|
Message-ID: <652920e5.c80a0220.3bcf7.2251@mx.google.com> Date: Fri, 13 Oct 2023 03:50:13 -0700 (PDT) From: Neal Gompa <ngompa13@...il.com> To: oss-security@...ts.openwall.com Subject: Re: linux-distros list membership application - CIQ Rocky Linux Security Team On Wed, Oct 11, 2023 at 10:00 AM Solar Designer <solar@...nwall.com> wrote: > > Hi, > > I'd appreciate others in here (especially "someone already on the > private list, or at least someone else who has been active on > oss-security for years but is not affiliated") helping review the > application below. Normally, I'd just accept an application like this > based on it fitting the criteria (per my review) and lack of objections, > however for my own application it would be best to hear from others. > > Meanwhile, the Security SIG has started functioning and has been > announced on its own: > > https://rockylinux.org/pl/news/security-sig-update/ > https://sig-security.rocky.page > While I have not been subscribed to this mailing list for long, I have "lurked" for a while as part of doing work in Fedora, Mageia, and openSUSE. Feel free to take my opinion with as much salt as you'd like, but I do not believe that Rocky Linux qualifies for it. My rationale is given inline below. > > On Sun, Oct 01, 2023 at 03:02:23PM +0200, Solar Designer wrote: > > Hi, > > > > Rocky Linux is a prominent Enterprise Linux distribution in the spirit > > of original goals of the CentOS project, founded by Gregory Kurtzer, who > > had also co-founded CentOS and is founder and CEO of the primary > > corporate sponsor of the Rocky Linux project, CIQ: > > > > https://rockylinux.org > > https://ciq.com > > > > Besides heavily sponsoring Rocky Linux (yet without being its owner), > > CIQ also has its own Open Source and commercial offerings: > > > > "Our software stack consists of Rocky Linux the CentOS replacement, > > Apptainer the container solution of choice for HPC, Warewulf a > > provisioning and cluster management solution, and Fuzzball our > > next-generation performance computing platform that is multi-cloud, > > multi-site, multi-cluster, and multi-node." > > > > Most relevant here, CIQ maintains LTS branches of Rocky Linux point > > releases (such as of 8.6 when current is 8.8), providing security > > updates to those of its customers who wish to otherwise stay at a given > > point release. > > > > Further, the Rocky Linux project isn't limited to being a resurrection > > of CentOS (its packages being bug-for-bug compatible with RHEL), but > > also has a number of Special Interest Groups (SIGs) offering additional > > package repositories: > > > > https://wiki.rockylinux.org/special_interest_groups/ > > > > I have recently joined this effort and we're now getting the Security > > SIG going. This means an optional repository of extra packages for > > Enterprise Linux distros adding security features and even overriding > > some packages with hardened alternatives. We already have a few > > packages of both kinds, and many more are planned. If anyone else wants > > to join this effort - in any capacity including development, > > maintenance, testing, documentation, or something else - let me know! > > > > This application is for CIQ Rocky Linux Security Team, which means CIQ > > employees, (sub)contractors, and/or Rocky Linux project contributors > > trusted and tasked with producing security updates for Rocky Linux, > > CIQ's LTS branches of Rocky Linux, and possibly CIQ's other offerings > > building upon Rocky Linux. > > > > I address the 9 membership criteria below: > > > > > Be an actively maintained Unix-like operating system distro with substantial use of Open Source components > > > > Rocky Linux has been actively maintained since its release in 2021, and > > is an Open Source project. Many of CIQ's additional offerings are also > > Open Source projects on their own. > > > > > Have a userbase not limited to your own organization > > > > Rocky Linux has been publicly available since its release in 2021, and > > per EPEL repository access statistics has gained a userbase on par with > > other major EL distributions: > > > > https://ciq.com/blog/tracking-rocky-linux-growth-using-fedoras-epel-project/ > > https://brentk.io/thoughts/analysis/epel-distribution-statistics.html > > https://rocky-stats.tiuxo.com > > > > Further, CIQ has its customer base for Rocky Linux support, including > > for the LTS branches. > > > > > Have a publicly verifiable track record, dating back at least 1 year and continuing to present day, of fixing security issues (including some that had been handled on (linux-)distros, meaning that membership would have been relevant to you) and releasing the fixes within 10 days (and preferably much less than that) of the issues being made public (if it takes you ages to fix an issue, your users wouldn't substantially benefit from the additional time, often around 7 days and sometimes up to 14 days, that list membership could give you) > > > > The publicly verifiable track record currently consists of timely > > rebuild and re-release of RHEL security update packages and security > > advisories, as published here: > > > > https://errata.rockylinux.org > > > > Not currently verifiable publicly, but Gregory further tells me: > > > > "We've been doing LTS privately to our customers for over a year now. > > This means we maintain security fixes for customers who need long term > > support for point releases." > > >>From my point of view, this does not count. Rocky's public track record of rebuilding RHEL updates and shipping them in a timely fashion does not indicate that Rocky/CIQ can respond effectively when you have a craft updates from scratch. Furthermore, there are public posts and articles indicating that Rocky Linux/CIQ has trouble with shipping updates in a timely fashion at all. Examples on updates: https://forums.rockylinux.org/t/some-errata-missing-in-comparison-with-rhel-and-almalinux/3843 https://forums.rockylinux.org/t/rocky-linux-9-errata-missing-late-8-errata/6890 