-
Notifications
You must be signed in to change notification settings - Fork 494
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
"Securing Your Installation" section of Installation Guide could cover ongoing security, advisories, private discussion #3215
Comments
I like the approach of the Drupal security board at https://www.drupal.org/security Likewise, the IQSS could setup a read only, authoritative public page one can subscribe to. So A date will give sysadmins time to plan in maintenance (so get people) and announce downtime. |
I too like the idea of having a security page where IQSS can detail the steps in plugging the hole if the patch is not available immediately and also if the user cannot upgrade to the latest version. I wanted to mention about how Microsoft issues security bulletin but I liked the idea of Lucien Van Wouw. Thanks Phil for asking. Regards
|
"Open source’s comparative advantage is in security: security is among the the most important features when using any kind of software (86% extremely or very important)." http://opensourcesurvey.org/2017/ |
@djbrooke this is the issue I mentioned this morning. |
@djbrooke as I mentioned, I'm thinking that as a first step, we could document our existing process somewhere around http://guides.dataverse.org/en/4.7.1/installation/config.html#securing-your-installation |
I had some comments on app security updates from a SysAdmin perspective which I shared with @pdurbin, and he suggested I log them here:
Hope that helps. |
@poikilotherm well, the SLOPI communication style is not appropriate for security:
I think we can treat security chat as a one off with a dedicated system, perhaps something like Secure Scuttlebutt? https://www.scuttlebutt.nz . Something with end to end encryption? Peer to peer? I'm open to ideas, of course! 😄 |
We could look at Matrix. Allows bridges to Slack, IRC, etc. Riot has support for encrypted rooms. Hosting an instance for Dataverse offers full control, yet federated usage. |
From a discussion today:
|
Yesterday at tech hours we talked about this issue, especially what the "definition of done" is such that it could be closed. In my mind, we should write docs. Toward that end, I created a draft called "Ongoing security of a Dataverse installation" here: https://docs.google.com/document/d/19ENaCF4dAvw5lRmd5jaler7RBT1T0BXQ53quwCQQHKU/edit?usp=sharing All you security-minded members of the community are especially welcome to help write this new section of the guides. Here's a preview of what I wrote so far: |
Made a google doc with stubs structuring what needs to be put int. Needs to be finished, reviewed, and QA'd. |
added to sprint Dec 15, 2022 |
I just wanted to note that yesterday I pinged @donsizemore and he stubbed out some additional content in the draft doc (thanks!): #3215 (comment) |
I just created this PR (feedback welcome!): |
document ongoing security and practices #3215
There's already a "Securing Your Installation" section of Installation Guide at http://guides.dataverse.org/en/4.4/installation/config.html#securing-your-installation but its focus is installation time, not ongoing security.
How should institutions who run Dataverse be alerted that they should upgrade as soon as possible to new versions of Dataverse that have security fixes?
Both @Venki18 and @lwo have mentioned that perhaps there should be some sort of mailing list that they and others could subscribe to who are interested in security (I'm looking at you @donsizemore).
Should the mailing list be "announce" style where people can't reply? This would be the Dataverse team sending security advisories. If the list is private, perhaps a pre-release announcement could be made that a security hole has been found and that a fix is being tested. This would give sysadmins a heads up that they should upgrade soon, once the release comes out.
Should the mailing list be "discussion" style instead, where subscribers could privately share findings related to security, such as results from security scans? (These should absolutely be sent first to [email protected] to open a private ticket as explained in CONTRIBUTING.md to start some tracking around the issue. This was originally discussed on the dataverse-community mailing list.)
Should there be a page at http://dataverse.org dedicated to security that the Installation Guide links to? That's really what this issue is about... what resources to link to about ongoing security, how to subscribe to advisories, etc.
First we need to decide if we should create any of the mailing lists or pages mentioned above. I'm sure others have ideas as well. Please leave comments here if you have any thoughts or suggestions!
The text was updated successfully, but these errors were encountered: