Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

add security triaging to core repo GOVERNANCE.md and/or charter? #1100

Closed
Trott opened this issue Oct 16, 2021 · 17 comments
Closed

add security triaging to core repo GOVERNANCE.md and/or charter? #1100

Trott opened this issue Oct 16, 2021 · 17 comments

Comments

@Trott
Copy link
Member

Trott commented Oct 16, 2021

Refs: #1097 (comment)

Security triaging is not mentioned in the charter or in the core repo GOVERNANCE.md. Should it be? (I vote yes and will be happy to come up with some wording for GOVERNANCE.md. I don't think it needs to be enshrined in the charter, at least not initially. We can always add it to the charter once we've done a test-drive with having it in GOVERNANCE.md for a while.)

I'm also interested in discussing (again, as we had the conversation recently) how to spread the triaging workload a little bit more. Matteo is doing almost all of it these days. Some of that is because the reports tend to be in http and related modules, where he has more expertise than most (all?) current TSC members. But the act of making sure reports are responded to in a timely fashion and so on doesn't have to fall to him solely, I imagine. If we can establish a rotation of four or five people, I'd be happy to be "on call" for checking H1 a few times a day and making sure we're not about to go over a SLA time commitment or anything, and responding with general questions to reporters and so on.

@mcollina
Copy link
Member

All the above is documented in https://github.com/nodejs/TSC/blob/main/Security-Team.md, however it does not have much participation by other TSC members.

I agree in making it one of the fundamental responsibilities of the TSC.

@mhdawson
Copy link
Member

mhdawson commented Oct 18, 2021

+1 on the rotation side of things, did you have something in mind for the time somebody is on rotation (week ?).

@Trott
Copy link
Member Author

Trott commented Oct 19, 2021

+1 on the rotation side of things, did you have something in mind for the time somebody is on rotation (week ?).

I was thinking more like a day at a time, but we can talk about longer time frames like a week at a time if we think that is better.

I guess my initial spitball idea would be five slots per week:

  1. Sunday/Monday
  2. Tuesday
  3. Wednesday
  4. Thursday
  5. Friday/Saturday

We'd have to carefully spell out that time zone, such as "midnight to 11:59pm UTC" for each "day". With five (or more) people and with people being willing to sometimes take two (or more) slots in a row to cover for people on vacation or in crunch time at work or whatever, that seems like it could work.

Another possibility might be two slots, but I find this more daunting:

  1. Friday/Saturday/Sunday/Monday
  2. Tuesday/Wednesday/Thursday

@Trott
Copy link
Member Author

Trott commented Oct 19, 2021

Also, if there's a group of five or more people committed to triaging, perhaps there could be a one hour meeting every other week where whoever can attend goes over (as a group) anything that's stuck or about to miss a deadline or something like that.

It's tempting to suggest that ought to happen at a TSC meeting, but at least in the short term, I think that will make things worse because all the time will be spent catching people up who haven't been paying close attention to the HackerOne queue. So better, at least initially, if it's a core group of people that at least read everything that comes in.

Here's a list of initial folks who might be willing/able to do this work if we can spread it around enough and not burn out one person subjected to doing it all. (I'm looking in Matteo's direction.)

  1. Matteo
  2. Vladimir
  3. Michael Dawson
  4. Rich
  5. ONE MORE PERSON (@ChALkeR perhaps?)

@Trott
Copy link
Member Author

Trott commented Oct 19, 2021

@nodejs/tsc

@mcollina
Copy link
Member

I think a better rotation is weekly or biweekly. Daily seems too complex and there are weekends which are problematic for most people.

@Trott
Copy link
Member Author

Trott commented Oct 19, 2021

I think a better rotation is weekly or biweekly. Daily seems too complex and there are weekends which are problematic for most people.

Sure. Let's flesh this out a bit. First, by "biweekly", you mean a rotation that lasts two full weeks? Or one that lasts half of a week? I gather from context that you mean two full weeks, but let's confirm anyway.

What would be the number of people we'd need to make this workable in your opinion? Four? Six?

@mhdawson
Copy link
Member

+1 on daily being too complex.

I also don't think we have to commit to an SLA that says we respond immediately. If it takes a day or two I don't think that should be a problem. I also don't think we need to commit to responding on the weekends. Realistically it can take weeks/months for a patch even when we think it is important. I think if we set expectations, no weekends and within a day or two should be reasonable for a open source project. We should check what we say in terms of our H1 site though and if we need to update them to be consistent with what we choose.

