Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

"Securing Your Installation" section of Installation Guide could cover ongoing security, advisories, private discussion #3215

Closed
pdurbin opened this issue Jul 21, 2016 · 17 comments · Fixed by #9241
Labels
Feature: Installation Guide Size: 10 A percentage of a sprint. 7 hours.
Milestone

Comments

@pdurbin
Copy link
Member

pdurbin commented Jul 21, 2016

There's already a "Securing Your Installation" section of Installation Guide at http://guides.dataverse.org/en/4.4/installation/config.html#securing-your-installation but its focus is installation time, not ongoing security.

How should institutions who run Dataverse be alerted that they should upgrade as soon as possible to new versions of Dataverse that have security fixes?

Both @Venki18 and @lwo have mentioned that perhaps there should be some sort of mailing list that they and others could subscribe to who are interested in security (I'm looking at you @donsizemore).

Should the mailing list be "announce" style where people can't reply? This would be the Dataverse team sending security advisories. If the list is private, perhaps a pre-release announcement could be made that a security hole has been found and that a fix is being tested. This would give sysadmins a heads up that they should upgrade soon, once the release comes out.

Should the mailing list be "discussion" style instead, where subscribers could privately share findings related to security, such as results from security scans? (These should absolutely be sent first to [email protected] to open a private ticket as explained in CONTRIBUTING.md to start some tracking around the issue. This was originally discussed on the dataverse-community mailing list.)

Should there be a page at http://dataverse.org dedicated to security that the Installation Guide links to? That's really what this issue is about... what resources to link to about ongoing security, how to subscribe to advisories, etc.

First we need to decide if we should create any of the mailing lists or pages mentioned above. I'm sure others have ideas as well. Please leave comments here if you have any thoughts or suggestions!

@lwo
Copy link

lwo commented Jul 21, 2016

I like the approach of the Drupal security board at https://www.drupal.org/security

Likewise, the IQSS could setup a read only, authoritative public page one can subscribe to. So
when a security issue arises via other channels ([email protected]), the IQSS can prepare the fix and then use the page to describe the security issue, the versions affected and a date for when the fix is published; or if not a fix then ways to mitigate against the problem before it is repaired.

A date will give sysadmins time to plan in maintenance (so get people) and announce downtime.

@Venki18
Copy link

Venki18 commented Jul 25, 2016

I too like the idea of having a security page where IQSS can detail the steps in plugging the hole if the patch is not available immediately and also if the user cannot upgrade to the latest version.

I wanted to mention about how Microsoft issues security bulletin but I liked the idea of Lucien Van Wouw.

Thanks Phil for asking.

Regards
Venki

On 22 Jul 2016, at 12:46 AM, Lucien van Wouw [email protected] wrote:

I like the approach of the Drupal security board at https://www.drupal.org/security https://www.drupal.org/security
Likewise, the IQSS could setup a read only, authoritative public page one can subscribe to. So
when a security issue arises via other channels ([email protected] mailto:[email protected]), the IQSS can prepare the fix and then use the page to describe the security issue, the versions affected and a date for when the fix is published; or if not a fix then ways to mitigate against the problem before it is repaired.

A date will give sysadmins time to plan in maintenance (so get people) and announce downtime.


You are receiving this because you were mentioned.
Reply to this email directly, view it on GitHub #3215 (comment), or mute the thread https://github.com/notifications/unsubscribe-auth/ASs_ciWDn0bf86jWuotToGM2WptieiU7ks5qX6J7gaJpZM4JR5Ra.

@pdurbin
Copy link
Member Author

pdurbin commented Jun 28, 2017

I still like this idea but people aren't exactly clamoring for it. Thanks for your feedback @Venki18 and @lwo . Closing.

@pdurbin
Copy link
Member Author

pdurbin commented Jul 2, 2017

"Open source’s comparative advantage is in security: security is among the the most important features when using any kind of software (86% extremely or very important)." http://opensourcesurvey.org/2017/

screen shot 2017-07-01 at 9 57 01 pm

@pdurbin
Copy link
Member Author

pdurbin commented Jul 6, 2017

@djbrooke this is the issue I mentioned this morning.

@pdurbin
Copy link
Member Author

pdurbin commented Jul 28, 2017

@djbrooke as I mentioned, I'm thinking that as a first step, we could document our existing process somewhere around http://guides.dataverse.org/en/4.7.1/installation/config.html#securing-your-installation

@whorka
Copy link

whorka commented Oct 20, 2017

I had some comments on app security updates from a SysAdmin perspective which I shared with @pdurbin, and he suggested I log them here:

  • I like the idea of a security announcement (announcements only) mailing list.

    • A merged announcement+discussion list could work for small installations where the service admin is also responsible for security, but a separate announcement list will elevate the visibility of security announcements and would be more useful to larger installations with a separate SecOps or InfoSec team.
    • Email announcement is still the standard for security updates. See e.g. the Oracle quarterly patch updates for Glassfish et al. Also, there's evidence that Danny's previous email security announcement was taken to heart by its recipients; see e.g. Glassfish admin console directory traversal exposes file system resources jhu-sheridan-libraries/dataverse-ansible-role#1
  • In-app security checks are also a popular way to announce updates (e.g. Chrome and Firefox). For web apps, I like the way that Jenkins does it: it periodically checks for updates in the background (both core and plugins), and if you log in as an admin it shows a notification area which informs you about available updates (and even gives you a 1-click upgrade option for all the installed plugins). The notification shows as a red icon at the top of every page near the "logout" link.

  • How you announce updates is also a serious consideration. For instance, if you've been following the KRACK vulnerability, it was discovered months ago but kept under wraps to allow developers time to make patches. OpenBSD wasn't happy with this arrangement, however, and pushed out a patch early, which could have spilled the beans to the whole world. Now the discoverer says they won't be giving OpenBSD advanced notice in the future.

    • Targeted disclosures like this are the norm when disclosing vulnerabilities about other developers' products, but the same can apply when announcing vulnerabilities in your own product. Using Jenkins as an example again, they recently sent out an email to their security announcement list, giving all subscribed Jenkins admins a 1-week heads-up that there was a major security update. That was really helpful, since it gave us some time to plan ahead and schedule.

Hope that helps.

@poikilotherm
Copy link
Contributor

On IRC today @pdurbin requested to leave a comment here on "where to discuss sec matters".
To paraphraze: can someone (e. g. GDCC) throw money on this problem and get us a (SLOPI) chat system free for anyone interested?

@pdurbin
Copy link
Member Author

pdurbin commented Nov 6, 2019

@poikilotherm well, the SLOPI communication style is not appropriate for security:

"While open source projects should endeavor to communicate in the SLOPI style whenever possible (as discussed in issue pdurbin/slopi-communication#12 ), this style is inappropriate for security, code of conduct violations, and telling co-workers on your floor that you brought in donuts."

-- https://github.com/good-labs/slopi-communication/blob/e67863691e12c61ae407b6bae3ecdf0a03468080/README.md

I think we can treat security chat as a one off with a dedicated system, perhaps something like Secure Scuttlebutt? https://www.scuttlebutt.nz . Something with end to end encryption? Peer to peer? I'm open to ideas, of course! 😄

@pdurbin pdurbin reopened this Nov 6, 2019
@poikilotherm
Copy link
Contributor

We could look at Matrix. Allows bridges to Slack, IRC, etc. Riot has support for encrypted rooms. Hosting an instance for Dataverse offers full control, yet federated usage.

