OpenSSL Project details vulnerability alert policy

The group behind the OpenSSL cryptographic library that enables Web site encryption says it doesn’t give advance notice of vulnerabilities to any organization, no matter how much they charge.

“We strongly believe that the right to advance patches/info should not be based in any way on paid membership to some forum. You can not pay us to get security patches in advance,” the OpenSSL Project said in a security policy guideline published Sept. 7.

“We may withdraw notifying individual organisations from future prenotifications if they leak issues before they are public or over time do not add value” by, for example,  providing feedback, corrections and test results.

“It is not acceptable for organisations to use advance notice in marketing as a competitive advantage,” the statement adds. “For example “if you had bought our product/used our service you would have been protected a week ago”.

OpenSSL enables SSL (Secure Sockets Layer) or TLS (Transport Security Layer) encryption in a wide range of applications, from secure Web sites to car systems.

OpenSSL came to the world’s attention last spring with the discovery of the Heartbleed vulnerability. But the project says “there are actually not a large number of serious vulnerabilities in OpenSSL which make it worth spending significant time keeping our own list of vendors we trust, or signing framework agreements, or dealing with changes, and policing the policy. This is a significant amount of effort per issue that is better spent on other things.”

As for its policy on handling security issues, the project said it will determine the risk of each issue, dividing them into three categories:

  • low severity issues. This includes issues such as those that only affect the openssl command line utility, unlikely configurations, or hard to exploit timing (side channel) attacks. These will in general be fixed immediately in latest development versions, and may be backported to older versions that are still getting updates. We will update the vulnerabilities page and note the issue CVE in the changelog and commit message, but they may not trigger new releases.
  • moderate severity issues. This includes issues like crashes in client applications, flaws in protocols that are less commonly used (such as DTLS), and local flaws. These will in general be kept private until the next release, and that release will be scheduled so that it can roll up several such flaws at one time.
  • high severity issues. This includes issues affecting common configurations which are also likely to be exploitable. Examples include a server DoS, a significant leak of server memory, and remote code execution. These issues will be kept private and will trigger a new release of all supported versions. We will attempt to keep the time these issues are private to a minimum; our aim would be no longer than a month where this is something under our control, and significantly quicker if there is a significant risk or we are aware the issue is being exploited.

The openssl-announce list will be notified of upcoming fixes with a scheduled update release date and time and the severity of issues being fixed by the update. No futher information about the issues will be given. The goal is to ensure organizations have staff available to handle what the announcement means.

For updates that include high severity issues there will be a pre-notification announcement with more details and patches.

The notice also said that not all security issues come to the project directly; some come from third parties such as companies that pay for vulnerabilities, some come from country CERTs. They may follow a different style of notification.

Would you recommend this article?

Share

Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.


Jim Love, Chief Content Officer, IT World Canada

Featured Download

Howard Solomon
Howard Solomon
Currently a freelance writer, I'm the former editor of ITWorldCanada.com and Computing Canada. An IT journalist since 1997, I've written for several of ITWC's sister publications including ITBusiness.ca and Computer Dealer News. Before that I was a staff reporter at the Calgary Herald and the Brampton (Ont.) Daily Times. I can be reached at hsolomon [@] soloreporter.com

Featured Articles

Cybersecurity in 2024: Priorities and challenges for Canadian organizations 

By Derek Manky As predictions for 2024 point to the continued expansion...

Survey shows generative AI is a top priority for Canadian corporate leaders.

Leaders are devoting significant budget to generative AI for 2024 Canadian corporate...

Related Tech News

Tech Jobs

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

Tech Companies Hiring Right Now