summaryrefslogtreecommitdiffstats
path: root/doc/talks/debconf5/notes
blob: 66b4dada5535ccd6d984bff1a2396f489d87624e (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
5 intro
10 how it works
5 how to help
10 how well it works
?? next steps
15 questions/discussion
--
45 minutes

intro:
	What is the testing distribution:
	- Query audience: Who doesn't know how testing works.
		- Automatically stabelised version of unstable.
		- Dependency, testing delay and RC bug metrics used to
		  decide when to update packages.
		- Unique amoung linux distributions.
		- Unique challenges, including security.
	
	Why testing cannot be secured: <next slide>
	All of these are real challenges the team faces.

	- Query audience: raise hands if you use testing
		(Don't worry, the camera isn't pointing at you -- noone
		will know!)
	
	Using testing is still attractive:
		- desktop users
		- custom Debian distributions
	

how it works:

	Team:
	- Formed last fall (5 years after testing)
	- Open team of DDs and non-DDs
	- Members participate because:
	
		- Hired by custom Debian distro that is based on testing.
		  (Skolelinux, Univention Corporate Server)
		- University deploying sarge on a large scale
			
			(Above is 1/2 of team; which explains why it took
			this long to start the team)
		
		  which needs to keep track of security issues anyway.
		- Want testing to be usable by our users and for faster
		  releases.
		- Want to make unstable more secure.
		- Like the transparency of the team.
		- "It's fun"
	- Team is designed to scale well and be easy to grow.
	- Low barriers for entry to team.
	- No team members currently have priviliged info (vendor-sec).
		- And we don't care! Much.

	Data:
	- [ Maybe do a quick demo of running through CAN list ]
	- Track data from DSAs, CVE ids, debbugs, full-discolsure, bugtraq.
	  Mostly CVE.
	- Not vendor-sec -- open team
	- Use simple database to track holes
	- Just keeping up with this data is a large portion of our work.
	- And it's parallizable.
	- And its very helpful if all debian changelogs mention CVE ids.

	Getting things fixed:
	- Team members work on finding/writing patches and bug filing.
	- Some (DD) members work on NMUs to unstable.
	- In the future, we hope to do advisories and NMUs via
	  testing-security direct to testing.

how to help:

	DDs: <next slide>

	anyone:
	- grab an unfixed bug from the page, fix it, file a bug
	  with a patch, NMU as necessary, communicate to the team the
	  fixed package version and bug number.
	- join the team, help check CANs, develop policy, etc
	- ideas/patches to improve the interface, website and translations
	- adapt the changelog autochecker from ubuntu (the python script
	  that scans ubuntu changelogs and generates
	  http://people.ubuntu.com/~pitti/ubuntu-cve.html)

how well it works: "Lies, damn lies, and .."

	- Stats arn't my thing.
	- Too busy working to try to gather much data.
	- Most time-to-fix comparisons are innately flawed in one way or
	  another.
	- Show the tracking page and explain how to read.
	- One comparison: <next slide>
	- Better comparisons would involve looking at kernel security holes
	- Or putting up honeypots

next steps

	- making DTSA announcements
	- getting fix delay down to 4 days
	- i386 support to start with
	- autobuilders, etc..

<last slide>

© 2014-2024 Faster IT GmbH | imprint | privacy policy