security at ovirt.org mailing list

Carl Trieloff cctrieloff at redhat.com
Wed Nov 9 14:31:01 UTC 2011


On 11/09/2011 02:43 AM, Doron Fediuck wrote:
> On Wednesday 09 November 2011 08:38:31 Chris Wright wrote:
>> * David Jorm (djorm at redhat.com) wrote:
>>> Hi All
>>>
>>> I would like to create a security at ovirt.org mailing list. The list would be used to capture reports of security flaws affecting projects under the oVirt umbrella, not for general security discussion. I would then like to create a security page on the wiki, mentioning this list and encouraging people to report flaws. The list should be private, with approval required to subscribe. I would like one of the initial subscribers to be secalert at redhat.com. All messages sent to this address result in an RT ticket in the Red Hat Security Response Team (SRT) queue. SRT looks at all of these tickets within one business day.
>>>
>>> What does everyone think of this idea?
>> Formalizing something re: security and ovirt is a great idea, thanks for
>> proposing.  Two thoughts on the topic...
>>
>> Often projects have a security@ private list w/ just key core developers
>> subscribed.  I'm not fundamentally opposed to secalert being subscribed,
>> but it does set a precedent that distros' security teams may expect to
>> be involved rather than notified via somehting like oss-security.
>>
>> The other thing to consider is that ovirt is an umbrella organization for
>> multiple projects.  It's possible that each project should have a security
>> contact of its own, e.g. do VDSM, webui, or ovirt node developers need
>> to be on a private list discussing ovirt-engine security vulnerabilities
>> (from the point of view of information leak concerns)?
>>
>> thanks,
>> -chris
> I agree we should have a list, in one way or another. I also agree with some of the
> issues Chris raised. A few more points needs to be addressed;
>
> Some form of segregation of the projects is needed, however we cannot completely block information
> sharing since some components may share flaws, and need co-operation to resolve such issues.
> For instance think of a flaw in the API between engine-core and REST API or UI; all share 
> pieces of code today. Think of a problem in the API between VDSM and engine-core. These will
> all require both sides in order to resolve the issue, and complete segregation will make this
> hard to resolve.
>
> One more thing, back at the workshop we discussed the nature of ovirt-node project. IE- will
> it remain based on RHEL / Fedora as it is today, or will it become a special packaging project,
> allowing suse-ovirt-node and ubuntu-ovirt-node. I'm not going into the discussion now, but
> in case we'll have suse or ubunto nodes, CVE's may affect the actual distro, so this should
> be carefully examined.

I think as long as the key members from each project are on the list,
and it is oVirt project wide I think it will work. If we do a private
list we can control the subscriptions to maintainers or something like
that.  I would be interested to know if any projects have a public
security list. I don't know of any, but am going to google around a bit.

Carl.



More information about the Board mailing list