|
| 1 | +[comment]: # (Compile this presentation with the command below) |
| 2 | +[comment]: # (mdslides lpw2025-cpansec-update.md --include ../media) |
| 3 | +[comment]: # (...or by running the Makefile with "make") |
| 4 | +[comment]: # (mdslides can be installed from https://github.com/dadoomer/markdown-slides/) |
| 5 | + |
| 6 | +[comment]: # (THEME = solarized) |
| 7 | + |
| 8 | +[comment]: # (minScale: 0.2) |
| 9 | +[comment]: # (maxScale: 4.0) |
| 10 | +[comment]: # (controls: true) |
| 11 | +[comment]: # (width: "960") |
| 12 | +[comment]: # (height: "700") |
| 13 | +[comment]: # (help: true) |
| 14 | +[comment]: # (progress: true) |
| 15 | +[comment]: # (controlsBackArrows: "true") |
| 16 | + |
| 17 | +# An update on CPANSec |
| 18 | + |
| 19 | +Salve J. Nilsen |
| 20 | + |
| 21 | +@sjn@chaos.social |
| 22 | + |
| 23 | +Note: |
| 24 | + |
| 25 | +Hei! I'm <NAME> and I'm here to introduce the CPAN Security Working Group to you |
| 26 | + |
| 27 | +[comment]: # (!!!) |
| 28 | + |
| 29 | +## What? |
| 30 | + |
| 31 | +* Est. at **Perl Toolchain Summit** 2023 in Lyon 🇫🇷 |
| 32 | +* We work on & care for **Security on CPAN** |
| 33 | +* We are [the CVE Numbering Authority for Perl and CPAN][cna] |
| 34 | + |
| 35 | +We've published [68 CVEs](https://lists.security.metacpan.org/cve-announce/) |
| 36 | + |
| 37 | +[cna]: https://security.metacpan.org/2025/02/25/cpansec-is-cna-for-perl-and-cpan.html |
| 38 | + |
| 39 | +Note: |
| 40 | + |
| 41 | +Established in April 2023 year at the Perl Toolchain Summit in Lyon, France |
| 42 | + |
| 43 | +[comment]: # (!!!) |
| 44 | + |
| 45 | +## In-Scope Security Topics |
| 46 | + |
| 47 | +Note: |
| 48 | + |
| 49 | +Here are some of the things we care about! |
| 50 | + |
| 51 | +[comment]: # (|||) |
| 52 | + |
| 53 | +### Security Outreach & Information |
| 54 | + |
| 55 | +👉 Facilitating **responsible/coordinated disclosure** between authors, reporters and users. |
| 56 | + |
| 57 | +Note: |
| 58 | + |
| 59 | +Keep different information channels (websites, social media) up-to-date and relevant with info on incidents, best practices and other documentation. |
| 60 | + |
| 61 | +VINCE – Vulnerability Information and Coordination Environment |
| 62 | + |
| 63 | +Topics not under embargo are discussed on IRC |
| 64 | + |
| 65 | +[comment]: # (|||) |
| 66 | + |
| 67 | +### Vulnerability Index |
| 68 | + |
| 69 | +👉 **Audit** and track vulnerabilities |
| 70 | + |
| 71 | +Note: |
| 72 | + |
| 73 | +Improve security awareness by standardizing and publishing CPAN package vulnerabilities in relevant indices (our own, or CVE, or other). |
| 74 | + |
| 75 | +[comment]: # (|||) |
| 76 | + |
| 77 | +### Provenance & Supply Chain Security |
| 78 | + |
| 79 | +👉 Establish secure CPAN downloads |
| 80 | + |
| 81 | +* Secure-by-default CPAN clients |
| 82 | +* [The Update Framework][tuf] on CPAN |
| 83 | + |
| 84 | +[tuf]: https://theupdateframework.io/ |
| 85 | + |
| 86 | +Note: |
| 87 | + |
| 88 | +* TLS support in all CPAN clients |
| 89 | + * CPAN.pm, cpanm, etc. |
| 90 | + |
| 91 | +* Implement [The Update Framework][tuf] in CPAN |
| 92 | + * Repository signatures ("is this from CPAN?") |
| 93 | + * Author signatures ("is this from AUTHOR?") |
| 94 | + |
| 95 | +[tuf]: https://theupdateframework.io/ |
| 96 | + |
| 97 | +We want to make TLS in cpan clients on by default, with cert verification on |
| 98 | + |
| 99 | +Looking at getting The Update Framework (pypi has some implementation of this) as a supported, this is in addition to TLS |
| 100 | + |
| 101 | +The TUF spec supports repo and author signing |
| 102 | + |
| 103 | +TUF mitigates attacks that the current PGP signed CHECKSUMS implementation is vulnerable to, like replay attacks and downgrade attacks, |
| 104 | + |
| 105 | +[comment]: # (|||) |
| 106 | + |
| 107 | +### Metadata & Software Bills of Materials |
| 108 | + |
| 109 | +👉 **SBOM** creation and verification |
| 110 | + |
| 111 | +* For compliance with the [Cyber Resilience Act][cra] |
| 112 | + |
| 113 | +[cra]: https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=OJ:L_202402847 |
| 114 | + |
| 115 | +Note: |
| 116 | + |
| 117 | +* CPAN PackageURL in spec 🚧 |
| 118 | +* PackageURL-enabled CPAN tooling |
| 119 | +* SBOM-enabled CPAN tooling |
| 120 | + |
| 121 | +Support risk analysis and management by writing tooling for managing standard SBOM objects like OWASP CycloneDX or SPDX, and do this by using existing and new CPAN metadata. |
