[Secure-testing-commits] r30512 - org
Moritz Muehlenhoff
jmm at moszumanska.debian.org
Wed Dec 3 18:28:00 UTC 2014
Author: jmm
Date: 2014-12-03 18:28:00 +0000 (Wed, 03 Dec 2014)
New Revision: 30512
Added:
org/agenda-2015.txt
Log:
first stab at some agenda items
Added: org/agenda-2015.txt
===================================================================
--- org/agenda-2015.txt (rev 0)
+++ org/agenda-2015.txt 2014-12-03 18:28:00 UTC (rev 30512)
@@ -0,0 +1,97 @@
+Agenda for Security Team Meeting
+--------------------------------
+
+Workflow
+========
+
+- Improvements needed for dsa-needed.txt, like more automatisation? The repo
+ with embargoed issues isn't used much, what can we do to improve that?
+
+- Is RT abandoned, do we still need to clean up old issues from the security
+ queues?
+
+- Draft new people, possible candidates
+
+- Opening up the security process further to allow maintainers of packages with
+ frequent issues to release updates themselves. Needs a more detailed workplan:
+ - Updates need to be reviewed/acked by sec team members
+
+ - Requires changes to dak to no longer require access to security-master,
+ e.g. by using a mechanism similar to allowing a DM to upload and sending
+ error messages to the signer of the upload (already requested by Thijs)
+
+ - Requires changes to debian-security-announce
+
+Tools
+=====
+
+- Compile a list of issues we want to see fixed
+
+- Make it simple to release packages for others to test, e.g. an aptable security queue,
+ what is needed to implement that?
+
+- How can we leverage autopkgtest for testing security updates in jessie?
+
+- Migrate to git during the weekend? Since most people are around and we'll be
+ actively using all tools anyway, we can fix all fallout right-away.
+
+Tracker
+=======
+
+- Add a new status to differentiate between "no-dsa, if the maintainer wants
+ to fix in a point update go ahead" and "no-dsa, was ignored because it's
+ possible to backport" (this is e.g. needed to cover non-backportable issues
+ like CVE-2013-4148 et al. for KVM).
+
+- Check open bugs in the BTS, check bugs against security-tracker pseudo package
+
+- Support for consistency checks on source package names, e.g linux-2.6/linux
+ or all of the ruby packages, track package renames
+
+- Automatically add <end-of-life> tags for unsupported packages
+
+- Automating more tasks:
+ + dropping "NOTE: to be rejected" when an issue is marked as REJECTED
+ + script to automatically merge data/next-{oldstable-,}point-update.txt
+ + get an overview of newly reported bugs in the Debian BTS which have
+ tag security (if one submits a bug not over reportbug we do not get
+ a copy)?
+ + Automatically group/reorder unassigned CVE-$year-XXXX item to have
+ them in one place and get a better overview?
+
+
+Documentation
+=============
+
+- Work on proper documentation how people can contribute
+
+- Remove mentions of the "testing security team" since that doesn't
+ seem to exist anymore
+
+Distribution hardening
+======================
+
+- What new hardening features should we tackle for stretch?
+
+- systemd hardening features; identify a set of important packages
+
+- improve detection of hardened build flags, maybe write the flags used into an
+ ELF section? This way it could be more reliably checked whether correct flags
+ were used (e.g. for binaries using fortified source, but not using any of the
+ functions covered by it)
+
+- hidepid by default
+
+
+LTS
+===
+
+- Review; what is working well, how is it keeping up, we can we do to help?
+
+- What tool changes need to be made?
+
+Others
+======
+
+- Distribute the new security team key on
+
More information about the Secure-testing-commits
mailing list