Feeds

Google launches security group for open source

oCERT to make the world safe for GPL

SANS - Survey on application security programs

Google is spearheading a volunteer workforce it hopes will become the centralized authority for responding to security issues in open source software.

oCERT, short for the open source computer emergency response team, will aim to remediate security vulnerabilities and exploits in a wide range of open source programs by coordinating communication among publishers. According to Google's security blog, the group "will strive to contact software authors with all security reports and aid in debugging and patching, especially in cases where the author, or the reporter, doesn't have a background in security."

Of course, the world is already awash in computer emergency response teams, begging the question: do we really need another one? Johannes Ullrich, CTO for SANS Internet Storm Center, says there could be some overlap with the current US CERT, but he also believes there's room for a group that has a more extensive rolodex of players in the deeply splintered world of open source.

Imagine, if you will, a crucial update being made available in an open source program such as PHP or the GCC Compiler, which are sandwiched into countless other larger programs. Right now, it's sometimes difficult to reach trusted contacts at each of the myriad organizations that use these components. "Putting some manpower behind that, I think, is helpful," Ullrich says.

oCERT is also a good way for Google to give back to an open source community that sometimes feels it doesn't get enough Google love. The Googleplex thrives on customized versions of Linux and MySQL, many of the company's desktops and laptops run a modified version of Ubuntu called Goobuntu and, of course, engineers are busy developing the open source Android for mobile devices. Despite all the benefits, Google submits relatively few changes back into the ecosystem that spawned all these packages, since most licensing agreements generally don't require derivatives to be published if they're not being distributed.

Google's blog post was sparse on details about when the oCERT would go live, who was running it and a contact for people interested in volunteering. We're hoping this isn't the open source equivalent of vaporware.

Update

OK, after that last paragraph, it's fair to say we have egg on our face. We failed to spy this link in the Google post that seems to establish that oCERT is already up and running and, indeed has already issued four advisories. Our thanks to Andrea Barisani, for setting us straight. ®

High performance access to file storage

More from The Register

next story
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Putin tells Snowden: Russia conducts no US-style mass surveillance
Gov't is too broke for that, Russian prez says
Snowden-inspired crypto-email service Lavaboom launches
German service pays tribute to Lavabit
Mounties always get their man: Heartbleed 'hacker', 19, CUFFED
Canadian teen accused of raiding tax computers using OpenSSL bug
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Heartbleed exploit, inoculation, both released
File under 'this is going to hurt you more than it hurts me'
Arts and crafts store Michaels says 3 million credit cards exposed in breach
Meanwhile, Target investigators prepare for long process in nabbing hackers
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.