Dedicated security SIG

Hi,

[ Not relevant at this stage/phase, so this is rather that it isn’t forgotten somewhere along the line in the future. ]

tl;dr: security (updates) were always a bit of a … let’s say, rather poor-cared for thing in nixpkgs.
E.g. delroth did quite a lot on this topic and also held a talk about Remediating thousands of untracked security vulnerabilities in nixpkgs at FOSDEM this year, just to give one good example.

This is certainly something that can be improved upon.

So a SIG for anything-security is very much needed I think, just like for any (bigger) project and especially for a distribution. The exact scope of its responsibilities need to be laid out detailed IMHO, which can and need to be adaptable as the project grows.

Some key responsibilities probably should be something like:

  • Monitoring/be part of the oss-security mailing list and eventually also its distros list, if possible?
  • Quick responses for vulnerable packages, providing timely updates. Most critical ones are core packages and complex applications like web browsers.
    As a practical example: I maintain a Firefox fork in nixpkgs and there are quite some (unwritten) rules about them, one being e.g. that updates must be within seven days of them becoming available, to address any (potential) vulnerabilities.
  • Although CVEs are quite over-reaching these days, real ones need to be addressed as well. Long-term; own CNA? (see e.g. why curl became its own CNA)
  • Separate security contact for responsible disclosure from third-parties?

These are just some points to get started, but having a dedicated team handling this matter is important in some way or another.

Cheers,
Christoph

11 Likes

I completely agree, let me get a group started.

3 Likes

moved post to Call for Security Contributors - #3 by don.dfh

1 Like

Would you be willing to head the security SIG?

me or @c8h4 (more chars LALALALA)

1 Like

seems I do now :rofl:

thanks @jakehamilton happy to help with sec

2 Likes

I added both of you, feel free to organize however works best :slight_smile:

2 Likes

I agree with @c8h4 points.

Taking a look at Security Team | Nix & NixOS reinforces my feeling that NixOS security is somehow “different” - not in a way I personally prefer.

IMO a first good step could be to establish a single point of contact (especially for external communication) pattern like Debian does: Teams/Security - Debian Wiki

While their security page (Debian -- Security Information) looks minimal it IMO contains the most relevant information to get started.

2 Likes

I’d be happy to if and when we come to leader elections. But that is on hold for now anyway until that position gets better defined, so that’s fine for now, thanks!

Yep, I would have taken the Debian security as an example/base for us too, since their process is pretty well defined and works, as they really take that seriously.

As soon as the source for aux.computer comes available, I can draft up a first security contact page + extras as needed.

1 Like

Although I can’t spare much capacity, I’d be happy to offer my support here.

The NixOS security team did a lot of valuable work behind the curtains, but a bit more visibility and formal structure wouldn’t hurt.

3 Likes

Agreed. Also the Gentoo Sec Team came to my mind after writing my previous post. Generally speaking I do prefer leaning on established practices.

Yeah great idea! Wanna do this together? From your profile I assume you’re living in Europe? I’m on Portugal (UTC+1) time and in the afternoons until late evenings.

Thanks a ton. I added you to the SIG: security group here on discourse.

Yeah, definitely! Some of these distros do it for at least 1-2 decades, which is more than a good base to build on.

Sure, sounds good. I’ll write you a PM. :^)

1 Like