I would go for 6 to make it workable. We have 22+ people on the TSC, we should push to have more support/involvement from the larger group if we can.

@mcollina
Copy link
Member

Sure. Let's flesh this out a bit. First, by "biweekly", you mean a rotation that lasts two full weeks? Or one that lasts half of a week? I gather from context that you mean two full weeks, but let's confirm anyway.

Two full weeks.

What would be the number of people we'd need to make this workable in your opinion? Four? Six?

Four people at minimum, Six ideal, Eight would be perfect.

@Trott
Copy link
Member Author

Trott commented Oct 21, 2021

@Trott
Copy link
Member Author

Trott commented Nov 1, 2021

Following up on this, the relevant text to start with is in https://github.com/nodejs/TSC/blob/main/Security-Team.md#nodejs-security-team-membership-policy:

  1. All members of @nodejs/TSC have access to private security reports and private patches.
  2. Members of the @nodejs/releasers team have access to private security patches in order to produce releases.
  3. On a case-by-case basis, individuals outside the Technical Steering Committee are invited by the TSC to have access to private security reports or private patches so that their expertise can be applied to an issue or patch. This access may be temporary or permanent, as decided by the TSC.

The first item means that all Node.js TSC members have access to nodejs-private and to HackerOne. That makes sense to me but also highlights our need to be better about removing inactive folks from the TSC.

The second point means that Releasers have access to nodejs-private but not HackerOne. This makes sense to me as well but likewise highlights a need to frequently audit members of that list for inactivity too. (As of this writing, there is only one person on the Releasers team who is not also on TSC. Their last release was in late March.)

The third point is worth reviewing in some detail. I'll start an email thread with TSC on this.

@Trott
Copy link
Member Author

Trott commented Nov 11, 2021

@nodejs/security It's time to set up a meeting for people who are interested (or at least willing) to be part of the security triage rotation so we can agree on something to try for the rotation.

Based on previous conversations, here's who I intend to invite. If you are willing to be involved in triaging security issues and not on this list, let me know and I will add you.

  1. @mcollina
  2. @vdeturckheim
  3. @mhdawson
  4. @danielleadams
  5. @ronag
  6. @Trott

@Trott
Copy link
Member Author

Trott commented Nov 13, 2021

I've sent a Doodle poll to the 6 people in the previous comment. Again, if you are interested in doing security triage work but weren't mentioned in the previous comment, please let me know!

Here's a tentative agenda:

  • Overview of what we're trying to accomplish. (Rich)
  • Validate/update the triaging section of Security-Team.md. (Might not need to happen during the meeting, but maybe.)
  • Discuss a tentative schedule and logistics, including:
    • Need for training/onboarding/pairing for new triagers?
    • Do we want a handoff process for when one person's on-call rotation ends and another begins?
    • Would we want automate emails to remind on-call person when they are on-call. (Probably a relatively simple GitHub Action?)
    • Would we want a team meeting? If so, how often?
    • Assuming everyone is onboard to do some triaging, adding everyone to the right GitHub teams and checking HackerOne privileges.
    • Everyone using 2FA in HackerOne?

@jasnell
Copy link
Member

jasnell commented Dec 2, 2021

I'm +1 on a rotating schedule, and I can definitely get back involved with triaging on a rotating schedule. I had to back away simply because I couldn't dedicate an arbitrary amount of time to it. Very happy to see the rotating schedule happen.

@Trott
Copy link
Member Author

Trott commented Dec 3, 2021

I'm +1 on a rotating schedule, and I can definitely get back involved with triaging on a rotating schedule. I had to back away simply because I couldn't dedicate an arbitrary amount of time to it. Very happy to see the rotating schedule happen.

We should probably take this opportunity to codify how we onboard people. Maybe something like this?

  1. Person affirms that they've read the triage process in Security-Team.md.
  2. TSC approves the person as a security triager (even if they're a TSC member).
  3. Add them to the right teams in nodejs and nodejs-private org. Add them to the private Slack channel.
  4. Work out amongst the team where that person's rotation goes in the calendar.
  5. Update the calendar wherever we share/publish it (which is TBD at this point).
  6. Optionally schedule a walkthrough with another triage team member to go over the process and/or arrange for someone to be that person's go-to co-triager for anything that comes up on their first two-week shift.

@nodejs/security-triage Anything else?

@danielleadams
Copy link
Member

@Trott Make sure they have HackerOne access and 2FA turned on?

@mhdawson
Copy link
Member

mhdawson commented Dec 7, 2021

@Trott looks good to me

@Trott Trott closed this as completed Jan 13, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

5 participants