Open Source Security Updates Why it's Different; What you Should Know Josh Bressers Friday, 11 May 2007.

Slides:



Advertisements
Similar presentations
Configuration Management
Advertisements

Software Security Threats Threats have been an issue since computers began to be used widely by the general public.
Review: Agile Software Testing in Large-Scale Project Talha Majeed COMP 587 Spring 2011.
Patch Management In Solaris and Red Hat. What is a Patch A collection of fixes to a problem Three main categories: Security Bugs in the system that provide.
Course Retrospective Richard Anderson CSE 403 Lecture 27.
What Causes Software Vulnerabilities? _____________________ ___________ ____________ _______________   flaws in developers own code   flaws resulting.
IT:Network:Microsoft Applications
Open Source for Government Alexander C. Pitzner Sr. Network Engineer Harrisburg University of Science and Technology
Open Source Software An Introduction. The Creation of Software l As you know, programmers create the software that we use l What you may not understand.
Open Source Software Bangladesh University of Business and Technology Nizar Saadi Dahir M.Sc. Computer Engineering Computer Center- Kufa University
FNAL System Patching Design Jack Schmidt, Al Lilianstrom, Andy Romero, Troy Dawson, Connie Sieh (Fermi National Accelerator Laboratory) Introduction FNAL.
CSCE 522 Secure Software Development Best Practices.
Legitimate Vulnerability Markets By: Jeff Wheeler.
Microsoft Security Response Center Presented by Fan Chiang, Chun-Wei( 范姜竣韋 ) 2015/11/14 1 NTUIM.
First Software Development AG Meeting 12 th October 2015.
Version Control How and why to control changes in a software artifact.
Chapter 25 – Configuration Management 1Chapter 25 Configuration management.
Benefits of a SUSE® Subscription
Karsten Wade Sr. Developer Community Mgr, Red Hat.
Open source development model and methodologies.
Configuration Management
Open Source software Licensing
Software Engineering (CSI 321)
Ethical, Legal, Cultural and Environmental Concerns
Improving the Defect Life Cycle Management Process
Compliance with hardening standards
Evaluating Existing Systems
Intracompany Stock Transfer Scenario Overview
Business in a Connected World
Architecture & Construction:
OpenSAF Developer Days 2008 OpenSAF Release Management Session 15-07
Configuration Management
Managing Client’s Projects in Opensource and Being Profitable
Evaluating Existing Systems
How to Contribute to Fedora Project
Spacewalk and Koji at Fermilab
Linux Not in textbook.
Speaker’s Name, SAP Month 00, 2017
CS 501: Software Engineering
Overwatch Boosting
Applications of Data Mining in Software Engineering
Ways to Tackle Norton Antivirus Errors Arising in Windows 10.
Intracompany Stock Transfer Scenario Overview
Why Yahoo Technical Support is Useful?. Users have to do for Contacting Yahoo Support Team.
I have many checklists: how do I get started with cyber security?
Assessing the Security of the Cloud
What is Project Management and why do you need it?
Cyber Issues Facing Medical Practice Managers
Klopotek is transitioning to a Global Organization
Systems analysis and design, 6th edition Dennis, wixom, and roth
Getting Vulnerabilities Out of Software
Systems analysis and design, 6th edition Dennis, wixom, and roth
Practical tools for conflict resolution
IS3440 Linux Security Unit 8 Software Management
CS240: Advanced Programming Concepts
Intracompany Stock Transfer Scenario Overview
Risk Management CSCE 489/689 (Software Security) Fall 2018
CVE.
9 ways to avoid viruses and spyware
What is Software Testing?
Project Management How to access the power of projects!
Planning and Estimation.
The AR Version of “Good to Great”
Vulnerability Reporting Process
What Are Our Security Goals?
Desktop App Assure Service Microsoft Representative Name June 7, 2019
Steve Lipner Executive Director, SAFECode 16 May 2019
MICROSOFT AZ-300 Dumps PDF Vendor: MICROSOFT Exam Code: AZ-300 Dumps PDF Exam Name: Microsoft Azure Architect Technologies (beta) Certification(s): Microsoft.
MICROSOFT AZ-300 Dumps PDF Vendor: MICROSOFT Exam Code: AZ-300 Dumps PDF Exam Name: Microsoft Azure Architect Technologies (beta) Certification(s): Microsoft.
Presentation transcript:

Open Source Security Updates Why it's Different; What you Should Know Josh Bressers Friday, 11 May 2007

Define: Open Source What is Open Source? ● A group of individuals across the world working together ● It's not uncommon for many of these individuals never to have met in person The source code is available The shipped binaries are built in house

Define: Distribution (vendor) Collection of software (mostly open source) ● Distributions typically do not write most of the software they ship Projects usually are not distributors ● This is not always true; many of the larger projects are also distributors ● This poses a unique challenge for keeping an Open Source distribution secure

Security Updates What is a security flaw? CVE NVD Severity Sources Embargoed Issues

Security Flaw A security bug is a software bug that benefits someone other than intended beneficiaries in the intended ways.

CVE

NVD

Severity Based on a technical assessment of the flaw, not the threat ● Unique to each Red Hat product ● Determines the priority through Engineering and QA Compatible withing rankings used by Microsoft and Apache

Sources Where does this information come from?

Embargoed Issues Sometimes a flaw needs to be kept a secret ● This is often for the good of the community ● Can help give vendors time to create a fix to help prevent the creation of a worm An extra challenge for Open Source projects ● CVS and mailing lists are usually public

Red Hat Security Response Team What is the Red Hat Security Response Team? ● Worldwide group of individuals responsible for fixing security bugs in Red Hat products What does the team do? ● Understands flaws ● This covers all shipped Red Hat products ● Assigns severity

Closed Source Security Updates One vendor ● Single-source accountability The customer must trust the vendor ● Not all vendors are always honest ● They've been caught before ● Open Source makes this very hard to do

Open Source Security Updates Community Involvement Backporting Multiple sources of information

Community Involvement Vendor Security Mailing list Public security mailing lists Public patches Public bugs

Backporting

Where do the patches come from? ● Vendors and projects often work together to produce the best possible patch Who verifies it? ● The Open Source nature of development helps keep quality high ● Once the flaw is public, the patch is available for anyone to analyze

Multiple Sources of Information ● Who can be trusted? ● Most security mailing lists have a terrible signal-to-noise ratio ● Who verifies the information? ● Sometimes there is a great deal of conflicting information ● Third party researchers ● Other vendors ● Other projects

Challenges Communication ● Upstream communication ● Vendor communication Leaks Lack of interest Backporting Binary only packages

Conclusion What can we make of all this? ● Hire a team of security professionals ● Find a third party you can trust

Questions?