Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20170211233541.GA6315@openwall.com>
Date: Sun, 12 Feb 2017 00:35:41 +0100
From: Solar Designer <solar@...nwall.com>
To: oss-security@...ts.openwall.com
Subject: Re: MITRE is adding data intake to its CVE ID process

All - thank you for sharing your concerns in this thread.

FWIW, MITRE had notified me of this coming change a few days before the
oss-security posting, and I e-mailed them privately with some of the
same concerns and thoughts.

MITRE - thank you for responding to the concerns, and for all your
effort over the years.

On Fri, Feb 10, 2017 at 10:59:27PM -0500, cve-assign@...re.org wrote:
> C5. I want MITRE to send the https://cveform.mitre.org form data, and
> the CVE ID, to the oss-security list at the same time that these are
> sent to the requester.
> 
> R5. We have had internal discussions within MITRE about this. We are
> able to implement this easily if the community requires this approach.
> At the moment, we are expecting the requester to resend this
> information to oss-security once they accept their CVE ID assignment.

This sounds great.  Since a mailing list isn't great for polls (would be
too many messages), I ran this Twitter poll instead (not the exact same
community indeed, but I hope it's similar):

https://twitter.com/solardiz/status/830164779893395456

"When MITRE assigns a CVE ID to a public issue or once the issue is
public, should they automatically post to a mailing list?"

 5% No
63% Yes, to existing list(s)
29% Yes, to new list(s)
 3% Other

98 votes in 24 hours

There were no replies (besides the votes themselves), and no retweets.

So 92% of those who voted want such postings to go to some mailing
list(s).  63% want them to go to existing mailing list(s).  I suggest
that those existing lists be oss-security for Open Source software and
full-disclosure for other software (or for both?), although we'd need to
hear from the moderators of full-disclosure regarding the latter.  For
now, let's just say that we seem to want to have CVE ID assignments in
Open Source software to be automatically posted to oss-security.

MITRE - can you please implement that, and we'll see how it goes and
whether we need it adjusted or possibly discontinued if things go wrong
or if there's opposition (so far, there's almost none)?

> Please see http://www.openwall.com/lists/oss-security/2017/02/09/26
> for an example.

This is also an example of how the change breaks threading.  First,
there was a thread about the issue on the list.  Then there was CVE
request and assignment off-list.  And then there's this new thread on
the CVE assignment.

To MITRE's credit, in this very example above they did suggest to "reply
to your own oss-security post", which would then keep the thread.
Perhaps this should be emphasized more, and the rationale explained?

> C6. I want MITRE to send the https://cveform.mitre.org form data to
> the oss-security list as soon as that data is entered (i.e., before a
> CVE ID exists).
> 
> R6. We have had internal discussions within MITRE about this. We are
> not yet able to implement this easily. We may work on this if the
> community requires this approach. However, our understanding of CVE
> consumers is that they look to MITRE as a source of vulnerability
> information after a CVE ID number exists, not before.

Many people interested in timely access to vulnerability detail, and who
could contribute to discussions, are primarily not "CVE consumers".
For example, I am more interested in being notified of a potentially
relevant vulnerability than about it having a CVE ID number.

Anyway, let's try with the CVE assignments postings first and see how it
goes, especially given that it's easier for MITRE to implement.  It's
easier for the oss-security moderators too, as MITRE will have already
filtered out the spammy or otherwise unreasonable CVE requests (if any).

A related concern, though, is that this pre-CVE-assignment vulnerability
information is potentially valuable to attackers.  I also ran this other
Twitter poll a week earlier:

https://twitter.com/solardiz/status/828000469037547524

"Are you concerned about potential leaks from or misuse by MITRE of
non-public CVE request detail?"

14% Who's MITRE, what's CVE?
55% Yes: valid risk & concern
23% No: can't happen or is OK
 8% Other

394 votes in 24 hours

Many replies, including several people sharing anecdotal evidence of
MITRE's integrity (and none to the contrary).  14 retweets.

Thus, looks like a hotter topic than whether to post to mailing lists,
yet the results may be biased by me bringing this question up (someone
might not have been concerned before they read the question).

Alexander

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.