-
Notifications
You must be signed in to change notification settings - Fork 23
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Revise flavor naming standard according to review criticism #327
Comments
This was considered an option and has not found any use in real life. |
The attempts to write a recommendation up was unfortunately thwarted by fundamental opposition to having a naming standard at all. When that was finally resolved, the providers already had worked out their way to do the transition. |
We have not spelled this fully out, as correctly noted. Here are my thoughts: As SCS moves to more specialized environments, e.g. edge deployments, we may find clouds that work according to all SCS standards except not having the ability to offer large flavors (by nature of the hardware, maybe not even being x86 based). If this creates lots of differences, we would probably define a separate certification profile (e.g. "SCS IaaS-compatible RISC-V-Edge" or so). If there is just a minor deviation, we might instead opt for an exception process: The decision would be an ADR itself and thus follow the well documented SCS-0001 process. More importantly, at the place where we display the SCS-compatible clouds, we would make the exception visible. |
Well, we require cloud providers to deploy the available mitigations within a month, not to deploy mitigations that are not yet available.
I am indeed expecting cloud providers to keep their cloud secure. By using the flavor names without the
No. it applies to all publically known vulnerabilities. As said, the clock ticks as soon as there are mitigations available from upstream. |
@garloff Should we modify the document so as to avoid the same questions popping up again?
|
Hi @mbuechse - yes all of your suggestions make sense to me. (And they would not even require a new version number as they are merely clarifications.) |
Signed-off-by: Matthias Büchse <[email protected]>
Signed-off-by: Matthias Büchse <[email protected]>
Signed-off-by: Matthias Büchse <[email protected]>
@garloff I made the changes discussed above, with one exception: I dropped the whole paragraph -To be certified as an SCS compliant x86-64 IaaS platform, you must offer all standard mandatory SCS
-flavors according to the previous section. (We may define a mechanism that allows exceptions to be
-granted in a way that makes this very transparent and visible to clients.) because I think this is a matter of the certification not the standard. In general, to receive a certain edit Amendment: Also, the whole matter of standard flavors is going to split off anyway (see #267) ;) |
* Drop two flavor-name examples w/FIXME as discussed in #327 * Drop sentence referring to a document that may never exist, as per #327 * Attempt to clarify suffix as per #327 * Dropped language about compliance, as this is not a matter of the standard, but of the certification (which standards have to be complied with) * Fix grammar * Satisfy markdownlint * Found a typo in the disk types. * Implement suggestion by @garloff Signed-off-by: Matthias Büchse <[email protected]> Signed-off-by: Kurt Garloff <[email protected]> Co-authored-by: Kurt Garloff <[email protected]>
@artificial-intelligence made a few pertinent remarks on PR 319 that actually apply to the current version of the flavor naming standard and, so far as they are only editorial in nature, could and should be implemented there.
This is the list of remarks from the PR (mostly verbatim, so the pronoun "I" refers to Sven):
typos and minor changes
(edit: already resolved via #331)
ti
toto
in line 58.suffices
tosuffixes
in lines 285.FIXMEs lines 215, 216:
this should be decided: is it useful? I honestly don't know.
if nobody does: remove it?
Dealing with transition from v1 to v2 names
Lines 492/493:
can we directly link to said document?
(Remark from mbuechse: I guess it still doesn't exist yet, but I don't know)
Allowing for missing flavors
Lines 222--224:
imho this document at least needs to formally specify how this mechanism would be constructed, otherwise it's a 100% escape hatch where some org process can grant exception on practically no basis.
i.e.
(Remark from mbuechse: There is no such mechanism. The whole "we may define" is actually an entirely vacuous statement. Don't interpret too much into it.)
is it really advisable to allow insecure flavors at all?
I also see a problem regarding future new vulnerabilities.
what if a previously deemed secure flavor is suddenly insecure (new vulnerability discovered) until a new patch is developed, which can take months/years.
we/the csp can't rename the flavor, but that would mean the csp isn't standard compatible, so all vulnerable flavors need to be deleted and need to be recreated.
I'm just asking: is this really what we want?
At least I find the wording unclear here, what does these mitigations reference here? the previous sentence is not about mitigations but about oversubscription.
line 122 on one hand talks about generic cpu vulnerabilities but on the other hand about very specific mitigations like microcode updates, disabling hyperthreading and the L1TF vulnerability.
so is the insecure flavor naming flag only for already previously known vulnerabilities or should it also be retroactively applied when new vulnerabilities are discovered and are not - yet - patched?
The text was updated successfully, but these errors were encountered: