From owner-freebsd-questions@freebsd.org Fri Jul 5 06:07:09 2019 Return-Path: Delivered-To: freebsd-questions@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 0BD0115E5D90; Fri, 5 Jul 2019 06:07:09 +0000 (UTC) (envelope-from peter@rulingia.com) Received: from vtr.rulingia.com (vtr.rulingia.com [IPv6:2001:19f0:5801:ebe:5400:1ff:fe53:30fd]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "vtr.rulingia.com", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id DF19687196; Fri, 5 Jul 2019 06:07:07 +0000 (UTC) (envelope-from peter@rulingia.com) Received: from server.rulingia.com (ppp59-167-167-3.static.internode.on.net [59.167.167.3]) by vtr.rulingia.com (8.15.2/8.15.2) with ESMTPS id x6566w47076464 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Fri, 5 Jul 2019 16:07:03 +1000 (AEST) (envelope-from peter@rulingia.com) X-Bogosity: Ham, spamicity=0.000000 Received: from server.rulingia.com (localhost.rulingia.com [127.0.0.1]) by server.rulingia.com (8.15.2/8.15.2) with ESMTPS id x6566qO9005650 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Fri, 5 Jul 2019 16:06:52 +1000 (AEST) (envelope-from peter@server.rulingia.com) Received: (from peter@localhost) by server.rulingia.com (8.15.2/8.15.2/Submit) id x6566q9c005649; Fri, 5 Jul 2019 16:06:52 +1000 (AEST) (envelope-from peter) Date: Fri, 5 Jul 2019 16:06:52 +1000 From: Peter Jeremy To: grarpamp Cc: freebsd-security@freebsd.org, freebsd-questions@freebsd.org Subject: Re: Review of FreeBSD Security Advisory Process: Incl Heads Up, Dates, Etc [cont: 5599 SACK} Message-ID: <20190705060652.GA2974@server.rulingia.com> References: MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="vtzGhvizbBRQ85DL" Content-Disposition: inline In-Reply-To: X-PGP-Key: http://www.rulingia.com/keys/peter.pgp User-Agent: Mutt/1.12.0 (2019-05-25) X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 05 Jul 2019 06:07:09 -0000 --vtzGhvizbBRQ85DL Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On 2019-Jul-04 00:06:10 -0400, grarpamp wrote: >Continued from beginnings in: >https://lists.freebsd.org/pipermail/freebsd-security/2019-June/009996.html > >> I don't generally document a timeline of events from our side. > >There would be benefit to further transparency with >some new data fields in FreeBSD advisories, >leading to metrics analysis by userbase and project, >appropriate resource allocation efficacies, etc. Security Officer is a volunteer position and their time is valuable. What benefits would be gained by requiring them to do more work to provide information that is mostly already available elsewhere? >Date_Discovered: Date of original discovery by discoverer. This will be in the linked CVE. >Date_Received: Date project received notification (or >observed any info), regardless from external or internal source. How/why is this relevant? I agree that the project has been ignored in some cases but that is generally discussed separately. >Issue should also be posted heads up to lists at this Received >time. Definitely not. Early advice of vulnerabilities is very much "need to know= ". Unless someone's expertise is required to rectify the vulnerability, details regarding the vulnerability should remain private. The discoverers may choose to publish early information, in which case, the Project may choose to publicly reference that information. >Also ends up being a bit more efficient as fewer cycles need spent >on deciding and managing what to witholding timing sched contracts, >under whatever questionable premises readily found searching >net from thread above. To the extent any of this have possibly >applied in the past. Public announcement dates are generally not under Project control - where a vulnerability affects multiple vendors, there is almost always general agreement on a common announcement date. If the Project leaks information about unannounced vulnerabilities, it will stop receiving advance information about vulnerabilities - this definitely will adversely impact the Project. --=20 Peter Jeremy --vtzGhvizbBRQ85DL Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEE7rKYbDBnHnTmXCJ+FqWXoOSiCzQFAl0e6PRfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEVF QjI5ODZDMzA2NzFFNzRFNjVDMjI3RTE2QTU5N0EwRTRBMjBCMzQACgkQFqWXoOSi CzTGIBAAhGVuXkwZBmyot3uql88LVElS8HTNzNFWnSxJZmWTposSVjrer4W2nWlK 5lXb1y82Yccuq57BOrSxFLPzBh58/IuaedxB0tG6NhpDT6T3jYLJYfdi7993uJ/x eRs90GswHybFHSjC5YtFYw5ZP8+mro1LBw1gGZbD71ZNx93BCSWHjIuQLHECmWgo 3g5wCwnoj3dZxojECjzrPChDm/uEWysEQphH8pLNWtqcYgfx3m5LAu3jpsJHDDYn AONh3TAtb/5xVA00SAmiu1GqdCo/94nTuvcyMQgPxycWRRpNEHQ7x6e3pLLJk5lm jmt6bxqWmYzLBR9oeNFlD8lTld9J35SCB/X9pSK6PigQDXe2gpOED3wzSvP4/E8W xFzuqJFUmNn7dCyUT8Z4SuNp8bS7i3m8rvZCJNR98K2uQFuVSWE3L+e1JjtoTVde SitC0I9MZKe/ZbHoTJtcku+FSuL+ivyW185NRHPVTf7gKjJb2f2jVwvzpHPXAwN3 2o1JB8FuPIZ1X4gBUg1LK9mJgnN035wkJypGM/tYpjgqhyHcUm8VcllSYfBUiKZi b67N2IGPtS8Cv79MayQd6rpDTpVXppN85Q2r0PW7kssXhdKC7pgfLzl+f7huSHUz 6CEJE2QP/xa8oBABn2/HR7ZKqMY327fSR7M+fvjwWrGuq5mWORU= =mjnj -----END PGP SIGNATURE----- --vtzGhvizbBRQ85DL--