Open zmanion opened 1 year ago
Debian does some analysis of Reserved But Public entries, this is beneficial to the Program:
https://security-team.debian.org/security_tracker.html
The Secretariat and possibly QWG will investigate further and brief the Board.
We don't want to turn off or turn away volunteer effort, but with the Services and JSON changes, the Debian tracker will need to update code, and the Program should reconsider how to handle RBP issues holistically.
It seems to me that reserved CVE lists could, and should, be gated by at least an API key of the appropriate level. Root or CNA-LR or something. And then that list could be provided to a Debian maintainer list in a semi-private way if they're still into chasing RBPs for us.
On TWG today, for cve.org lookup and search user stories, if record is reserved, return generic "ID not found" message.
This is a change from current behavior, which is to return a record with very limited information, only that the ID has been reserved by a CNA. The identity of the CNA is hidden (but is available/known to Secretariat and owning CNA).
At the time of this comment, the old reserved ID behavior:
https://www.cve.org/CVERecord?id=CVE-2023-34327
https://cveawg.mitre.org/api/cve-id/CVE-2023-34327
A third way to access RBP status is bulk download, it has already been decided that bulk download does not include reserved IDs.
Further documentation of this decision, for posterity.
A previously discussed option was to disclose the owning_cna to everyone in a reserved ID. This would have allowed someone to identify the CNA responsible when an RBP issue comes up. The decision was to not disclose owning_cna, and now not to disclose reserved status at all.
This leaves open the following scenario:
Step 4 could be avoided by disclosing owning_cna in RPB records.
The AWG is proposing to not change the current practice of conveying reserved status and redacting CNA identity, see https://github.com/CVEProject/cve-services/issues/1282#issuecomment-2471682199.
Leaving this issue open until TWG/Board render an opinion/decision.
Why are reserved IDs (the fact that an ID is reserved) ever shared with anyone other than the reserving CNA and the Secretariat?
When investigating "missing" assignments or publications (often RBPs), when I see a reserved ID, I immediately want to know who reserved it so I can go talk to them. Assigner is redacted, so I'd have to go ask the Secretariat, and this delay means I'm probably not going to bother.
Providing assigner (CNA) information on reserved IDs might lead to requests to the CNA asking about the content and timing of the not-yet-published CVE. This concern was brought up on a recent AWG call.
Is there any reason to expose reserved IDs to parties other than the reserving CNA?