cncf / tag-security

🔐CNCF Security Technical Advisory Group -- secure access, policy control, privacy, auditing, explainability and more!
https://tag-security.cncf.io
Other
2.08k stars 518 forks source link

Security Assessment for oqsprovider (Open Quantum Safe provider for OpenSSL 3.x) #1333

Closed anvega closed 1 day ago

anvega commented 3 months ago

Project Name: oqsprovider - (Open Quantum Safe provider for OpenSSL3.x )

Github URL: https://github.com/open-quantum-safe/oqs-provider Issue tracker: https://github.com/open-quantum-safe/oqs-provider/issues/451

The oqsprovider project offers standards-track post-quantum key exchange, authentication, and ciphersuites in the TLS protocol without requiring code changes to any installation running OpenSSLv3.

The project is now part of the Linux Foundation PQCA. This will be the first time an assessment is done for a project not seeking to progress stages in the CNCF, but solely for sensibly "scrutinizing" it.

As @baentsch expressed:

"Most things are pretty obvious but I'm feeling an ethical obligation to first witness more committed contributors before implementing/declaring as "good" things this self-assessment suggests. Otherwise, I'd be afraid this would create a false sense of reliability to users ("badges", "alliance endorsement", etc marketing fluff) -- all the while the code is [maintained thanklessly by the proverbial random guy in Nebraska](https://www.theregister.com/2021/05/10/untangling_open_sources_sustainability_problem/) (err, Switzerland :)."

The project lead has completed a self-assessment, and I volunteer to be the lead reviewer. I declare a soft conflict of interest, having made a cosmetic contribution by fixing the CI build badges of another Open Quantum Safe project and starting to use it in my work.

Maybe I can interest @mnm678, @JustinCappos, and @hlandau to participate as reviewers.

dehatideep commented 1 month ago

@baentsch @anvega SonarQube Static Analysis captured at: https://github.com/open-quantum-safe/oqs-provider/issues/526 Thank you.

dehatideep commented 1 day ago

This assessment is complete and following findings were shared with oqsprovider team:

  1. Static analysis report tied to code, XSS issues and test case issues were shared with oqsprovider team.
  2. Assessment where openssl issues may also be percolated to oqsprovider, were discussed with oqsprovider team but this is no different to any provider attachment.
  3. Given oqsprovider supports hybrid mode, it must be made sure libcrypto and libpq are safeguarded against malicious update.

Given these feedback were enough to get the general feedback, this issue is closed from assessment perspective.