[midPoint] Blog: MidPoint Went Through EU FOSSA2 Bug Bounty
Radovan Semancik
radovan.semancik at evolveum.com
Wed Nov 20 16:16:50 CET 2019
Dear MidPoint community,
MidPoint was a part of EU-Free and Open Source Software Auditing
(EU-FOSSA2) bug bounty program. This was an unique experience in many
ways. There were many surprises along the way and it was far from being
easy. But we have gone through that and in the end it was extremely
useful. It has made midPoint stronger and more secure.
The very first surprise was that midPoint was included in the bug bounty
program at all. That was quite unexpected and I would like to thank all
the people that have decided to make midPoint part of this program. Here
it was, an unexpected opportunity to improve midPoint security. That is
not something that we would turn down. Therefore we have agreed to
participate although we had no idea what to expect. And almost
immediately there was another surprise: from the very beginning the
program was conducted in a very professional way. We were briefed about
the program before any work started. There was a restricted lead-in
period to get used to the program. And even though this was our first
bug bounty program and it took some time for us to get used to it, the
HackerOne <https://www.hackerone.com/> staff was always supportive and
willing to help, tolerating all the confusion that we might have caused.
I have to admit that at first I was quite skeptic about the results of
the program. MidPoint is a substantial and complex piece of software and
it takes a lot of time to understand the mechanisms. I thought that
hackers and triage engineers have a very slim chances to get used to
midPoint in the few months that were available for the program. But
there was another surprise. They did it. Majority of the reports were
good, useful and valid. Some of those reports came from people that
already knew midPoint. Which was quite expected. But there was a
surprising number of reports that came from first-time midPoint users.
Each of the report went through a triage before the report got to
midPoint development team. The triage team did a great job of validating
the reports. The communication was always respectful and professional.
The quality of the triage certainly exceeded my expectations. Even
though we sometimes got lost in the reports and states and processes,
the HackerOne staff kept patiently and politely reminding us – even
after the official end of the program.The program took a lot of time and
effort to go through, but at the end it was a very pleasant and useful
experience.
There was (and perhaps still is) some controversy regarding the bug
bounty program. The program rewards the hackers that discover a problem,
but it does not reward the developers that fix it. This is certainly an
issues that should be addressed and I would love to see a program that
could reward both the hacker and the developer. But as such program is
not available I happily take what is offered. I strongly believe that
security issues always have to be fixed – regardless of the
circumstances that lead to their discovery. We offer commercial
subscription and support services for midPoint. But we have always fixed
security issues reported by subscribers and non-subscribers alike. And
we will always do that. Software project that is not able to fix
security issues is as good as dead.
On the other hand, there are always attempts to misuse good will of open
source developers. The important thing is to distinguish a security
issue from improvement or feature request. The boundary may be quite
fuzzy when it comes to a security-related system such as an IDM system.
And in fact we had to refuse a couple of reports on the grounds that
they are feature requests rather than security bug reports. However,
overall the experience of the bug bounty program was a very good one. A
lot of useful work was done and midPoint is now more secure than ever.
And that is the most important thing that matters for the whole community.
(Reposted from Evolveum blog
<https://evolveum.com/midpoint-went-through-eu-fossa2-bug-bounty/>)
--
Radovan Semancik
Software Architect
evolveum.com
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.evolveum.com/pipermail/midpoint/attachments/20191120/1f461aa3/attachment.htm>
More information about the midPoint
mailing list