Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Keeping Social Engineering Attacks Away from OS...

Nabarun Pal
June 12, 2024
21

Keeping Social Engineering Attacks Away from OSS Communities

Nabarun Pal

June 12, 2024
Tweet

Transcript

  1. ❤ @theonlynabarun $ whoami • Kubernetes Maintainer and Steering Committee

    member • Chair of Kubernetes Special Interest Group Contributor Experience • Kubernetes GitHub Administration • Contribute to API Machinery, Auth, Release and ContribEx • CNCF Ambassador • Building Kubernetes based SaaS control planes as $dayjob
  2. @theonlynabarun ❤ An excellent timeline of the incident is written

    by Russ Cox: https://research.swtch.com/xz-timeline
  3. ❤ @theonlynabarun Key Findings • A decade back, anyone who

    contributed was given org owner access • Open trust based approach of the past doesn’t work anymore
  4. ❤ @theonlynabarun Key Findings • A decade back, anyone who

    contributed was given org owner access • Open trust based approach of the past doesn’t work anymore • Org-level ownership will be given only to a limited set of people
  5. ❤ @theonlynabarun Key Findings • A decade back, anyone who

    contributed was given org owner access • Open trust based approach of the past doesn’t work anymore • Org-level ownership will be given only to a limited set of people • Repo-level ownership will be given to direct contributors
  6. ❤ @theonlynabarun Key Findings • A decade back, anyone who

    contributed was given org owner access • Open trust based approach of the past doesn’t work anymore • Org-level ownership will be given only to a limited set of people • Repo-level ownership will be given to direct contributors • Audit similar events of the past
  7. ❤ @theonlynabarun “(...) about 1/2 of the internet depends on

    you… no pressure ;-) (...)” Timothy St. Clair
  8. ❤ @theonlynabarun #5 by activity (438520) #3 by authors (3569)

    #2 by comments (330984) #32 by commits (43010) #11 by issues (18067) #4 by pull requests (43554) #36 by pushes (46105) Stats from CNCF Velocity Report
  9. ❤ @theonlynabarun This team is responsible for holding Org Owner

    privileges over all the active Kubernetes orgs, and will take action in accordance with our policies and procedures. All members of this team are subject to the Kubernetes security embargo policy. Nominations to this team will come from the Contributor Experience SIG, and require confirmation by the Steering Committee before taking effect. [...]
  10. @theonlynabarun ❤ New Member Requirements Have made multiple contributions to

    the project or community, enough to demonstrate an ongoing and long-term commitment to the project. Contributions should include, but is not limited to: ◦ Authoring or reviewing PRs on GitHub, with at least one merged PR. NOTE: The PR(s) must demonstrate an ongoing and active commitment. A few examples include: ▪ A single KEP that has taken several weeks of driving consensus ▪ A larger number of smaller PRs over several weeks to months ▪ A smaller number of complex or technical PRs that required working with community members to resolve an issue (e.g. regressions, bugs fixes etc) ◦ Filing or commenting on issues on GitHub ◦ Contributing to SIG, subproject, or community discussions (e.g. meetings, Slack, email discussion forums)
  11. @theonlynabarun ❤ Sponsor Requirements ◦ Sponsored by 2 reviewers. Note

    the following requirements for sponsors: ▪ Sponsors must have close interactions with the prospective member - e.g. code/design/proposal review, coordinating on issues, etc. ▪ Sponsors must be reviewers or approvers in at least one OWNERS file within one of the Kubernetes GitHub organizations*. ▪ Sponsors must be from multiple member companies to demonstrate integration across community.
  12. @theonlynabarun ❤ Reviewer Requirements ◦ Member for at least 3

    months ◦ Primary reviewer for at least 5 PRs to the codebase ◦ Reviewed or merged at least 20 substantial PRs to the codebase ◦ Knowledgeable about the codebase ◦ Sponsored by a subproject approver ▪ With no objections from other approvers ▪ Done through PR to update the OWNERS file ◦ May either self-nominate, be nominated by an approver in this subproject, or be nominated by a robot
  13. @theonlynabarun ❤ To Summarize • Set of people with highest

    privileges should be smallest in size • The bar to get into that set should be reasonably high
  14. @theonlynabarun ❤ To Summarize • Set of people with highest

    privileges should be smallest in size • The bar to get into that set should be reasonably high • Design new contributor guidelines and contributor growth ladder carefully
  15. @theonlynabarun ❤ To Summarize • Set of people with highest

    privileges should be smallest in size • The bar to get into that set should be reasonably high • Design new contributor guidelines and contributor growth ladder carefully • Declaratively store your community topology
  16. @theonlynabarun ❤ To Summarize • Set of people with highest

    privileges should be smallest in size • The bar to get into that set should be reasonably high • Design new contributor guidelines and contributor growth ladder carefully • Declaratively store your community topology • Use proven tools with adequate safety checks to reconcile state
  17. @theonlynabarun ❤ To Summarize • Set of people with highest

    privileges should be smallest in size • The bar to get into that set should be reasonably high • Design new contributor guidelines and contributor growth ladder carefully • Declaratively store your community topology • Use proven tools with adequate safety checks to reconcile state • Periodically run audits on your org for inactive members
  18. @theonlynabarun ❤ Want to learn more? • Public slack channel:

    #github-management • Join here: slack.k8s.io • DMs on Kubernetes Slack: palnabarun • Twitter/X: @theonlynabarun