| 122 | + |
| 123 | +Improve interoperability with non-CPAN package indices |
| 124 | + |
| 125 | +[comment]: # (|||) |
| 126 | + |
| 127 | +### Transparency Logs |
| 128 | + |
| 129 | +👉 Tooling for **third-party monitoring** of package changes |
| 130 | + |
| 131 | +Note: |
| 132 | + |
| 133 | +* Sigstore for CPAN |
| 134 | + |
| 135 | +Write tooling for monitoring package updates and integrity checking of metadata using tools like `sigstore` or `sigsum`, or take inspiration from `transparency.dev`. |
| 136 | + |
| 137 | +[comment]: # (|||) |
| 138 | + |
| 139 | +### Security Patch Tooling |
| 140 | + |
| 141 | +👉 Apply high-priority security patches on CPAN |
| 142 | + |
| 143 | +Note: |
| 144 | + |
| 145 | +Enable high-priority updates of CPAN packages, by developing tooling for publishing and applying third-party security patches to CPAN distributions with non-responsive authors. |
| 146 | + |
| 147 | +[comment]: # (|||) |
| 148 | + |
| 149 | +### Privacy and Compliance |
| 150 | + |
| 151 | +👉 Inform on relevant regulations and compliance |
| 152 | + |
| 153 | +* We maintain a growing [reading list] |
| 154 | + |
| 155 | +[reading list]: https://security.metacpan.org/docs/readinglist.html |
| 156 | + |
| 157 | +Note: |
| 158 | + |
| 159 | +Still lots to do! |
| 160 | + |
| 161 | +[comment]: # (|||) |
| 162 | + |
| 163 | +### Software Composition Analysis |
| 164 | + |
| 165 | +👉 Promote and create tooling for detecting known vulnerabilities |
| 166 | + |
| 167 | +Note: |
| 168 | + |
| 169 | +* Analyze dependencies for known vulnerabilities |
| 170 | + |
| 171 | +[comment]: # (|||) |
| 172 | + |
| 173 | +### Governance, Policy & Funding |
| 174 | + |
| 175 | +👉 Rules and funding channels for sustainable security work |
| 176 | + |
| 177 | +Note: |
| 178 | + |
| 179 | +* Pre-Release Disclosure Agreement |
| 180 | +* Charter 🚧 |
| 181 | +* CPAN Supply chain overview 🚧 |
| 182 | + |
| 183 | +* Establish constructive rules, playbooks, governance, policy, and funding channels for security work that is needed. |
| 184 | + |
| 185 | +[comment]: # (|||) |
| 186 | + |
| 187 | +### And more! |
| 188 | + |
| 189 | +👉The security landscape is evolving, so must CPAN! |
| 190 | + |
| 191 | +* Perl and CPAN is in use **everywhere** |
| 192 | +* New security demands from market authorities and others |
| 193 | + |
| 194 | +Note: |
| 195 | + |
| 196 | +And more! |
| 197 | + |
| 198 | +Let's have an organization in place that can help improve our security landscape as we discover new vulnerabilities and issues! |
| 199 | +Sometimes, response time is of the essence, and that means someone has to be there to respond. |
| 200 | + |
| 201 | +Interoperability – Perl and CPAN is part of a larger Open Source landscape! |
| 202 | + |
| 203 | +[comment]: # (|||) |
| 204 | + |
| 205 | +### Join us! |
| 206 | + |
| 207 | +Do you… |
| 208 | + |
| 209 | +* …work with & **care about security**? |
| 210 | +* …have **spare tuits**? |
| 211 | +* …have a **security commons** aware employer? |
| 212 | +* …enjoy getting your **ducks in a row**? 🦆🦆🦆 |
| 213 | + |
| 214 | +Note: |
| 215 | + |
| 216 | +* Do you have a **security background** or care about the Toolchain? |
| 217 | +* Do you have **time to volunteer**? |
| 218 | +* Is your employer willing to **dedicate a percentage of your time** to improve our security commons? |
| 219 | + |
| 220 | +We need volunteers! |
| 221 | + |
| 222 | +[comment]: # (!!!) |
| 223 | + |
| 224 | +### Find us! |
| 225 | + |
| 226 | +https://security.metacpan.org/ |
| 227 | + |
| 228 | +[https://matrix.to/#/#cpansec-discussion:matrix.org](https://matrix.to/#/#cpansec-discussion:matrix.org) |
| 229 | + |
| 230 | +[https://fosstodon.org/@cpansec](https://fosstodon.org/@cpansec) |
| 231 | + |
| 232 | +[ircs://ssl.irc.perl.org:7062/#cpan-security](ircs://ssl.irc.perl.org:7062/#cpan-security) |
| 233 | + |
| 234 | + |
| 235 | +mailto:cpan-security@security.metacpan.org |
| 236 | + |
| 237 | +Note: |
| 238 | + |
| 239 | +We're on the web, Matrix, Mastodon, IRC, BlueSky, mail and eventually on other places. |
| 240 | + |
| 241 | +[comment]: # (!!!) |
| 242 | + |
| 243 | +# Thanks! |
| 244 | + |
| 245 | +Come talk to me! |
| 246 | + |
| 247 | +(I've got stickers) |
| 248 | + |
| 249 | +🦆🦆 |
| 250 | + |
| 251 | +Note: |
| 252 | + |
| 253 | +Thanks! |
0 commit comments