|
Message-ID: <20110303181224.GB1433@suse.de>
Date: Thu, 3 Mar 2011 19:12:24 +0100
From: Marcus Meissner <meissner@...e.de>
To: OSS Security List <oss-security@...ts.openwall.com>
Subject: Vendor-sec hosting and future of closed lists
Hi folks,
As moderator of vendor-sec and one of the sysadmins of lst.de I noticed
a break-in into the lst.de machine last week, which was likely used to
sniff email traffic of vendor-sec. This incident probably happened on Jan 20
as confirmed by timestamp, but might have existed for longer.
As the system in use at lst.de is quite old and the admin team and myself
does not really have the time anymore to keep it on a secure level, we
would like to move the list to another hosting place.
I have disabled the specific backdoor, but as I am not sure how the
break-in happened it might reappear. So I recommend not mailing embargoed
issues to vendor-sec@....de at this time.
I have asked Solar Designer if he could take over hosting, and he was agreeing,
including a full GPG crypted setup.
However we found during this brainstorming that changes in the setup
of the vendor-sec list likely are good at this point in time.
The number of subscribers is high, and probably 80-100 people get vendor-sec
emails, making leaks by members always a possbility.
Also the usefulness of v-s in general has a bit diminished, especially with
oss-sec present and more active and more involved upstream projects doing
their own management. Mark J Cox has some stats for Redhat updates showing this.
(To use the threadmill metaphor, v-s does not help us vendors as much
with the speed of the patch threadmill as it did 5 - 10 years ago.)
So I would like to open up a discussion with _all_ OSS Security folks present.
- Is a closed vendor coordination like vendor-sec still needed at this time?
Meaning: does the benefit of a closed group really outweigh the
"left out feeling" of non members and its annoyances?
- If yes, would it be an idea to confine or split into lists of focus groups?
(like Linux vendors, BSD vendors, all OSS source using vendors, etc?)
- Or of course the old option is open:
Should we proceed with the current state as-is, but throw a bit more
GPG encryption on top?
- What other options do we have or should we pursue?
At least SUSE, Redhat and Openwall are open for discussion.
Please discuss :)
Ciao, Marcus (vendor-sec moderator)
Content of type "application/pgp-signature" skipped
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.