tonyo |
ahh gotcha |
20:00 |
|
|
does it expose proprietary software (eg if you're selling a product everyone knows under the hood you're just using FOSS and branding it or something)? |
20:01 |
|
|
but you have everything as closed source? |
|
|
sjn |
tonyo: yes, though it's the seller's reponsibility to ensure any components they use are rolled into a vulnerability detection regime. Unsure if they have to share an SBOM of their product with downstream/customers, though I guess so if it's something that runs on customer equipment? |
20:34 |
|
tonyo |
interesting, what prompted that in the EU? i guess i can just sesarch all of this |
20:36 |
|
sjn |
a little unsure of the specifics here, though in any case that doesn't change much from an ecosystem perspective. downstream users still need to know what's going on, and if they can learn this in the form of SBOM files from their upstream providers, it'll be quite a bit easier for them (and us) |
|
|
tonyo |
i've done something that should help with this already, it was written initially to make a dependency graph but could help on the sbom side |
20:37 |
|
|
github.com/tony-o/p6-Uxmal <- this can make the graph but you can use it programmatically to just get the dep tree - not sure if it's a good starting point for the EU reqs though |
20:39 |
|
sjn |
tonyo: it started with the Log4J vulnerability some years ago, which triggered EO 14028 (Biden's "Improving the Nation’s Cybersecurity" Executive Order), followed by EU updating the NIS directive and then the Cyber Resilience Act (both two are arriving in 2024) |
20:40 |
|
tonyo |
wonder if it'll stop car manufacturers from requiring a monthly subscription to fully use the thing you've bought already |
20:41 |
|
sjn |
there are a whole lot of consequences coming from these laws, so getting into the material is better done sooner than later |
20:42 |
|
tonyo |
gotcha, yea this looks like a massive undertaking |
|
|
sjn |
at the CPAN Security Group, we've tried to put together some info on these matters, and (if all goes well) we'll get to do some real progress at the PTS in April |
20:43 |
|
|
tonyo: I _think_ a lot can be done with just a few careful changes, actually. It really doesn't have to be a massive undertaking for the language ecosystem providers out there (e.g. the CPAN toolchain folks, and anyone involved in making the Raku ecosystem work) |
20:47 |
|
|
happy to have a chat on this matter, btw |
20:48 |
|
|
I'm also (ongoing) sharing my findings on the CPAN Security Group website |
|
|
|
I, for one, would love to see some of you guys invited to PTS, to work in this stuff |
20:49 |
|