[Secure-testing-commits] r13122 - doc
Moritz Muehlenhoff
jmm-guest at alioth.debian.org
Wed Oct 28 20:24:59 UTC 2009
Author: jmm-guest
Date: 2009-10-28 20:24:59 +0000 (Wed, 28 Oct 2009)
New Revision: 13122
Added:
doc/narrative_introduction-testing-security
Modified:
doc/narrative_introduction
Log:
separate introduction between the Debian Security Tracker and
testing-security, it's confusing and we need a clean separation
Modified: doc/narrative_introduction
===================================================================
--- doc/narrative_introduction 2009-10-28 20:17:12 UTC (rev 13121)
+++ doc/narrative_introduction 2009-10-28 20:24:59 UTC (rev 13122)
@@ -1,10 +1,10 @@
- A Narrative Introduction to the Testing Security Tracker
+ A Narrative Introduction to the Debian Security Tracker
About
-----
-Everything that Testing Security does is publicly available, as in
+Everything in the Debian Security Tracker is publicly available, as in
"Debian doesn't hide problems" available.
The best thing about our tracking 'system' is that it is very basic.
@@ -15,39 +15,11 @@
very simple to use, transparent and easy to see what other people are
working on so you can work on other things.
-Why are these issues disclosed to the public?
-
-The way we look at it is that 99% of all vulnerabilities are already
-public, and 1% are vendor-sec/embargoed issues.
-
-Stable security deals with embargoed/vendor-sec issues, we don't, we
-deal with issues that have already been assigned CVE numbers (although
-we often times request these assignments), have been posted to common
-security mailing lists, or are seen in commit logs of software that is
-tracked (such as the Linux Kernel).
-
-It is our philosophy that if the Internet knows that there is a
-vulnerability in something, then we better know about it and the
-package maintainer needs to know about it and it needs to be fixed as
-soon as possible. It doesn't make sense to hide issues that everyone
-knows about already, in fact users have told us that they prefer to
-know not only when a package they have installed is vulnerable (so
-they can disable it or firewall it off, or patch it or whatever), but
-to also know that Debian is working on a fix. Transparency is what our
-users expect, and what they deserve. Tracking publicly known issues
-openly (and the occasional unfortunate embargoed issue privately) is
-good for the project as a whole, especially the public's perception of
-the project.
-
Gentle Introduction
--------------------
This following will give you a basic walk-through of how the files are
-structured and how we do our work tracking issues. There is much more
-that can be documented, but it is difficult to get all the issues
-notated and updated. It is easier to get a basic idea and then
-extrapolate from there how to do the rest. Ok, thats a bad excuse, so
-the full information should be filled in.
+structured and how we do our work tracking issues.
The best way to understand is to check out our repository from
subversion so you have the files on your computer and can follow along
@@ -59,9 +31,11 @@
This will check out our working repository after asking for your alioth
password twice. This is normal and to be expected. After successfully
downloading, you will have a new directory called secure-testing. Inside
-this directory are a number of subdirectories. The data directory is
-where we do most of our work. If you don't have an Alioth account, you
-can create one at:
+this directory are a number of subdirectories. The name of the Subversion
+repository is historical, the tracker is not specially related to
+testing-security, but for Debian security at large.
+The data directory is where we do most of our work. If you don't have
+an Alioth account, you can create one at:
https://alioth.debian.org/account/register.php
@@ -254,7 +228,8 @@
- php5
A special exception is made for kernel related issues. The kernel-sec
-group will take care of them and file bugs if needed.
+group will take care of them. If not necessary to file bugs in the BTS
+for kernel security issues, it only causes overhead.
If you wan't to report a bug, bin/report-vuln might be helpful in creating
the bug report.
@@ -372,7 +347,7 @@
Debian can only assign CVE names from its own pool for issues which
are not public. To request a CVE from the Debian pool, write to
-<security at debian.org> and include a description which follows CVE
+<team at security.debian.org> and include a description which follows CVE
conventions. To request a CVE for public issues, write to Mitre and
possibly to the moderated oss-security list. In the meantime, you can
add an entry of the form
@@ -424,8 +399,8 @@
- Present the security history of a package
- Provide overviews of vulnerable packages in stable, testing, sid and
oldstable (it still has some false positives, wrt packages in
- stable that are present in stable, but not vulnerable, but these
- will be ironed out soon). The oldstable data is likely inaccurate.
+ stable that are present in stable, but not vulnerable, these need to
+ be triaged individually).
- Generate a list of packages that are subject to security problems, but
stuck in testing migration due to problems with the dependency chain
and thus candidates for a DTSA
@@ -471,12 +446,13 @@
There is no need to add anything to CVE/list for a DSA, the DSA
cross-reference will be added automatically by the cron job. However,
-you do need to add [sarge] or [woody] entries to CVE/list when there
+you do need to add [etch] or [lenny] entries to CVE/list when there
is a 'no-dsa' or 'not-affected' condition.
The bin/dsa2list script can be used to generate a template for a new
DSA entry once the official DSA is published on debian-security-announce.
-You should not blindly trust the script output and double-check it, though.
+There is a script running, which automatically commits them to DSA/list.
+In some cases it needs manual fixups.
Checking your changes
---------------------
@@ -529,9 +505,3 @@
write permission and you can test drive it on the testing issues for
however long you like to get an idea or feel comfortable (and hey it
helps!)
-
-
-TODO:
-document DTSAs
-document tsck
-document tracked tag
Added: doc/narrative_introduction-testing-security
===================================================================
--- doc/narrative_introduction-testing-security (rev 0)
+++ doc/narrative_introduction-testing-security 2009-10-28 20:24:59 UTC (rev 13122)
@@ -0,0 +1,23 @@
+ A Narrative Introduction to the Testing Security
+
+Stable security deals with embargoed/vendor-sec issues, we don't, we
+deal with issues that have already been assigned CVE numbers (although
+we often times request these assignments), have been posted to common
+security mailing lists, or are seen in commit logs of software that is
+tracked (such as the Linux Kernel).
+
+It is our philosophy that if the Internet knows that there is a
+vulnerability in something, then we better know about it and the
+package maintainer needs to know about it and it needs to be fixed as
+soon as possible. It doesn't make sense to hide issues that everyone
+knows about already, in fact users have told us that they prefer to
+know not only when a package they have installed is vulnerable (so
+they can disable it or firewall it off, or patch it or whatever), but
+to also know that Debian is working on a fix. Transparency is what our
+users expect, and what they deserve. Tracking publicly known issues
+openly (and the occasional unfortunate embargoed issue privately) is
+good for the project as a whole, especially the public's perception of
+the project.
+
+TODO:
+document DTSAs
More information about the Secure-testing-commits
mailing list