Google Groups no longer supports new Usenet posts or subscriptions. Historical content remains viewable.
Dismiss

Heroku early upgrade is raising serious questions

6 views
Skip to first unread message

damien clochard

unread,
Apr 2, 2013, 5:41:46 PM4/2/13
to

I think we have a problem here :

https://status.heroku.com/incidents/510

Disclaimer : I don't know what thursday security fix is about and I
don't have much information on the "Heroku Postgres Official
Maintenance". So for now, I won't discuss wether or not Heroku should do
that upgrade earlier than everyone. This is why why I'm sending this on
pgsql-advocacy instead of pgsql-hackers

What I know is that Heroku's announcement is raising many questions all
over the place:

http://techcrunch.com/2013/04/01/heroku-forces-customer-upgrade-to-fix-critical-postgresql-security-hole/
https://news.ycombinator.com/item?id=5475619

Among these questions, the 3 below are recurring :

Which companies have access to the patch before the official release ?
What does a company have to do to have access to this patch ?
Who decides to allow this "early access" ?


Now my guess is that Heroku is treated here as a distributer such as Red
Hat, the Debian packagers, etc. Once again I am not discussing wether or
not they should have access to the code earlier.

What I am discussing is that most people consider that Heroku is a
"database as a service" company, not a distributor of software. And the
overall feeling among DBA can be described as :

"Why is Heroku so special ? Why do I have to wait 4 days while they are
allowed to upgrade before the security breach is fully disclosed ?"

In other words, we are sending a terrible message to our users. I
understand that this bug cannot be discussed in public but the Heroku
upgrade is public and therefore the PostgreSQL community needs to come
up with an explanation to make things clear and avoid misunderstandings
and frustration.


--
Sent via pgsql-advocacy mailing list (pgsql-a...@postgresql.org)
To make changes to your subscription:
http://www.postgresql.org/mailpref/pgsql-advocacy

Bruce Momjian

unread,
Apr 2, 2013, 5:52:01 PM4/2/13
to
On Tue, Apr 2, 2013 at 11:41:46PM +0200, damien clochard wrote:
> What I am discussing is that most people consider that Heroku is a
> "database as a service" company, not a distributor of software. And the
> overall feeling among DBA can be described as :
>
> "Why is Heroku so special ? Why do I have to wait 4 days while they are
> allowed to upgrade before the security breach is fully disclosed ?"
>
> In other words, we are sending a terrible message to our users. I
> understand that this bug cannot be discussed in public but the Heroku
> upgrade is public and therefore the PostgreSQL community needs to come
> up with an explanation to make things clear and avoid misunderstandings
> and frustration.

We realize this issue has become public and the core team is planning to
post an updated set of rules on how major security releases are
distributed, probably on or shortly after the Thursday release. I will
send this email to core so they are aware of it.

--
Bruce Momjian <br...@momjian.us> http://momjian.us
EnterpriseDB http://enterprisedb.com

+ It's impossible for everything to be true. +

Josh Berkus

unread,
Apr 2, 2013, 6:40:17 PM4/2/13
to

> What I know is that Heroku's announcement is raising many questions all
> over the place:
>
> http://techcrunch.com/2013/04/01/heroku-forces-customer-upgrade-to-fix-critical-postgresql-security-hole/
> https://news.ycombinator.com/item?id=5475619

Just to keep this in scope, those are two places, and the first sources
the second, so basically "Hacker News is complaining". I'll also point
out that many of the comments on the HN thread are supportive. Also,
contrast this Slashdot thread:

http://news.slashdot.org/story/13/03/29/1519208/security-fix-leads-to-postgresql-lock-down

... which praises us for taking reasonable security precautions as a
consensus of the comments.

> In other words, we are sending a terrible message to our users. I
> understand that this bug cannot be discussed in public but the Heroku
> upgrade is public and therefore the PostgreSQL community needs to come
> up with an explanation to make things clear and avoid misunderstandings
> and frustration.

I don't think this is as big of an issue as you seem to. I do think we
should have some messaging around this, but I don't agree that it should
happen before Thursday, when we will be doing PR around the security
update anyway.

I'm also happy that we're getting all this press, because it means
people will actually apply the darned updates.

--
Josh Berkus
PostgreSQL Experts Inc.
http://pgexperts.com

Joshua D. Drake

unread,
Apr 2, 2013, 6:52:05 PM4/2/13
to

On 04/02/2013 03:40 PM, Josh Berkus wrote:

>> In other words, we are sending a terrible message to our users. I
>> understand that this bug cannot be discussed in public but the Heroku
>> upgrade is public and therefore the PostgreSQL community needs to come
>> up with an explanation to make things clear and avoid misunderstandings
>> and frustration.
>
> I don't think this is as big of an issue as you seem to. I do think we
> should have some messaging around this, but I don't agree that it should
> happen before Thursday, when we will be doing PR around the security
> update anyway.
>
> I'm also happy that we're getting all this press, because it means
> people will actually apply the darned updates.

I think the overriding point of concern here is that there is an
impression that somehow Heroku got special access to the fix before
anyone else. Of course this isn't true, but our communication as a
project has been sorely lacking this time around and this has caused
some confusion about what is actually going on.

Joshua D. Drake



--
Command Prompt, Inc. - http://www.commandprompt.com/
PostgreSQL Support, Training, Professional Services and Development
High Availability, Oracle Conversion, Postgres-XC
@cmdpromptinc - 509-416-6579

Jonathan S. Katz

unread,
Apr 2, 2013, 7:23:53 PM4/2/13
to
On Apr 2, 2013, at 6:52 PM, Joshua D. Drake wrote:

> On 04/02/2013 03:40 PM, Josh Berkus wrote:
>
>>> In other words, we are sending a terrible message to our users. I
>>> understand that this bug cannot be discussed in public but the Heroku
>>> upgrade is public and therefore the PostgreSQL community needs to come
>>> up with an explanation to make things clear and avoid misunderstandings
>>> and frustration.
>>
>> I don't think this is as big of an issue as you seem to. I do think we
>> should have some messaging around this, but I don't agree that it should
>> happen before Thursday, when we will be doing PR around the security
>> update anyway.
>>
>> I'm also happy that we're getting all this press, because it means
>> people will actually apply the darned updates.
>
> I think the overriding point of concern here is that there is an impression that somehow Heroku got special access to the fix before anyone else. Of course this isn't true, but our communication as a project has been sorely lacking this time around and this has caused some confusion about what is actually going on.

+1 - with a more outside perspective on the overall issue, I do have to say that I'm okay to any entity operating "critical infrastructure" or the like having access to a critical security patch before the source is made available. I think to reiterate what JD said, we should just communicate that better in the future.

Stephen Frost

unread,
Apr 2, 2013, 7:42:18 PM4/2/13
to
* Jonathan S. Katz (jonath...@excoventures.com) wrote:
> +1 - with a more outside perspective on the overall issue, I do have to say that I'm okay to any entity operating "critical infrastructure" or the like having access to a critical security patch before the source is made available. I think to reiterate what JD said, we should just communicate that better in the future.

Having some kind of documentation / policy regarding who can get access,
or what they have to do to get access, would certainly help address
these concerns.

For my 2c, I really don't feel this went very well and I absolutely
think that it's a black-eye that the common impression is that we gave
the fix to Heroku ahead of the public release.

Not sure what the best place to discuss this is, but, basically, I think
we can do better.

Thanks,

Stephen
signature.asc

Selena Deckelmann

unread,
Apr 2, 2013, 8:03:08 PM4/2/13
to

On Tue, Apr 2, 2013 at 4:42 PM, Stephen Frost <sfr...@snowman.net> wrote:

Having some kind of documentation / policy regarding who can get access,
or what they have to do to get access, would certainly help address
these concerns.

This is a key point.

Also, for those concerned about blowback, I've read through most of the commentary. If you read beyond the knee-jerk reactions, there's a lot of comments like this:

https://news.ycombinator.com/item?id=5477679

The slashdot article was full of similar sentiments.

The TechCrunch article had just two comments - leading me to conclude that most people view the angle the reporter took as sensational, and not worthy of arguing over.

So, while it's reasonable to be concerned and want to make this process more transparent and well-documented, I think that overall, the impression our users have is generally *positive*, and they'd like to know what the vulnerability actually is before passing judgment on the process that was used to release the fix.

I agree that we should have a well-documented security release process. There are existing processes documented that we might use as a starting point, and I personally think largely match what we currently do, like: https://docs.djangoproject.com/en/1.5/internals/security/

-selena

Jonathan S. Katz

unread,
Apr 2, 2013, 8:14:23 PM4/2/13
to
The Django security release guide is good - I think we could almost copy & paste it.  I could throw something up on our wiki where we can fill in the blanks on what we want the actually policy to be and allow people to comment + add modifications.

Jonathan S. Katz

unread,
Apr 2, 2013, 8:43:38 PM4/2/13
to
Here is a wiki I through together combining elements of both our current security page and thoughts from the Django one:


I separated between our current policy and the draft.  The draft really needs some blanks to be filled in.

One suggestion (not in the draft) is that when we do make release announcements containing security fixes, we do include the URL to our security policy to make it clear what it is.

Shane Ambler

unread,
Apr 2, 2013, 9:01:36 PM4/2/13
to
On 03/04/2013 08:11, damien clochard wrote:

> Among these questions, the 3 below are recurring :
>
> Which companies have access to the patch before the official release
> ? What does a company have to do to have access to this patch ? Who
> decides to allow this "early access" ?

While no-one seems to address these questions - here's my opinion,

1. An issue is found, a solution is developed and committed to source
code repository.
2. Source is downloaded and compiled by release build servers.
3. Official release binaries are made available to download.

Once 1 is complete an announcement of upcoming release can be made.
There is a delay till release as the release builds are being compiled.

After 1. is complete anyone can download and build their own fixed
version of postgresql.

If an announcement is made after 1 then there is a delay that anyone can
use to build their own update before the *official release*

If an announcement is made after 3 then anyone also following the
development can also release their own updates before the official
announcement.

That's a benefit of open source.
There is no preference given to special customers.
Those that care and pay attention can look after their customers as
they see fit.

Josh Berkus

unread,
Apr 3, 2013, 12:57:01 AM4/3/13
to
Jonathan,

> Here is a wiki I through together combining elements of both our
> current security page and thoughts from the Django one:

Thanks for getting this started! I've revised it heavily.

> One suggestion (not in the draft) is that when we do make release
> announcements containing security fixes, we do include the URL to our
> security policy to make it clear what it is.

Actually, we usually do provide a link.

