Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Mon, 16 Oct 2023 09:39:29 +0800
From: Aron Xu <happyaron.xu@...il.com>
To: oss-security@...ts.openwall.com
Subject: linux-distros membership application of openEuler

Hi,

I'm requesting linux-distros mailing list membership on behalf of
openEuler[1], a Linux distro that's actively maintained since 2020. It is
hosted by OpenAtom Foundation[2] with many forms of support available from
Huawei, Kylin, UnionTech, etc. It is publicly available, free to use and open
to contribution.

Here are the responses to the membership criteria:

> 1. Be an actively maintained Unix-like operating system distro with
>    substantial use of Open Source components
> 2. Have a userbase not limited to your own organization

The distro and its commercial derivatives have more than 4.5 million accumulated
deployments on bare metal (since 2020), and even more if considering public and
private cloud instances. Joining linux-distros will make a real difference for
patching important issues for users.

> 3. Have a publicly verifiable track record, dating back at least 1 year
>    and continuing to present day, of fixing security issues (including
>    some that had been handled on (linux-)distros, meaning that membership
>    would have been relevant to you) and releasing the fixes within 10 days
>    (and preferably much less than that) of the issues being made public
>    (if it takes you ages to fix an issue, your users wouldn't
>    substantially benefit from the additional time, often around 7 days and
>    sometimes up to 14 days, that list membership could give you)

The distribution has a complete public record of security fixes[3]. Although
there is no defined policy on enforcing release time of security patches
(yet), the actual timeline in execution is 7 days for high impact issues and
14 days for medium ones.

> 4. Not be (only) downstream or a rebuild of another distro (or else we
>    need convincing additional justification of how the list membership
>    would enable you to release fixes sooner, presumably not relying on the
>    upstream distro having released their fixes first?)

The distribution is not a downstream or a rebuild of another distro. There
are confusions on this question (especially Wikipedia pages) because before
the project existed, there is an internal-only distro named "Euler OS" which
is RHEL-based. When openEuler project is found the distribution is rebuilt and
maintained from scratch, and there are also a few flavors of kernel packages
with different patchsets. There are also a few commercial and/or community
downstream distros of openEuler, too.

> 5. Be a participant and preferably an active contributor in relevant
>    public communities (most notably, if you're not watching for issues
>    being made public on oss-security, which are a superset of those that
>    had been handled on (linux-)distros, then there's no valid reason for
>    you to be on (linux-)distros)

openEuler has been actively working on patching upstream issues and there is a
complete tracking and triaging of all issues with a CVE number[4]. The team
is following oss-security's information closely, although weren't actively
participating in discussions.

> 6. Accept the list policy (see above)
> 7. Be able and willing to contribute back (see above), preferably in
>    specific ways announced in advance (so that you're responsible for a
>    specific area and so that we know what to expect from which member),
>    and demonstrate actual contributions once you've been a member for a
>    while

Yes we accept the list policy and are willing to contribute back in ways we
are able to.

> 8. Be able and willing to handle PGP-encrypted e-mail
> 9. Have someone already on the private list, or at least someone else who
>    has been active on oss-security for years but is not affiliated with
>    your distro nor your organization, vouch for at least one of the people
>    requesting membership on behalf of your distro (then that one
>    vouched-for person will be able to vouch for others on your team, in
>    case you'd like multiple people subscribed)

Besides my role at openEuler, I’m also a part of the Debian Security Team,
though I’m not subscribed to linux-distros since there are already people
representing. If this application is accepted, I would like to step up to be
the representative of openEuler.


Regards,
Aron

[1]https://www.openeuler.org/
[2]https://www.openatom.org/
[3]https://www.openeuler.org/en/security/security-bulletins/
[4]https://www.openeuler.org/en/security/cve

Download attachment "signature.asc" of type "application/pgp-signature" (489 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.