vendor-sec

From Wikipedia, the free encyclopedia

vendor-sec was an electronic mailing list dedicated to distributors of operating systems using (but not necessarily solely) free and open-source software. The list was used to discuss potential distribution element (kernel, libraries, applications) security vulnerabilities, as well as to co-ordinate the release of security updates by members.[1][2]

As of March 2011, after a security compromise, vendor-sec is no longer in use.[3] Possible alternatives to it are being considered.

Members of the list included representatives from various Linux distributions, as well as a number of BSD distributions. The list did not make a distinction between commercial and non-commercial vendors.

The mailing list was unmoderated, but requests for membership were manually vetted to ensure that only the target audience could join. This was done to avoid leaking the potentially sensitive discussions, as vendor-sec members had access to information about vulnerabilities before they become public.[4] Vendor-sec practices responsible disclosure.

As part of the conditions of use, information discovered through vendor-sec could not be disclosed ahead of time by vendors. The balance between the time it takes to analyse an issue versus the required confidentiality has been described as "delicate"[5] and can cause frustration ("Going to vendor-sec ... creates inexcusable delays, [binds] you to confidentiality.")[6]

References[edit]

  1. ^ "vendor-sec mailing list".
  2. ^ "Red Hat Magazine: "Risk report: Three years of Red Hat Enterprise Linux 4"".
  3. ^ "Vendor-sec hosting and future of closed lists".
  4. ^ "Re: Reason for the change". Archived from the original on 2009-07-12. Retrieved 2008-07-28.
  5. ^ "Torvalds bashes vendor-sec private Linux security list". Archived from the original on 2009-08-20. Retrieved 2010-09-05.
  6. ^ "Re: [stable] Linux 2.6.25.10 (resume)".

External links[edit]