Vulnerability Response
Vulnerability Response Models
- Cloudstack Vulnerabilty Response Procedure  (another similar page  for Cloudstack)
- Mozilla Vulnerability Response Procedure
- IETF Draft Responsible Vulnerability Disclosure Process
Zero Day Response Model
- Cleaning up and automating the build and publishing process to enable releases to be cut quickly by whoever is available.
- No "grace periods" or "private discussions"; publicly discuss asap.
- Ideally set up a conference call to initiate discussion on how to resolve the issue and to assign responsibilities.
- Set up a secure communication channel for security advisories and notifications. Â Perhaps update a public websites.
Current process:
- Open a JIRA "private security" issue.  It must be an issue, not just a change in "type".  Just changing the type doesn't help.
- Don't open pull requests; do a direct commit. Â (David construct email on creating private repo for more extensive commit processes when needed).
- Cut the security releases including release notes.
- Community Notification
- After announcement, create JIRA's.
- Three possibilities:Â
- No grace period - Everyone knows before people can patch + poeople  who follow many projects on bugtraq know right away
- 15 business day grace period - People watching bugtraq will be unhappy with what looks sloppy reporting + Lets adopters try to patch first
- short grace period  - People don't really have time to benifit.
- Public disclosure: bugtraq
Draft Vulnerability Response Standard (derived form Cloudstack)
This is a draft of a standard followed by changes/tools needed to implement the standard.
Reporting
If you've found an issue that you believe is a security vulnerability in a released version of CAS, please report it to security@jasig.org with details about the vulnerability, how it might be exploited, and any additional information that might be useful.
Upon notification, the Jasig security team will initiate the security response procedure. If the issue is validated, the team generally takes 2-4 weeks from notification to public announcement of the vulnerability. During this time, the team will communicate with you as they proceed through the response procedure, and ask that the issue not be announced before an agreed-upon date.
The security team asks that you please do not create publicly-viewable JIRA tickets related to the issue. If validated, a JIRA ticket with the security flag set will be created for tracking the issue in a non-public manner.
Â
For CAS, the cas-appsec-private@lists.jasig.org list should be contacted. The CAS appsec WG will initiate the security response procedure.
Standard
- Upon receiving notice of a potential security issue, a security team member will contact representatives for the affected project.  For CAS, the cas-appsec-private@lists.jasig.org list should be contacted. The CAS appsec WG create a bug to track the investigation, this bug must be flagged as a security issue. Security flag should mean contents of ticket are not visible to non-security team members
- CAS appsec WG investigates the issue to confirm/deny the presence of a vulnerability within CAS.
- If the issue is determined not to be a vulnerability the reporter will be notified and the issue will be closed as invalid.
- If issue is confirmed as a CAS vulnerability:
- Security team designates a release manager for target release versions as needed
- Security team assigns a risk rating to the vulnerability using the Common Vulnerability Scoring System
- Security team works with reporter to get a chance to investigate and mitigate the issue in a timely manner before public announcement. This should be between 15-30 days, depending on the severity and complexity of the issue
- Security team works with Apereo Security Team ??? to reserve a CVE Identifier for future public release
- Security team works with appropriate code maintainer(s) to create patch to mitigate the issue
- Testing is conducted to verify patch mitigates issue and does not cause regression errors.
- Once fix is confirmed, notify release manager to ensure the fix is in the appropriate release.
- Security team creates a vulnerability announcement
- Patch is committed to trunk and other supported branches that are affected. The commit should not refer to a particular vulnerability. ??? Do we need a private repo for this
- A new CAS release or hotfix is prepared and tested, containing the new security patch.
- Distributor coordination is implemented to enable a coordinated announcement.
- Security team posts vulnerability announcement to...
- CAS dev list
- CAS users list
- CAS downloads page
- CAS alerts web page???
- The Bugtraq mailing list
- After announcement, create JIRA's and update the release notes. This must happen AFTER the announcement.
- Also after announcement, modify the Jira ticket so that the issue is now publicly viewable.
- After the vulnerability is addressed, the CloudStack community should review development processes to see how the community can minimize the chance of similar vulnerabilities being introduced in the future.
Changes from cloudstack procedure:
Deleted:Â
- CAS appsec team notifies the Apereo Security team (happens automatically - they're on security@ list Is this true for CAS?)
Changes/Tools Implied
- Some way to mark Jira's as security related and therefore private: Misagh to investigate.
- Look at switching to security@apereo.org.
Action Items
Nancy: Point person to get CVE creation process going. Â (Added some research to the wiki).
Misagh: Investigate JIRA further to see if we can have private security issues.
Â
Â
Proposed Vulnerability Procedure
Acknowledge receipt of vulnerability report
Privately verify vulnerability and create patch and/or workaround
Privately notification (Apereo members in good standing, commercial support subscribers)
Grace period for notified deployers to patch or workaround
Community notification with patch/workaround
Grade period
Public disclosure - CVE, http://cve.mitre.org/, etc
CVE Process
1.       Request CVE-ID from a CNA.
2.      The CNA provides CVE-ID and MITRE creates blank content on CVE website.
3.      The CVE-ID is shared with everyone involved in vulnerability disclosure.
4.      The CVE-ID is included in a vulnerability advisory.
5.      After the CVE is made public the requestor or CNA will notify MITRE.
6.      MITRE update the CVE-ID on website and database.
Â
CNA to contact for the CVE-ID:
MITRE can be contacted by email at cve-assign@mitre.org CERT/CC (Third party CNA) has an online form (https://forms.cert.org/VulReport/)
Â
The other listed CNAs are probably not good choices. There is a long list of large software comapanies that run their own CNA for their own vulnerabilities. Then there are two CNAs for researchers, which have make public p;olicie. Then there are are the three Third party CNA's. One is CERT/CC whose contact form I listed above, one is in Japan, the other seems concerned with vital infrastructure vulnerabilities.
Â
Basically the choice is do you want to contact the MITRE CNA via email, or fill out a third party CNAs online form.
Â
Some of the resources I check out:
http://cve.mitre.org/cve/cna.html
http://secunia.com/community/advisories/report_vulnerability/
https://www.jpcert.or.jp/english/about/
https://www.cert.org/vulnerability-analysis/
Â