Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20230514202409.GA17111@openwall.com>
Date: Sun, 14 May 2023 22:24:09 +0200
From: Solar Designer <solar@...nwall.com>
To: oss-security@...ts.openwall.com
Subject: Re: Clarification on embargoed testing in a partner cloud

Hi Marc,

Thank you for bringing this up.  I'll share my current thoughts below.
I do not have a conclusion nor a decision yet, but I hope we'll arrive
at one in further discussion.

On Thu, May 11, 2023 at 07:36:44AM -0400, Marc Deslauriers wrote:
> The Ubuntu security team shares and obtains information about embargoed 
> issues from the distros and linux-distros mailing lists.
> 
> One of our large cloud partners has asked the Ubuntu security team to do 
> automated testing of embargoed security updates on their public cloud 
> before the CRD. While technically we would not be directly sharing details 
> of embargoed issues with them as the tests will be run under accounts owned 
> by the Ubuntu security team, they will be run on their infrastructure. As 
> such, this may hinder our ability to conduct a comprehensive internal 
> investigation of any leak that may occur.
> 
> I'm not exactly sure how this scenario fits within the policy of these 
> lists, and would like to validate before we go ahead. ( Policy can be found 
> here: https://oss-security.openwall.org/wiki/mailing-lists/distros )
> 
> Would testing embargoed updates obtained from the distros and linux-distros 
> lists on an external cloud infrastructure violate the terms of those 
> mailing lists?

I think this is a gray area.  The policy talks about not sharing beyond
the need-to-know for getting the issue fixed for your distro's users.
It also talks about not delivering or deploying.  However, usage of
cloud resources under the distro's accounts is not exactly sharing, and
testing in the target environment is relevant to getting the issue fixed
for the distro's users.

Sure this adds risks.  However, realistically we probably already do
have distros on the list that use a public cloud for some processing of
embargoed information.  At least Amazon Linux probably uses AWS -
probably dedicated instances with no other concurrent VMs on the same
hardware, but still.  (I am just guessing here.  Maybe it's more
separated from the public cloud.)

Also, some use third-party e-mail servers, e.g. domains pointing to
Gmail MX'es.  While mail relayed by (linux-)distros arrives encrypted
(except for headers), I doubt all other e-mail communication within the
distros' teams is - and if it is not, then they rely on a similar
security and legal boundary already (the distro's accounts with a
third-party provider).  If we don't consider sending e-mail through
Google servers as sharing with Google, then I guess usage of Google's
cloud is not sharing either.

Thus, it could be inconsistent to say that, no, Ubuntu cannot test in
the cloud while some other distros might be exposing the information to
similar cloud risks.  It would be wrong to penalize Ubuntu for asking.

Another angle is: what's the motivation for testing in the cloud?
I guess it's about compatibility with the cloud environment
(hypervisor?), so it is perhaps most relevant to testing of updates to
low-level components - especially the Linux kernel?  Well, we've granted
an exception allowing public commits of Linux kernel security fixes.
Can we at the same time reasonably object to testing of a distro's Linux
kernel updates under a public cloud account (thus, with more limited
exposure than the public commits have)?  Well, kind of yes since updates
can be more revealing than the public fixes - updates typically do
mention security relevance in change logs.  Also, this exception is made
use of only for a subset of Linux kernel issues handled on
linux-distros, not for all.

That said, maybe exposure of testing in the public cloud can be reduced
by only doing such testing for low-level packages, not for typical
userland packages that are not expected to be affected by whether they
run on Ubuntu's own servers and VMs vs. the cloud?

Yet another angle is where linux-distros itself is to be hosted.  So
far, I insist on non-cloud hosting.  Arguably, allowing for processing
of embargoed information in the cloud by the member distros is a reason
for me to give in and accept a cloud hosting offer.  OTOH, a distro's
usage of the cloud exposes somewhat different information to the risks
than the list's hosting would.  Only issues being handled by that distro
rather than all, sometimes only in processed form rather than original
(e.g., binary update packages vs. list messages), with some delay rather
than immediately, and no exposure of the list's long-term private key.

> Would testing embargoed updates on an external cloud 
> infrastructure be contrary to the expectations of the vendors posting 
> embargoed issues to those lists?

Not only "vendors" post embargoed issues to those lists.  I think we
shouldn't violate any sender's reasonable expectations.  That said,
vendor postings are an interesting subset.  Maybe other distro vendors
can comment on this, please?  Marcus from SUSE has already commented
(thanks!), but I think not yet on this specific aspect.

Alexander

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.