public inbox for overseers@sourceware.org
 help / color / mirror / Atom feed
From: Carlos O'Donell <carlos@redhat.com>
To: Overseers mailing list <overseers@sourceware.org>
Cc: Mark Wielaard <mark@klomp.org>
Subject: Re: Sourceware / GNU Toolchain at Cauldron
Date: Mon, 26 Sep 2022 18:04:03 -0400	[thread overview]
Message-ID: <2db869b5-5724-18c0-e356-9e5df8f7cb4d@redhat.com> (raw)
In-Reply-To: <20220918213842.GC27812@gnu.wildebeest.org>

On 9/18/22 17:38, Mark Wielaard via Overseers wrote:
> - There were several different kind of "security concerns" which would
>   be good to untangle:
>   
>   - There is the concern of he security of the sourceware server
>     itself. We discussed that in one of the public chats with the SFC
>     and the recommendation was to see if we could maybe hire a
>     penetration testing firm to see if we missed anything.

Discussed in the BoF were a few additional items:

- Defense in depth
  - Multiple servers, each with distinct services.
  - Multiple servers for one service where possible.

- If governments want to use FOSS tools directly, do we need to comply with security
  standards like a contractor would?
  - Does NIST SP 800 53r5 apply to Sourceware.org?
    - https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r5.pdf

 
>   - There is the "hardening" concern of separating unix user accounts
>     for separate services like running git hooks. This is one of the
>     things that the buildbot service offers. We could also adopt
>     something like gitolite.

... and run them on a distinct machine (which requires machine resources, and admin
time, etc).

Adopting gitolite is also a great step in the direction of not having real accounts
for users of a services.
 
>   - There is the secure software supply chain idea. This is one of the
>     things I wanted to discuss now that we have services like
>     public-inbox and tools like b4 for patch attestation. Sourceware
>     offers the services for that, but it really is a policy question
>     for the guest projects whether they use that (and for example
>     whether to use signed git commits).

I agree these are going to be policy questions for each project to discuss.

Though the proposal to use managed services with the LF IT would align us with
exactly the groups doing public-inbox, b4, patatt, and other work for the Kernel.

We would be leveraging everything they've been doing, which we could also do,
but the proposal is about having them support us instead.

> - Although it is true that there is a GNU Toolchain with the FSF as
>   fiscal sponsor and that the separate GNU projects work together
>   using that name, it wasn't clear to me when in this discussion we
>   were talking about the gdb, binutils, glibc and gcc projects
>   collectively. From other discussions during Cauldron it was very
>   clear that although each project is hosted on sourceware and using
>   some of the same services, each one has its own policies which make
>   sense for their separate communities.

Correct.

The core GNU Toolchain projects in this case are gcc, binutils, glibc and gdb.

We work to try and support each other as the "GNU Toolchain."

We adopt best practices from each other, attend BoFs together, and discuss solutions
to common problems using FOSS tooling that we could all adopt.

> - I wasn't really sure what to make of this LF/GTI proposal. It seemed
>   to conflate separate concerns that we were explicitly trying to
>   avoid with our Sourceware as Conservancy member proposal. It seemed
>   to mix explicit fundraising with advocating for a certain "managed
>   services at the LF/IT" technical proposal for using those funds. And
>   setting up yet another fiscal sponsor?

It is two proposals.

A fiscal sponsor for infrastructure in the OpenSSF via the GNU Toolchain Infrastructure
project at the Linux Foundation.

A proposal to use managed services with the Linux Foundation IT for projects currently
at sourceware.org.

Technically speaking, I think the Linux Foundation IT, with their existing work with
public-inbox (ahead of its time), b4, patatt, and more, means they are globally the
best positioned to keep solving these problems and supporting the development of
these FOSS tools for the linux kernel and others. Even more so for a distributed
development model that we use for the GNU Toolchain.

-- 
Cheers,
Carlos.


  parent reply	other threads:[~2022-09-26 22:04 UTC|newest]

Thread overview: 15+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2022-09-16 20:57 Zoë Kooyman
2022-09-16 21:10 ` Ian Kelling
2022-09-18 16:27 ` Mark Wielaard
2022-09-18 21:38   ` Mark Wielaard
2022-09-19 21:09     ` Mark Wielaard
2022-09-26 22:04     ` Carlos O'Donell [this message]
2022-09-27  1:31       ` Alexandre Oliva
2022-09-27 11:02       ` Mark Wielaard
2022-09-28 11:14       ` Frank Ch. Eigler
2022-09-30 13:38         ` Carlos O'Donell
2022-10-02 14:55           ` Frank Ch. Eigler
2022-10-03 13:26             ` Siddhesh Poyarekar
2022-10-03 13:53               ` Frank Ch. Eigler
2022-10-03 19:16                 ` Mark Wielaard
2022-10-03 15:55               ` Christopher Faylor

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=2db869b5-5724-18c0-e356-9e5df8f7cb4d@redhat.com \
    --to=carlos@redhat.com \
    --cc=mark@klomp.org \
    --cc=overseers@sourceware.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).