Bug 1381015

Summary: Please enable "send secure mail" for security related bugs
Product: [Community] Bugzilla Reporter: Christian Stadelmann <fedora>
Component: Email NotificationsAssignee: Vincent Danen <vdanen>
Status: CLOSED WONTFIX QA Contact: tools-bugs <tools-bugs>
Severity: unspecified Docs Contact:
Priority: unspecified    
Version: 4.4CC: huiwang, mtahir, qgong, vdanen
Target Milestone: ---   
Target Release: ---   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2016-10-15 04:47:16 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:

Description Christian Stadelmann 2016-10-02 11:32:28 UTC
Description of problem:
Instead of sending clear-text notification emails on security related bugs, they can be encrypted to S/MIME or PGP keys. This is a builtin feature of mozilla bugzilla. Red Hat Bugzilla supports this too, see the https://bugzilla.redhat.com/userprefs.cgi?tab=securemail preferences tab. There just are no groups with the "send secure mail"flag set. See the text bugzilla-generated text in this tab:

Note that Securemail will only be sent for groups which have had the "send secure mail" bit enabled. Currently, that's not any of them - so adding a key here will make no changes to your bugmail. Yet.

Version-Release number of selected component (if applicable):
4.4.12059.3

Additional info:
Mozilla bugzilla does this and it works fine.

Comment 1 Vincent Danen 2016-10-04 13:25:01 UTC
We looked into this quite a while ago and unless everyone in that group uses GPG or S/MIME and has the secure mail enabled, some mails will go unencrypted or mails will not go out at all beyond "something changed, log in to look".  We felt it was quite disruptive to our standard workflow and as a result did not enable it.

Having said that, there's nothing wrong with looking into it again and seeing if it is worth enabling at this point.

Comment 2 Christian Stadelmann 2016-10-04 14:16:51 UTC
Ok, mozilla people have enabled this feature in a way that you cannot receive comments for security sensitive bugs unencrypted. Either you have your GPG or S/MIME certificate configured in bugzilla or you'll just get a mail that there is a change to a bug but it could not be send through unsecure email. This email has hints on how to add a key if the user wishes to.

Comment 3 Vincent Danen 2016-10-04 18:21:37 UTC
Right, that was the disruptive part.  Some people choose to use the web UI for their email and may not be able to decrypt mails as a result (hence the impact to their workflow note).

If this were optional it probably wouldn't be as big of a deal (but then it being optional also would give a false sense of security).  Mandating it though, given the number of people impacted, isn't something we pushed.  Is there a particular reason you feel this should be implemented, or are you suggesting it just because it's available?

Is it preventing you from reporting security-related bugs because you feel it's unsafe?  I'm trying to understand the reasoning/motivation behind the request.

Comment 4 Jeff Fearn 🐞 2016-10-05 03:02:44 UTC
I don't know if this affects anything but I thought I'd mention it. For Bugzilla 5 we will almost certainly have email_in enabled, it will require incoming email to be PGP signed and have the key set-up in the secure mail tab.

Comment 5 Jeff Fearn 🐞 2016-10-05 23:39:33 UTC
FYI The two web UIs are Zimbra and GMail, both have PGP support via:

GMail: https://github.com/google/end-to-end
GMail: https://webpg.org/docs/webpg-userdocs/#!/video/gmail_demo1
Zimbra: https://github.com/Zimbra-Community/pgp-zimlet/wiki

Comment 6 Christian Stadelmann 2016-10-06 08:20:56 UTC
(In reply to Vincent Danen from comment #3)
> If this were optional it probably wouldn't be as big of a deal (but then it
> being optional also would give a false sense of security).  Mandating it
> though, given the number of people impacted, isn't something we pushed.  Is
> there a particular reason you feel this should be implemented, or are you
> suggesting it just because it's available?

No special reason other than sending unencrypted mails over the internet is allowing some people to MITM (read or modify) them. If there are critical vulnerabilities reported to bugzilla, this probably will put the security of RedHat/Fedora at risk since you want to keep them private until they've been fixed. Sending sensitive information about these bugs via unencrypted mail is rendering the "hide this bug from public" feature mostly useless. In fact, this feature seems to behave just "hide it from search engines but don't really try to hide it from adversaries".

I think unless you enable this feature you should make sure these kind of critical vulnerabilities don't land in Bugzilla. Less critical ones are ok imho.

> Is it preventing you from reporting security-related bugs because you feel
> it's unsafe?  I'm trying to understand the reasoning/motivation behind the
> request.

I don't expect I'll find any security-related bugs with that high impact any time soon.

(In reply to Jeff Fearn from comment #4)
> I don't know if this affects anything but I thought I'd mention it. For
> Bugzilla 5 we will almost certainly have email_in enabled, it will require
> incoming email to be PGP signed and have the key set-up in the secure mail
> tab.

That sounds like a good idea.

Anyway, anybody developing open source software probably should have a decent PGP key anyway.

(In reply to Jeff Fearn from comment #5)
> FYI The two web UIs are Zimbra and GMail, both have PGP support via:
> 
> GMail: https://github.com/google/end-to-end
> GMail: https://webpg.org/docs/webpg-userdocs/#!/video/gmail_demo1
> Zimbra: https://github.com/Zimbra-Community/pgp-zimlet/wiki

There also is https://www.mailvelope.com/ providing PGP support for Firefox and Chromium for many other webmailers.
Anyway, having a mail marked as sensitive stored unencrypted at an untrusted 3rd party (mail hoster) is kind of breaking the idea of marking a bug as sensitive, right?

Comment 7 Vincent Danen 2016-10-07 20:27:32 UTC
This is probably more of a concern (and good that it will require messages PGP signed to verify authenticity of the sender).  Email is too easy to spoof, and this is a really good use for the PGP support.  It's the "send everything encrypted" part that I'm not convinced is as useful.

Comment 8 Vincent Danen 2016-10-07 20:31:11 UTC
Christian, for your comments, I agree with to some degree.  Very rarely are super critical bugs reported to bugzilla from outside that include non-Red Hat people, so everything is contained within the Red Hat "domain" so it's not as though it's freely available.  Also with SSL/TLS for mail transport, it makes it a bit more difficult to MitM than your comment implies.

That changes, of course, when you have non-Red Hat accounts receiving mail, which is rare.

For the really critical security issues, they almost always come to secalert and our GPG key is noted in a few places so it's super easy to communicate with us about those types of flaws over encryption.

So, not quite just "hide from search engines" =)

Comment 9 Jeff Fearn 🐞 2016-10-15 04:47:16 UTC
Looks like this is a polite no :)