Hi, A few thoughts:
- there are more than 2 repository providers: http://maven.apache.org/repository-management.html - issuing a warning only when *downloading* content that has a CVE IMHO won't really be efficient, given there is a local cache: if you miss the warning at first download, you'll miss the risk for ever. - this will require also a mechanism to disable false positives, because downloading a component that has a CVE does not mean there is really an issue on the features that are really used - if people don't care about security when it just costs to add a check plugin, I'm not sure nagging them by default will help them. But I know that the reputation of the tool that will nag them won't be good. Personnally, I'm more in favor of better documentation of the consequences when using third party libraries, and the ways to manage them, to better educate people than going direct brute nag. I know that our documentation is silent on this currently: if someone write some good doc on this (not vendor oriented), I'd be happy to integrate the content in http://maven.apache.org/repository/ and http://maven.apache.org/ security.html Regards, Hervé Le mercredi 7 mars 2018, 07:50:20 CET Peter Muryshkin a écrit : > Hi, Chas, > > thanks for answering, absolutely! I see this as a comprehensive approach > which cannot be done on just one side: > - IETF to define a new header X-something or even HTTP response code > standard i.e. "460 - Content generally known to be insecure" > - Repository providers to implement issuing this header (could be a > community plugin you install on a mirror repo); in fact this is JFrog's and > Sonatype's business to license dashboards with exactly this information; my > point is to iterate whether they would like to issue such a header/response > code > - None of the above would make sense if Maven community does not have > stakes here. > > So now from your answer I could read between the lines "ok in general why > not if repository gives you such a notification" :-) > > kind regards > Peter > > 2018-03-07 4:56 GMT+01:00 Chas Honton <c...@honton.org>: > > If you want the package repository to add the header, you will need to > > make your request to Sonatype (Nexus) and JFrog (Artifactory) > > > > Chas > > > > > On Mar 6, 2018, at 4:12 AM, Peter Muryshkin <murysh...@gmail.com> wrote: > > > > > > Hi, all, > > > > > > currently you can run OWASP dependency check plugin against your > > > > projects. > > > > > Though, this seems to make security more or less optional: unaware > > > either > > > lightheaded teams could miss this. > > > > > > What if a package repository would integrate with this dependency > > > > checking > > > > > and issue a warning, say a special HTTP response code or a header? > > > > > > Then, Maven would raise the warning in the console log, like "this > > > component is known to have CVE-XYZ! consider upgrading" > > > > > > What do you think? > > > > --------------------------------------------------------------------- > > To unsubscribe, e-mail: dev-unsubscr...@maven.apache.org > > For additional commands, e-mail: dev-h...@maven.apache.org --------------------------------------------------------------------- To unsubscribe, e-mail: dev-unsubscr...@maven.apache.org For additional commands, e-mail: dev-h...@maven.apache.org