--
Josh Berkus
PostgreSQL Experts Inc.
http://pgexperts.com


damien clochard

unread,
Apr 3, 2013, 3:55:35 AM4/3/13
to
Le 03/04/2013 02:43, Jonathan S. Katz a écrit :
> On Apr 2, 2013, at 8:14 PM, Jonathan S. Katz wrote:
>
>> On Apr 2, 2013, at 8:03 PM, Selena Deckelmann wrote:
>>
>>> I agree that we should have a well-documented security release
>>> process. There are existing processes documented that we might use as
>>> a starting point, and I personally think largely match what we
>>> currently do, like:
>>> https://docs.djangoproject.com/en/1.5/internals/security/
>>
>> The Django security release guide is good - I think we could almost
>> copy & paste it. I could throw something up on our wiki where we can
>> fill in the blanks on what we want the actually policy to be and allow
>> people to comment + add modifications.
>
> Here is a wiki I through together combining elements of both our current
> security page and thoughts from the Django one:
>
> https://wiki.postgresql.org/wiki/PostgreSQL_Security_Release_Policy_Draft
>
> I separated between our current policy and the draft. The draft really
> needs some blanks to be filled in.
>

Thanks for this draft, it's an improvement !

Here's a few comments :

A/ I think the names of "The Packagers List" should be public. I think
it's an important infomation when you choose a distibution system or a
service provider. One should be able to check if a package/service
provider is connected to the Security Team or not.

B/ I feel that all "Packagers" should respect the "embargo date". They
should not produce the packages prior to the official realease. This is
what RPM and DEB packagers do and it's a good thing. Once again the
problem is not that Heroku had early access to the security fix. The
problem is that they "released" it 3 days before others packagers. I
don't know if they did that on purpose but the message they are sending
is "Heroku Postgres is more secure than vanilla PostgreSQL, because you
get upgrades before full disclosure"

C/ The Packagers list could be extended to companies providing
PostgreSQL support. If the term "Packagers" include not only
organizations that distribute the code but also organizations that
provide PostgreSQL as a services, then PostgreSQL Support services
should be included too.

If you produce binaries you're not supposed to make them accessible
prior to the embargo date.

Dave Page

unread,
Apr 3, 2013, 4:07:19 AM4/3/13
to
On Wed, Apr 3, 2013 at 3:55 AM, damien clochard <dam...@dalibo.info> wrote:
>
>
> A/ I think the names of "The Packagers List" should be public. I think
> it's an important infomation when you choose a distibution system or a
> service provider. One should be able to check if a package/service
> provider is connected to the Security Team or not.

The packagers list and security team are different groups.

> B/ I feel that all "Packagers" should respect the "embargo date". They
> should not produce the packages prior to the official realease. This is
> what RPM and DEB packagers do and it's a good thing. Once again the
> problem is not that Heroku had early access to the security fix. The
> problem is that they "released" it 3 days before others packagers. I
> don't know if they did that on purpose but the message they are sending
> is "Heroku Postgres is more secure than vanilla PostgreSQL, because you
> get upgrades before full disclosure"

How would that work? The reason we have a number of days between the
tarballs being rolled and the embargo date is that it takes time to
build and properly QA the packages. In the case of the installers,
each branch gets tested on 30 - 40 different platforms in total. It is
simply not possible to "not produce the packages prior to the official
realease".

> C/ The Packagers list could be extended to companies providing
> PostgreSQL support. If the term "Packagers" include not only
> organizations that distribute the code but also organizations that
> provide PostgreSQL as a services, then PostgreSQL Support services
> should be included too.

No, most definitely not. The packagers list is a working/coordination
list, not one for discussion. We need to keep that list tightly
purposed and focussed on those actually creating packages for public
distribution and arguably in the future, deployment on public DBaaS
platforms (the key word in both cases, being "public").

--
Dave Page
Blog: http://pgsnake.blogspot.com
Twitter: @pgsnake

EnterpriseDB UK: http://www.enterprisedb.com
The Enterprise PostgreSQL Company

Magnus Hagander

unread,
Apr 3, 2013, 4:07:51 AM4/3/13
to
On Wed, Apr 3, 2013 at 9:55 AM, damien clochard <dam...@dalibo.info> wrote:
> Le 03/04/2013 02:43, Jonathan S. Katz a �crit :
>> On Apr 2, 2013, at 8:14 PM, Jonathan S. Katz wrote:
>>
>>> On Apr 2, 2013, at 8:03 PM, Selena Deckelmann wrote:
>>>
>>>> I agree that we should have a well-documented security release
>>>> process. There are existing processes documented that we might use as
>>>> a starting point, and I personally think largely match what we
>>>> currently do, like:
>>>> https://docs.djangoproject.com/en/1.5/internals/security/
>>>
>>> The Django security release guide is good - I think we could almost
>>> copy & paste it. I could throw something up on our wiki where we can
>>> fill in the blanks on what we want the actually policy to be and allow
>>> people to comment + add modifications.
>>
>> Here is a wiki I through together combining elements of both our current
>> security page and thoughts from the Django one:
>>
>> https://wiki.postgresql.org/wiki/PostgreSQL_Security_Release_Policy_Draft
>>
>> I separated between our current policy and the draft. The draft really
>> needs some blanks to be filled in.
>>
>
> Thanks for this draft, it's an improvement !
>
> Here's a few comments :
>
> A/ I think the names of "The Packagers List" should be public. I think
> it's an important infomation when you choose a distibution system or a
> service provider. One should be able to check if a package/service
> provider is connected to the Security Team or not.

Listing which packages, at least, seems reasonable. Doesn't have to be
the people, but wihch projects/packagies are included does.


> B/ I feel that all "Packagers" should respect the "embargo date". They
> should not produce the packages prior to the official realease. This is
> what RPM and DEB packagers do and it's a good thing. Once again the
> problem is not that Heroku had early access to the security fix. The
> problem is that they "released" it 3 days before others packagers. I
> don't know if they did that on purpose but the message they are sending
> is "Heroku Postgres is more secure than vanilla PostgreSQL, because you
> get upgrades before full disclosure"
>
> C/ The Packagers list could be extended to companies providing
> PostgreSQL support. If the term "Packagers" include not only
> organizations that distribute the code but also organizations that
> provide PostgreSQL as a services, then PostgreSQL Support services
> should be included too.

In that case, you can just make it public in the first place. Any
company can claim to do postgres support. There are thousands of them
out there that do, at a lower level.


> If you produce binaries you're not supposed to make them accessible
> prior to the embargo date.

Yes.

--
Magnus Hagander
Me: http://www.hagander.net/
Work: http://www.redpill-linpro.com/

damien clochard

unread,
Apr 3, 2013, 4:28:54 AM4/3/13
to
>>
>> Here's a few comments :
>>
>> A/ I think the names of "The Packagers List" should be public. I think
>> it's an important infomation when you choose a distibution system or a
>> service provider. One should be able to check if a package/service
>> provider is connected to the Security Team or not.
>
> Listing which packages, at least, seems reasonable. Doesn't have to be
> the people, but wihch projects/packagies are included does.
>

Yes this is what I meant : Listing the names of organization/companies
inside the Packagers List.

>
>> B/ I feel that all "Packagers" should respect the "embargo date". They
>> should not produce the packages prior to the official realease. This is
>> what RPM and DEB packagers do and it's a good thing. Once again the
>> problem is not that Heroku had early access to the security fix. The
>> problem is that they "released" it 3 days before others packagers. I
>> don't know if they did that on purpose but the message they are sending
>> is "Heroku Postgres is more secure than vanilla PostgreSQL, because you
>> get upgrades before full disclosure"
>>
>> C/ The Packagers list could be extended to companies providing
>> PostgreSQL support. If the term "Packagers" include not only
>> organizations that distribute the code but also organizations that
>> provide PostgreSQL as a services, then PostgreSQL Support services
>> should be included too.
>
> In that case, you can just make it public in the first place. Any
> company can claim to do postgres support. There are thousands of them
> out there that do, at a lower level.
>

Yes just like anyone can claim to build its own distro or a "cloud
database". Actually it's even easier to claim you do DBaaS than
pretending to offer PostgreSQL support :-)

I never said the list should be extended to anyone asking. The Packagers
List needs to stay small and the Security Team is free to reject
requests that don't seem appropriate.

All I'm saying is that the difference between a DBaaS plateform and a
Production Support provider can be very thin. Some PostgreSQL companies
high level support including remote admin, monitoring, upgrades, etc. At
this level of service the difference with a cloud database is just the
location of the server.

damien clochard

unread,
Apr 3, 2013, 4:48:31 AM4/3/13
to
Le 03/04/2013 10:07, Dave Page a écrit :
> On Wed, Apr 3, 2013 at 3:55 AM, damien clochard <dam...@dalibo.info> wrote:
>>
>>
>> A/ I think the names of "The Packagers List" should be public. I think
>> it's an important infomation when you choose a distibution system or a
>> service provider. One should be able to check if a package/service
>> provider is connected to the Security Team or not.
>
> The packagers list and security team are different groups.
>

Yes i'm talking of the packagers list.

>> B/ I feel that all "Packagers" should respect the "embargo date". They
>> should not produce the packages prior to the official realease. This is
>> what RPM and DEB packagers do and it's a good thing. Once again the
>> problem is not that Heroku had early access to the security fix. The
>> problem is that they "released" it 3 days before others packagers. I
>> don't know if they did that on purpose but the message they are sending
>> is "Heroku Postgres is more secure than vanilla PostgreSQL, because you
>> get upgrades before full disclosure"
>
> How would that work? The reason we have a number of days between the
> tarballs being rolled and the embargo date is that it takes time to
> build and properly QA the packages. In the case of the installers,
> each branch gets tested on 30 - 40 different platforms in total. It is
> simply not possible to "not produce the packages prior to the official
> realease".
>

Ok maybe I was not clear enough here. With the word "produce" I meant
"making available to public". I'm awara the packagers need time to build
and test their packages.

What I am saying is that the packagers should not release publicly the
packages before the official release date.

I feel that if Red Hat had released the new RPM on monday, many people
here would have been unpleased. So why can Heroku do it ?


>> C/ The Packagers list could be extended to companies providing
>> PostgreSQL support. If the term "Packagers" include not only
>> organizations that distribute the code but also organizations that
>> provide PostgreSQL as a services, then PostgreSQL Support services
>> should be included too.
>
> No, most definitely not. The packagers list is a working/coordination
> list, not one for discussion. We need to keep that list tightly
> purposed and focussed on those actually creating packages for public
> distribution and arguably in the future, deployment on public DBaaS
> platforms (the key word in both cases, being "public").
>

Meh. What do you mean by "public" ? To me something that is "available
to everyone" or "open to general view". If you include paying services
sucha as Red Hat and Heroku in this "public" definition, than I guess
PostgreSQL support company is "public" too ? Where's the difference ?

Once again I'm not arguing that the packagers list should be extended to
anyone asking. But if we include "PostgreSQL as a service" in this list
than we need to come up with a precise definition of what "PostgreSQL
service" means...

Dave Page

unread,
Apr 3, 2013, 5:06:08 AM4/3/13
to
On Wed, Apr 3, 2013 at 4:48 AM, damien clochard <dam...@dalibo.info> wrote:
>
>> How would that work? The reason we have a number of days between the
>> tarballs being rolled and the embargo date is that it takes time to
>> build and properly QA the packages. In the case of the installers,
>> each branch gets tested on 30 - 40 different platforms in total. It is
>> simply not possible to "not produce the packages prior to the official
>> realease".
>>
>
> Ok maybe I was not clear enough here. With the word "produce" I meant
> "making available to public". I'm awara the packagers need time to build
> and test their packages.
>
> What I am saying is that the packagers should not release publicly the
> packages before the official release date.

Right, I agree with that.

>> No, most definitely not. The packagers list is a working/coordination
>> list, not one for discussion. We need to keep that list tightly
>> purposed and focussed on those actually creating packages for public
>> distribution and arguably in the future, deployment on public DBaaS
>> platforms (the key word in both cases, being "public").
>>
>
> Meh. What do you mean by "public" ? To me something that is "available
> to everyone" or "open to general view". If you include paying services
> sucha as Red Hat and Heroku in this "public" definition, than I guess
> PostgreSQL support company is "public" too ? Where's the difference ?

PostgreSQL support companies do not generally produce PostgreSQL
binary packages that are available for anyone to use (for a service
fee or otherwise) either via download or on a platform like a cloud
service. There are a handful of exceptions to that rule (EDB for
example, as we produce the installers), but most, if not all of those
companies are on the packagers list already.

--
Dave Page
Blog: http://pgsnake.blogspot.com
Twitter: @pgsnake

EnterpriseDB UK: http://www.enterprisedb.com
The Enterprise PostgreSQL Company


Michael Meskes

unread,
Apr 3, 2013, 5:31:47 AM4/3/13
to
On Wed, Apr 03, 2013 at 05:06:08AM -0400, Dave Page wrote:
> PostgreSQL support companies do not generally produce PostgreSQL
> binary packages that are available for anyone to use (for a service
> fee or otherwise) either via download or on a platform like a cloud
> service. There are a handful of exceptions to that rule (EDB for
> example, as we produce the installers), but most, if not all of those
> companies are on the packagers list already.

So that means if said support company creates packages for its customers it
should be on the packagers list? After all anyone could get the packages from
that company, couldn't they? Is there a any description as to who is eligible
for the packages list? And of course I take it there is a code of conduct for
this list, albeit Heroku didn't honor that one.

Michael

--
Michael Meskes
Michael at Fam-Meskes dot De, Michael at Meskes dot (De|Com|Net|Org)
Michael at BorussiaFan dot De, Meskes at (Debian|Postgresql) dot Org
Jabber: michael.meskes at gmail dot com
VfL Borussia! Força Barça! Go SF 49ers! Use Debian GNU/Linux, PostgreSQL

Dave Page

unread,
Apr 3, 2013, 6:14:25 AM4/3/13
to
On Wed, Apr 3, 2013 at 5:31 AM, Michael Meskes <mes...@postgresql.org> wrote:
> On Wed, Apr 03, 2013 at 05:06:08AM -0400, Dave Page wrote:
>> PostgreSQL support companies do not generally produce PostgreSQL
>> binary packages that are available for anyone to use (for a service
>> fee or otherwise) either via download or on a platform like a cloud
>> service. There are a handful of exceptions to that rule (EDB for
>> example, as we produce the installers), but most, if not all of those
>> companies are on the packagers list already.
>
> So that means if said support company creates packages for its customers it
> should be on the packagers list? After all anyone could get the packages from
> that company, couldn't they? Is there a any description as to who is eligible
> for the packages list?

First; I'm giving about my personal opinion at the moment, not
representing -core.

I do not believe that regular support companies should be included,
because there are too many of them, and they will likely be packaging
for a very small audience who in most cases could easily be using the
community packages. With so many people on the list, security and
confidentiality becomes impossible to enforce.

I support having the packagers of the mainstream packages on the list,
e.g. installers, RPMs, DEBs, Postgres.app, OS vendor packages etc
(e.g. Palle who provides the FreeBSD ports) etc.

I also support having the large scale DBaaS providers on the list, as
they provide Postgres instances for thousands of users, very publicly
- Heroku, as the obvious example, have hundreds of thousands of
databases on their platform.

> And of course I take it there is a code of conduct for
> this list, albeit Heroku didn't honor that one.

Let me state this very clearly:

*** Heroku have done nothing wrong ***

I cannot go into details at the moment, but their actions have been
taken following talks with the core team, in a difficult time, with no
precedence within the community to follow and very little time for
in-depth discussion. We have had similar discussions with other large
DBaaS providers, who have different architectures with different
implications to consider.

In hindsight, I'm sure the rest of core will agree we might have
handled this better in some respects, but as we all know, hindsight is
a wonderful thing. We will be working on policies to guide us in the
future in the event that something similar happens again (and as
you've probably seen, that's already started).

--
Dave Page
Blog: http://pgsnake.blogspot.com
Twitter: @pgsnake

EnterpriseDB UK: http://www.enterprisedb.com
The Enterprise PostgreSQL Company


Michael Meskes

unread,
Apr 3, 2013, 7:22:11 AM4/3/13
to
On Wed, Apr 03, 2013 at 06:14:25AM -0400, Dave Page wrote:
> I do not believe that regular support companies should be included,
> because there are too many of them, and they will likely be packaging
> for a very small audience who in most cases could easily be using the
> community packages. With so many people on the list, security and
> confidentiality becomes impossible to enforce.

I do agree on the confidentiality problem, I do not agree in the "in most cases could easily be using the
community packages" part. Honestly, why would anyone pay a support company to
build packages if they can use the free community ones instead? Ok, maybe some
do because they simple don't know, but in general itÄs because they have some
special needs.

> I support having the packagers of the mainstream packages on the list,
> e.g. installers, RPMs, DEBs, Postgres.app, OS vendor packages etc
> (e.g. Palle who provides the FreeBSD ports) etc.
>
> I also support having the large scale DBaaS providers on the list, as
> they provide Postgres instances for thousands of users, very publicly
> - Heroku, as the obvious example, have hundreds of thousands of
> databases on their platform.

So then it's a matter of users? What is the number of user one has to have to
qualify? How do we count users? Installations, db admins, real database users
as in customers? As a support company (bad wording actually as support doesn't
mean you're creating packages) serving a customers with thousands of instances,
do I qualify?

Don't get me wrong, I'm not complaining and I don't have a ready made solution
for this, but I do strongly believe we should come up with a set of rules, that
are discussed and decided upon in the open. We definitely don't want this to
look like a (strange?) decision made behind closed doors, or do we?

> Let me state this very clearly:
>
> *** Heroku have done nothing wrong ***

That much I learned so far, sorry for accusing Heroku. It seems that press
report wasn't theirs and they received permission to start deploying early.
Although again I wonder why all this decision making hasn't been open. Why are
their customers more important than ours or EDB's or any other company that
hasn't rolled out the patches yet.

> I cannot go into details at the moment, but their actions have been

Why? I can see a reason why we don't talk about the bug or the fix in the open.
Sure that makes sense because we have to have the fixed version out first. But
why does the same hold for communication about deployment embargo?

> taken following talks with the core team, in a difficult time, with no
> precedence within the community to follow and very little time for

You mean the PostgreSQL community, right? We're not the first project that
discovers a nasty security hole. And we won't be the last.

> in-depth discussion. We have had similar discussions with other large
> DBaaS providers, who have different architectures with different
> implications to consider.

Sure and those details don't belong into the open.

> In hindsight, I'm sure the rest of core will agree we might have
> handled this better in some respects, but as we all know, hindsight is
> a wonderful thing. We will be working on policies to guide us in the
> future in the event that something similar happens again (and as
> you've probably seen, that's already started).

Yes, hindsight is always 20/20. Again, I hope you see my email is part of a
constructive discussion to get to a better policy for the next time, that
hopefully will never come. :)

Michael
--
Michael Meskes
Michael at Fam-Meskes dot De, Michael at Meskes dot (De|Com|Net|Org)
Michael at BorussiaFan dot De, Meskes at (Debian|Postgresql) dot Org
Jabber: michael.meskes at gmail dot com
VfL Borussia! Força Barça! Go SF 49ers! Use Debian GNU/Linux, PostgreSQL


Magnus Hagander

unread,
Apr 3, 2013, 7:26:22 AM4/3/13
to
On Wed, Apr 3, 2013 at 1:22 PM, Michael Meskes <mes...@postgresql.org> wrote:
> On Wed, Apr 03, 2013 at 06:14:25AM -0400, Dave Page wrote:
>> I cannot go into details at the moment, but their actions have been
>
> Why? I can see a reason why we don't talk about the bug or the fix in the open.
> Sure that makes sense because we have to have the fixed version out first. But
> why does the same hold for communication about deployment embargo?

Because talking about it in public in a way to make it make sense,
would leak information about what and where the bug is, and thus give
people who are looking to exploit it a much easier job in finding it
before people have had a chance to apply the patches.

If you are willing to wait a few days until such details can be made
public, there is no reason why we can't talk about it in the open -
and we should. But for now, the risk of actually putting all users at
risk because someone uses that information to figure out where exactly
the bug is before the patches are applied is pretty big.


>> taken following talks with the core team, in a difficult time, with no
>> precedence within the community to follow and very little time for
>
> You mean the PostgreSQL community, right? We're not the first project that
> discovers a nasty security hole. And we won't be the last.

Yes.

--
Magnus Hagander
Me: http://www.hagander.net/
Work: http://www.redpill-linpro.com/


Guillaume Lelarge

unread,
Apr 3, 2013, 7:35:23 AM4/3/13
to
FWIW, I completely agree with Dave. Kudos to -core and the security team
for handling this.


--
Guillaume
http://blog.guillaume.lelarge.info
http://www.dalibo.com

Michael Meskes

unread,
Apr 3, 2013, 7:49:08 AM4/3/13
to
On Wed, Apr 03, 2013 at 01:26:22PM +0200, Magnus Hagander wrote:
> > Why? I can see a reason why we don't talk about the bug or the fix in the open.
> > Sure that makes sense because we have to have the fixed version out first. But
> > why does the same hold for communication about deployment embargo?
>
> Because talking about it in public in a way to make it make sense,
> would leak information about what and where the bug is, and thus give
> people who are looking to exploit it a much easier job in finding it
> before people have had a chance to apply the patches.

I wasn't talking about the discussion about the bug etc., I was just talking
about the discussion about the permission to deploy. But if these were so
tightly intervened I will gladly wait.

> If you are willing to wait a few days until such details can be made
> public, there is no reason why we can't talk about it in the open -
> and we should. But for now, the risk of actually putting all users at
> risk because someone uses that information to figure out where exactly
> the bug is before the patches are applied is pretty big.

Sure, thanks.

Michael
--
Michael Meskes
Michael at Fam-Meskes dot De, Michael at Meskes dot (De|Com|Net|Org)
Michael at BorussiaFan dot De, Meskes at (Debian|Postgresql) dot Org
Jabber: michael.meskes at gmail dot com
VfL Borussia! Força Barça! Go SF 49ers! Use Debian GNU/Linux, PostgreSQL


Magnus Hagander

unread,
Apr 3, 2013, 7:51:37 AM4/3/13
to
On Wed, Apr 3, 2013 at 1:49 PM, Michael Meskes <mes...@postgresql.org> wrote:
> On Wed, Apr 03, 2013 at 01:26:22PM +0200, Magnus Hagander wrote:
>> > Why? I can see a reason why we don't talk about the bug or the fix in the open.
>> > Sure that makes sense because we have to have the fixed version out first. But
>> > why does the same hold for communication about deployment embargo?
>>
>> Because talking about it in public in a way to make it make sense,
>> would leak information about what and where the bug is, and thus give
>> people who are looking to exploit it a much easier job in finding it
>> before people have had a chance to apply the patches.
>
> I wasn't talking about the discussion about the bug etc., I was just talking
> about the discussion about the permission to deploy. But if these were so
> tightly intervened I will gladly wait.

If you want an explanation for exactly what was done this time, and
why, then yes, that's hard to do without explaining the whole thing.
Which would leak it.


>> If you are willing to wait a few days until such details can be made
>> public, there is no reason why we can't talk about it in the open -
>> and we should. But for now, the risk of actually putting all users at
>> risk because someone uses that information to figure out where exactly
>> the bug is before the patches are applied is pretty big.
>
> Sure, thanks.

For the record, we have no intention whatsoever to keep any of this
information secret past the embargo date. Never had.

Dave Page

unread,
Apr 3, 2013, 7:52:33 AM4/3/13
to
On Wed, Apr 3, 2013 at 7:22 AM, Michael Meskes <mes...@postgresql.org> wrote:
> On Wed, Apr 03, 2013 at 06:14:25AM -0400, Dave Page wrote:
>> I do not believe that regular support companies should be included,
>> because there are too many of them, and they will likely be packaging
>> for a very small audience who in most cases could easily be using the
>> community packages. With so many people on the list, security and
>> confidentiality becomes impossible to enforce.
>
> I do agree on the confidentiality problem, I do not agree in the "in most cases could easily be using the
> community packages" part. Honestly, why would anyone pay a support company to
> build packages if they can use the free community ones instead? Ok, maybe some
> do because they simple don't know, but in general itÄs because they have some
> special needs.

Even if you put that aside though, there are nearly 300
support/services companies in our directory, most of whom are likely
to be unknown to the majority of us. Obviously there's no way we would
include all of them on the -packagers list, so how do we decide
fairly?

>> I support having the packagers of the mainstream packages on the list,
>> e.g. installers, RPMs, DEBs, Postgres.app, OS vendor packages etc
>> (e.g. Palle who provides the FreeBSD ports) etc.
>>
>> I also support having the large scale DBaaS providers on the list, as
>> they provide Postgres instances for thousands of users, very publicly
>> - Heroku, as the obvious example, have hundreds of thousands of
>> databases on their platform.
>
> So then it's a matter of users? What is the number of user one has to have to
> qualify? How do we count users? Installations, db admins, real database users
> as in customers?

Yes, that is what needs debate. I don't know how we can write down
specific criteria. I do know that when we tried to do something
similar to define who goes on the sponsors page, we got nowhere at all
because it's *really* hard to write such rules, without almost
immediately finding some exception that we'd have to make.

>> I cannot go into details at the moment, but their actions have been
>
> Why? I can see a reason why we don't talk about the bug or the fix in the open.
> Sure that makes sense because we have to have the fixed version out first. But
> why does the same hold for communication about deployment embargo?

Magnus has answered that nicely, so I won't repeat him.

>> taken following talks with the core team, in a difficult time, with no
>> precedence within the community to follow and very little time for
>
> You mean the PostgreSQL community, right?

Yes.

> Yes, hindsight is always 20/20. Again, I hope you see my email is part of a
> constructive discussion to get to a better policy for the next time, that
> hopefully will never come. :)

Of course - I've known you long enough to expect nothing less :-)

--
Dave Page
Blog: http://pgsnake.blogspot.com
Twitter: @pgsnake

EnterpriseDB UK: http://www.enterprisedb.com
The Enterprise PostgreSQL Company


Michael Meskes

unread,
Apr 3, 2013, 8:01:39 AM4/3/13
to
On Wed, Apr 03, 2013 at 07:52:33AM -0400, Dave Page wrote:
> Even if you put that aside though, there are nearly 300
> support/services companies in our directory, most of whom are likely
> to be unknown to the majority of us. Obviously there's no way we would
> include all of them on the -packagers list, so how do we decide
> fairly?

Yep, that's the tricky point. And we may run into the same problem DBaaS when
more companies offer a hosted PostgreSQL version.

> > So then it's a matter of users? What is the number of user one has to have to
> > qualify? How do we count users? Installations, db admins, real database users
> > as in customers?
>
> Yes, that is what needs debate. I don't know how we can write down
> specific criteria. I do know that when we tried to do something
> similar to define who goes on the sponsors page, we got nowhere at all
> because it's *really* hard to write such rules, without almost
> immediately finding some exception that we'd have to make.

True.

Michael
--
Michael Meskes
Michael at Fam-Meskes dot De, Michael at Meskes dot (De|Com|Net|Org)
Michael at BorussiaFan dot De, Meskes at (Debian|Postgresql) dot Org
Jabber: michael.meskes at gmail dot com
VfL Borussia! Força Barça! Go SF 49ers! Use Debian GNU/Linux, PostgreSQL


Gilberto Castillo

unread,
Apr 3, 2013, 8:45:25 AM4/3/13
to
In my opinion we should STRENGTHEN early warning system as core members,
with greater visibility in communities. This will help us to manage
information to regard.


Saludos,
Gilberto Castillo
La Habana, Cuba

Jonathan S. Katz

unread,
Apr 3, 2013, 10:25:48 AM4/3/13
to
Hi Josh,

On Apr 3, 2013, at 12:57 AM, Josh Berkus wrote:

> Jonathan,
>
>> Here is a wiki I through together combining elements of both our
>> current security page and thoughts from the Django one:
>
> Thanks for getting this started! I've revised it heavily.

Thanks for working on it - it looks very good overall.

My one question regarding policy is related to distribution. I do agree with the evaluation criteria for choosing distributors, but my question pertains to entities that could be classified as "critical infrastructure" that use Postgres, e.g. utilities, hospitals, etc. Though it is still up to the management of those entities to handle the upgrades, I think it would be in their best interests to have a critical security fix available to them so they have that opportunity before it goes live.

I also presume that these organizations receive their releases from distributors - so if we were to enable such organizations to also receive an early release, what would the policy be?

>> One suggestion (not in the draft) is that when we do make release
>> announcements containing security fixes, we do include the URL to our
>> security policy to make it clear what it is.
>
> Actually, we usually do provide a link.

I've looked through the news announcements to the last few releases. There are links to the versioning policy and if there is a CVE a link to the CVE listing site itself, but nothing pointing to our security policy. I strongly suggest we add that link to our template (don't know where that exists) and make sure it's in any future email pertaining to a security announcement and/or release.

Jonathan

Josh Berkus

unread,
Apr 3, 2013, 1:46:54 PM4/3/13
to

> My one question regarding policy is related to distribution. I do
> agree with the evaluation criteria for choosing distributors, but my
> question pertains to entities that could be classified as "critical
> infrastructure" that use Postgres, e.g. utilities, hospitals, etc.
> Though it is still up to the management of those entities to handle
> the upgrades, I think it would be in their best interests to have a
> critical security fix available to them so they have that opportunity
> before it goes live.
>
> I also presume that these organizations receive their releases from
> distributors - so if we were to enable such organizations to also
> receive an early release, what would the policy be?

There's a whole set of questions regarding early access to security
updates which we're not yet ready to tackle, and may never be ready to
tackle. This includes:

- large commercial support vendors (e.g. SRA)
- distributors of embedded Postgres (on devices) (e.g. Apple)
- critical infrastructure users (e.g. the FAA)
- large-scale end users with high security profiles (e.g. Enova)

All of the above have legitimate, and sometimes compelling, reasons to
need to be able to apply security updates in advance of them becoming
public. Deciding who gets to be on an early notification list and who
doesn't, while keeping the list small enough to not effectively make
things public, will be very hard and potentially impossible. And
ultimately we are a non-profit, volunteer project and can't devote 100
full time staff to managing security disclosure the way Microsoft can.

--
Josh Berkus
PostgreSQL Experts Inc.
http://pgexperts.com


Jonathan S. Katz

unread,
Apr 8, 2013, 2:49:12 PM4/8/13
to
Now that a few days have passed, I'd like to revisit this before too much time lapses.

(The link again for the security policy draft: https://wiki.postgresql.org/wiki/PostgreSQL_Security_Release_Policy_Draft)

Josh - I think your points are valid concerning the vetting of who would be included in early releases.  I believe the best way to address who would be on that list is having a committee to vet those applications - I believe that is similar to how other OSS communities handle it.  I do not think the amount of submissions for requesting early access would be so great that we would need a full-time team to maintain it, and I think most of us have a good idea already about which types of organizations truly would need an early access release.

With that said, if there are no overwhelming objections over the next 36 hours, I can submit a patch to our security policy on the website using the language that is in the wiki above.

Jonathan


Joshua D. Drake

unread,
Apr 8, 2013, 2:53:58 PM4/8/13
to
Since it is -core that primarily decides when things will be released,
it seems that we would need their approval for this policy?

Joshua D. Drake


>
> Jonathan
>
>


--
Command Prompt, Inc. - http://www.commandprompt.com/
PostgreSQL Support, Training, Professional Services and Development
High Availability, Oracle Conversion, Postgres-XC
@cmdpromptinc - 509-416-6579

Jonathan S. Katz

unread,
Apr 8, 2013, 2:56:52 PM4/8/13
to
On Apr 8, 2013, at 2:53 PM, Joshua D. Drake wrote:

>
> On 04/08/2013 11:49 AM, Jonathan S. Katz wrote:
>> On Apr 3, 2013, at 1:46 PM, Josh Berkus wrote:
>
>> Josh - I think your points are valid concerning the vetting of who would
>> be included in early releases. I believe the best way to address who
>> would be on that list is having a committee to vet those applications -
>> I believe that is similar to how other OSS communities handle it. I do
>> not think the amount of submissions for requesting early access would be
>> so great that we would need a full-time team to maintain it, and I think
>> most of us have a good idea already about which types of organizations
>> truly would need an early access release.
>>
>> With that said, if there are no overwhelming objections over the next 36
>> hours, I can submit a patch to our security policy on the website using
>> the language that is in the wiki above.
>
> Since it is -core that primarily decides when things will be released, it seems that we would need their approval for this policy?

Well, that would be valid. Could someone in -core please put the policy through the proper procedural work for approval?

Jonathan

Josh Berkus

unread,
Apr 8, 2013, 3:03:49 PM4/8/13
to

>> Since it is -core that primarily decides when things will be released, it seems that we would need their approval for this policy?
>
> Well, that would be valid. Could someone in -core please put the policy through the proper procedural work for approval?

DIscussion on -core currently in progress.

--
Josh Berkus
PostgreSQL Experts Inc.
http://pgexperts.com


damien clochard

unread,
Apr 8, 2013, 5:27:53 PM4/8/13
to

>
> Now that a few days have passed, I'd like to revisit this before too
> much time lapses.
>
> (The link again for the security policy
> draft: https://wiki.postgresql.org/wiki/PostgreSQL_Security_Release_Policy_Draft)
>

Jonathan,

Thanks for this page again !

I would like to add a paragraph about the release date (or "embargo
date"). It seems important to me that all packagers agree to synchronize
and distribute/deploy the security fix at the same date. For packager
who distribute the source code this is obvious. But that's also true for
DBaaS providers.

The Heroku announcement caused many confusions. The worst confusion is
that it sounds like Heroku gets a special treament and is allowed to
upgrade 3 days before full disclosure, while the rest of us have to wait
the official release date.

So basically the message we're sending is : Heroku Postgres is safer
than Vanilla PostgreSQL because in case of an high-exposure security
vulnerability, Heroku will upgrade before everyone else.

BTW you can replace Heroku by the DBaaS provider of your choice... I
have nothing against Heroku and I have great respect for the
contribution to our community.

I'm taking them as an exemple, because they've been very transparent
about all this (see
https://blog.heroku.com/archives/2013/4/4/heroku_postgres_databases_patched)
and that's a good thing because it helps us improving our Security
Release Policy.

Now I understand that Heroku (and other DBaaS providers) may host
hundreds of thousand PostgreSQL servers and I understand that upgrading
so many servers in a few hours is something very hard to acheive. But
the responsability of building a security maintenance process like that
is on Heroku (and other DBaaS providers). The PostgreSQL community
should keep some neutrality and should not compensate the lack of
upgrade machinery of a private company. Even if that means thousand of
their customers will be exposed for a while.

Tatsuo Ishii

unread,
Apr 8, 2013, 6:39:01 PM4/8/13
to
> I would like to add a paragraph about the release date (or "embargo
> date"). It seems important to me that all packagers agree to synchronize
> and distribute/deploy the security fix at the same date. For packager
> who distribute the source code this is obvious. But that's also true for
> DBaaS providers.

Very good point.

> The Heroku announcement caused many confusions. The worst confusion is
> that it sounds like Heroku gets a special treament and is allowed to
> upgrade 3 days before full disclosure, while the rest of us have to wait
> the official release date.
>
> So basically the message we're sending is : Heroku Postgres is safer
> than Vanilla PostgreSQL because in case of an high-exposure security
> vulnerability, Heroku will upgrade before everyone else.

It was the most expected response from users, I think.

> BTW you can replace Heroku by the DBaaS provider of your choice... I
> have nothing against Heroku and I have great respect for the
> contribution to our community.
>
> I'm taking them as an exemple, because they've been very transparent
> about all this (see
> https://blog.heroku.com/archives/2013/4/4/heroku_postgres_databases_patched)
> and that's a good thing because it helps us improving our Security
> Release Policy.
>
> Now I understand that Heroku (and other DBaaS providers) may host
> hundreds of thousand PostgreSQL servers and I understand that upgrading
> so many servers in a few hours is something very hard to acheive. But
> the responsability of building a security maintenance process like that
> is on Heroku (and other DBaaS providers). The PostgreSQL community
> should keep some neutrality and should not compensate the lack of
> upgrade machinery of a private company. Even if that means thousand of
> their customers will be exposed for a while.

Agreed.
--
Tatsuo Ishii
SRA OSS, Inc. Japan
English: http://www.sraoss.co.jp/index_en.php
Japanese: http://www.sraoss.co.jp

Jonathan S. Katz

unread,
Apr 8, 2013, 6:58:57 PM4/8/13
to
On Apr 8, 2013, at 5:27 PM, damien clochard wrote:

>> Now that a few days have passed, I'd like to revisit this before too
>> much time lapses.
>>
>> (The link again for the security policy
>> draft: https://wiki.postgresql.org/wiki/PostgreSQL_Security_Release_Policy_Draft)
>>
>
> Now I understand that Heroku (and other DBaaS providers) may host
> hundreds of thousand PostgreSQL servers and I understand that upgrading
> so many servers in a few hours is something very hard to acheive. But
> the responsability of building a security maintenance process like that
> is on Heroku (and other DBaaS providers). The PostgreSQL community
> should keep some neutrality and should not compensate the lack of
> upgrade machinery of a private company. Even if that means thousand of
> their customers will be exposed for a while.

I do not entirely agree with this. Applications that run as critical infrastructure (examples again: hospitals, utilities, etc.) should be permitted early access to releases - as a community, we would not want to expose critical infrastructure to unnecessary risk while there is a fix available prior to public disclosure of a bug. I think most people have good judgment and understanding that certain groups should have early access to a potentially dangerous software issue as it could end up causing much larger issues should the software be exploited. I think if we as a community communicate this message well, the people who have issues with some groups having early access would be minimal.

In this specific case, DBaaS providers were exposed to a bug that is relatively easy to exploit with potentially dire consequences that could potentially ruin many, many businesses (I do not want to give a bad estimate, so I won't provide a number). Let's say this horrible scenario happened: sure, people could say that a DBaaS provider did not adequately secure their system, but fingers could also be pointed at the community for a) having a security hole in the first place (as ludicrous as that sounds to us as we know that software is flawed AND Postgres has an *excellent* track record for security) and b) not recognizing the damage that could be caused by not permitting systems considered to be "critical infrastructure" early access to a fix.

In an ideal world - yes - everyone should have access to critical security bugfixes at identical times. However, due to the sensitivity of certain systems (I do not think any of us would want to see a hospital's system go down due to a security exploit), there does need to be an early access list. The way keep it fair for that is to have a committee of various PGDG members with different backgrounds to review applications and vote to decide who should have early access (where access is not even necessarily the source - access could even be just to the binaries). I know one of the goals is to keep that list small, and I do agree with that, but more importantly, there should be guidelines on how to maintain membership to that list.

Josh Berkus

unread,
Apr 8, 2013, 7:12:20 PM4/8/13
to
Damien,

> The Heroku announcement caused many confusions. The worst confusion is
> that it sounds like Heroku gets a special treament and is allowed to
> upgrade 3 days before full disclosure, while the rest of us have to wait
> the official release date.

So Heroku had permission from the core team to start their update early,
partly because of required deployment times, and partly because they
could supply testing and feedback on the patch, as they have with other
patches they've backported from future versions of PostgreSQL. We were
also conscious of the fact that, as far as we knew, Heroku represented
the single largest organizational vulnerability to this particular
issue, and that due to their "port-only access" the possibility of
accidental disclosure was minimal.

We didn't anticipate that the early notification we did combined with
the Heroku outage notification would make it obvious that an early
deployment was happening. We don't generally do early warnings, and
this whole "cloud" thing is still new to us organizationally. ALso, we
went from discovery to release in 3 weeks, so there wasn't a lot of
discussion time around policy and procedure.

Clearly we can't do it that way again.

-core is currently hashing out thoughts on what might be a reasonable
early notification process for high-risk users, and if it's feasible for
us to have one. As well as other aspects of our security release procedure.

--
Josh Berkus
PostgreSQL Experts Inc.
http://pgexperts.com


Bruce Momjian

unread,
Apr 8, 2013, 7:32:21 PM4/8/13
to
On Mon, Apr 8, 2013 at 06:58:57PM -0400, Jonathan S. Katz wrote:
> In an ideal world - yes - everyone should have access to critical
> security bugfixes at identical times. However, due to the sensitivity
> of certain systems (I do not think any of us would want to see a
> hospital's system go down due to a security exploit), there does need
> to be an early access list. The way keep it fair for that is to have
> a committee of various PGDG members with different backgrounds to
> review applications and vote to decide who should have early access
> (where access is not even necessarily the source - access could even
> be just to the binaries). I know one of the goals is to keep that
> list small, and I do agree with that, but more importantly, there
> should be guidelines on how to maintain membership to that list.

Good analysis --- let me add a few things. First, as others have
pointed out, Heroku did nothing wrong. They followed the rules set by
the core/security teams --- if they had been given different rules, they
would have acted differently --- so any blame on the outcome has to be
assigned to the core/security teams.

Second, not only is Heroku uniquely exposed to the bug, they don't
supply source or even binaries to users, hence an early deployment had
little risk of a security leak. (They also produce a custom build with
additional features, e.g. JSON.) Also, they did a rolling deployment
and provided daily reports to the security team about their progress and
lack of problems, so their early deployment had some testing benefit to
the community. (The buildfarm did no testing of the security patches
due to the git mirror blackout.)

I think the unfortunate net effect is that, in this case, distributors
who had to provide source or release notes were actually hampered in
providing early deployment binaries to users.

If you look at each issue individually, allowing binary-only,
no-release-note distributors to deploy early actually makes sense, but
seen in a larger context, it looks more doubtful. There was some sense
that this was such an unusual release that _safety_ was given such great
importance that some other criteria were overlooked --- perhaps rightly,
perhaps wrongly.

As Josh Berkus already mentioned, the core team is still debriefing all
these issues and how this was handled and trying to improve its
processes. This is only my personal analysis, not that of the core team
as a whole.

--
Bruce Momjian <br...@momjian.us> http://momjian.us
EnterpriseDB http://enterprisedb.com

+ It's impossible for everything to be true. +

Joshua D. Drake

unread,
Apr 8, 2013, 7:32:06 PM4/8/13
to

On 04/08/2013 04:12 PM, Josh Berkus wrote:
>
> Damien,
>
>> The Heroku announcement caused many confusions. The worst confusion is
>> that it sounds like Heroku gets a special treament and is allowed to
>> upgrade 3 days before full disclosure, while the rest of us have to wait
>> the official release date.
>
> So Heroku had permission from the core team to start their update early,
> partly because of required deployment times, and partly because they
> could supply testing and feedback on the patch, as they have with other
> patches they've backported from future versions of PostgreSQL. We were
> also conscious of the fact that, as far as we knew, Heroku represented
> the single largest organizational vulnerability to this particular
> issue, and that due to their "port-only access" the possibility of
> accidental disclosure was minimal.
>
> We didn't anticipate that the early notification we did combined with
> the Heroku outage notification would make it obvious that an early
> deployment was happening. We don't generally do early warnings, and
> this whole "cloud" thing is still new to us organizationally. ALso, we
> went from discovery to release in 3 weeks, so there wasn't a lot of
> discussion time around policy and procedure.
>
> Clearly we can't do it that way again.
>
> -core is currently hashing out thoughts on what might be a reasonable
> early notification process for high-risk users, and if it's feasible for
> us to have one. As well as other aspects of our security release procedure.
>

I think that one thing that is very important to remember here, is -core
doesn't make decisions lightly. I understand that some may have felt
that communication wasn't perfect (it wasn't) but I know several members
of core and they all take the position IMHO too seriously. So let's
relax, realize there is improvement to be made (which they and we do)
and just work the problem.

The rest is just noise.

Sincerely,

JD





--
Command Prompt, Inc. - http://www.commandprompt.com/
PostgreSQL Support, Training, Professional Services and Development
High Availability, Oracle Conversion, Postgres-XC
@cmdpromptinc - 509-416-6579


Adrian Klaver

unread,
Apr 8, 2013, 8:13:47 PM4/8/13
to
On 04/08/2013 04:32 PM, Joshua D. Drake wrote:
>
> On 04/08/2013 04:12 PM, Josh Berkus wrote:
>>
>
>> Clearly we can't do it that way again.
>>
>> -core is currently hashing out thoughts on what might be a reasonable
>> early notification process for high-risk users, and if it's feasible for
>> us to have one. As well as other aspects of our security release
>> procedure.
>>
>
> I think that one thing that is very important to remember here, is -core
> doesn't make decisions lightly. I understand that some may have felt
> that communication wasn't perfect (it wasn't) but I know several members
> of core and they all take the position IMHO too seriously. So let's
> relax, realize there is improvement to be made (which they and we do)
> and just work the problem.

Agreed. As far as I can see things where handled in the Postgres way,
when in doubt err on the side of caution. I applaud the efforts of those
concerned and trust in their ability to build on the experience.

>
> The rest is just noise.
>
> Sincerely,
>
> JD
>
>
>
>
>


--
Adrian Klaver
adrian...@gmail.com

Josh Berkus

unread,
Apr 8, 2013, 8:50:32 PM4/8/13
to

> Agreed. As far as I can see things where handled in the Postgres way,
> when in doubt err on the side of caution. I applaud the efforts of those
> concerned and trust in their ability to build on the experience.

Mostly I'd rather be arguing as to whether or not we should have given
Heroku early deployment vs. arguing whether or not we could have
prevented them from being hacked. The same goes for other users, which
is why we're discussing policy now.

--
Josh Berkus
PostgreSQL Experts Inc.
http://pgexperts.com


Joshua D. Drake

unread,
Apr 8, 2013, 9:20:18 PM4/8/13
to

On 04/08/2013 05:50 PM, Josh Berkus wrote:
>
>
>> Agreed. As far as I can see things where handled in the Postgres way,
>> when in doubt err on the side of caution. I applaud the efforts of those
>> concerned and trust in their ability to build on the experience.
>
> Mostly I'd rather be arguing as to whether or not we should have given
> Heroku early deployment

No.

That isn't to say I didn't understand that theory of doing so. I do.
However, you essentially created a class of user that is above other
users and that is explicitly not Open Source.

Sincerely,

Joshua D. Drake

--
Command Prompt, Inc. - http://www.commandprompt.com/
PostgreSQL Support, Training, Professional Services and Development
High Availability, Oracle Conversion, Postgres-XC
@cmdpromptinc - 509-416-6579


Adrian Klaver

unread,
Apr 8, 2013, 10:16:09 PM4/8/13
to
On 04/08/2013 05:50 PM, Josh Berkus wrote:
>
>> Agreed. As far as I can see things where handled in the Postgres way,
>> when in doubt err on the side of caution. I applaud the efforts of those
>> concerned and trust in their ability to build on the experience.
>
> Mostly I'd rather be arguing as to whether or not we should have given
> Heroku early deployment vs. arguing whether or not we could have
> prevented them from being hacked. The same goes for other users, which
> is why we're discussing policy now.

I am going to admit to being dense, but is it not the same thing?

>


--
Adrian Klaver
adrian...@gmail.com

Dave Page

unread,
Apr 9, 2013, 4:21:59 AM4/9/13
to
On Tue, Apr 9, 2013 at 2:20 AM, Joshua D. Drake <j...@commandprompt.com> wrote:
>
> On 04/08/2013 05:50 PM, Josh Berkus wrote:
>>
>>
>>
>>> Agreed. As far as I can see things where handled in the Postgres way,
>>> when in doubt err on the side of caution. I applaud the efforts of those
>>> concerned and trust in their ability to build on the experience.
>>
>>
>> Mostly I'd rather be arguing as to whether or not we should have given
>> Heroku early deployment
>
>
> No.
>
> That isn't to say I didn't understand that theory of doing so. I do.
> However, you essentially created a class of user that is above other users
> and that is explicitly not Open Source.

I'm not arguing either way here... but if you think of DBaaS as "the
new packaging", it starts to seem more reasonable to give folks like
Heroku access at the same time as the traditional packagers.

--
Dave Page
Blog: http://pgsnake.blogspot.com
Twitter: @pgsnake

EnterpriseDB UK: http://www.enterprisedb.com
The Enterprise PostgreSQL Company


damien clochard

unread,
Apr 9, 2013, 4:38:49 AM4/9/13
to
Le 09/04/2013 10:21, Dave Page a écrit :
> On Tue, Apr 9, 2013 at 2:20 AM, Joshua D. Drake <j...@commandprompt.com> wrote:
>>
>> On 04/08/2013 05:50 PM, Josh Berkus wrote:
>>>
>>>
>>>
>>>> Agreed. As far as I can see things where handled in the Postgres way,
>>>> when in doubt err on the side of caution. I applaud the efforts of those
>>>> concerned and trust in their ability to build on the experience.
>>>
>>>
>>> Mostly I'd rather be arguing as to whether or not we should have given
>>> Heroku early deployment
>>
>>
>> No.
>>
>> That isn't to say I didn't understand that theory of doing so. I do.
>> However, you essentially created a class of user that is above other users
>> and that is explicitly not Open Source.
>
> I'm not arguing either way here... but if you think of DBaaS as "the
> new packaging", it starts to seem more reasonable to give folks like
> Heroku access at the same time as the traditional packagers.
>

Just to make things clear : my previous message is not about wether or
nor a DBaaS provider should have early access to security releases (even
if that's a good question).

My message is about wether or not a DBaaS provider should be allowed to
deploy the security release days before the official release date.

Michael Meskes

unread,
Apr 9, 2013, 5:54:12 AM4/9/13
to
On Mon, Apr 08, 2013 at 06:58:57PM -0400, Jonathan S. Katz wrote:
> In this specific case, DBaaS providers were exposed to a bug that is
> relatively easy to exploit with potentially dire consequences that could
> potentially ruin many, many businesses (I do not want to give a bad estimate,
> so I won't provide a number). Let's say this horrible scenario happened:

So you're saying we make it dependant on how many business critical
installations a provider runs? In theory that makes a lot of sense, but in
reality I fail to see how to do this.

> sure, people could say that a DBaaS provider did not adequately secure their
> system, but fingers could also be pointed at the community for a) having a
> security hole in the first place (as ludicrous as that sounds to us as we
> know that software is flawed AND Postgres has an *excellent* track record for
> security) and b) not recognizing the damage that could be caused by not
> permitting systems considered to be "critical infrastructure" early access to
> a fix.

How about a big corporate user where PostgreSQL is the backbone? Wouldn't look
good for us either, but not being a DBaaS provider they are not in our focus
here. Makes me wonder why.

Michael
--
Michael Meskes
Michael at Fam-Meskes dot De, Michael at Meskes dot (De|Com|Net|Org)
Michael at BorussiaFan dot De, Meskes at (Debian|Postgresql) dot Org
Jabber: michael.meskes at gmail dot com
VfL Borussia! Força Barça! Go SF 49ers! Use Debian GNU/Linux, PostgreSQL


Michael Meskes

unread,
Apr 9, 2013, 5:55:57 AM4/9/13
to
On Tue, Apr 09, 2013 at 09:21:59AM +0100, Dave Page wrote:
> I'm not arguing either way here... but if you think of DBaaS as "the
> new packaging", it starts to seem more reasonable to give folks like
> Heroku access at the same time as the traditional packagers.

Good point. Isn't this along the same lines as Damien's posting, in that we
should not be on the hook for their deployment time?

Michael
--
Michael Meskes
Michael at Fam-Meskes dot De, Michael at Meskes dot (De|Com|Net|Org)
Michael at BorussiaFan dot De, Meskes at (Debian|Postgresql) dot Org
Jabber: michael.meskes at gmail dot com
VfL Borussia! Força Barça! Go SF 49ers! Use Debian GNU/Linux, PostgreSQL


Michael Meskes

unread,
Apr 9, 2013, 5:49:43 AM4/9/13
to
On Mon, Apr 08, 2013 at 11:27:53PM +0200, damien clochard wrote:
> Now I understand that Heroku (and other DBaaS providers) may host
> hundreds of thousand PostgreSQL servers and I understand that upgrading
> so many servers in a few hours is something very hard to acheive. But

And the other question that comes up is why are we only talking about this in
the context of a DBaaS provider. Lets just create an example. Assume you have a
distributed system storing all the data about the whole population for a
country with one database per municipality. This could lead to a lot of
databases and obviously the same problems, but no one, at least so far, would
consider them a packager. So they would have the same deployment problem but no
access to the fix before the end of our embargo time.

Michael
--
Michael Meskes
Michael at Fam-Meskes dot De, Michael at Meskes dot (De|Com|Net|Org)
Michael at BorussiaFan dot De, Meskes at (Debian|Postgresql) dot Org
Jabber: michael.meskes at gmail dot com
VfL Borussia! Força Barça! Go SF 49ers! Use Debian GNU/Linux, PostgreSQL


Joshua D. Drake

unread,
Apr 9, 2013, 11:37:53 AM4/9/13
to

On 04/09/2013 01:38 AM, damien clochard wrote:

>>> No.
>>>
>>> That isn't to say I didn't understand that theory of doing so. I do.
>>> However, you essentially created a class of user that is above other users
>>> and that is explicitly not Open Source.
>>
>> I'm not arguing either way here... but if you think of DBaaS as "the
>> new packaging", it starts to seem more reasonable to give folks like
>> Heroku access at the same time as the traditional packagers.
>>
>
> Just to make things clear : my previous message is not about wether or
> nor a DBaaS provider should have early access to security releases (even
> if that's a good question).
>
> My message is about wether or not a DBaaS provider should be allowed to
> deploy the security release days before the official release date.
>

Right. Which I don't think they should be able to.

Joshua D. Drake

--
Command Prompt, Inc. - http://www.commandprompt.com/
PostgreSQL Support, Training, Professional Services and Development
High Availability, Oracle Conversion, Postgres-XC
@cmdpromptinc - 509-416-6579


Joshua D. Drake

unread,
Apr 9, 2013, 11:39:03 AM4/9/13
to

On 04/09/2013 02:55 AM, Michael Meskes wrote:
>
> On Tue, Apr 09, 2013 at 09:21:59AM +0100, Dave Page wrote:
>> I'm not arguing either way here... but if you think of DBaaS as "the
>> new packaging", it starts to seem more reasonable to give folks like
>> Heroku access at the same time as the traditional packagers.
>
> Good point. Isn't this along the same lines as Damien's posting, in that we
> should not be on the hook for their deployment time?

Well no because traditional packagers all release at the same time so
that there is no disparity between when Ubuntu gets the fix and Solaris
gets the fix.

Sincerely,

Joshua D. Drake

>
> Michael
>


--
Command Prompt, Inc. - http://www.commandprompt.com/
PostgreSQL Support, Training, Professional Services and Development
High Availability, Oracle Conversion, Postgres-XC
@cmdpromptinc - 509-416-6579


Michael Meskes

unread,
Apr 9, 2013, 12:01:19 PM4/9/13
to
On Tue, Apr 09, 2013 at 08:39:03AM -0700, Joshua D. Drake wrote:
>
> On 04/09/2013 02:55 AM, Michael Meskes wrote:
> >
> >On Tue, Apr 09, 2013 at 09:21:59AM +0100, Dave Page wrote:
> >>I'm not arguing either way here... but if you think of DBaaS as "the
> >>new packaging", it starts to seem more reasonable to give folks like
> >>Heroku access at the same time as the traditional packagers.
> >
> >Good point. Isn't this along the same lines as Damien's posting, in that we
> >should not be on the hook for their deployment time?
>
> Well no because traditional packagers all release at the same time
> so that there is no disparity between when Ubuntu gets the fix and
> Solaris gets the fix.

So what do I misunderstand? As far as I read it, Damien said all should get the
fix at the same time, right? Which is what you say and also what Dave said,
isn't it? I think the question we're dancing around here is, should anyone be
allowed to deploy before the embargo is over? I don't mind DBaaS providers
getting the fix early, but I mind seeing it deployed early.

Michael
--
Michael Meskes
Michael at Fam-Meskes dot De, Michael at Meskes dot (De|Com|Net|Org)
Michael at BorussiaFan dot De, Meskes at (Debian|Postgresql) dot Org
Jabber: michael.meskes at gmail dot com
VfL Borussia! Força Barça! Go SF 49ers! Use Debian GNU/Linux, PostgreSQL


Joshua D. Drake

unread,
Apr 9, 2013, 12:19:06 PM4/9/13
to

On 04/09/2013 09:01 AM, Michael Meskes wrote:

>> Well no because traditional packagers all release at the same time
>> so that there is no disparity between when Ubuntu gets the fix and
>> Solaris gets the fix.
>
> So what do I misunderstand? As far as I read it, Damien said all should get the
> fix at the same time, right? Which is what you say and also what Dave said,
> isn't it? I think the question we're dancing around here is, should anyone be
> allowed to deploy before the embargo is over? I don't mind DBaaS providers
> getting the fix early, but I mind seeing it deployed early.

Maybe I wasn't clear, sorry. No. I do not believe that ANY entity should
be able to deploy before the embargo is over.

Joshua D. Drake


>
> Michael
>


--
Command Prompt, Inc. - http://www.commandprompt.com/
PostgreSQL Support, Training, Professional Services and Development
High Availability, Oracle Conversion, Postgres-XC
@cmdpromptinc - 509-416-6579


Stephen Frost

unread,
Apr 9, 2013, 12:29:37 PM4/9/13
to
* Joshua D. Drake (j...@commandprompt.com) wrote:
> On 04/09/2013 09:01 AM, Michael Meskes wrote:
> >>Well no because traditional packagers all release at the same time
> >>so that there is no disparity between when Ubuntu gets the fix and
> >>Solaris gets the fix.
> >
> >So what do I misunderstand? As far as I read it, Damien said all should get the
> >fix at the same time, right? Which is what you say and also what Dave said,
> >isn't it? I think the question we're dancing around here is, should anyone be
> >allowed to deploy before the embargo is over? I don't mind DBaaS providers
> >getting the fix early, but I mind seeing it deployed early.
>
> Maybe I wasn't clear, sorry. No. I do not believe that ANY entity
> should be able to deploy before the embargo is over.

Then perhaps I'm missing something, but what's the point in getting the
update if you can't actually apply it until everyone (including the bad
guys) know about it? Particularly when applying it is going to take a
whole lot more time than it takes for the bad guys to probe your systems
and figure out which aren't patched yet...

Thanks,

Stephen
signature.asc

Joshua D. Drake

unread,
Apr 9, 2013, 12:46:02 PM4/9/13
to
I don't know that there is a all-in-one solution for this particular
scenario.

Joshua D. Drake

Andres Freund

unread,
Apr 9, 2013, 12:55:16 PM4/9/13
to
Patching, packaging and verifying that the package works takes time,
especially if you run a modified version of postgres.

Greetings,

Andres Freund

--
Andres Freund http://www.2ndQuadrant.com/
PostgreSQL Development, 24x7 Support, Training & Services

Stephen Frost

unread,
Apr 9, 2013, 1:06:04 PM4/9/13
to
* Joshua D. Drake (j...@commandprompt.com) wrote:
> I don't know that there is a all-in-one solution for this particular
> scenario.

Perhaps not, but I feel we can, and should, do our best to try and get
everyone updated before giving attackers the information they need to
exploit people.

Thanks,

Stephen
signature.asc

Joshua D. Drake

unread,
Apr 9, 2013, 1:09:26 PM4/9/13
to
Well I certainly agree with that.

>
> Thanks,
>
> Stephen

Stephen Frost

unread,
Apr 9, 2013, 1:14:18 PM4/9/13
to
* Andres Freund (and...@2ndquadrant.com) wrote:
> On 2013-04-09 12:29:37 -0400, Stephen Frost wrote:
> > Then perhaps I'm missing something, but what's the point in getting the
> > update if you can't actually apply it until everyone (including the bad
> > guys) know about it? Particularly when applying it is going to take a
> > whole lot more time than it takes for the bad guys to probe your systems
> > and figure out which aren't patched yet...
>
> Patching, packaging and verifying that the package works takes time,
> especially if you run a modified version of postgres.

I agree with that. For individuals who are primairly responsible for
providing packages getting access early to do those tasks is great.

That does not address the large-scale deployments where upgrades also
take a very signifigant amount of time. If we are to provide them with
the information ahead of the release, as they are trusted, I do not
believe it makes any sense to prevent them from upgrading their systems
until the information is out in the open.

Weighing the needs of various communities along with their risk profiles
and trustworthiness is a very difficult thing, but once vetted and
approved for early access, they should be encouraged to do as much as
they can to ensure they are not vulnerable provided that they are able
to do so without disclosing sensetive information.

Thanks,

Stephen
signature.asc

Selena Deckelmann

unread,
Apr 9, 2013, 1:39:47 PM4/9/13
to
On Tue, Apr 9, 2013 at 10:14 AM, Stephen Frost <sfr...@snowman.net> wrote:

Weighing the needs of various communities along with their risk profiles
and trustworthiness is a very difficult thing, but once vetted and
approved for early access, they should be encouraged to do as much as
they can to ensure they are not vulnerable provided that they are able
to do so without disclosing sensetive information.

This is a crucial point.

Another important aspect of PostgreSQL is that we are a collective, rather than a company. We don't have, for example, a legal entity of record that could legitimately accept NDAs on behalf of our developers. (More than one vendor brought up "sign an NDA" as a way to get early access, and that's not a reasonable option for adding people to pgsql-security or pgsql-packagers.)

So, we require contributors who package up our software to build trust among our developers as a matter of policy.

We haven't specifically described what that trust looks like or how to build up that trust in a formal way. However, most of the developers who are part of this community have a feeling of what "building up trust among PostgreSQL developers" means. My guess is, the new security policy will make what that phrase means a bit more clear. And, will include something about how -core will reserve the right to make a final judgment about who should and shouldn't be given access to pre-release security patches.

There will always be some element of judgment involved -- where a new kind of situation, a new kind of security vulnerability tests the informal and formal policies that a group has established. An important meta-policy is: how do we make changes to the existing informal and formal policies/processes?

For us, it appears that having a debate on -advocacy is one of the ways to influence the outcome. Another way, probably, is to maintain a software distribution package that many people outside the immediate PostgreSQL community depend on. And the most obvious way to influence this policy is to be a member of -core.

-selena

Andres Freund

unread,
Apr 9, 2013, 1:41:43 PM4/9/13
to
On 2013-04-09 13:14:18 -0400, Stephen Frost wrote:
> * Andres Freund (and...@2ndquadrant.com) wrote:
> > On 2013-04-09 12:29:37 -0400, Stephen Frost wrote:
> > > Then perhaps I'm missing something, but what's the point in getting the
> > > update if you can't actually apply it until everyone (including the bad
> > > guys) know about it? Particularly when applying it is going to take a
> > > whole lot more time than it takes for the bad guys to probe your systems
> > > and figure out which aren't patched yet...
> >
> > Patching, packaging and verifying that the package works takes time,
> > especially if you run a modified version of postgres.
>
> I agree with that. For individuals who are primairly responsible for
> providing packages getting access early to do those tasks is great.
>
> That does not address the large-scale deployments where upgrades also
> take a very signifigant amount of time. If we are to provide them with
> the information ahead of the release, as they are trusted, I do not
> believe it makes any sense to prevent them from upgrading their systems
> until the information is out in the open.

