[
Date Prev][
Date Next][
Thread Prev][
Thread Next][
Date Index][
Thread Index]
Re: Question about dual source vendors
Wonderful, thank you.
Pascal
On 06/17/2016 12:54 PM, Kurt Seifried wrote:
> On Fri, Jun 17, 2016 at 10:18 AM, Pascal Meunier
> <pmeunier@cerias.purdue.edu
>> wrote:
>
>> I very much like the idea of someone being able to get an identifier
>> from
>> an alternate CNA, when the CNA nominally responsible for an area is
>> disfunctional or unwilling to perform, say due to a conflict of
>> interest
>> like refusing to admit that an issue is a real concern or trying to
>> delay
>> disclosure. These conflicts of interests are quite possible when
>> the CNA
>> is also the vendor, which seems to be the model going forward. There
>> should
>> ideally be alternate, secondary or "backup" CVE issuers for all
>> domains.
>>
>
> My understanding is that the "root" CNA of a federation (e.g. Open
> Source
> -> DWF) should be the CVE issuer of last resort, with a final
> backstop of
> MITRE as the "ultimate-root". So if a researcher can't get
> satisfaction
> from the CNA or the DWF they can go to MITRE as the final option. One
> second order effect is that vendors may become more cooperative since
> researchers/reporters will now have a better course of action to
> take. This
> is one of the reasons I added the TIMELINE data to the DWF data, I
> want to
> start holding vendors more accountable and allow the public to have
> more
> data to base security related decisions on.
>
>
>>
>> Pascal
>>
>> On 06/17/2016 11:32 AM, Andy Balinsky (balinsky) wrote:
>>
>>> Regarding "CNA shopping" Is this a problem, as long as only 1 CVE
>>> gets
>>> issued?
>>> Andy
>>> On Jun 16, 2016, at 7:37 PM, Adinolfi, Daniel R <dadinolfi@mitre.org
>>> <mailto:dadinolfi@mitre.org>> wrote:
>>>
>>> Thinking through the issue:
>>>
>>> Ideally, the vendor would themselves be a CNA, covering their
>>> products
>>> regardless of the type of licensing model.
>>>
>>> Not every company can be or wants to be a CNA, of course, so how do
>>> we
>>> handle those?
>>>
>>> If there is another sector-based CNA (e.g., Healthcare systems) or a
>>> regional CNA (e.g., JPCERT), the company could work directly with
>>> those
>>> CNAs, who will facilitate the CVE assignment and disclosure
>>> regardless.
>>>
>>> If neither of these situations fit, it will depend on how DWF
>>> manages
>>> their assignees. MITRE as a CNA has the advantage of being a
>>> trusted third
>>> party for vulnerability disclosure. When closed-source software is
>>> involved, that trust can be important. If DWF creates that same
>>> level of
>>> trust with closed-source vendors, they could also fulfill that
>>> role. But
>>> this leads to some tricky scoping issues, and it could create
>>> situations
>>> similar to "CNA shopping" or introduce other coordination issues.
>>>
>>> How do other folks feel about these scoping issues?
>>>
>>> Thanks.
>>>
>>> -Dan
>>>
>>>
>>> ________________________________
>>> From: owner-cve-editorial-board-list@lists.mitre.org<mailto:
>>> owner-cve-editorial-board-list@lists.mitre.org> <
>>> owner-cve-editorial-board-list@lists.mitre.org<mailto:
>>> owner-cve-editorial-board-list@lists.mitre.org>> on behalf of Kurt
>>> Seifried <kseifried@redhat.com<mailto:kseifried@redhat.com>>
>>> Sent: Thursday, June 16, 2016 7:13:58 PM
>>> To: cve-editorial-board-list
>>> Subject: Question about dual source vendors
>>>
>>> So increasingly we have "dual source" vendors, that is vendors with
>>> everything from fully OSI Open Source to completely closed source.
>>> Basically any large commercial vendor already (Microsoft, Oracle,
>>> etc.) and
>>> a growing number of others (witness the proliferation of GitHub
>>> projects).
>>>
>>> I am talking to one that is not a CNA, and they want to do CVEs for
>>> both
>>> their Open Source, and their closed source. But there is no easy
>>> way to do
>>> this currently other than ask cve-assign@mitre.org<mailto:
>>> cve-assign@mitre.org> directly (and it seems after they read the
>>> https://cve.mitre.org/cve/data_sources_product_coverage.html
>>> document
>>> they were under the impression cve-assign@mitre.org<mailto:
>>> cve-assign@mitre.org> could NOT do it).
>>>
>>> I would like to propose that for vendors where Open Source is a
>>> major
>>> part of what they ship, or the core of their commercial; product
>>> that the
>>> DWF be able to take them under it's wing as it were.
>>>
>>> One hypothetical example that fits into this model would be a
>>> company
>>> like Ansible (let's ignore the fact that Red Hat acquired it and as
>>> such
>>> Ansible falls under the Red Hat CNA), Ansible currently has
>>> "ansible" which
>>> is the Open Source core, and Ansible tower which is a currently
>>> closed
>>> source management/dashboard. I think in a case like this it makes
>>> sense to
>>> have a company like Ansible be a CNA under the DWF for both the
>>> Open Source
>>> parts and the closed source parts.
>>>
>>> Thought/comments?
>>>
>>> --
>>> Kurt Seifried -- Red Hat -- Product Security -- Cloud
>>> PGP A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993
>>> Red Hat Product Security contact: secalert@redhat.com<mailto:
>>> secalert@redhat.com>
>>>
>>>
>
>