Date: Tue, 23 Aug 2016 08:08:12 -0500 From: Weldon Godfrey <weldon@excelsusphoto.com> To: freebsd-security@freebsd.org Subject: Re: Ports EOL vuxml entry Message-ID: <80eda92991512e9c50915536e7793396@excelsusphoto.com>
next in thread | raw e-mail | index | archive | help
Gerhard Schmidt <schmidt@ze.tum.de> wrote: > Is an outdated (EOL) port a vulnerability? I don't think so. It's a > possible vulnerability, but not a real one. An EOL product is typically no longer tracked, analyzed, and corrected for security vulnerabilities. With this higher risk profile, it is correct to assume it is vulnerable or at least a higher security risk. Since a clean report from pkg audit with EOL packages on the system will mislead the vast majority of end-users that they have a lower risk security profile. It is correct for pkg audit to warn on EOL packages. Especially since any actual vulnerabilities, that is almost certain to come up, will likely never show on a future report. From owner-freebsd-security@freebsd.org Tue Aug 23 15:02:50 2016 Return-Path: <owner-freebsd-security@freebsd.org> Delivered-To: freebsd-security@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 80F1EBC3434 for <freebsd-security@mailman.ysv.freebsd.org>; Tue, 23 Aug 2016 15:02:50 +0000 (UTC) (envelope-from koobs.freebsd@gmail.com) Received: from mail-pf0-x22b.google.com (mail-pf0-x22b.google.com [IPv6:2607:f8b0:400e:c00::22b]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4EAAF123D for <freebsd-security@freebsd.org>; Tue, 23 Aug 2016 15:02:50 +0000 (UTC) (envelope-from koobs.freebsd@gmail.com) Received: by mail-pf0-x22b.google.com with SMTP id y134so44577188pfg.0 for <freebsd-security@freebsd.org>; Tue, 23 Aug 2016 08:02:50 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=sender:reply-to:subject:references:to:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=kH19lsfnXcT8QjRlL8ZaDmwt5+79+ekznZIWvmCydDU=; b=HkQ4PImw4ucWaQ3zEAOIueildFbysBOuTjhX1I2mNVYpHaFiGQquESf01cplKH1ZOO 7HymfMMRAYsZvRInivJ3ugulSJmxK5k4UwFwn6QE/PnZCCut/roI2x4nOlBP5V5wRb18 ixxD/IqprWqyLffB0aX/+g644xvm8SOcf6q8d5KjJFSWUW6j5H7+KtWBe0gOoPxPrPc1 Y9w6jbncEPfLEKV56/kkGqKNv3jcwzSq8MoEhW6RSSVWVOK/48B58n3NNyqT2So4ZWgh YofM15egDdefHjuNGT1ObWFsOlQOTCtGuZLAs5so81xOQ4Y0IflRCtzDe6fvG7ATyNLk jh+g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:sender:reply-to:subject:references:to:from :message-id:date:user-agent:mime-version:in-reply-to :content-language:content-transfer-encoding; bh=kH19lsfnXcT8QjRlL8ZaDmwt5+79+ekznZIWvmCydDU=; b=mZ3t0lfsZvY7c41kCvyu5VPEFLZvuBadIL/lnyAwOPX+ov3uuYt6c96fXf/AXfCObT urITntMYea46fihltAnZLMPtpAjbBHdPYHcQsNiB5sICPspDgDeUhBaTmA6PyLdU5+sZ K8J9db9tpf5HC6uRRT+ro1SYKk4Ar6ZxBJ6OptYCbNwtWQKxOYysavnTJsaMeL0/2e88 cydW/FJ6Bf1Ik4KB8ZLuJlDYHihY9p28BndQZHebNAvy9P0NVYFHsJVd0kEXTaTFlg0o 9nSueLrANO322BhHu5vFkLWu052auOhYP/hDiK0QrFz+kpj5a/ZqN9vRaCbCVB9Rbtjt aDrg== X-Gm-Message-State: AEkoousBLLhpTFAHa/aPkuSlk4WW7ekHoH8rd4byEMWPg8pQWHth6/mUGWM6OMNK/htQXw== X-Received: by 10.98.192.144 with SMTP id g16mr54613615pfk.55.1471964569208; Tue, 23 Aug 2016 08:02:49 -0700 (PDT) Received: from ?IPv6:2001:44b8:31ae:7b01:1c1a:5103:265d:bfaf? (2001-44b8-31ae-7b01-1c1a-5103-265d-bfaf.static.ipv6.internode.on.net. [2001:44b8:31ae:7b01:1c1a:5103:265d:bfaf]) by smtp.gmail.com with ESMTPSA id y9sm6526841pay.25.2016.08.23.08.02.46 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Tue, 23 Aug 2016 08:02:48 -0700 (PDT) Sender: Kubilay Kocak <koobs.freebsd@gmail.com> Reply-To: koobs@FreeBSD.org Subject: Re: Ports EOL vuxml entry References: <80eda92991512e9c50915536e7793396@excelsusphoto.com> To: Weldon Godfrey <weldon@excelsusphoto.com>, freebsd-security@freebsd.org From: Kubilay Kocak <koobs@FreeBSD.org> Message-ID: <8a222379-442d-b77d-e96d-27a556f798df@FreeBSD.org> Date: Wed, 24 Aug 2016 01:02:42 +1000 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:50.0) Gecko/20100101 Thunderbird/50.0a2 MIME-Version: 1.0 In-Reply-To: <80eda92991512e9c50915536e7793396@excelsusphoto.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.22 Precedence: list List-Id: "Security issues \[members-only posting\]" <freebsd-security.freebsd.org> List-Unsubscribe: <https://lists.freebsd.org/mailman/options/freebsd-security>, <mailto:freebsd-security-request@freebsd.org?subject=unsubscribe> List-Archive: <http://lists.freebsd.org/pipermail/freebsd-security/> List-Post: <mailto:freebsd-security@freebsd.org> List-Help: <mailto:freebsd-security-request@freebsd.org?subject=help> List-Subscribe: <https://lists.freebsd.org/mailman/listinfo/freebsd-security>, <mailto:freebsd-security-request@freebsd.org?subject=subscribe> X-List-Received-Date: Tue, 23 Aug 2016 15:02:50 -0000 On 23/08/2016 11:08 PM, Weldon Godfrey wrote: > Gerhard Schmidt <schmidt@ze.tum.de> wrote: > >> Is an outdated (EOL) port a vulnerability? I don't think so. It's >> a possible vulnerability, but not a real one. > > An EOL product is typically no longer tracked, analyzed, and > corrected for security vulnerabilities. With this higher risk > profile, it is correct to assume it is vulnerable or at least a > higher security risk. Since a clean report from pkg audit with EOL > packages on the system will mislead the vast majority of end-users > that they have a lower risk security profile. It is correct for pkg > audit to warn on EOL packages. Especially since any actual > vulnerabilities, that is almost certain to come up, will likely never > show on a future report. This (good) argument sounds primarily about classification and/or the ability or lack thereof to distinguish between types-of-things, which are not identical: * Explicit vulnerability ("Active", Official record (CVE, etc), will or likely/expected to be fixed) * Implicit (probable) vulnerability (by way of EoL, no fixes/support, may have CVE (forever), port/pkg deleted, etc) VuXML is about declaring/documenting vulnerabilities yes, but it's also about arming users with the information they need to make sound security decisions. Being prescriptive in *either* case is not really telling the full truth and feels unsatisfying. If and when we delete ports/packages of still-upstream-supported software (say they are BROKEN in latest FreeBSD versions) that have an active CVE's now or ever in the future, are they "vulnerable" according to what we want if a user has them installed? Should they be listed? Having said that, VuXML is a 'vulnerability markup language', and without an actual and explicit 'vulnerability', should it be listed? On solutions, perhaps this is a simple matter of --exclude-{deleted,eol,<type>} or similar in pkg audit to tell the difference, allowing the user to make *note* of differences, and decide accordingly. I shall avoid the bikeshed on what the default should be. Or maybe an EoLXML. Read this generically as: a second or multiple data 'sources' for pkg audit, for auditing different things. Just free thinking here. ./koobs
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?80eda92991512e9c50915536e7793396>