing opinions on this.

TBH I think a certain amount of fuzziness is unavoidable - I don't think
it's practical or desirable to try to foresee every possible case and
define a rule for it.

I'd rather have a (mostly) predictable schedule for our users even if
that means some fuzziness and the inevitable inconsistency it'll bring,
rather than the current model which appears chaotic to users.

Cheers,
James


_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel

^ permalink raw reply	[flat|nested] 14+ messages in thread

* Re: Possible improvement to Xen Security Response Process
  2017-01-04 11:58             ` James Bulpin
  2017-01-04 13:01               ` Jan Beulich
@ 2017-01-20 19:21               ` Ian Jackson
  2017-01-23 11:30                 ` Jan Beulich
  1 sibling, 1 reply; 14+ messages in thread
From: Ian Jackson @ 2017-01-20 19:21 UTC (permalink / raw)
  To: James Bulpin
  Cc: committers@xenproject.org, Stefano Stabellini, Matthew Allen,
	Jan Beulich, xen-devel@lists.xen.org

James Bulpin writes ("Re: [Xen-devel] Possible improvement to Xen Security Response Process"):
> On Tue, 2016-12-13 at 08:42, Jan Beulich wrote:
>> On 12.12.16 at 18:11, <matthew.allen@citrix.com> wrote:
> >
> > Hmm - this means 6 weeks of latency in the worst case. I don't
> > think that's reasonable.
> 
> What if instead we adopted a model similar to Microsoft's "patch
> Tuesday"[1] where there is always one scheduled release/disclosure
> date per month and a second scheduled date two weeks later that is
> used if needed.

If our target emabrgo period is ~14 days, then we should probably have
potential disclosure dates at 2 week intervals.  We could just say
"the Tuesday of an even-numbered week (ISO-8601)".

The rule about trying to avoid widely-observed public holidays would
mean we wouldn't release an advisory on the last Tuesday of the year,
either, so there would not be two consecutive Tuesdays.

> , and the issue is considered to be of significant urgency due
> to its severity, then the fourth Tuesday in the month should be
> considered so long as this allows for a 14 day pre-disclosure
> period" (or something like that).

I agree with Jan that this fuzziness is undesirable.  Also, more
severe vulnerabilities are both more urgent to fix, and also have
worse impact if released before people are ready, so severity is the
wrong measure.  If there is any kind of measure that is relevant it is
difficulty.

I'm writing here mostly with my personal hat, but my security team hat
really dislikes ambiguity like this.  It leads to unclear
decisionmaking and side discussions.

I would like the policy to specify a clear cutoff.  Jan, are you
comfortable with a "default" of between 2 and 4 weeks' embargo,
depending on the timing of the discovery etc. ?  Personally I think a
4 week maximum seems rather long, but with a 2 week cadence that can't
be reduced without also shortening the 2 week minimum.  The range 2-4
weeks seems like a plausible compromise.

If that is acceptable then waiting for the next alternate Tuesday,
such that the embargo period is >=14 days, would work, and we could
write that up as formal wording.

Thanks,
Ian.

-- 
Ian Jackson <ijackson@chiark.greenend.org.uk>   These opinions are my own.

If I emailed you from an address @fyvzl.net or @evade.org.uk, that is
a private address which bypasses my fierce spamfilter.

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel

^ permalink raw reply	[flat|nested] 14+ messages in thread

* Re: Possible improvement to Xen Security Response Process
  2017-01-20 19:21               ` Ian Jackson
@ 2017-01-23 11:30                 ` Jan Beulich
  2017-02-17 11:18                   ` Lars Kurth
  0 siblings, 1 reply; 14+ messages in thread
From: Jan Beulich @ 2017-01-23 11:30 UTC (permalink / raw)
  To: Ian Jackson
  Cc: committers@xenproject.org, xen-devel@lists.xen.org,
	Stefano Stabellini, Matthew Allen, James Bulpin

>>> On 20.01.17 at 20:21, <ijackson@chiark.greenend.org.uk> wrote:
> James Bulpin writes ("Re: [Xen-devel] Possible improvement to Xen Security 
> Response Process"):
>> , and the issue is considered to be of significant urgency due
>> to its severity, then the fourth Tuesday in the month should be
>> considered so long as this allows for a 14 day pre-disclosure
>> period" (or something like that).
> 
> I agree with Jan that this fuzziness is undesirable.  Also, more
> severe vulnerabilities are both more urgent to fix, and also have
> worse impact if released before people are ready, so severity is the
> wrong measure.  If there is any kind of measure that is relevant it is
> difficulty.
> 
> I'm writing here mostly with my personal hat, but my security team hat
> really dislikes ambiguity like this.  It leads to unclear
> decisionmaking and side discussions.
> 
> I would like the policy to specify a clear cutoff.  Jan, are you
> comfortable with a "default" of between 2 and 4 weeks' embargo,
> depending on the timing of the discovery etc. ?  Personally I think a
> 4 week maximum seems rather long, but with a 2 week cadence that can't
> be reduced without also shortening the 2 week minimum.  The range 2-4
> weeks seems like a plausible compromise.

Well, 4 weeks seems pretty much to me too. Especially during calm
periods I wonder if it wasn't better to limit the embargo period by
simply promising to have a minimum distance of two weeks between
public disclosures.

Jan


_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel

^ permalink raw reply	[flat|nested] 14+ messages in thread

* Re: Possible improvement to Xen Security Response Process
  2017-01-23 11:30                 ` Jan Beulich
@ 2017-02-17 11:18                   ` Lars Kurth
  0 siblings, 0 replies; 14+ messages in thread
From: Lars Kurth @ 2017-02-17 11:18 UTC (permalink / raw)
  To: Jan Beulich, Matthew Allen, James Bulpin
  Cc: Stefano Stabellini, committers@xenproject.org, Ian Jackson,
	xen-devel@lists.xen.org


> On 23 Jan 2017, at 11:30, Jan Beulich <jbeulich@suse.com> wrote:
> 
>>>> On 20.01.17 at 20:21, <ijackson@chiark.greenend.org.uk> wrote:
>> James Bulpin writes ("Re: [Xen-devel] Possible improvement to Xen Security 
>> Response Process"):
>>> , and the issue is considered to be of significant urgency due
>>> to its severity, then the fourth Tuesday in the month should be
>>> considered so long as this allows for a 14 day pre-disclosure
>>> period" (or something like that).
>> 
>> I agree with Jan that this fuzziness is undesirable.  Also, more
>> severe vulnerabilities are both more urgent to fix, and also have
>> worse impact if released before people are ready, so severity is the
>> wrong measure.  If there is any kind of measure that is relevant it is
>> difficulty.
>> 
>> I'm writing here mostly with my personal hat, but my security team hat
>> really dislikes ambiguity like this.  It leads to unclear
>> decisionmaking and side discussions.
>> 
>> I would like the policy to specify a clear cutoff.  Jan, are you
>> comfortable with a "default" of between 2 and 4 weeks' embargo,
>> depending on the timing of the discovery etc. ?  Personally I think a
>> 4 week maximum seems rather long, but with a 2 week cadence that can't
>> be reduced without also shortening the 2 week minimum.  The range 2-4
>> weeks seems like a plausible compromise.
> 
> Well, 4 weeks seems pretty much to me too. Especially during calm
> periods I wonder if it wasn't better to limit the embargo period by
> simply promising to have a minimum distance of two weeks between
> public disclosures.

I think what everyone agreed to was to always pre-disclose when
ready. So the proposal would only affect the public disclosure
date, unless
- we are talking about a 0-day
- the discoverer expresses other wishes

To summarise the thread, it seems to me that having a predictable 
schedule and batching is seen as a valuable thing. The sticky point 
is the timing.

1) 2 weeks may be too short - the point that was raised that
this could require reducing the embargo period. Another way of 
looking at this would be to always publish XSAs in the next batch, 
if a minimum of 14 days of pre-disclosure could not be guaranteed.
This would essentially increase the worst case scenario to 4 weeks.

2) 3 weeks wasn't discussed and may be a good compromise, although
it would not be as intuitive as every even/odd week or once a month.

3) 4 weeks or once a month may be too long - extending the 
embargo period to up to 6-7 weeks in the worst case scenario

4) I also know that Matthew keeps statistics and graphs on past XSAs, 
so he should be able to relatively easily model and share the impact 
of a fixed model public disclosure date based on the last few years
of data. He could create a model for each scenario, highlighting
- number of XSA's per date
- actual latency
Maybe that could inform the discussion.

The other thing is that to some degree we are speculating as to what
may or may not be acceptable to our user-base. If [4] does not
settle the question, maybe a survey would?

The other question we have not considered is longer term: how
does LivePatching fit into the picture? There may be a tension 
between those that already have and those that don't have
such capability. 

A concern was raised about the testing and validation of batched 
changes. That looks like a valid concern and may need some more
discussion. I think at this stage it is not clear how much of a 
real problem this would be. [4] would probably help settle this 
question.

Maybe Matthew could help pull [4] together?

Best Regards
Lars
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel

^ permalink raw reply	[flat|nested] 14+ messages in thread

end of thread, other threads:[~2017-02-17 11:18 UTC | newest]

Thread overview: 14+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2016-12-05 14:17 Possible improvement to Xen Security Response Process Matthew Allen
2016-12-05 15:00 ` Jan Beulich
2016-12-05 19:24   ` Stefano Stabellini
2016-12-06 14:54     ` Matthew Allen
2016-12-07 16:23       ` Ian Jackson
2016-12-12 17:11         ` Matthew Allen
2016-12-13  1:54           ` Anthony Liguori
2016-12-13  8:41           ` Jan Beulich
2017-01-04 11:58             ` James Bulpin
2017-01-04 13:01               ` Jan Beulich
2017-01-04 13:12                 ` James Bulpin
2017-01-20 19:21               ` Ian Jackson
2017-01-23 11:30                 ` Jan Beulich
2017-02-17 11:18                   ` Lars Kurth

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).