Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

content: Update mitigation section for the Dependency Confusion threat. #1226

Merged
merged 2 commits into from
Dec 13, 2024

Conversation

meder
Copy link
Contributor

@meder meder commented Oct 29, 2024

Documenting a SLSA-native and build trackccentric mitigation for Dependency Confusion attacks (#1181)

Would love to hear thoughts/opinions on the best way to reflect differing levels of adoption / maturity in native provenance verification across different ecosystems.

Copy link

netlify bot commented Oct 29, 2024

Deploy Preview for slsa ready!

Name Link
🔨 Latest commit a75a5fe
🔍 Latest deploy log https://app.netlify.com/sites/slsa/deploys/6720633b886c7d00088fb107
😎 Deploy Preview https://deploy-preview-1226--slsa.netlify.app
📱 Preview on mobile
Toggle QR Code...

QR Code

Use your smartphone camera to open QR code link.

To edit notification comments on pull requests, go to your Netlify site configuration.

@meder meder changed the title Update mitigation section for the Dependency Confusion threat. content: Update mitigation section for the Dependency Confusion threat. Oct 29, 2024
Signed-off-by: Meder Kydyraliev <[email protected]>
@adriandiglio
Copy link

adriandiglio commented Nov 11, 2024

@meder we talked about this PR during the SLSA meeting on 11/11/2024. It is my opinion that this would fall in the Dependency Track, not the Build track. The OpenSSF S2C2F already has a requirement (ENF-1) to mitigate against Dependency Confusion attacks.

Per the meeting discussion, they said that we should admit that this is hard, and if there are blogs or articles about ways to mitigate against this, we should share them here. So I'm sharing some links below - but again - I think this belongs in the SLSA Dependency Track and we should wait to cover this there.

@meder
Copy link
Contributor Author

meder commented Nov 18, 2024

And here's a blogpost on the topic: Defender's Perspective: Dependency Confusion and Typosquatting Attacks.

@meder
Copy link
Contributor Author

meder commented Nov 28, 2024

Hi all,

re: Dependency track: I think it can indeed make it easier to defend against dependency confusion and we can update this page with the new capabilities once that lands.

It might be worth agreeing on the purpose of the threats page. Given the current wording on the page I view its purpose as a place to highlight how current SLSA specification can help mitigate common supply chain threats at a high level. At its core dependency confusion is about the lack of verifiable provenance, hence the current wording suggested in this PR. Is this how others view the purpose of this page?

Copy link
Contributor

@zachariahcox zachariahcox left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

this looks correct to me 👍

@TomHennen
Copy link
Contributor

@arewm, @trishankatdatadog any objections to merging this? I think we have enough folks, and it's been sitting here for a bit.

I'll probably merge by EoY unless you say otherwise. :)

@TomHennen
Copy link
Contributor

Er, I meant "end of week" not "end of year"...

We can always make further changes as needed.

@TomHennen TomHennen merged commit 852a4fd into slsa-framework:main Dec 13, 2024
6 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
Status: Done
Development

Successfully merging this pull request may close these issues.

7 participants