@donsizemore
Copy link
Contributor

I would be interested in seeing Dataverse maintain a security advisory page, perhaps by making use of GitHub's somewhat new built-in functionality:

Screen Shot 2022-03-28 at 14 03 10

@mreekie
Copy link

mreekie commented Aug 24, 2022

From a discussion today:

@mreekie mreekie moved this to NIH bklog#000 (Stefano) in IQSS Dataverse Project Nov 7, 2022
@mreekie mreekie moved this from NIH bklog#000 (Stefano) to Dataverse Team (Gustavo) in IQSS Dataverse Project Nov 7, 2022
@pdurbin
Copy link
Member Author

pdurbin commented Nov 9, 2022

Yesterday at tech hours we talked about this issue, especially what the "definition of done" is such that it could be closed.

In my mind, we should write docs.

Toward that end, I created a draft called "Ongoing security of a Dataverse installation" here: https://docs.google.com/document/d/19ENaCF4dAvw5lRmd5jaler7RBT1T0BXQ53quwCQQHKU/edit?usp=sharing

All you security-minded members of the community are especially welcome to help write this new section of the guides. Here's a preview of what I wrote so far:

Screen Shot 2022-11-09 at 10 36 11 AM

@mreekie mreekie moved this from Dataverse Team (Gustavo) to 1️⃣ ▶ORDERED BACKLOG (Stefano) in IQSS Dataverse Project Nov 29, 2022
@mreekie mreekie moved this from 1️⃣ ▶ORDERED BACKLOG (Stefano) to 2️⃣▶ SPRINT PREP (Tech discussion/Sizing) in IQSS Dataverse Project Nov 30, 2022
@mreekie
Copy link

mreekie commented Nov 30, 2022

Made a google doc with stubs structuring what needs to be put int.
Contents are started in the google doc.

Needs to be finished, reviewed, and QA'd.
Phil has worked this.
Anyone on the team can do this.
It seems like about a day of work to get this finished, reviewed and QA'd.

@mreekie mreekie added the Size: 10 A percentage of a sprint. 7 hours. label Nov 30, 2022
@mreekie mreekie moved this from 2️⃣▶ SPRINT PREP (Tech discussion/Sizing) to 3️⃣▶ 💨👟SPRINT READY in IQSS Dataverse Project Nov 30, 2022
@mreekie mreekie moved this from 3️⃣▶ 💨👟SPRINT READY BACKLOG to 4️⃣▶🏁In a Sprint in IQSS Dataverse Project Dec 14, 2022
@mreekie mreekie moved this from 4️⃣▶🏁In a Sprint to 3️⃣▶ 💨👟SPRINT READY BACKLOG in IQSS Dataverse Project Dec 14, 2022
@mreekie mreekie moved this from 3️⃣▶ 💨👟SPRINT READY BACKLOG to 4️⃣▶🏁In a Sprint in IQSS Dataverse Project Dec 14, 2022
@mreekie
Copy link

mreekie commented Dec 14, 2022

added to sprint Dec 15, 2022

@mreekie mreekie moved this from 5▶🏁Been In a Sprint to 4▶⏱In This Sprint in IQSS Dataverse Project Dec 14, 2022
@pdurbin
Copy link
Member Author

pdurbin commented Dec 16, 2022

I just wanted to note that yesterday I pinged @donsizemore and he stubbed out some additional content in the draft doc (thanks!): #3215 (comment)

@pdurbin
Copy link
Member Author

pdurbin commented Dec 20, 2022

I just created this PR (feedback welcome!):

@pdurbin pdurbin removed their assignment Dec 20, 2022
kcondon added a commit that referenced this issue Jan 3, 2023
document ongoing security and practices #3215
@github-project-automation github-project-automation bot moved this from 4️⃣▶⏱In This Sprint to 5️⃣▶🏁Been In a Sprint in IQSS Dataverse Project Jan 3, 2023
@pdurbin pdurbin added this to the 5.13 milestone Jan 3, 2023
@mreekie mreekie moved this to 🚮Clear of the Backlog in IQSS Dataverse Project Jan 28, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Feature: Installation Guide Size: 10 A percentage of a sprint. 7 hours.
Projects
Status: No status
Development

Successfully merging a pull request may close this issue.

7 participants