Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Review ID reservation, specifically how/why reservation is conveyed to consumers #15

Open
zmanion opened this issue Dec 14, 2022 · 5 comments

Comments

@zmanion
Copy link
Contributor

zmanion commented Dec 14, 2022

Why are reserved IDs (the fact that an ID is reserved) ever shared with anyone other than the reserving CNA and the Secretariat?

When investigating "missing" assignments or publications (often RBPs), when I see a reserved ID, I immediately want to know who reserved it so I can go talk to them. Assigner is redacted, so I'd have to go ask the Secretariat, and this delay means I'm probably not going to bother.

Providing assigner (CNA) information on reserved IDs might lead to requests to the CNA asking about the content and timing of the not-yet-published CVE. This concern was brought up on a recent AWG call.

Is there any reason to expose reserved IDs to parties other than the reserving CNA?

@zmanion
Copy link
Contributor Author

zmanion commented Mar 2, 2023

Debian does some analysis of Reserved But Public entries, this is beneficial to the Program:

https://security-team.debian.org/security_tracker.html

The Secretariat and possibly QWG will investigate further and brief the Board.

We don't want to turn off or turn away volunteer effort, but with the Services and JSON changes, the Debian tracker will need to update code, and the Program should reconsider how to handle RBP issues holistically.

@todb
Copy link

todb commented Mar 23, 2023

It seems to me that reserved CVE lists could, and should, be gated by at least an API key of the appropriate level. Root or CNA-LR or something. And then that list could be provided to a Debian maintainer list in a semi-private way if they're still into chasing RBPs for us.

@zmanion
Copy link
Contributor Author

zmanion commented Jun 1, 2023

On TWG today, for cve.org lookup and search user stories, if record is reserved, return generic "ID not found" message.

This is a change from current behavior, which is to return a record with very limited information, only that the ID has been reserved by a CNA. The identity of the CNA is hidden (but is available/known to Secretariat and owning CNA).

At the time of this comment, the old reserved ID behavior:

https://www.cve.org/CVERecord?id=CVE-2023-34327

rpb_cveorg

https://cveawg.mitre.org/api/cve-id/CVE-2023-34327

rbp_api

A third way to access RBP status is bulk download, it has already been decided that bulk download does not include reserved IDs.

@zmanion
Copy link
Contributor Author

zmanion commented Jun 1, 2023

Further documentation of this decision, for posterity.

A previously discussed option was to disclose the owning_cna to everyone in a reserved ID. This would have allowed someone to identify the CNA responsible when an RBP issue comes up. The decision was to not disclose owning_cna, and now not to disclose reserved status at all.

This leaves open the following scenario:

  1. An RBP happens, which is somewhat more common when multiple parties (suppliers, CNAs) are involved.
  2. Possibly the vulnerability is receiving public attention, possibly disclosed as a 0-day, being exploited in the wild. Thus, the need for CVE record content is urgent.
  3. Someone looks up the RBP and today, sees the RBP status, and in the future, sees nothing about the ID.
  4. Someone starts contacting Roots or the Secretariat to ask who owns the RBP.

Step 4 could be avoided by disclosing owning_cna in RPB records.

@zmanion
Copy link
Contributor Author

zmanion commented Nov 12, 2024

The AWG is proposing to not change the current practice of conveying reserved status and redacting CNA identity, see CVEProject/cve-services#1282 (comment).

Leaving this issue open until TWG/Board render an opinion/decision.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants