Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update the threat paper with additional threats/commentaries #18

Open
scovetta opened this issue Mar 31, 2021 · 12 comments
Open

Update the threat paper with additional threats/commentaries #18

scovetta opened this issue Mar 31, 2021 · 12 comments

Comments

@scovetta
Copy link
Contributor

Some sources:

@scovetta
Copy link
Contributor Author

  • Protestware
  • What new threats have been sparked over the past two years?
  • What projects (e.g. SLSA, sigstore, S2C2F, A-O, Package Analysis, etc.) have come about that address some of the risks identified?
  • Do we feel we've struck the right balance between pointing out risks but not being overly alarmist?

@scovetta
Copy link
Contributor Author

Suggestion from EdOverflow on Slack:

The "Account Hijacking" threat could include publisher email domains expiring: https://thehackerblog.com/zero-days-without-incident-compromising-angular-via-expired-npm-publisher-email-domains-7kZplW4x/ & https://arxiv.org/pdf/2112.10165.pdf.

@jstclair2019
Copy link

hey, Michael sorry - is there a link to the original paper?
Without having reviewed it, I'd be happy to contribute - I think we want to take a look at however it's organized around "people. process, technology" too. There seems to be more noise as of late about OS licensing problems, as an example.

@luigigubello
Copy link
Contributor

@luigigubello
Copy link
Contributor

Credential stuffing attacks on package index platforms

@luigigubello
Copy link
Contributor

luigigubello commented Dec 15, 2022

Do we feel we've struck the right balance between pointing out risks but not being overly alarmist?

According to Sonatype and ENISA data, we have - probably - identified correct risks in the open-source supply chain, but without spreading awareness to mitigate the impact.

"And according to Mandiant supply chain compromises were the second most prevalent initial infection vector identified in 2021. Furthermore, they also account for 17% of the intrusions in 2021 compared to less than 1% in 2020." (Enisa)

Even if OpenSSF is trying to build and spread a set of tools, standards, specifications, and best practices, their adoption is not enough widespread, yet. My2c :)

@luigigubello
Copy link
Contributor

@jstclair2019 In MD format: Threats, Risks, and Mitigations in the Open Source Ecosystem.md

@jstclair2019
Copy link

Perfect @luigigubello Thank you! I'm digging into the PDF ATM.

@scovetta
Copy link
Contributor Author

Think about including AI/ML -specific threats as they relate to the rest of the topics.

@luigigubello
Copy link
Contributor

luigigubello commented Aug 2, 2023

So:

  • Protestware
  • Missing recommendations for handling this scenario
  • Dependency confusion
  • Missing recommendations for handling this scenario
  • Account hijacking
  • Added point related to risks for expired domains
  • I can add a short point also for credentials stuffing attacks (I would like to discuss during the WG meeting)
  • MFA Fatigue
  • Probably not important in open-source ecosystem but I have added a point in Account Hijacking session

Next step:

  • Write recommendations, if we have, and be sure that recommendations are good
    • In the first version, we wrote recommendations especially for third-party services (e.g. package managers), should we write more recommendations also for developers?
  • Write a section/chapter for tools (2021 -2023) to improve OSS supply chain security (SLSA, sigstore, S2C2F, A-O, Package Analysis, etc.)

Document: https://docs.google.com/document/d/1XAaAYhR9vBn8rJVlp_3L4uIp_vW1MPuy/edit?usp=sharing&ouid=116117777947424173000&rtpof=true&sd=true

@edelsohn
Copy link

edelsohn commented Sep 4, 2023

Does the list of threats include all of the threats mentioned in the SBOMit presentation especially the diagram on page 5?

The VCS to source code artifact to build system path is particularly opaque and narrow. Did the bits from the VCS content truly arrive at the build system unchanged? Does the signature of the contents in the VCS truly correspond to the signature of the contents in the VCS or adjusted to match the potentially modified contents that will be downloaded?

@luigigubello
Copy link
Contributor

@edelsohn sorry for my slow response 🙌 I try to reply your questions :) the document "Threats, Risks, and Mitigations in the Open Source Ecosystem" tries to cover as many scenarios as possible in all the steps required to deliver an open-source project. The steps (see this chart) covered by the doc seem to be more or less the same of slide #4 in SBOMit presentation.

Even if this document (v1.1) is not focused only on one specific solution (e.g. SBOM), I think various threats and risks - related to slide #5 of the SBOMit presentation - are described in the section "Package Consumption Phase", and in the updated version (v1.2), we have introduced new threat models (e.g. dependency confusion attack). We have also introduced a new section "Healthy and Integrity Checks" where we suggest some open-source tools, specifications, and standards to streghten the integrity checks. Where a specific check can happen depends on the project's infrastructure and procedures, so in the document - in some particular security topics (e.g. DevSecOps) - we link to external sources. If you think we should focus more on some specific threat models and go deeper, feel free to suggest some examples and I will try to write a new section or integrate an existing one :)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants