Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[OSPO Book] Scenarios & Recommendations - CH 4 #455

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

anajsana
Copy link
Member

@anajsana anajsana commented Apr 2, 2024

Based on discussions from the past contributors' call: https://docs.google.com/document/d/1lbq_EfpAS3B7ygh8LkqLXiheAFwKWx3gYORAB7Aggio/edit

Two main scenarios were discussed:

  • Social Engineering Attack on Upstream xz/liblzma
  • License Changes and Software Trustworthiness (Redis use case)

Several best practices were raised during the call (see meeting notes for reference)

…pter 4

Based on discussions from the past contributors' call: https://docs.google.com/document/d/1lbq_EfpAS3B7ygh8LkqLXiheAFwKWx3gYORAB7Aggio/edit

Two main scenarios were discussed:

- Social Engineering Attack on Upstream xz/liblzma
- License Changes and Software Trustworthiness (Redis use case)

Several best practices were raised during the call (see meeting notes for reference)

Signed-off-by: Ana Jimenez Santamaria <ana@todogroup.org>
@anajsana anajsana added ospo-book issues related to ospo book project ospo-book-review issues related to review ospo book content labels Apr 2, 2024
@anajsana anajsana requested a review from a team as a code owner April 2, 2024 15:35
Copy link

netlify bot commented Apr 2, 2024

Deploy Preview for ospomindmap canceled.

Name Link
🔨 Latest commit cd14763
🔍 Latest deploy log https://app.netlify.com/sites/ospomindmap/deploys/660c25c7b4d5b600081f5d84

Copy link

netlify bot commented Apr 2, 2024

Deploy Preview for ospobook ready!

Name Link
🔨 Latest commit cd14763
🔍 Latest deploy log https://app.netlify.com/sites/ospobook/deploys/660c25c760a50f00083176bb
😎 Deploy Preview https://deploy-preview-455--ospobook.netlify.app
📱 Preview on mobile
Toggle QR Code...

QR Code

Use your smartphone camera to open QR code link.

To edit notification comments on pull requests, go to your Netlify site configuration.

Copy link
Member

@UlisesGascon UlisesGascon left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Great additions!


- Recommendation:
Social Engineering Attack on Upstream xz/liblzma: A social engineering attack targeted the xz/liblzma, an essential open source library. The attack was meticulously planned, gaining trust within the community before executing a malicious attack. This incident was discovered inadvertently by an unrelated project, underscoring the sophistication and stealthiness of such vulnerabilities. The challenge for Open Source Program Offices (OSPOs) lies in identifying and mitigating these vulnerabilities, which are not always apparent until after they occur. Despite existing procedures and policies, OSPOs recognize the need for mechanisms to proactively measure and respond to such threats.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
Social Engineering Attack on Upstream xz/liblzma: A social engineering attack targeted the xz/liblzma, an essential open source library. The attack was meticulously planned, gaining trust within the community before executing a malicious attack. This incident was discovered inadvertently by an unrelated project, underscoring the sophistication and stealthiness of such vulnerabilities. The challenge for Open Source Program Offices (OSPOs) lies in identifying and mitigating these vulnerabilities, which are not always apparent until after they occur. Despite existing procedures and policies, OSPOs recognize the need for mechanisms to proactively measure and respond to such threats.
Social Engineering Attack on Upstream xz/liblzma: A social engineering attack targeted the xz/liblzma, an essential open source library. The attack was meticulously planned, gaining trust within the community before executing a malicious attack. This incident was discovered inadvertently by an unrelated project, underscoring the sophistication and stealthiness of such vulnerabilities ([more details](https://research.swtch.com/xz-timeline)). The challenge for Open Source Program Offices (OSPOs) lies in identifying and mitigating these vulnerabilities, which are not always apparent until after they occur. Despite existing procedures and policies, OSPOs recognize the need for mechanisms to proactively measure and respond to such threats.

I added a link to provide more context about the attack vector details

@alice-sowerby alice-sowerby changed the title [OSPO Book] Populate the Scenarios & Recommendations - CH 4 [OSPO Book] Scenarios & Recommendations - CH 4 May 1, 2024
@alice-sowerby
Copy link

@anajsana I think that this PR and the google doc have become out of sync. At least, I believe there is more input on the google doc since this PR has been created!

This PR could be merged and the next round of changes added later, or we could abandon this PR and go back to editing - what do you prefer?

@anajsana
Copy link
Member Author

anajsana commented May 14, 2024

@anajsana I think that this PR and the google doc have become out of sync. At least, I believe there is more input on the google doc since this PR has been created!

This PR could be merged and the next round of changes added later, or we could abandon this PR and go back to editing - what do you prefer?

Good point, @alice-sowerby. It seems that this PR was created in the past and is now far behind the live version / main branch (see here). I noticed that the Google Doc is more aligned with the structure / content of the main branch of chapter-4.md, not the branch in this PR. +1 to close this PR without merging and open a new PR based on the g Doc.

PS: before doing this, we should make sure that the use case on the "Social Engineering Attack on Upstream xz/liblzma" that @UlisesGascon reviewed is also included in the new PR (so we don't lose this contribution)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
ospo-book issues related to ospo book project ospo-book-review issues related to review ospo book content
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants