Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Security embargo policy and binary rollouts #6593

Closed
htuch opened this issue Apr 15, 2019 · 0 comments · Fixed by #6771
Closed

Security embargo policy and binary rollouts #6593

htuch opened this issue Apr 15, 2019 · 0 comments · Fixed by #6771

Comments

@htuch
Copy link
Member

htuch commented Apr 15, 2019

In order for an Envoy distributor to update a downstream consumer, it's often necessary to have Docker images staged publicly due to the distribution model at many vendors. In addition, Envoy changes are visible to downstream consumers, even in PaaS environments, as the sidecar runs inside the same container as an application.

There are a number of open questions.
1 .Does a binary release violate embargo? In principle and practice it does, since it's easy to bindiff and reverse engineer fixes.
2. How can distributors securely stage images for release at the embargo date?
3. How can distributors perform staged rollouts? E.g. large PaaS operators may require 1+ week to rollout across all zones.
3. How can distributors canary their fix releases?

Would be great to hear from distributors on these issues.

Action item for CVE-2019-9900
Action item for CVE-2019-9901

htuch added a commit to htuch/envoy that referenced this issue May 1, 2019
Fixes envoyproxy#6593

Signed-off-by: Harvey Tuch <htuch@google.com>
htuch added a commit that referenced this issue May 3, 2019
Fixes #6593

Signed-off-by: Harvey Tuch <htuch@google.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging a pull request may close this issue.

1 participant