https://forums.rockylinux.org/t/errata-rockylinux-org-not-updated-since-sep-02-2022/7676 Example on releases: https://www.theregister.com/2022/07/18/rocky_linux_9/ > > > Not be (only) downstream or a rebuild of another distro (or else we need convincing additional justification of how the list membership would enable you to release fixes sooner, presumably not relying on the upstream distro having released their fixes first?) > > > > Besides being a "downstream or a rebuild of another distro", CIQ has its > > LTS branches and Rocky Linux has its additional and replacement packages > > via the SIGs. Security maintenance for these should be provided by CIQ > > and Rocky Linux. > > Special interest groups cannot count because they are intended to be public community projects. Unless you're saying that all Rocky Linux SIGs are shadows of CIQ work that can be held back for public consumption, that is effectively out of scope for consideration. Otherwise, Fedora and CentOS SIGs would be eligible for linux-distros@ (and my understanding is that they are not). I will also note that CIQ/RESF/Rocky have made public statements about maintaining the pure-rebuild nature of the distribution, which I believe summarily disqualifies it. https://ciq.com/blog/rhel-changes-what-it-means-for-ciq/ https://rockylinux.org/news/2023-06-22-press-release/ https://rockylinux.org/news/brave-new-world-path-forward/ https://rockylinux.org/news/keeping-open-source-open/ > > Some security issues in upstream packages may be mitigated or fixed by > > pushing "security override" packages via CIQ's customer-facing repos and > > the Security SIG repos, without waiting on upstream distro's fixes and > > for issues or point releases where no upstream fixes are expected. > > > > Related previously accepted membership application (precedent) is > > CloudLinux's, which is now perhaps best known for AlmaLinux, another > > prominent EL distribution: > > > > http://www.openwall.com/lists/oss-security/2017/07/02/2 > > CloudLinux's membership was based on the fact that they replaced and maintained a very large chunk of the distribution for their own purpose. They used a RHEL compatible userland, but most of the server software stacks and the kernel were replaced with their own builds. They wanted access for the maintenance of that stuff, which is very reasonable. Rocky/CIQ has not demonstrated a similar need from my point of view. > > Also, CentOS was once a member. > > CentOS was a very strange project in that it operated in a very closed fashion and it was difficult for volunteers to join the effort. I do not pretend to know if the current rules existed when CentOS was a member, but I would not accept them today on the basis that it's effectively a RHEL build. Fedora is not a member because there is no mechanism in the project to hide anything from the community. For this reason, I have not considered joining as a representative of CentOS Hyperscale, Mageia, or Fedora (all distributions that I do participate in security response for). > > > Be a participant and preferably an active contributor in relevant public communities (most notably, if you're not watching for issues being made public on oss-security, which are a superset of those that had been handled on (linux-)distros, then there's no valid reason for you to be on (linux-)distros) > > > > I have been a participant on oss-security since its inception, and have > > made relevant contributions. Others with CIQ and Rocky Linux are also > > involved in various communities, and we'll ensure that the team to be > > subscribed to linux-distros isn't blind to publicly disclosed issues. > > > > > Accept the list policy > > > > CIQ Rocky Linux Security Team accepts the linux-distros list policy. > > > > > Be able and willing to contribute back, preferably in specific ways announced in advance (so that you're responsible for a specific area and so that we know what to expect from which member), and demonstrate actual contributions once you've been a member for a while > > > > I've been contributing to oss-security and linux-distros since their > > inception. We'll also look for additional ways CIQ and/or Rocky Linux > > can contribute, depending on expertise, interests, other related duties, > > and availability of specific people we may add. > > > > > Be able and willing to handle PGP-encrypted e-mail > > > > Of course. I am already subscribed with my PGP key. > > > > My current subscription is as list admin and it also was for Openwall. > > Openwall no longer qualifies for linux-distros membership as a distro > > since we've effectively EOL'ed the Openwall GNU/*/Linux distro (we still > > do maintain many other projects, but not a full distro). However, I > > and/or someone else from Openwall would have needed to stay subscribed > > as list admin anyway. > > > > With my new Rocky Linux role, my subscription's purpose will once again > > double as list admin and for the distro. > > > > > Have someone already on the private list, or at least someone else who has been active on oss-security for years but is not affiliated with your distro nor your organization, vouch for at least one of the people requesting membership on behalf of your distro (then that one vouched-for person will be able to vouch for others on your team, in case you'd like multiple people subscribed) > > > > I suppose someone in here can vouch for me. Please do - ideally, if you > > also have something else to say on this application in the same message, > > not to spam list members with messages solely to meet this formality. > > > > I may then get additional CIQ and/or Rocky Linux people subscribed, > > effectively vouching for them, after making sure they understand and > > accept the list policy. > > While I certainly recognize you and value your contributions over the years, I do not feel that you alone is sufficient for Rocky/CIQ to be accepted onto linux-distros@. -- 真実はいつも一つ!/ Always, there's only one truth!
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.