Installing the packages somewhere where far more people have a chance to
gain access to reduces the likelihood that somebody figures out where
the vulnerability is noticeably. Figuring out which parts of a binary
have changed is easy enough, even if its stripped.

Also, it changes how privileged the people that get access to the
vulnerability are. If they are allowed to install at the same time as
everyone else its somewhat fair game, otherwise there will be people
making a marketing distinction out of their privileged access.

Jonathan S. Katz

unread,
Apr 9, 2013, 1:46:43 PM4/9/13
to
Well, part of the policy of getting early access should be "do not publicize that you have early access" - that would eliminate any publicity / marketing advantages an entity could take.

Jonathan

Andres Freund

unread,
Apr 9, 2013, 1:50:24 PM4/9/13
to
Things like the heroku downtime notice make that pretty clear
though. They hardly could not announce that they have a downtime though,
so I am not blaming them for that, but its still obvious.

Greetings,

Andres Freund

--
Andres Freund http://www.2ndQuadrant.com/
PostgreSQL Development, 24x7 Support, Training & Services


Stephen Frost

unread,
Apr 9, 2013, 1:54:08 PM4/9/13
to
All,

* Selena Deckelmann (sel...@chesnok.com) wrote:
> On Tue, Apr 2, 2013 at 4:42 PM, Stephen Frost <sfr...@snowman.net> wrote:
> > Having some kind of documentation / policy regarding who can get access,
> > or what they have to do to get access, would certainly help address
> > these concerns.
>
> This is a key point.

Here's what I've been kicking around for a general plan (though -advocacy
still seems like an odd place to discuss this, but whatever):

Tiered release-
First to people who can FIX the problem, eg: -security
Second to people who maintain things downstream:
This would include both packagers for major distros and large-scale
DBaaS environments; approved by -core or a similar committee.
Public notification of a general release to be forthcoming.
Third to the general public as binaries/packages
Lastly, full disclosure, sources, etc.

This would only apply in cases where there is no known exploit and the
bug is not generally known, and perhaps only for major bugs.

Ideally, we would be able to minimize impact from this process on the
developers, perhaps through an independent/security repo or similar.

Anyway, that's my 2c.

Thanks,

Stephen
signature.asc

Stephen Frost

unread,
Apr 9, 2013, 1:59:29 PM4/9/13
to
* Andres Freund (and...@2ndquadrant.com) wrote:
> Also, it changes how privileged the people that get access to the
> vulnerability are. If they are allowed to install at the same time as
> everyone else its somewhat fair game, otherwise there will be people
> making a marketing distinction out of their privileged access.

I do not consider this a game where everyone should be treated 'fairly'
wrt their exposure to attackers. I would be open to including something
in the policy which discourages members from advertising their
membership as a marketing distinction, but I'm not convinced that it's
necessary.

Thanks,

Stephen
signature.asc

Stephen Frost

unread,
Apr 9, 2013, 2:01:32 PM4/9/13
to
* Selena Deckelmann (sel...@chesnok.com) wrote:
> Another important aspect of PostgreSQL is that we are a collective, rather
> than a company. We don't have, for example, a legal entity of record that
> could legitimately accept NDAs on behalf of our developers. (More than one
> vendor brought up "sign an NDA" as a way to get early access, and that's
> not a reasonable option for adding people to pgsql-security or
> pgsql-packagers.)

I wouldn't encourage this- but we do have a legal entity through SPI.
Were we, as a community, open to using 'signed an NDA' as sufficient
trust, using SPI as the entity could work. To be honest, I don't think
that we, collectively, feel that a signed NDA is sufficient.

Thanks,

Stephen
signature.asc

Selena Deckelmann

unread,
Apr 9, 2013, 2:05:20 PM4/9/13
to
As far as I know, our association with SPI hasn't been empowered to sign contracts on behalf of PGDG. They don't even hold any trademarks for us. PGDG's association with SPI is to receive donations and disperse grants.  Happy to be corrected if I am mistaken on those points.

We also have several other non-profits whose missions are varied.

None are empowered to sign contracts or legally represent the developers who make up PGDG.

-selena

--
http://chesnok.com

Andres Freund

unread,
Apr 9, 2013, 2:09:15 PM4/9/13
to
Note that I am not saying that it has to be fair. I haven't yet made up
my mind about it, I am just saying its a fair point to make. And I think
the increased exposure and thus increased likelihood of leakage due to
more widespread usage holds some weight, completely independent of the
argument of fairness.

Stephen Frost

unread,
Apr 9, 2013, 2:13:58 PM4/9/13
to
* Selena Deckelmann (sel...@chesnok.com) wrote:
> None are empowered to sign contracts or legally represent the developers
> who make up PGDG.

It is not the developers comprised of PGDG who are required to sign into
an NDA. It is company A, B, or C who would need to sign an NDA with "some
legal entity", giving that legal entity the power/right to sue company A,
B, or C, were they to release the information provided to them
inappropriately under a breach of contract.

Notionally, perhaps a PGDG developer would provide the data to the
'legal entity' who would then provide the information to the company, to
legitimatize the contract, but that would not require any NDA or
contract to be signed by the PGDG developer.

Thanks,

Stephen
signature.asc

Stephen Frost

unread,
Apr 9, 2013, 2:17:56 PM4/9/13
to
* Andres Freund (and...@2ndquadrant.com) wrote:
> And I think the increased exposure and thus increased likelihood of
> leakage due to more widespread usage holds some weight

This is most appropriately addressed on a case-by-case basis regarding
the specific situation. Such classification should be done by -core (or
some similar committee) and then we should have a policy which can be
followed based on that classification. My hope is that the very general
policy which I outlined could simply be tailored based on the
classification.

Thanks,

Stephen
signature.asc

Dave Page

unread,
Apr 9, 2013, 2:22:44 PM4/9/13
to
PGDG is not a 'real' entity at all, so it has no way of empowering anyone to do anything really. The closest we have is The PostgreSQL Community Association of Canada which has been blessed by -core to hold domains and trademarks etc. (and doesn't do anything else).

Selena Deckelmann

unread,
Apr 9, 2013, 2:52:31 PM4/9/13
to
Hmmm. Interesting.

Yeah, not a fan :)

-selena


--
http://chesnok.com

Joshua D. Drake

unread,
Apr 9, 2013, 3:21:52 PM4/9/13
to

On 04/09/2013 11:22 AM, Dave Page wrote:

>> We also have several other non-profits whose missions are varied.
>>
>> None are empowered to sign contracts or legally represent the
>> developers who make up PGDG.
>
> PGDG is not a 'real' entity at all, so it has no way of empowering
> anyone to do anything really. The closest we have is The PostgreSQL
> Community Association of Canada which has been blessed by -core to hold
> domains and trademarks etc. (and doesn't do anything else).

Well there is SPI too.

Joshua D. Drake



--
Command Prompt, Inc. - http://www.commandprompt.com/
PostgreSQL Support, Training, Professional Services and Development
High Availability, Oracle Conversion, Postgres-XC
@cmdpromptinc - 509-416-6579


Dimitri Fontaine

unread,
Apr 9, 2013, 5:57:40 PM4/9/13
to
Stephen Frost <sfr...@snowman.net> writes:
> That does not address the large-scale deployments where upgrades also
> take a very signifigant amount of time. If we are to provide them with
> the information ahead of the release, as they are trusted, I do not
> believe it makes any sense to prevent them from upgrading their systems
> until the information is out in the open.

+1

> Weighing the needs of various communities along with their risk profiles
> and trustworthiness is a very difficult thing, but once vetted and
> approved for early access, they should be encouraged to do as much as
> they can to ensure they are not vulnerable provided that they are able
> to do so without disclosing sensetive information.

+1

And no ssh access to the servers seems like it applied.

The trust problem has just been presented to me in another phrasing that
we might want to be adressing: the level of trust we have into those
people who receive the information early obviously includes they not
perusing the information to exploit users (e.g. from competitive
places).

As obvious as it sounds, we have to write it down in the docs currently
being edited, I think.

Regards,
--
Dimitri Fontaine
http://2ndQuadrant.fr PostgreSQL : Expertise, Formation et Support

Michael Meskes

unread,
Apr 10, 2013, 12:18:39 PM4/10/13
to
On Tue, Apr 09, 2013 at 01:14:18PM -0400, Stephen Frost wrote:
> That does not address the large-scale deployments where upgrades also
> take a very signifigant amount of time. If we are to provide them with
> the information ahead of the release, as they are trusted, I do not
> believe it makes any sense to prevent them from upgrading their systems
> until the information is out in the open.

But this does not only apply to the Heroku's of this world. What about the not
so hypothecial example I brought earlier? There are actually a lot of companies
out there that deploy Postgres on a large scale but are not DBaaS providers.
There are also alot of companies that somehow bundle Postgres with their
product and deliver it to *a lot* of customers. Their upgrade problem is even
worse. Do we add them all?

Besides some of these might get their packages from
service providers. Ok, in theory we could add those. But how about those who
use packages from one of the distros? With the same argument we would have to
go for a two step embargo.

Michael

--
Michael Meskes
Michael at Fam-Meskes dot De, Michael at Meskes dot (De|Com|Net|Org)
Michael at BorussiaFan dot De, Meskes at (Debian|Postgresql) dot Org
Jabber: michael.meskes at gmail dot com
VfL Borussia! Força Barça! Go SF 49ers! Use Debian GNU/Linux, PostgreSQL


Stephen Frost

unread,
Apr 11, 2013, 8:48:03 AM4/11/13
to
Michael,

* Michael Meskes (mes...@postgresql.org) wrote:
> But this does not only apply to the Heroku's of this world. What about the not
> so hypothecial example I brought earlier? There are actually a lot of companies
> out there that deploy Postgres on a large scale but are not DBaaS providers.
> There are also alot of companies that somehow bundle Postgres with their
> product and deliver it to *a lot* of customers. Their upgrade problem is even
> worse. Do we add them all?

Who gets added and who doesn't would be the committee's responsibility.
Risk and exposure would weigh into that decision. DBaaS providers had a
much higher from this most recent bug than even very large scale
internal deployments. When asking "do we add them all?", the answer
will have to be 'no' or there would end up being little point.

> Besides some of these might get their packages from
> service providers. Ok, in theory we could add those. But how about those who
> use packages from one of the distros? With the same argument we would have to
> go for a two step embargo.

I don't entirely follow this. Upthread I had suggested a multi-phase
approach which sounds like what you mean by 'two step embargo'. I
continue to feel that makes sense, to give everyone the best chance at
upgrading prior to exploits being generally available.

Thanks,

Stephen
signature.asc
0 new messages