Skip to content

Commit ba94c89

Browse files
committed
Engagement update for PSF Sept 2024
Signed-off-by: Seth Michael Larson <[email protected]>
1 parent 200f35b commit ba94c89

File tree

1 file changed

+63
-0
lines changed

1 file changed

+63
-0
lines changed
Lines changed: 63 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,63 @@
1+
# Update 2024-09
2+
3+
## PyCon Taiwan 2024 Keynote
4+
5+
![](https://storage.googleapis.com/sethmlarson-dev-static-assets/IMG_9994.PNG)
6+
7+
Seth Larson [keynoted PyCon Taiwan 2024](https://tw.pycon.org/2024/en-us/conference/keynotes), a regional Python conference in Kaohsiung, Taiwan during September 21st through 23rd.
8+
9+
The talk was titled "Bytes, Pipes, and People" and discussed why open source security is important today and
10+
the challenges and tools for improving the security posture of a decentralized software ecosystem like Python.
11+
Slides, an overview, and links to mentioned topics [has been published](https://sethmlarson.dev/pycon-taiwan-2024).
12+
PyCon Taiwan will publish the recording to [their YouTube channel](https://www.youtube.com/@PyConTaiwanVideo) in a few months.
13+
14+
The talk was well-received, garnering many questions from the audience during Q&A and after the talk.
15+
16+
Seth was also a guest on the PyCast podcast in Taiwan for a multi-hour long recording session discussing the
17+
Security Developer-in-Residence role and Python security. This recording will be published in December.
18+
19+
## Open Regulatory Compliance WG: Cyber Resilience Act
20+
21+
Seth joined the [Open Regulatory Compliance WG](https://gitlab.eclipse.org/eclipse-wg/open-regulatory-compliance-wg)
22+
to collaborate on Cyber Resilience Act work-stream, specifically the [horizontal security standards](https://gitlab.eclipse.org/eclipse-wg/open-regulatory-compliance-wg/cra-topics/-/blob/main/standards.md#horizontal-standards-due-aug-2026)
23+
for the CRA that are due in August 2026.
24+
25+
This work will fit in with Seth's plans to create a comprehensive SBOM strategy for Python packages in order to enable
26+
projects to conform to both the CRA and the Secure Software Development Framework.
27+
28+
## Python and Sigstore
29+
30+
Seth completed the [audit and remediation](https://discuss.python.org/t/cpython-sigstore-bundles-migrated-to-include-checkpoints/63646) of current Sigstore signatures for CPython
31+
after it was reported by users that the latest Sigstore tooling was failing when verifying
32+
existing bundles. This required migrating older Sigstore bundles to the newer bundle format
33+
(v0.3) using custom tooling and then verifying all bundles against their expected identities.
34+
35+
This work is completed to advance the usage of Sigstore in the Python ecosystem, the technology
36+
is already being adopted on the Python Package Index side via PEP 740 (index attestations) and
37+
we'd like to see Sigstore continue to be adopted in the Python ecosystem and elsewhere.
38+
39+
Seth started the [PEP process by opening a discussion](https://discuss.python.org/t/pre-pep-discussion-stop-providing-gpg-signatures-for-cpython-artifacts/65058). This discussion revealed
40+
a few misunderstandings about Sigstore's feature-set (such as offline verification) from prospective verifiers
41+
(like Fedora, openSUSE, and Gentoo). The [official documentation for verifying CPython releases with Sigstore](https://www.python.org/downloads/metadata/sigstore/)
42+
was updated to include a section on how to migrate from GPG to Sigstore, including offline verification and using
43+
a compiled stand-alone binary like [sigstore-go](https://github.com/sigstore/sigstore-go/).
44+
45+
Next steps are to draft up a PEP (Python Enhancement Proposal) and have it be reviewed and potentially
46+
approved by the Steering Council.
47+
48+
## Pallets projects joins the PSF CNA umbrella
49+
50+
The Python Software Foundation CNA has [added fiscal sponsoree Pallets projects](https://pyfound.blogspot.com/2024/08/pallets-projects-now-in-scope-for-psf-cna.html) (such as Flask, Jinja2, Click, etc)
51+
under our CVE Numbering Authority scoping. This is being done to learn how the PSF can better serve Python's
52+
large ecosystem of projects in the context of the CVE ecosystem.
53+
54+
## Security releases for CPython
55+
56+
CPython [released 3.12.6, 3.11.10, 3.10.15, 3.9.20, and 3.8.20](https://discuss.python.org/t/python-3-13-0rc2-3-12-6-3-11-10-3-10-15-3-9-20-and-3-8-20-are-now-available/63161) in September containing fixes for 8 vulnerabilities.
57+
The updates also fixed multiple vulnerabilities in libexpat and OpenSSL. Using CNA automation tooling the affected ranges for
58+
all CPython CVEs were automatically updated and fixes are detectable in CPython SBOM documents.
59+
60+
## Other items
61+
62+
* Responded to security reports sent to the Python Security Response Team and CNA duties.
63+
* Attended call with ONCD discussing our response to the RFI last year and the summary published by ONCD.

0 commit comments

Comments
 (0)